paper_id
stringlengths 9
16
| version
stringclasses 26
values | yymm
stringclasses 311
values | created
timestamp[s] | title
stringlengths 6
335
| secondary_subfield
sequencelengths 1
8
| abstract
stringlengths 25
3.93k
| primary_subfield
stringclasses 124
values | field
stringclasses 20
values | fulltext
stringlengths 0
2.84M
|
---|---|---|---|---|---|---|---|---|---|
1312.7581 | 4 | 1312 | 2015-04-20T07:32:28 | On the Learning Behavior of Adaptive Networks - Part I: Transient Analysis | [
"cs.MA",
"eess.SY",
"math.OC"
] | This work carries out a detailed transient analysis of the learning behavior of multi-agent networks, and reveals interesting results about the learning abilities of distributed strategies. Among other results, the analysis reveals how combination policies influence the learning process of networked agents, and how these policies can steer the convergence point towards any of many possible Pareto optimal solutions. The results also establish that the learning process of an adaptive network undergoes three (rather than two) well-defined stages of evolution with distinctive convergence rates during the first two stages, while attaining a finite mean-square-error (MSE) level in the last stage. The analysis reveals what aspects of the network topology influence performance directly and suggests design procedures that can optimize performance by adjusting the relevant topology parameters. Interestingly, it is further shown that, in the adaptation regime, each agent in a sparsely connected network is able to achieve the same performance level as that of a centralized stochastic-gradient strategy even for left-stochastic combination strategies. These results lead to a deeper understanding and useful insights on the convergence behavior of coupled distributed learners. The results also lead to effective design mechanisms to help diffuse information more thoroughly over networks. | cs.MA | cs | IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. XX, NO. XX, MONTH 2015
1
On the Learning Behavior of Adaptive Networks --
Part I: Transient Analysis
Jianshu Chen, Member, IEEE, and Ali H. Sayed, Fellow, IEEE
5
1
0
2
r
p
A
0
2
]
A
M
.
s
c
[
4
v
1
8
5
7
.
2
1
3
1
:
v
i
X
r
a
Abstract -- This work carries out a detailed transient analysis
of the learning behavior of multi-agent networks, and reveals
interesting results about the learning abilities of distributed
strategies. Among other results, the analysis reveals how com-
bination policies influence the learning process of networked
agents, and how these policies can steer the convergence point
towards any of many possible Pareto optimal solutions. The
results also establish that the learning process of an adaptive
network undergoes three (rather than two) well-defined stages
of evolution with distinctive convergence rates during the first
two stages, while attaining a finite mean-square-error (MSE)
level in the last stage. The analysis reveals what aspects of the
network topology influence performance directly and suggests
design procedures that can optimize performance by adjusting
the relevant topology parameters. Interestingly,
it is further
shown that, in the adaptation regime, each agent in a sparsely
connected network is able to achieve the same performance level
as that of a centralized stochastic-gradient strategy even for left-
stochastic combination strategies. These results lead to a deeper
understanding and useful insights on the convergence behavior
of coupled distributed learners. The results also lead to effective
design mechanisms to help diffuse information more thoroughly
over networks.
Index Terms -- Multi-agent learning, multi-agent adaptation,
distributed strategies, diffusion of information, Pareto solutions.
I. INTRODUCTION
In multi-agent systems, agents interact with each other to
solve a problem of common interest, such as an optimization
problem in a distributed manner. Such networks of interacting
agents are useful in solving distributed estimation, learning
and decision making problems [2] -- [39]. They are also useful
in modeling biological networks [40] -- [42], collective rational
behavior [12], [13], and in developing biologically-inspired
designs [2], [43]. Two useful strategies that can be used to
guide the interactions of agents over a network are consensus
strategies [5] -- [11] and diffusion strategies [16] -- [27]. Both
Manuscript received December 28, 2013; revised November 21, 2014;
accepted April 08, 2015. This work was supported in part by NSF grants CCF-
1011918 and ECCS-1407712. A short and limited version of this work appears
in the conference publication [1] without proofs and under more restrictive
conditions than considered in this broader and expanded work.
J. Chen was with Department of Electrical Engineering, University of
California, Los Angeles, and is currently with Microsoft Research, Redmond,
WA 98052. This work was performed while he was a PhD student at UCLA.
Email: [email protected].
A. H. Sayed is with Department of Electrical Engineering, University of
California, Los Angeles, CA 90095. Email: [email protected].
Communicated by Prof. Nicol`o Cesa-Bianchi, Associate Editor for Pattern
Recognition, Statistical Learning, and Inference.
Copyright (c) 2014 IEEE. Personal use of this material
is permitted.
However, permission to use this material for any other purposes must be
obtained from the IEEE by sending a request to [email protected].
classes of algorithms involve self-learning and social-learning
steps. During self-learning, each agent updates its state using
its local data. During social learning, each agent aggregates
information from its neighbors. A useful feature that results
from these localized interactions is that the network ends
up exhibiting global patterns of behavior. For example, in
distributed estimation and learning, each agent is able to attain
the performance of centralized solutions by relying solely on
local cooperation [6], [19], [22], [23].
In this article, and the accompanying Part II [44], we con-
sider a general class of distributed strategies, which includes
diffusion and consensus updates as special cases, and study the
resulting global learning behavior by addressing four important
questions: (i) where does the distributed algorithm converge
to? (ii) when does it converge? (iii) how fast does it converge?
and (iv) how close does it converge to the intended point? We
answer questions (i) -- (iii) in Part I and question (iv) in Part
II [44]. We study these four questions by characterizing the
learning dynamics of the network in some great detail. An
interesting conclusion that follows from our analysis is that the
learning curve of a multi-agent system will be shown to exhibit
three different phases. In the first phase (Transient Phase I), the
convergence rate of the network is determined by the second
largest eigenvalue of the combination matrix in magnitude,
which is related to the degree of network connectivity. In
the second phase (Transient Phase II), the convergence rate is
determined by the entries of the right-eigenvector of the com-
bination matrix corresponding to the eigenvalue at one. And,
in the third phase (the steady-state phase) the mean-square
performance of the algorithm turns out to depend on this same
right-eigenvector in a revealing way. Even more surprisingly,
we shall discover that
the agents have the same learning
behavior starting at Transient Phase II, and are able to achieve
a performance level that matches that of a fully connected
network or a centralized stochastic-gradient strategy. Actually,
we shall show that the consensus and diffusion strategies can
be represented as perturbed versions of a centralized reference
recursion in a certain transform domain. We quantify the
effect of the perturbations and establish the aforementioned
properties for the various phases of the learning behavior of
the networks. The results will reveal the manner by which the
network topology influences performance in some unexpected
ways.
There have been of course many insightful works in the
literature on distributed strategies and their convergence be-
havior. In Sections II-B and IV-A further ahead, we explain
in what ways the current manuscript extends these earlier
investigations and what novel contributions this work leads
2
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. XX, NO. XX, MONTH 2015
to. In particular, it will be seen that several new insights are
discovered that clarify how distributed networks learn. For the
time being, in these introductory remarks, we limit ourselves
to mentioning one important aspect of our development. Most
prior studies on distributed optimization and estimation tend to
focus on the performance and convergence of the algorithms
under diminishing step-size conditions [5] -- [10], [28] -- [30],
[45], or on convergence under deterministic conditions on the
data [10]. This is perfectly fine for applications involving static
optimization problems where the objective is to locate the
fixed optimizer of some aggregate cost function of interest.
In this paper, however, we examine the learning behavior
of distributed strategies under constant step-size conditions.
This is because constant step-sizes are necessary to enable
continuous adaptation, learning, and tracking in the presence
of streaming data and drifting conditions. These features
would enable the algorithms to perform well even when the
location of the optimizer drifts with time. Nevertheless, the use
of constant step-sizes enriches the dynamics of (stochastic-
gradient) distributed algorithms in that the gradient update
term does not die out with time anymore, in clear contrast
to the diminishing step-size case where the influence of the
gradient term is annihilated over time due to the decaying
value of the step-size parameter. For this reason, more care
is needed to examine the learning behavior of distributed
strategies in the constant step-size regime since their updates
remain continually active and the effect of gradient noise is
always present. This work also generalizes and extends in
non-trivial ways the studies in [18], [20]. For example, while
reference [18] assumed that the individual costs of all agents
have the same minimizer, and reference [20] assumed that each
of these individual costs is strongly convex, these requirements
are not needed in the current study: individual costs can have
distinct minimizers and they do not even need to be convex
(see the discussion after expression (32)). This fact widens
significantly the class of distributed learning problems that are
covered by our framework. Moreover, the network behavior
is studied under less restrictive assumptions and for broader
scenarios, including a close study of the various phases of
evolution during the transient phase of the learning process.
We also study a larger class of distributed strategies that
includes diffusion and consensus strategies as special cases.
To examine the learning behavior of adaptive networks
under broader and more relaxed conditions than usual, we
pursue a new analysis route by introducing a reference
centralized recursion and by studying the perturbation
of the diffusion and consensus strategies relative to this
centralized solution over time. Insightful new results are
obtained through this perturbation analysis. For example,
we are now able to examine closely both the transient
phase behavior and the steady-state phase behavior of the
learning process and to explain how behavior in these two
stages relate to the behavior of
the centralized solution
(see Fig. 2 further ahead). Among several other results,
the mean-square-error expression (52) derived later in Part
II [44] following some careful analysis, which builds on
the results of this Part I, is one of the new (compact and
powerful) insights; it reveals how the performance of each
agent is closely related to that of the centralized stochastic
approximation strategy -- see the discussion right after
(52). As the reader will ascertain from the derivations in the
appendices, arriving at these conclusions for a broad class of
distributed strategies and under weaker conditions than usual
is demanding and necessitates a careful study of the evolution
of the error dynamics over the network and its stability.
When all is said and done, Parts I and II [44] lead to several
novel insights into the learning behavior of adaptive networks.
Notation. All vectors are column vectors. We use boldface
letters to denote random quantities (such as uk,i) and regular
font to denote their realizations or deterministic variables (such
as uk,i). We use diag{x1, . . . , xN} to denote a (block) diago-
nal matrix consisting of diagonal entries (blocks) x1, . . . , xN ,
and use col{x1, . . . , xN} to denote a column vector formed by
stacking x1, . . . , xN on top of each other. The notation x (cid:22) y
means each entry of the vector x is less than or equal to the
corresponding entry of the vector y, and the notation X (cid:22) Y
means each entry of the matrix X is less than or equal to the
corresponding entry of the matrix Y . The notation x = vec(X)
denotes the vectorization operation that stacks the columns
of a matrix X on top of each other to form a vector x, and
X = vec−1(x) is the inverse operation. The operators ∇w and
∇wT denote the column and row gradient vectors with respect
to w. When ∇wT is applied to a column vector s, it generates
a matrix. The notation a(µ) = O(b(µ)) means that there exists
a constant C > 0 such that
for all µ, a(µ) ≤ C · b(µ).
II. PROBLEM FORMULATION
A. Distributed Strategies: Consensus and Diffusion
We consider a connected network of N agents that are
linked together through a topology -- see Fig. 1. Each agent
k implements a distributed algorithm of the following form to
update its state vector from wk,i−1 to wk,i:
l=1
N(cid:88)
N(cid:88)
N(cid:88)
l=1
φk,i−1 =
ψk,i =
wk,i =
a1,lkwl,i−1
a0,lkφl,i−1 − µk sk,i(φk,i−1)
a2,lkψl,i
(1)
(2)
(3)
l=1
where wk,i ∈ RM is the state of agent k at time i, usually
an estimate for the solution of some optimization problem,
φk,i−1 ∈ RM and ψk,i ∈ RM are intermediate variables gen-
erated at node k before updating to wk,i, µk is a non-negative
constant step-size parameter used by node k, and sk,i(·) is
an M × 1 update vector function at node k. In deterministic
optimization problems, the update vectors sk,i(·) can be the
gradient or Newton steps associated with the cost functions
[10]. On the other hand, in stocastic approximation problems,
such as adaptation, learning and estimation problems [5] -- [9],
[14] -- [23], [25] -- [29], the update vectors are usually computed
from realizations of data samples that arrive sequentially at
the nodes. In the stochastic setting, the quantities appearing
CHEN AND SAYED: ON THE LEARNING BEHAVIOR OF ADAPTIVE NETWORKS -- PART I: TRANSIENT ANALYSIS
3
Fig. 1. A network representing a multi-agent system. The set of all agents
that can communicate with node k is denoted by Nk.The edge linking any two
agents is represented by two directed arrows to emphasize that information
can flow in both directions.
in (1) -- (3) become random and we use boldface letters to
highlight their stochastic nature. In Example 1 below, we
illustrate choices for sk,i(w) in different contexts.
The combination coefficients a1,lk, a0,lk and a2,lk in (1) --
(3) are nonnegative weights that each node k assigns to
the information arriving from node l; these coefficients are
required to satisfy:
N(cid:88)
N(cid:88)
N(cid:88)
a1,lk = 1,
a0,lk = 1,
a2,lk = 1
l=1
l=1
a0,lk ≥ 0,
a1,lk ≥ 0,
a1,lk = a2,lk = a0,lk = 0,
l=1
a2,lk ≥ 0
if l /∈ Nk
(4)
(5)
(6)
Observe from (6) that the combination coefficients are zero
if l /∈ Nk, where Nk denotes the set of neighbors of node
k. Therefore, each summation in (1) -- (3) is actually confined
to the neighborhood of node k. In algorithm (1) -- (3), each
node k first combines the states {wl,i−1} from its neighbors
and updates wk,i−1 to the intermediate variable φk,i−1. Then,
the {φl,i−1} from the neighbors are aggregated and updated
to ψk,i along the opposite direction of sk,i(φk,i−1). Finally,
the intermediate estimators {ψl,i} from the neighbors are
combined to generate the new state wk,i at node k.
Example 1: The distributed algorithm (1) -- (3) can be ap-
plied to optimize aggregate costs of the following form:
N(cid:88)
k=1
• In distributed estimation and learning,
node k is chosen as the deterministic gradient (column)
vector ∇wJk(·).
the individual
cost function at each node k is usually selected as
the expected value of some loss function Qk(·,·), i.e.,
Jk(w) = E{Qk(w, xk,i)} [18], where the expectation
is with respect to the randomness in the data samples
{xk,i} collected at node k at time i. The exact expression
for ∇wJk(w) is usually unknown since the probability
distribution of the data is not known beforehand. In
these situations, the update vector sk,i(·) is chosen as an
instantaneous approximation for the true gradient vector,
such as, sk,i(·) = (cid:92)
∇wJk(·) = ∇wQk(·, xk,i), which is
known as stochastic gradient. Note that the update vector
sk,i(w) is now evaluated from the random data sample
xk,i. Therefore, it is also random and time dependent.
The update vectors {sk,i(·)} may not necessarily be the
gradients of cost functions or their stochastic approximations.
They may take other forms for different reasons. For example,
in [6], a certain gain matrix K is multiplied to the left of
the stochastic gradient vector (cid:92)
∇wJk(·) to make the estimator
asymptotically efficient for a linear observation model.
Returning to the general distributed strategy (1) -- (3), we note
that it can be specialized into various useful algorithms. We
let A1, A0 and A2 denote the N × N matrices that collect the
coefficients {a1,lk}, {a0,lk} and {a2,lk}. Then, condition (4)
is equivalent to
AT
1
1 = 1
1 = 1, AT
0
1 = 1, AT
2
(9)
where 1 is the N × 1 vector with all its entries equal to
one. Condition (9) means that the matrices {A0, A1, A2} are
left-stochastic (i.e., the entries on each of their columns add
up to one). Different choices for A1, A0 and A2 correspond
to different distributed strategies, as summarized in Table I.
Specifically, the traditional consensus [5] -- [11] and diffusion
(ATC and CTA) [16] -- [23] algorithms with constant step-sizes
are given by the following iterations:
Consensus :
l∈Nk
(cid:88)
(cid:88)
a0,lkwl,i−1
wk,i = φk,i−1 − µk sk,i(wk,i−1)
φk,i−1 =
φk,i−1 =
ψk,i = wk,i−1−µk sk,i(wk,i−1)
(cid:88)
wk,i = φk,i−1 − µk sk,i(φk,i−1)
a1,lkwl,i−1
a2,lkψl,i
wk,i =
l∈Nk
l∈Nk
(10)
(11)
(12)
J glob(w) =
Jk(w)
(7)
CTA diffusion :
or to find Pareto-optimal solutions to multi-objective optimiza-
tion problems, such as:
w {J1(w), . . . , JN (w)}
min
(8)
ATC diffusion :
where Jk(w) is an individual convex cost associated with
each agent k. Optimization problems of the form (7) -- (8) arise
in various applications -- see [3] -- [31]. Depending on the
context, the update vector sk,i(·) may be chosen in different
ways:
• In deterministic optimization problems, the expressions
for {Jk(w)} are known and the update vector sk,i(·) at
Therefore, the convex combination steps appear in different
locations in the consensus and diffusion implementations. For
instance, observe that the consensus strategy (10) evaluates the
update direction sk,i(·) at wk,i−1, which is the estimator prior
to the aggregation, while the diffusion strategy (11) evaluates
the update direction at φk,i−1, which is the estimator after the
Nkk123456789a1kak1104
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. XX, NO. XX, MONTH 2015
DIFFERENT CHOICES FOR A1, A0 AND A2 CORRESPOND TO DIFFERENT
DISTRIBUTED STRATEGIES.
TABLE I
Consensus
Distributed Strategeis A1 A0 A2
I
A
I
ATC diffusion
CTA diffusion
I
I
A
A
I
I
A1A0A2
A
A
A
aggregation. In our analysis, we will proceed with the general
form (1) -- (3) to study all three schemes, and other possibilities,
within a unifying framework.
We observe that there are two types of learning processes
involved in the dynamics of each agent k: (i) self-learning
in (2) from locally sensed data and (ii) social learning in
(1) and (3) from neighbors. All nodes implement the same
self- and social learning structure. As a result, the learning
dynamics of all nodes in the network are coupled; knowledge
exploited from local data at node k will be propagated to
its neighbors and from there to their neighbors in a diffusive
learning process. It is expected that some global performance
pattern will emerge from these localized interactions in the
multi-agent system. In this work and the accompanying Part
II [44], we address the following questions:
• Limit point: where does each state wk,i converge to?
• Stability: under which condition does convergence occur?
• Learning rate: how fast does convergence occur?
• Performance: how close is wk,i to the limit point?
• Generalization: can wk,i match the performance of a
centralized solution?
We address the first three questions in this part, and examine
the last two questions pertaining to performance in Part II [44].
We address the five questions by characterizing analytically the
learning dynamics of the network to reveal the global behavior
that emerges in the small step-size regime. The answers to
these questions will provide useful and novel insights about
how to tune the algorithm parameters in order to reach desired
performance levels -- see Sec. VI in Part II [44].
B. Relation to Prior Work
In comparison with the existing literature [5] -- [10], [28] --
[30], [45] -- [48], it is worth noting that most prior studies on
distributed optimization algorithms focus on studying their
performance and convergence under diminishing step-size con-
ditions and for doubly-stochastic combination policies (i.e.,
matrices for which the entries on each of their columns and
on each of their rows add up to one). These are of course
useful conditions, especially when the emphasis is on solving
static optimization problems. We focus instead on the case of
constant step-sizes because, as explained earlier, they enable
continuous adaptation and learning under drifting conditions;
in contrast, diminishing step-sizes turn off learning once they
approach zero. By using constant step-sizes,
the resulting
algorithms are able to track dynamic solutions that may slowly
drift as the underlying problem conditions change.
Moreover, constant step-size implementations have merits
even for stationary environments where the solutions remain
static. This is because, as we are going to show later in this
work and its accompanying Part II [44], constant step-size
learning converges at a geometric rate, in the order of O(γi)
for some 0 < γ < 1, towards a small mean-square error in
the order of the step-size parameter. This means that these
solutions can attain satisfactory performance even after short
intervals of time. In comparison, implementations that rely on
a diminishing step-size of the form µ(i) = µo/i, for some
constant µo, converge almost surely to the solution albeit at
the slower rate of O(1/i). Furthermore, the choice of the
parameter µo is critical to guarantee the O(1/i) rate [49, p.54];
if µo is not large enough, the resulting convergence rate can
be considerably slower than O(1/i). To avoid this slowdown
in convergence, a large initial value µo is usually chosen in
practice, which ends up leading to an overshoot in the learning
curve; the curve grows up initially before starting its decay at
the asymptotic rate, O(1/i).
We remark that we also do not limit the choice of com-
bination policies to being doubly-stochastic; we only require
condition (9). It turns out that left-stochastic matrices lead to
superior mean-square error performance (see, e.g., expression
(63) in Part II [44] and also [17]). The use of both constant
step-sizes and left-stochastic combination policies enrich the
learning dynamics of the network in interesting ways, as we
are going to discover. In particular, under these conditions, we
will derive an interesting result that reveals how the topology
of the network determines the limit point of the distributed
strategies. We will show that the combination weights steer
the convergence point away from the expected solution and
towards any of many possible Pareto optimal solutions. This is
in contrast to commonly-used doubly-stochastic combination
policies where the limit point of the network is fixed and
cannot be changed regardless of the topology. We will show
that the limit point is determined by the right eigenvector that
is associated with the eigenvalue at one for the matrix product
A1A0A2. We will also be able to characterize in Part II [44]
how close each agent in the network gets to this limit point
and to explain how the limit point plays the role of a Pareto
optimal solution for a suitably defined aggregate cost function.
We note that the concept of a limit point in this work is
different from earlier studies on the limit point of consen-
sus implementations that deal exclusively with the problem
of evaluating the weighted average of initial state values
there
at
are no adaptation steps and no streaming data;
the step-
size parameters {µk} are set to zero in (2), (10), (11) and
(12). In contrast, the general distributed strategy (1) -- (3) is
meant to solve continuous adaptation and learning problems
from streaming data arriving at the agents. In this case, the
adaptation term sk,i(·) (self-learning) is necessary, in addition
to the combination step (social-learning). There is a non-trivial
coupling between both steps and across the agents. For this
reason, identifying the actual limit point of the distributed
strategy is rather challenging and requires a close examination
of the evolution of the network dynamics, as demonstrated by
the technical tools used in this work. In comparison, while
the evolution of traditional average-consensus implementations
can be described by linear first-order recursions, the same is
not true for adaptive networks where the dynamics evolves
the agents (e.g., [50]). In these implementations,
CHEN AND SAYED: ON THE LEARNING BEHAVIOR OF ADAPTIVE NETWORKS -- PART I: TRANSIENT ANALYSIS
5
according to nonlinear stochastic difference recursions.
where πk is the kth entry of the vector π.
III. MODELING ASSUMPTIONS
In this section, we collect the assumptions and definitions
that are used in the analysis and explain why they are justified
and how they relate to similar assumptions used in several
prior studies in the literature. As the discussion will reveal, in
most cases, the assumptions that we adopt here are relaxed
(i.e., weaker) versions than conditions used before in the
literature such as in [5] -- [7], [10], [12], [18] -- [20], [28] -- [30],
[49], [51]. We do so in order to analyze the learning behavior
of networks under conditions that are similar to what
is
normally assumed in the prior art, albeit ones that are generally
less restrictive.
Assumption 1 (Strongly-connected network): The N × N
matrix product A (cid:44) A1A0A2 is assumed to be a primitive
left-stochastic matrix, i.e., AT 1 = 1 and there exists a finite
integer jo such that all entries of Ajo are strictly positive.
This condition is satisfied for most networks and is not
restrictive. Let A = [alk] denote the entries of A. Assumption
1 is automatically satisfied if the product A corresponds to a
connected network and there exists at least one akk > 0 for
some node k (i.e., at least one node with a nontrivial self-loop)
[21], [23]. It then follows from the Perron-Frobenius Theorem
[52] that the matrix A1A0A2 has a single eigenvalue at one
of multiplicity one and all other eigenvalues are strictly less
than one in magnitude, i.e.,
1 = λ1(A) > λ2(A) ≥ ··· ≥ λN (A)
(13)
Obviously, 1T is a left eigenvector for A1A0A2 corresponding
to the eigenvalue at one. Let θ denote the right eigenvector
corresponding to the eigenvalue at one (the Perron vector) and
whose entries are normalized to add up to one, i.e.,
Aθ = θ,
1T θ = 1
(14)
Then, the Perron-Frobenius Theorem further ensures that all
entries of θ satisfy 0 < θk < 1. Note that, unlike [5] -- [11],
[28], [29], we do not require the matrix A1A0A2 to be doubly-
stochastic (in which case θ would be 1/N and, therefore, all its
entries will be identical to each other). Instead, we will study
the performance of the algorithms in the context of general
left-stochastic matrices {A1, A0, A2} and we will examine the
influence of (the generally non-equal entries of) θ on both the
limit point and performance of the network.
Definition 1 (Step-sizes): Without loss of generality, we ex-
press the step-size at each node k as µk = µmaxβk, where
µmax (cid:44) max{µk} is the largest step-size, and 0 ≤ βk ≤ 1.
We assume βk > 0 for at least one k. Thus, observe that we
are allowing the possibility of zero step-sizes by some of the
agents.
Definition 2 (Useful vectors): Let π and p be the following
N × 1 vectors:
π (cid:44) A2θ
p (cid:44) col{π1β1, . . . , πN βN}
(15)
(16)
The vector p will play a critical role in the performance of
the distributed strategy (1) -- (3). Furthermore, we introduce the
following assumptions on the update vectors sk,i(·) in (1) -- (3).
Assumption 2 (Update vector: Randomness): There exists
an M × 1 deterministic vector function sk(w) such that, for
all M × 1 vectors w in the filtration Fi−1 generated by the
past history of iterates {wk,j} for j ≤ i− 1 and all k, it holds
that
E{sk,i(w)Fi−1} = sk(w)
for all i, k. Furthermore, there exist α ≥ 0 and σ2
that for all i, k and w ∈ Fi−1:
E(cid:110)
(cid:107)sk,i(w)−sk(w)(cid:107)2(cid:12)(cid:12)Fi−1
(cid:111)
≤ α·(cid:107)w(cid:107)2 +σ2
v
(18)
(17)
v ≥ 0 such
Condition (18) requires the conditional variance of the
random update direction sk,i(w) to be bounded by the square-
norm of w. Condition (18) is a generalized version of As-
sumption 2 from [18], [20]; it is also a generalization of the
assumptions from [28], [49], [51], where sk,i(w) was instead
modeled as the following perturbed version of the true gradient
vector:
sk,i(w) = (cid:92)
∇wJk(w) = ∇wJk(w) + vk,i(w)
(19)
with sk(w) = ∇wJk(w), in which case conditions (17) -- (18)
translate into the following requirements on the gradient noise
vk,i(w):
(cid:111)
E(cid:110)
(cid:107)vk,i(w)(cid:107)2(cid:12)(cid:12)Fi−1
E{vk,i(w)Fi−1} = 0
(zero mean)
≤ α·(cid:107)w(cid:107)2 +σ2
v
(20)
(21)
In Example 2 of [18], we explained how these conditions
are satisfied automatically in the context of mean-square-error
adaptation over networks. Assumption 2 given by (17) -- (18)
is more general than (20) -- (21) because we are allowing the
update vector sk,i(·) to be constructed in forms other than
(19). Furthermore, Assumption (21) is also more relaxed than
the following variant used in [49], [51]:
≤ α·(cid:107)∇wJk(w)(cid:107)2 +σ2
v
(22)
This is because (22) implies a condition of the form (21).
Indeed, note that
(cid:111)
E(cid:110)
(cid:107)vk,i(w)(cid:107)2(cid:12)(cid:12)Fi−1
(cid:111)
E(cid:110)
(cid:107)vk,i(w)(cid:107)2(cid:12)(cid:12)Fi−1
v
(b)
(a)
= α·(cid:107)∇wJk(w) − ∇wJk(0) + ∇wJk(0)(cid:107)2 +σ2
≤ 2α·(cid:107)∇wJk(w) − ∇wJk(0)(cid:107)2 + 2α(cid:107)∇wJk(0)(cid:107)2 +σ2
≤ 2αλ2
(cid:44) α
U · (cid:107)w(cid:107)2 + 2α(cid:107)∇wJk(0)(cid:107)2 +σ2
· (cid:107)w(cid:107)2 + σ2
v(cid:48)
(23)
where step (a) uses the relation (cid:107)x + y(cid:107)2 ≤ 2(cid:107)x(cid:107)2 + 2(cid:107)y(cid:107)2,
and step (b) used (24) to be assumed next.
v
v
(cid:48)
6
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. XX, NO. XX, MONTH 2015
N(cid:88)
(cid:104)
(cid:105)
Assumption 3 (Update vector: Lipschitz): There exists a
nonnegative λU such that for all x, y ∈ RM and all k:
(cid:107)sk(x) − sk(y)(cid:107) ≤ λU · (cid:107)x − y(cid:107)
(24)
where the subscript "U" in λU means "upper bound".
A similar assumption to (24) was used before in the literature
for the model (19) by requiring the gradient vector of the
individual cost functions Jk(w) to be Lipschitz [5], [12], [30],
[49], [51]. Again, condition (24) is more general because we
are not limiting the construction of the update direction to
(19).
Assumption 4 (Update vector: Strong monotonicity): Let
pk denote the kth entry of the vector p defined in (16). There
exists λL > 0 such that for all x, y ∈ RM :
pk
(x − y)T ·
≥ λL · (cid:107)x − y(cid:107)2
where the subscript "L" in λL means "lower bound".
sk(x) − sk(y)
k=1
(25)
Remark 1: Applying the Cauchy-Schwartz inequality [52,
p.15] to the left-hand side of (25) and using (24), we deduce
the following relation between λL and λU :
λU · (cid:107)p(cid:107)1 ≥ λL
(26)
The following lemma gives the equivalent forms of Assump-
where (cid:107) · (cid:107)1 denotes the 1−norm of the vector argument.
tions 3 -- 4 when the {sk(w)} happen to be differentiable.
Lemma 1 (Equivalent conditions on update vectors):
Suppose {sk(w)} are differentiable in an open set S ⊆ RM .
Then, having conditions (24) and (25) hold on S is equivalent
to the following conditions, respectively,
(cid:107)∇wT sk(w)(cid:107) ≤ λU
[Hc(w) + H T
c (w)] ≥ λL · IM
1
2
(27)
(28)
for any w ∈ S, where (cid:107)·(cid:107) denotes the 2-induced norm (largest
singular value) of its matrix argument and
Hc(w) (cid:44) n(cid:88)
Proof: See Appendix B.
k=1
Since in Assumptions 3 -- 4 we require conditions (24)
and (25) to hold over the entire RM , then the equivalent
conditions (27) -- (28) will need to hold over the entire RM
when the {sk(w)} are differentiable. In the context of dis-
tributed optimization problems of the form (7) -- (8) with twice-
differentiable Jk(w), where the stochastic gradient vectors
are constructed as in (19), Lemma 1 implies that the above
Assumptions 3 -- 4 are equivalent to the following conditions
on the Hessian matrix of each Jk(w) [49, p.10]:
wJk(w)(cid:13)(cid:13) ≤ λU
(cid:13)(cid:13)∇2
N(cid:88)
pk∇2
wJk(w) ≥ λLIM > 0
k=1
pk∇wT sk(w)
(29)
i.e.,
J glob,(cid:63)(w) (cid:44) N(cid:88)
Condition (31) is in turn equivalent to requiring the following
weighted sum of the individual cost functions {Jk(w)} to be
strongly convex:
pkJk(w)
(32)
k=1
We note that strong convexity conditions are prevalent
in
many studies on optimization techniques in the literature. For
example, each of the individual costs Jk(w) is assumed to be
stronlgy convex in [29] in order to derive upper bounds on
the limit superior ("lim sup") of the mean-square-error of the
estimates wk,i or the expected value of the cost function at
wk,i. In comparison, the framework in this work does not
require the individual costs to be strongly convex or even
convex. Actually, some of the costs {Jk(w)} can be non-
convex as long as the aggregate cost (32) remains strongly
convex. Such relaxed assumptions on the individual costs
introduce challenges into the analysis, and we need to develop
a systematic approach to characterize the limiting behavior of
adaptive networks under such less restrictive conditions.
Example 2: The strong-convexity condition (31) on the
aggregate cost (32) can be related to a global observability
condition similar to [6] -- [8]. To illustrate this point, we con-
sider an example dealing with quadratic costs. Thus, consider
a network of N agents that are connected according to a
certain topology. The data samples received at each agent k
at time i consist of the observation signal dk(i) ∈ R and
the regressor vector uk,i ∈ R1×M , which are assumed to be
related according to the following linear model:
(33)
where vk(i) ∈ R is a zero-mean additive white noise that
is uncorrelated with the regressor vector u(cid:96),j for all k, (cid:96), i, j.
Each agent in the network would like to estimate wo ∈ RM
by learning from the local data stream {dk(i), uk,i} and by
collaborating with its intermediate neighbors. The problem can
be formulated as minimizing the aggregate cost (7) with Jk(w)
chosen to be
dk(i) = uk,iwo + vk(i)
Jk(w) =
J glob(w) =
1
2
Edk(i) − uk,iw2
N(cid:88)
1
2
Edk(i) − uk,iw2
k=1
(34)
(35)
This is a distributed least-mean-squares (LMS) estimation
problem studied in [16], [17], [19]. We would like to explain
that condition (31) amounts to a global observability condition.
First, note that the Hessian matrix of Jk(w) in this case is the
covariance matrix of the regressor uk,i:
k,iuk,i}
(36)
Therefore, condition (31) becomes that there exists a λL > 0
such that
Ru,k (cid:44) E{uT
N(cid:88)
(37)
pkRu,k ≥ λLIM > 0
k=1
(30)
(31)
CHEN AND SAYED: ON THE LEARNING BEHAVIOR OF ADAPTIVE NETWORKS -- PART I: TRANSIENT ANALYSIS
7
it can be verified that
Furthermore,
the above inequality
holds for any positive {pk} as long as the following global
observability condition holds:
Ru,k > 0
(38)
N(cid:88)
k=1
N(cid:88)
N(cid:88)
k=1
To see this, let pmin = mink pk, and write the left-hand side
of (37) as
N(cid:88)
k=1
pkRu,k = pmin
Ru,k +
N(cid:88)
(cid:124)
k=1
(pk − pmin)Ru,k
(cid:123)(cid:122)
(cid:125)
·IM
(39)
≥ pmin
Ru,k > pminλu,min
k=1
(cid:44)λL
where λu,min denotes the minimum eigenvalue of(cid:80)N
k=1 Ru,k.
Note that the left-hand side of (38) is the Hessian of J glob(w)
in (35). Therefore, condition (38) means that the aggregate
cost function (35) is strongly convex so that the information
provided by the linear observation model (33) over the entire
network is sufficient to uniquely identify the minimizer of (35).
Similar global observability conditions were used in [6] -- [8]
to study the performance of distributed parameter estimation
problems. Such conditions are useful because it implies that
even if wo is not locally observable to any agent in the network
but is globally observable, i.e., Ru,k > 0 does not hold for any
k = 1, . . . , N but (38) holds, the distributed strategies (10) --
(12) will still enable each agent to estimate the correct wo
through local cooperation. In Part II [44], we provide more
insights into how cooperation benefits the learning at each
agent.
Assumption 5 (Jacobian matrix: Lipschitz): Let wo denote
the limit point of the distributed strategy (1) -- (3), which is
defined further ahead as the unique solution to (42). Then, in
a small neighborhood around wo, we assume that sk(w) is
differentiable with respect to w and satisfies
(cid:107)∇wT sk(wo + δw) − ∇wT sk(wo)(cid:107) ≤ λH · (cid:107)δw(cid:107)
(40)
for all (cid:107)δw(cid:107) ≤ rH for some small rH, and where λH is a
nonnegative number independent of δw.
In the context of distributed optimization problems of the form
(7) -- (8) with twice-differentiable Jk(w), where the stochastic
gradient vectors are constructed as in (19), the above Assump-
tion translates into the following Lipschitz Hessian condition:
(cid:107)∇2
wJk(wo + δw) − ∇2
wJk(wo)(cid:107) ≤ λH · (cid:107)δw(cid:107)
(41)
Condition (40) is useful when we examine the convergence
rate of the algorithm later in this article. It is also useful in
deriving the steady-state mean-square-error expression (52) in
Part II [44].
IV. LEARNING BEHAVIOR
A. Overview of Main Results
Before we proceed to the formal analysis, we first give
a brief overview of the main results that we are going to
establish in this part on the learning behavior of the distributed
strategies (1) -- (3) for sufficiently small step-sizes. The first
major conclusion is that for general left-stochastic matrices
{A1, A0, A2}, the agents in the network will have their esti-
mators wk,i converge, in the mean-square-error sense, to the
same vector wo that corresponds to the unique solution of the
following algebraic equation:
N(cid:88)
k=1
N(cid:88)
k=1
N(cid:88)
k=1
pksk(w) = 0
(42)
For example, in the context of distributed optimization prob-
lems of the form (7), this result implies that for left-stochastic
matrices {A1, A0, A2}, the distributed strategies represented
by (1) -- (3) will not converge to the global minimizer of the
original aggregate cost (7), which is the unique solution to the
alternative algebraic equation
∇wJk(w) = 0
(43)
Instead, these distributed solutions will converge to the global
minimizer of the weighted aggregate cost J glob,(cid:63)(w) defined
by (32) in terms of the entries pk, i.e., to the unique solution
of
pk∇wJk(w) = 0
(44)
Result (42) also means that the distributed strategies (1) -- (3)
converge to a Pareto optimal solution of the multi-objective
problem (8); one Pareto solution for each selection of the
topology parameters {pk}. The distinction between the aggre-
gate costs J glob(w) and J glob,(cid:63)(w) does not appear in earlier
studies on distributed optimization [5] -- [11], [28] -- [30] mainly
because these studies focus on doubly-stochastic combination
matrices, for which the entries {pk} will all become equal to
each other for uniform step-sizes µk ≡ µ or µk(i) ≡ µ(i). In
that case, the minimizations of (7) and (32) become equivalent
and the solution of (43) and (44) would then coincide. In
other words, regardless of the choice of the doubly stochastic
combination weights, when the {pk} are identical, the limit
point will be unique and correspond to the solution of
sk(w) = 0
(45)
k=1
In contrast, result (42) shows that left-stochastic combination
policies add more flexibility into the behavior of the network.
By selecting different combination weights, or even different
topologies, the entries {pk} can be made to change and the
limit point can be steered towards other desired Pareto optimal
solutions. Even in the traditional case of consensus-type im-
plementations for computing averages, as opposed to learning
from streaming data, it also holds that it is beneficial to relax
the requirement of a doubly-stochastic combination policy in
order to enable broadcast algorithms without feedback [53].
The second major conclusion of the paper is that we will
show in (129) further ahead that there always exist sufficiently
small step-sizes such that the learning process over the network
N(cid:88)
8
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. XX, NO. XX, MONTH 2015
at the same value, say, e.g., wk,0 = 0, then the learning
curves start at Transient Phase II directly.
• Transient Phase II:
In this phase, the trajectories of all agents are uniformly
close to the trajectory of the reference recursion; they
converge in a coordinated manner to steady-state. The
learning curves at this phase are well modeled by the
same reference recursion (47) since we will show in (145)
that:
E(cid:107) wk,i(cid:107)2 = (cid:107) wc,i(cid:107)2 + O(µ1/2
Furthermore, for small step-sizes and during the later
stages of this phase, ¯wc,i will be close enough to wo
and the convergence rate r will be shown to satisfy:
max) · γi
c + O(µmax)
(49)
r =(cid:2)ρ(IM − µmaxHc)(cid:3)2
+ O(cid:0)(µmax)
2(M−1)(cid:1)
1
(50)
where ρ(·) denotes the spectral radius of its matrix
argument, is an arbitrarily small positive number, and
Hc is the same matrix that results from evaluating (29)
at w = wo, i.e.,
pkHk = Hc(wo)
(51)
Hc (cid:44) N(cid:88)
where Hk (cid:44) ∇wT sk(wo).
• Steady-State Phase:
k=1
The reference recursion (47) continues converging to-
wards wo so that (cid:107) wc,i(cid:107)2 = (cid:107)wo − ¯wc,i(cid:107)2 will converge
to zero (−∞ dB in Fig. 2). However, for the distributed
the mean-square-error E(cid:107) wk,i(cid:107)2 =
strategy (1) -- (3),
E(cid:107)wo − wk,i(cid:107)2 at each agent k will converge to a finite
steady-state value. We will be able to characterize this
value in terms of the vector p in Part II [44] as follows:1
E(cid:107) wk,i(cid:107)2 = µmax·Tr(cid:8)X(pT⊗IM )Rv(p⊗IM )(cid:9)
lim
i→∞
+ o(µmax)
(52)
where X is the solution to the Lyapunov equation de-
scribed later in (41) of Part II [44] (when Σ = I),
and o(µmax) denotes a strictly higher order term of
µmax. Expression (52) is a revealing result. It is a non-
trivial extension of a classical result pertaining to the
mean-square-error performance of stand-alone adaptive
filters [54] -- [57] to the more demanding context when
a multitude of adaptive agents are coupled together in
a cooperative manner through a network topology. This
result has an important ramification, which we pursue
in Part II [44]. We will show there that no matter how
the agents are connected to each other, there is always
a way to select the combination weights such that the
performance of the network is invariant to the topology.
This will also imply that, for any connected topology,
there is always a way to select the combination weights
such that the performance of the network matches that of
the centralized solution.
1The interpretation of the limit in (52) is explained in more detail in Sec.
IV of Part II [44].
Fig. 2. A typical mean-square-error (MSE) learning curve includes a transient
stage that consists of two phases and a steady-state phase. The plot shows
how the learning curve of a network of agents compares to the learning curve
of a centralized reference solution. The analysis in this work, and in the
accompanying Part II [44] characterizes in detail the parameters that determine
the behavior of the network (rate, stability, and performance) during each
phase of the learning process.
is mean-square stable. This means that the weight error vectors
relative to wo will satisfy
lim sup
i→∞
E(cid:107) wk,i(cid:107)2 ≤ O(µmax)
(46)
so that the steady-state mean-square-error at each agent will
be of the order of O(µmax).
The third major conclusion of our analysis is that we will
show that, during the convergence process towards the limit
the learning curve at each agent exhibits three
point wo,
distinct phases: Transient Phase I, Transient Phase II, and
Steady-State Phase. These phases are illustrated in Fig. 2
and they are interpreted as follows. Let us first introduce
a reference (centralized) procedure that is described by the
following centralized-type recursion:
which is initialized at
¯wc,i = ¯wc,i−1 − µmax
N(cid:88)
¯wc,0 =
pksk( ¯wc,i−1)
(47)
k=1
θkwk,0
(48)
k=1
where θk is the kth entry of the eigenvector θ, µmax, and {pk}
are defined in Definitions 1 -- 2, wk,0 is the initial value of the
distributed strategy at agent k, and ¯wc,i is an M × 1 vector
generated by the reference recursion (47). The three phases
of the learning curve will be shown to have the following
features:
• Transient Phase I:
If agents are initialized at different values,
then the
estimates of the various agents will initially evolve in
such a way to make each wk,i get closer to the reference
recursion ¯wc,i. The rate at which the agents approach
¯wc,i will be determined by λ2(A), the second largest
eigenvalue of A in magnitude. If the agents are initialized
N(cid:88)
Phase&I&Phase&II&Steady,State&MSE&(dB)&Number&of&Itera9ons&&Reference&(centralized)&strategy&&&&&Steady,state&MSE&&&&&&Distributed&strategies&(49)&and&(50)&(52)&CHEN AND SAYED: ON THE LEARNING BEHAVIOR OF ADAPTIVE NETWORKS -- PART I: TRANSIENT ANALYSIS
9
Note that the above results are obtained for the general
distributed strategy (1) -- (3). Therefore, the results can be spe-
cialized to the consensus, CTA diffusion, and ATC diffusion
strategies in (10) -- (12) by choosing the matrices A1, A2, and
A0 according to Tab. I. The results in this paper and its
accompanying Part II [44] not only generalize the analysis
from earlier works [16] -- [20] but, more importantly, they also
provide deeper insights into the learning behavior of these
adaptation and learning strategies.
V. STUDY OF ERROR DYNAMICS
A. Error Quantities
We shall examine the learning behavior of the distributed
strategy (1) -- (3) by examining how the perturbation between
the distributed solution (1) -- (3) and the reference solution (47)
evolves over time -- see Fig. 3. Specifically, let wk,i denote
the discrepancy between wk,i and ¯wc,i, i.e.,
wk,i (cid:44) wk,i − ¯wc,i
(53)
and let wi and wi denote the global vectors that collect the
wk,i and wk,i from across the network, respectively:
wi (cid:44) col{w1,i, . . . , wN,i}
wi (cid:44) col{ w1,i, . . . , wN,i} = wi − 1 ⊗ ¯wc,i
(54)
(55)
It turns out that it is insightful to study the evolution of wi
in a transformed domain where it is possible to express the
distributed recursion (1) -- (3) as a perturbed version of the
reference recursion (47).
Definition 3 (Network basis transformation): We
define
the transformation by introducing the Jordan canonical
decomposition of the matrix A = A1A0A2. Let
AT = U DU
−1
(56)
where U is an invertible matrix whose columns correspond to
the right-eigenvectors of AT , and D is a block Jordan matrix
with a single eigenvalue at one with multiplicity one while
all other eigenvalues are strictly less than one. The Kronecker
form of A then admits the decomposition:
AT (cid:44) AT ⊗ IM = UDU
(57)
−1
where
U (cid:44) U ⊗ IM ,
D (cid:44) D ⊗ IM
We use U to define the following basis transformation:
w(cid:48)
w(cid:48)
i
i
(cid:44) U
(cid:44) U
−1wi = (U
−1 wi = (U
−1 ⊗ IM )wi
−1 ⊗ IM ) wi
(58)
(59)
(60)
The relations between the quantities in transformations (59) --
(60) are illustrated in Fig. 3(a).
We can gain useful insight into the nature of this transforma-
tion by exploiting more directly the structure of the matrices
−1. By Assumption 1, the matrix AT has an
U, D, and U
eigenvalue one of multiplicity one, with the corresponding
left- and right-eigenvectors being θT and 1, respectively. All
UR
(62)
(63)
(64)
(65)
UL (cid:44) UL ⊗ IM
UR (cid:44) UR ⊗ IM
DN−1 (cid:44) DN−1 ⊗ IM
other eigenvalues of D are strictly less than one in magnitude.
Therefore, the matrices D, U, and U−1 can be partitioned as
(cid:35)
U =(cid:2) 1 UL
(cid:3) U
−1 =
(cid:35)
(cid:34)
θT
UR
(cid:34)
D =
1
DN−1
(61)
where DN−1 is an (N − 1) × (N − 1) Jordan matrix with all
diagonal entries strictly less than one in magnitude, UL is an
(cid:35)
N × (N − 1) matrix, and UR is an (N − 1)× N matrix. Then,
the Kronecker forms D, U, and U
D =
−1 can be expressed as
θT ⊗IM
, U =(cid:2) 1⊗IM UL
(cid:3) , U
−1 =
(cid:34)
(cid:34)
(cid:35)
IM
DN−1
where
N(cid:88)
k=1
It is important to note that U−1U = IN and that
θT 1 = 1,
We first study the structure of w(cid:48)
(cid:125)
w(cid:48)
i = col{(θT ⊗ IM )wi
θT UL = 0, UR1 = 0, URUL = IN−1 (66)
i defined in (59) using (61):
(67)
, (UR ⊗ IM )wi
(cid:123)(cid:122)
(cid:123)(cid:122)
(cid:124)
(cid:124)
(cid:125)
}
(cid:44)wc,i
(cid:44)we,i
The two components wc,i and we,i have useful interpretations.
Recalling that θk denotes the kth entry of the vector θ, then
wc,i can be expressed as
wc,i =
θkwk,i
(68)
As we indicated after Assumption 1, the entries {θk} are
positive and add up to one. Therefore, wc,i is a weighted
average (i.e., the centroid) of the estimates {wk,i} across all
agents. To interpret we,i, we examine the inverse mapping of
(59) from w(cid:48)
i to wi using the block structure of U in (61):
wi = (U ⊗ IM )w(cid:48)
i
= (1 ⊗ IM )wc,i + (UL ⊗ IM )we,i
= 1 ⊗ wc,i + (UL ⊗ IM )we,i
the individual estimates at
(69)
the various
which implies that
agents satisfy:
wk,i = wc,i + (uL,k ⊗ IM )we,i
(70)
where uL,k denotes the kth row of the matrix UL. The network
basis transformation defined by (59) represents the cluster of
iterates {wk,i} by its centroid wc,i and their positions {uL,k⊗
IM )we,i} relative to the centroid as shown in Fig. 3. The two
parts, wc,i and we,i, of w(cid:48)
i in (67) are the coordinates in this
new transformed representation. Then, the actual error quantity
wk,i relative to wo can be represented as
wk,i = wo − ¯wc,i − (wk,i − ¯wc,i)
= wo − ¯wc,i − (wc,i + (uL,k ⊗ IM )we,i − ¯wc,i) (71)
10
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. XX, NO. XX, MONTH 2015
(a)
(b)
Fig. 3.
centroid, wc,i, of the N iterates across the network.
(a) Network basis transformation. (b) The diagrams show how the iterate wk,i is decomposed relative to the reference ¯wc,i and relative to the
Introduce
(72)
(73)
Then, from (71) we arrive at the following critical relation for
our analysis in the sequel:
wc,i (cid:44) wo − ¯wc,i
wc,i (cid:44) wc,i − ¯wc,i
wk,i = wc,i − wc,i − (uL,k ⊗ IM )we,i
(74)
This relation is also illustrated in Fig. 3. Then, the behavior
of the error quantities { wk,i} can be studied by examining
wc,i, wc,i and we,i, respectively, which is pursued in Sec.
VI further ahead. The first term is the error between the
reference recursion and wo, which is studied in Theorems 1 --
3. The second quantity is the difference between the weighted
centroid wc,i of the cluster and the reference vector ¯wc,i, and
the third quantity characterizes the positions of the individual
iterates {wk,i} relative to the centroid wc,i. As long as the
second and the third terms in (74), or equivalently, wc,i
and we,i, are small (which will be shown in Theorem 4),
the behavior of each wk,i can be well approximated by the
behavior of the reference vector ¯wc,i. Indeed, wc,i and we,i
are the coordinates of the transformed vector w(cid:48)
i defined by
(60). To see this, we substitute (61) and (55) into (60) to get
−1 ⊗ IM )(wi − 1 ⊗ ¯wc,i)
i − (U
−11 = col{θT 1, UR1}
= col{1, 0N−1}
(75)
Recalling (66) and the expression for U−1 in (61), we obtain
(76)
where 0N−1 denotes an (N−1)×1 vector with all zero entries.
Substituting (76) and (67) into (75), we get
(77)
w(cid:48)
i = col{wc,i − ¯wc,i, we,i} = col{ wc,i, we,i}
w(cid:48)
i = (U
= w(cid:48)
U
−11) ⊗ ¯wc,i
Therefore, it suffices to study the dynamics of w(cid:48)
i and its mean-
square performance. We will establish joint recursions for wc,i
and we,i in Sec. V-B, and joint recursions for wc,i and we,i
in Sec. V-C. Table II summarizes the definitions of the various
quantities, the recursions that they follow, and their relations.
B. Signal Recursions
We now derive the joint recursion that describes the evolu-
tion of the quantities wc,i = wc,i − ¯wc,i and we,i. Since ¯wc,i
follows the reference recursion (47), it suffices to derive the
joint recursion for wc,i and we,i. To begin with, we introduce
the following global quantities:
A = A ⊗ IM
A0 = A0 ⊗ IM
A1 = A1 ⊗ IM
A2 = A2 ⊗ IM
M = Ω ⊗ IM
Ω = diag{µ1, . . . , µN}
(78)
(79)
(80)
(81)
(82)
(83)
We also let the notation x = col{x1, . . . , xN} denote an
arbitrary N×1 block column vector that is formed by stacking
M×1 sub-vectors x1, . . . , xN on top of each other. We further
define the following global update vectors:
si(x) (cid:44) col{s1,i(x1), . . . , sN,i(xN )}
s(x) (cid:44) col{s1(x1), . . . , sN (xN )}
(84)
(85)
Then, the general recursion for the distributed strategy (1) --
(3) can be rewritten in terms of these extended quantities as
follows:
wi = AT wi−1 − AT
2 Msi(φi−1)
(86)
CHEN AND SAYED: ON THE LEARNING BEHAVIOR OF ADAPTIVE NETWORKS -- PART I: TRANSIENT ANALYSIS
11
SUMMARY OF VARIOUS ITERATES, ERROR QUANTITIES, AND THEIR RELATIONS.
TABLE II
Quantity
wk,i
wk,i
wk,i
Original system
Definition
Iterate at agent k
wo−wk,i wk,i− ¯wc,i
a The transformation is defined by (59) -- (60).
Eqs. (1) -- (3)
Recursion
where
φi (cid:44) col{φ1,i, . . . , φN,i}
and is related to wi and w(cid:48)
φi = AT
i via the following relation
1 wi = AT
1 Uw(cid:48)
i
(87)
(88)
Applying the transformation (59) to both sides of (86), we
obtain the transformed global recursion:
i = Dw(cid:48)
w(cid:48)
i−1 − U
−1AT
2 Msi (φi−1)
(89)
We can now use the block structures in (62) and (67) to derive
recursions for wc,i and we,i from (89). Substituting (62) and
(67) into (89), and using properties of Kronecker products [58,
p.147], we obtain
wc,i = wc,i−1 − (θT ⊗ IM )AT
2 Msi (φi−1)
= wc,i−1 − (θT AT
2 Ω ⊗ IM )si (φi−1)
= wc,i−1 − µmax · (pT ⊗ IM )si (φi−1)
and
we,i = DN−1we,i−1 − URAT
2 Msi (φi−1)
where in the last step of (90) we used the relation
µmax · p = ΩA2θ
(90)
(91)
(92)
which follows from Definitions 1 and 2. Furthermore, by
adding and subtracting identical factors, the term si (φi−1)
that appears in (90) and (91) can be expressed as
(cid:125)
si (φi−1) = s(1 ⊗ wc,i−1) + si (φi−1)−s (φi−1)
(cid:123)(cid:122)
(cid:125)
(cid:124)
+ s (φi−1)−s(1 ⊗ wc,i−1)
(cid:44)vi(φi−1)
(cid:123)(cid:122)
(cid:124)
(cid:44)zi−1
(93)
where the first perturbation term vi(φi−1) consists of the dif-
ference between the true update vectors {sk(φk,i−1)} and their
stochastic approximations {sk,i(φk,i−1)}, while the second
perturbation term zi−1 represents the difference between the
same {sk(φk,i−1)} and {sk(wc,i−1)}. The subscript i − 1 in
zi−1 implies that this variable depends on data up to time i−1
and the subscript i in vi(φi−1) implies that its value depends
on data up to time i (since, in general, si(·) can depend on
data from time i -- see Eq. (33) in Part II for an example).
Then, si (φi−1) can be expressed as
si (φi−1) = s(1 ⊗ wc,i−1) + vi + zi−1
(94)
Transformed systema
N(cid:88)
wc,i
wc,i
θkwk,i wc,i− ¯wc,i
we,i
URwi
k=1
Eq. (96)
Eq. (103)
Eq. (104)
Eq. (47)
Reference system
wc,i
¯wc,i
Ref. Iterate
wo− ¯wc,i
Lemma 2 (Signal dynamics): In summary,
the previous
derivation shows that the weight iterates at each agent evolve
according to the following dynamics:
wk,i = wc,i + (uL,k ⊗ IM )we,i
wc,i = wc,i−1 − µmax · (pT ⊗ IM )si (φi−1)
we,i = DN−1we,i−1 − URAT
2 Msi (φi−1)
si (φi−1) = s(1 ⊗ wc,i−1) + vi + zi−1
(95)
(96)
(97)
(98)
C. Error Dynamics
To simplify the notation, we introduce the centralized op-
erator Tc : RM → RM as the following mapping for any
x ∈ RM :
Tc(x) (cid:44) x − µmax · (pT ⊗ IM ) s(1 ⊗ x)
= x − µmax
pksk(x)
(99)
N(cid:88)
k=1
Substituting (94) into (96) -- (97) and using (99), we find that
we can rewrite (96) and (97) in the alternative form:
wc,i = Tc(wc,i−1) − µmax · (pT ⊗ IM ) [zi−1 + vi]
we,i = DN−1we,i−1 − URAT
(100)
2 M [s(1 ⊗ wc,i−1) + zi−1 +vi]
(101)
Likewise, we can write the reference recursion (47) in the
following compact form:
¯wc,i = Tc( ¯wc,i−1)
(102)
Comparing (100) with (102), we notice that the recursion for
the centroid vector, wc,i, follows the same update rule as the
reference recursion except for the two driving perturbation
terms zi−1 and vi. Therefore, we would expect the trajectory
of wc,i to be a perturbed version of that of ¯wc,i. Recall from
(73) that
wc,i (cid:44) wc,i − ¯wc,i
To obtain the dynamics of wc,i, we subtract (102) from (100).
Lemma 3 (Error dynamics): The error quantities that ap-
pear on the right-hand side of (77) evolve according to the
following dynamics:
wc,i = Tc(wc,i−1) − Tc( ¯wc,i−1)
− µmax·(pT ⊗IM ) [zi−1 + vi]
we,i = DN−1we,i−1
− URAT
2 M [s(1 ⊗ wc,i−1)+zi−1 +vi]
(103)
(104)
12
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. XX, NO. XX, MONTH 2015
The analysis in sequel will study the dynamics of the variances
of the error quantities wc,i and we,i based on (103) -- (104). The
main challenge is that these two recursions are coupled with
each other through zi−1 and vi. To address the difficulty, we
will extend the energy operator approach developed in [20] to
the general scenario under consideration.
D. Energy Operators
To carry out the analysis, we need to introduce the following
operators.
Definition 4 (Energy vector operator): Suppose
x = col{x1, . . . , xN} is an arbitrary N × 1 block
column vector that is formed by stacking M0 × 1 vectors
x1, . . . , xN on top of each other. The energy vector operator
PM0 : CM0N → RN is defined as the mapping:
PM0 [x] (cid:44) col{(cid:107)x1(cid:107)2, . . . ,(cid:107)xN(cid:107)2}
(105)
where (cid:107) · (cid:107) denotes the Euclidean norm of a vector.
Definition 5 (Norm matrix operator): Suppose X is an ar-
bitrary K × N block matrix consisting of blocks {Xkn} of
size M0 × M0:
X =
(106)
The norm matrix operator ¯PM0 : CM0K×M0N → RK×N is
defined as the mapping:
··· X1N
...
··· XKN
...
XK1
X11
(cid:107)X11(cid:107)
...
the individual agents, {wk,i}, get to the reference recursion.
Recalling from (77) that wc,i and we,i are the two blocks of
the transformed vector w(cid:48)
i defined by (60), we can examine
instead the evolution of
(cid:44) EP [ w(cid:48)
i] = col{EP [ wc,i], EP [we,i]}
= col(cid:8)E(cid:107) wc,i(cid:107)2, EP [we,i](cid:9)
(108)
W
Specifically, we will study the convergence of wc,i in Sec.
(cid:48)
VI-A, the stability of W
i in Sec. VI-B, and the two transient
phases of wk,i in Sec. VI-C.
(cid:48)
i
A. Limit Point
(cid:48)
Before we proceed to study W
i, we state the following the-
orems on the existence of a limit point and on the convergence
of the reference recursion (102).
Theorem 1 (Limit point): Given Assumptions 3 -- 4,
there
exists a unique M × 1 vector wo that solves
pksk(wo) = 0
(109)
N(cid:88)
k=1
where pk is the kth entry of the vector p defined in (16).
Proof: See Appendix E.
Theorem 2 (Convergence of the reference recursion): Let
wc,i (cid:44) wo − ¯wc,i denote the error vector of the reference
recursion (102). Then, the following non-asymptotic bound
on the squared error holds for all i ≥ 0:
(1−2µmax(cid:107)p(cid:107)1λU )i·(cid:107) wc,0(cid:107)2 ≤ (cid:107) wc,i(cid:107)2 ≤ γ2i
c ·(cid:107) wc,0(cid:107)2
(110)
¯PM0[x] (cid:44)
···
(cid:107)X1N(cid:107)
...
(cid:107)XK1(cid:107)
··· (cid:107)XKN(cid:107)
where
(107)
γc (cid:44) 1 − µmaxλL +
1
2
µ2
max(cid:107)p(cid:107)2
1λ2
U
(111)
Furthermore, if the following condition on the step-size holds
where (cid:107) · (cid:107) denotes the 2−induced norm of a matrix.
By default, we choose M0 to be M, the size of the vector
wk,i. In this case, we will drop the subscript inPM0[·] and use
P [·] for convenience. However, in other cases, we will keep the
subscript to avoid confusion. Likewise, ¯PM0 [·] characterizes
the norms of different parts of a matrix it operates on. We
will also drop the subscript if M0 = M.
In Appendix A,
we collect several properties of the above energy operators,
and which will be used in the sequel to characterize how the
energy of the error quantities propagates through the dynamics
(103) -- (104).
0 < µmax <
2λL
(cid:107)p(cid:107)2
1λ2
U
then, the iterate wc,i converges to zero.
Proof: See Appendix F.
(112)
Note from (110) that, when the step-size is sufficiently
small, the reference recursion (47) converges at a geometric
rate between 1 − 2µmax(cid:107)p(cid:107)1λU and γ2
c = 1 − 2µmaxλL +
o(µmax). Note that this is a non-asymptotic result. That is,
the convergence rate rRef of the reference recursion (102) is
always lower and upper bounded by these two rates:
VI. TRANSIENT ANALYSIS
Using the energy operators and the various properties, we
can now examine the transient behavior of the learning curve
more closely. Recall from (74) that wk,i consists of three
parts: the error of the reference recursion, wc,i, the difference
between the centroid and the reference, wc,i, and the position
of individual iterates relative to the centroid, (uL,k⊗ IM )we,i.
The main objective in the sequel is to study the convergence of
the reference error, wc,i, and establish non-asymptotic bounds
for the mean-square values of wc,i and we,i, which will
allow us to understand how fast and how close the iterates at
1 − 2µmax(cid:107)p(cid:107)1λU ≤ rRef ≤ γ2
c ,
∀i ≥ 0
(113)
We can obtain a more precise characterization of the conver-
gence rate of the reference recursion in the asymptotic regime
(for large enough i), as follows.
Theorem 3 (Convergence rate of the reference recursion):
Specifically, for any small > 0, there exists a time instant
i0 such that, for i ≥ i0, the error vector wc,i converges to
zero at the following rate:
rRef =(cid:2)ρ(IM − µmaxHc)(cid:3)2
+ O(cid:0)(µmax)
2(M−1)(cid:1)
1
(114)
Proof: See Appendix G.
CHEN AND SAYED: ON THE LEARNING BEHAVIOR OF ADAPTIVE NETWORKS -- PART I: TRANSIENT ANALYSIS
13
(cid:48)
i): Suppose
Theorem 4 (Non-asymptotic bound for W
which is O(µmax). This insight is exploited to establish a non-
(cid:48)
i = col{E(cid:107) wc,i(cid:107)2, EP [we,i]} in the
asymptotic bound on W
following theorem.
the
matrix Γ defined in (116) is stable, i.e., ρ(Γ) < 1. Then, the
following non-asymptotic bound holds for all i ≥ 0:
EP [ wc,i] (cid:22) µmaxhc(µmax)·1T (γcI−Γe)
cI−Γi
(cid:48)
+ W ub
c,∞
(cid:48)
EP [we,i] (cid:22) Γi
eWe,0 + W ub
e,∞
where We,0 (cid:44) EP [we,0], W ub
bounds of EP [ wc,i] and EP [we,i], respectively:
e,∞ are the lim sup
c,∞ and W ub
−1(cid:0)γi
We,0
(124)
(125)
(cid:1)
e
(cid:48)
(cid:48)
(cid:0)λL + hc(0)(cid:1)1T (I − Γe)−1We,0 + bv,cλL
(cid:0)λL + hc(0)(cid:1)1T (I − Γe)−1We,0 + bv,eλL
(126)
λ2
L
(cid:48)
W ub
c,∞ = µmax ·
ψ0
(cid:48)
e,∞ = µ2
W ub
−11 + o(µ2
max)
(127)
where o(·) denotes strictly higher order terms, and hc(0) is
the value of hc(µmax) (see (121)) evaluated at µmax = 0. An
important implication of (124) and (126) is that
∀i ≥ 0
EP [ wc,i] ≤ O(µmax),
Furthermore, a sufficient condition that guarantees the stability
of the matrix Γ is that
(128)
+ o(µmax)
ψ0
max·
× (I−Γe)
λL
(cid:26)
(cid:115)
1
λL
(cid:16)1−λ2(A)
1λ2
3 ψ0
U + 1
2(cid:107)p(cid:107)2
3(1−λ2(A))2N+1
2
,
22N +2ψ0
λL
(cid:0)
(cid:17)−2N ,
(cid:1)(cid:27)
(129)
(130)
(cid:107) ¯P1[AT UL](cid:107)2∞ + 1
Corollary 1 (Asymptotic bounds): It holds that
Proof: See Appendix J.
(cid:107)p(cid:107)2
1λ2
U
2
lim sup
i→∞
lim sup
i→∞
E(cid:107) wc,i(cid:107)2 ≤ O(µmax)
E(cid:107)we,i(cid:107)2 ≤ O(µ2
max)
(131)
Proof: The bound (130) holds since E(cid:107) wc,i(cid:107)2 = EP [ wc,i] ≤
O(µmax) for all i ≥ 0 according to (128). Furthermore,
inequality (131) holds because
E(cid:107)we,i(cid:107)2 (a)
1T EP [we,i]
lim sup
i→∞
Note that since (114) holds for arbitrary > 0, we can choose
to be an arbitrarily small positive number. Therefore, the
convergence rate of the reference recursion is arbitrarily close
to [ρ(IM − µmaxHc)]2.
B. Mean-Square Stability
inequality recursion for the transformed energy vector W
EP [ w(cid:48)
Now we apply the properties from Lemmas 5 -- 6 to derive an
(cid:48)
i =
i]. The results are summarized in the following lemma.
(cid:48)
Lemma 4 (Inequality recursion for W
i): The N × 1 vector
(cid:48)
i defined by (108) satisfies the following relation for all
W
time instants:
(cid:48)
i (cid:22) Γ W
W
(cid:48)
i−1 + µ2
maxbv
(115)
(116)
(117)
(cid:26)
(cid:34)
(cid:35)
maxψ0 · 11T ∈ RN×N
where
Γ (cid:44) Γ0 + µ2
γc µmaxhc(µmax) · 1T
Γ0 (cid:44)
0
bv (cid:44) col{bv,c, bv,e · 1} ∈ RN
...
...
λ2(A)
1−λ2(A)
Γe (cid:44)
...
Γe
2
∈ RN×N
2
(118)
1−λ2(A)
λ2(A)
∈ R(N−1)×(N−1)
1 UL](cid:13)(cid:13)2
(cid:13)(cid:13) ¯P [AT
(cid:18)
1, 4α(cid:107)p(cid:107)2
1 ·
1 UL](cid:13)(cid:13)2
(cid:13)(cid:13) ¯P [AT
∞ λ2
(cid:19)(cid:27)
(cid:104)
1 − λ2(A)
∞ λ2
α
λ2
U
(cid:19)
(119)
(120)
(cid:105)
∞ ,
+
U
U
1
,
1
3
(cid:18)
ψ0 (cid:44) max
4α(cid:107)p(cid:107)2
4N ·
4N ·
·
1 − λ2(A)
hc(µmax) (cid:44) (cid:107)p(cid:107)2
1·
1 UL]
bv,c (cid:44) (cid:107)p(cid:107)2
1 ·
2 ](cid:13)(cid:13)2
(cid:13)(cid:13) ¯P [URAT
2 ](cid:13)(cid:13)2
(cid:13)(cid:13) ¯P [URAT
(cid:13)(cid:13)2
(cid:13)(cid:13) ¯P [AT
(cid:2)4α((cid:107) wc,0(cid:107)2 + (cid:107)wo(cid:107)2) + σ2
(cid:18)
bv,e (cid:44) N(cid:13)(cid:13) ¯P [URAT
2 ](cid:13)(cid:13)2
(cid:19)
∞ ·
α
+
λ2
U
∞ λ2
U ·
λL− 1
12
∞
v
+ 4α((cid:107) wc,0(cid:107)2 + (cid:107)wo(cid:107)2) + σ2
v
2 µmax(cid:107)p(cid:107)2
(cid:3)
1λ2
U
(121)
(122)
U(cid:107) wc,0(cid:107)2 + (cid:107)go(cid:107)∞
λ2
1 − λ2(A)
(123)
where go (cid:44) P [s(1 ⊗ wo)].
Proof: See Appendix H.
From (116) -- (117), we see that as the step-size µmax be-
comes small, we have Γ ≈ Γ0, since the second term in
the expression for Γ depends on the square of the step-
size. Moreover, note that Γ0 is an upper triangular matrix.
Therefore, wc,i and we,i are weakly coupled for small step-
sizes; EP [we,i] evolves on its own, but
it will seep into
the evolution of EP [ wc,i] via the off-diagonal term in Γ0,
The scalars ψ0, hc(µ), bv,c and bv,e are defined as
0 < µmax < min
(b)
= lim sup
i→∞
(cid:48)
(cid:22) 1T W ub
e,∞
(c)
= O(µ2
max)
(132)
where step (a) uses property (157) of the energy operator P [·],
step (b) uses (125), and step (c) uses (127).
Finally, we present following main theorem that character-
izes the difference between the learning curve of wk,i at each
agent k and that of wc,i generated by the reference recursion
(102).
14
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. XX, NO. XX, MONTH 2015
Theorem 5 (Learning behavior of E(cid:107) wk,i(cid:107)2): Suppose the
stability condition (129) holds. Then, the difference between
the learning curve of the mean-square-error E(cid:107) wk,i(cid:107)2 at each
agent k and the learning curve of (cid:107) wc,i(cid:107)2 is bounded non-
asymptotically as
(cid:12)(cid:12)E(cid:107) wk,i(cid:107)2 − (cid:107) wc,i(cid:107)2(cid:12)(cid:12)
(cid:113)
≤ 2(cid:107)uL,k ⊗ IM(cid:107)2 · 1T Γi
eWe,0
+ 2(cid:107) wc,0(cid:107) · (cid:107)uL,k ⊗ IM(cid:107) ·
+ γi
max) + O(µmax)
1
2
c · O(µ
where γc was defined earlier in (111).
Proof: See Appendix L.
C. Interpretation of Results
1T Γi
eWe,0
for all i ≥ 0 (133)
The result established in Theorem 5 is significant because
it allows us to examine the learning behavior of E(cid:107) wk,i(cid:107)2.
First, note that the bound (133) established in Theorem 5 is
non-asymptotic; that is, it holds for any i ≥ 0. Let e1(i), e2(i),
e3(i) and e4 denote the four terms in (133):
(cid:113)
eWe,0
e1(i) (cid:44) 2(cid:107)uL,k ⊗ IM(cid:107)2 · 1T Γi
e2(i) (cid:44) 2(cid:107) wc,0(cid:107) · (cid:107)uL,k ⊗ IM(cid:107) ·
e3(i) (cid:44) γi
c · O(µ
e4 (cid:44) O(µmax)
max)
1
2
1T Γi
eWe,0
(134)
(135)
(136)
(137)
is,
Then, inequality (133) can be rewritten as
(cid:107) wc,i(cid:107)2−[e1(i) + e2(i) + e3(i) + e4]
≤ E(cid:107) wk,i(cid:107)2 ≤ (cid:107) wc,i(cid:107)2 +[e1(i)+e2(i)+e3(i)+e4]
(138)
the learning curve of E(cid:107) wk,i(cid:107)2
for all i ≥ 0. That
is a perturbed version of the learning curve of reference
recursion (cid:107) wc,i(cid:107)2, where the perturbation consists of four
parts: e1(i), e2(i), e3(i) and e4. We now examine the non-
asymptotic convergence rates of these four perturbation terms
relative to that of the reference term (cid:107) wc,i(cid:107)2 to show how
the learning behavior of E(cid:107) wk,i(cid:107)2 can be approximated by
(cid:107) wc,i(cid:107)2. From their definitions in (134) -- (135), we note that
e1(i) and e2(i) converge to zero at the non-asymptotic rates
of ρ(Γe) and [ρ(Γe)]
2 over i ≥ 0. According to (119), we
have ρ(Γe) = λ2(A), the magnitude of the second largest
eigenvalue of A. Let re1 and re2 denote the convergence rates
of e1(i) and e2(i). We have
1
1
2
re2 = λ2(A)
re1 = λ2(A),
(139)
By Assumption 1 and (13), the value of λ2(A) is strictly less
than one, and is determined by the network connectivity and
the design of the combination matrix; it is also independent
of the step-size parameter µmax. For this reason, the terms
e1(i) and e2(i) converge to zero at rates that are determined
by the network and are independent of µmax. Furthermore, the
term e3(i) is always small, i.e., O(µ
max), for all i ≥ 0, and
converges to zero as i → ∞. The last term e4 is also small,
namely, O(µmax). On the other hand, as revealed by Theorem
1
2
(141)
(142)
(143)
2 and (113), the non-asymptotic convergence rate of the term
(cid:107) wc,i(cid:107)2 in (138) is bounded by
1 − 2µmax(cid:107)p(cid:107)1λU ≤ rRef ≤ γ2
c = 1 − 2µmaxλL + o(µmax)
(140)
Therefore, as long as µmax is small enough so that2
λ2(A) < λ2(A)
2 < 1 − 2µmax(cid:107)p(cid:107)1λU
1
which is equivalent to requiring
µmax <
1
2
1 − λ2(A)
2(cid:107)p(cid:107)1λU
we have the following relation regarding the non-asymptotic
rates of e1(i), e2(i) and (cid:107) wc,i(cid:107)2:
re1 < re2 < rRef
This means that, for sufficiently small µmax satisfying (142),
e1(i) and e2(i) converge faster than (cid:107) wc,i(cid:107)2. For this reason,
the perturbation terms e1(i) and e2(i) in (138) die out earlier
than (cid:107) wc,i(cid:107)2. When they are negligible compared to (cid:107) wc,i(cid:107)2,
we reach the end of Transient Phase I. Then, in Transient
Phase II, we have
(cid:107) wc,i(cid:107)2−[e3(i) + e4] ≤ E(cid:107) wk,i(cid:107)2 ≤ (cid:107) wc,i(cid:107)2 + [e3(i) + e4]
(144)
By (136) and (137), the above inequality (144) is equivalent
to the following relation:
1
2
c + O(µmax)
max) · γi
E(cid:107) wk,i(cid:107)2 = (cid:107) wc,i(cid:107)2 + O(µ
(145)
This means that E(cid:107) wk,i(cid:107)2 is close to (cid:107) wc,i(cid:107)2 in Transient
Phase II, and the convergence rate of E(cid:107) wk,i(cid:107)2 is the same
as that of (cid:107) wc,i(cid:107)2. Furthermore, in the later stage of Transient
Phase II, the convergence rate of E(cid:107) wk,i(cid:107)2 would be close
to the asymptotic rate of (cid:107) wc,i(cid:107)2 given by (114). Afterwards,
c converge to zero
as i → ∞, both (cid:107) wc,i(cid:107)2 and O(µ
and the only term remaining will be e4 = O(µmax), which
contributes to the steady-state MSE. More specifically, taking
the lim sup of both sides of (133) leads to
max) · γi
1
2
(cid:12)(cid:12)E(cid:107) wk,i(cid:107)2 − (cid:107) wc,i(cid:107)2(cid:12)(cid:12)
lim sup
i→∞
E(cid:107) wk,i(cid:107)2 = lim sup
i→∞
≤ O(µmax)
(146)
We will go a step further and evaluate this steady-state MSE
in closed-form for small step-sizes in Part II [44]. Therefore,
wk,i converges to wo with a small steady-state MSE that is
on the order of O(µmax). And the steady-state MSE can be
made arbitrarily small for small step-sizes.
In view of this discussion, we now recognize that the results
established in Theorems 1 -- 4 reveal the evolution of the three
components, wc,i, wc,i and we,i in (74) during three distinct
phases of the learning process. From (124), the centroid wc,i
of the distributed algorithm (1) -- (3) stays close to ¯wc,i over the
entire time for sufficiently small step-sizes since the mean-
square error E(cid:107)wc,i − ¯wc,i(cid:107)2 = EP [ wc,i] is always of the
order of O(µmax). However, We,0 = EP [we,i] in (125) is
2λ2(A) < λ2(A) 1
2 always holds since λ2(A) is strictly less than one.
CHEN AND SAYED: ON THE LEARNING BEHAVIOR OF ADAPTIVE NETWORKS -- PART I: TRANSIENT ANALYSIS
15
BEHAVIOR OF ERROR QUANTITIES IN DIFFERENT PHASES.
TABLE III
Transient Phase I
Convergence rate r a
1 − 2µmax(cid:107)p(cid:107)1λU ≤ r ≤ γ2
Error quantity
(cid:107) wc,i(cid:107)2
E(cid:107) wc,i(cid:107)2
EP [ we,i]
E(cid:107) wk,i(cid:107)2
a γc is defined in (111), and γ2
b We only show the leading term of the convergence rate for r. More precise expression can be found in (114).
c Closer studies of the steady-state performance can be found in Part II [44].
Value
c (cid:29) O(µmax)
O(µmax)
(cid:29) O(µmax)
(cid:29) O(µmax)
converged
r ≤ λ2(A)
Multiple modes
c = 1 − 2µmaxλL + o(µmax).
Transient Phase II
Value
Convergence rate r
b
r = [ρ(IM − µmaxHc)]2 (cid:29) O(µmax)
O(µmax)
O(µ2
max)
r = [ρ(IM − µmaxHc)]2 (cid:29) O(µmax)
converged
converged
Steady-State c
Value
0
O(µmax)
O(µ2
max)
O(µmax)
(a)
(b)
Fig. 4. The evolution and learning curves of various quantities in a diffusion LMS adaptive network (best viewed in color), where M = 2, and the regressors
are spatially and temporally white, and isotropic across agents. (a) The evolution of the iterates {wk,i} at all agents, the centroid wc,i, and the reference
recursion ¯wc,i on the two-dimensional solution space; the horizontal axis and vertical axis are the first and second elements of wk,i, respectively. The clusters
of {wk,i} are plotted every 50 iterations. (b) The MSE learning curves, averaged over 1000 trials, for the iterates {wk,i} at all agents, and the reference
recursion ¯wc,i. The zoom-in region shows the learning curves for different agents, which quick shrink together in Phase I.
not necessarily small at the beginning. This is because, as we
pointed out in (70) and Fig. 3, we,i characterizes the deviation
of the agents from their centroid. If the agents are initialized
at different values, then EP [we,0] (cid:54)= 0, and it takes some time
for EP [we,i] to decay to a small value of O(µ2
max). By (125),
the rate at which EP [we,i] decays is ρ(Γe) = λ2(A). On
the other hand, recall from Theorems 2 -- 3 that the error of
the reference recursion, wc,i converges at a rate between 1 −
2µmax(cid:107)p(cid:107)1λU and r2
c = 1− 2µmaxλL + o(λmax) at beginning
and then [ρ(IM −µmaxHc)]2 later on, which is slower than the
convergence rate of EP [we,i] for small step-size µmax. Now,
returning to relation (74):
wk,i = wc,i − wc,i − (uL,k ⊗ IM )we,i
(147)
this means that during the initial stage of adaptation, the third
max) at a faster rate than the first
term in (147) decays to O(µ2
term, although wc,i will eventually converge to zero. Recalling
from (70) and Fig. 3 that we,i characterizes the deviation of the
agents from their centroid, the decay of we,i implies that the
agents are coordinating with each other so that their estimates
wk,i are close to the same wc,i -- we call this stage Transient
Phase I. Moreover, as we just pointed out, the term EP [ wc,i] is
O(µmax) over the entire time domain so that the second term
in (147) is always small. This also means that the centroid of
the cluster in Fig. 3, i.e., wc,i, is always close to the reference
recursion ¯wc,i since wc,i = wc,i − ¯wc,i
is always small.
Now that E(cid:107) wc,i(cid:107)2 is O(µmax) and EP [we,i] is O(µ2
max),
the error wk,i at each agent k is mainly dominated by the
first term, wc,i, in (147), and the estimates {wk,i} at different
agents converge together at the same rate as the reference
recursion, given by (114), to steady-state -- we call this stage
Transient Phase II. Furthermore, if We,0 = 0, i.e., the iterates
wk,i are initialized at the same value (e.g., zero vector), then
(125) shows that EP [we,i] is O(µ2
max) over the entire time
domain so that the learning dynamics start at Transient Phase
II directly. Finally, all agents reach the third phase, steady-
state, where wc,i → 0 and wk,i is dominated by the second
and third terms in (147) so that E(cid:107) wk,i(cid:107)2 becomes O(µmax).
We summarize the above results in Table III and illustrate
the evolution of the quantities in the simulated example in
Fig. 4. We observe from Fig. 4 that the radius of the cluster
shrinks quickly at the early stage of the transient phase, and
then converges towards the optimal solution.
VII. CONCLUSION
In this work, we studied the learning behavior of adaptive
networks under fairly general conditions. We showed that, in
the constant and small step-size regime, a typical learning
curve of each agent exhibits three phases: Transient Phase I,
Transient Phase II, and Steady-state Phase. A key observation
−2024681012−20246810121416The first element of the estimated vectorThe second element of the estimated vector Optimal valueDiffusion initial iteratesDiffusion iteratesReference recursionCentroidi=0i=50i=100...i=15002004006008001000-20-1001020Number of iterationsMean square error (dB) Reference recursion05010015020010152025Number of iterationsMean-square-error (dB) 16
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. XX, NO. XX, MONTH 2015
is that, the second and third phases approach the performance
of a centralized strategy. Furthermore, we showed that the right
eigenvector of the combination matrix corresponding to the
eigenvalue at one influences the limit point, the convergence
rate, and the steady-state mean-square-error (MSE) perfor-
mance of the distributed optimization and learning strategies
in a critical way. Analytical expressions that illustrate these
effects were derived. Various implications were discussed and
illustrative examples were also considered.
APPENDIX A
PROPERTIES OF THE ENERGY OPERATORS
In this appendix, we state lemmas on properties of the
operators PM0[·] and ¯PM0 [·]. We begin with some basic
properties.
Lemma 5 (Basic properties): Consider N ×1 block vectors
x = col{x1, . . . , xN} and y = col{y1, . . . , yN} with M × 1
entries {xk, yk}. Consider also the K × N block matrix X
with blocks of size M × M. Then, the operators P [·] and ¯P [·]
satisfy the following properties:
1) (Nonnegativity): P [x] (cid:23) 0, ¯P [X] (cid:23) 0.
2) (Scaling): For any scalar a ∈ C, we have P [ax] =
a2P [x] and ¯P [aX] = a · ¯P [X].
3) (Convexity):
are N × 1
block vectors formed in the same manner as x,
X (1), . . . , X (K) are K×N block matrices formed in the
same manner as X, and let a1, . . . , aK be non-negative
real scalars that add up to one. Then,
suppose x(1), . . . , x(K)
P [a1x(1) + ··· + aKx(K)]
¯P [a1X (1) + ··· + aKX (K)]
(cid:22) a1P [x(1)] + ··· + aKP [x(K)]
(148)
(cid:22) a1 ¯P [X (1)] + ··· + aK ¯P [X (K)]
(149)
4) (Additivity): Suppose x = col{x1, . . . , xN} and y =
col{y1, . . . , yN} are N × 1 block random vectors that
satisfy Ex∗
kyk = 0 for k = 1, . . . , N, where ∗ denotes
complex conjugate transposition. Then,
EP [x + y] = EP [x] + EP [y]
(150)
5) (Triangular inequality): Suppose X and Y are two K×
N block matrices of same block size M. Then,
¯P [X + Y ] (cid:22) ¯P [X] + ¯P [Y ]
(151)
6) (Submultiplicity): Suppose X and Z are K×N and N×
L block matrices of the same block size M, respectively.
Then,
¯P [XZ] (cid:22) ¯P [X] ¯P [Z]
and b ∈ CM . Then,
(152)
7) (Kronecker structure): Suppose X ∈ CK×N , a ∈ CN
(153)
(154)
where by definition, ¯P1[·] and P1[·] denote the operators
that work on the scalar entries of their arguments.
P [a ⊗ b] = (cid:107)b(cid:107)2 · P1[a]
¯P [X ⊗ IM ] = ¯P1[X]
When X consists of nonnegative entries, relation (153)
becomes
(155)
is the
(156)
¯P [X ⊗ IM ] = X
b,∞ (cid:44)(cid:0) max
N(cid:88)
8) (Relation to norms): The ∞−norm of P [x]
(cid:1)2
squared block maximum norm of x:
(cid:107)P [x](cid:107)∞ = (cid:107)x(cid:107)2
1≤k≤N (cid:107)xk(cid:107)
Moreover, the sum of the entries in P [x] is the squared
Euclidean norm of x:
1T P [x] = (cid:107)x(cid:107)2 =
(cid:107)xk(cid:107)2
(157)
k=1
9) (Inequality preservation): Suppose vectors x, y and
matrices F , G have nonnegative entries, then x (cid:22) y
implies F x (cid:22) F y, and F (cid:22) G implies F x (cid:22) Gx.
10) (Upper bounds): It holds that
¯P [X] (cid:22) (cid:107) ¯P [X](cid:107)1 · 11T
¯P [X] (cid:22) (cid:107) ¯P [X](cid:107)∞ · 11T
(158)
(159)
where (cid:107) · (cid:107)∞ denotes the ∞−induced norm of a matrix
(maximum absolute row sum).
Proof: See Appendix C.
More importantly, the following variance relations hold for
the energy and norm operators. These relations show how error
variances propagate after a certain operator is applied to a
random vector.
Lemma 6 (Variance relations): Consider N × 1 block vec-
tors x = col{x1, . . . , xN} and y = col{y1, . . . , yN} with
M × 1 entries {xk, yk}. The following variance relations are
satisfied by the energy vector operator P [·]:
1) (Linear transformation): Given a K × N block matrix
Q with the size of each block being M ×M, Qx defines
a linear operator on x and its energy satisfies
P [Qx] (cid:22) (cid:107) ¯P [Q](cid:107)∞ · ¯P [Q] P [x]
(cid:22) (cid:107) ¯P [Q](cid:107)2∞ · 11T · P [x]
(160)
(161)
As a special case, for a left-stochastic N × N matrix A,
we have
(162)
2) (Update operation): The global update vector defined
P [(AT ⊗ IM )x] (cid:22) AT P [x]
by (85) satisfies the following variance relation:
U P [x − y]
P [s(x) − s(y)] (cid:22) λ2
(163)
3) (Centralized operation): The centralized operator Tc(x)
defined by (99) satisfies the following variance relations:
(164)
P [Tc(x) − Tc(y)] (cid:22) γ2
P [Tc(x) − Tc(y)] (cid:23) (1 − 2µmax(cid:107)p(cid:107)1λU ) · P [x − y]
(165)
c · P [x − y]
where
γc (cid:44) 1 − µmaxλL +
1
2
µ2
max(cid:107)p(cid:107)2
1λ2
U
(166)
CHEN AND SAYED: ON THE LEARNING BEHAVIOR OF ADAPTIVE NETWORKS -- PART I: TRANSIENT ANALYSIS
17
...
...
2
1−d2
d2
(171)
t · δwT ·
N(cid:88)
k=1
5) (Stable Kronecker Jordan operator): Suppose DL =
DL ⊗ IM , where DL is the L× L Jordan matrix defined
in (168) -- (169). Then, for any LM × 1 vectors xe and
ye, we have
P [DLxe + ye] (cid:22) Γe · P [xe] +
Proof: See Appendix D.
2
1 − d2 · P [ye]
(172)
APPENDIX B
PROOF OF LEMMA 1
First, we establish that conditions (27) and (28) imply (24)
and (25), respectively. Using the mean-value theorem [49, p.6],
(cid:13)(cid:13)(cid:13)(cid:13)(cid:90) 1
we have for any x, y ∈ S:
(cid:90) 1
(cid:107)sk(x) − sk(y)(cid:107) =
0 ∇wT sk(y + t(x − y))dt · (x − y)
(cid:13)(cid:13)(cid:13)(cid:13)
≤
≤ λU · (cid:107)x − y(cid:107)
0 (cid:107)∇wT sk(y + t(x − y))(cid:107) dt · (cid:107)x − y(cid:107)
(173)
where we used the fact that y + t(x − y) = tx + (1 − t)y ∈ S
given x, y ∈ S and 0 ≤ t ≤ 1. Likewise, we have
(x − y)T ·
pk[sk(x) − sk(y)]
N(cid:88)
k=1
Moreover, it follows from (26) that
γc ≥ 1 − µmaxλL +
1
2
µ2
maxλ2
L
= (1 −
µmaxλL)2 +
(167)
4) (Stable Jordan operation): Suppose DL is an L × L
Jordan matrix of the following block form:
µ2
maxλ2
L > 0
1
4
1
2
DL (cid:44) diag{DL,2, . . . , DL,n0}
(168)
where the nth Ln × Ln Jordan block is defined as (note
that L = L2 + ··· + Ln0)
dn
DL,n (cid:44)
(169)
1
...
...
...
1
dn
We further assume DL to be stable with 0 ≤ dn0 ≤
··· ≤ d2 < 1. Then, for any L × 1 vectors x(cid:48) and y(cid:48),
we have
P1[DLx
(cid:48)
(cid:48)
+ y
] (cid:22) Γe · P1[x
(cid:48)
] +
2
1 − d2 · P1[y
(cid:48)
] (170)
where Γe is the L × L matrix defined as
d2
2
1−d2
...
Γe (cid:44)
N(cid:88)
(cid:90) 1
k=1
(cid:90) 1
N(cid:88)
pk
= (x − y)T ·
0 ∇wT sk(y + t(x − y))dt · (x − y)
0
(29)
k=1
Hc(y + t(x − y)) + H T
pk∇wT sk(y + t(x − y))dt · (x − y)
= (x − y)T ·
= (x − y)T · Hc(y + t(x − y)) · (x − y)
= (x−y)T ·
≥ λL · (cid:107)x − y(cid:107)2
Next, we establish the reverse direction that conditions (24)
and (25) imply (27) and (28). Choosing x = w + t · δw and
y = w in (24) for any δw (cid:54)= 0 and any small positive t, we
get
c (y + t(x − y))
·(x−y)
(174)
2
(cid:107)sk(w + t · δw) − sk(w)(cid:107) ≤ t · λU · (cid:107)δw(cid:107)
⇒ lim
t→0+
(cid:13)(cid:13)(cid:13)(cid:13) sk(w + t · δw) − sk(w)
(cid:13)(cid:13)(cid:13)(cid:13) lim
sk(w + t · δw) − sk(w)
⇒
⇒ (cid:107)∇wT sk(w)δw(cid:107) ≤ λU · (cid:107)δw(cid:107)
⇒ (cid:107)∇wT sk(w)(cid:107) (cid:44) sup
δw(cid:54)=0
t→0+
t
t
(cid:13)(cid:13)(cid:13)(cid:13) ≤ λU · (cid:107)δw(cid:107)
(cid:13)(cid:13)(cid:13)(cid:13) ≤ λU · (cid:107)δw(cid:107)
(cid:107)∇wT sk(w)δw(cid:107)
≤ λU (175)
Likewise, choosing x = w + t · δw and y = w in (25) for any
δw (cid:54)= 0 and any small positive t, we obtain
(cid:107)δw(cid:107)
(cid:19)
pk[sk(w + t · δw) − sk(w)] ≥ t2 · λL · (cid:107)δw(cid:107)2
(cid:18)
sk(w + t · δw) − sk(w)
t
⇒ δwT ·
pk
N(cid:88)
lim
t→0+
N(cid:88)
≥ λL · (cid:107)δw(cid:107)2
k=1
pk∇wT sk(w) · δw ≥ λL · (cid:107)δw(cid:107)2
k=1
⇒ δwT ·
⇒ δwT Hc(w)δw ≥ λL · (cid:107)δw(cid:107)2
⇒ δwT Hc(w) + H T
⇒
2
Hc(w) + H T
c (w)
≥ λL · IM
c (w)
2
δw ≥ λL · (cid:107)δw(cid:107)2
(176)
APPENDIX C
PROOF OF LEMMA 5
Properties 1-2 are straightforward from the definitions of
P [·] and ¯P [·]. Property 4 was proved in [20]. We establish the
remaining properties.
(Property 3: Convexity) The convexity of P [·] has already
been proven in [20]. We now establish the convexity of the
operator ¯P [·]. Let X (k)
qn denote the (q, n)−th M × M block
of the matrix X (k), where q = 1, . . . , K and n = 1, . . . , N.
(cid:35)
Then,
(cid:34) K(cid:88)
k=1
¯P
akX (k)
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. XX, NO. XX, MONTH 2015
(G− F )x (cid:23) 0, which is true because all entries of G− F and
x are nonnegative due to F (cid:22) G and x (cid:23) 0.
(Property 10: Upper bounds) By the definition of ¯P [X] in
(107), we get
(177)
¯P [X] (cid:22)
(cid:18)
(cid:19)
l,k (cid:107)Xlk(cid:107)
max
(cid:32) N(cid:88)
(cid:33)
· 11T
l
(cid:22) max
(cid:107)Xlk(cid:107)
= (cid:107) ¯P [X](cid:107)∞ · 11T
k=1
APPENDIX D
PROOF OF LEMMA 6
(cid:13)(cid:13)(cid:13)X (k)
(cid:13)(cid:13)(cid:13)X (k)
K1
11
(cid:13)(cid:13)(cid:13) ···
(cid:13)(cid:13)(cid:13) ···
(cid:80)K
(cid:80)K
k=1 ak
...
k=1 ak
(cid:13)(cid:13)(cid:13)X (k)
(cid:13)(cid:13)(cid:13)X (k)
1N
KN
(cid:13)(cid:13)(cid:13)
(cid:13)(cid:13)(cid:13)
18
(cid:22)
=
(cid:80)K
(cid:80)K
K(cid:88)
k=1
k=1 ak
...
k=1 ak
ak ¯P [X (k)]
(Property 5: Triangular inequality) Let Xqn and Yqn
denote the (q, n)−th M × M blocks of the matrices X and
Y , respectively, where q = 1, . . . , K and n = 1, . . . , N. Then,
by the triangular inequality of the matrix norm (cid:107) · (cid:107), we have
(cid:107)X11(cid:107) + (cid:107)Y11(cid:107)
...
¯P [X + Y ] (cid:22)
···
(cid:107)X1N(cid:107) + (cid:107)Y1N(cid:107)
...
= ¯P [X] + ¯P [Y ]
(cid:107)XK1(cid:107) + (cid:107)YK1(cid:107)
··· (cid:107)XKN(cid:107) + (cid:107)YKN(cid:107)
(178)
(Property 6: Submultiplicity) Let Xkn and Znl be the
(k, n)−th and (n, l)−th M × M blocks of X and Z, respec-
tively. Then, the (k, l)−th M ×M block of the matrix product
XZ, denoted by [XZ]k,l, is
n=1
N(cid:88)
(cid:13)(cid:13)(cid:13)(cid:13)(cid:13) ≤
N(cid:88)
[XZ]k,l =
XknZnl
(179)
(cid:2) ¯P [XZ](cid:3)
(cid:13)(cid:13)(cid:13)(cid:13)(cid:13) N(cid:88)
Therefore, the (k, l)−th entry of the matrix ¯P [XZ] can be
bounded as
n=1
k,l =
XknZnl
(cid:107)Xkn(cid:107) · (cid:107)Znl(cid:107) (180)
Note that (cid:107)Xkn(cid:107) and (cid:107)Znl(cid:107) are the (k, n)−th and (n, l)−th
entries of the matrices ¯P [X] and ¯P [Z], respectively. The right-
hand side of the above inequality is therefore the (k, l)−th
entry of the matrix product ¯P [X] ¯P [Z]. Therefore, we obtain
n=1
¯P [XZ] (cid:22) ¯P [X] ¯P [Z]
(181)
(Property 7: Kronecker structure) For (153), we note that
the (k, n)−th M × M block of X ⊗ IM is xknIM . Therefore,
by the definition of ¯P [·], we have
···
x1N
= ¯P1[X]
x11
...
¯P [X ⊗ IM ] =
(182)
xK1
···
xKN
In the special case when X consists of nonnegative entries,
¯P1[X] = X, and we recover (155). To prove (154), we let
a = col{a1, . . . , aN} and b = col{b1, . . . , bM}. Then, by the
definitin of P [·], we have
P [a ⊗ b] = col{a12 · (cid:107)b(cid:107)2, . . . ,aN2 · (cid:107)b(cid:107)2} = (cid:107)b(cid:107)2 · P1[a]
(183)
(Property 8: Relation to norms) Relations (156) and (157)
are straightforward and follow from the definition.
(Property 9: Inequality preservation) The proof that x (cid:22) y
implies F x (cid:22) F y can be found in [20]. We now prove that
F (cid:22) G implies F x (cid:22) Gx. This can be proved by showig that
· 11T
(184)
Likewise, we can establish that ¯P [X] (cid:22) (cid:107) ¯P [X](cid:107)1 · 11T .
(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)2
(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)2
(Property 1: Linear transformation) Let Qkn be the (k, n)-
th M × M block of Q. Then
P [Qx] = col
Q1nxn
, . . . ,
QKnxn
(185)
Using the convexity of (cid:107)·(cid:107)2, we have the following bound on
each n-th entry:
(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)2
(cid:13)(cid:13)(cid:13)(cid:13)(cid:13) N(cid:88)
n=1
(cid:13)(cid:13)(cid:13)(cid:13)(cid:13) N(cid:88)
n=1
(cid:13)(cid:13)(cid:13)(cid:13)2
n=1
(a)
=
Qknxn
(cid:13)(cid:13)(cid:13)(cid:13) N(cid:88)
(cid:34) N(cid:88)
(cid:34) N(cid:88)
(cid:34) N(cid:88)
(cid:34) N(cid:88)
≤
n=1
n=1
n=1
=
(b)
≤ max
k
n=1
(cid:107)Qkn(cid:107)
(cid:107)Qkn(cid:107)
(cid:107)Qkn(cid:107)
·
(cid:35)2
(cid:35)2
(cid:35)
·
n=1
(cid:13)(cid:13)(cid:13)(cid:13)(cid:13) N(cid:88)
(cid:80)N
(cid:107)Qkn(cid:107)
N(cid:88)
l=1 (cid:107)Qkl(cid:107)
(cid:80)N
(cid:107)Qkn(cid:107)
N(cid:88)
l=1 (cid:107)Qkl(cid:107)
(cid:35)
(cid:107)Qkn(cid:107) · (cid:107)xn(cid:107)2
N(cid:88)
n=1
n=1
·
·
n=1
(cid:107)Qkn(cid:107) · (cid:107)xn(cid:107)2
xn
Qkn
·
(cid:107)Qkn(cid:107)
· (cid:107)Qkn(cid:107)2
(cid:107)Qkn(cid:107)2(cid:107)xn(cid:107)2
= (cid:107) ¯P [Q](cid:107)∞ ·
(cid:107)Qkn(cid:107) · (cid:107)xn(cid:107)2
(186)
where in step (b) we applied Jensen's inequlity to (cid:107) · (cid:107)2.
Note that if some (cid:107)Qkn(cid:107) in step (a) is zero, we eliminate
the corresponding term from the sum and it can be verified
that the final result still holds. Substituting into (185), we
establish (160). The special case (162) can be obtained by
using ¯P [AT⊗IM ] = AT and that (cid:107)AT(cid:107)∞ = 1 (left-stochastic)
in (160). Finally, the upper bound (161) can be proved by
applying (159) to ¯P [Q].
(Property 2: Update operation) By the definition of P [·]
and the Lipschitz Assumption 3, we have
P [s(x) − s(y)]
= col{(cid:107)s1(x1) − s1(y1)(cid:107)2, . . .(cid:107)sN (xN ) − sN (yN )(cid:107)2}
(cid:22) col{λ2
= λ2
U · (cid:107)x1 − y1(cid:107)2, . . . λ2
U · (cid:107)xN − yN(cid:107)2}
(187)
U · P [x − y]
(cid:107)Qkn(cid:107)
N(cid:88)
n=1
CHEN AND SAYED: ON THE LEARNING BEHAVIOR OF ADAPTIVE NETWORKS -- PART I: TRANSIENT ANALYSIS
(a)
(cid:13)(cid:13) N(cid:88)
(cid:23) (cid:107)x − y(cid:107)2 − 2µmax · (cid:107)x − y(cid:107) ·
N(cid:88)
N(cid:88)
(cid:23) (cid:107)x − y(cid:107)2 − 2µmax · (cid:107)x − y(cid:107) ·
(cid:23) (cid:107)x − y(cid:107)2 − 2µmax · (cid:107)x − y(cid:107) ·
= (1 − 2µmaxλU(cid:107)p(cid:107)1) · (cid:107)x − y(cid:107)2
k=1
k=1
k=1
(b)
19
pk [sk(x) − sk(y)](cid:13)(cid:13)
pk (cid:107)sk(x) − sk(y)(cid:107)
pkλU(cid:107)x − y(cid:107)
(190)
where in step (a), we used the Cauchy-Schwartz inequality
xT y ≤ xT y ≤ (cid:107)x(cid:107) · (cid:107)y(cid:107), and in step (b) we used (24).
matrix DL,n can be written as
(Property 4: Stable Jordan operator) First, we notice that
pk [sk(x) − sk(y)]
(Property 3: Centralized opertion) Since Tc : RM → RM ,
the output of P [Tc(x) − Tc(y)] becomes a scalar. From the
definition, we get
P [Tc(x) − Tc(y)]
=(cid:13)(cid:13)x − y − µmax · (pT ⊗ IM ) [s(1 ⊗ x) − s(1 ⊗ y)](cid:13)(cid:13)2
=(cid:13)(cid:13)x − y − µmax ·
N(cid:88)
We first prove the upper bound (164) as follows:
P [Tc(x) − Tc(y)]
=
k=1
k=1
k=1
max
N(cid:88)
N(cid:88)
N(cid:88)
= (cid:107)x − y(cid:107)2 − 2µmax · (x − y)T
+ µ2
= (cid:107)x − y(cid:107)2 − 2µmax · (x − y)T
+ µ2
pk [sk(x) − sk(y)](cid:13)(cid:13)2
(cid:13)(cid:13)2
(cid:13)(cid:13)(pT ⊗ IM ) [s(1 ⊗ x) − s(1 ⊗ y)]
maxP(cid:2)(pT ⊗ IM ) [s(1 ⊗ x) − s(1 ⊗ y)](cid:3)
(cid:13)(cid:13)2
(cid:13)(cid:13)x − y − µmax ·
(cid:13)(cid:13) N(cid:88)
(cid:13)(cid:13) N(cid:88)
(cid:2) N(cid:88)
(cid:34) N(cid:88)
N(cid:88)
(cid:13)(cid:13)2
pk[sk(x) − sk(y)](cid:13)(cid:13)2
(cid:3)2
≤ (cid:107)x − y(cid:107)2 − 2µmax · λL · (cid:107)x − y(cid:107)2
+ µ2
pk(cid:107)sk(x) − sk(y)(cid:107)
(cid:35)2
≤ (cid:107)x − y(cid:107)2 − 2µmax · λL · (cid:107)x − y(cid:107)2
+ µ2
≤ (cid:107)x − y(cid:107)2 − 2µmax · λL · (cid:107)x − y(cid:107)2
+ µ2
= (cid:107)x − y(cid:107)2 − 2µmax · (x − y)T
pk[sk(x) − sk(y)]
pk[sk(x) − sk(y)]
max ·
max ·
max ·
+ µ2
k=1
k=1
k=1
k=1
k=1
(25)
(24)
pk · λU · (cid:107)x − y(cid:107)
max ·
k=1
1λ2
max · (cid:107)p(cid:107)2
= (cid:107)x − y(cid:107)2 − 2µmax · λL · (cid:107)x − y(cid:107)2
+ µ2
(cid:19)2
(cid:18)
= (1 − 2µmaxλL + µ2
1) · (cid:107)x − y(cid:107)2
1
maxλ2
µ2
≤
2
U(cid:107)p(cid:107)2
U(cid:107)p(cid:107)2
1 − µmaxλL +
U · (cid:107)x − y(cid:107)2
maxλ2
1
· (cid:107)x − y(cid:107)2
(189)
2 x)2.
where in the last step we used the relation (1−x) ≤ (1− 1
Next, we prove the lower bound (165). From (188), we
notice that the last term in (188) is always nonnegative so that
P [Tc(x) − Tc(y)]
(cid:23) (cid:107)x − y(cid:107)2 − 2µmax · (x − y)T
N(cid:88)
k=1
pk [sk(x) − sk(y)]
pk [sk(x) − sk(y)]
(191)
where ΘLn is an Ln × Ln strictly upper triangular matrix of
the following form:
DL,n = dn · ILn + ΘLn
(188)
0
1
...
...
...
1
0
(cid:44)
ΘLn
(192)
(193)
(194)
pk[sk(x) − sk(y)]
Define the following matrices:
ΛL (cid:44) diag{d2IL2, . . . , dn0 ILn0}
(cid:48)
L
(cid:44) diag{ΘL2 , . . . , ΘLn0}
Θ
Then, the original Jordan matrix DL can be expressed as
DL = ΛL + Θ
so that
(cid:48)
L
(cid:48)
P1[DLx
]
+ y
(cid:48)
= P1 [ΛLx
+ Θ
(cid:48)
Lx
(cid:48)
(cid:48)
(195)
(cid:48)
(cid:48)
Lx
Θ
(cid:48)(cid:21)
2
1 − d2
(cid:20)
ΛLx
1 − d2
+
ΛLx
·
y
2
2
+
+ y
(cid:48)
]
1 − d2
(cid:48)(cid:21)
(cid:48)(cid:21)
(cid:48)(cid:21)
1 − d2
(cid:48)
1 − d2 ·P1 [Θ
Lx
1 − d2
2
2
2
y
(cid:20)
]+
· ¯P1[ΛL] · P1 [x
(cid:48)
]
· P1
(cid:48)
Lx
Θ
2
1 − d2
(cid:48)
]+
2
1 − d2 ·P1 [y
(cid:48)
]
]+
(cid:48)
] +
(cid:48)
· ¯P1[Θ
L] · P1 [x
(cid:48)
2
L · P1 [x
1−d2 ·Θ
(cid:48)
1−d2 ·ΘL · P1 [x
1 − d2 · P1 [y
2
2
(cid:48)
]
]+
(cid:48)
2
]
2
]+
1 − d2 · P1 [y
(cid:48)
1−d2 ·P1 [y
1−d2 ·P1 [y
]+
2
(cid:48)
]
(cid:48)
]
(196)
(cid:48)
(cid:20)
+
= P1
1
d2 ·
d2
1 − d2
(cid:20) 1
2
·
(a)
(c)
(b)
=
2
+
(cid:22) d2 · P1
1 − d2
1
d2
· P1
(cid:48)
d2 ·P1 [ΛLx
(cid:22) (cid:107) ¯P1[ΛL](cid:107)∞
d2
2(cid:107) ¯P1[Θ(cid:48)
L](cid:107)∞
1 − d2
(cid:22) ¯P1[ΛL]·P1 [x
(cid:48)
(cid:22) d2·IL·P1 [x
= Γe · P1 [x
] +
+
(cid:48)
(cid:48)
(f )
(d)
(e)
20
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. XX, NO. XX, MONTH 2015
L] = Θ(cid:48)
L and (cid:107) ¯P1[Θ(cid:48)
L(cid:107)∞ = 1, step (e) uses ¯P1[ΛL] (cid:22) d2 · IL and Θ(cid:48)
where step (a) uses the convexity property (148), step (b) uses
the scaling property, step (c) uses variance relation (160), step
(d) uses (cid:107) ¯P1[ΛL](cid:107)∞ = d2, ¯P1[Θ(cid:48)
L](cid:107)∞ =
(cid:107)Θ(cid:48)
L (cid:22) ΘL,
where ΘL denotes a matrix of the same form as (192) but of
size L×L, step (f) uses the definition of the matrix Γe in (171).
The above derivation assumes d2 (cid:54)= 0. When d2 = 0, we
can verify that the above inequality still holds. To see this, we
first notice that when d2 = 0, the relation 0 ≤ dn0 ≤ ··· ≤
d2 implies that dn0 = ··· = d2 = 0 so that ΛL = 0 and
DL = Θ(cid:48)
L -- see (193) and (195). Therefore, similar to the
steps (a) -- (f) in (196), we get
(cid:48)
(cid:48)
(cid:48)
(cid:48)
P1[DLx
+ y
(cid:48)(cid:3)
(cid:2) 1
]
(cid:48)
+
]
(cid:48)
= P1
(cid:22)
=
] +
(cid:48)
(cid:48)
+ y
Lx
] = P1[Θ
(cid:48)
2 · 2Θ
Lx
(cid:48)
(cid:48)
1
2 · P1[2Θ
Lx
(cid:48)
1
2 · 22 · P1[Θ
Lx
1
2 · 2y
1
2 · P1[2y
1
2 · 22 · P1[y
] +
(cid:48)
(cid:48)
(cid:48)
]
Lx
= 2P1[Θ
] + 2P1[y
(cid:48)
(cid:48)
(cid:22) 2(cid:107) ¯P1[Θ
L](cid:107)∞ · ¯P1[Θ
L]P1[x
(cid:48)
(cid:48)
(cid:48)
] + 2P1[y
= 2Θ
LP1[x
]
(cid:48)
(cid:48)
(cid:22) 2ΘLP1[x
] + 2P1[y
(cid:48)
]
(cid:48)
]
] + 2P1[y
(cid:48)
]
(197)
By (171), we have Γe = 2ΘL when d2 = 0. Therefore, the
above expression is the same as the one on the right-hand side
of (196).
(Property 5: Stable Kronecker Jordan operator) Using
(195) we have
P [DLxe + ye]
(cid:104)
(cid:105)
(cid:48)
L ⊗ IM )xe + ye]
·
2
2
2
2
1
2
(a)
+
+
1−d2
1−d2
(cid:22) d2·P
= P [(ΛL ⊗ IM )xe + (Θ
= P
d2·
1 − d2
(cid:105)
d2 ·(ΛL⊗IM )xe +
(cid:104) 1
(cid:105)
1 − d2 · ye
(cid:104)
d2 ·(ΛL⊗IM )xe
(cid:105)
(cid:104)
(cid:48)
·P
1−d2 ·(Θ
L ⊗ IM )xe
1−d2 ·ye
d2 · P [(ΛL ⊗ IM )xe] +
1 − d2 · P [ye]
(cid:22) (cid:107) ¯P [(ΛL⊗IM )](cid:107)∞
d2
2(cid:107) ¯P [Θ(cid:48)
L⊗IM ](cid:107)∞
1 − d2
1−d2
1
· P
(b)
=
+
+
(c)
2
2
2
+
· ¯P [(ΛL ⊗ IM )]·P [xe]
(cid:48)
· ¯P [Θ
L⊗IM ]·P [xe] +
(cid:48)
(cid:22) ¯P [(ΛL ⊗ IM )] · P [xe] +
1 − d2 · Θ
L · P [xe]
+
2
2
(d)
1 − d2 · P [ye]
2
(cid:48)
1 − d2 · P [(Θ
L ⊗ IM )xe]
·
2
(cid:48)
1−d2 ·(Θ
L⊗IM )xe
2
1−d2 ·P [ye]
(e)
2
(cid:22) d2·IL·P [xe]+
= Γe · P [xe] +
(f )
1−d2 ·ΘL · P [xe]+
1 − d2 · P [ye]
2
2
1−d2 ·P [ye]
(198)
where step (a) uses the convexity property (148), step (b) uses
the scaling property, step (c) uses variance relation (160), step
L ⊗ IM ] = Θ(cid:48)
(d) uses (cid:107) ¯P [ΛL ⊗ IM ](cid:107)∞ = d2 and ¯P [Θ(cid:48)
L,
step (e) uses ¯P [ΛL ⊗ IM ] (cid:22) d2 · IL and Θ(cid:48)
L (cid:22) ΘL, and step
(f) uses the definition of the matrix Γe in (171). Likewise,
we can also verify that the above inequalty holds for the case
d2 = 0.
APPENDIX E
PROOF OF THEOREM 1
Consider the following operator:
T0(w) (cid:44) w −
λL
(cid:107)p(cid:107)2
1λ2
U
N(cid:88)
k=1
pksk(w)
(199)
As long as we are able to show that T0(w) is a strict
contraction mapping, i.e., ∀ x, y, (cid:107)T0(x)−T0(y)(cid:107) ≤ γ0(cid:107)x−y(cid:107)
with γo < 1, then we can invoke the Banach fixed point
theorem [59, pp.299-300] to conclude that there exists a unique
wo such that wo = T0(wo), i.e.,
N(cid:88)
k=1
N(cid:88)
k=1
wo = wo −
λL
1λ2
(cid:107)p(cid:107)2
U
pksk(wo) ⇔
pksk(wo) = 0
(200)
as desired. Now, to show that T0(·) defined in (199) is indeed a
contraction, we compare T0(·) with Tc(·) in (99) and observe
that T0(w) has the same form as Tc(·) if we set µmax =
in (99). Therefore, calling upon property (164) and
λL(cid:107)p(cid:107)2
1λ2
U
using µmax = λL(cid:107)p(cid:107)2
in the expression for γc in (166), we
1λ2
U
obtain
(cid:32)
(cid:18)
(cid:22)
1−
P [T0(x) − T0(y)]
λL
1λ2
(cid:107)p(cid:107)2
U
λ2
1
L
1λ2
(cid:107)p(cid:107)2
2
U
1 −
=
λL +
1
2
(cid:19)2
(cid:18) λL
(cid:19)2
1λ2
U
(cid:107)p(cid:107)2
· P [x − y]
(cid:33)2
1λ2
U
(cid:107)p(cid:107)2
·P [x − y]
(201)
By the definition of P [·] in (105), the above inequality is
equivalent to
(cid:18)
(cid:19)2
(cid:107)T0(x) − T0(y)(cid:107)2 ≤
1
1 −
2
It remains to show that 1− λ2
1 and λ2
the fact that λL, (cid:107)p(cid:107)2
1
2
< 1 −
1
2
· (cid:107)x − y(cid:107)2
λ2
L
1λ2
(cid:107)p(cid:107)2
U
L/(2(cid:107)p(cid:107)2
U are positive, we have
1λ2
U ) < 1. By (26) and
(202)
λ2
L
1λ2
(cid:107)p(cid:107)2
U
< 1
(203)
Therefore, T0(w) is a strict contraction mapping.
CHEN AND SAYED: ON THE LEARNING BEHAVIOR OF ADAPTIVE NETWORKS -- PART I: TRANSIENT ANALYSIS
21
APPENDIX F
PROOF OF THEOREM 2
N(cid:88)
k=1
By Theorem 1, wo is the unique solution to equation (109).
Subtracting both sides of (109) from wo, we recognize that
wo is also the unique solution to the following equation:
wo = wo − µmax
pksk(wo)
(204)
so that wo = Tc(wo). Applying property (164), we obtain
(cid:107) wc,i(cid:107)2 = P [wo − ¯wc,i]
= P [Tc(wo) − Tc( ¯wc,i−1)]
(cid:22) γ2
(cid:22) γ2i
= γ2i
c · P [wo − ¯wc,i−1]
c · P [wo − ¯wc,0]
c · (cid:107) wc,0(cid:107)2
(205)
Since γc > 0, the upper bound on the right-hand side will
converge to zero if γc < 1. From its definition (166), this
condition is equivalent to requiring
1 − µmaxλL +
1
2
µ2
max(cid:107)p(cid:107)2
1λ2
U < 1
(206)
Solving the above quadratic inequality in µmax, we obtain
(112). On the other hand, to prove the lower bound in (112),
we apply (165) and obtain
(cid:107) wc,i(cid:107)2 = P [wo − ¯wc,i]
= P [Tc(wo) − Tc( ¯wc,i−1)]
(cid:23) (1 − 2µmax(cid:107)p(cid:107)1λU ) · P [wo − ¯wc,i−1]
(cid:23) (1 − 2µmax(cid:107)p(cid:107)1λU )i · P [wo − ¯wc,0]
= (1 − 2µmax(cid:107)p(cid:107)1λU )i · (cid:107) wc,0(cid:107)2
(207)
APPENDIX G
PROOF OF THEOREM 3
Since (110) already establishes that ¯wc,i approaches wo
asymptotically (so that wc,i → 0), and since from Assumption
5 we know that sk(w) is differentiable when (cid:107) wc,i(cid:107) ≤ rH for
large enough i, we are justified to use the mean-value theorem
[49, p.24] to obtain the following useful relation:
sk( ¯wc,i−1) − sk(wo)
(cid:20)(cid:90) 1
(cid:21)
0 ∇wT sk(wo − t wc,i−1)dt
(cid:90) 1
∇wT sk(wo − t wc,i−1) − ∇wT sk(wo)(cid:3)dt · wc,i−1
(cid:2)
= −
= −∇wT sk(wo) · wc,i−1
−
wc,i−1
0
(208)
Therefore, subtracting wo from both sides of (47) and using
(109) we get,
wc,i = wc,i−1 + µmax
pk(sk( ¯wc,i−1) − sk(wo))
= [I − µmaxHc] wc,i−1 − µmax · ei−1
(209)
N(cid:88)
k=1
where
Hc (cid:44) N(cid:88)
ei−1 (cid:44) N(cid:88)
k=1
0
pk
k=1
(210)
(211)
Furthermore, the perturbation term ei−1 satisfies the following
bound:
(cid:90) 1
pk∇wT sk(wo)
(cid:2)
∇wT sk(wo−t wc,i−1)−∇wT sk(wo)(cid:3)dt· wc,i−1
(cid:90) 1
N(cid:88)
(cid:90) 1
N(cid:88)
· (cid:107) wc,i−1(cid:107)
(cid:13)(cid:13)∇wT sk(wo−t wc,i−1)−∇wT sk(wo)(cid:13)(cid:13)dt
k=1
pk
0
pk
λH · t · (cid:107) wc,i−1(cid:107)dt · (cid:107) wc,i−1(cid:107)
(cid:107)ei−1(cid:107) ≤
≤
=
0
k=1
1
2(cid:107)p(cid:107)1λH · (cid:107) wc,i−1(cid:107)2
Evaluating the weighted Euclidean norm of both sides of
(209), we get
(cid:107) wc,i(cid:107)2
Σ = (cid:107) wc,i−1(cid:107)2
BT
c ΣBc − 2µmax · wT
c,i−1BT
c Σei−1
+ µ2
max · (cid:107)ei−1(cid:107)2
Σ
(212)
(213)
where
(cid:12)(cid:12) wT
(cid:12)(cid:12)
Bc = I − µmaxHc
(214)
Σ = xT Σx, and Σ is an arbitrary positive semi-
Moreover, (cid:107)x(cid:107)2
definite weighting matrix. The second and third terms on the
right-hand side of (213) satisfy the following bounds:
(a)
c,i−1BT
c Σei−1
≤ (cid:107) wc,i−1(cid:107) · (cid:107)BT
≤ (cid:107) wc,i−1(cid:107) · (cid:107)BT
≤ (cid:107) wc,i−1(cid:107) · (cid:107)BT
c (cid:107) · (cid:107)Σ(cid:107) · (cid:107)ei−1(cid:107)
c (cid:107) · Tr(Σ) · (cid:107)ei−1(cid:107)
λH(cid:107)p(cid:107)1
c (cid:107) · Tr(Σ) ·
2
· (cid:107) wc,i−1(cid:107)2
(215)
and
(cid:107)ei−1(cid:107)2
Σ ≤ (cid:107)Σ(cid:107) · (cid:107)ei−1(cid:107)2
(b)
≤ Tr(Σ) · (cid:107)ei−1(cid:107)2
H(cid:107)p(cid:107)2
λ2
≤ Tr(Σ) ·
4
1
· (cid:107) wc,i−1(cid:107)4
(216)
where for steps (a) and (b) of the above inequalities we used
the property (cid:107)Σ(cid:107) ≤ Tr(Σ). This is because we consider here
the spectral norm, (cid:107)Σ(cid:107) = σmax(Σ), where σmax(·) denotes the
maximum singular value. Since Σ is symmetric and positive
semidefinite, its singular values are the same as its eigenvalues
so that (cid:107)Σ(cid:107) = λmax(Σ) ≤
m λm(Σ) = Tr(Σ). Now, for any
given small > 0, there exists i0 such that, for i ≥ i0, we
have (cid:107) wc,i−1(cid:107) ≤ so that
(cid:80)
(cid:12)(cid:12) ≤ · (cid:107)BT
c (cid:107)·Tr(Σ)·
λH(cid:107)p(cid:107)1
2
(cid:12)(cid:12) wT
c,i−1BT
c Σei−1
(cid:107)ei−1(cid:107)2
Σ ≤ 2 · Tr(Σ) ·
H(cid:107)p(cid:107)2
λ2
4
1
·(cid:107) wc,i−1(cid:107)2
(217)
· (cid:107) wc,i−1(cid:107)2 (218)
22
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. XX, NO. XX, MONTH 2015
(cid:3)qqT
(cid:3)qqT
(221)
and that
where
c (cid:107)+µmax
λH(cid:107)p(cid:107)1
4
(cid:2)
(cid:107)BT
(cid:2)
(cid:107)BT
(cid:3)
λH(cid:107)p(cid:107)1
c ΣBc+∆ (219)
Substituting (217) -- (218) into (213), we obtain
Σ ≤ (cid:107) wc,i−1(cid:107)2
(cid:107) wc,i−1(cid:107)2
where
c ΣBc−∆ ≤ (cid:107) wc,i(cid:107)2
BT
BT
(cid:2)
∆ (cid:44) µmax · λH(cid:107)p(cid:107)1 ·
(cid:107)BT
= O(µmax) · Tr(Σ) · IM
4
c (cid:107) + µmax
· Tr(Σ) · IM
(220)
Let σ = vec(Σ) denote the vectorization operation that stacks
the columns of a matrix Σ on top of each other. We shall
Σ interchangeably to denote
use the notation (cid:107)x(cid:107)2
the weighted squared Euclidean norm of a vector. Using the
Kronecker product property [58, p.147]: vec(U ΣV ) = (V T ⊗
U )vec(Σ), we can vectorize the matrices BT
c ΣBc + ∆ and
c ΣBc − ∆ in (219) as F+σ and F−σ, respectively, where
BT
F+ (cid:44) BT
σ and (cid:107)x(cid:107)2
c (cid:107)+µmax
λH(cid:107)p(cid:107)1
4
= BT
F− (cid:44) BT
c ⊗BT
c ⊗ BT
c ⊗BT
c ⊗ BT
c +µmax·λH(cid:107)p(cid:107)1·
c + O(µmax)
c −µmax·λH(cid:107)p(cid:107)1·
c − O(µmax)
= BT
(222)
where q (cid:44) vec(IM ), and we have used the fact that Tr(Σ) =
Tr(ΣIM ) = vec(IM )T vec(Σ) = qT σ. In this way, we can
write relation (219) as
σ ≤ (cid:107) wc,i−1(cid:107)2F+σ
(cid:107) wc,i−1(cid:107)2F−σ ≤ (cid:107) wc,i(cid:107)2
(223)
Using a state-space technique from [60, pp.344-346], we con-
Σ converges at a rate that is between ρ(F−)
clude that (cid:107) wc,i(cid:107)2
and ρ(F+). Recalling from (221) -- (222) that F+ and F− are
c , and since the perturbation
perturbed matrices of BT
term is O(µmax) which is small for small , we would expect
the spectral radii of F+ and F− to be small perturbations of
c ⊗ BT
ρ(BT
Lemma 7 (Perturbation of spectral radius): Let (cid:28) 1 be
a sufficiently small positive number. For any M × M matrix
X, the spectral radius of the perturbed matrix X + E for
E = O() is
c ). This claim is justified below.
c ⊗ BT
ρ(X + E) = ρ(X) + O(cid:0)
2(M−1)(cid:1)
1
(224)
Proof: Let X = T JT −1 be the Jordan canonical form of the
matrix X. Without loss of generality, we consider the case
where there are two Jordan blocks:
(225)
where J1 ∈ RL×L and J2 ∈ R(M−L)×(M−L) are Jordan
blocks of the form
J = diag{J1, J2}
λk
Jk =
1
...
...
...
1
λk
(226)
with λ1 > λ2. Since X + E is similar to T −1(X + E)T ,
the matrix X + E has the same set of eigenvalues as J + E0
where
E0 (cid:44) T
−1ET = O()
(227)
Let
(cid:44) diag(cid:8)1, 0, . . . , M−1
0 (cid:44)
D0
2(M−1)
1
0
(cid:9)
(228)
(229)
Then, by similarity again, the matrix J + E0 has the same set
of eigenvalues as
−1
(230)
0 (J + E0)D0 = D
where E1 (cid:44) D−1
0 E0D0. Note that the ∞-induced norm (the
maximum absolute row sum) of E1 is bounded by
−1
0 JD0 + E1
D
−1
0 (cid:107)∞ · (cid:107)E0(cid:107)∞ · (cid:107)D0(cid:107)∞
(cid:107)E1(cid:107)∞ ≤ (cid:107)D
1
M−1
· O() · 1 =
1
2 · O() = O(
1
=
0
1
2 )
(231)
(232)
(233)
−1
0 JD0 = diag{J
D
(cid:48)
1, J
(cid:48)
2}
λk
(cid:48)
J
k =
0
...
...
...
0
λk
M(cid:91)
Gm
Then, by appealing to Gersgorin Theorem [52, p.344], we
conclude that the eigenvalues of the matrix D−1
0 JD0 + E1,
which are also the eigenvalues of the matrices J + E0 and
X + E, lie inside the union of the Gersgorin discs, namely,
(234)
m=1
Gm (cid:44)
(cid:41)
where Gm is the mth Gersgorin disc defined as
(cid:41)
λ : λ − λ1 ≤ 0 +
E1,m(cid:96)
(cid:96)=1
(cid:40)
(cid:40)
(cid:110)
λ : λ−λ1 ≤ O(cid:0)
(cid:110)
λ : λ−λ2 ≤ O(cid:0)
λ : λ − λ2 ≤ 0 +
M(cid:88)
M(cid:88)
2(M−1)(cid:1)(cid:111)
2(M−1)(cid:1)(cid:111)
(cid:96)=1
1
E1,m(cid:96)
=
1
, 1 ≤ m ≤ L
, L < m ≤ M
, 1≤ m ≤ L
, L < m≤ M
(235)
1
and where E1,m(cid:96) denotes the (m, (cid:96))-th entry of the matrix
E1. In the last step we used (228) and (231). Observe from
(235) that there are two clusters of Gersgorin discs that are
centered around λ1 and λ2, respectively, and have radii on
2(M−1) ). A further statement from Gersgorin
the order of O(
theorem shows that if the these two clusters of discs happen
to be disjoint, which is true in our case since λ1 > λ2 and
we can select to be sufficiently small to ensure this property.
Then there are exactly L eigenvalues of X + E in ∪L
m=1Gm
while the remaining M − L eigenvalues are in ∪M
m=M−LGm.
From λ1 > λ2, we conclude that the largest eigenvalue of
D−1
2(M−1) ), which establishes (224).
0 JD0 + E1 is λ1 + O(
1
CHEN AND SAYED: ON THE LEARNING BEHAVIOR OF ADAPTIVE NETWORKS -- PART I: TRANSIENT ANALYSIS
23
(d)
+
k=1
k=1
(e)
+
pl
pl
max
max
vk,i
pl
l=1
l=1
k=1
l=1
k=1
pl
·
E
max
l=1
k=1
max
E
+ µ2
+ µ2
µ2
max
µ2
max
l=1 pl
l=1 pl
l=1 pl
l=1 pl
pkvk,i
max·
max·
zk,i−1
k=1
µ2
(cid:13)(cid:13)2
pkzk,i−1
(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)2
µ2
1 − γc
(cid:13)(cid:13)(cid:13)(cid:13)(cid:13) N(cid:88)
(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)2
(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)2
+ µ2
= γc · EP [ wc,i−1] +
E(cid:13)(cid:13)(pT ⊗ IM )vi
(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)2
(cid:13)(cid:13)(cid:13)(cid:13)(cid:13) N(cid:88)
+ µ2
(cid:13)(cid:13)(cid:13)(cid:13)(cid:13) N(cid:88)
(cid:32) N(cid:88)
(cid:33)2
= γc · EP [ wc,i−1]
pk(cid:80)N
·E
(cid:13)(cid:13)(cid:13)(cid:13)(cid:13) N(cid:88)
(cid:32) N(cid:88)
(cid:33)2
1 − γc·
pk(cid:80)N
·E
(cid:32) N(cid:88)
(cid:33)2
N(cid:88)
≤ γc · EP [ wc,i−1]
pk(cid:80)N
E(cid:107)zk,i−1(cid:107)2
(cid:33)2
(cid:32) N(cid:88)
1 − γc·
N(cid:88)
pk(cid:80)N
(cid:32) N(cid:88)
(cid:33)
E(cid:107)vk,i(cid:107)2
N(cid:88)
·
(cid:32) N(cid:88)
(cid:33)
= γc · EP [ wc,i−1] +
= γc · EP [ wc,i−1] +
+ µ2
= γc · EP [ wc,i−1] +
+ µ2
(cid:22) γc · EP [ wc,i−1]
µmax(cid:107)p(cid:107)1
2(cid:107)p(cid:107)2
1λ2
U
1 UL]
max · (cid:107)p(cid:107)1 · pT EP [vi]
λL − 1
max · (cid:107)p(cid:107)1 · pT EP [vi]
(cid:13)(cid:13)2
∞ · 11T · EP [we,i−1]
4α · 1 · EP [ wc,i−1]
(cid:111)
(cid:3)
1 UL](cid:107)2∞ · 11T EP [we,i−1]
(cid:3)
· 1
(cid:13)(cid:13) ¯P [AT
1 UL](cid:13)(cid:13)2
· EP [ wc,i−1]
(cid:105)
∞ · λ2
(cid:107) wc,0(cid:107)2 + (cid:107)wo(cid:107)2(cid:1) + σ2
(cid:2)4α(cid:0)
1λ2
U
· pT(cid:110)
(cid:13)(cid:13) ¯P [AT
max · (cid:107)p(cid:107)1 · pT(cid:110)
+(cid:2)4α · ((cid:107) wc,0(cid:107)2 + (cid:107)wo(cid:107)2) + σ2
= (cid:2)γc + µ2
(cid:104)
+ (cid:107)p(cid:107)2
1 ·
µmax
λL − 1
2 µmax(cid:107)p(cid:107)2
max · (cid:107)p(cid:107)2
1 ·
1 − γc ·
N(cid:88)
·
k=1
µ2
1 − γc · (cid:107)p(cid:107)1 · pT EP [zi−1]
µmax · (cid:107)p(cid:107)1
2 µmax(cid:107)p(cid:107)2
+ 4α · (cid:107) ¯P [AT
pkE(cid:107)vk,i(cid:107)2
max · 4α(cid:107)p(cid:107)2
λL − µmax
·
+ µ2
U
+ 4µ2
max ·
λ2
U ·
α
λ2
U
(cid:111)
+ µ2
l=1
k=1
pl
·
pl
l=1
(f )
(g)
+ µ2
max
max
+
1
(h)
1
v
pkE(cid:107)zk,i−1(cid:107)2
U · pT EP [zi−1]
1λ2
that
Using (224) for F+ and F− in (221) -- (222), we conclude
ρ(F+) =(cid:2)ρ(IM − µmaxHc)]2 + O(cid:0)(µmax)
ρ(F−) =(cid:2)ρ(IM − µmaxHc)]2 + O(cid:0)(µmax)
2(M−1)(cid:1) (236)
2(M−1)(cid:1) (237)
1
1
which holds for arbitrarily small . Since the convergence rate
of (cid:107) wc,i(cid:107)2 is between ρ(F+) and ρ(F−), we arrive at (114).
APPENDIX H
PROOF OF LEMMA 4
From the definition in (108), it suffices to establish a joint
inequality recursion for both EP [ wc,i] and EP [we,i]. To begin
with, we state the following bounds on the perturbation terms
in (93).
Lemma 8 (Bounds on the perturbation terms): The
following bounds hold for any i ≥ 0.
(cid:13)(cid:13) ¯P1[AT
1 UL](cid:13)(cid:13)2
P [zi−1] (cid:22) λ2
U ·
P [s(1⊗wc,i−1)] (cid:22) 3λ2
U ·P [ wc,i−1]·1+3λ2
E{P [vi]Fi−1} (cid:22) 4α · 1 · P [ wc,i−1]
∞·11T ·P [we,i−1]
(238)
U(cid:107) wc,0(cid:107)2·1+3go
(239)
+ 4α · (cid:107) ¯P [AT
1 UL](cid:107)2∞ · 11T P [we,i−1]
EP [vi] (cid:22) 4α · 1 · EP [ wc,i−1]
(cid:3)
+(cid:2)4α · ((cid:107) wc,0(cid:107)2 +(cid:107)wo(cid:107)2)+σ2
(cid:3)
+(cid:2)4α · ((cid:107) wc,0(cid:107)2 +(cid:107)wo(cid:107)2)+σ2
where P [ wc,i−1] = (cid:107) wc,i−1(cid:107)2, and go (cid:44) P [s(1 ⊗ wo)].
Proof: See Appendix I.
Now, we derive an inequality recursion for EP [ wc,i] from
· 1 (240)
1 UL](cid:107)2∞ · 11T EP [we,i−1]
·1 (241)
+ 4α · (cid:107) ¯P [AT
v
v
(103). Note that
EP [ wc,i] = E(cid:107) wc,i(cid:107)2
(a)
1
γc
+ µ2
= EP
γc ·
+ (1 − γc) · −µmax
1 − γc
(cid:21)
(Tc(wc,i−1) − Tc( ¯wc,i−1))
(pT ⊗ IM )zi−1
= EP(cid:2)Tc(wc,i−1) − Tc( ¯wc,i−1) − µmax · (pT ⊗ IM )zi−1
− µmax · (pT ⊗ IM )vi)(cid:3)
= EP(cid:2)Tc(wc,i−1) − Tc( ¯wc,i−1) − µmax · (pT ⊗ IM )zi−1
max · EP(cid:2)(pT ⊗ IM )vi)(cid:3)
(cid:20)
max · EP(cid:2)(pT ⊗ IM )vi)(cid:3)
(cid:3)
EP(cid:2)(pT ⊗ IM )zi−1
EP(cid:2)(pT ⊗ IM )vi
(cid:3)
EP(cid:2)(pT ⊗ IM )zi−1
(cid:3)
(cid:3)
EP(cid:2)(pT ⊗ IM )vi
(cid:13)(cid:13)2
E(cid:13)(cid:13)(pT ⊗ IM )zi−1
+ (1 − γc) ·
+ µ2
(cid:22) γc · EP [ wc,i−1] +
+ µ2
= γc · EP [ wc,i−1] +
EP [Tc(wc,i−1) − Tc( ¯wc,i−1)]
µ2
(1 − γc)2
µ2
1 − γc
(cid:22) γc ·
1
γ2
c
+ µ2
max
max
max
max
(c)
(b)
(cid:3)
max
µ2
1 − γc
(cid:3)
· 1T EP [we,i−1]
(242)
v
where step (a) uses the additivity property in Lemma 5 since
the definition of zi−1 and vi in (93) and the definition of
wc,i−1 in (67) imply that zi−1 and wc,i−1 depend on all {wj}
(cid:18)
(cid:19)
(cid:13)(cid:13)2
(cid:13)(cid:13)2
U N
1
11T
α
λ2
U
+
2 ]
∞ λ2
(cid:13)(cid:13) ¯P [URAT
(cid:13)(cid:13) ¯P [URAT
×
1−λ2(A)
+ 4µ2
max ·
· 1 · E(cid:107) wc,i−1(cid:107)2
+ µ2
max·N
+4α((cid:107) wc,0(cid:107)2 +(cid:107)wo(cid:107)2)+σ2
∞·
(cid:20)
2 ]
12
v
(cid:21)
(cid:21)
(cid:18)
·EP [we,i−1]
3
1 − λ2(A)
(cid:19)
+
α
λ2
U
U(cid:107) wc,0(cid:107)2 +(cid:107)go(cid:107)∞
λ2
1 − λ2(A)
·1
(243)
where step (a) uses the additivity property in Lemma 5 since
the definition of zi−1 and vi in (93) and the definitions of
wc,i−1 and we,i−1 in (67) imply that zi−1, wc,i−1 and we,i−1
depend on all {wj} for j ≤ i−1, meaning that the cross terms
between vi and all other terms are zero, just as in step (a) of
(242), step (b) uses the variance relation of stable Kronecker
Jordan operators from (172) with d2 = λ2(A), step (c) uses
the variance relation of linear operator (161), step (d) uses the
submultiplictive property (152) and P [x + y] (cid:22) 2P [x] + 2P [y]
derived from the convexity property (148) and the scaling
property in (238), (239), and (241), step (e) substitutes the
bounds on the perturbation terms from (238) -- (241), and step
(f) uses the inequality 1T go ≤ N(cid:107)go(cid:107)∞.
rewrite recursions (242) and (243) as
EP [ wc,i] (cid:22) (γc +µ2
Finally, using the quantities defined in (120) -- (123), we can
maxψ0)·EP [ wc,i−1]
maxψ0) · 1T EP [we,i−1]
(244)
+(µmaxhc(µmax)+µ2
+µ2
maxbv,c
EP [we,i] (cid:22) µ2
maxψ01 · EP [ wc,i−1]
+ (Γe + µ2
+ µ2
maxψ011T ) · EP [we,i−1]
maxbv,e · 1
(245)
where EP [ wc,i] = E(cid:107) wc,i(cid:107)2. Using the matrices and vectors
defined in (116) -- (118), we can write the above two recursions
in a joint form as in (115).
APPENDIX I
PROOF OF LEMMA 8
First, we establish the bound for P [zi−1] in (238). Substi-
tuting (69) and (88) into the definition of zi−1 in (93) we
get:
for j ≤ i − 1, meaning that the cross terms are zero:
E[vizT
i−1] = E(cid:8)E [viFi−1] zT
(cid:9) = 0
E(cid:8)vi[Tc(wc,i−1) − Tc( ¯wc,i−1)]T(cid:9)
= E(cid:8)E [viFi−1] [Tc(wc,i−1)−Tc( ¯wc,i−1)]T(cid:9) = 0
i−1
(cid:3)
+
+
2
2
(a)
(b)
2 M
URAT
URAT
− URAT
Step (b) uses the convexity property in Lemma 5, step (c) uses
the variance property (164), step (d) uses the notation zk,i−1
and vk,i to denote the kth M × 1 block of the N M × 1 vector
zi−1 and vi, respectively, step (e) applies Jensen's inequality
to the convex function (cid:107) · (cid:107)2, step (f) substitutes expression
(166) for γc, step (g) substitutes the bounds for the perturbation
terms from (238), (239), and (241), step (h) uses the fact that
pT 1 = (cid:107)p(cid:107)1.
for we,i in (101):
EP [we,i]
Next, we derive the bound for EP [we,i] from the recursion
2 M s(1 ⊗ wc,i−1)
2 Mvi
2 M (s(1 ⊗ wc,i−1) + zi−1)(cid:3)
(cid:1)(cid:3)
(cid:0)s(1 ⊗ wc,i−1)+zi−1
2 M](cid:13)(cid:13)2
DN−1we,i−1 − URAT
2 Mzi−1 − URAT
DN−1we,i−1 − URAT
URAT
= EP(cid:2)
= EP(cid:2)
+ EP(cid:2)
(cid:3)
2 Mvi
1 − λ2(A) ·EP(cid:2)
(cid:22) Γe · EP [we,i−1]
+EP(cid:2)
(cid:3)
2 Mvi
(cid:13)(cid:13) ¯P [URAT
(cid:22) Γe · EP [we,i−1]
1 − λ2(A) ·
2 M](cid:13)(cid:13)2
· 11T · EP [s(1 ⊗ wc,i−1) + zi−1]
∞ · 11T · EP [vi]
2 ](cid:13)(cid:13)2
4(cid:13)(cid:13) ¯P [URAT
(cid:13)(cid:13) ¯P [URAT
(cid:13)(cid:13)2
(cid:13)(cid:13) ¯P [URAT
(cid:13)(cid:13)2
∞ · 11T · EP [vi]
(cid:19)
1 UL]
2 ]
(cid:13)(cid:13) ¯P [URAT
2 ](cid:13)(cid:13)2
(cid:20)
(cid:13)(cid:13) ¯P [URAT
(cid:13)(cid:13)2
(cid:13)(cid:13) ¯P [URAT
2 ](cid:13)(cid:13)2
+(cid:13)(cid:13) ¯P [URAT
(cid:8)EP [s(1 ⊗ wc,i−1)]+EP [zi−1](cid:9)
(cid:13)(cid:13) ¯P [AT
(cid:13)(cid:13)2
(cid:21)
(cid:18)
∞ λ2
(cid:18)
·EP [we,i−1]
×
1−λ2(A)
+ 4µ2
max ·
· 1 · E(cid:107) wc,i−1(cid:107)2
+ µ2
max·
2 ]
(cid:21)
(cid:13)(cid:13) ¯P [AT
1 UL](cid:13)(cid:13)2
(cid:22) Γe · EP [we,i−1]
+µ2
1 − λ2(A)
·1
∞ λ2
+N [4α((cid:107) wc,0(cid:107)2 +(cid:107)wo(cid:107)2)+σ2
v]
U(cid:107) wc,0(cid:107)2N +1T go
λ2
(cid:19)
α
λ2
U
max ·
Γe +4µ2
1 − λ2(A)
1−λ2(A)
∞·
11T
max·
1
·
+ µ2
Γe +4µ2
·11T
max ·
max·
∞ λ2
U N
α
λ2
U
(f )
(cid:22)
(e)
(cid:22)
∞·
∞·
(cid:20)
(cid:20)
U N
U N
2 ]
+
3
+
12
(c)
(d)
∞
∞
24
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. XX, NO. XX, MONTH 2015
P [zi−1]
(cid:22) P(cid:2)s(cid:0)1⊗wc,i−1 +(AT
U · P(cid:2)(AT
(cid:13)(cid:13) ¯P [AT
(cid:13)(cid:13)2
(cid:22) λ2
(cid:22) λ2
U ·
(a)
(b)
1 UL⊗IM )we,i−1
(cid:3)
1 UL ⊗ IM )we,i−1
1 UL]
∞ · 11T · P [we,i−1]
(cid:1)
−s(1⊗wc,i−1)(cid:3)
(246)
where step (a) uses the variance relation (163), and step (b)
uses property (161).
Next, we prove the bound on P [s(1 ⊗ wc,i−1)]. It holds
that
P [s(1 ⊗ wc,i−1)]
(cid:104) 1
3 · 3(cid:0)s(1 ⊗ wc,i−1) − s(1 ⊗ ¯wc,i−1)(cid:1)
= P
CHEN AND SAYED: ON THE LEARNING BEHAVIOR OF ADAPTIVE NETWORKS -- PART I: TRANSIENT ANALYSIS
25
(a)
1
1
+
+
(cid:22)
(cid:105)
1
3 · 3 · s(1 ⊗ wo)
3 · 3(cid:0)s(1 ⊗ ¯wc,i−1) − s(1 ⊗ wo)(cid:1)
3 · P(cid:2)3(cid:0)s(1 ⊗ wc,i−1) − s(1 ⊗ ¯wc,i−1)(cid:1)(cid:3)
3 · P(cid:2)3(cid:0)s(1 ⊗ ¯wc,i−1) − s(1 ⊗ wo)(cid:1)(cid:3)
3 · P(cid:2)3 · s(1 ⊗ wo)(cid:3)
= 3P(cid:2)s(1 ⊗ wc,i−1)−s(1 ⊗ ¯wc,i−1)(cid:3)
+ 3P(cid:2)s(1 ⊗ ¯wc,i−1)−s(1 ⊗ wo)(cid:3) + 3P(cid:2)s(1 ⊗ wo)(cid:3)
U · P(cid:2)1 ⊗ (wc,i−1 − ¯wc,i−1)(cid:3)
+
+
1
1
(b)
U · P [1 ⊗ ( ¯wc,i−1 − wo)] + 3P [s(1 ⊗ wo)]
U · (cid:107) wc,i−1(cid:107)2 · 1 + 3λ2
U · (cid:107) ¯wc,i−1 − wo(cid:107)2 · 1
(c)
(cid:22) 3λ2
+ 3λ2
(d)
= 3λ2
+ 3P [s(1 ⊗ wo)]
(cid:22) 3λ2
(e)
U · (cid:107) wc,i−1(cid:107)2·1+3λ2
U(cid:107) wc,0(cid:107)2·1+3P [s(1 ⊗ wo)]
(247)
where step (a) uses the convexity property (148), step (b) uses
the scaling property in Lemma 5, step (c) uses the variance
relation (163), step (d) uses property (154), and step (e) uses
the bound (110) and the fact that γc < 1.
Finally, we establish the bounds on P [vi] in (240) -- (241).
Introduce the M N × 1 vector x:
(a)
x (cid:44) 1 ⊗ wc,i−1 + AT
1 ULwe,i−1 ≡ φi−1
(cid:107)s1,i(x1) − s1(x1)(cid:107)2(cid:12)(cid:12)Fi−1
= col(cid:8)E(cid:2)
(cid:3) ,
(cid:107)sN,i(xN ) − sN (xN )(cid:107)2(cid:12)(cid:12)Fi−1
. . . , E(cid:2)
(cid:22) col(cid:8)α · (cid:107)x1(cid:107)2 +σ2
(248)
We partition x in block form as x = col{x1, . . . , xN}, where
each xk is M × 1. Then, by the definition of vi from (93),
we have
E{P [vi]Fi−1} = E{P [si(x) − s(x)]Fi−1}
(cid:3)(cid:9)
(cid:9)
v, . . . , α · (cid:107)xN(cid:107)2 +σ2
(249)
(cid:3)
1 ULwe,i−1
4 ·4·1 ⊗ wo(cid:105)
4 ·4·1 ⊗ (wc,i−1− ¯wc,i−1)+
1
4 ·4·AT
+
4 ·4·1 ⊗ wo(cid:105)
4 ·4·1 ⊗ wc,i−1 +
1
4 ·4·AT
+
P [x] = P(cid:2)1 ⊗ wc,i−1 + AT
1 ULwe,i−1 +
1
4 ·4·1 ⊗ wc,i−1
where step (a) uses Assumption (18). Now we bound P [x]:
= α · P [x] + σ2
(cid:104) 1
(cid:104) 1
1
4 ·4·1 ⊗ ( ¯wc,i−1−wo)
= P
= P
1
1
1
v
v
(a)
(cid:22)
1 ULwe,i−1 +
1
4 · 42·P [1 ⊗ wc,i−1] +
1
4 · 42·P [AT
+
1 ULwe,i−1] +
1
4 · 42·P [1 ⊗ wc,i−1]
1
4 · 42·P [1 ⊗ wo]
(b)
= 4 · (cid:107) wc,i−1(cid:107)2 · 1 + 4 · (cid:107) wc,i−1(cid:107)2 · 1
+ 4 · P [AT
1 ULwe,i−1] + 4 · (cid:107)wo(cid:107)2 · 1
(c)
(cid:22) 4 · (cid:107) wc,i−1(cid:107)2·1+4·(cid:107) ¯P [AT
+ 4 · (cid:107) wc,0(cid:107)2 · 1 + 4 · (cid:107)wo(cid:107)2 · 1
1 UL](cid:107)2∞·11T ·P [we,i−1]
(250)
where step (a) uses the convexity property (148) and the
scaling property in Lemma 5, step (b) uses the Kronecker
property (154), step (c) uses the variance relation (160) and the
bound (110). Substituting (250) into (249), we obtain (240),
and taking expectation of (240) with respect to Fi−1 leads to
(241).
APPENDIX J
PROOF OF THEOREM 4
Assume initially that the matrix Γ is stable (we show further
ahead how the step-size parameter µmax can be selected to
ensure this property). Then, we can iterate the inequality
recursion (115) and obtain
i−1(cid:88)
j=0
max
(cid:48)
0 + µ2
max
W
(cid:48)
i (cid:22) Γi W
∞(cid:88)
j=0
Γj W
(cid:22)
(cid:22) (I − Γ)
(cid:48)
0 + µ2
−1( W
Γjbv
∞(cid:88)
Γjbv
(cid:48)
0 + µ2
j=0
maxbv)
(251)
where the first two inequalities use the fact that all entries of
Γ are nonnegative. Moreover, substituting (116) into (115), we
get
(cid:48)
i (cid:22) Γ0 W
W
(cid:48)
i−1 + µ2
maxψ011T W
(cid:48)
i−1 + µ2
maxbv
(252)
Substituting (251) into the second term on the right-hand side
of (252) leads to
(cid:48)
W
i (cid:22) Γ0 W
max · cv(µmax)
(cid:48)
i−1 + µ2
(253)
where
cv(µmax) (cid:44) ψ0 · 1T (I − Γ)
−1( W
(cid:48)
0 + µ2
maxbv) · 1 + bv
(254)
Now iterating (253) leads to the following non-asymptotic
bound:
maxΓj
µ2
0 · cv(µmax) (cid:22) Γi
0
W
(cid:48)
(cid:48)
0 + W ub
∞
i−1(cid:88)
j=0
(cid:48)
Wi
(cid:22) Γi
0
(cid:48)
0 +
W
where
(255)
(256)
(cid:48)
∞ (cid:44) µ2
W ub
max(I − Γ0)
−1 · cv(µmax)
W
We now derive the non-asymptotic bounds (124) -- (125) from
(255). To this end, we need to study the structure of the
(cid:48)
term Γi
0. Our approach relies on applying the unilateral
0
0, i ≥ 0} to get
z−transform to the causal matrix sequence {Γi
−1
(257)
since Γ0 is a stable matrix. Note from (117) that Γ0 is a 2 ×
2 block upper triangular matrix. Substituting (117) into the
above expression and using the formula for inverting 2 × 2
(cid:9) = z(zI − Γ0)
Γ0(z) (cid:44) Z
(cid:8)Γi
0
26
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. XX, NO. XX, MONTH 2015
block upper triangular matrices (see formula (4) in [58, p.48]),
we obtain
where
(cid:35)
(cid:34) z
z−γc
0
Γ0(z) =
µmaxhc(µmax) ·
z
z−γc · 1T (zI − Γe)−1
z(zI − Γe)−1
(258)
Next we compute the inverse z−transform to obtain Γi
0. Thus,
observe that the inverse z−transform of the (1, 1) entry, the
(2, 1) block, and the (2, 2) block are the causal sequences γi
c,
0, and Γi
e, respectively. For the (1, 2) block, it can be expressed
in partial fractions as
z
(cid:18) z
z − γc · 1T (zI − Γe)
−1(cid:0)γi
µmaxhc(µmax) ·
= µmaxhc(µmax)·1T (γcI−Γe)
from which we conclude that the inverse z−transform of the
(1, 2) block is
i ≥ 0 (259)
µmaxhc(µmax)·1T (γcI−Γe)
(cid:35)
(cid:1)
It follows that
(cid:1) ,
c µmaxhc(µmax) · 1T (γcI − Γe)−1(cid:0)γi
I−z(zI−Γe)
cI − Γi
cI−Γi
z−γc
(cid:19)
(cid:34)
−1
−1
−1
e
e
Γi
0 =
γi
0
Γi
e
¯wc,0 = (cid:80)N
(260)
Furthermore, as indicated by (48) in Sec. IV-A, the reference
recursion (47) is initialized at the centroid of the network, i.e.,
k=1 θkwk,0. This fact, together with (68) leads to
¯wc,0 = wc,0, which means that wc,0 = 0. As a result, we get
(cid:48)
0:
the following form for W
(cid:48)
0 = col{0, EP [we,0]}
W
Multiplying (260) to the left of (261) gives
µmaxhc(µmax) · 1T (γcI−Γe)−1(cid:0)γi
(cid:34)
Γi
0
(cid:48)
0 =
W
Γi
eWe,0
(261)
(cid:35)
(cid:1)
cI−Γi
e
We,0
(262)
where We,0 = EP [we,0]. Substituting (262) into (255), we
(cid:35)
(cid:1) EP [we,0]
obtain
(cid:34)
µmaxhc(µmax)·1T (γcI−Γe)−1(cid:0)γi
cI−Γi
e
(cid:48)
i (cid:22)
W
EP [we,0]
Γi
e
(cid:48)
+ W ub
∞
(cid:26)
(cid:104)
1 − ψ0 ·
(cid:34)
(cid:34)
·
+
µmax
ζ(µmax) =
(cid:18)
+µ2
1+
(cid:19)
µmax
λL− µmax
2 (cid:107)p(cid:107)2
1T (I−Γe)
1λ2
U
hc(µmax)
2 (cid:107)p(cid:107)2
(cid:105)(cid:27)−1
−11
(266)
max
1λ2
U
λL− µmax
Proof: See Appendix K.
Substituting (254), (261), (264) and (265) into (256) and after
some algebra, we obtain
W ub
∞ = ψ0·ζ(µmax)f (µmax)
λL− µmax
µmax
(cid:35)
−11
(cid:48)
(cid:35)
−11bv,e
1λ2
U
λL− µmax
1+µmaxhc(µmax)1T (I−Γe)
2 (cid:107)p(cid:107)2
max · (I − Γe)−11
µ2
bv,c+µmaxhc(µmax)1T (I−Γe)
2 (cid:107)p(cid:107)2
maxbv,e · (I − Γe)−11
(cid:19)
1λ2
U
1λ2
U
µ2
(cid:1)
·1T (I−Γe)
1λ2
U
1bv,e
max
(267)
−1
(268)
where
f (µmax) (cid:44)
(cid:18)
λL− µmax
+
µmaxbv,c
2 (cid:107)p(cid:107)2
λL− µmax
1+
hc(µmax)
2 (cid:107)p(cid:107)2
(cid:0)EP [we,0]+µ2
Introduce
c,∞ (cid:44) ψ0·ζ(µmax)f (µmax)
W ub
×
(cid:48)
· µmax
+ µmax
1 + µmaxhc(µmax)1T (I − Γe)−11
bv,c + µmaxhc(µmax)1T (I − Γe)−11bv,e
(269)
λL − µmax
λL − µmax
2 (cid:107)p(cid:107)2
2 (cid:107)p(cid:107)2
1λ2
U
1λ2
U
(270)
(271)
(cid:48)
e,∞ (cid:44) ψ0·ζ(µmax)f (µmax) · µ2
W ub
−11
maxbv,e · (I − Γe)
+ µ2
max · (I − Γe)
−11
Then, we have
Substituting (271) into (263), we conclude (124) -- (125). Now,
to prove (126) -- (127), it suffices to prove
(cid:48)
W ub
∞ = col{ W ub
c,∞, W ub
e,∞}
(cid:48)
(cid:48)
(cid:0)λL +hc(0)(cid:1)1T (I−Γe)−1We,0 +bv,cλL
(cid:0)λL +hc(0)(cid:1)1T (I − Γe)−1We,0 +bv,eλL
(272)
λ2
L
λL
(273)
−11
· (I−Γe)
(263)
(cid:48)
W ub
c,∞
µmax
(cid:48)
W ub
e,∞
µ2
max
ψ0
=
ψ0
=
lim
µmax→0
lim
µmax→0
Substituting (269) and (270) into the left-hand side of (272)
and (273), respectively, we get
(cid:48)
Finally, we study the behavior of the asymptotic bound
W ub
∞ by calling upon the following lemma.
Lemma 9 (Useful matrix expressions): It holds that
1T (I − Γ)
(cid:104)
= ζ(µmax)
−1
·
max
λL− µmax
2 (cid:107)p(cid:107)2
1T (I − Γe)−1(cid:105)
hc(µmax)
2 (cid:107)p(cid:107)2
λL− µmax
(cid:16)
(cid:17)
1 +
1λ2
U
1λ2
U
−1
µ
(cid:34)
−1
(I − Γ0)
=
µ
−1
max
λL− µmax
2 (cid:107)p(cid:107)2
0
1λ2
U
lim
µmax→0
(cid:48)
(cid:26)
W ub
c,∞
µmax
= lim
µmax→0
(264)
(cid:35)
λL−µmax
hc(µmax)
2 (cid:107)p(cid:107)2
1T (I−Γe)−1
1λ2
U
(I − Γe)−1
(265)
ψ0·ζ(µmax)f (µmax)·
1+µmaxhc(µmax)1T (I−Γe)−11
λL − µmax
2 (cid:107)p(cid:107)2
1λ2
U
CHEN AND SAYED: ON THE LEARNING BEHAVIOR OF ADAPTIVE NETWORKS -- PART I: TRANSIENT ANALYSIS
27
·
(a)
+
λL
1+
λ2
L
1λ2
U
ψ0
=
2 (cid:107)p(cid:107)2
1
λL
hc(0)
−1EP [we,0]
= ψ0·ζ(0)f (0) ·
= ψ0·1 ·
λL − µmax
(cid:19)
+
bv,c
λL
·1T (I−Γe)
bv,c + µmaxhc(µmax)1T (I − Γe)−11bv,e
(cid:20)(cid:18)
(cid:21)
(cid:0)λL + hc(0)(cid:1)1T (I − Γe)−1We,0 + bv,cλL
(cid:8)ψ0·ζ(µmax)f (µmax) · (I − Γe)
−11(cid:9)
(cid:20)(cid:18)
(cid:21)
−11 + bv,e · (I − Γe)
−1EP [we,0]
(cid:0)λL + hc(0)(cid:1)1T (I − Γe)−1We,0 + bv,eλL
+ bv,e · (I − Γe)
= ψ0·ζ(0)f (0) · (I − Γe)
= ψ0·
λL
+ bv,e · (I − Γe)
ψ0
·1T (I−Γe)
−11
(cid:48)
W ub
e,∞
µ2
µmax→0
= lim
µmax→0
(cid:19)
−11
hc(0)
lim
1+
max
(b)
−11
=
λL
−11
(275)
where steps (a) and (b) use the expressions for ζ(µmax) and
f (µmax) from (266) and (268).
·(I−Γe)
Now we proceed to prove (128). We already know that
the second term on the right-hand side of (124), W ub
c,∞, is
O(µmax) because of (126). Therefore, we only need to show
that the first term on the right-hand side of (124) is O(µmax)
(cid:1)
for all i ≥ 0. To this end, it suffices to prove that
cI−Γi
(cid:13)(cid:13)µmaxhc(µmax)·1T (γcI−Γe)−1(cid:0)γi
We,0
(cid:13)(cid:13)
lim
e
(cid:48)
µmax→0
µmax
≤ constant
(276)
where the constant on the right-hand side should be indepen-
dent of i. This can be proved as below:
cI−Γi
e
We,0
(cid:1)
(cid:1)
We,0
(cid:13)(cid:13)
(cid:13)(cid:13)
lim
µmax
µmax→0
= lim
(cid:13)(cid:13)µmaxhc(µmax)·1T (γcI−Γe)−1(cid:0)γi
(cid:13)(cid:13)hc(µmax)·1T (γcI−Γe)
−1(cid:0)γi
cI−Γi
µmax→0
(cid:0)(cid:13)(cid:13)γi
cI(cid:13)(cid:13) +(cid:13)(cid:13)Γi
−1(cid:107)
µmax→0hc(µmax) · (cid:107)1(cid:107) · (cid:107)(γcI−Γe)
≤ lim
·
(cid:16)
µmax→0hc(µmax) · N · (cid:107)(γcI−Γe)
·
· (cid:107)We,0(cid:107)
µmax→0hc(µmax)·N·(cid:107)(γcI−Γe)
(cid:13)(cid:13)(cid:1)
(cid:0)ρ(Γe) + (cid:1)i(cid:17)
· (cid:107)We,0(cid:107)
≤ lim
1 + Ce ·
−1(cid:107)
(a)
(b)
e
e
(c)
−1(cid:107)·(1+Ce)·(cid:107)We,0(cid:107)
−1(cid:107) · [1 + Ce] · (cid:107)We,0(cid:107)
≤ lim
= hc(0) · N · (cid:107)(I−Γe)
= constant
L < 1 for
where step (a) uses γc = 1 − µmaxλL + 1
sufficiently small step-sizes, and uses the property that for
any small > 0 there exists a constant C such that (cid:107)X i(cid:107) ≤
C · [ρ(X) + ]i for all i ≥ 0 [49, p.38], step (b) uses the
fact that ρ(Γe) = λ2(A) < 1 so that ρ(Γe) + < 1 for
maxλ2
(277)
2 µ2
(cid:27)
1
λL
+
bv,c
λL
(274)
−11
· (I − Γe)
2 µ2
maxλ2
L → 1 when µmax → 0.
small (e.g., = (1 − ρ(Γe))/2), and step (c) uses γc =
1 − µmaxλL + 1
It remains to prove that condition (129) guarantees the
stability of the matrix Γ, i.e., ρ(Γ) < 1. First, we intro-
duce the diagonal matrices D,0 (cid:44) diag{,··· , N−1} and
D = diag{1, D,0}, where is chosen to be
1
4
(1 − λ2(A))2 ≤
It holds that ρ(Γ) = ρ(D−1
ΓD) since similarity transforma-
tions do not alter eigenvalues. By the definition of Γ in (116),
we have
−1
ΓD = D
−1
Γ0D + µ2
(cid:44) 1
4
11T D
(278)
(279)
−1
D
maxψ0 · D
We now recall that the spectral radius of a matrix is upper
bounded by any of its matrix norms. Thus, taking the 1−norm
(the maximum absolute column sum of the matrix) of both
sides of the above expression and using the triangle inequality
and the fact that 0 < ≤ 1/4, we get
ρ(Γ) = ρ(D
(cid:16)
≤ (cid:107)D
≤ (cid:107)D
= (cid:107)D
1 − −N
= (cid:107)D
1 − −1
(−N − 1)
= (cid:107)D
1 −
4 (−N − 1)
1 − 1
−N
−1
ΓD)
−1
Γ0D(cid:107)1 + (cid:107)µ2
−1
Γ0D(cid:107)1 + µ2
−1
Γ0D(cid:107)1 + µ2
−1
Γ0D(cid:107)1 + µ2
−1
Γ0D(cid:107)1 + µ2
−1
Γ0D(cid:107)1 + µ2
maxψ0 ·
−1
1
µ2
Γ0D(cid:107)1 +
3
maxψ0 · D
maxψ0 · (cid:107)D
maxψ0 ·
maxψ0 ·
maxψ0 ·
11T D(cid:107)1
11T D(cid:107)1
−1 + ··· +
−(N−1)(cid:17)
≤ (cid:107)D
≤ (cid:107)D
−1
−1
maxψ0
(280)
1 +
4
1
Moreover, we can use (117) to write:
−1
Γ0D =
D
γc µmaxhc(µmax)1T D,0
0
−1
,0 ΓeD,0
D
(281)
1−λ2(A)
λ2(A)
where (recall the expression for Γe from (171) where we
replace d2 by λ2(A)):
(282)
µmaxhc(µmax)1T D,0 = µmaxhc(µmax)(cid:2) ··· N−1(cid:3) (283)
−1
,0 ΓeD,0 =
λ2(A)
1−λ2(A)
...
...
...
D
2
2
Therefore, the 1-norm of D−1
Γ0D can be evaluated as
(cid:35)
(cid:34)
(cid:110)
−1
,0 Γ0D,0(cid:107)1 = max
(cid:107)D
γc, λ2(A) + µmaxhc(µmax),
+ µmaxhc(µmax)2,··· ,
+ µmaxhc(µmax)N−1(cid:111)
1 + λ2(A)
1 + λ2(A)
2
2
(284)
28
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. XX, NO. XX, MONTH 2015
1 + λ2(A)
2
≤
= 1
+
1−λ2(A)
4
+
1−λ2(A)
4
(294)
Substituting (121) and (278) into (292), we find that the latter
conditions are satisfied for
(cid:0)
λL
(cid:107) ¯P [ATU2](cid:107)2∞ + 1
2
(cid:1)
0 < µmax <
0 < µmax <
(cid:107)p(cid:107)2
1λ2
U
(cid:115)
3(1 − λ2(A))2N +1
22N +2ψ0
(295)
Combining (287), (289) and (295) , we arrive at condition
(129).
APPENDIX K
PROOF OF LEMMA 9
Applying the matrix inversion lemma [52] to (116), we get
(I − Γ)
−1 = (I − Γ0 − µ2
−1 +
= (I−Γ0)
−1
maxψ0 · 11T )
maxψ0 · (I−Γ0)−111T (I−Γ0)−1
µ2
maxψ0 · 1T (I − Γ0)−11
1−µ2
(296)
so that
1T (I − Γ)
−1 =
−1
1
(cid:34)
1 − µ2
maxψ0 · 1T (I − Γ0)−11 · 1T (I − Γ0)
(297)
By (117), the matrix Γ0 is a 2×2 block upper triangular matrix
(cid:35)
whose inverse is given by
1T (I − Γe)−1)
(1 − γc)−1
(298)
Substituting (166) into the above expression leads to (265).
Furthermore, from (265), we have
(I − Γe)−1
(I − Γ0)
−1 =
µmaxhc(µmax)
1−γc
0
Since 0 < ≤ 1/4, we have > 2 > ··· > N−1 > 0.
Therefore,
−1
,0 Γ0D,0(cid:107)1 = max
(cid:107)D
γc, λ2(A) + µmaxhc(µ),
+ µmaxhc(µmax)2(cid:111)
1 + λ2(A)
(285)
(cid:110)
2
(cid:110)
Substituting the above expression for (cid:107)D
(280) leads to
−1
,0 Γ0D,0(cid:107)1 into
ρ(Γ) ≤ max
1+λ2(A)
2
+µmaxhc(µmax)2(cid:111)
γc, λ2(A) + µmaxhc(µmax),
µ2
+
−N
maxψ0
1
3
1
3
(286)
We recall from (167) that γc > 0. To ensure ρ(Γ) < 1,
it suffices to require that µmax is such that the following
conditions are satisfied:
−N < 1
(287)
µ2
γc +
maxψ0
1
3
−N < 1
µ2
maxψ0
(288)
λ2(A) + µmaxhc(µmax) +
−N < 1 (289)
1 + λ2(A)
We now solve these three inequalities to get a condition on
µmax. Substituting the expression for γc from (166) into (287),
we get
+ µmaxhc(µmax)2 +
maxψ0
µ2
1
3
2
(cid:16) 1
1 − µmaxλL + µ2
max
−N +
ψ0
1
2(cid:107)p(cid:107)2
1λ2
U
3
the solution of which is given by
0 < µmax <
λL
3 ψ0−N + 1
1
2(cid:107)p(cid:107)2
1λ2
U
(cid:17)
< 1
(290)
(291)
For (288) -- (289), if we substitute the expression for hc(µmax)
from (121) into (288) -- (289), we get a third-order inequality
in µmax, which is difficult to solve in closed-form. However,
inequalities (288) -- (289) can be guaranteed by the following
conditions:
µmaxhc(µmax) <
(1−λ2(A))2
4
,
maxψ0−N
µ2
3
This is because we would then have:
1
3
λ2(A) + µmaxhc(µmax) +
−N
maxψ0
µ2
(1−λ2(A))2
1−λ2(A)
+
4
4
< 1
< λ2(A) +
≤ λ2(A) +
1+λ2(A)
=
2
<
1−λ2(A)
4
(292)
1T (I − Γ0)
−11 =
max
µ−1
(cid:18)
λL− µmax
2 (cid:107)p(cid:107)2
+
λL− µ
1+
hc(µmax)
2(cid:107)p(cid:107)2
1λ2
U
1λ2
U
(cid:19)
1T (I−Γe)
−11
(299)
1−λ2(A)
+
4
1−λ2(A)
4
Substituting (299) into (297), we obtain (264).
APPENDIX L
PROOF OF THEOREM 5
(293)
Taking the squared Euclidean norm of both sides of (74)
and applying the expectation operator, we obtain
Likewise, by the fact that 0 < ≤ 1/4 < 1,
µ2
+ µmaxhc(µmax)2 +
1 + λ2(A)
−N
maxψ0
1
3
2
1 + λ2(A)
1 + λ2(A)
2
<
<
2
+ µmaxhc(µmax) +
+
(1−λ2(A))2
4
+
µ2
1
maxψ0
3
1−λ2(A)
4
−N
E(cid:107) wk,i(cid:107)2 = (cid:107) wc,i(cid:107)2 + E(cid:107) wc,i + (uL,k ⊗ IM )we,i(cid:107)2
− 2 wT
c,i [E wc,i + (uL,k ⊗ IM )we,i]
(300)
which means that, for all i ≥ 0,
(cid:12)(cid:12)E(cid:107) wk,i(cid:107)2 − (cid:107) wc,i(cid:107)2(cid:12)(cid:12)
(cid:12)(cid:12)(cid:12)E(cid:107) wc,i + (uL,k ⊗ IM )we,i(cid:107)2
=
CHEN AND SAYED: ON THE LEARNING BEHAVIOR OF ADAPTIVE NETWORKS -- PART I: TRANSIENT ANALYSIS
29
(cid:3)(cid:12)(cid:12)(cid:12)
(b)
(c)
(a)
c,i
(cid:2)E wc,i + (uL,k ⊗ IM )Ewe,i
− 2 wT
(cid:2)
(cid:3)
≤ E(cid:107) wc,i + (uL,k ⊗ IM )we,i(cid:107)2
(cid:107)E wc,i(cid:107) + (cid:107)uL,k ⊗ IM(cid:107) · (cid:107)Ewe,i(cid:107)
+ 2(cid:107) wc,i(cid:107) ·
(cid:3)
(cid:2)E(cid:107) wc,i(cid:107) + (cid:107)uL,k ⊗ IM(cid:107) · E(cid:107)we,i(cid:107)
≤ 2E(cid:107) wc,i(cid:107)2 + 2(cid:107)uL,k ⊗ IM(cid:107)2 · E(cid:107)we,i(cid:107)2
+ 2(cid:107) wc,i(cid:107) ·
(cid:2)(cid:113)E(cid:107) wc,i(cid:107)2 + (cid:107)uL,k ⊗ IM(cid:107) ·
(cid:113)E(cid:107)we,i(cid:107)2(cid:3)
≤ 2E(cid:107) wc,i(cid:107)2 + 2(cid:107)uL,k ⊗ IM(cid:107)2 · E(cid:107)we,i(cid:107)2
+ 2(cid:107) wc,i(cid:107) ·
(cid:113)
(cid:104)(cid:113)EP [ wc,i] + (cid:107)uL,k ⊗ IM(cid:107) ·
= 2EP [ wc,i] + 2(cid:107)uL,k ⊗ IM(cid:107)2 · 1T EP [we,i]
e,∞(cid:1)
(cid:0)1T Γi
+ 2(cid:107) wc,i(cid:107) ·
(cid:104)
eWe,0 + 1T W ub
≤ O(µmax) + 2(cid:107)uL,k ⊗ IM(cid:107)2 ·
(cid:113)
(cid:105)
+ 2γi
max)(cid:1)
(cid:19)(cid:21)
≤ O(µmax) + 2(cid:107)uL,k ⊗ IM(cid:107)2 ·
+ 2γi
(cid:0)1T Γi
eWe,0 + 1T W ub(cid:48)
e,∞
eWe,0 + O(µ2
+ (cid:107)uL,k ⊗ IM(cid:107) ·
1T EP [we,i]
c(cid:107) wc,0(cid:107) ·
c(cid:107) wc,0(cid:107) ·
1T Γi
max)
max)
(cid:20)
O(µ
O(µ
(cid:18)(cid:113)
1
2
1
2
(cid:48)
(f )
(d)
(e)
(cid:112)
(cid:105)
1T Γi
eWe,0 +
O(µ2
max)
+ (cid:107)uL,k ⊗ IM(cid:107) ·
= 2(cid:107)uL,k ⊗ IM(cid:107)2 · 1T Γi
eWe,0
(cid:113)
where step (a) used Cauchy-Schwartz inequality, step (b) used
(cid:107)x+y(cid:107)2 ≤ 2(cid:107)x(cid:107)2 +2(cid:107)y(cid:107)2, step (c) applied Jensen's inequality
to the concave function √·, step (d) used property (157), step
(e) substituted the non-asymptotic bounds (124) and (125) and
the fact that EP [ wc,i] ≤ O(µmax) for all i ≥ 0 from (128),
step (f) used (127) and the fact that √x + y ≤ √x + √y
for x, y ≥ 0, and step (g) used γc < 1 for sufficiently small
step-sizes (guaranteed by (112)).
REFERENCES
[1] J. Chen and A. H. Sayed,
"On the limiting behavior of distributed
optimization strategies," in Proc. Allerton Conf., Monticello, IL, Oct.
2012, pp. 1535 -- 1542.
[2] S. Barbarossa and G. Scutari, "Bio-inspired sensor network design,"
IEEE Signal Process. Mag., vol. 24, no. 3, pp. 26 -- 35, May 2007.
[3] L. Li and J. A. Chambers, "A new incremental affine projection-based
adaptive algorithm for distributed networks," Signal Processing, vol. 88,
no. 10, pp. 2599 -- 2603, Oct. 2008.
[4] A. Nedic and D. P. Bertsekas, "Incremental subgradient methods for
nondifferentiable optimization," SIAM J. Optim., vol. 12, no. 1, pp.
109 -- 138, 2001.
[5] J. N. Tsitsiklis, D. P. Bertsekas, and M. Athans, "Distributed asyn-
chronous deterministic and stochastic gradient optimization algorithms,"
IEEE Trans. Autom. Control, vol. 31, no. 9, pp. 803 -- 812, 1986.
[6] S. Kar and J. M. F. Moura, "Convergence rate analysis of distributed
gossip (linear parameter) estimation: Fundamental limits and tradeoffs,"
IEEE J. Sel. Topics. Signal Process., vol. 5, no. 4, pp. 674 -- 690, Aug.
2011.
[7] S. Kar, J. M. F. Moura, and K. Ramanan, "Distributed parameter esti-
mation in sensor networks: Nonlinear observation models and imperfect
communication," IEEE Trans. Inf. Theory, vol. 58, no. 6, pp. 3575 -- 3605,
Jun. 2012.
[8] S. Kar, J. M. F. Moura, and H. V. Poor, "Distributed linear parameter
estimation: Asymptotically efficient adaptive strategies," SIAM Journal
on Control and Optimization, vol. 51, no. 3, pp. 2200 -- 2229, 2013.
[9] A. G. Dimakis, S. Kar, J. M. F. Moura, M. G. Rabbat, and A. Scaglione,
"Gossip algorithms for distributed signal processing," Proc. IEEE, vol.
98, no. 11, pp. 1847 -- 1864, Nov. 2010.
[10] A. Nedic and A. Ozdaglar, "Distributed subgradient methods for multi-
agent optimization," IEEE Trans. Autom. Control, vol. 54, no. 1, pp.
48 -- 61, 2009.
[11] A. Nedic and A. Ozdaglar, "Cooperative distributed multi-agent opti-
mization," Convex Optimization in Signal Processing and Communica-
tions, Y. Eldar and D. Palomar (Eds.), Cambridge University Press, pp.
340 -- 386, 2010.
[12] C. Eksin and A. Ribeiro,
"Distributed network optimization with
heuristic rational agents," IEEE Trans. Signal Proc., vol. 60, no. 10,
pp. 5396 -- 5411, Oct. 2012.
[13] C. Eksin, P. Molavi, A. Ribeiro, and A. Jadbabaie, "Learning in network
games with incomplete information: Asymptotic analysis and tractable
implementation of rational behavior," IEEE Signal Process. Mag., vol.
30, no. 3, pp. 30 -- 42, May 2013.
[14] S. Theodoridis, K. Slavakis, and I. Yamada, "Adaptive learning in a
world of projections," IEEE Signal Process. Mag., vol. 28, no. 1, pp.
97 -- 123, Jan. 2011.
[15] D. H. Dini and D. P. Mandic,
"Cooperative adaptive estimation of
in Proc. Asilomar Conf.
distributed noncircular complex signals,"
Signals, Syst. and Comput., Pacific Grove, CA, Nov. 2012, pp. 1518 --
1522.
[16] C. G. Lopes and A. H. Sayed,
"Diffusion least-mean squares over
adaptive networks: Formulation and performance analysis," IEEE Trans.
Signal Process., vol. 56, no. 7, pp. 3122 -- 3136, Jul. 2008.
[17] F. S. Cattivelli and A. H. Sayed,
"Diffusion LMS strategies for
distributed estimation," IEEE Trans. Signal Process., vol. 58, no. 3,
pp. 1035 -- 1048, Mar. 2010.
[18] J. Chen and A. H. Sayed, "Diffusion adaptation strategies for distributed
optimization and learning over networks," IEEE Trans. Signal Process.,
vol. 60, no. 8, pp. 4289 -- 4305, Aug. 2012.
[19] X. Zhao and A. H. Sayed, "Performance limits for distributed estimation
over LMS adaptive networks," IEEE Trans. Signal Process., vol. 60, no.
10, pp. 5107 -- 5124, Oct. 2012.
[20] J. Chen and A. H. Sayed, "Distributed Pareto optimization via diffusion
adaptation," IEEE J. Sel. Topics Signal Process., vol. 7, no. 2, pp. 205 --
220, Apr. 2013.
[21] A. H. Sayed, "Diffusion adaptation over networks," in Academic Press
Library in Signal Processing, vol. 3, R. Chellapa and S. Theodoridis,
editors, pp. 323 -- 454, Elsevier, 2014.
[22] A. H. Sayed, "Adaptive networks," Proc. IEEE, vol. 102, no. 4, pp.
460 -- 497, Apr. 2014.
[23] A. H. Sayed, "Adaptation, learning, and optimization over networks,"
Foundations and Trends in Machine Learning, vol. 7, issue 4 -- 5, NOW
Publishers, Boston-Delft, Jul. 2014., pp. 311 -- 801.
[24] J. Chen, Z. J. Towfic, and A. H. Sayed,
"Dictionary learning over
distributed models," IEEE Trans. Signal Process., vol. 63, no. 4, pp.
1001 -- 1016, Feb. 2015.
[25] S. V. Macua, J. Chen, S. Zazo, and A. H. Sayed, "Distributed policy
IEEE Trans. Autom.
evaluation under multiple behavior strategies,"
Control, vol. 60, no. 5, May 2015.
[26] S. Chouvardas, K. Slavakis, and S. Theodoridis,
"Adaptive robust
distributed learning in diffusion sensor networks," IEEE Trans. Signal
Process., vol. 59, no. 10, pp. 4692 -- 4707, Oct. 2011.
[27] O. N. Gharehshiran, V. Krishnamurthy, and G. Yin, "Distributed energy-
aware diffusion least mean squares: Game-theoretic learning," IEEE
Journal Sel. Topics Signal Process., vol. 7, no. 5, pp. 821 -- 836, Jun.
2013.
[28] S. S. Ram, A. Nedic, and V. V. Veeravalli,
"Distributed stochastic
subgradient projection algorithms for convex optimization," J. Optim.
Theory Appl., vol. 147, no. 3, pp. 516 -- 545, 2010.
(cid:104)
+ 2γi
1T Γi
1
2
c(cid:107) wc,0(cid:107) ·
c · (cid:107) wc,0(cid:107) · (cid:107)uL,k ⊗ IM(cid:107) ·
eWe,0
+ 2γi
max) + (cid:107)uL,k ⊗ IM(cid:107) · O(µmax)
O(µ
+ O(µmax) + O(µ2
max)
≤ 2(cid:107)uL,k ⊗ IM(cid:107)2·1T Γi
+2(cid:107) wc,0(cid:107)·(cid:107)uL,k ⊗ IM(cid:107)·
+γi
max)+O(µmax)
eWe,0
eWe,0
(cid:113)
1T Γi
1
2
(g)
c·O(µ
(cid:105)
(301)
30
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. XX, NO. XX, MONTH 2015
wireless sensor networks," IEEE Trans. Signal Process., vol. 61, no. 11,
pp. 2802 -- 2814, Jun. 2013.
[54] B. Widrow, J. M. McCool, M. G. Larimore, and C. R. Johnson Jr, "Sta-
tionary and nonstationary learning characterisitcs of the LMS adaptive
filter," Proc. IEEE, vol. 64, no. 8, pp. 1151 -- 1162, Aug. 1976.
[55] S. Jones, R. Cavin III, and W. Reed, "Analysis of error-gradient adaptive
linear estimators for a class of stationary dependent processes," IEEE
Trans. Inf. Theory, vol. 28, no. 2, pp. 318 -- 329, Mar. 1982.
[56] W. A. Gardner, "Learning characteristics of stochastic-gradient-descent
algorithms: A general study, analysis, and critique," Signal Process.,
vol. 6, no. 2, pp. 113 -- 133, Apr. 1984.
[57] A. Feuer and E. Weinstein,
"Convergence analysis of LMS filters
with uncorrelated gaussian data," IEEE Trans. Acoust., Speech, Signal
Process., vol. 33, no. 1, pp. 222 -- 230, Feb. 1985.
[58] A. J. Laub, Matrix Analysis for Scientists and Engineers, SIAM, PA,
[59] E. Kreyszig, Introductory Functional Analysis with Applications, Wiley,
2005.
NY, 1989.
[60] A. H. Sayed, Adaptive Filters, Wiley, NJ, 2008.
[29] K. Srivastava and A. Nedic,
"Distributed asynchronous constrained
stochastic optimization," IEEE J. Sel. Topics Signal Process., vol. 5,
no. 4, pp. 772 -- 790, Aug. 2011.
[30] S. Lee and A. Nedic,
"Distributed random projection algorithm for
convex optimization," IEEE Journal Sel. Topics Signal Process., vol. 7,
no. 2, pp. 221 -- 229, Apr. 2013.
[31] K. I. Tsianos, S. Lawlor, and M. G. Rabbat,
"Consensus-based
distributed optimization: Practical issues and applications in large-scale
machine learning," in Proc. Annual Allerton Conference on Commun.
Control and Comput., Monticello, IL, Oct. 2012, pp. 1543 -- 1550.
[32] D.P. Palomar and M. Chiang, "A tutorial on decomposition methods for
network utility maximization," IEEE J. Sel. Areas Commun., vol. 24,
no. 8, pp. 1439 -- 1451, Aug. 2006.
[33] V. Saligrama, M. Alanyali, and O. Savas,
"Distributed detection in
sensor networks with packet losses and finite capacity links," IEEE
Trans. Signal Proc., vol. 54, no. 11, pp. 4118 -- 4132, Oct. 2006.
[34] J. B. Predd, S. R. Kulkarni, and H. V. Poor, "A collaborative training
algorithm for distributed learning," IEEE Trans. Inf. Theory, vol. 55,
no. 4, pp. 1856 -- 1871, Apr. 2009.
[35] S. Boyd, A. Ghosh, B. Prabhakar, and D. Shah, "Randomized gossip
algorithms," IEEE Trans. Inf. Theory, vol. 52, no. 6, pp. 2508 -- 2530,
Jun. 2006.
[36] W. Ren and R. W. Beard, "Consensus seeking in multiagent systems
under dynamically changing interaction topologies," IEEE Trans. Autom.
Control, vol. 50, no. 5, pp. 655 -- 661, May 2005.
[37] S. Sardellitti, M. Giona, and S. Barbarossa, "Fast distributed average
consensus algorithms based on advection-diffusion processes," IEEE
Trans. Signal Process., vol. 58, no. 2, pp. 826 -- 842, Feb. 2010.
[38] A. Jadbabaie, J. Lin, and A. S. Morse, "Coordination of groups of
mobile autonomous agents using nearest neighbor rules," IEEE Trans.
Autom. Control, vol. 48, no. 6, pp. 988 -- 1001, 2003.
[39] R. Olfati-Saber, J.A. Fax, and R.M. Murray, "Consensus and cooperation
in networked multi-agent systems," Proc. IEEE, vol. 95, no. 1, pp. 215 --
233, Jan. 2007.
[40] P. Di Lorenzo and S. Barbarossa, "A bio-inspired swarming algorithm
for decentralized access in cognitive radio," IEEE Trans. Signal Process.,
vol. 59, no. 12, pp. 6160 -- 6174, Dec. 2011.
[41] F. S. Cattivelli and A. H. Sayed, "Self-organization in bird flight forma-
tions using diffusion adaptation," in Proc. 3rd International Workshop on
Computational Advances in Multi-Sensor Adaptive Processing, Aruba,
Dutch Antilles, Dec. 2009, pp. 49 -- 52.
[42] S-Y. Tu and A. H. Sayed,
"Mobile adaptive networks with self-
organization abilities," in Proc. 7th International Symposium on Wireless
Communication Systems, York, United Kingdom, Sep. 2010, pp. 379 --
383.
[43] Y.-W. Hong and A. Scaglione, "A scalable synchronization protocol for
large scale sensor networks and its applications," IEEE J. Sel. Areas
Comm., vol. 23, no. 5, pp. 1085 -- 1099, May 2005.
[44] J. Chen and A. H. Sayed, "On the learning behavior of adaptive networks
-- Part II: Performance analysis," to appear in IEEE Trans. Inf. Theory,
2015 [also available as arXiv:1312.7580, Dec. 2013].
[45] P. Bianchi, G. Fort, and W. Hachem, "Performance of a distributed
stochastic approximation algorithm," IEEE Trans. Inf. Theory, vol. 59,
no. 11, pp. 7405 -- 7418, Nov. 2013.
[46] B. Johansson, T. Keviczky, M. Johansson, and K.H. Johansson, "Subgra-
dient methods and consensus algorithms for solving convex optimization
problems," in Proc. IEEE Conf. Decision and Control (CDC), Cancun,
Mexico, Dec. 2008, IEEE, pp. 4185 -- 4190.
[47] P. Braca, S. Marano, and V. Matta, "Running consensus in wireless
sensor networks," in Proc. 11th IEEE Int. Conf. on Information Fusion,
Cologne, Germany, June 2008, pp. 1 -- 6.
[48] S. S. Stankovic, M. S. Stankovic, and D. M. Stipanovic, "Decentralized
parameter estimation by consensus based stochastic approximation,"
IEEE Trans. Autom. Control, vol. 56, no. 3, pp. 531 -- 543, Mar. 2011.
[49] B. Polyak, Introduction to Optimization, Optimization Software, NY,
1987.
[50] A. Tahbaz-Salehi and A. Jadbabaie,
"A necessary and sufficient
condition for consensus over random networks," IEEE Trans. Autom.
Control, vol. 53, no. 3, pp. 791 -- 795, Apr. 2008.
[51] D. P. Bertsekas and J. N. Tsitsiklis, "Gradient convergence in gradient
methods with errors," SIAM J. Optim., vol. 10, no. 3, pp. 627 -- 642,
2000.
[52] R. A. Horn and C. R. Johnson, Matrix Analysis, Cambridge University
Press, 1990.
[53] F. Iutzeler, C. Philippe, and W. Hachem, "Analysis of sum-weight-like
algorithms for analysis of sum-weight-like algorithms for averaging in
|
1707.04402 | 2 | 1707 | 2018-02-27T09:36:29 | Lenient Multi-Agent Deep Reinforcement Learning | [
"cs.MA",
"cs.AI",
"cs.LG"
] | Much of the success of single agent deep reinforcement learning (DRL) in recent years can be attributed to the use of experience replay memories (ERM), which allow Deep Q-Networks (DQNs) to be trained efficiently through sampling stored state transitions. However, care is required when using ERMs for multi-agent deep reinforcement learning (MA-DRL), as stored transitions can become outdated because agents update their policies in parallel [11]. In this work we apply leniency [23] to MA-DRL. Lenient agents map state-action pairs to decaying temperature values that control the amount of leniency applied towards negative policy updates that are sampled from the ERM. This introduces optimism in the value-function update, and has been shown to facilitate cooperation in tabular fully-cooperative multi-agent reinforcement learning problems. We evaluate our Lenient-DQN (LDQN) empirically against the related Hysteretic-DQN (HDQN) algorithm [22] as well as a modified version we call scheduled-HDQN, that uses average reward learning near terminal states. Evaluations take place in extended variations of the Coordinated Multi-Agent Object Transportation Problem (CMOTP) [8] which include fully-cooperative sub-tasks and stochastic rewards. We find that LDQN agents are more likely to converge to the optimal policy in a stochastic reward CMOTP compared to standard and scheduled-HDQN agents. | cs.MA | cs |
Lenient Multi-Agent Deep Reinforcement Learning
Gregory Palmer
University of Liverpool
United Kingdom
[email protected]
Daan Bloembergen
Centrum Wiskunde & Informatica
The Netherlands
[email protected]
Karl Tuyls
DeepMind and University of Liverpool
United Kingdom
[email protected]
Rahul Savani
University of Liverpool
United Kingdom
[email protected]
ABSTRACT
Much of the success of single agent deep reinforcement learning
(DRL) in recent years can be attributed to the use of experience
replay memories (ERM), which allow Deep Q-Networks (DQNs)
to be trained efficiently through sampling stored state transitions.
However, care is required when using ERMs for multi-agent deep
reinforcement learning (MA-DRL), as stored transitions can become
outdated because agents update their policies in parallel [11]. In
this work we apply leniency [23] to MA-DRL. Lenient agents map
state-action pairs to decaying temperature values that control the
amount of leniency applied towards negative policy updates that
are sampled from the ERM. This introduces optimism in the value-
function update, and has been shown to facilitate cooperation in
tabular fully-cooperative multi-agent reinforcement learning prob-
lems. We evaluate our Lenient-DQN (LDQN) empirically against the
related Hysteretic-DQN (HDQN) algorithm [22] as well as a mod-
ified version we call scheduled-HDQN, that uses average reward
learning near terminal states. Evaluations take place in extended
variations of the Coordinated Multi-Agent Object Transportation
Problem (CMOTP) [8] which include fully-cooperative sub-tasks
and stochastic rewards. We find that LDQN agents are more likely
to converge to the optimal policy in a stochastic reward CMOTP
compared to standard and scheduled-HDQN agents.
KEYWORDS
Distributed problem solving; Multiagent learning; Deep learning
1 INTRODUCTION
The field of deep reinforcement learning has seen a great number
of successes in recent years. Deep reinforcement learning agents
have been shown to master numerous complex problem domains,
ranging from computer games [17, 21, 26, 33] to robotics tasks [10,
12]. Much of this success can be attributed to using convolutional
neural network (ConvNet) architectures as function approximators,
allowing reinforcement learning agents to be applied to domains
with large or continuous state and action spaces. ConvNets are often
trained to approximate policy and value functions through sampling
Proc. of the 17th International Conference on Autonomous Agents and Multiagent Systems
(AAMAS 2018), M. Dastani, G. Sukthankar, E. Andre, S. Koenig (eds.), July 2018, Stockholm,
Sweden
© 2018 International Foundation for Autonomous Agents and Multiagent Systems
(www.ifaamas.org). All rights reserved.
https://doi.org/doi
past state transitions stored by the agent inside an experience replay
memory (ERM).
Recently the sub-field of multi-agent deep reinforcement learn-
ing (MA-DRL) has received an increased amount of attention. Multi-
agent reinforcement learning is known for being challenging even
in environments with only two implicit learning agents, lacking
the convergence guarantees present in most single-agent learning
algorithms [5, 20]. One of the key challenges faced within multi-
agent reinforcement learning is the moving target problem: Given
an environment with multiple agents whose rewards depend on
each others' actions, the difficulty of finding optimal policies for
each agent is increased due to the policies of the agents being non
stationary [7, 14, 31]. The use of an ERM amplifies this problem,
as a large proportion of the state transitions stored can become
deprecated [22].
Due to the moving target problem reinforcement learning algo-
rithms that converge in a single agent setting often fail in fully-
cooperative multi-agent systems with independent learning agents
that require implicit coordination strategies. Two well researched
approaches used to help parallel reinforcement learning agents
overcome the moving target problem in these domains include hys-
teretic Q-learning [19] and leniency [23]. Recently Omidshafiei et
al. [22] successfully applied concepts from hysteretic Q-learning to
MA-DRL (HDQN). However, we find that standard HDQNs struggle
in fully cooperative domains that yield stochastic rewards. In the
past lenient learners have been shown to outperform hysteretic
agents for fully cooperative stochastic games within a tabular set-
ting [35]. This raises the question whether leniency can be applied
to domains with a high-dimensional state space.
In this work we show how lenient learning can be extended to
MA-DRL. Lenient learners store temperature values that are associ-
ated with state-action pairs. Each time a state-action pair is visited
the respective temperature value is decayed, thereby decreasing the
amount of leniency that the agent applies when performing a policy
update for the state-action pair. The stored temperatures enable
the agents to gradually transition from optimists to average reward
learners for frequently encountered state-action pairs, allowing the
agents to outperform optimistic and maximum based learners in
environments with misleading stochastic rewards [35]. We extend
this idea to MA-DRL by storing leniency values in the ERM, and
demonstrate empirically that lenient MA-DRL agents that learn im-
plicit coordination strategies in parallel are able to converge on the
optimal joint policy in difficult coordination tasks with stochastic
AAMAS'18, July 2018, Stockholm, Sweden
Gregory Palmer, Karl Tuyls, Daan Bloembergen, and Rahul Savani
rewards. We also demonstrate that the performance of Hysteretic
Q-Networks (HDQNs) within stochastic reward environments can
be improved with a scheduled approach.
Our main contributions can be summarized as follows.
1) We introduce the Lenient Deep Q-Network (LDQN) algorithm
which includes two extensions to leniency: a retroactive temper-
ature decay schedule (TDS) that prevents premature temperature
cooling, and a T(s)-Greedy exploration strategy, where the proba-
bility of the optimal action being selected is based on the average
temperature of the current state. When combined, TDS and T(s)-
Greedy exploration encourage exploration until average rewards
have been established for later transitions.
2) We show the benefits of using TDS over average temperature
folding (ATF) [35].
3) We provide an extensive analysis of the leniency-related hyper-
parameters of the LDQN.
4) We propose a scheduled-HDQN that applies less optimism to-
wards state transitions near terminal states compared to earlier
transitions within the episode.
5) We introduce two extensions to the Cooperative Multi-agent
Object Transportation Problem (CMOTP) [8], including narrow
passages that test the agents' ability to master fully-cooperative
sub-tasks, stochastic rewards and noisy observations.
6) We empirically evaluate our proposed LDQN and SHDQN against
standard HDQNs using the extended versions of the CMOTP. We
find that while HDQNs perform well in deterministic CMOTPs, they
are significantly outperformed by SHDQNs in domains that yield a
stochastic reward. Meanwhile LDQNs comprehensively outperform
both approaches within the stochastic reward CMOTP.
The paper proceeds as follows: first we discuss related work
and the motivation for introducing leniency to MA-DRL. We then
provide the reader with the necessary background regarding how
leniency is used within a tabular setting, briefly introduce hysteretic
Q-learning and discuss approaches for clustering states based on
raw pixel values. We subsequently introduce our contributions,
including the Lenient-DQN architecture, T (s)-Greedy exploration,
Temperature Decay Schedules, Scheduled-HDQN and extensions to
the CMOTP, before moving on to discuss the results of empirically
evaluating the LDQN. Finally we summarize our findings, and
discuss future directions for our research.
2 RELATED WORK
A number of methods have been proposed to help deep reinforce-
ment learning agents converge towards an optimal joint policy in
cooperative multi-agent tasks. Gupta et al. [13] evaluated policy
gradient, temporal difference error, and actor critic methods on
cooperative control tasks that included discrete and continuous
state and action spaces, using a decentralized parameter sharing
approach with centralized learning. In contrast our current work
focuses on decentralized-concurrent learning. A recent successful
approach has been to decompose a team value function into agent-
wise value functions through the use of a value decomposition
network architecture [27]. Others have attempted to help concur-
rent learners converge through identifying and deleting obsolete
state transitions stored in the replay memory. For instance, Foerster
et al. [11] used importance sampling as a means to identify outdated
transitions while maintaining an action observation history of the
other agents. Our current work does not require the agents to main-
tain an action observation history. Instead we focus on optimistic
agents within environments that require implicit coordination. This
decentralized approach to multi-agent systems offers a number of
advantages including speed, scalability and robustness [20]. The
motivation for using implicit coordination is that communication
can be expensive in practical applications, and requires efficient
protocols [2, 20, 29].
Hysteretic Q-learning is a form of optimistic learning with a
strong empirical track record in fully-observable multi-agent rein-
forcement learning [3, 20, 37]. Originally introduced to prevent the
overestimation of Q-Values in stochastic games, hysteretic learners
use two learning rates: a learning rate α for updates that increase
the value estimate (Q-value) for a state-action pair and a smaller
learning rate β for updates that decrease the Q-value [19]. However,
while experiments have shown that hysteretic learners perform well
in deterministic environments, they tend to perform sub-optimally
in games with stochastic rewards. Hysteretic learners' struggles
in these domains have been attributed to learning rate β's inter-
dependencies with the other agents' exploration strategies [20].
Lenient learners present an alternative to the hysteretic approach,
and have empirically been shown to converge towards superior
policies in stochastic games with a small state space [35]. Similar to
the hysteretic approach, lenient agents initially adopt an optimistic
disposition, before gradually transforming into average reward
learners [35]. Lenient methods have received criticism in the past
for the time they require to converge [35], the difficulty involved
in selecting the correct hyperparameters, the additional overhead
required for storing the temperature values, and the fact that they
were originally only proposed for matrix games [20]. However,
given their success in tabular settings we here investigate whether
leniency can be applied successfully to MA-DRL.
3 BACKGROUND
Q-Learning. The algorithms implemented for this study are
based upon Q-learning, a form of temporal difference reinforcement
learning that is well suited for solving sequential decision making
problems that yield stochastic and delayed rewards [4, 34]. The
algorithm learns Q-values for state-action pairs which are estimates
of the discounted sum of future rewards (the return) that can be
obtained at time t through selecting action at in a state st , providing
the optimal policy is selected in each state that follows.
Since most interesting sequential decision problems have a large
state-action space, Q-values are often approximated using function
approximators such as tile coding [4] or neural networks [33]. The
parameters θ of the function approximator can be learned from
experience gathered by the agent while exploring their environ-
ment, choosing an action at in state st according to a policy π, and
updating the Q-function by bootstrapping the immediate reward
rt +1 received in state st +1 plus the expected future reward from the
next state (as given by the Q-function):
t − Q(st , at ; θt)(cid:1)∇θt Q(st , at ; θt).
θt +1 = θt + α(cid:0)Y
Q
(1)
Q
Here, Y
is the bootstrap target which sums the immediate reward
t
rt +1 and the current estimate of the return obtainable from the
Lenient Multi-Agent Deep Reinforcement Learning
AAMAS'18, July 2018, Stockholm, Sweden
next state st +1 assuming optimal behaviour (hence the max oper-
ator) and discounted by γ ∈ (0, 1], given in Eq. (2). The Q-value
Q(st , at ; θt) moves towards this target by following the gradient
∇θt Q(st , at ; θt); α ∈ (0, 1] is a scalar used to control the learning
rate.
(2)
Q(st +1, a; θt).
t ≡ rt +1 + γ max
a∈A
Q
Y
Deep Q-Networks (DQN). In deep reinforcement learning [21]
a multi-layer neural network is used as a function approxima-
tor, mapping a set of n-dimensional state variables to a set of m-
: Rn → Rm, where m represents the
dimensional Q-values f
number of actions available to the agent. The network parame-
ters θ can be trained using stochastic gradient descent, randomly
sampling past transitions experienced by the agent that are stored
within an experience replay memory (ERM) [18, 21]. Transitions are
tuples (st , at , st +1, rt +1) consisting of the original state st , the ac-
tion at , the resulting state st +1 and the immediate reward rt +1. The
network is trained to minimize the time dependent loss function
Li(θi),
Li(θi) = Es,a∼p(·)
(3)
where p(s, a) represents a probability distribution of the transitions
stored within the ERM, and Yt is the target:
(cid:104)(Yt − Q(s, a; θt))2(cid:105)
,
Yt ≡ rt +1 + γQ(st +1, argmax
a∈A
Q(st +1, a; θt); θ
′
t).
(4)
Equation (4) is a form of double Q-learning [32] in which the
target action is selected using weights θ, while the target value
is computed using weights θ′ from a target network. The target
network is a more stable version of the current network, with
the weights being copied from current to target network after
every n transitions [33]. Double-DQNs have been shown to reduce
overoptimistic value estimates [33]. This notion is interesting for
our current work, since both leniency and hysteretic Q-learning
attempt to induce sufficient optimism in the early learning phases
to allow the learning agents to converge towards an optimal joint
policy.
Hysteretic Q-Learning. Hysteretic Q-learning [19] is an algo-
rithm designed for decentralised learning in deterministic multi-
agent environments, and which has recently been applied to MA-
DRL as well [22]. Two learning rates are used, α and β, with β < α.
The smaller learning rate β is used whenever an update would
reduce a Q-value. This results in an optimistic update function
which puts more weight on positive experiences, which is shown
to be beneficial in cooperative multi-agent settings. Given a spec-
trum with traditional Q-learning at one end and maximum-based
learning, where negative experiences are completely ignored, at
the other, then hysteretic Q-learning lies somewhere in between
depending on the value chosen for β.
Leniency. Lenient learning was originally introduced by Potter
and De Jong [25] to help cooperative co-evolutionary algorithms
converge towards an optimal policy, and has later been applied
to multi-agent learning as well [24]. It was designed to prevent
relative overgeneralization [36], which occurs when agents gravitate
towards a robust but sub-optimal joint policy due to noise induced
by the mutual influence of each agent's exploration strategy on
others' learning updates.
Leniency has been shown to increase the likelihood of conver-
gence towards the globally optimal solution in stateless coordina-
tion games for reinforcement learning agents [6, 23, 24]. Lenient
learners do so by effectively forgiving (ignoring) sub-optimal ac-
tions by teammates that lead to low rewards during the initial
exploration phase [23, 24]. While initially adopting an optimistic
disposition, the amount of leniency displayed is typically decayed
each time a state-action pair is visited. As a result the agents be-
come less lenient over time for frequently visited state-action pairs
while remaining optimistic within unexplored areas. This transition
to average reward learners helps lenient agents avoid sub-optimal
joint policies in environments that yield stochastic rewards [35].
During training the frequency with which lenient reinforcement
learning agents perform updates that result in lowering the Q-
value of a state action pair (s, a) is determined by leniency and
temperature functions, l(st , at) and Tt(st , at) respectively [35]. The
relation of the temperature function is one to one, with each state-
action pair being assigned a temperature value that is initially set
to a defined maximum temperature value, before being decayed
each time the pair is visited. The leniency function
−K∗Tt(st ,at)
l(st , at) = 1 − e
(5)
uses a constant K as a leniency moderation factor to determine how
the temperature value affects the drop-off in lenience. Following
the update, Tt(st , at) is decayed using a discount factor β ∈ [0, 1]
such that Tt +1(st , at) = β Tt(st , at).
Given a TD-Error δ, where δ = Yt − Q(st , at ; θt), leniency is
applied to a Q-value update as follows:
Q(st , at) =
Q(st , at) + αδ
Q(st , at)
(6)
The random variable x ∼ U(0, 1) is used to ensure that an update
on a negative δ is executed with a probability 1 − l(st , at).
if δ > 0 or x > l(st , at).
if δ ≤ 0 and x ≤ l(st , at).
(cid:40)
Temperature-based exploration. The temperature values main-
tained by lenient learners can also be used to influence the action
selection policy. Recently Wei and Luke [35] introduced Lenient
Multiagent Reinforcement Learning 2 (LMRL2), where the average
temperature of the agent's current state is used with the Boltz-
mann action selection strategy to determine the weight of each
action. As a result agents are more likely to choose a greedy action
within frequently visited states while remaining exploratory for
less-frequented areas of the environment. However, Wei and Luke
[35] note that the choice of temperature moderation factor for the
Boltzmann selection method is a non-trivial task, as Boltzmann
selection is known to struggle to distinguish between Q-Values that
are close together [15, 35].
Average Temperature Folding (ATF). If the agents find them-
selves in the same initial state at the beginning of each episode, then
after repeated interactions the temperature values for state-action
pairs close to the initial state can decay rapidly as they are visited
more frequently. However, it is crucial for the success of the lenient
learners that the temperatures for these state-action pairs remains
sufficiently high for the rewards to propagate back from later stages,
and to prevent the agents from converging upon a sub-optimal
policy [35]. One solution to this problem is to fold the average
temperature for the n actions available to the agent in st +1 into the
AAMAS'18, July 2018, Stockholm, Sweden
which this average temperature T t(st +1) = 1/nn
temperature that is being decayed for (st , at) [35]. The extent to
i =1 Tt(st +1, ai) is
folded in is determined by a constant υ as follows:
Tt +1(st , at) = β
Tt(st , at)
(1 − υ)Tt(st , at) + υT t(st +1)
if st +1 is terminal.
otherwise.
(7)
(cid:40)
Clustering states using autoencoders. In environments with
a high dimensional or continuous state space, a tabular approach
for mapping each possible state-action pair to a temperature as dis-
cussed above is no longer feasible. Binning can be used to discretize
low dimensional continuous state-spaces, however further consid-
erations are required regarding mapping semantically similar states
to a decaying temperature value when dealing with high dimen-
sional domains, such as image observations. Recently, researchers
studying the application of count based exploration to Deep RL
have developed interesting solutions to this problem. For example,
Tang et al. [30] used autoencoders to automatically cluster states
in a meaningful way in challenging benchmark domains including
Montezuma's Revenge.
The autoencoder, consisting of convolutional, dense, and trans-
posed convolutional layers, can be trained using the states stored in
the agent's replay memory [30]. It then serves as a pre-processing
function д : S → RD, with a dense layer consisting of D neurons
with a saturating activation function (e.g. a Sigmoid function) at
the centre. SimHash [9], a locality-sensitive hashing (LSH) function,
can be applied to the rounded output of the dense layer to gener-
ate a hash-key ϕ for a state s. This hash-key is computed using a
constant k × D matrix A with i.i.d. entries drawn from a standard
Gaussian distribution N(0, 1) as
ϕ(s) = sдn(cid:0)A д(s)(cid:1) ∈ {−1, 1}k .
(8)
where д(s) is the autoencoder pre-processing function, and k con-
trols the granularity such that higher values yield a more fine-
grained clustering [30].
4 ALGORITHMIC CONTRIBUTIONS
In the following we describe our main algorithmic contributions.
First we detail our newly proposed Lenient Deep Q-Network, and
thereafter we discuss our extension to Hysteretic DQN, which we
call Scheduled HDQN.
4.1 Lenient Deep Q-Network (LDQN)
Approach. Combining leniency with DQNs requires careful
considerations regarding the use of the temperature values, in par-
ticular when to compute the amount of leniency that should be
applied to a state transition that is sampled from the replay memory.
In our initial trials we used leniency as a mechanism to determine
which transitions should be allowed to enter the ERM. However,
this approach led to poor results, presumably due to the agents de-
veloping a bias during the initial random exploration phase where
transitions were stored indiscriminately. To prevent this bias we use
an alternative approach where we compute and store the amount of
leniency at time t within the ERM tuple: (st−1, at−1, rt , st , l(st , at)t).
The amount of leniency that is stored is determined by the current
temperature value T associated with the hash-key ϕ(s) for state s
Gregory Palmer, Karl Tuyls, Daan Bloembergen, and Rahul Savani
and the selected action a, similar to Eq. (5):
−k×T(ϕ(s),a)
l(s, t) = 1 − e
.
(9)
We use a dictionary to map each (ϕ(s), a) pair encountered to a
temperature value, where the hash-keys are computed using Tang
et al.'s [30] approach described in Section 3. If a temperature value
does not yet exist for (ϕ(s), a) within the dictionary then an entry is
created, setting the temperature value equal to MaxT emperature.
Otherwise the current temperature value is used and subsequently
decayed, to ensure the agent will be less lenient when encountering
a semantically similar state in the future. As in standard DQN the
aim is to minimize the loss function of Eq. (3), with the modification
that for each sample j chosen from the replay memory for which
the leniency conditions of Eq. (6) are not met, are ignored.
Retroactive Temperature Decay Schedule (TDS). During ini-
tial trials we found that temperatures decay rapidly for state-action
pairs belonging to challenging sub-tasks in the environment, even
when using ATF (Section 3). In order to prevent this premature
cooling of temperatures we developed an alternative approach us-
ing a pre-computed temperature decay schedule β0, . . . , βn with a
step limit n. The values for β are computed using an exponent ρ
which is decayed using a decay rate d:
βn = eρ×d t
(10)
for each t, 0 ≤ t < n.
Upon reaching a terminal state the temperature decay schedule
is applied as outlined in Algorithm 1. The aim is to ensure that
temperature values of state-action pairs encountered during the
early phase of an episode are decayed at a slower rate than those
close to the terminal state transition (line 4). We find that main-
taining a slow-decaying maximum temperature ν (lines 5-7) that is
decayed using a decay rate µ helps stabilize the learning process
when ϵ-Greedy exploration is used. Without the decaying maxi-
mum temperature the disparity between the low temperatures in
well explored areas and the high temperatures in relatively unex-
plored areas has a destabilizing effect during the later stages of the
learning process. Furthermore, for agents also using the tempera-
ture values to guide their exploration strategy (see below), ν can
help ensure that the agents transition from exploring to exploiting
within reasonable time. The decaying maximum temperature ν is
used whenever T(ϕ(st−1), at−1) > νt , or when agents fail at their
task in environments where a clear distinction can be made be-
tween success and failure. Therefore TDS is best suited for domains
that yield sparse large rewards.
Applying the TDS after the agents fail at a task could result in the
repeated decay of temperature values for state-action pairs leading
up to a sub-task. For instance, the sub-task of transporting a heavy
item of goods through a doorway may only require a couple of
steps for trained agents who have learned to coordinate. However,
untrained agents may require thousands of steps to complete the
task. If a time-limit is imposed for the agents to deliver the goods,
and the episode ends prematurely while an attempt is made to solve
the sub-task, then the application of the TDS will result in the rapid
decay of the temperature values associated with the frequently en-
countered state-action pairs. We resolve this problem by setting the
temperature values Tt(ϕ(si), ai) > ν to ν at the end of incomplete
Lenient Multi-Agent Deep Reinforcement Learning
AAMAS'18, July 2018, Stockholm, Sweden
Algorithm 1 Application of temperature decay schedule (TDS)
if βnTt(ϕ(si), ai) < νt then
1: Upon reaching a terminal state do
2: n ← 0, steps ← steps taken during the episode
3: for i = steps to 0 do
4:
5:
6:
7:
8:
9:
10: end for
11: ν ← µ ν
Tt +1(ϕ(si), ai) ← βnTt(ϕ(si), ai)
Tt +1(ϕ(si), ai) ← νt
else
end if
n ← n + 1
Figure 1: Lenient-DQN Architecture. We build on the stan-
dard Double-DQN architecture [33] by adding a lenient loss
function (top right, see Section 4.1). Leniency values are
stored in the replay memory along with the state transitions;
we cluster semantically similar states using an autoencoder
and SimHash (bottom left), and apply our retroactive tem-
perature decay schedule (TDS, Algorithm 1). Actions are se-
lected using the T(st)-Greedy exploration method.
runs instead of repeatedly decaying them, thereby ensuring that
the agents maintain a lenient disposition towards one another.
T(st )-Greedy Exploration. During initial trials we encoun-
tered the same problems discussed by Wei and Luke [35] regarding
the selection of the temperature moderation factor for the Boltz-
mann action selection strategy. This led to the development of a
more intuitive T(st)-Greedy exploration method where the aver-
age temperature value T(st) ∈ (0, 1] for a state st replaces the ϵ
in the ϵ-Greedy action selection method. An exponent ξ is used
to control the pace at which the agents transition from explorers
to exploiters. The agent therefore selects action a = arдmaxaQ(a)
with a probability 1 − T(st)ξ and a random action with probability
T(st)ξ . We outline our complete LDQN architecture in Figure 1.
4.2 Scheduled-HDQN (SHDQ)
Hysteretic Q-learners are known to converge towards sub-optimal
joint policies in environments that yield stochastic rewards [35].
However, drawing parallels to lenient learning, where it is desirable
to decay state-action pairs encountered at the beginning of an
episode at a slower rate compared to those close to a terminal state,
we consider that the same principle can be applied to Hysteretic
Q-learning. Subsequently we implemented Scheduled-HDQN with
a pre-computed learning rate schedule β0, . . . , βn where βn is set
to a value approaching α, and for each βt , 0 ≤ t < n, we have βt =
dn−t βn using a decay coefficient d ∈ (0, 1]. The state transitions
encountered throughout each episode are initially stored within a
queue data-structure. Upon reaching a terminal state the n state-
transitions are transferred to the ERM as (st , st +1, rt +1, at , βt ) for
t ∈ {0, . . . , n}. Our hypothesis is that storing β values that approach
α for state-transitions leading to the terminal state will help agents
converge towards optimal joint policies in environments that yield
sparse stochastic rewards.
5 EMPIRICAL EVALUATION
CMOTP Extensions. We subjected our agents to a range of Co-
ordinated Multi-Agent Object Transportation Problems (CMOTPs)
inspired by the scenario discussed in Buşoniu et al. [8], in which
two agents are tasked with delivering one item of goods to a drop-
zone within a grid-world. The agents must first exit a room one
by one before locating and picking up the goods by standing in
the grid cells on the left and right hand side. The task is fully co-
operative, meaning the goods can only be transported upon both
agents grasping the item and choosing to move in the same direc-
tion. Both agents receive a positive reward after placing the goods
inside the drop-zone. The actions available to each agent are to
either stay in place or move left, right, up or down. We subjected
our agents to three variations of the CMOTP, depicted in Figure
2, where each A represents one of the agents, G the goods, and
D-ZONE / DZ mark the drop-zone(s). The layout in sub-figure 2a
is a larger version of the original layout [8], while the layout in
sub-figure 2b introduces narrow-passages between the goods and
the drop-zone, testing whether the agents can learn to coordinate
in order to overcome challenging areas within the environment.
The layout in sub-figure 2c tests the agents' response to stochastic
rewards. Drop-zone 1 (DZ1) yields a reward of 0.8, whereas drop-
zone 2 (DZ2) returns a reward of 1 on 60% of occasions and only 0.4
on the other 40%. DZ1 therefore returns a higher reward on average,
0.8 compared to the 0.76 returned by DZ2. A slippery surface can
be added to introduce stochastic state transitions to the CMOTP,
a common practice within grid-world domains where the agents
move in an unintended direction with a predefined probability at
each time-step.
Setup. We conduct evaluations using a Double-DQN architec-
ture [33] as basis for the algorithms. The Q-network consists of 2
convolutional layers with 32 and 64 kernels respectively, a fully
connected layer with 1024 neurons and an output neuron for each
action. The agents are fed a 16 × 16 tensor representing a gray-
scale version of the grid-world as input. We use the following pixel
values to represent the entities in our grid-world: Aдent1 = 250,
Aдent2 = 200, Goods = 150 and Obstacles = 50. Adam [16] is used
AAMAS'18, July 2018, Stockholm, Sweden
Gregory Palmer, Karl Tuyls, Daan Bloembergen, and Rahul Savani
(a) Original
(b) Narrow-Passage
(c) Stochastic
Figure 2: CMOTP Layouts
to optimize the networks. Our initial experiments are conducted
within a noise free environment, enabling us to speed up the testing
of our LDQN algorithm without having to use an autoencoder for
hashing; instead we apply python's xxhash. We subsequently test
the LDQN with the autoencoder for hashing in a noisy version
of the stochastic reward CMOTP. The autoencoder consists of 2
convolutional Layers with 32 and 64 kernels respectively, 3 fully
connected layers with 1024, 512, and 1024 neurons followed by 2
transposed convolutional layers. For our Scheduled-HDQN agents
we pre-compute β0 to n by setting βn = 0.9 and applying a decay
coefficient of d = 0.99 at each step t = 1 to n, i.e. βn−t = 0.99t βn,
with βn−t being bounded below at 0.4. We summarize the remaining
hyper-parameters in Table 1. In Section 7 we include an extensive
analysis of tuning the leniency related hyper-parameters. We note
at this point that each algorithm used the same learning rate α
specified in Table 1.
Component
Hyper-parameter
Steps between target network synchronization
Setting
0.0001
0.95
5000
250'000
1.0
0.999
0.05
1.0
2.0
-0.01
0.95
1.0
0.999
64
512
DQN-Optimization
ϵ-Greedy Exploration
Leniency
Learning rate α
Discount rate γ
ERM Size
Initial ϵ value
ϵ Decay factor
Minimum ϵ Value
MaxTemperature
TDS Exponent ρ
Temperature Modification Coefficient K
TDS Exponent Decay Rate d
Initial Max Temperature Value ν
Max Temperature Decay Coefficient µ
Autoencoder
HashKey Dimensions k
Number of sigmoidal units in the dense layer D
Table 1: Hyper-parameters
identical actions per state transition. As a result thousands of state
transitions are often required to deliver the goods and receive a re-
ward while the agents explore the environment, preventing the use
of a small replay memory where outdated transitions would be over-
written within reasonable time. As a result standard Double-DQN
architectures struggled to master the CMOTP, failing to coordinate
on a significant number of runs even when confronted with the
relatively simple original CMOTP.
We conducted 30 training runs of 5000 episodes per run for each
LDQN and HDQN configuration. Lenient and hysteretic agents
with β < 0.8 fared significantly better than the standard Double-
DQN, converging towards joint policies that were only a few steps
shy of the optimal 33 steps required to solve the task. Lenient
agents implemented with both ATF and TDS delivered a compara-
ble performance to the hysteretic agents with regards to the average
steps per episode and the coordinated steps percentage measured
over the final 100 steps of each episode (Table 2, left). However,
both LDQN-ATF and LDQN-TDS averaged a statistically significant
higher number of steps per training run compared to hysteretic
agents with β < 0.7. For the hysteretic agents we observe a sta-
tistically significant increase in the average steps per run as the
values for β increase, while the average steps and coordinated steps
percentage over the final 100 episodes remain comparable.
Narrow Passage CMOTP. Lenient agents implemented with
ATF struggle significantly within the narrow-passage CMOTP, as
evident from the results listed in Table 2 (right). We find that the av-
erage temperature values cool off rapidly over the first 100 episodes
within the Pickup and Middle compartments, as illustrated in Fig-
ure 3. Meanwhile agents using TDS manage to maintain sufficient
leniency over the first 1000 episodes to allow rewards to propagate
backwards from the terminal state. We conducted ATF experiments
with a range of values for the fold-in constant υ (0.2, 0.4 and 0.8),
but always witnessed the same outcome. Slowing down the temper-
ature decay would help agents using ATF remain lenient for longer,
with the side-effects of an overoptimistic disposition in stochastic
environments, and an increase in the number of steps required for
convergence if the temperatures are tied to the action selection
policy. Using TDS meanwhile allows agents to maintain sufficient
leniency around difficult sub-tasks within the environment while
being able to decay later transitions at a faster rate. As a result
agents using TDS can learn the average rewards for state transi-
tions close to the terminal state while remaining optimistic for
updates to earlier transitions.
6 DETERMINISTIC CMOTP RESULTS
Original CMOTP. The CMOTP represents a challenging fully
cooperative task for parallel learners. Past research has shown that
deep reinforcement learning agents can converge towards coop-
erative policies in domains where the agents receive feedback for
their individual actions, such as when learning to play pong with
the goal of keeping the ball in play for as long as possible [28].
However, in the CMOTP feedback is only received upon delivering
the goods after a long series of coordinated actions. No immediate
feedback is available upon miscoordination. When using uniform
action selection the agents only have a 20% chance of choosing
Figure 3: Average temperature per compartment
Lenient Multi-Agent Deep Reinforcement Learning
AAMAS'18, July 2018, Stockholm, Sweden
Hyst. β = 0.5
Hyst. β = 0.6
SPE
CSP
SPR
36.4
92%
1'085'982
36.1
92%
1'148'652
36.8
92%
1'408'690
Original CMOTP Results
Hyst. β = 0.7
Hyst. β = 0.8
LDQN ATF
LDQN TDS
Hyst. β = 0.5
528.9
91%
3'495'657
36.9
92%
36.8
92%
1'409'720
1'364'029
45.25
92%
1'594'968
Narrow-Passage CMOTP Results
LDQN ATF
Hyst. β = 0.6
704.9
89%
4'736'936
376.2
90%
3'950'670
LDQN TDS
45.7
92%
2'104'637
Table 2: Deterministic CMTOP Results, including average steps per episode (SPE) over the final 100 episodes, coordinated
steps percentages (CSP) over the final 100 episodes, and the average steps per training run (SPR).
The success of HDQN agents within the narrow-passage CMOTP
depends on the value chosen for β. Agents with β > 0.5 struggle to
coordinate, as we observed over a large range of β values, exem-
plars of which are given in Table 2. The only agents that converge
upon a near optimal joint-policy are those using LDQN-TDS and
HDQN (β = 0.5). We performed a Kolmogorov-Smirnov test with
a null hypothesis that there is no significant difference between
the performance metrics for agents using LDQN-TDS and HDQN
(β = 0.5). We fail to reject the null hypothesis for average steps
per episode and percentage of coordinated steps for the final 100
episodes. However, HDQN (β = 0.5) averaged significantly less
steps per run while maintaining less overhead, replicating previous
observations regarding the strengths of hysteretic agents within
deterministic environments.
7 STOCHASTIC CMOTP RESULTS
In the stochastic setting we are interested in the percentage of runs
for each algorithm that converge upon the optimal joint policy,
which is for the agents to deliver the goods to dropzone 1, yielding
a reward of 0.8, as opposed to dropzone 2 which only returns an
average reward of 0.76 (see Section 5). We conducted 40 runs of
5000 episodes for each algorithm.
As discussed in Section 6, HDQN agents using β > 0.7 frequently
fail to coordinate in the deterministic CMOTP. Therefore, setting
β = 0.7 is the most likely candidate to succeed at solving the sto-
chastic reward CMOTP for standard HDQN architectures. However,
agents using HDQN (β = 0.7) only converged towards the optimal
policy on 42.5% of runs. The scheduled-HDQN performed signifi-
cantly better achieving a 77.5% optimal policy rate. Furthermore
the SHDQN performs well when an additional funnel-like narrow-
passage is inserted close to the dropzones, with 93% success rate.
The drop in performance upon removing the funnel suggests that
the agents are led astray by the optimism applied to earlier tran-
sitions within each episode, presumably around the pickup area
where a crucial decision is made regarding the direction in which
the goods should be transported.
LDQN using ϵ−Greedy exploration performed similar to SHDQN,
converging towards the optimal joint policy on 75% of runs. Mean-
while LDQNs using T(st)-Greedy exploration achieved the highest
percentages of optimal joint-policies, with agents converging on
100% of runs for the following configuration: K = 3.0, d = 0.9,
ξ = 0.25 and µ = 0.9995, which will be discussed in more detail
below. However the percentage of successful runs is related to the
choice of hyperparameters. We therefore include an analysis of
three critical hyperparameters:
• The temperature Modification Coefficient K, that determines
the speed at which agents transition from optimist to average
reward learner (sub-figure 4a). Values: 1, 2 and 3
• The TDS decay-rate d which controls the rate at which tem-
peratures are decayed n-steps prior to the terminal state
(sub-figure 4b). Values: 0.9, 0.95 and 0.99
• T(st)-Greedy exploration exponent ξ, controlling the agent's
transition from explorer to exploiter, with lower values for
ξ encouraging exploration. Values: 0.25, 0.5 and 1.0
(a) Leniency Schedules
(b) TDS
Figure 4: TMC and TDS schedules used during analysis.
We conducted 40 simulation runs for each combination of the
three variables. To determine how well agents using LDQN can cope
with stochastic state transitions we added a slippery surface where
each action results in a random transition with 10% probability
1. The highest performing agents used a steep temperature decay
schedule that maintains high temperatures for early transitions
(d = 0.9 or d = 0.95) with temperature modification coefficients
that slow down the transition from optimist to average reward
learner (K = 2 or k = 3), and exploration exponents that delay
the transition from explorer to exploiter (ξ = 0.25 or ξ = 0.5).
This is illustrated in the heat-maps in Figure 5. When using a TDS
with a more gradual incline (d = 0.99) the temperature values from
earlier state transitions decay at a similar rate to those near terminal
states. In this setting choosing larger values for K increases the
likelihood of the agents converging upon a sub-optimal policy prior
to having established the average rewards available in later states,
as evident from the results plotted in sub-figure 5c. Even when
setting the exploration exponent ξ to 0.25 the agents prematurely
transition to exploiter while holding an overoptimistic disposition
towards follow-on states. Interestingly when K < 3 agents often
converge towards the optimal joint-policy despite setting d = 0.99.
However, the highest percentages of optimal runs (97.5%) were
achieved through combining a steep TDS (d = 0.9 or d = 0.95) with
the slow transition to average reward learner (k = 3) and exploiter
(ξ = 0.25). Meanwhile the lowest percentages for all TDSs resulted
from insufficient leniency (K = 1) and exploration (ξ = 1.0).
Using one of the best-performing configuration (K = 3.0, d = 0.9
and ξ = 0.25) we conducted further trials analyzing the agents'
1Comparable results were obtained during preliminary trials without a slippery surface.
AAMAS'18, July 2018, Stockholm, Sweden
Gregory Palmer, Karl Tuyls, Daan Bloembergen, and Rahul Savani
(a) d = 0.9
(b) d = 0.95
(c) d = 0.99
Figure 5: Analysis of the LDQN hyperparameters. The
heat-maps show the percentage of runs that converged to
the optimal joint-policy (darker is better).
sensitivity to the maximum temperature decay coefficient µ. We
conducted an additional set of 40 runs where µ was increased from
0.999 to 0.9995. Combining T(S)-Greedy with the slow decaying
µ = 0.9995 results in the agents spending more time exploring the
environment at the cost of requiring longer to converge, resulting
in an additional 1'674'106 steps on average per run. However, the
agents delivered the best performance, converging towards the
optimal policy on 100% runs conducted.
Continuous State Space Analysis. Finally we show that se-
mantically similar state-action pairs can be mapped to temperature
values using SimHash in conjunction with an autoencoder. We con-
ducted experiments in a noisy version of the stochastic CMTOP,
where at each time step every pixel value is multiplied by a unique
coefficient drawn from a Gaussian distribution X ∼ N(1.0, 0.01).
A non-sparse tensor is used to represent the environment, with
background cells set to 1.0 prior to noise being applied.
Agents using LDQNs with xxhash converged towards the sub-
optimal joint policy after the addition of noise as illustrated in
Figure 6, with the temperature values decaying uniformly in tune
with ν. LDQN-TDS agents using an autoencoder meanwhile con-
verged towards the optimal policy on 97.5% of runs. It is worth
pointing out that the autoencoder introduces a new set of hyper-
parameters that require consideration, including the size D of the
dense layer at the centre of the autoencoder and the dimensions
K of the hash-key, raising questions regarding the influence of the
granularity on the convergence. We leave this for future work.
Figure 6: Noisy Stochastic CMOTP Average Reward
8 DISCUSSION & CONCLUSION
Our work demonstrates that leniency can help MA-DRL agents
solve a challenging fully cooperative CMOTP using high-dimensional
and noisy images as observations. Having successfully merged
leniency with a Double-DQN architecture raises the question re-
garding how well our LDQN will work with other state of the art
components. We have recently conducted preliminary stochastic
reward CMOTP trials with agents using LDQN with a Prioritized
Experience Replay Memory [1]. Interestingly the agents consistently
converged towards the sub-optimal joint policy. We plan to investi-
gate this further in future work. In addition our research raises the
question how well our extensions would perform in environments
where agents receive stochastic rewards throughout the episode. To
answer this question we plan to test our LDQN within a hunter prey
scenario where each episode runs for a fixed number of time-steps,
with the prey being re-inserted at a random position each time it
is caught [20]. Furthermore we plan to investigate how our LDQN
responds to environments with more than two agent by conducting
CMOTP and hunter-prey scenarios with four agents.
To summarize our contributions:
1) In this work we have shown that leniency can be applied to
MA-DRL, enabling agents to converge upon optimal joint policies
within fully-cooperative environments that require implicit coordi-
nation strategies and yield stochastic rewards.
2) We find that LDQNs significantly outperform standard and
scheduled-HDQNs within environments that yield stochastic re-
wards, replicating findings from tabular settings [35].
3) We introduced two extensions to leniency, including a retroac-
tive temperature decay schedule that prevents the premature decay
of temperatures for state-action pairs and a T(st)-Greedy explo-
ration strategy that encourages agents to remain exploratory in
states with a high average temperature value. The extensions can
in theory also be used by lenient agents within non-deep settings.
4) Our LDQN hyperparameter analysis revealed that the highest
performing agents within stochastic reward domains use a steep
temperature decay schedule that maintains high temperatures for
early transitions combined with a temperature modification coef-
ficient that slows down the transition from optimist to average
reward learner, and an exploration exponent that delays the transi-
tion from explorer to exploiter.
5) We demonstrate that the CMOTP [8] can be used as a benchmark-
ing environment for MA-DRL, requiring reinforcement learning
agents to learn fully-cooperative joint-policies from processing
high dimensional and noisy image observations.
6) Finally, we introduce two extensions to the CMOTP. First we
include narrow passages, allowing us to test lenient agents' abil-
ity to prevent the premature decay of temperature values. Our
second extension introduces two dropzones that yield stochastic
rewards, testing the agents' ability to converge towards an optimal
joint-policy while receiving misleading rewards.
9 ACKNOWLEDGMENTS
We thank the HAL Allergy Group for partially funding the PhD of
Gregory Palmer and gratefully acknowledge the support of NVIDIA
Corporation with the donation of the Titan X Pascal GPU that
enabled this research.
Lenient Multi-Agent Deep Reinforcement Learning
AAMAS'18, July 2018, Stockholm, Sweden
[27] Peter Sunehag, Guy Lever, Audrunas Gruslys, Wojciech Marian Czarnecki, Vini-
cius Zambaldi, Max Jaderberg, Marc Lanctot, Nicolas Sonnerat, Joel Z Leibo, Karl
Tuyls, and Thore Graepel. 2017. Value-Decomposition Networks For Cooperative
Multi-Agent Learning. arXiv preprint arXiv:1706.05296 (2017).
[28] Ardi Tampuu, Tambet Matiisen, Dorian Kodelja, Ilya Kuzovkin, Kristjan Kor-
jus, Juhan Aru, Jaan Aru, and Raul Vicente. 2017. Multiagent cooperation and
competition with deep reinforcement learning. PLoS One 12, 4 (2017), e0172395.
[29] Ming Tan. 1993. Multi-agent reinforcement learning: Independent vs. cooperative
agents. In Proceedings of the tenth international conference on machine learning.
330–337.
[30] Haoran Tang, Rein Houthooft, Davis Foote, Adam Stooke, Xi Chen, Yan Duan,
John Schulman, Filip De Turck, and Pieter Abbeel. 2016. # Exploration: A Study
of Count-Based Exploration for Deep Reinforcement Learning. arXiv preprint
arXiv:1611.04717 (2016).
[31] Karl Tuyls and Gerhard Weiss. 2012. Multiagent Learning: Basics, Challenges,
and Prospects. AI Magazine 33, 3 (2012), 41–52.
[32] Hado Van Hasselt. 2010. Double Q-learning. In Advances in Neural Information
Processing Systems. 2613–2621.
[33] Hado Van Hasselt, Arthur Guez, and David Silver. 2016. Deep Reinforcement
Learning with Double Q-Learning. AAAI (2016), 2094–2100.
[34] Christopher JCH Watkins and Peter Dayan. 1992. Q-learning. Machine learning
8, 3-4 (1992), 279–292.
[35] Ermo Wei and Sean Luke. 2016. Lenient Learning in Independent-Learner Sto-
chastic Cooperative Games. Journal of Machine Learning Research 17, 84 (2016),
1–42. http://jmlr.org/papers/v17/15-417.html
[36] R Paul Wiegand. 2003. An analysis of cooperative coevolutionary algorithms. Ph.D.
Dissertation. George Mason University Virginia.
[37] Yinliang Xu, Wei Zhang, Wenxin Liu, and Frank Ferrese. 2012. Multiagent-based
reinforcement learning for optimal reactive power dispatch. IEEE Transactions
on Systems, Man, and Cybernetics, Part C (Applications and Reviews) 42, 6 (2012),
1742–1751.
MIT press.
REFERENCES
[1] Ioannis Antonoglou, John Quan Tom Schaul, and David Silver. 2015. Prioritized
Experience Replay. arXiv preprint arXiv:1511.05952 (2015).
[2] Tucker Balch and Ronald C Arkin. 1994. Communication in reactive multiagent
robotic systems. Autonomous robots 1, 1 (1994), 27–52.
[3] Nikos Barbalios and Panagiotis Tzionas. 2014. A robust approach for multi-agent
natural resource allocation based on stochastic optimization algorithms. Applied
Soft Computing 18 (2014), 12–24.
[4] Andrew Barto and Richard Sutton. 1998. Reinforcement learning: An introduction.
[5] Daan Bloembergen, Daniel Hennes, Michael Kaisers, and Karl Tuyls. 2015. Evo-
lutionary dynamics of multi-agent learning: A survey. Journal of Artificial Intelli-
gence Research 53 (2015), 659–697.
[6] Daan Bloembergen, Michael Kaisers, and Karl Tuyls. 2011. Empirical and the-
oretical support for lenient learning. In The 10th International Conference on
Autonomous Agents and Multiagent Systems-Volume 3. International Foundation
for Autonomous Agents and Multiagent Systems, 1105–1106.
[7] Lucian Busoniu, Robert Babuska, and Bart De Schutter. 2008. A comprehensive
survey of multiagent reinforcement learning. IEEE Transactions on Systems, Man,
And Cybernetics-Part C: Applications and Reviews, 38 (2), 2008 (2008).
[8] Lucian Buşoniu, Robert Babuška, and Bart De Schutter. 2010. Multi-agent re-
inforcement learning: An overview. In Innovations in multi-agent systems and
applications-1. Springer, 183–221.
[9] Moses S Charikar. 2002. Similarity estimation techniques from rounding algo-
rithms. In Proceedings of the thiry-fourth annual ACM symposium on Theory of
computing. ACM, 380–388.
[10] Tim de Bruin, Jens Kober, Karl Tuyls, and Robert Babuška. 2015. The importance
of experience replay database composition in deep reinforcement learning. In
Deep Reinforcement Learning Workshop, NIPS.
[11] Jakob Foerster, Nantas Nardelli, Gregory Farquhar, Philip Torr, Pushmeet Kohli,
Shimon Whiteson, et al. 2017. Stabilising Experience Replay for Deep Multi-Agent
Reinforcement Learning. arXiv preprint arXiv:1702.08887 (2017).
[12] Shixiang Gu, Ethan Holly, Timothy Lillicrap, and Sergey Levine. 2016. Deep
Reinforcement Learning for Robotic Manipulation with Asynchronous Off-Policy
Updates. arXiv preprint arXiv:1610.00633 (2016).
[13] Jayesh K Gupta, Maxim Egorov, and Mykel Kochenderfer. 2017. Cooperative
Multi-Agent Control Using Deep Reinforcement Learning. In Proceedings of the
Adaptive and Learning Agents workshop (at AAMAS 2017).
[14] Pablo Hernandez-Leal, Michael Kaisers, Tim Baarslag, and Enrique Munoz de
Cote. 2017. A Survey of Learning in Multiagent Environments: Dealing with
Non-Stationarity. arXiv preprint arXiv:1707.09183 (2017).
[15] Leslie Pack Kaelbling, Michael L Littman, and Andrew W Moore. 1996. Rein-
forcement learning: A survey. Journal of artificial intelligence research 4 (1996),
237–285.
[16] Diederik P. Kingma and Jimmy Ba. 2014. Adam: A Method for Stochastic Optimiza-
tion. In Proceedings of the 3rd International Conference on Learning Representations
(ICLR).
[17] Guillaume Lample and Devendra Singh Chaplot. 2017. Playing FPS Games with
Deep Reinforcement Learning. AAAI (2017), 2140–2146.
[18] Long-H Lin. 1992. Self-improving reactive agents based on reinforcement learn-
ing, planning and teaching. Machine learning 8, 3/4 (1992), 69–97.
[19] Laëtitia Matignon, Guillaume J Laurent, and Nadine Le Fort-Piat. 2007. Hysteretic
q-learning: an algorithm for decentralized reinforcement learning in cooperative
multi-agent teams. In Intelligent Robots and Systems, 2007. IROS 2007. IEEE/RSJ
International Conference on. IEEE, 64–69.
[20] Laetitia Matignon, Guillaume J Laurent, and Nadine Le Fort-Piat. 2012. Indepen-
dent reinforcement learners in cooperative Markov games: a survey regarding
coordination problems. The Knowledge Engineering Review 27, 1 (2012), 1–31.
[21] Volodymyr Mnih, Koray Kavukcuoglu, David Silver, Andrei A Rusu, Joel Veness,
Marc G Bellemare, Alex Graves, Martin Riedmiller, Andreas K Fidjeland, Georg
Ostrovski, et al. 2015. Human-level control through deep reinforcement learning.
Nature 518, 7540 (2015), 529–533.
[22] Shayegan Omidshafiei, Jason Pazis, Christopher Amato, Jonathan P How, and
John Vian. 2017. Deep decentralized multi-task multi-agent reinforcement learn-
ing under partial observability. In International Conference on Machine Learning.
2681–2690.
[23] Liviu Panait, Keith Sullivan, and Sean Luke. 2006. Lenient learners in cooperative
multiagent systems. In Proceedings of the fifth international joint conference on
Autonomous agents and multiagent systems. ACM, 801–803.
[24] Liviu Panait, Karl Tuyls, and Sean Luke. 2008. Theoretical advantages of le-
nient learners: An evolutionary game theoretic perspective. Journal of Machine
Learning Research 9, Mar (2008), 423–457.
[25] Mitchell A Potter and Kenneth A De Jong. 1994. A cooperative coevolutionary
approach to function optimization. In International Conference on Parallel Problem
Solving from Nature. Springer, 249–257.
[26] Tom Schaul, John Quan, Ioannis Antonoglou, and David Silver. 2015. Prioritized
experience replay. arXiv preprint arXiv:1511.05952 (2015).
|
1005.4877 | 5 | 1005 | 2015-02-05T09:40:35 | Set-Monotonicity Implies Kelly-Strategyproofness | [
"cs.MA"
] | This paper studies the strategic manipulation of set-valued social choice functions according to Kelly's preference extension, which prescribes that one set of alternatives is preferred to another if and only if all elements of the former are preferred to all elements of the latter. It is shown that set-monotonicity---a new variant of Maskin-monotonicity---implies Kelly-strategyproofness in comprehensive subdomains of the linear domain. Interestingly, there are a handful of appealing Condorcet extensions---such as the top cycle, the minimal covering set, and the bipartisan set---that satisfy set-monotonicity even in the unrestricted linear domain, thereby answering questions raised independently by Barber\`a (1977) and Kelly (1977). | cs.MA | cs |
Set-Monotonicity Implies
Kelly-Strategyproofness
Felix Brandt
Technische Universitat Munchen
Munich, Germany
[email protected]
This paper studies the strategic manipulation of set-valued social choice
functions according to Kelly's preference extension, which prescribes that
one set of alternatives is preferred to another if and only if all elements
of the former are preferred to all elements of the latter.
It is shown that
set-monotonicity -- a new variant of Maskin-monotonicity -- implies Kelly-
strategyproofness in comprehensive subdomains of the linear domain.
In-
terestingly, there are a handful of appealing Condorcet extensions -- such as
the top cycle, the minimal covering set, and the bipartisan set -- that satisfy
set-monotonicity even in the unrestricted linear domain, thereby answering
questions raised independently by Barber`a (1977a) and Kelly (1977).
Keywords: Social Choice Theory, Strategyproofness, Kelly's Preference Extension
JEL Classifications Codes: D71, C70
1. Introduction
One of the central results in microeconomic theory states that every non-trivial so-
cial choice function (SCF) -- a function mapping individual preferences to a collective
choice -- is susceptible to strategic manipulation (Gibbard, 1973; Satterthwaite, 1975).
However, the classic theorem by Gibbard and Satterthwaite only applies to resolute, i.e.,
single-valued, SCFs. The notion of a resolute SCF is rather restricted and artificial.1
For example, consider a situation with two agents and two alternatives such that each
1For instance, Gardenfors (1976) claims that "[resoluteness] is a rather restrictive and unnatural as-
sumption." In a similar vein, Kelly (1977) writes that "the Gibbard-Satterthwaite theorem [. . . ] uses
an assumption of singlevaluedness which is unreasonable" and Taylor (2005) that "If there is a weak-
ness to the Gibbard-Satterthwaite theorem, it is the assumption that winners are unique." This senti-
ment is echoed by various other authors (see, e.g., Barber`a, 1977b; Feldman, 1979b; Bandyopadhyay,
1983a,b; Duggan and Schwartz, 2000; Nehring, 2000; Ching and Zhou, 2002).
1
agent prefers a different alternative. The problem is not that a resolute SCF has to pick
a single alternative (which is a well-motivated practical requirement), but that it has to
pick a single alternative based on the individual preferences alone (see also, Kelly, 1977).
As a consequence, resoluteness is at variance with elementary notions of fairness such as
neutrality and anonymity.
In order to remedy this shortcoming, Gibbard (1977) went on to characterize the class
of strategyproof social decision schemes (SDSs), i.e., aggregation functions that yield
probability distributions over the set of alternatives rather than single alternatives (see
also Gibbard, 1978; Barber`a, 1979). This class consists of rather degenerate SDSs and
Gibbard's characterization is therefore often interpreted as another impossibility result.
However, Gibbard's theorem rests on unusually strong assumptions with respect to the
agents' preferences. In contrast to the traditional setup in social choice theory, which
typically only involves ordinal preferences, his result relies on the expected utility axioms
of von Neumann and Morgenstern (1947), and hence on the existence of linear utility
functions, in order to compare lotteries over alternatives.
The gap between Gibbard and Satterthwaite's theorem for resolute SCFs and
Gibbard's theorem for SDSs has been filled by a number of
impossibility re-
sults with varying underlying notions of how to compare sets of alternatives with
each other (e.g., Gardenfors, 1976; Barber`a, 1977a,b; Kelly, 1977; Feldman, 1979a;
MacIntyre and Pattanaik, 1981; Bandyopadhyay, 1982, 1983b; Duggan and Schwartz,
2000; Barber`a et al., 2001; Ching and Zhou, 2002; Sato, 2008; Umezawa, 2009), many
of which are surveyed by Taylor (2005) and Barber`a (2010). In this paper, we will be
concerned with the one of the weakest (and therefore least controversial) preference ex-
tensions from alternatives to sets due to Kelly (1977). According to this definition, a
set of alternatives is weakly preferred to another set of alternatives if all elements of
the former are weakly preferred to all elements of the latter. A nice aspect of Kelly's
preference extension is that its underlying behavioral assumptions are quite minimalistic
(which strengthens impossibility results), yet reasonable enough to motivate meaning-
ful positive results. Kelly's extension models that the agents are complete unaware of
the tie-breaking mechanism that is used to eventually pick a single alternative. The
question pursued in this paper is whether this uncertainty can be exploited to achieve
strategyproofness.
Barber`a (1977a) and Kelly (1977) have shown independently that all non-trivial SCFs
that are rationalizable via a quasi-transitive relation are manipulable according to Kelly's
extension.2 However, it is it well-known that (quasi-transitive) rationalizability by itself
is unduly restrictive (see, e.g., Mas-Colell and Sonnenschein, 1972). As a consequence,
Kelly (1977) concludes his paper by contemplating that "one plausible interpretation
of such a theorem is that, rather than demonstrating the impossibility of reasonable
strategy-proof social choice functions, it is part of a critique of the regularity [ratio-
nalizability] conditions" and Barber`a (1977a) states that "whether a nonrationalizable
collective choice rule exists which is not manipulable and always leads to nonempty
choices for nonempty finite issues is an open question." Also referring to nonrationaliz-
2Barber`a (1977a) actually uses an extension that is even weaker than that of Kelly (1977).
2
able choice functions, Kelly (1977) writes: "it is an open question how far nondictatorship
can be strengthened in this sort of direction and still avoid impossibility results." The
condition of rationalizability has been significantly weakened in subsequent impossibil-
ity results (MacIntyre and Pattanaik, 1981; Bandyopadhyay, 1982, 1983b). At the same
time, it has been noted that more positive results can be obtained for antisymmetric
(i.e., linear) individual preferences. In particular, it was shown that the omninomina-
tion rule (Gardenfors, 1976), the Pareto rule (Feldman, 1979a,b), the Condorcet rule
(Gardenfors, 1976; Nehring, 2000), and the top cycle (MacIntyre and Pattanaik, 1981;
Bandyopadhyay, 1983a; Sanver and Zwicker, 2012) are strategyproof when preference
are linear (see Remark 1 for more details about these SCFs). However, all these rules
are very indecisive and the latter two may even return Pareto-dominated alternatives.
In this paper, we propose a new variant of Maskin-monotonicity for set-valued SCFs
called set-monotonicity and show that all set-monotonic SCFs are strategyproof in suf-
ficiently rich subdomains of the linear domain. This covers all of the positive results
mentioned above and proves that some -- much more discriminating -- SCFs are strate-
gyproof. Set-monotonicity requires the invariance of choice sets under the weakening
of unchosen alternatives and is satisfied by the omninomination rule, the Pareto rule,
the Condorcet rule, and a handful of appealing Condorcet extensions such as top cycle,
the minimal covering set, and the bipartisan set. Since set-monotonicity coincides with
Maskin-monotonicity in the context of resolute SCFs, this characterization can be seen
as a set-valued generalization of the Muller and Satterthwaite (1977) theorem.
Nehring (2000) has proved a similar extension of the Muller-Sattherthwaite theorem
by showing that Maskin-monotonicity implies strategyproofness of set-valued SCFs in
a sense marginally weaker than that of Kelly (see also Remark 6).3 However, while
Maskin-monotonicity is prohibitive in the general domain, set-monotonicity is not. The
conditions themselves are independent, but we show that Maskin-montonicity implies
set-monotonicity when assuming independence of unchosen alternatives.
We conclude the paper with a number of remarks concerning group-strategyproofness,
stronger preference extensions, weak preferences, weaker domain conditions, and strate-
gic abstention.
2. Preliminaries
Let N = {1, . . . , n} be a finite set of agents, A a finite and nonempty set of alternatives,
and L the set of all linear (i.e., complete, transitive, and antisymmetric) preference
relations over A. For Ri ∈ L , x Ri y denotes that agent i values alternative x at least
as much as alternative y. We write Pi for the strict part of Ri, i.e., x Pi y if x Ri y but
not y Ri x. The (strict) lower contour set of alternative x with respect to Pi is denoted
by L(x, Ri) = {y ∈ A : x Pi y}. For convenience, we will represent preference relations
3According to Nehring's definition, a manipulator is only better off if he strictly prefers all alternatives
in the new choice set to all alternatives in the original choice set. For linear preferences, the two
definitions only differ in whether there can be a single alternative at the intersection of both choice
sets or not.
3
as comma-separated lists. For example, a Pi b Pi c will be written as Ri : a, b, c. Two
distinct alternatives x and y are adjacent in Ri if there is no z with x Pi z Pi y.
i ⊆ R′′
A (Cartesian) domain of preference profiles D is defined as D = Qi∈N
Di ⊆ L N .
The maximal domain L N will be referred to as the general domain. We say that R′′
lies in the comprehensive closure of R and R′ if for all i ∈ N , Ri ∩ R′
i . A
domain D is comprehensive if for all R, R′ ∈ D and R′′ ∈ L N such that R′′ lies in the
comprehensive closure of R and R′, R′′ ∈ D (Nehring, 2000). For example, the domain
of all linear extensions of a fixed partial order is comprehensive. For a given preference
profile R ∈ D, R−i = (R1, . . . , Ri−1, Ri+1, . . . , Rn) denotes the vector of all preference
relations except that of agent i. An alternative x ∈ A is called a Condorcet winner if
{i ∈ N : x Pi y} > n/2 for all y ∈ A \ {x}.
Our central object of study are social choice functions. A social choice function (SCF)
is a function f that maps a preference profile R ∈ D to a nonempty subset of alternatives
f (R). f is resolute if f (R) = 1 for all R ∈ D. A Condorcet extension is an SCF that
uniquely selects a Condorcet winner whenever one exists.
2.1. Monotonicity
We will consider three variants of monotonicity: a weak standard notion and two
strengthenings, one of which was proposed by Maskin (1999) and one of which is new to
this paper. For a given preference profile R, an agent i, and two adjacent alternatives
x, y such that y Pi x, Ri:(x,y) denotes the preference profile in which agent i swapped
alternatives x and y and that is otherwise identical to R.
Definition 1. Let R, R′ ∈ D, i ∈ N , and x, y ∈ A such that R′ = Ri:(x,y). Then, SCF f
satisfies monotonicity, Maskin-monotonicity, or set-monotonicity, if
x ∈ f (R) implies x ∈ f (R′),
(monotonicity)
z ∈ f (R) and y ∈ A \ {z} implies z ∈ f (R′), or
Z = f (R) and y ∈ A \ Z implies Z = f (R′), respectively.
(Maskin-monotonicity)
(set-monotonicity)
The intuitive meaning of these definitions is as follows. An SCF satisfies monotonicity
if a chosen alternative remains in the choice set when it is strengthened with respect to
another alternative; it satisfies Maskin-monotonicity if a chosen alternative remains in
the choice set when weakening another alternative; and it satisfies set-monotonicity if
the choice set is invariant under the weakening of unchosen alternatives.4 5
Clearly, Maskin-monotonicity implies monotonicity and, as will be shown in Propo-
sition 2, set-monotonicity also implies monotonicity. Despite the similar appearance,
set-monotonicity is logically independent of Maskin-monotonicity. Set-monotonicity has
4Sanver and Zwicker (2012) study monotonicity properties for set-valued SCFs in general. None of the
properties they consider is equivalent to set-monotonicity.
5Note that set-monotonicity is in conflict with decisiveness. For instance, non-trivial set-monotonic
SCFs cannot satisfy the (rather strong) positive responsiveness condition introduced by Barber`a
(1977b).
4
a stronger antecedent and a stronger consequence. For example, consider a comprehen-
sive single-agent domain consisting of the relations R1 and R′
1 given by
R1 : a, b, c,
R′
b, a, c.
1 :
and
If we define SCF f by letting f ((R1)) = {c} and f ((R′
monotonicity, but violates set-monotonicity.
letting f ((R1)) = {a, b, c} and f ((R′
Maskin-monotonicity.
1)) = {b, c}, f satisfies Maskin-
If, on the other hand, we define f by
1)) = {b, a}, f satisfies set-monotonicity, but violates
Set-monotonicity coincides with Maskin-monotonicity in the context of resolute SCFs.
Under the condition of independence of unchosen alternatives which is satisfied by var-
ious set-valued SCFs, set-monotonicity is weaker than Maskin-monotonicity. Moreover,
set-monotonicity implies independence of unchosen alternatives. Independence of uncho-
sen alternatives was introduced by Laslier (1997) in the context of tournament solutions
(as "independence of the losers") and requires that the choice set is invariant under
modifications of the preference profile with respect to unchosen alternatives.
Definition 2. An SCF f satisfies independence of unchosen alternatives (IUA) if for
all R, R′ ∈ D such that Ri{x,y} = R′
i{x,y} for all x ∈ f (R), y ∈ A, and i ∈ N ,
f (R) = f (R′).
Proposition 1. Maskin-monotonicity and IUA imply set-monotonicity.
Proof. Let f be an SCF, R ∈ D, i ∈ N , x ∈ A, y ∈ A \ f (R), and R′ = Ri:(x,y).
Maskin-monotonicity implies that f (R) ⊆ f (R′). Now, assume for contradiction that
there is some x′ ∈ f (R′) \ f (R). Since x′ 6∈ f (R), it follows from Maskin-monotonicity
that there is some y′ ∈ A that is strengthened with respect to x′ when moving from R′
to R. Hence, R′ = Ri:(x′,y′), x′ = x, and y′ = y. Since x = x′ 6∈ f (R) and y 6∈ f (R) by
assumption, IUA implies that f (R) = f (R′), a contradiction.
Proposition 2. Set-monotonicity implies monotonicity and IUA.
Proof. We first show that set-monotonicity implies monotonicity. Let f be a set-
monotonic SCF, R ∈ D, i ∈ N , x ∈ f (R), y ∈ A, and R′ ∈ Ri:(x,y). Clearly, in case
y 6∈ f (R), set-monotonicity implies that f (R′) = f (R) and thus x ∈ f (R′). If, on the
other hand, y ∈ f (R), assume for contradiction that x 6∈ f (R′). When moving from R′
to R, y is strengthened with respect to outside alternative x, and set-monotonicity again
implies that f (R) = f (R′), a contradiction. The fact that set-monotonicity implies IUA
is straightforward from the definitions.
2.2. Strategyproofness
An SCF is manipulable if an agent can misrepresent his preferences in order to obtain a
more preferred outcome. Whether one choice set is preferred to another depends on how
the preferences over individual alternatives are to be extended to sets of alternatives.
5
In the absence of information about the tie-breaking mechanism that eventually picks a
single alternative from any choice set, preferences over choice sets are obtained by the
conservative extension bRi (Kelly, 1977), where for any pair of nonempty sets X, Y ⊆ A
and preference relation Ri,
X bRi Y if and only if x Ri y for all x ∈ X and y ∈ Y .
Clearly, in all but the simplest cases, bRi is incomplete, i.e., many pairs of choice sets are
incomparable. The strict part of bRi is denoted by bPi, i.e., X bPi Y if and only if X bRi Y
and x Pi y for at least one pair of x ∈ X and y ∈ Y . For linear preferences, X bPi Y if
and only if x Pi y for all x ∈ X and y ∈ Y with x 6= y. Hence, X ∩ Y ≤ 1.
Definition 3. An SCF is Kelly-strategyproof if there exist no R, R′ ∈ D and i ∈ N
with R−i = R′
−i such that f (R′) bPi f (R).
Kelly-strategyproofness is a very weak notion of strategyproofness. Nevertheless, most
well-known SCFs such as plurality, Borda's rule, Copeland's rule, Slater's rule, or plu-
rality with runoff fail to be Kelly-strategyproof in the general domain (see, e.g., Taylor,
2005, Theorem 2.2.2).
Muller and Satterthwaite (1977) have shown that, in the general domain, a resolute
SCF is strategyproof if and only if it satisfies Maskin-monotonicity. Unfortunately, as
famously shown by Gibbard (1973) and Satterthwaite (1975), only dictatorial or im-
posing resolute SCFs satisfy Maskin-monotonicity in the general domain. However,
Maskin-monotonicity still implies strategyproofness of resolute SCFs in many restricted
domains of interest (see, e.g., Klaus and Bochet, 2013), including the class of compre-
hensive domains considered in this paper (Nehring, 2000).
3. The Result
Theorem 1. Every set-monotonic SCF on a comprehensive domain is Kelly-
strategyproof.
Proof. Let f be a set-monotonic SCF and D a comprehensive domain. We first show
that set-monotonicity is equivalent to a version of set-monotonicity that is not restricted
to pairwise swaps of adjacent alternatives. Rather, we require that choice sets may only
change if an alternative is removed from a lower contour set of a chosen alternative. For
R, R′ ∈ D and i ∈ N with R−i = R′
−i, we say that R′ is an f -improvement over R if
for all x ∈ f (R), L(x, Pi) ⊆ L(x, P ′
i ). We claim that if R′ is an f -improvement over R,
then f (R′) = f (R). The statement can be shown by induction on d(R, R′) = Ri \ R′
i.
The induction basis is trivially satisfied because R = R′ if d(R, R′) = 0. Assume the
statement is true for all R and R′ with d(R, R′) < k and consider R and R′ such
that d(R, R′) = k. Since R 6= R′, there have to be two alternatives x, y ∈ A such
that x Pi y and y P ′
i, we may furthermore
assume that x and y are adjacent in Ri. (However, x and y need not be adjacent in
R′
i.) x 6∈ f (R) because otherwise R′ is not an f -improvement over R. Set-monotonicity
i x. Due to the transitivity of Ri and R′
6
implies that f (Ri:(y,x)) = f (R) and comprehensiveness that Ri:(y,x) ∈ D.
It follows
from d(Ri:(y,x), R′) < k and the induction hypothesis that f (Ri:(y,x)) = f (R′). Hence,
f (R) = f (R′),
Now, for the proof of the statement of the theorem, assume for contradiction that f is
not Kelly-strategyproof. Then, there have to be R, R′ ∈ D, and i ∈ N with R−i = R′
such that f (R′) bPi f (R). The latter obviously entails that f (R) 6= f (R′). The proof
idea is to find some R∗ in the comprehensive closure of R and R′ (and hence in D) such
that R∗ is an f -improvement over both R and R′, which implies that f (R) = f (R′), a
contradiction.
−i
Let m ∈ f (R′) such that L(m, Pi) ∩ f (R′) = ∅. In other words, m is the alternative in
f (R′) that is ranked lowest in Ri. Note that, if f (R) ∩ f (R′) 6= ∅, then f (R) ∩ f (R′) =
{m}. Next, we partition A into the strict lower contour set and the upper contour set
of m with respect to Ri, i.e., L = L(m, Pi) and U = A \ L and define a new preference
profile by letting
R∗
i = RiL ∪ R′
iU ∪ {(x, y) : x ∈ U, y ∈ L},
is ranked as in R′
i and the lower part as in Ri, and R∗ =
i.e., the upper part of R∗
i
(R−i, R∗
i ) = (R′
−i, R∗
i ).
x, y ∈ A with x R∗
R∗
R∗ lies in the comprehensive closure of R and R′ (and hence in D) because for all
i y. For x, y ∈ U , this follows from
i y, we have x Ri y or x R′
iU ; for x, y ∈ L, from R∗
i U = R′
R∗ is an f -improvement over R because f (R) ⊆ L∪{m} and L(x, P ∗
x ∈ L and L(m, P ∗
R∗ is an f -improvement over R′ because f (R′) ⊆ U and L(x, P ∗
x ∈ U . Hence, set-monotonicity implies that f (R∗) = f (R′) 6= f (R), a contradiction.
i ) = L(x, Pi) for all
i ) ⊇ L(m, Pi) = L. Set-monotonicity then implies that f (R∗) = f (R).
i ) ∪ L for all
i L = RiL; and for x ∈ U, y ∈ L from (x, y) ∈ Ri.
i ) = L(x, P ′
We conclude the paper with nine remarks.
Remark 1 (Set-monotonic SCFs). There are a number of rather attractive SCFs
that satisfy set-monotonicity in the general domain L N . In particular, every monotonic
SCF that satisfies the strong superset property (SSP) (i.e., choice sets are invariant
under the removal of unchosen alternatives) also satisfies set-monotonicity.6 Prominent
Condorcet extensions that satisfy both SSP and monotonicity include the Condorcet
rule (which selects a Condorcet winner whenever one exists and returns all alternatives
otherwise), the top cycle (also known as weak closure maximality, GETCHA, or the Smith
set) (Good, 1971; Smith, 1973; Bordes, 1976; Sen, 1977; Schwartz, 1986), the minimal
covering set (Dutta, 1990), the bipartisan set (Laffond et al., 1993) and variations of
6The strong superset property goes back to early work by Chernoff (1954) (where it was called
postulate 5∗) and is also known as bα (Brandt and Harrenstein, 2011), the attention filter axiom
(Masatlioglu et al., 2012), and outcast (Aizerman and Aleskerov, 1995). The term strong superset
property was first used by Bordes (1979). We refer to Monjardet (2008) for a more thorough discus-
sion of the origins of this condition.
7
these (see Laslier, 1997; Dutta and Laslier, 1999; Laslier, 2000; Brandt, 2011).78 Two
other SCFs that satisfy set-monotonicity are the Pareto rule and the omninomination
rule (which returns all alternatives that are top-ranked by at least one agent).
Remark 2 (Coarsenings of Kelly-strategyproof SCFs). For two SCFs f, f ′, we
say that f is a coarsening of f ′ if f ′(R) ⊆ f (R) for all R ∈ D. Kelly's preference
extension has the useful property that X bPi Y implies X ′ bPi Y ′ for all non-singleton
subsets X ′ ⊆ X and Y ′ ⊆ Y . Hence, every coarsening f of a Kelly-strategyproof SCF
f ′ is Kelly-strategyproof if f (R) = f ′(R) whenever f ′(R) = 1. As a consequence, the
(McKelvey) uncovered set (see Duggan, 2013), a coarsening of the minimal covering set
that returns singletons if and only if there is a Condorcet winner, is Kelly-strategyproof,
even though it violates set-monotonicity.9 In light of these comments, it seems interesting
to try to identify inclusion-minimal Kelly-strategyproof SCFs.
Remark 3 (Group-strategyproofness). The proof of Theorem 1 can be straightfor-
wardly extended to show that no group of agents can misstate their preferences in order
to obtain a more preferred outcome.
Remark 4 (Fishburn-strategyproofness).
It has been shown in other work that
Theorem 1 does not carry over to slightly more complete set extensions due to
Fishburn and Gardenfors (Brandt and Brill, 2011).
In fact, Pareto-optimality and
Fishburn-strategyproofness are already incompatible within the class of majoritarian
SCFs (Brandt and Geist, 2014).
Remark 5 (Necessary conditions).
It seems like there are no natural necessary
conditions for Kelly-strategyproofness as long as preferences are linear. For example,
any SCF f such that f (R) > (A/2) + 1 for all R ∈ D satisfies Kelly-strategyproofness
simply because no pair of resulting choice sets is comparable. This observation allows
one to easily construct Kelly-strategyproof SCFs that violate set-monotonicity, Maskin-
monotonicity, or any other reasonable form of monotonicity.
Remark 6 (Weak preferences). When individual preference relations do not have
to be antisymmetric, a number of results mentioned in the introduction rule out the
possibility of reasonable Kelly-strategyproof SCFs. A new result of this kind, which
strengthens some existing theorems, is given as Theorem 2 in the Appendix.
7Remarkably, the robustness of the minimal covering set and the bipartisan set with respect to strategic
manipulation also extends to agenda manipulation. The strong superset property precisely states that
an SCF is resistant to adding and deleting losing alternatives (see also the discussion by Bordes, 1983).
Moreover, both SCFs are composition-consistent, i.e., they are strongly resistant to the introduction
of clones (Laffond et al., 1996). Scoring rules like plurality and Borda's rule are prone to both
types of agenda manipulation (Laslier, 1996; Brandt and Harrenstein, 2011) as well as to strategic
manipulation.
8Another prominent Condorcet extension -- the tournament equilibrium set (Schwartz, 1990) -- was con-
jectured to satisfy SSP and monotonicity for almost 20 years. This conjecture was recently disproved
by Brandt et al. (2013). In fact, it can be shown that the tournament equilibrium set as well as the
related minimal extending set (Brandt, 2011) can be Kelly-manipulated.
9For generalized strategyproofness as defined by Nehring (2000) (see Remark 6), the second condition
is not required and every coarsening of a strategyproof SCF is strategyproof.
8
The proof of Theorem 1 can be adapted for weak preferences to show that set-
monotonicity implies Nehring's generalized strategyproofness, a weakening of Kelly-
strategyproofness (Nehring, 2000).10 Generalized strategyproofness is defined by letting
agent i prefer set X to set Y if and only if x Pi y for all x ∈ X and y ∈ Y .
Remark 7 (Matching markets). Theorem 1 can be straightforwardly extended to
domains in which the indifference relation is fixed for each agent. This is, for example,
the case in matching markets where each agent is typically assumed to be indifferent
between all matchings in which his assignment is identical.
Remark 8 (Connected domains). Theorem 1 does not hold for a weakening of
comprehensiveness, which Nehring (2000) refers to as connectedness. A domain D is
connected if for all i ∈ N , Ri, R′
i ∈ L \
{Ri, R′
i} with R ∩ R′ ⊆ R′′. The
following single-agent SCF f , defined on a connected -- but not comprehensive -- domain
of size three, has been adapted from Nehring (2000) and satisfies set-monotonicity while
it violates Kelly-strategyproofness:
i ∈ Di, the following holds: if there is some R′′
i} with R ∩ R′ ⊆ R′′, then there is some R′′
i ∈ Di \ {Ri, R′
R1 : a, b, c, d,
R′
1 : a, b, d, c,
R′′
b, a, d, c,
1 :
f ((R1)) = {c},
f ((R′
f ((R′′
1)) = {a, b, c, d},
1)) = {b}.
Remark 9 (Strategic abstention). Fishburn and Brams (1983) introduced a partic-
ularly natural variant of strategic manipulation where agents obtain a more preferred
outcome by abstaining the election. Moulin (1988) has shown that every resolute Con-
dorcet extension can be manipulated in this way and thus suffers from the so-called
no-show paradox. However, Moulin's proof strongly relies on resoluteness. If preferences
over sets are given by Kelly's extension, set-valued Condorcet extension that satisfy
Kelly-strategyproofness also cannot be manipulated by abstention under very mild con-
ditions. This is, for instance, the case for all SCFs whose outcome only depends on
pairwise majority margins (which covers all of the Condorcet extensions mentioned in
Remark 1) because any manipulation by abstention can be turned into a manipulation
by strategic misrepresentation.11
Acknowledgments
I am grateful to Florian Brandl, Markus Brill, and Paul Harrenstein for helpful dis-
cussions and comments. This material is based on work supported by the Deutsche
Forschungsgemeinschaft under grants BR 2312/3-3, BR 2312/7-1, and BR 2312/7-2.
Early results of this paper were presented at the 22nd International Joint Conference
on Artificial Intelligence (Barcelona, July 2011). A previous version of this paper, titled
"Group-Strategyproof Irresolute Social Choice Functions," circulated since 2010.
10For generalized strategyproofness, it would also suffice to require a weakening of set-monotonicity in
which the choice set can only get smaller when unchosen alternatives are weakened.
11P´erez (2001) and Jimeno et al. (2009) have proved versions of Moulin's theorem (Moulin, 1988) for
set-valued Condorcet extensions by using stronger assumptions on preference over sets.
9
References
M. Aizerman and F. Aleskerov. Theory of Choice, volume 38 of Studies in Mathematical
and Managerial Economics. North-Holland, 1995.
T. Bandyopadhyay. Threats, counter-threats and strategic manipulation for non-binary
group decision rules. Mathematical Social Sciences, 2(2):145 -- 155, 1982.
T. Bandyopadhyay. Multi-valued decision rules and coalitional non-manipulability. Eco-
nomics Letters, 13(1):37 -- 44, 1983a.
T. Bandyopadhyay. Manipulation of non-imposed, non-oligarchic, non-binary group
decision rules. Economics Letters, 11(1 -- 2):69 -- 73, 1983b.
S. Barber`a. Manipulation of social decision functions. Journal of Economic Theory, 15
(2):266 -- 278, 1977a.
S. Barber`a. The manipulation of social choice mechanisms that do not leave "too much"
to chance. Econometrica, 45(7):1573 -- 1588, 1977b.
S. Barber`a. A note on group strategy-proof decision schemes. Econometrica, 47(3):
637 -- 640, 1979.
S. Barber`a. Strategy-proof social choice. In K. J. Arrow, A. K. Sen, and K. Suzumura,
editors, Handbook of Social Choice and Welfare, volume 2, chapter 25, pages 731 -- 832.
Elsevier, 2010.
S. Barber`a, B. Dutta, and A. Sen. Strategy-proof social choice correspondences. Journal
of Economic Theory, 101(2):374 -- 394, 2001.
G. Bordes. Consistency, rationality and collective choice. Review of Economic Studies,
43(3):451 -- 457, 1976.
G. Bordes. Some more results on consistency, rationality and collective choice. In J. J.
Laffont, editor, Aggregation and Revelation of Preferences, chapter 10, pages 175 -- 197.
North-Holland, 1979.
G. Bordes. On the possibility of reasonable consistent majoritarian choice: Some positive
results. Journal of Economic Theory, 31:122 -- 132, 1983.
F. Brandt. Minimal stable sets in tournaments. Journal of Economic Theory, 146(4):
1481 -- 1499, 2011.
F. Brandt and M. Brill. Necessary and sufficient conditions for the strategyproofness of
irresolute social choice functions. In Proceedings of the 13th Conference on Theoretical
Aspects of Rationality and Knowledge (TARK), pages 136 -- 142. ACM Press, 2011.
F. Brandt and C. Geist. Finding strategyproof social choice functions via SAT solving.
In Proceedings of the 13th International Conference on Autonomous Agents and Multi-
Agent Systems (AAMAS), pages 1193 -- 1200. IFAAMAS, 2014.
10
F. Brandt and P. Harrenstein. Set-rationalizable choice and self-stability. Journal of
Economic Theory, 146(4):1721 -- 1731, 2011.
F. Brandt, M. Chudnovsky, I. Kim, G. Liu, S. Norin, A. Scott, P. Seymour, and
S. Thomass´e. A counterexample to a conjecture of Schwartz. Social Choice and
Welfare, 40:739 -- 743, 2013.
H. Chernoff. Rational selection of decision functions. Econometrica, 22:422 -- 443, 1954.
S. Ching and L. Zhou. Multi-valued strategy-proof social choice rules. Social Choice and
Welfare, 19:569 -- 580, 2002.
J. Duggan. Uncovered sets. Social Choice and Welfare, 41:489 -- 535, 2013.
J. Duggan and T. Schwartz. Strategic manipulability without resoluteness or shared
beliefs: Gibbard-Satterthwaite generalized. Social Choice and Welfare, 17(1):85 -- 93,
2000.
B. Dutta. On the tournament equilibrium set. Social Choice and Welfare, 7(4):381 -- 383,
1990.
B. Dutta and J.-F. Laslier. Comparison functions and choice correspondences. Social
Choice and Welfare, 16(4):513 -- 532, 1999.
A. Feldman. Manipulation and the Pareto rule. Journal of Economic Theory, 21:473 --
482, 1979a.
A. Feldman. Nonmanipulable multi-valued social choice decision functions. Public
Choice, 34:177 -- 188, 1979b.
P. C. Fishburn and S. J. Brams. Paradoxes of preferential voting. Mathematics Magazine,
56(4):207 -- 214, 1983.
P. Gardenfors. Manipulation of social choice functions. Journal of Economic Theory, 13
(2):217 -- 228, 1976.
A. Gibbard. Manipulation of voting schemes. Econometrica, 41:587 -- 602, 1973.
A. Gibbard. Manipulation of schemes that mix voting with chance. Econometrica, 45
(3):665 -- 681, 1977.
A. Gibbard. Straightforwardness of game forms with lotteries as outcomes. Economet-
rica, 46(3):595 -- 614, 1978.
I. J. Good. A note on Condorcet sets. Public Choice, 10:97 -- 101, 1971.
J. L. Jimeno, J. P´erez, and E. Garc´ıa. An extension of the Moulin No Show Paradox
for voting correspondences. Social Choice and Welfare, 33(3):343 -- 459, 2009.
11
J. S. Kelly. Strategy-proofness and social choice functions without single-valuedness.
Econometrica, 45(2):439 -- 446, 1977.
B. Klaus and O. Bochet. The relation between monotonicity and strategyproofness.
Social Choice and Welfare, 40(1):41 -- 63, 2013.
G. Laffond, J.-F. Laslier, and M. Le Breton. The bipartisan set of a tournament game.
Games and Economic Behavior, 5:182 -- 201, 1993.
G. Laffond, J. Lain´e, and J.-F. Laslier. Composition-consistent tournament solutions
and social choice functions. Social Choice and Welfare, 13:75 -- 93, 1996.
J.-F. Laslier. Rank-based choice correspondences. Economics Letters, 52:279 -- 286, 1996.
J.-F. Laslier. Tournament Solutions and Majority Voting. Springer-Verlag, 1997.
J.-F. Laslier. Aggregation of preferences with a variable set of alternatives. Social Choice
and Welfare, 17:269 -- 282, 2000.
I. MacIntyre and P. K. Pattanaik. Strategic voting under minimally binary group decision
functions. Journal of Economic Theory, 25(3):338 -- 352, 1981.
A. Mas-Colell and H. Sonnenschein. General possibility theorems for group decisions.
Review of Economic Studies, 39(2):185 -- 192, 1972.
Y. Masatlioglu, D. Nakajima, and E. Y. Ozbay. Revealed attention. American Economic
Review, 102(5):2183 -- 2205, 2012.
E. Maskin. Nash equilibrium and welfare optimality. Review of Economic Studies, 66
(26):23 -- 38, 1999.
B. Monjardet. Statement of precedence and a comment on IIA terminology. Games and
Economic Behavior, 62:736 -- 738, 2008.
H. Moulin. Condorcet's principle implies the no show paradox. Journal of Economic
Theory, 45:53 -- 64, 1988.
E. Muller and M. A. Satterthwaite. The equivalence of strong positive association and
strategy-proofness. Journal of Economic Theory, 14(2):412 -- 418, 1977.
K. Nehring. Monotonicity implies generalized strategy-proofness for correspondences.
Social Choice and Welfare, 17(2):367 -- 375, 2000.
J. P´erez. The strong no show paradoxes are a common flaw in Condorcet voting corre-
spondences. Social Choice and Welfare, 18(3):601 -- 616, 2001.
M. R. Sanver and W. S. Zwicker. Monotonicity properties and their adaption to irresolute
social choice rules. Social Choice and Welfare, 39(2 -- 3):371 -- 398, 2012.
12
S. Sato. On strategy-proof social choice correspondences. Social Choice and Welfare,
31:331 -- 343, 2008.
M. A. Satterthwaite. Strategy-proofness and Arrow's conditions: Existence and corre-
spondence theorems for voting procedures and social welfare functions. Journal of
Economic Theory, 10:187 -- 217, 1975.
T. Schwartz. The Logic of Collective Choice. Columbia University Press, 1986.
T. Schwartz. Cyclic tournaments and cooperative majority voting: A solution. Social
Choice and Welfare, 7(1):19 -- 29, 1990.
A. K. Sen. Social choice theory: A re-examination. Econometrica, 45(1):53 -- 89, 1977.
J. H. Smith. Aggregation of preferences with variable electorate. Econometrica, 41(6):
1027 -- 1041, 1973.
A. D. Taylor. Social Choice and the Mathematics of Manipulation. Cambridge University
Press, 2005.
M. Umezawa. Coalitionally strategy-proof social choice correspondences and the Pareto
rule. Social Choice and Welfare, 33:151 -- 158, 2009.
J. von Neumann and O. Morgenstern. Theory of Games and Economic Behavior. Prince-
ton University Press, 2nd edition, 1947.
A. Appendix
For the domain of transitive and complete (but not necessarily antisymmetric) prefer-
ence relations RN , we show that all Condorcet extensions are Kelly-manipulable. This
strengthens Theorem 3 by Gardenfors (1976) and Theorem 8.1.2 by Taylor (2005), who
showed the same statement for a weaker notion of manipulability and a weaker notion of
Condorcet winners, respectively. When assuming that pairwise choices are made accord-
ing to majority rule, this also strengthens Theorems 1 and 2 by MacIntyre and Pattanaik
(1981). However, our construction requires that the number of agents is linear in the
number of alternatives.
Theorem 2. No Condorcet extension is Kelly-strategyproof in domain RN when there
are more than two alternatives.
Proof. Let A = {a1, . . . , am} with m ≥ 3 and consider the following preference profile R
with 3m agents.
In the representation below, sets denote indifference classes of the
agents.
13
R1, R2 : {a2, . . . , am}, a1
R3, R4 : {a1, a3, . . . , am}, a2
R2m−1, R2m : {a1, . . . , am−1}, am
R2m+1 : {a3, . . . , am}, a1, a2
...
...
...
...
R3m−1 : {a1, . . . , am−2}, am−1, am
R3m : {a2, . . . , am−1}, am, a1
For every alternative ai, there are two agents who prefer every alternative to ai and are
otherwise indifferent. Moreover, for every alternative ai there is one agent who prefers
every alternative except ai+1 to ai, ranks ai+1 below ai, and is otherwise indifferent.
Since f (R) yields a nonempty choice set, there has to be some ai ∈ f (R). Due to
the symmetry of the preference profile, we may assume without loss of generality that
a2 ∈ f (R). Now, let
R′
3, R′
4 : a1, {a3, . . . , am}, a2
4). That is, R′ is identical to R, except
and define R′ = (R−3, R′
that agent 3 lifted a1 on top and R′′ is identical to R′, except that agent 4 lifted a1 on
top. Observe that f (R′′) = {a1} because a1 is the Condorcet winner in R′′.
3) and R′′ = (R′
−4, R′
In case that a2 6∈ f (R′), agent 3 can manipulate as follows. Suppose R is the true
preference profile. Then, the least favorable alternative of agent 3 is chosen (possibly
among other alternatives). He can misstate his preferences as in R′ such that a2 is not
chosen. Since he is indifferent between all other alternatives, f (R′) bP3 f (R).
If a2 ∈ f (R′), agent 4 can manipulate similarly. Suppose R′ is the true preference
profile. Again, the least favorable alternative of agent 4 is chosen. By misstating his
preferences as in R′′, he can assure that one of his preferred alternatives, namely a1,
is selected exclusively because it is the Condorcet winner in R′′. Hence, f (R′′) bP ′
4
f (R′).
14
|
1208.6421 | 1 | 1208 | 2012-08-31T08:38:33 | A Novel Service Oriented Model for Query Identification and Solution Development using Semantic Web and Multi Agent System | [
"cs.MA",
"cs.SE"
] | In this paper, we propose to develop service model architecture by merging multi-agentsystems and semantic web technology. The proposed architecture works in two stages namely, Query Identification and Solution Development. A person referred to as customer will submit the problem details or requirements which will be referred to as a query. Anyone who can provide a service will need to register with the registrar module of the architecture. Services can be anything ranging from expert consultancy in the field of agriculture to academic research, from selling products to manufacturing goods, from medical help to legal issues or even providing logistics. Query submitted by customer is first parsed and then iteratively understood with the help of domain experts and the customer to get a precise set of properties. Query thus identified will be solved again with the help of intelligent agent systems which will search the semantic web for all those who can find or provide a solution. A workable solution workflow is created and then depending on the requirements, using the techniques of negotiation or auctioning, solution is implemented to complete the service for customer. This part is termed as solution development. In this service oriented architecture, we first try to analyze the complex set of user requirements then try to provide best possible solution in an optimized way by combining better information searches through semantic web and better workflow provisioning using multi agent systems. | cs.MA | cs | International Journal of Computer Applications (0975 – 8887)
Volume 35– No.9, December 2011
A Novel Service Oriented Model for Query
Identification and Solution Development using
Semantic Web and Multi Agent System
Muneendra Ojha
Indian Institute of Information Technology - Allahabad
Deoghat Jhalwa
Allahabad 211012
ABSTRACT
In this paper, we propose to develop service model architecture by
merging multi-agentsystems and semantic web technology. The
proposed architecture works in two stages namely, Query
Identification and Solution Development. A person referred to as
customer will submit the problem details or requirements which
will be referred to as a query. Anyone who can provide a service
will need to register with the registrar module of the architecture.
Services can be anything ranging from expert consultancy in the
field of agriculture to academic research, from selling products to
manufacturing goods, from medical help to legal issues or even
providing logistics. Query submitted by customer is first parsed
and then iteratively understood with the help of domain experts
and the customer to get a precise set of properties. Query thus
identified will be solved again with the help of intelligent agent
systems which will search the semantic web for all those who can
find or provide a solution. A workable solution workflow is
created and then depending on the requirements, using the
techniques of negotiation or auctioning, solution is implemented
to complete the service for customer. This part is termed as
solution development. In this service oriented architecture, we
first try to analyze the complex set of user requirements then try to
provide best possible solution in an optimized way by combining
better information searches through semantic web and better
workflow provisioning using multi agent systems.
Keywords
Semantic Web, Multi-Agent System, Service Oriented
Architecture
1. INTRODUCTION
Long gone are the days of dumb terminals running set algorithms
and producing results which otherwise if done manually would
have taken much more time. Computer scientists are aiming for
intelligent programs. The ultimate target of artificial intelligenceis
to build programs that are capable of performing like or better
than humans. Since this cannot be achieved in a day, researchers
target towards finding solutions which give better result than the
already existing ones. Acting like humans is an extremely
complex task so AI focuses more on solving smaller problems
which when clubbed together creates the platform for solving or
implementing a real life scenario. Agent system is one such
example where small programs called agents collectively try to
achieve the best possible solution of a complex problem. Ideology
of agent based system revolves around creating complex systems
as a composition of simpler, heterogeneous, distributed
components wherein intelligence comes with ability to observe
and learn from environment. A vast domain of problems is being
addressed using multi agent research and technology [1], [2], [3],
[4], [5].
Although agent based computing has been around for some time
but it is only in the last decade that it has found interest of people
beyond research community. Typical software architectures
containdynamically interacting modules, each with their own
thread and engaging in complex coordinationprotocols [6]. Agent
based computing presents a novel software engineering paradigm
emerging from the amalgamation of object oriented distributed
computing and artificial intelligence [7]. In this paper, we
advocate an agent-oriented paradigm, conceptualizing the analysis
and design of an agent-based system for providing web oriented
services. The remainder of this paper is structured as follows. In
the second section, we provide motivation for this architecture. In
the third section we provide elaborate view of the intelligent
agents, how they perceive, interact and perform. We also
introduce the idea of manual agents and how do autonomous
agents interact with them to optimize the perception. In the fourth
section, we provide the agent oriented model for our proposed
architecture and describe the agent oriented analysis and design.
We also compare it against traditional object oriented design
methodologies. Finally, in the last section, we summarize our
results by providing an insight into the future challenges.
2. MOTIVATION
Most of the real world applications are extremely complex than
they were few years hence. They contain components which are
dynamically interacting with environment through their own
process threads. Most software engineering paradigms are unable
to provide structure that could handle such complexities. It is hard
to identify a general framework that allows the management of
service in a standard platform independent way. So we propose a
middleware architecture that functions as an intermediary between
consumer and service provider. Although the full interoperability
between various middleware platforms is still not achieved, this
architecture serves as a valid starting point to bring distributed
services together. In order to support services within this service
oriented architecture, a lightweight framework is needed that
realizes
interoperability
between
different middleware
technologies. Both the Model Driven Architecture (MDA) [8] and
12
Service Oriented Architecture (SOA) [9] approaches serve to
address the same issue [10]. Let us take an example where a
patient needs to see a doctor. Patient is not sure of which
specialist she should visit or where she could find a good doctor.
Patient uploads the ailment related information over the portal and
requests for a good doctor nearby. System parses the information
and gathers knowledge out of it. Based on this knowledge, it
contacts suitable agents called domain experts, whether
autonomous or manual and tries to clearly identify the disease.
Once it is identified, it again tries to find out the solution, which
in this case would be to find the suitable doctor in a location
assumed to be in the patient’s vicinity. Then it would contact the
doctor, brief him with patient’s problem, take an appointment and
arrange for a ride if needed by the patient at the set date.
Meanwhile,the patient would be able to keep track of the whole
process. Patient can also alter the input details as and when
required so as to keep system updated about her condition. Idea of
the proposed framework is to bring together the vast amount of
information or knowledge spread over Internet in a meaningful
way so as to serve the specific needs of a consumer. So in our
application, SOA better serves the need as it starts from an
approach to distributed computing treating software resource as
service available over the Internet.
Another example can be of a business person willing to setup a
vacuum cleaner factory in some country where it is not a
household necessity. Aim is to build a system intelligent as well
as powerful enough to understand the requirements of setting up a
production unit, technical, financial, social implications, legalities
involved, infrastructure details and any other modalities necessary
for the queried task. No one can argue against the fact that every
related knowledge is available over the Internet and that too free
of cost. Question is “how does an agent understand the
information and derive the relevant knowledge?” Here lies the
actual potential of merging agent oriented approach and Web
Service Architecture (WSA) [11][12] in the context of Semantic
Web. The Semantic Web provides a common framework that
allows data to be shared and reused across application, enterprise,
and community boundaries [13]. It enables knowledge sharing
among heterogeneous, distributed and dynamic sources. Agents
are particularly suitable for performing these kinds of tasks [14].
In the following section, we describe our service architecture and
how semantic web enhances its performance. Then , we impress
upon the reasons that make multi-agent systems a strikingly
appropriate and pertinent solution for the design and development
of a service oriented system over the web. In this context , we
focus upon the role of Agent Oriented Software Engineering
(AOSE) in the Web Service Architecture.
2.1 Semantic Web and Web Service
Architecture
Semantic Web was conceptualized by the inventor of World Wide
Web with a vision to exploit the full potential of data available
over Internet. As per Lee:
“If HTML and the Web made all the online documents look like
one huge book, RDF, schema, and inference languages will make
all the data in the world look like one huge database”[16]
Semantic web describes the relation between things on website as
well as their properties. Instead of visualizing Internet as a web of
pages, it builds a web of data. It starts with defining Uniform
Resource Identifier (URI) which is a string of characters used to
identify name of a resource on Internet. Resource can be anything
International Journal of Computer Applications (0975 – 8887)
Volume 35– No.9, December 2011
ranging from books, cars, people, web pages, digital images, or
conceptual things like colors, subject or a metadata. URIs act as
anchor for merging data. In 1997, Metadata vocabularies were
defined and used to make statements. A Resource Description
Framework (RDF) was prepared. Resource can be anything over
Internet identifiable with a URI, Description is the statements
about the resource and Framework was a common model for
statements using variety of vocabularies. An RDF triple (s, p, o) is
defined as “Subject”, “Predicate” and “Object” respectively.
Conceptually, “p” connects “s” and “o”. RDF is a general model
for such triples with machine readable formats like RDF/XML.
RDF is useful but is insufficient in solving all possible
requirements. To counter the limiting possibilities, a new concept
of ontology was introduced. Ontologies define the concepts and
relationships
for describing and
representing an area of
knowledge. A new language Web Ontology Language abbreviated
as “OWL” was formed. OWL is an extra layer of explanation
relying on RDF schema. There are a number of application and
web services using RDF schema and OWL to enhance searches as
well as cater the need of users. A few examples can be listed as
Sun’s White Paper and System Handbook collections, Nokia’s
S60 support portal, Harper’s Online Magazine, Oracle’s virtual
pressroom, Opera’s community site, Dow Jones’ Synaptica [17].
3. THE PROPOSED SYSTEM
Objective is to act as a mediator between human agents who need
some service and human or autonomous agents which provide
such services. Before we start with the formal description of the
model, let us first define few terms that we will use to provide the
comprehensive picture.
Agent: An entity in the system whether human or
autonomous, capable of performing some functionality
will be termed as agent. It shows a fundamental unit of
behavior based on its perception in the environment. It
is intelligent and has a certain level of autonomy to take
decisions on its own. It is social so it can interact with
other agents of the system.
Activities: The functionalities, these agents can perform
will be called as activities. Every agent has some
capability based on which it will perform its intended
functionality. Based on the capability of an agent,
activities can be categorized complex or atomic
Complex activity: A complex activity is one which
cannot be performed by a single agent
the
in
environment. Every complex activity must be dissolved
in smaller activities.
Atomic activity: If we can find even one agent in the
system which is capable enough to carry out complete
activity alone, then that task or activity is considered
atomic. So it does not depend upon the physical view of
a task but ability of an agent to define atomicity of the
task.
Environment: Environment in our system is visualized
as set of tasks assigned to agents. For example agents
involved in the process of request parsing, creating
initial semantics, searching and iteratively interacting
with domain experts belong to one environment. Then
those belonging to negotiation and service provisioning
belong to other environment.
13
Service Provider: A service provider can be any agent
or entity delivering some service to the consumer.
Services may be free or may be charged decided by the
service provider itself.
Output
Problem
Metadata,Seman
ticsDescription
like a central authority
is
Registrar: Registrar
responsible
It has static
for managing agents.
knowledge of the agents, their capabilities, domains,
location and any other information that is relevant to
the services agents provide. It gives a partially
centralized view to the architecture controlling limit of
distributed functionality.
Domain Expert: Domain experts are the members of a
vertical application [18] group defined in semantic web
registered with our system with the registrar module.
They also function as agents in the system. If a group or
organization is registered then a representative agent
interacts on their behalf with the system.
Consumer: In this architecture we define a consumer to
be a human who needs some kind of help. Consumer
submits task request in form of a query. It is assumed
that a consumer needs some kind of service from the
system. Depending on the service, consumer may be
charged by the service provider. Consumer has the
liberty to deny any service before the service has
already started.
3.1 Cognition and rectification of user request
Customer requests do not generally come in the easiest of
machine readable formats. Customer request are handled by the
communicator agent, which passes it onto the query parser
module. Based on the preexisting knowledge base, context
reasoning engine, it tries to parse the query for useful information
and forms the primitive level semantic of it. An XML file
depicting the same is created and sent back to user in a human
readable form through communicator agent as depicted in Figure
1.
Information Servers
Exchange Servers,
Yellow Pages,
Discussion Groups,
Blogs
Online
Databases
Semantic Web and
Web Services
RIF, OWL, RDF
Communicator
Agent
Query Parser
Knowledge Base
Context Reasoning
Engine
Search Engine
Query Moderator
Consumer
Figure 1. Accepting consumer request and parsing iteratively
for identification of the service requested.
International Journal of Computer Applications (0975 – 8887)
Volume 35– No.9, December 2011
Sometimes usersthemselvesare not aware of what is needed in a
particular problem. User uploads the problem description and
hopes to get a solution for it. In such cases, agents cannot rely
upon the explanation provided by consumer. What if information
is only half truth? System builds an initial query semantic report
and sends it to the experts groups of the domain identified in
initial report. The initial or primitive understanding is now sent to
the domain experts registered in the system through the Registrar
module. The domain expert or vertical groups’ experts (Figure 2)
are manual agents who have better perceptive capability than an
autonomous programming agent. Domain experts provide their
views on the understanding of problem. They can require more
data or different variety of data for better understanding.
Sometime they can feel that the problem description does not
exactly match their expertise domain so they can refer different
agents or domain in the problem description. Collectively this
works towards obtaining a better cognition of the problem or
Query/ Service
Request
Query Parser
Semantic Web
Initial Query
Semantic
Compiler
Agent
Search Agent
Services Registrar
Vertical
Applications
Domain Experts
Figure 2.Entities involved in the identification of a consumer
query
request submitted by the customer.
If details provided are not sufficient, consumer can be asked to
provide more detail or data. Thus original query is rectified in way
both consumer and agent systems obtain a better comprehension.
This process is an iterative one which repeats itself as long as
either both consumer and domain experts are able to uniquely
identify the query or both system and experts decide that there
cannot be a solution for the query. In either case, system notifies
consumer about the outcome. If it is uniquely identified, system
proceeds to the solution development phase, otherwise stops the
search.
When agent system develops a mutually agreed upon description
of consumer request, it produces a number of descriptor
documents. These
include Problem Description Document,
Vocabulary or Ontology of the request along with any document
which is relevant to identify the task uniquely and precisely.
These documents help in building inference and developing
solution framework.
3.2 Developing solution workflow
A workflow is defined as a pattern of activities enabled by a
systematic organization of resources, defined roles and mass,
energy and information flows, into a work process that can be
documented andlearned. Workflows are designed to achieve
processing intents of some sort, such as physical transformation,
14
processing. Solution
information
or
provision,
service
development phase target creating a workflow which when
executed provides desired services or solution to the consumer.
The workflow is created in such a manner that autonomous agents
can follow it and carry out activities.
First step in problem solving is to find the set of experts who have
this kind of knowledge. Searching through the web becomes more
precise when we have sufficient information and we can target the
search space as problem domain. This is again done through
Registrar. Note that a separate set of experts are required here as it
is not necessary that the expert involved in detecting and
explaining the problem can also be expert in actually solving it.
For example a pathologist has expertise in interpreting and
diagnosing a tumor but lacks surgical experience required to cure
it. Nevertheless we do not alienate the idea of an intersection set
having agents involved both in identification as well as solution
phases. Once experts are found, they are provided complete
problem description and their opinion is sought in creating the
solution workflow. So system undergoes the similar routine of
searching suitable experts as was done in identification phase,
provides them the complete problem detail and iteratively works
with consumer to fine tune the solution workflow. Customer is
always kept in the loop. Automatically creating an optimized
workflow for any problem is still a daunting task. So first a
tentative workflow is created and presented to experts. Experts
supply their opinion and workflow is bettered.
3.3 Providing services
A lot of research has been done in multi agent systems to make
this part completely free from manual intervention. This section
epitomizes the service oriented architecture in its true form. All
the participants in this module are autonomous agents, i.e. self
interested entities that seek to maximize their private utility [19].
We establish two types of agents here, a consumer (an agent
representative of the human consumer) and a provider (again an
agent representative of an individual or an organization providing
service).
In the Agent Oriented Analysis (AOA), tasks, requirements,
services, providers, capabilities and constraints are analyzed from
an agent’s perspective. Service provisioning consists of following
main steps:
1. Workflow description is studied and types of services
required are identified. For each service type a list of
tasks is created. There may be more than one task
possible in any given service type.
2. A list of all possible provider agents is created and
mapped to the service type. Each task is considered
“Atomic” initially i.e., we assume one agent will be able
to finish it to the end. Either agent completes its
assigned task or is unable to complete it; there is no
concept of partially completed task.
If the system could not find an agent having capability
to complete a listed task then such a task is considered a
“Complex” task and needs to be subdivided in smaller
subtasks. This division continues till every task becomes
atomic.
4. For each task negotiate with provider agents depending
upon the criteria of consumer requirement constraints,
and service provider capabilities. Negotiation can be
viewed as an interaction mechanism that aims to resolve
a conflict of interest between various parties through set
3.
International Journal of Computer Applications (0975 – 8887)
Volume 35– No.9, December 2011
rules and protocols [20]. Agents’ strategies are very
important over here as agents can cooperate or
sometime compete to achieve the desired provisioning
of services.
a. Cooperative interactions – agents interact and try
to maximize the sum of all their utilities, the social
welfare
b. Competitive interaction – agents interact to satisfy
their own personal preferences. Such agents are
generally called as selfish or self-interested agents
as they try to maximize their own utility function
in order to gain greater rewards or optimize the
result.
Figure 3 depicts clearly the relation between consumer,
Consumer
hasa
Workflow
has a
Task list
Interdependencies
and Constraints
T1
T2
T3
T4
T5
Provider
provides
Service Types
have
Services
Require
remuneration
Service
Registrar
Figure 3.Relation between workflow of consumer,
listed tasks, constraints& interdependencies, services
required for these tasks and their service provider
task, service types, services and provider.
5.
If time is relatively a lesser constraint, auction and
bidding serves the purpose better as we can draw real
life experience from the examples of tender invited by
an organization.
3.4 Design of the service model
As defined earlier in Section 3, any entity performing a unit of
work is treated as an agent in our model. Every agent has a certain
set of defined capabilities. Agents act perceiving the change in its
environment. When it has certain task to complete, it’s the agent’s
responsibility not only to complete the task but also do it in the
best possible of ways.The actions, an agent undertakes to fulfill its
responsibilities is captured by the idea of a utility function. Utility
functions are useful in describing the tradeoff every agent must
make. For example, agent receives payment for searching and
delivering information and incurs cost of the electricity used as
well as the benefits it missed had it been searching and delivering
information to some other consumer. If we translate all these
payments andcosts into utility function then we can easily study
the tradeoffs among them [21]. Agents interact by sending and
15
receiving messages. When an agent initiates interaction by
sending a message, it becomes requester agent and the agent it
sends message to become a provider agent.
Messages are sent to communicate between agents delivering web
services. When an agent wants to avail some service, it sends
request message to the agent representing this particular type of
service with
input requirement semantics. Provider agent
acknowledges the request only if it is interested in fulfilling it and
explains the terms and conditions of providing services. For
example high priority programs which execute immediately cost
higher than those put into batch processing mode. Thus when
requester agent and provider agent become known to each other,
they understand the input semantics and Web Service Description
(WSD) formally, service is provided. Structure of the message is
also defined in WSD. A message can be a simple HTTP GET
request or it can be a SOAP XML. In our model, every service
provider is registered to the Registrar. Initial communication of
knowing the service provider and requester occur through the
Registrar, but once their representative agents acknowledge each
other, they can negotiate freely without intervention of Registrar.
In our system messages are sent through using Simple Object
Access Protocol (SOAP) exchanging XML documents over the
Internet, using Hypertext TransferProtocol (HTTP) [22].
Web Services registration and discovery is done using Universal
Description, Discovery and Integration (UDDI) directory service.
Businesses use Web Services Description Language (WSDL) to
describe relevant information to potential consumers and advertise
services. In our model any activity that results in some fruitful
physical outcome is termed as service. Starting from the very first
interaction of system with consumer through communicator agent
to parsing request, understanding semantics of the request,
consulting domain experts,
identification of
the problem,
searching and consulting solution experts, creating solution
workflow, finding service providers, negotiating, contracting and
getting services completed, all include service definition. Every
expert involved, whether a human agent giving feedback or
suggestion or an autonomous agent searching the semantic web
for some information provides service. Some services are free for
example accessing freely available information on semantic web,
XML
Serialization
RDF
Schema
Web Ontology
Language (OWL)
International Journal of Computer Applications (0975 – 8887)
Volume 35– No.9, December 2011
finding suitable service providers through WSDL description
provided in the directory service, contacting providers through
SOAP messages and negotiating a binding contract etc. Only
those services will be charged which has some copyright to it
and/or provider requires some remuneration. When we define a
service in our system, it should be clear that all services are
provided through the Registrar module, which acts as first level of
central authority over collaborative autonomous agents acting
towards achieving solution.
4. ANALYSIS OF THE MODEL
We started building the system with the most essential of
requirements expected from a multi agent system delivering
service. Initial requirements can be classified as functional
requirements and quality requirements.
4.1 Functional requirements
Autonomy:Agents are autonomous as long as it a utility
function to maximize. There are dominant agents whose
task is just to monitor the progress of task. In case an
agent fails to produce output, dominant agents reassign
the task to some other agent. Though dominant agents
do not interfere in the functionality of an individual
agent they do put some kind of organization. Agents are
free to enter the environment and leave it as required.
Social interaction:As per the inherent definition an
agent here is able to communicate with other agents
through message passing. These messages are XML
files describing requirements, requesting services or
reporting status. Though we have put some restriction in
interaction here that agents of one environment would
not be able to interact with different environment
agents.
Collaboration: Agents must collaborate to sort out an
assigned
their utility
to maximize
in order
task
functions. Collaboration can take cooperative form if i t
maximizes the generic output else it can also take a
competitive form when being selfish results in an
Semantic Web
UDDI
Directory Services
Service
Advertisements
MAS
Input Semantic,
Query Descriptor
MAS
Solution
Workflow
MAS
Services
Registrar
Consumer
Services
Registrar
Services
Registrar
Human Agents
Human Agents
Output of services
either in form of
documentation or
physical change in the
environment
b
i
n
d
i
n
g
a
g
r
e
e
m
e
n
t
N
e
g
o
t
i
a
t
i
o
n
s
a
n
d
s
e
r
v
i
c
e
p
r
o
v
i
d
e
r
o
r
o
r
g
a
n
i
z
a
t
i
o
n
s
A
g
e
n
t
s
r
e
p
r
e
s
e
n
t
i
n
g
i
n
d
i
v
i
d
u
a
l
Domain Experts
Solution Provider
Figure 4. Comprehensive view of the service depicting life stages of consumer request including query cognition resulting in
Input semantics, then reconstruction as a solution workflow, and finally resolution in the f orm of services provided
16
optimized result, e.g. in the case of auction, bidding
agents compete with each other resulting in a better deal
for the consumer.
Distributed functionality: Agents act in a distributed
manner when
tasks are
temporally
independent.
Services like communication, data transfer, searching,
negotiating, management etc.
take place without
intervention of any centralized processing unit.
Reusability:We have used several off-the shelf
components in the overall development recognizing
reusability of agent programs.
4.2 Quality requirements
Ease of use:User interface should be easily understood
and easy to use. User can upload query description in
the form of a text file. Status updates are provided back
to user and provisions are made to constantly involve
user in the loop.
Modifiability: Agents can be modified without the need
to change whole architecture. As long as interaction
mechanism is coherent, internal functionality is a black
box for the environment.
Reliability: As long as there is no network failure,
agents are reliable. Agents are able to communicate as
soon as network re-establishes.
Performance: Although requirement criterion specifies
the system to accomplish tasks in a reasonable amount
of time with optimized results but there are so many
smaller modules with open
research problem
interoperating that no claim can be made at this stage.
Security: Security is managed through the Registrar
module of system as only registered entities can use the
system.
Figure 4, depicts the overall architecture with stages of the life
cycle of a consumer request starting from when request is made to
the point when services in terms of satisfactory solution are
provided back to user. Until a binding contract is made, consumer
is free to abandon request anytime. Provisions must be made to
ensure through the stages that the consumer is still interested in
find a solution for her/her query. All the activities should be
abandoned as soon as customer backs off.
AND
FUTURE
5. CONCLUSION
CHALLANGES
In this paper we describe the architecture combining efficiencies
of Multi Agent System with Semantic Web to provide better
query understanding, search, and resolution
in a modular
approach. We cannot claim to have an optimized solution as there
are several open research problems in the system. We provide
software engineering platform for efficient merger of coherent
technological domains. Multi agent systems research is a very hot
field in terms of providing different kind of services in extremely
coordinated fashion as shown in disaster management domain by
the recently concluded Aladdin project [23]. Problems such as
automatic creation of efficient solution workflow, negotiating and
legally binding service providers, remuneration management,
workflow mitigation,
security, data
integration, building
International Journal of Computer Applications (0975 – 8887)
Volume 35– No.9, December 2011
commitment, trust, and belief model are some of the areas where
rapid research is going on. We have set a target in our architecture
focusing smaller modules and trying to refine the functionalities
as well as standardize the agent communication on semantic web.
6. REFERENCES
[1] Biswas, P. K. 2007. Towards an agent-oriented approach to
conceptualization. Applied Soft Computing J. Retrieved from
http://dx.doi.org/10.1016/j.asoc.2006.11.009
[2] Brazier, F. M., Keplicz, B. D., Jennings N. R., &Treur, J.
(1995, June 12-14). Formal specification of multi-agent
systems: A real-world case. Proceedings of
the 1st
International Conference on Multiagent Systems (ICMAS
’95), San Francisco.
[3] Brazier, F. M., Dunin-Keplicz, B. M., Jennings, N. R.,
&Treur, J. (1997). DESIRE: Modeling multi-agent systems
in a compositional formal framework. International Journal
of Cooperative Information Systems, 6(1), 67-94.
[4] Jennings, N. R., Faratin,P.,Lomuscio,A. R., Parsons, S.
Sierra, C. and Wooldridge, M. 2001. Automated negotiation:
prospects, methods and challenges. International Journal
ofGroup Decision and Negotiation, 10(2):199-215.
[5] Lind, J. (2000). General concepts of agents and multi-agent
systems. Retrieved from www.agentlab.de
[6] Ciancarini, P., Tolksdorf, R.and Vitali, F. 1999. The World
Wide Web as a place for agents. In M. Wooldridge and M.
Veloso, Ed. Artificial Intelligence Today, Recent Trends and
Developments, LNAI 1600, Springer, Berlin, 175-194.
[7] Odell, J., & Burkhart, R. (1998). Beyond objects: Unleashing
the power of adaptive agents. Tutorial presented at OOPSLA,
Vancouver, B.C.
[8] F. Leymann and D. Roller. Production Workflow: Concepts
and Techniques. Prentice-Hall PTR, Englewood Cliffs, NJ,
1998.
[9] J. Bloomberg. Principles of SOA. Application Development
Trend Magazine, 10(3):22-26, March 2003.
[10] Bocchi,L.,Ciancarini, P., Moretti, R. and Presutti, V. 2008.
On the impact of AOSE in service oriented computing. In
Emerging Methods, Technologies, and Process management
in Software Engineering, A. D. Lucia, F. Ferrucci, G. Tortora
and M. TucciEd. Wiley Interscience, New Jersey, 71-83
[11] D. Booth, H. Haas, F. McCabe, E. Newcomer, M. Champion,
C. Ferris D. Orchard. Web Services Architecture. Technical
Report, World Wide Web Consortium (W3C) 2004. URI –
http://www.w3.org/TR/ws-arch/
[12] Jennings, N. R. (2001). An agent-based approach for
complex software systems. Communications of the ACM,
35-41.
[13] Semantic Web Initiative HomePage (http://www.w3.org/
2001/sw/)
[14] P. Ciancarini and M. Wooldridge, editors. Agent-Oriented
Software Engineering, number 1957 in LNAI, 2001.
17
[15] Tim Berners-Lee, 1999, Weaving the Web: The Original
Design and Ultimate Destiny of the World Wide Web ,
Harper Paperbacks; 1 edition (November 7, 2000)
[16] Herman, I. 2008, An Introduction to Semantic Web,
(Tutorial), 17th International World Wide Web Conference
Beijing, China, 2008
[17] Workflow
Wikipedia.
definition,
http://en.wikipedia.org/wiki/Workflow
URI:
[18] Vertical
URI=
Applications.
http://www.w3.org/standards/semanticweb/applications
[19] Jennings, N. R. 2000. On Agent-Based Software
Engineering. Artificial Intelligence,117(2):277–296.
International Journal of Computer Applications (0975 – 8887)
Volume 35– No.9, December 2011
[20] Mas-Colell, A., Whinston, M. D.and Green, J. R. 1995.
Microeconomic Theory. Oxford University Press, New York.
[21] Vidal, J. M., 2010, Fundamentals ofMultiagent Systems,
URI:
http://multiagent.com/2010/02/multiagent-systems-
textbook.html
[22] Mitra, N. 2003. SOAP Version 1.2 Part 0: Primer. Technical
report, W3C. URI: http://www.w3.org/TR/soap12-part0/
[23] Jennings, N. R., 2010. ALADDIN End of Year Report (Final
Project Report). Southampton, UK: University of
Southampton. URI:
http://www.aladdinproject.org/wp-
content/uploads/2011/02/finalreport.pdf
18
|
1701.01289 | 1 | 1701 | 2017-01-05T12:02:34 | Applying DCOP to User Association Problem in Heterogeneous Networks with Markov Chain Based Algorithm | [
"cs.MA"
] | Multi-agent systems (MAS) is able to characterize the behavior of individual agent and the interaction between agents. Thus, it motivates us to leverage the distributed constraint optimization problem (DCOP), a framework of modeling MAS, to solve the user association problem in heterogeneous networks (HetNets). Two issues we have to consider when we take DCOP into the application of HetNet including: (i) How to set up an effective model by DCOP taking account of the negtive impact of the increment of users on the modeling process (ii) Which kind of algorithms is more suitable to balance the time consumption and the quality of soltuion. Aiming to overcome these issues, we firstly come up with an ECAV-$\eta$ (Each Connection As Variable) model in which a parameter $\eta$ with an adequate assignment ($\eta=3$ in this paper) is able to control the scale of the model. After that, a Markov chain (MC) based algorithm is proposed on the basis of log-sum-exp function. Experimental results show that the solution obtained by DCOP framework is better than the one obtained by the Max-SINR algorithm. Comparing with the Lagrange dual decomposition based method (LDD), the solution performance has been improved since there is no need to transform original problem into a satisfied one. In addition, it is also apparent that the DCOP based method has better robustness than LDD when the number of users increases but the available resource at base stations are limited. | cs.MA | cs |
Applying DCOP to User Association Problem in
Heterogeneous Networks with Markov Chain Based
Algorithm
Peibo Duan∗, Guoqiang Mao∗†‡§, Changsheng Zhang¶ and Bin Zhang¶
∗School of Computing and Communications
University of Technology, Sydney, Australia
†Data61 Australia
§School of Electronic Information Communications, Huazhong Unriversity of Science Technology, Wuhan, China
§Beijing Unriversity of Posts and Telecommunications, Beijing, China
¶School of Computer Application
Northeastern University
Bin Zhang is the correspondence author
Abstract-Multi-agent systems (MAS) is able to characterize
the behavior of individual agent and the interaction between
agents. Thus, it motivates us to leverage the distributed constraint
optimization problem (DCOP), a framework of modeling MAS,
to solve the user association problem in heterogeneous networks
(HetNets). Two issues we have to consider when we take DCOP
into the application of HetNet including: (i) How to set up an
effective model by DCOP taking account of the negtive impact of
the increment of users on the modeling process (ii) Which kind of
algorithms is more suitable to balance the time consumption and
the quality of soltuion. Aiming to overcome these issues, we firstly
come up with an ECAV-η (Each Connection As Variable) model
in which a parameter η with an adequate assignment (η = 3 in
this paper) is able to control the scale of the model. After that, a
Markov chain (MC) based algorithm is proposed on the basis of
log-sum-exp function. Experimental results show that the solution
obtained by DCOP framework is better than the one obtained
by the Max-SINR algorithm. Comparing with the Lagrange dual
decomposition based method (LDD), the solution performance
has been improved since there is no need to transform original
problem into a satisfied one. In addition, it is also apparent that
the DCOP based method has better robustness than LDD when
the number of users increases but the available resource at base
stations are limited.
I. INTRODUCTION
of agent and the cooperation between agents in Multi-agent
System (MAS), a framework, named distributed constraint
optimization problem (DCOP) in terms of constraints that
are known and enforced by distinct agents comes into being
with it. In last decade, the research effort of DCOP has been
dedicated on the following three directions: 1) the development
of DCOP algorithms which are able to better balance the
computational complexity and the accuracy of solution, such
as large neighborhood search method [1]; Markov Chain
Monte Carlo sampling method [2] [3] and distributed junction
tree based method [4] 2) the extension of classical DCOP
model in order to make it more flexible and effective for
practical application, such as expected regret DCOP model [5],
multi-variable agent decomposition model [6] and dynamic
DCOP model [7] 3) the application of DCOP in modeling
environmental systems, such as sensor networks [8], [9], [10],
[11], disaster evacuation [12], traffic control [13], [14] and
resource allocation [15], [16], [3]. In this paper, we take
more attention to the application of DCOP. More precisely,
we leverage DCOP to solve user association problem in the
downlink of multi-tier heterogeneous networks with the aim
to assign mobile users to different base stations in different
tiers while satisfying the QoS constraint on the rate required
by each user.
is generally regarded as a resource allocation problem [17],
[18], [19], [20] in which the resource is defined by the resource
blocks (RBs). In this case, the more RBs allocated to a user, the
larger rate achieved by the user. The methods to solve the user
association problem are divided into centralized controlled and
distributed controlled. With regard to the centralized way, a
central entity is set up to collect information, and then used to
decide which particular BS is to serve which user according
to the collected information. A classical representation of
centralized method is Max-SINR [21]. Distributed controlled
methods attract considerable attention in last decade since they
do not require a central entity and allow BSs and users to make
autonomous user association decisions by themselves through
the interaction between BSs and users. Among all available
methods, the methods based on Lagrange dual decomposation
(LDD) [20] and game theory [22] have better performance.
Hamidreza and Vijay [20] put forward a unified distributed
algorithm for cell association followed by RBs distribution in
a k-tier heterogeneous network. With aid of LDD algorithm,
the users and BSs make their respective decisions based on
local information and a global QoS, expressed in terms of
minimum achievable long-term rate, is achieved. However, the
constraint relaxation and the backtrack in almost each iteration
are needed to avoid overload at the BSs. In addition, as we will
show later, the number of out-of-service users will increase
since a user always selects a best-rate thereby taking up a
large number of RBs and leaving less for others. Nguyen and
Bao [22] proposed a game theory based method in which the
users are modeled as players who participate in the game
of acquiring resources. The best solution is the one which
can satisfy Nash equilibrium (NE). Loosely speaking, such
solution is only a local optima. In addition, it is difficult to
guarantee the quality of the solution.
there is no research of modeling user association problem as
MAS. However, some similar works have been done focusing
on solving the resource management problem in the field
of wireless networks or cognitive radio network [23], [24],
[25] by DCOP framework. These methods can not be directly
applied to user association problem mainly due to the scale of
the models for these practical applications is relatively small.
For instance, Monteiro [24] formalized the channel allocation
in a wireless network as a DCOP with no more than 10 agents
considered in the simulation parts. However, the amount of
users and resource included in a HetNet is always hundreds
and thousands. In this case, a good modeling process along
with a suitable DCOP algorithm is necessary. According to
the in-depth analysis above, it motivates us to explore a good
way to solve user association problem by DCOP. The main
contributions of this paper are as follows:
• An ECAV (Each Connection As Variable) model is pro-
posed for modeling user association problem using DCOP
framework. In addition, we introduce a parameter η with
which we can control the scale (the number of variables
and constriants) of the ECAV model.
• A DCOP algorithm based on Markov chain (MC) is
proposed which is able to balance the time consumption
and the quality of the solution.
• The experiments are conducted which show that
the
results obtained by the proposed algorithm have supe-
rior accuracy compared with the Max-SINR algorithm.
Moreover, it has better robustness than the LDD based
algorithm when the number of users increases but the
available resource at base stations are limited.
The rest of this paper is organized as follows. In Section
II, the definition of DCOP and the system model of user
association problem along with its mixed integer programming
formulation are briefly introduced. In Section III, we illustrate
the ECAV-η model. After that, a MC based algorithm is
designed in section IV. We explore the performance of the
DCOP framework by comparing with the Max-SINR and
LDD methods in Section V. Finally, Section VI draws the
conclusion.
II. PRELIMINARY
This section expounds the DCOP framework and system
model of user association problem along with its mixed integer
programming formulation.
A. DCOP
The definitions of DCOP have a little difference in differ-
ent literatures [26], [4], [5] 1. In this paper, we formalize
the DCOP as a four tuples model < A,V,D,C > where
A = {a1, a2, ..., aA} consists of a set of agents, V =
{v1, v2, ..., vn} is the set of variables in which each variable
vi ∈ V only belongs to an agent a ∈ A. Each variable has
a finite and discrete domain where each value represents a
possible state of the variable. All the domains of different
variables consist of a domain set D = {d1, d2, ..., dn}, where
di is the domain of vi. A constraint c ∈ C = {c1, c2, ..., cC}
is defined as a mapping from the assignments of m variables
to a positive real value:
R(c) : di1 × di2 × ··· dim → R+
(1)
The purpose of a DCOP is to find a set of assignments of
all the variables, denoted as X ∗, which maximize the utility,
namely the sum of all constraint rewards:
(cid:88)
C
argmax
X ∗
R(c)
(2)
B. System Model of User Association Problem
Consider a k-tier HetNet where all the BSs in the same tier
have the same configurations. For example, a two-tier network
including a macro BS (B1) and a femto BS, (B2), is shown in
Fig.1. The set of all BSs is denoted as B = {B1,B2, ...,BNB}
where NB is the total number of BSs. All the BSs in the
kth tier transmit with the same power Pk. The total number
of users is denoted by NU and the set of all users is U =
{U1,U2, ...,UNU}.
With OFDMA technology in LTE-Advanced networks, the
resource, time-frequency, is divided into blocks where each
block is defined as a resource block (RB) including a certain
time duration and certain bandwidth [17]. In this paper, the
resource configured at each BS is in the format of RB so
that its available RBs are decided by the bandwidth and the
scheduling interval duration allocated to that BS. We assume
the BSs in the HetNet share the total bandwidth such that both
intra- and inter-tier interference exist when the BSs allocate
RBs to the users instantaneously.
Assuming the channel state information is available at the
BSs, the SINR experienced by user Uj, served by Bi in the
kth tier is given by
(cid:80)Bl∈B/{Bi} Pkgij + BN0
Pkgij
SINRij =
(3)
In (3), gij is the channel power gain between Uj and Bi,
B/{Bi} represents all
the BSs in B except Bi, B is the
bandwidth and N0 is noise power spectral density. The channel
power gain includes the effect of both path loss and fading.
Path loss is assumed to be static and its effect is captured in
1[26] formalized the DCOP as a three tuples model. [4] adopted a four-
tuples model while [5] used a five tuples model
(a) A simple instance of HetNet
(b) ECAV model
Fig. 1. A simple instance of HetNet with ECAV modeling
commonly used formulation as follows
(cid:88)
(cid:88)
maximize F =
the average value of the channel power gain, while the fading
is assumed to follow the exponential distribution.
From the above, the efficiency of user Uj powered by BS
Bi, denoted as eij, is calculated as
eij = log2(1 + SINRij)
(4)
Given the bandwidth B, time duration T and the scheduling
interval Γ configured at each RB, we attain the unit rate at Uj
upon one RB as follows
uij =
BT eij
Γ
(5)
On the basis of formula (5), the rate received at Uj with
nij RBs provided by Bi in the kth tier is
rij = nijuij
(6)
Associated with each user is a quality-of-service (QoS)
constraint. This is expressed as the minimum total rate the
user should receive. Denoting the rate requiremnt of the jth
user by γj, the minimum number of RBs required to satisfy
γj is calculated by:
min = (cid:100) γj
nij
uij
(cid:101)
(7)
in which (cid:100)·(cid:101) is a ceiling function.
C. Mixed Integer Programming Formulation
The formulations of user association problem by mixed
linear programming are similar in a series of papers (see
the survey literature [19]). in this paper, we present a more
s.t.(cid:88)
(cid:88)
(cid:88)
j∈U
i∈B
xijrij
j∈U
i∈B
xijrij (cid:62) γ,∀Uj ∈ U
xijnij (cid:54) Ni,∀Bi ∈ B
xij (cid:54) 1,∀Uj ∈ U
(8a)
(8b)
(8c)
(8d)
i∈B
nij ∈ {0, 1, ..., Ni},∀Bi ∈ B,∀Uj ∈ U
xij ∈ {0, 1},∀Bi ∈ B,∀Uj ∈ U
(8e)
(8f)
The first constraint ensures the rate QoS requirement from
users. Constraint (8c) indicates that the amount of RBs con-
sumed at the same BS is no more than the total RBs Ni
configurated at the BS. Constraint (8d) guarantees one user
associated with a unique BS. Constraint (8e) guarantees the
number of RBs a BS allocates to a user falls within the range
from zero and Ni. The last constraint (8f) guarantees the
connection between a user and a BS has two states denoted
by a binary variable. The objective function (8a) refers to the
sum of rate rather than a function acted on the rate such as
U (xijrij) (e.g. U (x) = log(1 + x)) in some references. Gen-
erally, two phases are needed to gain the solution including:
1) transforming original problem into a satisfied one through
relaxing Constraint (8e) by nij ∈ {0, nij
min}; 2) the left RBs
in each BS will be allocated to users in order to maximize the
objective function.
III. FORMULATION WITH DCOP
In this section, we expound and illustrate the ECAV model
along with its modified version ECAV-η.
A. ECAV Model
Before giving the formulation based on DCOP, we firstly
introduce the definition of candidate BS:
Definition 1. we declare Bi, i ∈ B is a candidate BS of Uj, j ∈
U if the rate at Uj is above the threshold γ with nij
min RBs
provided by Bi. Simultaneously, nij
min should be less than the
total number of RBs (Ni) configurated at Bi.
i = {0, nij
i , denoted by Dj
After confirming the set of candidate BSs of Uj, j ∈ U,
denoted by, CBj, Uj sends messages to its candidate BSs so
that each Bi, i ∈ NB gets knowledge of its possible connected
users. We define each possible connection between Uj and its
candidate BS Bi as a variable, denoted by V j
i . In this case,
all the variables are divided into NB groups according to the
potential connection between users and different BSs. The do-
min, ..., Ni},
main of each variable V j
i = 0 if no RB is allocated to Uj, otherwise,
where V j
V j
(cid:62) nij
min. We define each group as an agent. Thus, an
n-ary constraint exists among n variables (intra-constraint) to
guarantee that there is no overload at Bi. Note that a user may
have more than one candidate BS, there are constraints (inter-
constraints) connecting the variables affiliated to different
agents on account of the assumption that a unique connection
exists between a user and a BS. Generally speaking,
the
utility (objective) function in the DCOP model is the sum
of constraint rewards which reflects the degree of constraint
violations. We define the reward R(c) of inter- and intra-
constraints in the ECAV model as follows. For ∀c ∈ Cinter
i
i
,V j2
∃V j1
Otherwise
(cid:40) −∞,
−∞,
(cid:88)Vji ∈ ψ(c)rij,
R(c) =
0,
For ∀c ∈ Cintra
R(c) =
i ∈ ψ(c), V al(V j1/j2
i
) > 0(9a)
(9b)
(cid:80)
i ∈ψc
V j
otherwise
V al(V j
(10a)
i ) > Ni
(10b)
i ) represents the assignment of V j
In constraint (9a), ψ(c) is the subset of variables connected
by constraint c. V al(V j
i . A
reward (we use −∞ in this paper) is assigned to the constraints
if there at least two variables are non-zero at the same time
(unique connection between a user and a BS). Otherwise, the
reward is equal to zero. In constraint (10a), the reward is −∞
once there is a overload at the BS. Otherwise, the reward is
the sum of the rates achieved at users.
It
is easy to find that a variable in the ECAV model
with non-zero assignment covers constraint (8b) and (8e) in
the mixed integer programming formulation. Moreover, intra
and inter-constraints respectively cover constraint (8c) and
constraint(8d). Therefore, The global optimal solution X ∗
obtained from the ECAV model is consistent with the one
obtained from the mixed integer programming formulation,
denoted as X 2.
To better understand the modeling process, we recall the
instance in Fig.1 where the candidate BSs of U1 and U2 are
2We say X ∗ is consistent with X when the total rate calculated by objective
function (2) and (8a) is equal. This is because there may be no more than
one optimal solution.
i
1 ,V 2
2 ,V 2
2 and V 4
1 and V 3
the same, denoted as {B1,B2}, while the candidate BSs of U3
and U4 are respectively {B1} and {B2}. We assume the total
RBs configurated at B1 and B2 is 8 and 10. For simplicity, we
assume the rate of each user served by one RB provided by B1
is 0.8 bit/s. And 1 bit/s of each user is served by B2. Then, the
ECAV model is shown in Fig.1(b). There are two agents named
A1 and A2. The variables in A1 are V 1
1 where V j
refers to a connection between user Uj and Bi. Similarly, the
variables in A2 are V 1
2 . Assuming the threshold rate
0.8(cid:101) = 4 RBs needed
is 3 bit/s, we can calculate that at least (cid:100) 3
for the users served by B1, thus the domain of each variable
in A1 is {0, 4, ..., 8}. Also, the domain of each variable in
A2 is {0, 3, ..., 10}. The black lines in each agent are two
intra}. The
3-nry intra-constraints, thus Cintra = {C1
red lines connecting two agents are two intra-constraints, thus
Cinter = {C1
inter to illustrate
how the reward of constraint works in different conditions.
intra, the reward is −∞ when all the variables
Considering C1
associated with C1
intra have the same assignment 4. Thus the
total number of RBs consumed by three users is 12 which is
more than 8 RBs configurated at B1. Otherwise, the reward
is 0.8 × 4 × 3 = 9.6 (bit/s) calculated according to (6).
Considering C1
inter, the reward is −∞ when the assignment
of V 1
1 is 4 because it means
U2 will connect with more than one BSs (B1 and B2), which
violates the assumption of unique connection. Otherwise, the
reward is 0 (9b)). If there is no constraint violated, the final
utility calculated by the objective function is the total rate in
the whole HetNet (constraint (10b)).
2 is 3 and the assignment of V 1
inter}. We use C1
intra and C1
intra,C2
inter,C2
B. ECAV-η Model
The scale of an ECAV model, referring to the number of
agents and constraints, is related to the number of users, BSs
and the candidate BSs hold at each user. However, some
candidate BSs of the user can be ignored because these
BSs are able to satisfy the requirement of the user but with
massive RBs consumed. It can be illustrated by the number
of RBs a BS allocate to a user is inversely proportional to the
geographical distance between them. In this way, we introduce
a parameter η with which we limit the number of candidate
BSs of each user is no more than η. The following algorithms
present the selection of top η candidate BSs (denoted by CB)
and the modeling process of ECAV-η.
Algorithm 1 is the pseudo code for determining CB. It
is executed by each user distributely. More precisely, a user
estimates its total candidate BSs CB by the procedure from
line 5 to 9. Based on 4 to 7, the candidate BSs of a user
is ordered according to the unit number of RBs consumed at
such user served by different BSs (from line 22 to 28). The
time consumption of Algorithm 1 mainly consists of two parts.
One is the dermination of CB with time complexity O(NB).
The other is the ordering operation with time complexity
O(NB2). As a result, the total time expended of Algorithm 1
is O(NB + NB2). With CB, we present the pseudo code in
relation to the building of ECAV-η model.
As for Algorithm 2, it firstly sets up the agents distributely
Algorithm 1 CBj of user Uj, j ∈ U based on η
Input: The information of HetNet (B, U, γ, η)
Output: The set of candidate BS CB based on η
Initialize: CBj ← φ, CBj ← φ
procedure GETALLCANDIDATEBS
for i ∈ B, j ∈ U do
if rij ≥ γ then
(cid:83){Bi}
CBj
end if
end for
end procedure
procedure GETPARTIALCANDIDATEBS
BubbleSort (CBj)
if CBj > η then
j ← CBn
j
for n from 1 to η do
CBn
end for
CBj ← CBj
else
end if
end procedure
procedure BUBBLESORT(CBj)
for m from 1 to CBj do
for n from CBj to m + 1 do
j ) > SIN R(CBn−1
j and CBn−1
if SIN R(CBn
exchane CBn
j
j
) then
end if
end for
end for
end procedure
(cid:46) sorting by SINR
(cid:46) get η candidate BSs
Algorithm 2 ECAV-η
Initialize:
{A,V,D,R} ← φ
R ← φ
procedure SETECAV
for i ∈ B do
end for
for ∀j ∈ U, m ∈ CBj do
A(cid:83){Ai}
V(cid:83){V j
D(cid:83){Dj
C(cid:83){Cj
R(cid:83){R(Cj
C(cid:83){Ci
R(cid:83){R(Ci
i }
i ← {0, nij
Dj
i}
inter}
inter)}
intra}
intra)}
min}
end for
for i ∈ A do
end for
end procedure
(cid:46) elements in DCOP model
(cid:46) utility upon each constraint
(cid:46) based on (9b), (9a)
(cid:46) based on (10a), (10b)
(line 6). It
takes O(1). After that, each user determines
variables, domains as well as inter-constraints from line 8 to
14. This is also carried out in parallel with O(1). Finally, the
intra-constraints are constructed by each agent with O(1) (line
16 to 17). The total time complexity is O(3).
IV. MARKOV CHAIN BASED ALGORITHM
DCOP, to some degree, is a combinatorial optimization
problem in which the variables select a set of values to
maximize the objective function without or with the minimum
constraint violation. We use S to denote the set of all possible
combination of assignments of variables. Also, we call each
element s ∈ S as a candidate solution. Considering an ECAV-
η model in which the four tuples are as follows:
i a connection between Uj and Bi}
iDj
min}}
We are able to rewrite the model in the following way:
• A = {A1,A2, ...,ANB}
• V = {V j
i = {0, N ij
• D = {Dj
• C = Cinter ∪ Cintra
(cid:88)
(cid:88)
max
s∈S
s.t.(cid:64)V j1
i∈B,j∈U
,V j2
i
V j
i ∈ψ(c)
V al(V j
i )
i ∈ ψ(c), V al(V j1/j2
rij > N ij
i
min
) > 0
(11a)
(11b)
(11c)
(cid:88)
(cid:88)
After that, a convex log-sum-exp approximation of (11a) can
be made by:
max
s∈S
i∈B,j∈U
V al(V j
i ) ≈ 1
β
log(
exp(β
V al(V j
i ))
i∈B,j∈U
(12)
where β is a positive constant. We then estimate the gap be-
tween log-sum-exp approximation and (11a) by the following
proposition in [27]:
Proposition 2. Given a positive constant β and n nonnegative
values y1, y2, ..., yn, we have
max
i=1,2,...,n
yi ≤ 1
β
log(
exp(βyi))
≤ max
i=1,2,...,n
yi +
1
β
logn
(13)
In addition, the objective function (11a) has the same optimal
value with the following transformation:
(cid:88)
(cid:88)
(cid:88)
s∈S
s∈S
max
ps(cid:62)0
s.t.
ps
i∈B,j∈U
ps = 1
V als(V j
i )
(14)
i∈B,j∈U V als(V j
the reward with a
i )
simplicity, we use gβ =
solution s. For
is
in which (cid:80)
candidate
(cid:88)
s∈S
n(cid:88)
i=1
i )). Hence, on the ba-
1
sis of formulations (12) and (13), the estimation of (11a) can
be employed by evaluating gβ in the following way:
β log((cid:80)
s∈S exp(β(cid:80)
i∈B,j∈U V al(V j
(cid:88)
(cid:88)
(cid:88)
V als(V j
i∈B,j∈U
s∈S
i ) − 1
β
max
ps(cid:62)0
ps
pslogps
(15)
(cid:88)
s∈S
Assuming s∗ and λ∗ are the primal and dual optimal points
with zero duality gap. By solving the Karush-Kuhn-Tucker
(KKT) conditions [27], we can obtain the following equations:
V als(V j
i ) − 1
β
logps∗ − 1
β
+ λ = 0,∀s ∈ S
s.t.
ps = 1
s∈S
(cid:88)
(cid:88)
i∈B,j∈U
ps∗ = 1
s∈S
λ ≥ 0
(16a)
(16b)
(16c)
(17)
Then we can get the solution of ps∗ as follows:
i∈B,j∈U V als(V j
i ))
i∈B,j∈U V als(V j
i ))
exp(β(cid:80)
(cid:80)
s∈S exp(β(cid:80)
ps∗ =
(cid:88)
On the basis of above transformation,
the objective is
to construct a MC with the state space being S and the
stationary distribution being the optimal solution ps∗ when
MC converges. In this way, the assignments of variables will
be time-shared according to ps∗ and the system will stay
in a better or best solution with most of the time. Another
important thing is to design the nonnegative transition rate
qs,s(cid:48) between two states s and s(cid:48). According to [28], a series
of methods are provided which not only guarantee the resulting
MC is irreducible, but also satisfy the balance equation:
psqs,s(cid:48) = ps(cid:48)qs(cid:48),s. In this paper, we use the following method:
qs,s(cid:48) = α[exp(β
i∈B,j∈U
V als(V j
i ))]−1
(18)
The advantage of (18) is that the transition rate is indepen-
dent of the performance of s(cid:48). A distributed algorithm, named
Wait-and-Hp 3 in [28], is used to get the solution after we
transform DCOP into a MC. However, as the existence of
inter- and intra- constriants in, a checking through the way of
message passing is made in order to avoid constraint violation.
V. EXPERIMENTAL EVALUATION
A. Experimental Setting
In this section, we test the performance of the MC based
algorithm with different assginments of η in the ECAV model.
A simulated environment including a three-tiers HetNet cre-
ated within a 1000m × 1000m square is considered. In the
system, there is one macro BS, 5 pico BSs and 10 femto
3to save space, we advise readers to get more details from literature [28]
BSs with their transmission powers respectively 46, 35, and
20 dBm. The macro BS is fixed at the center of the square,
and the other BSs are randomly distributed. The path loss
between the macro (pico) BSs and the users is defined as
L(d) = 34 + 40log10(d), while the pass loss between femto
BSs and users is L(d) = 37 + 30log10(d). The parameter d
represents the Euclidean distance between the BSs and the
users in meters. The noise power refers to the thermal noise
at room temperature with a bandwidth of 180kHz and equals
to -111.45 dBm. One second scheduling interval is considered.
Without special illustration, 200 RBs are configured at macro
BS, as well as 100 and 50 RBs are configured at each pico
and femto BS. In addition, all the results are the mean of 10
instances.
B. Experimental Results
We firstly discuss the impact of different assignments of η
on the performance of ECAV model from the point of view
of the runtime and the quality of solution. More precisely,
we generate different number of users ranging from 20 to
100 with the step interval of 10. The time consumed by the
MC based algorithm is displayed in Fig.2. It is clear to see
that more time is needed when the number of users increases.
Also, the growth of runtime is depended on the value of η.
Specially, there is an explosive growth of runtime when we set
η from four to five. As previously stated, this is caused by more
candidate BSs considered by each user. However, the quality
of the solutions with different values of η is not obviously
improved according the results in Table I. For instance, the
average rate achieved at each user is only improved no more
than 0.1 bit/s when the number of users are 100 with the values
of η are 3 and 5. It is difficult to make a theoretical analysis
of the realationship between η and the quality of the solution.
We leave this research in future works.
From above analysis, we set η = 3 in the following
experiments in order to balance the runtime and performance
of the solution. In addition, we test the performance of the MC
based algorithm comparing with its counterparts Max-SINR
and LDD based algorithms.
THE AVERAGE RATE (BIT/S) ACHIEVED AT EACH USER
TABLE I
Users
50
80
100
η = 1
12.47
8.12
6.11
η = 2
12.82
8.37
6.37
η = 3
13.10
8.55
6.73
η = 4
13.22
8.68
6.81
η = 5
13.59
8.77
6.83
In Fig.3, we check the connection state between 200 users
and BSs in different tiers. A phenomenon we can observe
from the figure is that there are more or less some users out
of service even we use different kinds of algorithms. It is not
only caused by the limited resource configured at each BSs,
but also related to the positions of such kinds of users. They
are located at the edge of the square and hardly served by any
BS in the system. Further, more users are served by macro
BS in Max-SINR algorithm because a larger SINR always
eixsts between the users and macro BS. As a result, the total
non-served users in Mmax-SINR algorithms are more than the
other two if there is no scheme for allocating the left resource.
On the other hand, the number of non-served users in MC are
less than LDD when η = 3 since the user Uj will select a
BS Bi with the maximal QIij in each iteration of the LDD
algorithm. In other words, the users prefer to connect with
a BS which can offer better QoS even when more resources
are consumed. Therefore, some BSs have to spend more RBs
which leads to the resource at these BSs being more easily
used up.
Fig. 2. The runtime of ECAV-η (η = 1 − 5) with different number of users
in the HetNet
Fig. 5. The CDFs of the rate acheived at users
Fig. 3. The connection between users and BSs according to the allocation
scheme obtained through different algorithms
Fig. 6.
station
The total rate against the number of RBs held at the macro base
In Fig.4, we produce a statistic of the number of non-served
users when we change the total number of users configured
in the HetNet. The average number of non-served users for
each algorithm along with the standard deviation is presented
in the figure. Compared with Fig.3, a more clear results imply
that more than 60 (at worst, around 70) non-served users in
the Max-SINR algorithm. The LDD based algorithm comes
the second with approximate 20 users. The best resutls are
obtained by the MC algorithm with no more than 20 users
even the total users in the HetNet is 240.
Fig. 4. Non-served users in the HetNet with a different number of users
In Fig.5, we compare the cumulative distribution function
(CDF) of the rate. The rate of the users seldomly drops below
the threshold (3 bit/s) when we use the distributed algorithms
(LDD and MC based algorithms), while Max-SINR algorithm
is unable to satisfy the rate QoS constraints. Moreover, the
rate CDFs of the MC based algorithm never lie above the
corresponding CDFs obtained by implementing the Max-SINR
algorithm (the gap is between 6%− 20%). Likewise, At worst
5% gap eixts between the MC based algorithm and LDD when
we set η = 3.
At last, another intesest observation is made by configurat-
ing different number of RBs at macro BS (Fig.6). When we
change the number of RBs from 150 to 250 at macro BS, it is
clear to see that the total rate obtained by LDD is not sensitive
to the variation of the resource hold by macro BS. This result
is also related to the solving process in which two phases are
needed when employing a LDD based algorithm. As we have
discuss in the Introduction section, a solution which can satisfy
the basic QoS requirement will be accepted by the LDD based
algorithm. It finally affects the allocation of left resource at
marco BS. As a result, the algorithm easily falls into the local
optima. This problem, to some degree, can be overcome by the
ECAV model since there is only one phase in the model. With
the ECAV model, a constraint satisfied problem is transformed
into a constraint optimizaiton problem. And the advantage
of DCOP is successfully applied into solving user assocation
problem.
VI. CONCLUSION
An important breakthrough in this paper is that we take
the DCOP into the application of HetNet. More preisely, we
propose an ECAV model along with a parameter η to reduce
the number of nodes and constraints in the model. In addition,
a markov basesd algorithm is applied to balance the quality of
solution and the time consumed. From experimental results,
we can draw a conclusion that the quality of the solution
obtained by the ECAV-3 model solved with the MC based
algorithm is better than the centralized algorithm, Max-SINR
and distributed one LDD, especially when the number of users
increases but they are limited to the available RBs. In future
work, we will extend our research to the following two aspects:
like K-opt [29] and ADOPT [30]
for DCOP,
there are already a theoretial analysis on the
completeness of solution. However, it is still a chanllenge
job in most research of DCOP algorithm, like the MC based
algorithm proposed in this paper. Thus, we will explore the
quality of the solution assoicated with different values of η.
In practice, the BSs in small cells (like pico/femto BSs) have
properties of plug-and-play. They are generally deployed in a
home or small business where the environment is dynamic. In
this way, we should design a DCOP model which is fit for the
variations in the environment such as the mobility of users
and different states (active or sleep) of BSs. To this end, a
stochastic DCOP model can be considered like the one in .
In some algorithms,
REFERENCES
[1] F. Fioretto, F. Campeotto, A. Dovier, E. Pontelli, and W. Yeoh, Large
neighborhood search with quality guarantees for distributed constraint
optimization problems," in Proceedings of the 2015 International Con-
ference on Autonomous Agents and Multiagent Systems.
International
Foundation for Autonomous Agents and Multiagent Systems, 2015, pp.
1835–1836.
[2] F. Fioretto, W. Yeoh, and E. Pontelli, A dynamic programming-based
mcmc framework for solving dcops with gpus," in International Confer-
ence on Principles and Practice of Constraint Programming. Springer,
2016, pp. 813–831.
[3] X. Ge, S. Tu, T. Han, Q. Li, and G. Mao, Energy efficiency of small
cell backhaul networks based on gauss–markov mobile models," IET
Networks, vol. 4, no. 2, pp. 158–167, 2015.
[4] Y. Kim and V. R. Lesser, Djao: A communication-constrained dcop
algorithm that combines features of adopt and action-gdl." in AAAI,
2014, pp. 2680–2687.
[5] T. Le, F. Fioretto, W. Yeoh, T. C. Son, and E. Pontelli, Er-dcops: A
framework for distributed constraint optimization with uncertainty in
constraint utilities," in Proceedings of the 2016 International Conference
on Autonomous Agents & Multiagent Systems.
International Foundation
for Autonomous Agents and Multiagent Systems, 2016, pp. 606–614.
[6] F. Fioretto, W. Yeoh, and E. Pontelli, Multi-variable agent decomposition
for dcops," in Thirtieth AAAI Conference on Artificial Intelligence, 2016.
[7] W. Yeoh, P. Varakantham, X. Sun, and S. Koenig, Incremental dcop
search algorithms for solving dynamic dcops," in The 10th International
Conference on Autonomous Agents and Multiagent Systems-Volume
3.
International Foundation for Autonomous Agents and Multiagent
Systems, 2011, pp. 1069–1070.
[8] V. Lesser, C. L. Ortiz Jr, and M. Tambe, Distributed sensor networks:
A multiagent perspective. Springer Science & Business Media, 2012,
vol. 9.
[9] G. Mao and B. D. Anderson, Graph theoretic models and tools for the
analysis of dynamic wireless multihop networks," in 2009 IEEE Wireless
Communications and Networking Conference.
IEEE, 2009, pp. 1–6.
[10] G. Mao, B. D. Anderson, and B. Fidan, Online calibration of path loss
IEEE,
exponent in wireless sensor networks," in IEEE Globecom 2006.
2006, pp. 1–6.
[11] A. A. Kannan, B. Fidan, and G. Mao, Robust distributed sensor network
localization based on analysis of flip ambiguities," in IEEE GLOBECOM
2008-2008 IEEE Global Telecommunications Conference.
IEEE, 2008,
pp. 1–6.
[12] K. Kinoshita, K. Iizuka, and Y. Iizuka, Effective disaster evacuation by
solving the distributed constraint optimization problem," in Advanced
Applied Informatics (IIAIAAI), 2013 IIAI International Conference on.
IEEE, 2013, pp. 399–400.
[13] T. Brys, T. T. Pham, and M. E. Taylor, Distributed learning and multi-
objectivity in traffic light control," Connection Science, vol. 26, no. 1,
pp. 65–83, 2014.
[14] R. Mao and G. Mao, Road traffic density estimation in vehicular
networks," in 2013 IEEE Wireless Communications and Networking
Conference (WCNC).
IEEE, 2013, pp. 4653–4658.
[15] F. Amigoni, A. Castelletti, and M. Giuliani, Modeling the management
of water resources systems using multi-objective dcops," in Proceedings
of the 2015 International Conference on Autonomous Agents and Mul-
tiagent Systems.
International Foundation for Autonomous Agents and
Multiagent Systems, 2015, pp. 821–829.
[16] P. Rust, G. Picard, and F. Ramparany, Using message-passing dcop
algorithms to solve energy-efficient smart environment configuration
problems," in International Joint Conference on Artificial Intelligence,
2016.
[17] N. Guan, Y. Zhou, L. Tian, G. Sun, and J. Shi, QoS guaranteed resource
block allocation algorithm for lte systems," in Proc. Int. Conf. Wireless
and Mob. Comp., Netw. and Commun. (WiMob), Shanghai, China, Oct.
2011, pp. 307–312.
[18] T. K. Vu, Resource allocation in heterogeneous networks," Ph.D. dis-
sertation, University of Ulsan, 2014.
[19] D. Liu, L. Wang, Y. Chen, M. Elkashlan, K.-K. Wong, R. Schober, and
L. Hanzo, User association in 5g networks: A survey and an outlook,"
IEEE Communications Surveys & Tutorials, vol. 18, no. 2, pp. 1018–
1044, 2016.
[20] H. Boostanimehr and V. K. Bhargava, Unified and distributed QoS-
driven cell association algorithms in heterogeneous networks," IEEE
Wireless Commun., vol. 14, no. 3, pp. 1650–1662, 2015.
[21] Q. Ye, B. Rong, Y. Chen, C. Caramanis, and J. G. Andrews, Towards an
optimal user association in heterogeneous cellular networks," in Global
Communications Conference (GLOBECOM), 2012 IEEE.
IEEE, 2012,
pp. 4143–4147.
[22] V. N. Ha and L. B. Le, Distributed base station association and power
control for heterogeneous cellular networks," IEEE Transactions on
Vehicular Technology, vol. 63, no. 1, pp. 282–296, 2014.
[23] T. L. Monteiro, M. E. Pellenz, M. C. Penna, F. Enembreck, R. D.
Souza, and G. Pujolle, Channel allocation algorithms for wlans using
distributed optimization," AEU-International Journal of Electronics and
Communications, vol. 66, no. 6, pp. 480–490, 2012.
[24] T. L. Monteiro, G. Pujolle, M. E. Pellenz, M. C. Penna, and R. D.
Souza, A multi-agent approach to optimal channel assignment in wlans,"
in 2012 IEEE Wireless Communications and Networking Conference
(WCNC).
IEEE, 2012, pp. 2637–2642.
[25] J. Xie, I. Howitt, and A. Raja, Cognitive radio resource management
using multi-agent systems," in IEEE CCNC, 2007.
[28] M. Chen, S. C. Liew, Z. Shao, and C. Kai, Markov approximation for
combinatorial network optimization," IEEE Transactions on Information
Theory, vol. 59, no. 10, pp. 6301–6327, 2013.
[29] H. Katagishi and J. P. Pearce, Kopt: Distributed dcop algorithm for
arbitrary k-optima with monotonically increasing utility," in Ninth DCR
Workshop, 2007.
[30] P. J. Modi, W.-M. Shen, M. Tambe, and M. Yokoo, Adopt: Asynchronous
distributed constraint optimization with quality guarantees," Artificial
Intelligence, vol. 161, no. 1, pp. 149–180, 2005.
[26] M. Vinyals, J. A. Rodriguez-Aguilar, and J. Cerquides, Constructing a
unifying theory of dynamic programming dcop algorithms via the gen-
eralized distributive law," Autonomous Agents and Multi-Agent Systems,
vol. 22, no. 3, pp. 439–464, 2011.
[27] S. Boyd and L. Vandenberghe, Convex optimization.
Cambridge
university press, 2004.
|
1702.07984 | 3 | 1702 | 2018-10-28T03:19:07 | Iterative Local Voting for Collective Decision-making in Continuous Spaces | [
"cs.MA",
"cs.CY",
"cs.GT"
] | Many societal decision problems lie in high-dimensional continuous spaces not amenable to the voting techniques common for their discrete or single-dimensional counterparts. These problems are typically discretized before running an election or decided upon through negotiation by representatives. We propose a algorithm called {\sc Iterative Local Voting} for collective decision-making in this setting. In this algorithm, voters are sequentially sampled and asked to modify a candidate solution within some local neighborhood of its current value, as defined by a ball in some chosen norm, with the size of the ball shrinking at a specified rate.
We first prove the convergence of this algorithm under appropriate choices of neighborhoods to Pareto optimal solutions with desirable fairness properties in certain natural settings: when the voters' utilities can be expressed in terms of some form of distance from their ideal solution, and when these utilities are additively decomposable across dimensions. In many of these cases, we obtain convergence to the societal welfare maximizing solution.
We then describe an experiment in which we test our algorithm for the decision of the U.S. Federal Budget on Mechanical Turk with over 2,000 workers, employing neighborhoods defined by $\mathcal{L}^1, \mathcal{L}^2$ and $\mathcal{L}^\infty$ balls. We make several observations that inform future implementations of such a procedure. | cs.MA | cs |
Iterative Local Voting for Collective Decision-making in
Continuous Spaces
Nikhil Garg
Stanford University
[email protected]
Vijay Kamble
University of Illinois at Chicago
[email protected]
Ashish Goel
Stanford University
[email protected]
David Marn
University of California, Berkeley
[email protected]
Kamesh Munagala
Duke University
[email protected]
October 30, 2018
Abstract
Many societal decision problems lie in high-dimensional continuous spaces not amenable
to the voting techniques common for their discrete or single-dimensional counterparts. These
problems are typically discretized before running an election or decided upon through negotiation
by representatives. We propose a algorithm called Iterative Local Voting for collective
decision-making in this setting. In this algorithm, voters are sequentially sampled and asked to
modify a candidate solution within some local neighborhood of its current value, as defined by
a ball in some chosen norm, with the size of the ball shrinking at a specified rate.
We first prove the convergence of this algorithm under appropriate choices of neighborhoods
to Pareto optimal solutions with desirable fairness properties in certain natural settings: when
the voters' utilities can be expressed in terms of some form of distance from their ideal solution,
and when these utilities are additively decomposable across dimensions. In many of these cases,
we obtain convergence to the societal welfare maximizing solution.
We then describe an experiment in which we test our algorithm for the decision of the U.S.
Federal Budget on Mechanical Turk with over 2,000 workers, employing neighborhoods defined
by L1,L2 and L∞ balls. We make several observations that inform future implementations of
such a procedure.
1
Introduction
Methods and experiments to increase large-scale, direct citizen participation in policy-making
have recently become commonplace as an attempt to revitalize democracy. Computational and
crowdsourcing techniques involving human-algorithm interaction have been a key driver of this
trend [5, 21, 22, 28]. Some of the most important collective decisions, whether in government or in
business, lie in high-dimensional, continuous spaces -- e.g. budgeting, taxation brackets and rates,
collectively bargained wages and benefits, urban planning etc. Direct voting methods originally de-
signed for categorical decisions are typically infeasible for collective decision-making in such spaces.
Supported by NSF grant nos. CCF-1408784, CCF-1637397, CCF-1637418, and IIS-1447554, ONR grant no.
N00014-15-1-2786, ARO grant no. W911NF-14-1-0526, and the NSF Graduate Research Fellowship under grant no.
DGE-114747. This work benefited from many helpful discussions with Oliver Hinder.
1
Although there has been some theoretical progress on designing mechanisms for continuous decision-
making [8, 24, 27], in practice these problems are usually resolved using traditional approaches --
they are either discretized before running an election, or are decided upon through negotiation by
committee, such as in a standard representative democracy [5, 14, 15, 30, 32].
One of the main reasons for the current gap between theory and practice in this domain is the
challenge of designing practically implementable mechanisms. We desire procedures that are simple
enough to explain and use in practice, and that result in justifiable solutions while being robust
to the inevitable deviations from ideal models of user behavior and preferences. To address this
challenge, a social planner must first make practically reasonable assumptions on the nature and
complexity of feedback that can be elicited from people and then design simple algorithms that
operate effectively under these conditions. Further, while robustness to real-world model deviations
may be difficult to prove in theory, it can be checked in practice through experiments.
We first tackle the question of what type of feedback voters can give. In general, for the types
of problems we wish to solve, a voter cannot fully articulate her utility function. Even if voters
in a voting booth had the patience to state their exact utility for a reasonably large number of
points (e.g. how much they liked each candidate solution on a scale from one to five), there is no
reason to believe that they could do so in any consistent manner. On the other hand, we posit that
it is relatively easy for people to choose their favorite amongst a reasonably small set of options,
or articulate how they would like to locally modify a candidate solution to better match their
preferences. Such an assumption is common and is a central motivation in social choice, especially
implicit utilitarian voting [26].
In this paper, we study and experimentally test a type of algorithm for large-scale preference
aggregation that effectively leverages the possibility of asking voters such easy questions. In this
algorithm that we call Iterative Local Voting (ILV), voters are sequentially sampled and are
asked to modify a candidate solution to their favorite point within some local neighborhood, until
a stable solution is obtained (if at all). With a continuum of voters, no one votes more than once.
The algorithm designer has flexibility in deciding how these local neighborhoods are defined -- in
this paper we focus on neighborhoods that are balls in the Lq norm, and in particular on the cases
and ∞ neighborhoods correspond to bounds on the sum of absolute values of the changes, the sum
of the square of the changes, and the maximum change, respectively.)
where q = 1, 2 or ∞. (For M < ∞ dimensional vectors, the Lq norm (cid:107)x(cid:107)q (cid:44) q(cid:112)(cid:80)m xmq. q = 1, 2
More formally, consider a M-dimensional societal decision problem in X ⊂ RM and a population
of voters V, where each voter v ∈ V has bounded utility fv(x) ∈ R,∀ x ∈ X . Then we consider
the class of algorithms described in Algorithm 1. We study the algorithm class under two plausible
models of how voters respond to query (1), which asks for the voter's favorite point in a local region.
• Model A: One possibility is that voters exactly perform the maximization asked of them, re-
sponding with their favorite point in the given Lq norm constraint set. In other words, they return
a point arg maxx∈{s:(cid:107)s−xt−1(cid:107)q≤rt}fvt(x). Note that by definition of this movement, the algorithm
is myopically incentive compatible: if a voter is the last voter and no projections are used, then
truthfully performing this movement is the dominant strategy. In general, the mechanism is not
globally incentive compatible, nor incentive compatible with projections onto the feasible region.
Simple examples of manipulations in both instances exist.
• Model B: On the other hand, voters may not actually search within the constraint set to find
their favorite point inside of it. Rather, a voter v may have an idea about how to best improve the
current point and then move in that direction to the boundary of the given constraint set. This
model leads to a voter moving the current solution in the direction of the gradient of her utility
2
Algorithm 1: Iterative Local Voting (ILV)
Inputs:
termination time T , norm q for local neighborhood.
Output: Solution x.
Initial solution x0 ∈ X , tolerance > 0, an integer N, initial radius r0 > 0,
• For t ≥ 1, sample a voter vt ∈ V at random from the population; set rt = r0/t and elicit
(cid:48)
t = arg maxx∈{s:(cid:107)s−xt−1(cid:107)q≤rt}fvt(x),
x
(1)
t]X , where [·]X is a projection onto space X ; i.e. ask the voter to
and then compute xt = [x(cid:48)
move to her favorite point within the constraints, and find the projection of the reported
point onto X .
• Stop when either t = T , in which case return xT , or when maxl, m∈{t−N,...,t} xl − xm ≤ , in
which case return x = xt.
gt(cid:107)gt(cid:107)q
, for some gt ∈ ∂fvt(xt−1). Note that ∂f (x) denotes the
function, returning a point xt−1 + rt
set of subgradients of a function f at x, i.e. g ∈ ∂f (x) if ∀y, f (y) − f (x) ≥ gT (y − x).
ILV is directly inspired by the stochastic approximation approach to solve optimization problems
[29], especially stochastic gradient descent (SGD) and the stochastic subgradient method (SSGM).
The idea is that if (a) voter preferences are drawn from some probability distribution and (b) the
response of a voter to the query (1) moves the solution approximately in the direction of her utility
gradient, then this procedure almost implements stochastic gradient descent for minimizing negative
expected utility.
The caveat is that although the procedure can potentially obtain the direction of the gradient
of the voter utilities, it cannot in general obtain any information about its magnitude since the
movement norm is chosen by the procedure itself. However, we show that for certain plausible
utility and voter response models, the algorithm does indeed converge to a unique point with
desirable properties, including cases in which it converges to the societal optimum.
Note that with such feedback and without any additional assumptions on voter preferences (e.g.
that voter utilities are normalized to the same scale), no algorithm has any hope of finding a desirable
solution that depends on the cardinal values of voters' utilities, e.g., the social welfare maximizing
solution (the solution that maximizes the sum of agent utilities). This is because an algorithm that
uses only ordinal information about voter preferences is insensitive to any scaling or even monotonic
transformations of those preferences.
1.1 Contributions
This work is a step in extending the vast literature in social choice to continuous spaces, taking into
account the feedback that voters can actually give. Our main theoretical contributions are as follows:
• Convergence for Lp normed utilities: We show that if the agents cost functions can be
expressed as the Lp distance from their ideal solution, and if agents correctly respond to query (1),
then an interesting duality emerges: for p = 1, 2 or ∞, using Lq neighborhoods, where q = ∞, 2
and 1 respectively, results in the algorithm converging to the unique social welfare optimizing
solution. Whether such a result holds for general (p, q), where q is the dual norm to p (i.e.
1/p + 1/q = 1), is an open question. However, we show that such a general result holds if, in
3
response to query (1), the voter instead moves the current solution in the direction of the gradient
of her utility function to the neighborhood boundary.
• Convergence for other utilities: Next, we show convergence to a unique solution in two cases:
(a) when the voter cost can be expressed as a weighted sum of L2 distances over sub-spaces of the
solution space, under L2 neighborhoods -- in which case the solution is also Pareto efficient, and
(b) when the voter utility can be additively decomposed across dimensions, under L∞ neighbor-
hoods -- in which case the algorithm converges to the median of the ideal solutions of the voters
on each dimension.
We then build a platform and run the first large-scale experiment in voting in multi-dimensional
continuous spaces, in a budget allocation setting. We test three variants of ILV: with L1, L2 and
L∞ neighborhoods. Our main findings are as follows:
• We observe that the algorithm with L∞ neighborhoods is the only alternative that satisfies the
first-order concern for real-world deployability: consistent convergence to a unique stable solution.
Both L1 and L2 neighborhoods result in convergence to multiple solutions.
• The consistent convergence under L∞ neighborhoods in experiments strongly suggests the de-
composability of voter utilities for the budgeting problem. Motivated by this observation, we
propose a general class of decomposable utility functions to model user behavior for the budget
allocation setting.
• We make several qualitative observations about user behavior and preferences. For instance, vot-
ers have large indifference regions in their utilities, with potentially larger regions in dimensions
about which they care about less. Further, we show that asking voters for their ideal budget
allocations and how much they care about a given item is fraught with UI biases and should be
carefully designed.
We remark that an additional attractive feature of such a constrained local update algorithm
in a large population setting is that strategic behavior from the voters is less of a concern: even
if a single voter is strategic, her effect on the outcome is negligible. Further, it may be difficult
for a voter, or even a coalition of voters, to strategically vote; one must reason over the possible
future trajectories of the algorithm over the randomness of future voters. One coalition strategy for
L2 and L∞ neighborhoods, voters trade votes on different dimensions with one another; we leave
robustness to such strategies to future work.
The structure of the paper is as follows. After discussing related work in Section 2, we present
convergence results for our algorithm under different settings in Section 3. In Section 4, we introduce
the budget allocation problem and describe our experimental platform. In Section 5, we analyze
the experiment results, and then we conclude the paper in Section 6. The proofs of our results are
in the appendix.
2 Related Work
Our work relates to various strands of literature. We note that a conference version of this work
appeared previously [13]. Furthermore, the term "iterative voting" is also used in other works to
denote unrelated methods [1, 23].
4
Stochastic Gradient Descent As discussed in the introduction, we draw motivation from the
stochastic subgradient method (SSGM), and our main proof technique is mapping our algorithm
to SSGM. Beginning with the original stochastic approximation algorithm by Robbins and Monro
[29], a rich literature surrounds SSGM, for instance see [4, 19, 25, 31].
Iterative local voting A version of our algorithm, with L2 norm neighborhoods, has been pro-
posed independently several times [3, 9, 17] and is referred to as Normalized Gradient Ascent (NGA).
Instead of directly asking voters to perform query (1), the movement ∇fv(xt−1)
would be estimated
(cid:107)∇fv(xt−1)(cid:107)2
through population surveys to try to compute the fixed point where Ev(cid:104) ∇fv(x)
we work with distributions of voters and for strictly concave utility functions, the movement for
each voter is well-defined for all but a measure 0 set. Then, given a bounded density function of
voters, the expectation is well-defined).
(cid:107)∇fv(x)(cid:107)2(cid:105) = 0. (Note that
This fixed point has been called Directional Equilibrium (DE) in the recent literature [9]. The
movement is equivalent to the movement in this work in the case voters respond according to
Model B and with L2 neighborhoods, and we show in Section 3.3 that, in such cases, the algorithm
converges to a Directional Equilibrium when it converges. We further conjecture that even under
voter Model A, if Algorithm 2 converges, the fixed point is a Directional Equilibrium.
Several properties of the fixed point have been studied, starting from [17] to more recently,
it exists under light assumptions, is Pareto efficient, and has important connections
[9] and [3]:
to the Majority Core literature in economics. Showing that an iterative algorithm akin to ours
converges to such a point has been challenging; indeed, except for special cases such as quadratic
utilities fv(x) = −(x − xv)T Ω(x − xv), with society-wide Ω that encodes the relative importance
and relationships between issues [3], convergence is an open question.
Our algorithm differs from NGA in a few crucial directions, even in the case that the movement
is equivalent: by relating our algorithm to SGD, we are able to characterize the step-size behavior
necessary for convergence and show convergence even when each step is made by a single voter,
rather than after an estimate of the societal normalized gradient. One can also characterize the
convergence rate of the algorithm [25]. Furthermore, the literature has referred to the L2 norm
(or "quadratic budget") constraint as "central to their strategic properties" [2]. In this work, this
limitation is relaxed -- the same strategic property, myopic incentive compatibility, holds for the
other norm constraints for their respective cases.
Finally, because we are primarily interested in designing implementable voting mechanisms, we
focus on somewhat different concerns than the directional equilibria literature. However, we believe
that the ideas in this work, especially the connections to the optimization literature, may prove
useful to work on NGA. To the best of our knowledge, no work studies such an algorithm with other
neighborhoods and under ordinal feedback, or implements such an algorithm.
Optimization without gradients Because we are concerned with optimization without access to
voters' utility functions or its gradients, this work seems to be in the same vein as recent literature
on convex optimization without gradients -- such as with comparisons or with pairs of function
evaluations [10 -- 12, 18]. However, in the social choice or human optimization setting, we cannot
estimate each voter's utility functions or gradients exactly rather than up to a scaling term, and yet
we would like to find some point with good societal properties. This limitation prevents the use of
strategies from such works.
5
Jamieson et al. [18], for example, present an optimal coordinate-descent based algorithm to find
the optimum of a function for the case in which noisy comparisons are available on that function;
in our setting, such an algorithm could be used to find the optimal value for each voter, but not
the societal optimum because each voter can independently scale her utility function. Duchi et al.
[10] present a distributed optimization algorithm where each node (voter) has access to its own
subgradients and a few of its neighbors, but in our case each voter can arbitrarily scale her utility
function and thus her subgradients. Similar problems emerge in applying results from the work
of Duchi et al. [11].
In our work, such scaling does not affect the point to which the algorithm
converges.
Participatory Budgeting The experimental setting for this work, and a driving motivation, is
Participatory Budgeting, in which voters are asked to help create a government budget. Partici-
patory budgeting has been among the most successful programs of Crowdsourced Democracy, with
deployments throughout the world allocating hundreds of millions of dollars annually, and studies
have shown its civic engagement benefits [5, 14, 15, 21, 22, 30, 32].
In a typical election, community members propose projects, which are then refined and voted on
by either their representatives or the entire community, through some discrete aggregation scheme.
In no such real-world election, to our knowledge, can the amount of money to allocate to a project
be determined in a continuous space within the voting process, except through negotiation by
representatives.
Goel et al. [15] propose a "Knapsack Voting" mechanism in which each voter is asked to create
a valid budget under the budget constraint; the votes are then aggregated using K-approval ag-
gregation on each dollar in the budget, allowing for fully continuous allocation in the space. This
mechanism is strategy-proof under some voter utility models. In comparison, our mechanism works
in more general spaces and is potentially easier for voters to do.
Implicit Utilitarian Voting With a finite number of candidates, the problem of optimizing some
societal utility function (based on the cardinality of voter utilities) given only ordinal feedback is
well-studied, with the same motivation as in this work: ordinal feedback such as rankings and subset
selections are relatively easy for voters to provide. The focus in such work, referred to as implicit
utilitarian voting, is to minimize the distortion of the output selected by a given voting rule, over
all possible utility functions consistent with the votes, i.e. minimize the worst case error achieved
by the algorithm due to an under-determination of utility functions when only using the provided
inputs [6, 7, 16, 26]. In this work, we show convergence of our algorithm under certain implicit
utility function forms. However, we do not characterize the maximum distortion of the resulting
fixed point (or even the convergence to any fixed point) under any utility functions consistent with
the given feedback, leaving such analysis for future work.
3 Convergence Analysis
In this section, we discuss the convergence properties of ILV under various utility and behavior
models. For the rest of the technical analysis, we make the following assumptions on our model.
C1 The solution space X ⊆ RM is non-empty, bounded, closed, and convex.
C2 Each voter v has a unique ideal solution xv ∈ X .
6
Spatial, (p, q) = (2, 2), (1,∞), or (∞, 1)
Spatial, (p, q) s.t. 1/p + 1/q = 1
Weighted Euclidean
Decomposable
Model A
Model B
Social Opt. (Thm 1)
?
Social Opt. (Thm 2)
Social Opt. (Thm 1)
Medians (Thm 2)
Table 1: Summary of convergence results
C3 The ideal point xv of each voter is drawn independently from a probability distribution with
a bounded and measurable density function hX .
Under this model, for a solution x ∈ X , the societal utility is given by Ev[fv(x)]. and the social
optimal (SO) solution is any x∗ ∈ arg maxx∈X Ev[fv(x)].
"Convergence" of ILV refers to the convergence of the sequence of random variables {xt}t≥1 to
some x ∈ X with probability 1, assuming that the algorithm is allowed to run indefinitely (this
notion of convergence also implies the termination of the algorithm with probability 1).
In the following subsections, we present several classes of utility functions for which the algorithm
converges, summarized in Table 1. We further formalize the relationship to directional equilibria in
Section 3.3.
3.1 Spatial Utilities
Here we consider spatial utility functions, where the utilities of each voters can be expressed in the
form of some kind of spatial distance from their ideal solutions. First, we consider the following
kind of utilities.
Definition 1. Lp normed utilities. The voter utility function is Lp normed if fv(x) = −(cid:107)x −
xv(cid:107)p,∀x ∈ X .
Under such utilities, for p = 1, 2 and ∞, restricting voters to a ball in the dual norm leads to
convergence to the societal optimum.
Theorem 1. Suppose that conditions C1, C2, and C3 are satisfied, the voter utilities are Lp normed,
and voters respond to query (1) according to either Model A or Model B. Then, ILV with Lq
neighborhoods converges to the societal optimal point w.p. 1 when (p, q) = (2, 2), (1,∞), or (∞, 1).
The proof is contained in the appendix. A sketch of the proof is as follows. For the given
pairs (p, q), we show that, except in certain 'bad' regions, the update rule xt+1 = arg minx[(cid:107)x −
xvt(cid:107)p : (cid:107)x − xt(cid:107)q ≤ rt] is equivalent to the stochastic subgradient method (SSGM) update rule
xt+1 = xt − rtgt, for some gt ∈ ∂Ev[(cid:107)x − xvt(cid:107)p], and that the probability of being in a 'bad' region
decreases fast enough as a function of rt. We then leverage a standard SSGM convergence result
to finish the proof. One natural question is whether the result extends to general dual norms p, q,
where 1/p + 1/q = 1. Unfortunately, the update rule is not equivalent to SSGM in general, and we
leave the convergence to the societal optimum for general (p, q) as an open question.
Further, note that even if each voter could scale their utility function arbitrarily, the algorithm
would converge to the same point.
However, the general result does hold for general dual norms (p, q) if one assumes the alternative
behavior model.
7
Theorem 2. Suppose that conditions C1, C2, and C3 are satisfied, the voter utilities are Lp normed,
and voters respond to query (1) according to Model B. Then, ILV with Lq neighborhoods converges
to the societal optimal point w.p. 1 for any p > 0 and q > 0 such that 1/p + 1/q = 1.
The proof is contained in the appendix. It uses the following property of Lp normed utilities: the
Lq norm of the gradient of these utilities at any point other than the ideal point is constant. This
fact, along with the voter behavior model, allows the algorithm to implicitly capture the magnitude
of the gradient of the utilities, and thus a direct mapping to SSGM is obtained. Note that the above
result holds even if we assume that a voter moves to her ideal point xv in case it falls within the
neighborhood (since, as explained earlier, the probability of sampling such a voter decreases fast
enough).
Next, we introduce another general class of utility functions, which we call Weighted Euclidean
utilities, for which one can obtain convergence to a unique solution.
Definition 2. Weighted Euclidean utilities. Let the solution space X be decomposable into K
k=1 dim(xk) = M). Suppose
different sub-spaces, so that x = (x1, . . . , xK) for each x ∈ X (where(cid:80)K
that the utility function of the voter v is
fv(x) = − K(cid:88)k=1
wk
v(cid:107)wv(cid:107)2
(cid:107)xk − xk
v(cid:107)2.
where wv is a voter-specific weight vector, then the function is a Weighted Euclidean utility function.
We further assume that wv ∈ W ⊂ RK
+ and xv are independently drawn for each voter v from a
joint probability distribution with a bounded and measurable density function, with W nonempty,
bounded, closed, and convex.
This utility function can be interpreted as follows: the decision-making problem is decomposable
v for each sub-problem
into K sub-problems, and each voter v has an ideal point xk
k, so that the voter's disutility for a solution is the weighted sum of the Euclidean distances to the
ideal points in each sub-problems. Such utility functions may emerge in facility location problems,
for example, where voters have preferences on the locations of multiple facilities on a map. This
utility form is also the one most closely related to the existing literature on Directional Equilibria
and Quadratic Voting, in which preferences are linear. To recover the weighted linear preferences
case, set K = M, with each sub-space of dimension 1. In this case, the following holds:
v and a weight wk
Proposition 1. Suppose that conditions C1, C2, and C3 are satisfied, the voter utilities are
Weighted Euclidean, and voters correctly respond to query (1) according to either Model A or
Model B. Then, ILV with L2 neighborhoods converges with probability 1 to the societal optimal
point.
The intuition for the result is as follows: as long as the neighborhood does not contain the ideal
point of the sampled voter, the correct response to query (1) under weighted Euclidean preferences
is to move the solution in the direction of the ideal point to the neighborhood boundary, which, as it
turns out, is the same as the direction of the gradient. Thus with radius rt, the effective movement is
∇fv(xt)
. With (normalized) weighted Euclidean utilities, (cid:107)∇fv(xt)(cid:107)2 = 1 everywhere. As before,
∇fv(xt)2
even if the utilities were not normalized (i.e. not divided by (cid:107)w(cid:107)2), the algorithm would converge
to the same point, as if utility functions were normalized.
8
3.2 Decomposable Utilities
Next consider the general class of decomposable utilities, motivated by the fact that the algorithm
with L∞ neighborhoods is of special interest since they are easy for humans to understand: one can
change each dimension up to a certain amount, independent of the others.
Definition 3. Decomposable utilities. A voter utility function is decomposable if there exists
concave functions f m
v
v (xm).
for m ∈ {1 . . . M} such that fv(x) =(cid:80)M
m=1 f m
If the utility functions for the voters are decomposable, then we can show that our algorithm un-
der L∞ neighborhoods converges to the vector of medians of voters' ideal points on each dimension.
Suppose that hmX is the marginal density function of the random variable xm
v , and let ¯xm be the set
of medians of xm
v . (By set of medians, we mean the set of points such that, on each dimension, the
mass of voters with ideal points above and below.)
Proposition 2. Suppose that conditions C1, C2, and C3 are satisfied, the voter utilities are de-
composable, and voters respond to query (1) according to either Model A or Model B. Then, ILV
with L∞ neighborhoods converges with probability 1 to a point in the set of medians ¯x.
Although simply eliciting each agent's optimal solution and computing the vector of median
allocations on each dimension is a viable approach in the case of decomposable utilities, deciding
an optimal allocation across multiple dimensions is a more challenging cognitive task than deciding
whether one wants to increase or decrease each dimension relative to the current solution (see
Section 5.2.3 for experimental evidence). In fact, in this case, the algorithm can be run separately
for each dimension, so that each voter expresses her preferences on only one dimension, drastically
reducing the cognitive burden of decision-making on the voter, especially in high dimensional settings
like budgeting.
3.3 Equivalence to Directional Equilibrium
As discussed in Section 2, our algorithm, with L2-norm neighborhoods, is related to an algorithm,
NGA, to find what are called Directional Equilibria in literature. Prior work mostly focuses on the
properties of the fixed point, with discussion of the proposed algorithm limited to simulations. We
show that with the radius decreasing as O( 1
t ), the algorithm indeed finds directional equilibria in
the following sense:
if under a few conditions a trajectory of the algorithm converges to a point,
then that point is a directional equilibrium.
Theorem 3. Suppose that C1, C2, and C3 are satisfied, and let G(x) (cid:44) Ev(cid:104) ∇fv(x)
(cid:107)∇fv(x)(cid:107)2(cid:105). Suppose,
G(x) is uniformly continuous, L2 movement norm constraints are used, and voters move according
to Model B. If a trajectory {x}∞
t=1 of the algorithm converges to x∗, i.e. xt → x∗, then x∗ is a
directional equilibrium, i.e. G(x∗) = 0.
The proof is in the appendix. It relies heavily on the continuity assumption: if a point x is not
a directional equilibrium, then the algorithm with step sizes O( 1
t ) will with probability 1 leave any
small region surrounding x: the net drift of the voter movements is away from the region. We note
that the necessary assumptions hold for all utility functions for which convergence holds, using the
L2 norm algorithm (e.g. weighted Euclidean utilities). It is further possible to characterize other
utility functions for which the equivalence holds: with appropriate conditions on the distribution of
voters and how f differs among voters, the conditions on G can be met.
9
We further conjecture that even under voter Model A, if Algorithm 2 converges, the fixed point
is a Directional Equilibrium. Note that as rt → 0, fv(y) can be linearly approximated by the first
term of the Taylor series expansion around x, for y ∈ {s : s − x2 ≤ rt}. Then, to maximize fv(y)
in the region, if the region does not contain xv voter v chooses y∗ s.t. y∗ − x ≈ rt
, i.e.,
the voter moves the solution approximately in the direction of her gradient to the neighborhood
boundary.
∇f (x)
∇f (x)2
A single step of our algorithm with L2 neighborhoods is similar to Quadratic Voting [20, 34] for
the same reason. Independently of our work, Benjamin et al. [2] formalize the relationship between
the Normalized Gradient Ascent mechanism and Quadratic Voting.
4 Experiments with Budgets
We built a voting platform and ran a large scale experiment, along with several extensive pilots,
on Amazon Mechanical Turk (https://www.mturk.com). Over 4,000 workers participating in total
counting pilots and the final experiment, with over 2,000 workers participating in the final experi-
ment. The design challenges we faced and voter feedback we received provide important lessons for
deploying such systems in a real-world setting.
First we present a theoretical model for our setting. We consider a budget allocation problem
on M items, where the items may include both expenditures and incomes. One possibility is to
define X as the space of feasible allocations, such as those below a spending limit, and to run the
algorithm as defined, with projections. However, in such cases, it may be difficult to theorize about
how voters behave; e.g.
if voters knew their answers would be projected onto a budget balanced
set, they may respond differently.
Rather, we consider an unconstrained budget allocation problem, one in which a voter's utility
includes a term for the budget deficit. Let E ⊆ {1 . . . M}, I = {1 . . . M}\E be the expenditure and
income items, respectively. Then the general budget utility function is fv(x) = gv(x)− d((cid:80)e∈E xe −
(cid:80)i∈I xi), where d is an increasing function on the deficit.
For example, suppose a voter's disutility was proportional to the square of the budget deficit (she
especially dislikes large budget deficits); then, this term adds complex dependencies between the
budget items. In general, nothing is known about convergence of Algorithm 1 with such utilities, as
the deficit term may add complex dependencies between the dimensions. However, if the voter utility
functions are decomposable across the dimensions and L∞ neighborhoods used, then the results of
Section 3.2 can be applied. We propose the following class of decomposable utility functions for the
budgeting problem, achieved by assuming that the cost for the deficit is linear, and call the class
"decomposable with a linear cost for deficit," or DLCD.
Definition 4. Let fv(x) be DLCD if
fv(x) =
M(cid:88)m=1
f m
v (xm) − wv(cid:32)(cid:88)e∈E
xi(cid:33) ,
xe −(cid:88)i∈I
where f m
v
is a concave function for each m and wv ∈ R+.
In the experiments discussed below in the budget setting, ILV consistently and robustly converges
with L∞ norm neighborhoods. Further, it approximately converges to the medians of the optimal
solutions (which are elicited independently), as theorized in Section 3.2. Such a convergence pattern
suggests the validity of the DLCD model, though we do not formally analyze this claim.
10
4.1 Experimental Setup
We asked voters to vote on the U.S. Federal Budget across several of its major categories: National
Defense; Healthcare; Transportation, Science, & Education; and Individual Income Tax (Note that
the US Federal Government cannot just decide to set tax receipts to some value. We asked workers
to assume tax rates would be increased or decreased at proportional rates in hopes of affecting
receipts.)
This setting was deemed the most likely to be meaningful to the largest cross-section of workers
and to yield a diversity of opinion, and we consider budgets a prime application area in general. The
specific categories were chosen because they make up a substantial portion of the budget and are
among the most-discussed items in American politics. We make no normative claims about running
a vote in this setting in reality, and Participatory Budgeting has historically been more successful
at a local level.
One major concern was that with no way to validate that a worker actually performed the task
(since no or little movement is a valid response if the solution presented to the worker was near
her ideal budget), we may not receive high-quality responses. This issue is especially important
in our setting because a worker's actions influence the initial solution future workers see. We thus
restricted the experiment to workers with a high approval rate and who have completed over 500
tasks on Mechanical Turk (MTurk). Further, we offered a bonus to workers for justifying their
movements well, and more than 80% of workers qualified, suggesting that we also received high-
quality movements. The experiment was restricted to Americans to best ensure familiarity with the
setting. Turkprime (https://www.turkprime.com) was used to manage postings and payment.
4.2 Experimental Parameters
Our large scale experiment included 2,000 workers and ran over a week in real-time. Participants
of any of the pilots were excluded. We tested the L1,L2, and L∞ mechanisms, along with a "full
elicitation" mechanism in which workers reported their ideal values for each item, and a "weight" in
[0, 10] indicating how much they cared about the actual spending in that item being close to their
stated value.
To test repeatability of convergence, each of the constrained mechanisms had three copies, given
to three separate groups of people. Each group consisted of two sets with different starting points,
with each worker being asked to vote in each set in her assigned group. Each worker only participates
as part of one group, and cannot vote multiple times.
We used a total of three different sets of starting points across the three groups, such that each
group shared one set of starting points with each of the other two groups. This setup allowed testing
for repeatability across different starting points and observing each worker's behavior at two points.
Workers in one group in each constrained mechanism type were also asked to do the full elicitation
after submitting their movements for the constrained mechanism, and such workers were paid extra.
These copies, along with the full elicitation, resulted in 10 different mechanism instances to which
workers could be allocated, each completed by about 200 workers.
To update the current point, we waited for 10 submissions and then updated the point to their
average. This averaging explains the step-like structure in the convergence plots in the next section.
The radius was decreased approximately every 60 submissions, rt (cid:117) r0
(cid:100)t/60(cid:101). The averaging and slow
radius decay rate were implemented in response to observing in the pilots that the initial few voters
with a large radius had a disproportionately high impact, as there were not enough subsequent voters
11
to recover from large initial movements away from an eventual fixed point (though in theory this
would not be a problem given enough voters). We note that the convergence results for stochastic
subgradient methods trivially extend to cover these modifications: the average movement over a
batch of submissions starting at the same point is still in expectation a subgradient, and the stepped
radius decrease still meets the conditions for valid step-sizes.
4.3 User Experience
Figure 1: UI Screenshot for 1 set of the L2 Mechanism
As workers arrived, they were randomly assigned to a mechanism instance. They had a roughly
equal probability of being assigned to each instance, with slight deviations in case an instance
was "busy" (another user was currently doing the potential 10th submission before an update of
the instance's current point) and to keep the number of workers in each instance balanced. Upon
starting, workers were shown mechanism instructions. We showed the instructions on a separate
page so as to be able to separately measure the time it takes to read & understand a given mechanism,
and the time it takes to do it, but we repeated the instructions on the actual mechanism page as
well for reference.
On the mechanism page, workers were shown the current allocation for each of the two sets in
their group. They could then move, through sliders, to their favorite allocation under the movement
constraint. We explained the movement constraints in text and also automatically calculated for
them the number of "credits" their current movements were using, and how many they had left.
Next to each budget item, we displayed the percentage difference of the current value from the
2016 baseline federal budget, providing important context to workers (The 2016 budget estimate
was obtained from http://federal-budget.insidegov.com/l/119/2016-Estimate and http://
atlas.newamerica.org/education-federal-budget). We also provided short descriptions of what
goes into each budget item as scroll-over text. The resulting budget deficit and its percent change
were displayed above the sliders, assuming other budget items are held constant.
For the full elicitation mechanism, workers were asked to move the sliders to their favorite points
with no constraints (the sliders went from $0 to twice the 2016 value in that category), and then
were asked for their "weights" on each budget item, including the deficit. Figure 1 shows part of
12
the interface for the L2 mechanism, not including instructions, with similar interfaces for the other
constrained mechanisms. The full elicitation mechanism additionally included sliders for items'
weights. On the final page, workers were asked for feedback on the experiment.
A full walk-through of the experiment with screenshots and link to an online demo is available
in the Appendix. We plan on posting the data, including feedback. In general, workers seemed
to like the experiment, though some complained about the constraints, and others were generally
confused. Some expressed excitement about being asked their views in an innovative manner and
suggested that everyone could benefit from participating as, at the least, a thought exercise. The
feedback and explanations provided by workers were much longer than we anticipated, and they
convince us of the procedure's civic engagement benefits.
5 Results and Analysis
We now discuss the results of our experiments.
5.1 Convergence
(a) L1
Figure 2: Solution over time for each mechanism type
One basic test of a voting mechanism is whether it produces a consistent and unique solution,
given a voting population and their behaviors. If an election process can produce multiple, distinct
solutions purely by chance, opponents can assail any particular solution as a fluke and call for a
re-vote. The question of whether the mechanisms consistently converge to the same point thus must
13
2003004005006007008007008009001000110012001300100200300400500600700120013001400150016001700180005010015020020040060080010001200DeficitIncomeTaxTransportation,Science,&EducationHealthcareDefenseIteration$(Billions)L1Group1,Set0L1Group1,Set1L1Group2,Set0L1Group2,Set1L1Group3,Set0L1Group3,Set1IdealPts.median(b) L2
Figure 2: (Continued) Solution over time for each mechanism type
(c) L∞
14
2003004005006007008007008009001000110012001300100200300400500600700120013001400150016001700180005010015020020040060080010001200DeficitIncomeTaxTransportation,Science,&EducationHealthcareDefenseIteration$(Billions)L2Group1,Set0L2Group1,Set1L2Group2,Set0L2Group2,Set1L2Group3,Set0L2Group3,Set1IdealPts.median2003004005006007008007008009001000110012001300100200300400500600700120013001400150016001700180005010015020020040060080010001200DeficitIncomeTaxTransportation,Science,&EducationHealthcareDefenseIteration$(Billions)L∞Group1,Set0L∞Group1,Set1L∞Group2,Set0L∞Group2,Set1L∞Group3,Set0L∞Group3,Set1IdealPts.median(a) L1
Figure 3: Net normalized movement in window of N = 30
be answered before analyzing properties of the equilibrium point itself. In this section, we show that
the L2 and L1 algorithms do not appear to converge to a unique point, while the L∞ mechanism
converges to a unique point across several initial points and with distinct worker populations.
The solutions after each voter for each set of starting points, across the 3 separate groups of
people for each constrained mechanism are shown in Figure 2. Each plot shows all the trajectories
with the given mechanism type, along with the median of the ideal points elicited from the separate
voters who only performed the full elicitation mechanism. Observe that the three mechanisms have
remarkably different convergence patterns. In the L1 mechanism, not even the sets done by the
same group of voters (in the same order) converged in all cases. In some cases, they converged for
some budget items but then diverged again. In the L2 mechanism, sets done by the same voters
starting from separate starting points appear to converge, but the three groups of voters seem to
have settled at two separate equilibria in each dimension. Under the L∞ neighborhood, on the other
hand, all six trajectories, performed by three groups of people, converged to the same allocation
very quickly and remained together throughout the course of the experiment. Furthermore, the
final points, in all dimensions except Healthcare, correspond almost exactly to the median of values
elicited from the separate set of voters who did only the full elicitation mechanism. For Healthcare,
the discrepancy could result from biases in full elicitation (see Section 5.2.4), though we make no
definitive claims. These patterns shed initial insight on how the use of L2 constraints may differ
from theory in prior literature and offer justification for the use of DLCD utility models and the
L∞ constrained mechanism.
One natural question is whether these mechanisms really have converged, or whether if we let
the experiment continue, the results would change. This question is especially salient for the L2
15
0.00.20.40.60.81.00.00.20.40.60.81.00.00.20.40.60.81.00.00.20.40.60.81.00501001502000.00.20.40.60.81.0DeficitIncomeTaxTransportation,Science,&EducationHealthcareDefenseIteration(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)1min(t,N)Pts=max(0,t−N)xs−xs−1rt(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)L1Group1,Set0L1Group1,Set1L1Group2,Set0L1Group2,Set1L1Group3,Set0L1Group3,Set1(b) L2
Figure 3: (Continued) Net normalized movement in window of N = 30.
(c) L∞
16
0.00.20.40.60.81.00.00.20.40.60.81.00.00.20.40.60.81.00.00.20.40.60.81.00501001502000.00.20.40.60.81.0DeficitIncomeTaxTransportation,Science,&EducationHealthcareDefenseIteration(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)1min(t,N)Pts=max(0,t−N)xs−xs−1rt(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)L2Group1,Set0L2Group1,Set1L2Group2,Set0L2Group2,Set1L2Group3,Set0L2Group3,Set10.00.20.40.60.81.00.00.20.40.60.81.00.00.20.40.60.81.00.00.20.40.60.81.00501001502000.00.51.01.52.0DeficitIncomeTaxTransportation,Science,&EducationHealthcareDefenseIteration(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)1min(t,N)Pts=max(0,t−N)xs−xs−1rt(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)L∞Group1,Set0L∞Group1,Set1L∞Group2,Set0L∞Group2,Set1L∞Group3,Set0L∞Group3,Set1trajectories, where trajectories within a group of people converged to the same point, but trajectories
between groups did not. Such a pattern could suggest that our results are a consequence of the
radius decreasing too quickly over time, or that the groups had, by chance, different distributions
of voters which would have been corrected with more voters. However, we argue that such does not
seem to be the case, and that the mechanism truly found different equilibria.
We can test whether the final points for each trajectory are stable by checking the net movement
in a window, normalized by each voter's radius, i.e. 1
, for some N. If voters in a
window are canceling each other's movements, then this value would go to 0, and the algorithm would
be stable even if the radius does not decrease. The notion is thus robust to apparent convergence
just due to decreasing radii. The net movement normalized in a sliding window of 30 voters, for
each dimension and mechanism, is shown in Figure 3. It seems to almost die down for almost all
mechanisms and budget items, except for a few cases which do not change the result. We conclude
it likely that the mechanisms have settled into equilibria which are unlikely to change given more
voters.
N(cid:80)t
s=t−N
xs−xs−1
rs
5.2 Understanding Voter Behavior
A mechanism's practical impact depends on more than whether it consistently converges, however.
We now turn our attention to understanding how voters behave under each mechanism and whether
we can learn anything about their utility functions from that behavior. We find that voters under-
stood the mechanisms but that their behaviors suggest large indifference regions, and that the full
elicitation scheme is susceptible to biases that can skew the results.
5.2.1 Voter understanding of mechanisms
One important question is whether, given very little instruction on how to behave, voters understand
the mechanisms and act approximately optimally under their (unknown to us) utility function. This
section shows that the voters behavior follows what one would expect in one important respect: how
much of one's movement budget the voter used on each dimension, given the constraint type.
Regardless of the exact form of the utility function, one would expect that, in the L1 constrained
mechanism, a voter would use most of her movement credits in the dimension about which she cares
most. In fact, in either the Weighted Euclidean preferences case (and with 'sub-space' being a single
dimension) or with a small radius with L1 constraints, a voter would move only on one dimension.
With L2 constraints, one would expect a voter to apportion her movement more equally because she
pays an increasing marginal cost to move more in one dimension (people were explicitly informed
of this consequence in the instructions). Under the Weighted Euclidean preferences model with L2
constraints, a voter would move in each dimension proportional to her weight in that dimension.
Finally, with L∞ constraints, a voter would move, in all dimensions in which she is not indifferent, to
her favorite point in the neighborhood for that dimension (most likely an endpoint), independently
of other dimensions. One would thus expect a more equal distribution of movements.
Figure 4 shows the average movement (as a fraction of the voter's total movement) by each voter
for the dimension she moved most, second, third, and fourth, respectively, for each constrained
mechanism. We reserve discussion of the full elicitation weights for Section 5.2.4. The movement
patterns indicate that voters understood the constraints and moved accordingly -- with more equal
movements across dimensions in L2 than in L1, and more equal movements still in L∞. We dig
deeper into user utility functions next, but can conclude that, regardless of their exact utility
17
functions, voters responded to the constraint sets appropriately.
Figure 4: Average movement in dimension over total movement for each voter, with dimensions
sorted
5.2.2 Large indifference regions
Although it is difficult to extract a voter's full utility function from their movements, the separability
of dimensions (except through the deficit term) under the L∞ constraint allows us to test whether
voters behave according to some given utility model in that dimension, without worrying about the
dependency on other dimensions.
Figure 5 shows, for the L∞ mechanism, a histogram of the movement on a dimension as a frac-
tion of the radius (we find no difference between dimensions here). Note that a large percentage of
voters moved very little on a dimension, even in cases where their ideal point in that dimension was
far away (defined as being unreachable under the current radius). This result cannot be explained
away by workers clicking through without performing the task: almost all workers moved at least
one dimension, and, given that a worker moved in a given dimension, it would not explain smaller
movements being more common than larger movements. That this pattern occurs in the L∞ mech-
anism is key -- if a voter feels any marginal disutility in a dimension, she can move the allocation
without paying a cost of more limited movement in other dimensions. We conclude that, though
voters may share a single ideal point for a dimension when asked for it, they are in fact relatively
indifferent over a potentially large region -- and their actions reflect so.
We further analyze this claim in Appendix Section B, looking at the same distribution of move-
ment but focusing on workers who provided a text explanation longer than (and shorter than,
separately) the median explanation of 197 characters. (We assume that the voters who invested
time in providing a more thorough explanation than the average worker also invested time in moving
the sliders to a satisfactory point, though this assumption cannot be validated.) Though there are
some differences (those who provide longer explanations also tend to use more of their movement),
the general pattern remains the same; only about 40% of workers who provided a long explanation
and were far away from their ideal point on a dimension used the full movement budget. This
pattern suggests that voters are relatively indifferent over large regions.
18
FirstSecondThirdFourth0.00.10.20.30.40.50.60.7FullElicitationWeightsL1L2L∞RankingofdimensionsbymovementforeachvoterMovementasfractionoftotalmovementFurthermore, this lack of movement is correlated with a voter's weights when she was also asked
to do the full elicitation mechanism. Conditioned on being far from her ideal point, when a voter
ranked an item as one of her top two important items (not counting the deficit term), she moved
an average of 74% of her allowed movement in that dimension; when she ranked an item as one of
least two important items, she moved an average of 61%, and the difference is significant through
a two sample t-test with p = .013. We find no significant difference in movement within the top
two ranked items or within the bottom two ranked items. This connection suggests that one can
potentially determine which dimensions a voter cares about by observing these indifference regions
and movements, even in the L∞ constrained case. One caveat is that the differences in effects
are not large, and so at the individual level inference of how much an individual cares about one
dimension over another may be noisy. On the aggregate, however, such determination may prove
useful.
Furthermore, we note that while such indifference regions conflict with the utility models un-
der which the L2 constraint mechanism converges in theory, it fits within the DLCD framework
introduced in Section 4.
Figure 5: Fraction of possible movement in each dimension in L∞, conditioned on distance to ideal
pt. The 'All' condition contains data from all three L∞ instances, whereas the others only from the
instance that also did full elicitation.
5.2.3 Mechanism time
In this section, we note one potential problem with schemes that explicitly elicit voter's optimal
solutions -- for instance, to find the component-wise median -- as compared to the constrained
elicitation used in ILV: it seems to be cognitively difficult for voters. In Figure 6, the median time
per page, aggregated across each mechanism type, is shown. The "Mechanism" time includes a
single user completing both sets in each of the constrained mechanism types, but not does include
the time to also do the extra full elicitation task in cases where a voter was asked to do both
a constrained mechanism and the full elicitation. The full elicitation bars include only voters
who did only the full elicitation mechanism, and so the bars are completely independent. On
average, it took longer to do the full elicitation mechanism than it took to do two sets of any
19
0.00.20.40.60.81.0Movementasfractionofpossiblemovement0.000.050.100.150.200.250.300.350.40HistogrampdfAllNearIdealPtFarfromIdealPtFigure 6: Median time per page
of the constrained mechanisms, suggesting some level of cognitive difficulty in articulating one's
ideal points and weights on each dimension -- even though understanding what the instructions are
asking was simple, as demonstrated by the shorter instruction reading time for the full elicitation
mechanism. The L∞ mechanism took the least time to both understand and do, while the L2
mechanism took the longest to do, among the constrained mechanisms.
This result is intuitive: it is easier to move each budget item independently when the maximum
movement is bounded than it is to move the items when the sum or the sum of the changes squared
is bounded (even when these values are calculated for the voter). In practice, with potentially tens
of items on which constituents are voting, these relative time differences would grow even larger,
potentially rendering full elicitation or L2 constraints unpalatable to voters.
One potential caveat to this finding is that the Full Elicitation mechanism potentially provides
more information than do the other mechanisms. From a polling perspective, it is true that more
information is provided from full elicitation -- one can see the distribution of votes, the disagreement,
and correlation across issues, among other things. However, from a voting perspective, in which the
aggregation (winner) is the only thing reported, it is not clear that this extra information is useful.
Further, much of this information that full elicitation provides can reasonably be extracted from
movements of voters, especially the movements of those who are given a starting point close to the
eventual equilibrium.
5.2.4 UI biases
We now turn our attention to the question of how workers behaved under the full elicitation mech-
anism and highlight some potential problems that may affect results in real deployments. Fig-
ures 7 and 8 show the histogram of values and weights, respectively, elicited from all workers who
did the full elicitation mechanism. Note that in the histogram of values, in every dimension, the
largest peak is at the slider's default value (at the 2016 estimated budget), and the histograms seem
to undergo a phase shift at that peak, suggesting that voters are strongly anchored at the slider's
starting value. This anchoring could systematically bias the medians of the elicited values.
20
WelcomePageInstructionsMechanismFeedback050100150200250FullElicitationL2L1L∞PageTime(Seconds)A similar effect occurs in eliciting voter weights on each dimension. Observe that in Figure 4 the
full elicitation weights appear far more balanced than the weights implied by any of the mechanisms
(for the full elicitation mechanism, the plot shows the average weight over the sum of the weights
for each voter). From the histogram of full elicitation weights, however, we see that this result is
a consequence of voters rarely moving a dimension's weight down from the default of 5, but rather
moving others up.
One potential cause of this behavior is that voters might think that putting high weights on each
dimension would mean their opinions would count more, whereas in any aggregation one would either
ignore the weights (calculate the unweighted median) or normalize the weights before aggregating.
In future work, one potential fix could be to add a "normalize" button for the weights, which would
re-normalize the weights, or to automatically normalize the weights as voters move the sliders.
These patterns demonstrate the difficulty in eliciting utilities from voters directly; even asking
voters how much they care about a particular budget item is extremely susceptible to the user
interface design. Though such anchoring to the slider default undoubtedly also occurs in the L∞
constrained mechanism, it would only slow the rate of convergence, assuming the anchoring affects
different voters similarly. These biases can potentially be overcome by changing the UI design, such
as by providing no default value through sliders. Such design choices must be carefully thought
through before deploying real systems, as they can have serious consequences.
Figure 7: Histogram of values from all full elicitation data. The red vertical lines indicate each
slider's default value (at the 2016 estimated budget).
6 Conclusion
We evaluate a natural class of iterative algorithms for collective decision-making in continuous spaces
that makes practically reasonable assumptions on the nature of human feedback. We first introduce
several cases in which the algorithm converges to the societal optimum point, and others in which
the algorithm converges to other interesting solutions. We then experimentally test such algorithms
in the first work to deploy such a scheme. Our findings are significant: even with theoretical backing,
21
020406080100120140020406080100120140160050100150200250050100150200−50005001000150020002500020406080100120140160DeficitIncomeTaxTransportation,Science,&EducationHealthcareDefenseFullElicitationValue(Billionsof$)NumberofVotersFigure 8: Histogram of weights from all full elicitation data. The red vertical lines indicate the
sliders' default value of 5.
two variants fail the basic test of being able to give a consistent decision across multiple trials with
the same set of voters. On the other hand, a variant that uses L∞ neighborhoods consistently leads
to convergence to the same solution, which has attractive properties under a likely model for voter
preferences suggested by this convergence. We also make certain observations about other properties
of user preferences -- most saliently, that they have large indifferences on dimensions about which
they care less.
In general, this work takes a significant step within the broad research agenda of understanding
the fundamental limitations on the quality of societal outcomes posed by the constraints of human
feedback, and in designing innovative mechanisms that leverage this feedback optimally to obtain
the best achievable outcomes.
A Mechanical Turk Experiment Additional Information
In this section, we provide additional information regarding our Amazon Mechanical Turk experi-
ment, including a walk-through of the user experience. Furthermore, we have a live demo that can
be accessed at: http://gargnikhil.com/projectdetails/IterativeLocalVoting/. This demo
will remain online for the foreseeable future.
Figures 9 through 13 show screenshots of the experiment. We now walkthrough the experiment:
introduction and the consent agreement.
• Figure 9 -- Welcome page. Arriving from Amazon Mechanical Turk, the workers read an
• Figure 10 -- Instructions (shown are L2 instructions). The workers read the instructions, which
• Figures 11, 13 -- Mechanism page for L2 and Full Elicitation, respectively. For the former,
workers are asked to move to their favorite point within a constraint set, for 2 different budget
points. The "Current Credit Allocation" encodes the constraint set -- as workers move the
are also provided on the mechanism page. There is a 5 minute limit for this page.
22
0204060801001200204060801001200204060801001201400204060801001201401600246810020406080100120140160DeficitIncomeTaxTransportation,Science,&EducationHealthcareDefenseFullElicitationWeightNumberofVotersFigure 9: Page 1 -- Welcome Page for all mechanisms
Figure 10: L2 Page 2 -- Instructions
budget bars, it shows how much of their movement budget they have spent, and on which
items. The other constrained movement mechanisms are similar. For the Full Elicitation
mechanism, voters are simply asked to indicate their favorite budget point and weights. The
instructions are repeated on the mechanism page as well at the top. There is a 10 minute
limit for this page.
• Second mechanism, 30% of workers. Some workers were asked to do both one of the L1,L2, or
L∞, and the Full Elicitation mechanism. For these workers, the Full Elicitation mechanism
shows up after the constrained mechanism.
• Figure 12 -- Feedback page. Finally, workers are asked to provide feedback, after which they
are shown a code and return to the Mechanical Turk website.
B Indifference Regions Additional Information
We now present some additional data for the claim in Section 5.2.2, that voters have large indifference
regions on the space. In particular, Figures 14 and 15 reproduce Figure 5 but with workers who
provided explanations longer (and shorter) than the median response, respectively. This split can
(roughly) correspond to workers who may have answered more or less sincerely to the budgeting
question. We find that the response distribution, as measured by the fraction of possible movement
one used when far away from one's ideal point on a given dimension, are similar.
23
Figure 11: L2 Page 3 -- Mechanism
Figure 12: Page 4 -- Feedback for all mechanisms
24
Figure 13: Full Elicitation Page 3 -- Mechanism
Figure 14: Fraction of possible movement in each dimension in L∞, conditioned on distance to ideal
pt. The 'All' condition contains data from all three L∞ instances, whereas the others only from
the instance that also did full elicitation. This plot only includes those people who provided an
explanation as long or longer than the median explanation provided (197 characters).
25
0.00.20.40.60.81.0Movementasfractionofpossiblemovement0.00.10.20.30.40.5HistogrampdfAllNearIdealPtFarfromIdealPtFigure 15: Fraction of possible movement in each dimension in L∞, conditioned on distance to ideal
pt. The 'All' condition contains data from all three L∞ instances, whereas the others only from
the instance that also did full elicitation. This plot only includes those people who provided an
explanation shorter than the median explanation provided (197 characters).
26
0.00.20.40.60.81.0Movementasfractionofpossiblemovement0.00.10.20.30.40.5HistogrampdfAllNearIdealPtFarfromIdealPtC Proofs
In this appendix, we include proofs for all the theorems in the paper.
C.1 Known SSGM Results
Theorem 4. [25, 33] Let θ ∈ Θ be a random vector with distribution P. Let ¯f (x) = E[f (x, θ)] =
well-defined and finite valued. Suppose that f (·, θ), θ ∈ Θ is convex and ¯f (·) is continuous and finite
valued in a neighborhood of point x. For each θ, choose any g(x, θ) ∈ ∂f (x, θ). Then, there exists
¯g(x) ∈ ∂ ¯f (x) s.t. ¯g(x) = Eθ[g(x, θ)].
(cid:82)Θ f (x, θ)dP (θ), for x ∈ X , a non-empty bounded closed convex set, and assume the expectation is
This theorem says that the expected value of the sub-gradient of the utility at any point x
across voters is a subgradient of the societal utility at x, irrespective of how the voters choose the
subgradient when there are multiple subgradients, i.e., when the utility function is not differentiable.
This key result allows us to use the subgradient of utility function of a sampled voter as an unbaised
estimate of the societal subgradient.
Now, consider a convex function f on a non-empty bounded closed convex set X ⊂ RM, and
use [·]X to designate the projection operator. Starting with some x0 ∈ X , consider the SSGM
update rule xt = [xt−1 − rt(¯gt + zt + bt)]X , where zt is a zero-mean random variable and bt is a
constant, and ¯gt ∈ ∂f (xt). Let Et[·] be the conditional expectation given Ft, the σ-field generated
by x0, x1, . . . , xt. Then we have the following convergence result.
Theorem 5. [19] Consider the above update rule. If
f (·) has a unique minimizer x
t < ∞
r2
∗ ∈ X
rt > 0,(cid:88)t
rt = ∞,(cid:88)t
∃C1 ∈ R < ∞ s.t. (cid:107)∂f (x)(cid:107)2 ≤ C1,∀ x ∈ X
∃C2 ∈ R < ∞ s.t. Et[(cid:107)zt(cid:107)2] ≤ C2,∀ t
∃C3 ∈ R < ∞ s.t. (cid:107)bt(cid:107)2 ≤ C3,∀ t
rt(cid:107)bt(cid:107) < ∞ w.p. 1
(cid:88)t
Then xt → x∗ w.p. 1 as t → ∞.
Note: Jiang and Walrand [19] prove the result for gradients, though the same proof follows for
subgradients. Only the inequality [x∗ − xt]T gt ≤ f (x∗) − f (xt) for gradient gt at iteration t is used,
which holds for subgradients. Boyd and Mutapcic [4] provide a general discussion of subgradient
methods, along with similar results. Shor [31], in Theorem 46, provide a convergence proof for the
stochastic subgradient method without projections and the extra noise terms.
C.2 Mapping ILV to SSGM
As described in Section 3, suppose that hX is the induced probability distribution on the ideal
values of the voters. In the following discussion, we will refer to voters and their ideal solutions
interchangeably.
27
Next, we restate ILV without the stopping condition so that it looks like the stochastic subgra-
dient method. Consider Algorithm 2.
Algorithm 2: ILV
Start at some x0 ∈ X . For t ≥ 1,
• Sample voter vt ∈ V from hV.
• Compute xt = [xt−1 − rtgvt(xt)]X , where rt = r0
t and rtgvt(xt) is movement given by vt.
We want to minimize the societal cost, ¯f (x) = E[fv(x)]. From Theorem 4, it immediately follows
that if each voter v articulates a subgradient of her utility function for all x, i.e. gv(x) ∈ ∂fv(x),
then from Theorem 5, we can conclude that the algorithm converges. However, users may not be
able to articulate such a subgradient. Instead, when the voters respond correctly to query (1) (i.e.
move to their favorite point in the given Lq neighborhood), we have
gvt(xt) =
xt − arg minx[fvt(x) : (cid:107)x − xt(cid:107)q ≤ rt]
rt
.
(2)
Furthermore, for all the proofs, we assume the following.
A. The solution space X ⊂ RM is non-empty, bounded, closed, and convex.
B. Each voter v has a unique ideal solution xv ∈ X .
C. The ideal point xv of each voter is drawn independently from a probability distribution with
a bounded and measurable density function hX on M dimensions: there exists C s.t. ∀ x we
have hX (x) ≤ C. This assumption allows us to bound the probability of errors that occur in
small regions of the space.
C.3 Proof of Theorem 1
Let the disutility, or cost to voter v ∈ V be fv(x) = (cid:107)x − xv(cid:107)p for all x ∈ X . We use the following
technical lemma:
Lemma 1. For q ∈ {1, 2,∞}, there exists K2 ∈ R+ s.t. (cid:107)gv(x) − gt(cid:107)2 ≤ K2, ∀ gt ∈ ∂fv(x) for any
v and x.
The lemma bounds the error in the movement direction from the gradient direction, by noting that
both the movement direction and the gradient direction have bounded norms.
We also need the following lemma, which is proved separately for each case in the following sections.
Lemma 2. Suppose that fv(x) (cid:44) (cid:107)xv − x(cid:107)p and define the function
At (cid:44) I{gvt(xt) /∈ ∂fvt(xt)},
where gvt(xt) is as defined in (2). Then there exists C ∈ R s.t. ∀ n, P(At = 1Ft) ≤ Crt, when
(p = 2, q = 2), (p = 1, q = ∞), or (p = ∞, q = 1).
The lemma can be interpreted as follows: At indicates a 'bad' event, when a voter may not be
providing a true subgradient of her utility function. However, the probability of the event occurring
vanishes with rt, which, as we will see below, is the right rate for the algorithm to converge.
28
Theorem 1. Suppose that conditions C1, C2, and C3 are satisfied, the voter utilities are Lp normed,
and voters respond to query (1) according to either Model A or Model B. Then, ILV with Lq
neighborhoods converges to the societal optimal point w.p. 1 when (p, q) = (2, 2), (1,∞), or (∞, 1).
Proof. We will show that Algorithm 2 meets the conditions in Theorem 5. Let bt (cid:44) Et[gvt(xt)] − ¯gt
and zt (cid:44) gvt(xt)−Et[gt], for some ¯gt ∈ ∂ ¯f (xt). Then, gvt(xt) can be written as gvt(xt) = ¯gt + zt + bt.
We show that bt, zt meet the conditions in the theorem, and so the algorithm converges.
Let At be the indicator function described in Lemma 2. Then, for some ¯gt ∈ ∂ ¯f (xt),
bt = Et[gvt(xt)] − ¯gt
= Et[gvt(xt)] − Et[gt]
= P(At = 1Ft)(Et[gvt(xt)At = 1] − Et[gtAt = 1])
+ P(At = 0Ft)(Et[gvt(xt)At = 0] − Et[gtAt = 0])
= P(At = 1Ft)(Et[gvt(xt)At = 1] − Et[gtAt = 1])
≤ Crt(Et[gvt(xt)At = 1] − Et[gtAt = 1]).
Theorem 4, i.i.d sampling of v
Lemma 2
Combining with Lemma 1, and the fact that rt = r0/t, we have
(cid:88) rt(cid:107)bt(cid:107) ≤ ∞ and there exists C1 ∈ R < ∞ s.t. (cid:107)bt(cid:107)2 ≤ C1,∀ t.
Finally, note that (cid:107)zt(cid:107) (cid:44) (cid:107)gvt(xt) − Et[gvt(xt)](cid:107) is bounded for each t because the (cid:107)gvt(xt)(cid:107) is
bounded as defined. Thus, all the conditions in Theorem 5 are met for both bt and zt, and the
algorithm converges.
C.4 Proof of Theorem 2
Instead of moving to their favorite point on the ball, voters now instead move in the direction of
the gradient of their utility function to the boundary of the given neighborhood. In this case, we
have:
gvt(xt) =
gvt
(cid:107)gvt(cid:107)q
; for gvt ∈ ∂fvt(xt).
(3)
The key to the proof is the following observation, that the q norm of the gradient of the p norm,
except at the ideal points on each dimension, is constant. This observation is formalized in the
following lemma:
Lemma 3. ∀ (p, q) s.t. p > 0, q > 0, and 1/p + 1/q = 1, (cid:107)∇(cid:107)x − xv(cid:107)p(cid:107)q = 1,∀ x s.t. xm (cid:54)= xm
any m.
Theorem 2. Suppose that conditions C1, C2, and C3 are satisfied, the voter utilities are Lp normed,
and voters respond to query (1) according to Model B. Then, ILV with Lq neighborhoods converges
to the societal optimal point w.p. 1 for any p > 0 and q > 0 such that 1/p + 1/q = 1.
v for
Proof. Since the probability of picking a voter v such that xm
v for some dimension m is 0, we
have gvt(xt) = gvt for gvt = ∇fvt(xt). Thus we obtain the gradient exactly, and hence Theorem 5
applies with bt = 0 for all t.
t = xm
29
C.5 Proof of Propositions
We now turn our attention to the case of Weighted Euclidean utilities and show that Algorithm 2
converges to the societal optimum. The analogue to Lemma 2 for this case is (proved in the following
subsection):
k=1
wk
v(cid:107)wv(cid:107)2
(cid:107)xk − xk
At (cid:44) I{gvt(xt) /∈ ∂fvt(xt)},
v(cid:107)2, and define the function
Lemma 4. Suppose that fv(x) (cid:44)(cid:80)K
where gvt(xt) is as defined in (2) for q = 2. Then there exists C ∈ R s.t. ∀ n, P(At = 1Ft) ≤ Crt.
Proposition 1. Suppose that conditions C1, C2, and C3 are satisfied, the voter utilities are
Weighted Euclidean, and voters correctly respond to query (1) according to either Model A or
Model B. Then, ILV with L2 neighborhoods converges with probability 1 to the societal optimal
point.
Proof. The proof is then similar to that of Theorem 1, and the algorithm converges to x∗ =
(cid:80)K
arg min E(cid:104)
k=1 wk
v(cid:107)xk−xk
(cid:107)wv(cid:107)2
v(cid:107)2
(cid:105).
Now, we sketch the proof for fully decomposable utility functions and L∞ neighborhoods.
Proposition 2. Suppose that conditions C1, C2, and C3 are satisfied, the voter utilities are de-
composable, and voters respond to query (1) according to either Model A or Model B. Then, ILV
with L∞ neighborhoods converges with probability 1 to a point in the set of medians ¯x.
t−1 + rt ≤ xm
t−1 < xm
v . On the other hand if xm
t−1 by
Proof. Consider each dimension separately. If xm
v , then the sampled voter decreases
rt as long as xm
v . Thus except for when a voter's ideal solution is too close to
t−1 by rt as long as xm
xm
the current point, the algorithm can be seen as performing SSGM on each dimension separately as
if the utility function was L1 (the absolute value) on each dimension. Thus a proof akin to that of
Theorem 1 with p = 1, q = ∞ holds.
v , then the sampled voter increases xm
t−1 > xm
t−1 − rt ≥ xm
C.6 Proof of Theorem 3
We now show that the algorithm finds directional equilibria in the following sense:
if under a
few conditions a trajectory of the algorithm converges to a point, then that point is a directional
equilibrium.
Theorem 3. Suppose that C1, C2, and C3 are satisfied, and let G(x) (cid:44) Ev(cid:104) ∇fv(x)
(cid:107)∇fv(x)(cid:107)2(cid:105). Suppose,
G(x) is uniformly continuous, L2 movement norm constraints are used, and voters move according
to Model B. If a trajectory {x}∞
t=1 of the algorithm converges to x∗, i.e. xt → x∗, then x∗ is a
directional equilibrium, i.e. G(x∗) = 0.
Proof. Suppose x∗ is not a directional equilibrium, i.e. ∃ > 0 s.t. (cid:107)G(x∗)(cid:107)2 = . Consider a
δ-ball around x∗, Bδ (cid:44) {x : (cid:107)x∗ − x(cid:107)2 < δ}, with δ, 2 > 0 chosen such that ∃m ∈ {1 . . . M} s.t.
∀x ∈ Bδ, sign(Gm(x)) = sign(Gm(x∗)) and Gm(x) > 2, i.e. the gradient in the mth dimension
does not change sign and has magnitude bounded below. Such a δ, 2 exists by the continuity as-
sumption (if x∗ is not a directional equilibrium, at least 1 dimension of G(x∗) is non-zero and thus
30
one can construct a ball around x∗ such that G(x), x ∈ Bδ in that dimension satisfies the conditions).
Now, one can show that the probability of leaving neighborhoods around x∗ goes to 1: ∀t >
0, 0 < δ2 < δ, w.p. 1 ∃τ ≥ t s.t. (cid:107)xτ − x∗(cid:107)2 > δ2.
Suppose xt ∈ Bδ2 (otherwise τ = t satisfies), rk = 1
k .
∆xk
∆xk (cid:44) −rk
∇f vk (xk)
(cid:107)∇f vk (xk)(cid:107)2
∗(cid:107)2
defn of (cid:107) · (cid:107)2
∆xk(cid:107)2 − δ2
∆xk,m
(cid:107)xτ − x
∗(cid:107)2 = (cid:107)xt − x
∗
+
∆xk(cid:107)2
τ(cid:88)k=t
∆xk(cid:107)2 − (cid:107)xt − x
(cid:107) τ(cid:88)k=t
xτ = xt +
τ(cid:88)k=t
≥ (cid:107) τ(cid:88)k=t
≥ (cid:107) τ(cid:88)k=t
∆xk(cid:107)2 ≥ τ(cid:88)k=t
= Ev(cid:34) τ(cid:88)k=t
≥ Ev(cid:34) τ(cid:88)k=t
P r(cid:32) τ(cid:88)k=t
By Hoeffding's inequality,
∆xk,m(cid:35) +
τ(cid:88)k=t
∆xk,m(cid:35) − τ(cid:88)k=t
∆xk,m − Ev(cid:34) τ(cid:88)k=t
∆xk,m(cid:35)
∆xk,m(cid:35)
∆xk,m − Ev(cid:34) τ(cid:88)k=t
∆xk,m − Ev(cid:34) τ(cid:88)k=t
∆xk,m(cid:35) ≥ 3(cid:33) ≤ exp(cid:34)− 2(τ − t)22
k (cid:35)
k=t
3
1
2(cid:80)τ
→ 0 as τ → ∞
Furthermore, by the continuity assumption,
Ev(cid:34) τ(cid:88)k=t
∆xk,m(cid:35) (cid:44) τ(cid:88)k=t
rkGm(xk)
→ ∞ as τ → ∞ while xk ∈ Bδ2
Thus, P r((cid:107)xτ − x∗(cid:107)2 > δ2) → 1 as τ → ∞. Thus, if an infinite trajectory converges to x∗, then
w.p. 1, then x∗ is a directional equilibrium.
C.7 Proofs of Lemmas
Lemma 1 For q ∈ {1, 2,∞}, ∃K2 ∈ R+ < ∞ s.t. (cid:107)gvt − gt(cid:107)2 ≤ K2, ∀ gt ∈ ∂fvt(xt), vt, xt.
31
Proof.
(cid:107)gvt(xt) − gt(cid:107)2 ≤ (cid:107)gvt(xt)(cid:107)2 + (cid:107)gt(cid:107)2
(cid:107)xt − arg minx[(cid:107)x − xvt(cid:107)p : (cid:107)x − xt(cid:107)q ≤ rt](cid:107)2
+ (cid:107)gt(cid:107)2
=
≤ K1 + (cid:107)gt(cid:107)2
≤ K2
rt
for some K1, K2 ∈ R+. The second inequality follows from the fact that for finite M-dimensional
vector spaces, (cid:107)y(cid:107)2 ≤ (cid:107)y(cid:107)1 and (cid:107)y(cid:107)2 ≤ √
M(cid:107)y(cid:107)∞. The third follows from the norm of the subgra-
dients of the p norm being bounded.
Lemma 2, case (p = 2, q = 2).
Proof. Remember that At (cid:44) I{gvt(xt) /∈ ∂fvt(xt)}. Let Bt = I{(cid:107)xvt − xt(cid:107)2 ≤ rt}. We show that
A) Bt = 0 =⇒ At = 0, and B) ∃C ∈ R s.t. P(Bt = 1Ft) ≤ Crt. Then, ∃C ∈ R s.t.
P(At = 1Ft) ≤ Crt.
Part A, Bt = 0 =⇒ gvt(xt) = gt, for some gt ∈ ∂fvt(xt):
First, note that
∂fvt(x) = ∂(cid:107)x − xvt(cid:107)2
=(cid:40){ x−xvt
x (cid:54)= xvt
}
(cid:107)xvt−x(cid:107)2
{g : (cid:107)g(cid:107)2 ≤ 1} x = xvt
=(cid:90)x∈{x:(cid:107)x−xt(cid:107)2≤rt}
=(cid:90)x∈{x:(cid:107)x−xt(cid:107)2≤rt}
≤ Cr2
≤ Crt
t
hXFt(x)dx
hX (x)dx
v drawn independent of history
bounded hX
rt ≤ 1 eventually
32
xvt − xt
(cid:107)xvt − xt(cid:107)2
Definition
If (cid:107)xvt − xt(cid:107)2 > rt, then
Then,
gvt(xt) =
=
[(cid:107)x − xvt(cid:107)2 : (cid:107)x − xt(cid:107)2 ≤ rt] = xt + rt
arg min
x
rt
xvt−xt
xt − arg minx[(cid:107)x − xvt(cid:107)2 : (cid:107)x − xt(cid:107)2 ≤ rt]
xt −(cid:16)xt + rt
rt
xt − xvt
(cid:107)xvt − xt(cid:107)2
(cid:107)xvt−xt(cid:107)2(cid:17)
=
∈ ∂fvt(xt)
Part B, ∃C ∈ R s.t. P(Bt = 1Ft) ≤ Crt:
P(Bt = 1Ft) = P((cid:107)xvt − xt(cid:107)2 ≤ rtFt)
for some C ∈ R < ∞. Note that C depends on the volume of a sphere in M dimensions.
Lemma 2, case (p = 1, q = ∞).
vt − x1
t ),
t )(cid:3)T
vt − xM
t ≤ rt}. We show the the same two parts as in the above proof.
Proof. Let hvt(xt) (cid:44)(cid:2)sign(x1
Let Bt = I{∃m,xm
vt − xm
Part A, Bt = 0 =⇒ gvt(xt) = gt, for some gt ∈ ∂fvt(xt):
First, note that the subgradients are
vt − xm
t ),
sign(xM
sign(xm
. . . ,
. . . ,
∂fvt(x) = ∂(cid:107)x − xvt(cid:107)1
= {g : (cid:107)g(cid:107)∞ ≤ 1, gT (x − xvt) = (cid:107)x − xvt(cid:107)1}
If ∀ m,xm
vt − xm
t > rt, then
[(cid:107)x − xvt(cid:107)1 : (cid:107)x − xt(cid:107)∞ ≤ rt] = xt + rthvt(xt)
arg min
x
Then,
gvt(xt) =
xt − arg minx[(cid:107)x − xvt(cid:107)1 : (cid:107)x − xt(cid:107)∞ ≤ rt]
xt − (xt + rthvt(xt))
rt
Definition
Part B, ∃C ∈ R s.t. P(Bt = 1Ft) ≤ Crt:
P(Bt = 1Ft) = P(∃m : xm
t ≤ rtFt)
rt
=
= −hvt(xt)
∈ ∂fvt(xt)
vt − xm
=(cid:90)x∈{x:∃m,xm−xm
=(cid:90)x∈{x:∃m,xm−xm
≤ Crt
t ≤rt}
t ≤rt}
hXFt(x)dx
hX (x)dx
v drawn independent of history
bounded hX , fixed M, bounded X
for some C ∈ R < ∞. In the last line, C (cid:117) 2M (diameter(X )), based on the volume of the slices
around the ideal points on each dimension.
Lemma 2, case (p = 1, q = ∞).
Proof. Let ¯mt ∈ arg maxm xm
. . . , 0,
vt ), 0, . . . , 0, 0(cid:3)T ,
t + rt}. We show the the same two parts as in the
Let hvt(xt) (cid:44)(cid:2)0, 0,
Let Bt (cid:44) I{∃m (cid:54)= ¯mt : x ¯mt
vt − xm
t ,
sign(x ¯mt
< xm
vt − x ¯mt
t − x ¯mt
vt − xm
t
33
above proofs.
Part A, Bt = 0 =⇒ gvt(xt) = gt, for some gt ∈ ∂fvt(xt):
First, note that when Bt = 0, the set of subgradients is
∂fvt(x) = ∂(cid:107)x − xvt(cid:107)∞
= {hvt(xt)}
Also when Bt = 0,
Then,
[(cid:107)x − xvt(cid:107)∞ : (cid:107)x − xt(cid:107)1 ≤ rt] = xt − rthvt(xt)
arg min
x
gvt(xt) =
=
xt − arg minx[(cid:107)x − xvt(cid:107)1 : (cid:107)x − xt(cid:107)∞ ≤ rt]
xt − (xt − rthvt(xt))
rt
rt
Definition
= hvt(xt)
∈ ∂fvt(xt)
Part B, ∃C ∈ R s.t. P(Bt = 1Ft) ≤ Crt:
P(Bt = 1Ft) = P(I{∃m (cid:54)= ¯mt : x ¯mt
vt − x ¯mt
t
< xm
vt − xm
t + rt}Ft)
hXFt(x)dx
=(cid:90)x∈{x:∃m(cid:54)= ¯mt s.t. x ¯mt
=(cid:90)x∈{x:∃m(cid:54)= ¯mt s.t. x ¯mt
≤ Crt
vt −x ¯mt
t
vt −x ¯mt
t
<xm
vt
−xm
t +rt}
<xm
vt
−xm
t +rt}
hX (x)dx
v drawn independent of history
bounded hX , fixed M, bounded X
for some C ∈ R < ∞. Note that C (cid:117) 2M 2(diameter(X )), based on the volume of the slices around
each dimension.
Lemma 3 ∀ (p, q) s.t. p > 0, q > 0, 1/p + 1/q = 1, (cid:107)∇(cid:107)x − xv(cid:107)p(cid:107)q = 1,∀ x s.t. ∀ m, xm (cid:54)= xm
v .
Proof. If xm (cid:54)= xm
v ,∀ m :
∇m(cid:107)x − xv(cid:107)p = ∇m(cid:32)(cid:88)m
v p(cid:33)1/p
xm − xm
∇mxm − xm
v p
v p)1−1/p
1
p
xm − xm
((cid:80)m xm − xm
v p−1 (∇mxm − xm
v )
(cid:107)x − xv(cid:107)p−1
p
=
=
34
Then
(cid:107)∇(cid:107)x − xv(cid:107)p(cid:107)q = (cid:107)xm − xm
v p−1 (∇mxm − xm
v )
(cid:107)x − xv(cid:107)p−1
p
(cid:107)q
1
1
1
p (cid:32)(cid:88)m (cid:12)(cid:12)xm − xm
p (cid:32)(cid:88)m
xm − xm
(cid:107)x − xv(cid:107)p/q
p
=
=
=
(cid:107)x − xv(cid:107)p−1
(cid:107)x − xv(cid:107)p−1
(cid:107)x − xv(cid:107)p−1
p
v )(cid:12)(cid:12)q(cid:33)1/q
v p−1 (∇mxm − xm
v (p−1)q(cid:33)1/q
(p − 1)q = p
= 1
k=1
wk
v(cid:107)wv(cid:107)2
(cid:107)xk − xk
At (cid:44) I{gvt(xt) /∈ ∂fvt(xt)},
v(cid:107)2, and define the function
Lemma 4 Suppose that fv(x) (cid:44)(cid:80)K
where gvt(xt) is as defined in (2) for q = 2. Then there exists C ∈ R s.t. ∀ n, P(At = 1Ft) ≤ Crt.
t (cid:107)2 ≤ rt}. We show the same two parts for Bt as for the proofs
Proof. Let Bt = I{∃k s.t. (cid:107)xk
for Lemma 2.
Part A, Bt = 0 =⇒ gvt(xt) = gt, for some gt ∈ ∂fvt(xt):
First, note that, when Bt = 0,
vt − xk
K(cid:88)k=1
(cid:107)xk − xk
v(cid:107)2
wk
v(cid:107)wv(cid:107)2
xm − xm
vt − xkm
(cid:107)xkm
vt
t (cid:107)2
∂mfvt(xt) = ∂m
=
wkm
(cid:107)wv(cid:107)2
Also if Bt = 0, then
where km is the subspace that contains the mth dimension
arg min
x (cid:34) K(cid:88)k=1
Then,
wk
(cid:107)wv(cid:107)2
(cid:107)xk − xk
v(cid:107)2 : (cid:107)x − xt(cid:107)2 ≤ rt(cid:35) = xt + rt(cid:34). . . ,
wkm
(cid:107)wv(cid:107)2
vt − xm
xm
vt − xkm
(cid:107)xkm
t (cid:107)2
, . . .(cid:35)
xt − arg minx[(cid:107)x − xvt(cid:107)2 : (cid:107)x − xt(cid:107)2 ≤ rt]
gvt(xt) =
Definition
∈ ∂fvt(xt)
Part B, ∃C ∈ R s.t. P(Bt = 1Ft) ≤ Crt:
rt
35
P(Bt = 1Ft) = P((cid:107)xvt − xt(cid:107)2 ≤ rtFt)
=(cid:90)x∈{x:∃k s.t. (cid:107)xk
=(cid:90)x∈{x:∃k s.t. (cid:107)xk
vt
≤ Cr2
≤ Crt
t
hXFt(x)dx
hX (x)dx
v drawn independent of history
−xk
t (cid:107)2≤rt}
−xk
t (cid:107)2≤rt}
bounded hX
rt ≤ 1 eventually
vt
for some C ∈ R < ∞. Note that C depends on K and M.
References
[1] Stéphane Airiau and Ulle Endriss. Iterated Majority Voting. In Proceedings of the 1st Interna-
tional Conference on Algorithmic Decision Theory, ADT '09, pages 38 -- 49, Berlin, Heidelberg,
2009. Springer-Verlag.
ISBN 978-3-642-04427-4. doi: 10.1007/978-3-642-04428-1_4. URL
http://dx.doi.org/10.1007/978-3-642-04428-1_4.
[2] Daniel Benjamin, Ori Heffetz, Miles Kimball, and Derek Lougee. The relationship between the
normalized gradient addition mechanism and quadratic voting. Public Choice, 172(1):233 -- 263,
July 2017.
ISSN 1573-7101. doi: 10.1007/s11127-017-0414-3. URL https://doi.org/10.
1007/s11127-017-0414-3.
[3] Daniel J. Benjamin, Ori Heffetz, Miles S. Kimball, and Nichole Szembrot. Aggregating Local
Preferences to Guide Marginal Policy Adjustments. The American economic review, 103(3):
605 -- 610, May 2013. ISSN 0002-8282. doi: 10.1257/aer.103.3.605. URL https://www.ncbi.
nlm.nih.gov/pmc/articles/PMC3760035/.
[4] Stephen Boyd and Almir Mutapcic. Subgradient methods. Lecture notes of EE364b, Stanford
University, Winter Quarter, 2007, 2006.
[5] Yves Cabannes. Participatory budgeting: a significant contribution to participatory democracy.
ISSN 0956-2478, 1746-0301. doi:
Environment and Urbanization, 16(1):27 -- 46, April 2004.
10.1177/095624780401600104. URL http://eau.sagepub.com/content/16/1/27.
[6] Ioannis Caragiannis and Ariel D. Procaccia. Voting almost maximizes social welfare despite
limited communication. Artificial Intelligence, 175(9):1655 -- 1671, June 2011. ISSN 0004-3702.
doi: 10.1016/j.artint.2011.03.005. URL http://www.sciencedirect.com/science/article/
pii/S0004370211000506.
[7] Ioannis Caragiannis, Swaprava Nath, Ariel D. Procaccia, and Nisarg Shah. Subset selection via
implicit utilitarian voting. Journal of Artificial Intelligence Research, 58:123 -- 152, 2017. URL
https://www.jair.org/media/5282/live-5282-9726-jair.pdf.
[8] Yukun Cheng and Sanming Zhou. A Survey on Approximation Mechanism Design With-
In David Gao, Ning Ruan, and Wenxun Xing, editors, Ad-
out Money for Facility Games.
vances in Global Optimization, number 95 in Springer Proceedings in Mathematics & Statistics,
36
pages 117 -- 128. Springer International Publishing, 2015. ISBN 978-3-319-08376-6 978-3-319-
08377-3. URL http://link.springer.com/chapter/10.1007/978-3-319-08377-3_13. DOI:
10.1007/978-3-319-08377-3_13.
[9] Hun Chung and John Duggan. Directional equilibria. Journal of Theoretical Politics, 30(3):
272 -- 305, July 2018. ISSN 0951-6298. doi: 10.1177/0951629818775515. URL https://doi.
org/10.1177/0951629818775515.
[10] J. C. Duchi, A. Agarwal, and M. J. Wainwright. Dual Averaging for Distributed Optimization:
Convergence Analysis and Network Scaling. IEEE Transactions on Automatic Control, 57(3):
592 -- 606, March 2012. ISSN 0018-9286. doi: 10.1109/TAC.2011.2161027.
[11] J. C. Duchi, M. I. Jordan, M. J. Wainwright, and A. Wibisono. Optimal Rates for Zero-
Order Convex Optimization: The Power of Two Function Evaluations. IEEE Transactions on
Information Theory, 61(5):2788 -- 2806, May 2015.
ISSN 0018-9448. doi: 10.1109/TIT.2015.
2409256.
[12] Abraham D. Flaxman, Adam Tauman Kalai, and H. Brendan McMahan. Online Convex
Optimization in the Bandit Setting: Gradient Descent Without a Gradient. In Proceedings of
the Sixteenth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA '05, pages 385 --
394, Philadelphia, PA, USA, 2005. Society for Industrial and Applied Mathematics.
ISBN
978-0-89871-585-9. URL http://dl.acm.org/citation.cfm?id=1070432.1070486.
[13] Nikhil Garg, Vijay Kamble, Ashish Goel, David Marn, and Kamesh Munagala. Collaborative
Optimization for Collective Decision-making in Continuous Spaces. In Proceedings of the 26th
International Conference on World Wide Web, WWW '17, pages 617 -- 626, Republic and Canton
of Geneva, Switzerland, 2017. International World Wide Web Conferences Steering Committee.
ISBN 978-1-4503-4913-0. doi: 10.1145/3038912.3052690. URL https://doi.org/10.1145/
3038912.3052690.
[14] Hollie Russon Gilman. Transformative Deliberations: Participatory Budgeting in the United
States. Journal of Public Deliberation, 8(2), 2012. URL http://search.proquest.com/
openview/4c3b7fd3ae888f483cacd031a749131e/1?pq-origsite=gscholar.
[15] Ashish Goel, Anilesh K. Krishnaswamy, Sukolsak Sakshuwong, and Tanja Aitamurto. Knapsack
Voting: Voting mechanisms for Participatory Budgeting. 2016. URL http://web.stanford.
edu/~anilesh/publications/knapsack_voting_full.pdf.
[16] Ashish Goel, Anilesh K. Krishnaswamy, and Kamesh Munagala. Metric Distortion of So-
cial Choice Rules: Lower Bounds and Fairness Properties.
In Proceedings of the 2017
ACM Conference on Economics and Computation, EC '17, pages 287 -- 304, New York, NY,
USA, 2017. ACM.
ISBN 978-1-4503-4527-9. doi: 10.1145/3033274.3085138. URL http:
//doi.acm.org/10.1145/3033274.3085138.
[17] Aanund Hylland and Richard Zeckhauser. A mechanism for selecting public goods when pref-
erences must be elicited. 1980.
[18] Kevin G.
Jamieson, Robert Nowak,
and Ben Recht.
derivative-free
Systems,
of
ing
4509-query-complexity-of-derivative-free-optimization.
In Advances
2012.
optimization.
2672 -- 2680,
pages
in Neural
Query
complexity
Information Process-
http://papers.nips.cc/paper/
URL
37
[19] Libin Jiang and Jean Walrand. Scheduling and Congestion Control for Wireless and Pro-
Synthesis Lectures on Communication Networks, 3(1):1 -- 156, January
ISSN 1935-4185, 1935-4193. doi: 10.2200/S00270ED1V01Y201008CNT006. URL
cessing Networks.
2010.
http://www.morganclaypool.com/doi/abs/10.2200/S00270ED1V01Y201008CNT006.
[20] Steven P. Lalley and E. Glen Weyl. Quadratic Voting. SSRN Scholarly Paper ID 2003531,
Social Science Research Network, Rochester, NY, December 2015. URL http://papers.ssrn.
com/abstract=2003531.
[21] David Timothy Lee, Ashish Goel, Tanja Aitamurto, and Helene Landemore. Crowdsourcing
for Participatory Democracies: Efficient Elicitation of Social Choice Functions.
In Second
AAAI Conference on Human Computation and Crowdsourcing, September 2014. URL https:
//www.aaai.org/ocs/index.php/HCOMP/HCOMP14/paper/view/8952.
[22] Patrice McDermott. Building open government. Government Information Quarterly, 27(4):
401 -- 413, October 2010. ISSN 0740-624X. doi: 10.1016/j.giq.2010.07.002. URL http://www.
sciencedirect.com/science/article/pii/S0740624X10000663.
[23] Reshef Meir, Maria Polukarov, Jeffrey S. Rosenschein, and Nicholas R. Jennings. Convergence
to Equilibria in Plurality Voting. In AAAI, volume 10, pages 823 -- 828, 2010.
[24] H. Moulin. On Strategy-Proofness and Single Peakedness. Public Choice, 35(4):437 -- 455, 1980.
ISSN 0048-5829. URL http://www.jstor.org/stable/30023824.
[25] Arkadi Nemirovski, Anatoli Juditsky, Guanghui Lan, and Alexander Shapiro. Robust stochastic
approximation approach to stochastic programming. SIAM Journal on optimization, 19(4):
1574 -- 1609, 2009.
[26] Ariel D. Procaccia and Jeffrey S. Rosenschein. The distortion of cardinal preferences in voting.
In International Workshop on Cooperative Information Agents, pages 317 -- 331. Springer, 2006.
URL http://link.springer.com/chapter/10.1007/11839354_23.
[27] Ariel D. Procaccia and Moshe Tennenholtz. Approximate Mechanism Design Without Money.
In Proceedings of the 10th ACM Conference on Electronic Commerce, EC '09, pages 177 -- 186,
New York, NY, USA, 2009. ACM. ISBN 978-1-60558-458-4. doi: 10.1145/1566374.1566401.
URL http://doi.acm.org/10.1145/1566374.1566401.
[28] David Quarfoot, Douglas von Kohorn, Kevin Slavin, Rory Sutherland, David Goldstein, and
Ellen Konar. Quadratic voting in the wild: real people, real votes. Public Choice, 172(1):
283 -- 303, July 2017. ISSN 1573-7101. doi: 10.1007/s11127-017-0416-1. URL https://doi.
org/10.1007/s11127-017-0416-1.
[29] Herbert Robbins and Sutton Monro. A Stochastic Approximation Method. The Annals of
ISSN 0003-4851, 2168-8990. doi:
Mathematical Statistics, 22(3):400 -- 407, September 1951.
10.1214/aoms/1177729586. URL http://projecteuclid.org/euclid.aoms/1177729586.
[30] Anwar Shah, editor. Participatory budgeting. Public sector governance and accountability se-
ries. World Bank, Washington, D.C, 2007. ISBN 978-0-8213-6923-4 978-0-8213-6924-1. OCLC:
ocm71947871.
38
[31] Naum Z. Shor. Nondifferentiable Optimization and Polynomial Problems, volume 24 of Noncon-
vex Optimization and Its Applications. Springer US, Boston, MA, 1998. ISBN 978-1-4419-4792-
5 978-1-4757-6015-6. doi: 10.1007/978-1-4757-6015-6. URL http://link.springer.com/10.
1007/978-1-4757-6015-6.
[32] Yves Sintomer, Carsten Herzberg, and Anja Rocke. From Porto Alegre to Europe: potentials
and limitations of participatory budgeting. International Journal of Urban and Regional Re-
search, 32(1):164 -- 178, 2008. URL http://www.cpa.zju.edu.cn/participatory_budgeting_
conference/english_articles/paper2.pdf.
[33] Volker Strassen. The Existence of Probability Measures with Given Marginals. The Annals of
Mathematical Statistics, 36(2):423 -- 439, April 1965. ISSN 0003-4851, 2168-8990. doi: 10.1214/
aoms/1177700153. URL https://projecteuclid.org/euclid.aoms/1177700153.
[34] T. Nicolaus Tideman and Florenz Plassmann. Efficient Collective Decision-Making, Marginal
Cost Pricing, And Quadratic Voting. SSRN Scholarly Paper ID 2836610, Social Science Re-
search Network, Rochester, NY, August 2016. URL https://papers.ssrn.com/abstract=
2836610.
39
|
1910.10748 | 1 | 1910 | 2019-10-23T18:08:39 | Dynamic multi-agent assignment via discrete optimal transport | [
"cs.MA",
"eess.SY",
"eess.SY",
"math.OC",
"stat.CO"
] | We propose an optimal solution to a deterministic dynamic assignment problem by leveraging connections to the theory of discrete optimal transport to convert the combinatorial assignment problem into a tractable linear program. We seek to allow a multi-vehicle swarm to accomplish a dynamically changing task, for example tracking a multi-target swarm. Our approach simultaneously determines the optimal assignment and the control of the individual agents. As a result, the assignment policy accounts for the dynamics and capabilities of a heterogeneous set of agents and targets. In contrast to a majority of existing assignment schemes, this approach improves upon distance-based metrics for assignments by considering cost metrics that account for the underlying dynamics manifold. We provide a theoretical justification for the reformulation of this problem, and show that the minimizer of the dynamic assignment problem is equivalent to the minimizer of the associated Monge problem arising in optimal transport. We prove that by accounting for dynamics, we only require computing an assignment once over the operating lifetime --- significantly decreasing computational expense. Furthermore, we show that the cost benefits achieved by our approach increase as the swarm size increases, achieving almost 50\% cost reduction compared with distance-based metrics. We demonstrate our approach through simulation on several linear and linearized problems. | cs.MA | cs | Dynamic multi-agent assignment via discrete optimal transport
Koray Gabriel Kachar* and Alex Gorodetsky**
9
1
0
2
t
c
O
3
2
]
A
M
.
s
c
[
1
v
8
4
7
0
1
.
0
1
9
1
:
v
i
X
r
a
Abstract -- We propose an optimal solution to a deterministic
dynamic assignment problem by leveraging connections to the
theory of discrete optimal transport to convert the combinato-
rial assignment problem into a tractable linear program. We
seek to allow a multi-vehicle swarm to accomplish a dynamically
changing task, for example tracking a multi-target swarm. Our
approach simultaneously determines the optimal assignment
and the control of the individual agents. As a result, the
assignment policy accounts for the dynamics and capabilities of
a heterogeneous set of agents and targets. In contrast to a ma-
jority of existing assignment schemes, this approach improves
upon distance-based metrics for assignments by considering
cost metrics that account for the underlying dynamics manifold.
We provide a theoretical justification for the reformulation of
this problem, and show that the minimizer of the dynamic
assignment problem is equivalent to the minimizer of the asso-
ciated Monge problem arising in optimal transport. We prove
that by accounting for dynamics, we only require computing
an assignment once over the operating lifetime -- significantly
decreasing computational expense. Furthermore, we show that
the cost benefits achieved by our approach increase as the
swarm size increases, achieving almost 50% cost reduction
compared with distance-based metrics. We demonstrate our
approach through simulation on several linear and linearized
problems.
I. INTRODUCTION
Our aim is to enable efficient centralized decision making
amongst swarms of agents that are tasked to intercept or track
a swarm of target vehicles. Specifically, we seek an optimal
centralized assignment policy that is capability-aware -- it
can leverage known dynamics of the agents and targets to
make optimal assignments that respect the capabilities of the
agents and targets. We approach this problem by posing an
objective function that accounts for both the high level cost of
all assignments and the low-level costs of the optimal control
policies used by each agent measures. We add differential
constraints arising from vehicle dynamics to complete the
optimization formulation. This approach stands in contrast to
the majority of techniques that use distance-based (or bottle-
neck assignment [7]) cost functions [26], [15], [30].
The approach we take in this work is based on the realiza-
tion of the close relationship between the given problem and
the theory of optimal couplings, or optimal transport [34],
[35]. In the context of probability theory, to which it is often
applied, optimal transport studies the problem of determining
joint distributions between sets of random variables whose
marginal distributions are constrained. In other words it tries
*Koray G. Kachar
is with the Department of Aerospace En-
gineering, University of Michigan, Ann Arbor, MI 48109, USA
[email protected]
**Alex Gorodetsky is an Assitant Professor, Aerospace Engineering, Uni-
versity of Michigan, Ann Arbor, MI 48109, USA [email protected]
to find a coupling that maps a reference measure to a target
measure. Optimal transport has been applied a wide variety
of other areas as well; for instance it has been used to great
effect in the areas of machine learning [9], [11], [19], image
manipulation [16], and Bayesian inference [14].
A. Innovation and Contributions
The fundamental insight we use to relate OT to the present
context is that the set agents may be viewed as a discrete
measure that we seek to map to the discrete measure denoted
by the set of targets. In this way, we consider discrete
optimal transport (DOT). Our context is also different from
the standard DOT problem in that the target measure is
changing and that
the transport of the reference to the
target must respect the differential constraints given by the
dynamics. Our innovation is that we can address these issues
by introducing a new metric that respects the dynamics, as
explored by Ghoussoub et. al. [21], rather than the traditional
unweighted Euclidean metric that underpins the Wasserstein
or "Earth Movers" distance. Our proposed metric uses the
optimal control cost of a single-agent vs. single-target system
as the cost of the proposed assignment. For instance if the
agents will perform LQR reference tracking to intercept
their targets then the LQR cost is used as the transportation
cost. Alternatively, if the agents will solve a pursuit evasion
game, then the transportation cost will be obtained from the
solution to the differential game. In this way, the assignment
becomes aware of the capabilities of the system, including
the differential constraints and the decision making approach
of individual agents.
Our problem is specified by two inputs
1) The dynamics of the agents and their targets
2) A mechanism to evaluate a feedback policy and its cost
for any single agent
Using these two specifications we form a cost function that
is the sum of all individual agent cost functions, and seek
an assignment that minimizes this total cost. Critically, we
see that the cost used for each agent is that of the feedback
policy -- not the distance. Typically, such feedback policies
are obtained to either optimally regulate or operate the
underlying agent. Thus, the cost incurred by an agent that is
following its feedback policy is a more appropriate measure
of optimality than one based on the distance an agent must
travel.
Our approach provides a solution for this problem, and
consists of the following contributions
1) A new capability-aware assignment approach that si-
multaneously optimizes the assignment and the under-
lying feedback controls of the agents
2) A reformulation of the vehicle-target dynamic as-
signment problem as a linear program by leveraging
concepts from discrete optimal transport
The above two contributions are supported via both theo-
retical and simulation results. In particular, we prove that
our cost function can be reformulated into the Monge
problem from optimal transport. This problem can then be
solved via a linear programming approach. The capability-
aware assignment problem is demonstrated to have lower
final cost as compared to a distance-based assignment that
neglects the feedback control policy. We empirically show
that the optimality gap between our approach and distance-
based metrics grows with the number of agents. Finally, we
prove that after formulating the assignment problem in the
DOT framework, it needs only be solved once rather than
repeatedly over the life of the system. As a result, we see
significant computational benefits compared to repeatedly re-
calculating a distance-based assignment.
B. Related work
Assignment and resource allocation problems present
themselves across many disciplines. In the area of multirobot
task assignment, self-organizing map neural-networks were
designed to learn how to assign teams of robots to target
locations under a dual decision-making and path-planning
framework [39]. However, the algorithm proposed in that
work is largely heuristic and does not consider the underlying
capabilities of the assigned robots. Other papers have consid-
ered more general kinematic movements of the formations
in general, rather than individual agent capabilities, and
were able to provide suboptimality guarantees for the overall
assignment [24]. Another approach can be found on [27] that
proposes an approach that is very similar to ours in that it
solves a related linear programming problem. However, that
approach did not consider the effect of general dynamics of
the system or a changing set of targets.
A similar assignment problem arises in from vehicle-
passenger transit scheduling that have become extremely im-
portant in ride sharing applications [10], [13]. Alonso-Mora
et.al [2] investigated dynamic trip-vehicle assignment that is
both scalable and optimal using a greedy guess that refines
itself over time. In general, these problems lack consideration
of underlying dynamics of the resource being assigned or that
task being assigned to. Assignment problems also arise in
wide areas of econometrics dealing with matching population
models to maximize total utility surplus, contract theory, or
risk management [20], [22], [25]. In general, these problems
also do not consider the underlying dynamic nature within
the assignment problem.
One closely related application area that, at times, also
considers the dynamics in completing an assignment is the
so-called weapon-target-assignment (WTA)
[23], [8]. The
WTA problem itself comes in two-forms: the static WTA
and the dynamic WTA. In the static WTA problem, all of
the assignments are made at once with no feedback possible,
whereas the dynamic WTA allows for feedback between
decision making phases [37]. Our approach is related to this
problem as it is a certain mixture of these two; first, it con-
siders explicit dynamic capabilities of the agents and targets
during the assignment problem; and second it potentially
allows for reassignment of the agents during operations. Our
setup can also be viewed as a limiting case of the traditional
WTA in that we assume that once the weapon intercepts
the target it successfully destroys it with 100% probability.
This contrasts to the traditional WTA setting where a weapon
might only have a certain probability of destroying its target.
The traditional WTA assignment problem (with proba-
bilistic survival of targets after interception) has typically
been formulated as a nonlinear integer programming problem
for which exact methods have not yet been found. As
a result, a large number of heuristic and/or approximate
approaches have been developed. For instance approaches
based on approximate dynamic programming [12], fuzzy
reasoning [33], various search heuristics [37], genetic and/or
global optimization approaches [28], [29], network-based
heuristics [1], amongst others have all been studied. In
comparison to these previous works on WTA we provide
several contributions. Our proposed (as far as we are aware
previously unrecognized) link to optimal transport theory can
yields additional theoretical and computational guarantees.
Finally, we review some connections between our pro-
posed approach and existing solutions in robotics and con-
trol. Fredrick et. al. [18] investigated multi-robot path plan-
ning and shape formation underpinned by optimal transport
to prove that the desired formations can be obtained while
maintaining collision-free motions with assurance of conver-
gence to global minima. Similarly, Bandyopadhyay et. al.
[5], [4], [6] describe an approach where swarm members are
placed into bins which have constraints that must satisfied
in order to permit the transition of the agents to neighboring
bins. These motion constraints are representative of the
dynamics or physical limitations present in the system. In
terms of the approach described in this paper, the optimal
transport cost metric is thus a modified L2 distance between
the centroids of the bins subject
to a motion constraint
matrix; if motion is possible, the cost is the L2 distance,
otherwise the cost is the maximum value.
Here we consider a specific setting, one with deterministic
and known dynamics, for which we can prove optimality.
While we do not consider limitations on communication
between agents, this problem has also been consider in the
decentralized decision making context where each vehicle
is making its own decisions. In this case all of the agents
must come to a consensus through different communica-
tion/negotiation strategies, see e.g. [38] for a greedy assign-
ment strategy and [3] for an example of a game-theoretical
formulation.
II. PROBLEM DEFINITION
In this section we define the dynamic agent-target assign-
ment problem. We begin by describing a dynamical system
that describes the evolution of active states, targets, and
destinations. We then provide an optimization problem that
we seek to solve.
A. Dynamical System
represented by a tuple
We limit our presentation to the case of linear, control-
affine systems for clarity of exposition. Our approach and
theory is also valid for nonlinear systems given an ability to
compute policy costs associated with nonlinear controllers.
Let n, m ∈ Z+ denote a positive number of autonomous
agents (resources) and targets. If we consider agent i and
target j, then their states at time t are denoted by xi(t) ∈
X ⊂ Rd, yj(t) ∈ Y ⊂ Rdy, respectively. Agent i takes
actions ui ∈ Rdu .
In our problem, the number of agents and targets can
only decrease with time. We leave consideration of newly
appearing targets to future work. Each object that has not
been removed is termed active so that at t = 0 we have n
active agents and m active targets.
An agent/target pair can become inactive when the agent
successfully intercepts or completes its resource allocation.
Let πx and πy define functions that extract the positions of
the agents and targets from their states. Successful resource
allocation of an agent is defined when (cid:107)πx(xi)−πy(yj)(cid:107) ≤ .
In other words, when the position of agent i is within an
−ball of target j, then both become inactive.
The activity of the agents and targets at each time is
represented by the active sets A(t) and T (t). For instance,
if all agents are active then A(t) = [1, . . . , n], whereas if,
for instance agent i has successfully reached target j then i
is removed from A and j is removed from T . This process
defines an evolution of the active sets. At a given time t,
the active agents and targets evolve according to a stochastic
differential equation
xi(t) = Aixi(t) + Biui(t)
yj(t) = Aiyj(t)
for i ∈ A(t)
for j ∈ T (t).
where Ai ∈ Rd×d and Bi ∈ Rd×du correspond to the
drift of linear dynamics of the agent; and Aj ∈ Rdy×dyu
corresponds to the closed loop linear dynamics of the targets.
Note that here we have assumed linear dynamics; however
this assumption is entirely unnecessary for our theory in
Section V. It is however, more computationally tractable
because it leads to a solution of sets of linear optimal control
problems, for instance LQR or LQI. A more significant
assumption that these dynamics imply is that there is no
interaction between agents, i.e., we do not consider collisions
or other interference effects. We leave this matter for future
work, but note that in the simulation examples in Section VI
we noticed that collisions between agents did not generally
occur.
A(t),T (t), (xi(t))i∈A(t) , (yj(t))j∈T (t)
Finally, the entire state of the system be defined by the
. Let
tuple S(t) =
O denote a set of states S(t) for which there is at least one
active target or destination. Define the exit time τ as the first
time that the state S(t) exists from O.
B. Policies, cost functions, and optimization
(cid:16)
(cid:17)
We seek a feedback policy µ that maps S(t) to a set of
controls ui(t) for all active agents i ∈ A(t). The policy is
µ(S(t)) = (σt, (µi : i ∈ A(t)))
(1)
where σt : A(t) → T (t) is an index function that assigns
active agents to active targets and µi is a feedback control
policy for the individual agents. The goal then, is to deter-
mine an optimal feedback policy of this form.
An optimal feedback policy is one that minimizes
µ∗ = arg min
µ
0
g(t, S(t), µ(S(t)))
,
(2)
where the stage cost mapping the state of the system to the
reals is g and the time τ is the first exit time. The optimal
value function will then be denoted by
(cid:21)
J(S(0)) =
g(t, S(t), µ∗(S(t))dt
(3)
(cid:20)(cid:90) τ
(cid:90) τ
0
The stage cost intends to guide each agent i to its assigned
target j and is therefore represented by the sum
g(t, S(t), µ(S(t))) =
gi(xi, ui, yσt(i)),
(4)
n(cid:88)
i=1,i∈A(t)
where the cost gi assigned to agent i is a function of the
corresponding agent state, the agent control, and the target
to which the agent is assigned. For instance, this cost could
be a quadratic corresponding to an infinite horizon tracking
problem [36]
(cid:0)πx(xi) − πy(yσt(i))(cid:1)T
(cid:0)πxss(xi) − πyss (yσt(i))(cid:1)T
Q(cid:0)πx(xi) − πy(yσt(i))(cid:1) + uT
Q(cid:0)πxss (xi) − πyss (yσt(i))(cid:1)
gi(xi, ui, yσt(i)) =
i Rui
−
+ uT
ssi
Russi
(5)
where Q and R penalize the distance between the agent-
target system and the control and πxss and πyss are the
steady-state values for the agent and assigned-to target,
respectively. These transient and steady-state terms represent
the dual goals of this particular optimal controller, which are
to drive the error of the agent-target to the optimal steady-
state and then keep the agent-target system at this optimal
state.
III. DISCRETE OPTIMAL TRANSPORT
In this section we provide background to discrete optimal
transport, and indicate how it relates to our dynamic assign-
ment problem. We follow the description given by [31].
Let Σn denote a probability simplex so that any a ∈ Σn
belongs to the simplex
(cid:41)
n(cid:88)
i=1
ai = 1
(6)
(cid:40)
Σn ≡
A discrete measure µX is defined by the fixed locations
x1, . . . , xn ∈ X and weights a ∈ Σn, and denoted by
µX =
aiδxi.
(7)
a ∈ Rn
+ :
n(cid:88)
i=1
µX = (cid:80)n
i=1 aiδxi and µY = (cid:80)m
The transport map T between two discrete measures,
j=1 bjδyj , is a surjective
function T : {x1, . . . , xn} → {y1, . . . , ym} that satisfies
(cid:88)
bj =
i,T (xi)=yj
ai ∀j = 1, . . . , m.
(8)
Compactly the above is written as T(cid:93)µx = µy, which implies
that measure µy is the push-forward measure of µx under
the map T .
A. Monge problem
We seek to find optimal assignments for the agent-target
system, and this implies that we seek a map T that minimizes
some the transportation cost. Let the transportation cost be
defined pointwise as
c(x, y) = c(x, T (x)),
∀(x, y) ∈ X × Y.
(9)
The Monge problem then seeks a map T that minimizes
(cid:35)
c(xi, T (xi)) : T(cid:93)µX = µY
.
(10)
To parameterize T, we can define an index function σ :
(cid:74)n(cid:75) →(cid:74)m(cid:75) so that T (xi) = yσ(i), just as in Equation (1).
The problem with optimizing Equation (10) is that it is
not-convex. In general, convexity can be achieved by relaxing
the deterministic nature of the map to allow portions of xi
to be directed towards yj. The resulting stochastic map is
defined by a coupling matrix (transition probability matrix, or
stochastic matrix) P ∈ Rn×m
with pij indicating the portion
of xi assigned to yj. Define a set of allowable coupling
(cid:8)P ∈ Rn×m
matrices
: P 1m = a and P T 1n = b(cid:9) ,
(cid:88)
where 1k denotes a vector of size k filled with ones. The
Monge-Kantorovich optimization formulation then becomes
U(a, b) ≡
+
+
c(xi, yj)pij,
(11)
Lc(a, b) = min
P∈U (a,b)
i,j
and it can be solved with linear programming. Under the con-
ditions given next, the solution to this optimization problem
is equal to the solution of the Monge problem.
B. Matching problem
The matching problem is a particular realization of OT that
has the property that the minimizer of (11) is equal to that
of (10). The formal statement of this equivalence is given
below.
Proposition 1 (Kantorovich for matching (Prop 2.1, [31])):
If n = m and a = b = 1n/n then there exists an optimal
solution for minimizing Equation (11) Pσ∗, which is a
permutation matrix associated to an optimal permutation
σ∗
∈ Perm(n) for Equation (10).
In this setting, we seek a a one-to-one mapping T . The
constraint set U(a, b) becomes the set of doubly stochastic
matrices with entries, and the coupling matrix has elements
(cid:34) n(cid:88)
i=1
min
T
(cid:26) 1/n
0
pij =
if j = σ(i),
otherwise.
(12)
In the context of our assignment problem, this case occurs
when there are an equal amount of agents and targets. A
discrete optimal transport formulation can also be applied
for a relaxation of the Kantorovich problem so that several
agents can be assigned to the same target. This problem can
also guarantee binary coupling matrices (essential for our
application). For further details, we refer to [16].
C. Metrics
The choice of cost c(xi, yj) is problem dependent; how-
ever, the most commonly used cost for optimal transport be-
tween distributions is the Euclidean distance. Parameterized,
by α ≥ 1, it is given by
c(xi, yj) = (cid:107)xi − yj(cid:107)α,
(13)
where (cid:107)·(cid:107) is the Euclidean norm. Using this metric for points,
Lc(a, b) can be viewed as a metric for measures. In this
case, Lc is called the Lα-Wasserstein distance [16]. In the
statistical community, this metric is also called the Earth
movers distance (EMD).
This metric implies that the cost of moving a resource xi
to yj is dominated by the distance between them in Euclidean
space. The total cost of the assignment then becomes a
sum of the distances. In our application to assignment in
dynamical systems, the Euclidean metric may not be most
appropriate because it does not account for the underlying
dynamics of the system. One of our insights is that using
a metric determined by the underlying dynamics of the
problems leads to more optimal assignments.
IV. ASSIGNMENT IN DYNAMIC SYSTEMS WITH DOT
In this section we describe how DOT can be applied to
minimize Equation (2). As previously stated, our goals are to
determine the assignment policy σ that is "capability-aware."
In other words, the assignment policy must account for the
dynamics of the system -- the capabilities of the agents and
the targets.
A direct application of the EMD metric within DOT would
potentially require constant reassignment at each timestep
because the metric makes no accountability of the future
system state. In other words, it would be greedy and simply
assign each agent to minimize the total distance between
agent/target pairs.
In the next two subsections we first describe an algorithm
that leverages the knowledge of the interception strategies
of each agent to make an assignment, and then we provide
and discuss pseudocode to illustrate the flexibility of our
approach .
A. Algorithm
The metric we propose for the transportation cost of
assigning xi
is that corresponding to the optimal
actions of a one-agent-to-one-target optimization problem.
For instance, let us assume that agent i is paired to target
to yj
j = σ(i), then in the 1v1 scenario for policy µi, we have a
total incurred cost of
J µi
iσ(i)(xi(0),yσ(i)(0)) =
(cid:90) τi
gi(t, xi, µi(t, xi(t), yσ(i)(t)), yσ(i))dt
0
The optimal policy is obtained by minimizing this value
function.
Let Jiσ(i) = minµ J µi
iσ(i) correspond to the value function
under the optimal policy. Our proposed transportation cost
is this optimal value function
cdyn(xi(0), yσ(i)(0)) = Jiσ(i)(xi(0), yσ(i)(0)).
(15)
For example, for linear dynamics with quadratic cost the
transportation becomes
cdyn(xi(0), yσ(i)(0)) =
f (xi(0), yσ(i)(0))T Piσ(i)f (xi(0), yσ(i)(0))+
2piσ(i)f (xi(0), yσ(i)(0))−
f (xi(0), yσ(i))T
2piσ(i)f (xi(0), yσ(i))ss
ssPiσ(i)f (xi(0), yσ(i))ss−
(16)
the distance directly by extracting the positions (pos, but an
entire state can also be used), and discards gpol -- the cost
of the actual policy. As a result, this assignment needs to
be continuous recomputed. In Section V we prove that our
approach only requires an assignment to be generated once.
(14)
Algorithm 1 Simulation engine with dynamics-based assign-
ment and LQT tracking
Inputs n agents A, states X = (xi)i∈A, dynamics (fi)i∈A;
Outputs Completion of simulation, all targets are tracked
n targets Y = {y1, . . . , yn}, dynamics (fTi)n
i=1 = assign(X, Y, (fi)n
i−1, LQT, distdyn)
i=1, (fTi )n
σ, (µi)n
i=1
while t ≤ tf do
for (i, xi) ∈ A do
j = σ(i)
yj(t) ← Get target state from environment
ui(t) = µi(t, xi, yj)
x∗
i (t + dt) = ODEsolve(t, t + dt, fi, xi, ui)
A = remove-tracked(A, (xi)n
i=1, (yi)n
j=1)
end for
end while
where f is a function that combines the agent and target
state into suitable form. For instance f (x, y) = x − y can
be used for a reference tracking problem [36]; Piσ(i) is the
solution of the continuous algebraic Riccati equation for the
LQR-based tracker; piσ(i) is the feed-forward control of the
state being tracked; and f (xi(0), yσ(i))ss is a function that
provides the steady-state value for the quadratic agent-target
state.
B. Pseudocode
In this section we provide and describe the pseudocode
for the proposed algorithm. A sample implementation that
makes specific choices about the dynamics and policies is
shown in Algorithm 1. This algorithm takes as inputs all
of the agent states, target states, and dynamics. In Line 1,
the assignment and individual agent policies are obtained by
querying Algorithm 2.
Algorithm 2 performs the optimal transport allocation. Its
inputs are all of the states and their dynamics, an algorithm
for computing the policies for each agent when it is assigned
to some state, and a cost metric. Algorithm 1 makes two
specific choices for these components. First, it uses the linear
quadratic tracker (LQT) developed in [36] that uses linear
dynamics. However, if the dynamics are nonlinear, any other
computable policy can be used. The specific cost metric
is distdyn, which is the dynamics-based distance given
by Algorithm 3. This algorithm, uses the cost of the LQT
policy (16) as the transportation cost. Algorithm 2 has two
steps. First it calls the discrete optimal transport routine with
a pre-specified distance metric to obtain an assignment σ. It
then iterates through all agents and obtains the individual
policy for each agent that follows the assignment.
The high-level Algorithms 1 and 5 demonstrate the differ-
ences between our approach and the standard approach that
uses the distance metric (Algorithm 4). Algorithm 4 evaluates
Algorithm 2 Assignment policy: assign
Inputs Set of agents X = (xi)n
i=1; Set of targets Y =
i=1; agent dynamics fi; target dynamics fTi; control
(yi)n
policy generator pol; 1 vs. 1 function cost calculator
dist
Outputs An assignment policy σ; agent policies (µi)n
1: σ = DOT(X, Y, dist)
2: for i = 1 . . . n do
3:
4: end for
5: return σ, (µi)n
gi, µi = dist(xi, yσi, fi, fTσi
)
i=1
i=1
Algorithm 3 Dynamics-based cost: distdyn
Inputs Agent state x; target state y; agent dynamics f; target
dynamics fT ; control policy generator pol
Outputs The cost g and the optimal policy µ for assigning
agent x to target y
1: g, µ = pol(x, y, f, fT )
2: return g, µ
V. ANALYSIS
In this section we analyze the proposed algorithms. Our
aim is to show that the optimization problem (2) can be
reformulated into the Monge-Kantorovich optimal transport
problem. We follow a two step procedure. First we show
that the optimal assignment policy of Equation (1) does not
change with time, and next we show that the problem is
identical to the Monge problem.
Proposition 2 (Constant assignment policy): The optimal
assignment policy σt for minimizing (2) is fixed over time.
Algorithm 4 Distance-based cost: distemd
Inputs Agent state x; target state y; agent dynamics f; target
dynamics fT ; control policy generator pol
Outputs The cost g and the optimal policy µ for assigning
agent x to target y
1: gpol, µ = pol(x, y, f, fT )
2: g = (cid:107)pos(x) − pos(y)(cid:107)
3: return g, µ
Algorithm 5 Simulation engine with distance-based assign-
ment and LQT tracking
Inputs n agents A, states X = (xi)i∈A, dynamics (fi)i∈A;
Outputs Completion of simulation, all targets are tracked
while t ≤ tf do
X, Y ← extract-active-agents(A)
σ, (µi)n
n targets Y = {y1, . . . , yn}, dynamics (fTi)n
i=1 = assign(X, Y, (fi)n
i−1, LQT, distemd)
i=1, (fTi )n
i=1
for (i, xi) ∈ A do
j = σ(i)
yj(t) ← Get target state from environment
ui(t) = µi(t, xi, yj)
x∗
i (t + dt) = ODEsolve(t, t + dt, fi, xi, ui)
i=1, (yi)n
A = remove-tracked(A, (xi)n
j=1)
end for
end while
In other words, if σtc(i) = j for a fixed i and j at time tc,
then for any t > tc we also have σtc(i) = j.
Proof: We consider the case of two agents first,
and then extend our approach to multiple agents through
induction. We start with the case of two agents x1 and x2 and
two targets y1 and y2. We will compare two policies: a time
varying policy that includes at least one switch µ(2)(t) =
(σt, µ1, µ2), and a second policy µ(2) = (σ, µ1, µ2) that does
not switch and where µ1 and µ2 minimize Equation (14).
We first consider the case where µ(2)(t) both contains
switches and the final assignment is equivalent to the initial
assignment. In this case let t1 denote the time the first switch
occurs and t2 denote the time of the final switch back to the
original assignment. Without loss of generality, assume that
the initial assignment is given by σ0(i) = i. Let A(t) denote
the active agents under the policy and τ and τi denote the
exit times. The cost associated with µ(2) is
Jµ(2)(S(0)) =
gi(xi, ui, yσt(i))dt
(cid:90) τ
n(cid:88)
0
i=1,i∈ A(t)
Letting δi∈A(t) denote an indicator function, we can rewrite
the total cost as a sum over each agent
Jµ(2)(S(0)) =
δi∈A(t)gi(xi, µi(xi), yσt(i))dt
(17)
(cid:90) τ
2(cid:88)
i=1
0
t2, and after t2. Denoting τi denote the exit time of agent i
we have
Jµ(2)(S(0)) =
gi(xi, µi(xi), yσ(i))dt+
2(cid:88)
i=1
(cid:104)(cid:90) t1
(cid:90) t2
0
gi(xi, µi(xi), yσt(i))dt+
gi(xi, µi(xi), yσ(i))dt
(cid:105)
t1
(cid:90) τ1
t2
(cid:80)n
(cid:82) τ1
Finally, suppose that µ(2) = µ(2)(0) = (σ0, µ1, µ2) is a
policy that maintained the original assignment. In this case,
because µ1 and µ2 are optimized for the original assignment,
they clearly result in policies that have lower costs than µ1
and µ2 incurred during the time period from t1 and t2. In
other words, since each agent ends up targeting the same
target that it initially targeted, it is at least more effective
to directly follow the policy to the target
than to have
intermediate deviations to the other target, i.e.,
i=1
Jµ(2)(S(0)) ≥
0 gi(xi, µi(xi), yσ(i))dt = Jµ(2)(S(0)).
An identical argument follows for the case where the final
policy is different than the initial policy. In that case, we
would set µ(2) = µ(2)(τ ).
The case for more than two agents and targets follows
by noticing that any system of n agents can be analyzed
by considering a system of two modified agents. The first
modified agent is the augmentation of the first n − 1, and
the last one is the nth agent. Then the scenario is identical
to the 2v2 assignment and the same argument follows.
Now that we have shown that the optimal assignment is
time independent, we can show that the minimizer of our
our stated optimization problem (2) is the same as that of
the Monge problem (10).
Theorem 1 (Optimization problem equivalence): The op-
timal solution of the assignment problem given by the
optimization problem (2) is equivalent to that obtained by
minimizing the Monge problem (10) when the 1v1 cost
function (15) is used as the transportation cost.
Proof: We use the fact that the optimal policy maintains
a fixed index assignment vector for all time, i.e., σt = σ. Let
S(0) denote the initial state of the system, then the cost for
any initial state can be represented as
gi(xi, ui, yσ(i))dt
δi∈A(t)gi(xi, ui, yσ(i))dt
i=1,i∈A(t)
n(cid:88)
(cid:90) τ
(cid:90) τi
0
0
(cid:90) τ
n(cid:88)
n(cid:88)
n(cid:88)
i=1
i=1
i=1
J(S(0)) =
=
=
≥
gi(xi, ui, yσ(i))dt
0
cdyn(xi(0), yσ(i)(0))
Now we can break up the integral into three section corre-
sponding to the cost before the switch at t1, between t1 and
where the first equality came from Equations (3) and (4) the
second equality follows the same argument as Equation (17);
the third equality follows from the definition of τi; and
the final inequality follows from the definition of cdyn in
Equation (15). Because of the definitions of 1v1 exit times τi,
we implicitly the cost function to only those policies where
the agents reach their targets, i.e., T(cid:93)µA = µT where µA is
the initial distribution of the agents and µT is the distribution
of the targets at interception. Strict equality is obtained when
the policies µi correspond to the optimal policies 1v1 policies
that minimize (14) so that ui(t) are generated by µi. Thus,
we have proved the stated result.
VI. SIMULATION RESULTS
We now numerically demonstrate the effectiveness of our
approach through several simulated examples. In each exam-
ple, we have used the Python Optimal Transport library [17]
to solve the underlying DOT problem. In each case, the
dynamics are integrated via the RK45 integration scheme.
A. Double integrators in three dimensions
In this section we demonstrate that using the dynamics-
based cost function over the standard distance-based Wasser-
stein metric yields significant savings that increases with size
of the system. For the various examples we will consider
agent/target systems of sizes 5 vs. 5, 10 vs. 10, 20 vs. 20
and 100 vs. 100.
This set of examples uses a simple system of double
integrators in three dimensions, where the velocity term is
directly forced. The evolution of the state of each agent
xi = (xi1, xi2, xi3, xi4, xi5, xi6) is given by
for j = 1, 2, 3 and
xij = xi(j+3)
xij = ui(j−3)
for j = 4, 5, 6, where each agent has three control inputs
(one for each dimension). The target dynamics are identical
to the agent dynamics.
Each agent uses an infinite horizon linear-quadratic track-
ing policy of [36] where the stage cost of an assignment is
given by
g(xi, ui, yσ(i) = eiσ(i)(t)T Qieiσ(i)(t) + ui(t)T Riui(t)−
Riussi )
(18)
Qiessiσ(i) + uT
ssi
(eT
ssiσ(i)
where eiσ(i)(t) and essiσ(i) are defined as the transient error
and steady-state error between the ith agent state and an
assigned-to target state, respectively; ui is the control input
to drive the ith agent to the assigned-to target; and ussi
is the control input for the ith agent to the assigned-to
target operating at steady-state conditions. For the weight
matrices we choose Qi = diag(103, 103, 103, 0, 0, 0), where
the nonzero weights correspond to the errors in positions in
each dimension and the zero weights correspond to the errors
in velocity. The control penalty is chosen to be Ri = I3×3.
The targets use an identical tracking policy; however they
track certain fixed positions in space.
The initial conditions of the system consist of the positions
and velocities of each agent and target, a set of stationary
locations that are tracked by the targets, and a set of
assignments from each target to the the stationary location.
These conditions are randomly generated for the following
results.
The initial conditions of the agents consist of uniformly
distributed position and velocity components on an interval
of −1000 to 1000 and −5000 to 5000, respectively. The
initial conditions of the targets position are equivalent, but
with velocity parameters following a uniform distribution
between −1000 to 1000. The terminal target locations were
randomly selected on a uniform distribution between −1000
and 1000.
Fig. 1. Normalized costs incurred by 100 agents tracking 100 targets.
The cumulative costs over time for the assignment policy that uses EMD is
shown by the solid cyan line. The cost of this policy exceeds the optimal
cost given by the dotted black line. This optimal cost is computed by
summing the optimal costs of the value function for each agent under the
optimal assignment. The cumulative costs of the dynamics-based assignment
approaches this optimal value, as expected.
In Figure 1, we show the cumulative control costs incurred
by a system of 100 agents while they are attempting to
tracking 100 targets. Recall that the EMD-based objective
assigns agents to targets with the aim of minimizing the total
Euclidean distance. This assignment does not account for
the dynamics of the agent and as a result, it performs worse
than the dynamics-based assignment which accounts for the
effort to actually get the agent to its assigned target. Me-
chanically, this performance difference results because agents
are either incorrectly assigned at the beginning or because
agents switch assignments over the course of their operations.
For this simulation, the EMD-based policy checks whether
reassignment is necessary every 0.1 seconds.
Because visualizing the movements of 100 agents and
targets is difficult, we demonstrate prototypical movements
for a 5 vs. 5 system in Figures 2 and its X-Y projection 3
These figures demonstrate both the optimal trajectories of
the agents and targets under the dynamics-based optimal
assignment and the sub-optimal trajectories of the EMD-
based assignment. Agents A0 and A1, for example, take
significantly different paths to different targets. The move-
ments corresponding to the EMD-based policy require more
manuevering.
012345Time(s)0.000.250.500.751.001.25NormalizedCostOptimalcostCum.StageCostEMDCum.StageCostDynCost-to-goDynThe dynamics-based policy leverages the dynamic capa-
bilities of the agents to select the targets that each individual
would optimally be able to track over time. Finally, note that
the individual agent controllers that we use are fundamentally
tracking controllers, thus the agents act to match the velocity
and position of their targets. This is the reason why several
maneuvers show the agent passing and then returning to the
target -- for instance A1 to T3 under the EMD policy.
Fig. 2. Trajectories of agents and targets in a 5 vs 5 system. The trajec-
tories for an assignment policy that accounts for the dynamics (Dyn) are
qualitatively different than the assignment policy that uses the Wasserstein
distance (EMD). For labels of each path see the X-Y projection in Figure 3.
Fig. 3. Projection of the trajectories of Figure 2 onto the X-Y plane.
Since the dynamics-based assignment policy selects an
optimal assignment at initial time, it offers significant control
cost benefits over assignments that continually reassign the
agents based on the EMD.
The benefit of dynamics-based assignment grows with the
size of the system. To demonstrate this fact we use perform
Monte Carlo simulations of one hundred realizations of a 5
vs 5, 10 vs 10, and 20 vs 20 system by sampling over initial
conditions. As the complexity of the engagement increases,
the amount of additional control effort required by the EMD
based assignment grows, shown by Figure 4.
Furthermore, Figure 5 illustrates that as the system size
grows the EMD-based policy performs more switches. This
fact contributes to the observed loss in efficiency of the
EMD-based policy.
Fig. 4.
The EMD-based assignment policy becomes increasingly less
effective as the size of the system grows. Histograms of 100 Monte Carlo
simulations obtained by sampling initial conditions for various system sizes
are shown. As the system size increases, the distribution of the difference
between the control effort of the EMD and Dyn based assignments increases.
Fig. 5.
Monte Carlo simulations for 5v5, 10v10, and 20v20 systems
reveal that the average number of Agent-Target assignment switches for
EMD-based assignments positively correlates with the size of the systems.
B. Linearized Quadcopter
We now compare the algorithms on swarms of linearized
quadcopter dynamics [32] that are slightly modified versions
of double integrators. The dynamics of both the agents and
the targets in this case are given by
x = u
y = v
z = w
ψ = r
θ = q
φ = p
u = −gθ + fwx
m
v = gφ + fwy
m
w = fwx−ft
p = τx+τwx
q = τy+τwy
r = τz+τwz
Ixx
m
Iyy
Izz
f (x, u, d) =
x =(cid:2)x y
where the twelve dimensional state space
z ψ θ φ u v w p q
r(cid:3)T
∈ R12
x−100001000y−100001000z−100001000A0T0A1T1A2T2A3T3A4T4C0C1C2C3C4A0T0A1T1A2T2A3T3A4T4C0C1C2C3C4−100001000x−1000−50005001000yA0T0A1T1A2T2A3T3A4T4C0C1C2C3C4A0T0A1T1A2T2A3T3A4T4C0C1C2C3C4AgentPath(Dyn)TargetPathAgentStartTargetStartTerminalStateAgentPath(EMD)0.00.20.40.60.8ControlExpenditureDifference(EMD-Dyn)/Dyn010203040Frequency5v510v1020v205v510v1020v20Agents02468Average#Assign.Switchesconsists of the position, attitude, translational velocity, and
rotational velocity components of the vehicle. The parame-
ters of the system are m = 0.1kg, Ixx = 0.00062kg-m2,
Iyy = 0.00113kg-m2, Izz = 0.9(Ixx + Iyy) and g =
9.81m/s2, respectively. Linearization was performed under
small oscillation and small angle approximations. Further-
more, we will assume no wind disturbance forces and
torques, d = [fwx, fwy, fwz, τwx, τwy, τwz] = 0. The control
inputs are four dimensional and consist of the forces and
torques u = [ft, τx, τy, τz] that act on the vertical thrust and
angular motions about the three principal axes.
The initial positions and velocities of the agents are
sampled uniformly between −100 to 100 and −500 to
500, respectively. The initial velocities of the targets were
sampled uniformly between −50 to 50. The attitude and
rotational velocity terms for both agents and targets were
uniformly distributed between −2π and 2π and −25 and
25, respectively. The terminal target locations were randomly
selected from a uniform distribution between −100 and 100.
The control parameters for the agents and targets are updated
to Qi = diag(103, 103, 103, 103, 103, 103, 0, 0, 0, 0, 0, 0) and
Ri = I4x4, respectively.
Similar to the double integrator systems, the dynamics-
based assignment policy is able to optimally assign the more
complex quadcopter agents to complete their tracking task
with minimal cost. Figure 6 illustrates the cumulative cost
expended by the agent swarm and once again showcases the
optimality of the dynamics-based assignment method. Unlike
the EMD policy, the complete dynamic information of the
swarm members are used in the decision-making process as
opposed to only the euclidean distance components. In the
end, the EMD-based assignment policy incurs a cost that is
1.7 times greater than the dynamics-based assignment policy.
Figures 7 and Figures 8 reveal the paths taken by the
agents managed by the EMD and Dyn policies. Agents 1
and 4, in particular, are allowed to take advantage of their
initial dynamic states to cheaply track their targets, instead
of being reassigned (by the EMD-based policy) mid-flight
to closer targets that appear. In this case, the reassignment
causes extreme turning maneuvers that require significant
control expense.
Since the linearized quadcopter operates over a d = 12
statespace, the computational cost for performing assign-
ments are more expensive, and since the EMD-based policy
requires checking and updating assignments every time incre-
ment, it requires significantly greater computational expense.
For this problem, the total cost of all reassignments required
0.6 seconds by the EMD policy, a signification porition of
the total simulation time of five seconds.
Fig. 6.
Normalized costs incurred by 5 linearized quadcopter agents
tracking 5 linearized quadcopter targets. The cumulative costs for the
EMD policy exceeds the optimal cumulative costs of the dynamics-based
policy for a system operating realistic dynamics. The dynamics-based policy
continues to settle at the optimal value.
Fig. 7.
Trajectories for a 5 vs 5 system operating linearized quad-
copter dynamics. The dynamics-based policy accounts for the full dynamic
capability of the agents in its assignment, rather than solely relying on
spatial proximity information. This includes leveraging the rotational and
translational information of the vehicle in the decision process.
Fig. 8. Projection of the trajectories of Figure 7 onto the X-Y plane. Agents
1 and 4 are able to use their initial dynamic conditions to optimally track
their targets instead of performing expensive turning maneuvers.
VII. CONCLUSION
In this paper we have demonstrated how to reformulate
a dynamic multi-vehicle assignment problem into a linear
program by linking this problem with the theory of optimal
transport. This theory allows us to prove optimality and to
increase the system efficiency using our approach. In the end,
we have developed an assignment approach that is capability-
aware. The assignment accounts for the capabilities of all the
agents and targets in the system.
One direction of future research is the incorporation of
constraints amongst the various agents to avoid collisions
or other interactions. An extension of DOT theory in this
direction could greatly increase the tractability of numer-
012345Time(s)0.00.51.01.52.0NormalizedCostOptimalcostCum.StageCostEMDCum.StageCostDynCost-to-goDynx−1000100y−1000100z−1000100A0T0A1T1A2T2A3T3A4T4C0C1C2C3C4A0T0A1T1A2T2A3T3A4T4C0C1C2C3C4−50050100x−100−50050100yA0T0A1T1A2T2A3T3A4T4C0C1C2C3C4A0T0A1T1A2T2A3T3A4T4C0C1C2C3C4AgentPath(Dyn)TargetPathAgentStartTargetStartTerminalStateAgentPath(EMD)ous multi-agent swarm operations, for example large scale
formation flight. Another direction for future research is
the incorporation of stochastic dynamics and partial state
information. For either case, the approach described in this
paper can be used as the basis of a greedy or approximate
dynamic programming approach that is traditionally used
for these problems. Finally, we can incorporate learning
into the program where the agents periodically update their
knowledge about the intent of the targets.
VIII. ACKNOWLEDGMENTS
We would like to thank Tom Bucklaew and Dustin Martin
of Draper Laboratory for their helpful guidance and vision
in support of this project. This research has been supported
by Draper Laboratory, 555 Technology Square, Cambridge,
MA 02139.
REFERENCES
[1] Ravindra K Ahuja, Arvind Kumar, Krishna C Jha, and James B
Orlin. Exact and heuristic algorithms for the weapon-target assignment
problem. Operations research, 55(6):1136 -- 1146, 2007.
[2] Javier Alonso-Mora, Samitha Samaranayake, Alex Wallar, Emilio
Frazzoli, and Daniela Rus. On-demand high-capacity ride-sharing
via dynamic trip-vehicle assignment. Proceedings of the National
Academy of Sciences, 114(3):462 -- 467, 2017.
[3] Gurdal Arslan, Jason R Marden, and Jeff S Shamma. Autonomous
vehicle-target assignment: A game-theoretical formulation. Journal of
Dynamic Systems, Measurement, and Control, 129(5):584 -- 596, 2007.
[4] Saptarshi Bandyopadhyay. Novel probabilistic and distributed algo-
rithms for guidance, control, and nonlinear estimation of large-scale
multi-agent systems. PhD thesis, University of Illinois at Urbana-
Champaign, 2016.
[5] Saptarshi Bandyopadhyay, Soon-Jo Chung, and Fred Y Hadaegh.
Probabilistic swarm guidance using optimal transport. In 2014 IEEE
Conference on Control Applications (CCA), pages 498 -- 505. IEEE,
2014.
[6] Saptarshi Bandyopadhyay, Soon-Jo Chung, and Fred Y Hadaegh.
Probabilistic and distributed control of a large-scale swarm of au-
tonomous agents. IEEE Transactions on Robotics, 33(5):1103 -- 1123,
2017.
[7] Rainer E Burkard. Selected topics on assignment problems. Discrete
Applied Mathematics, 123(1-3):257 -- 302, 2002.
[8] Huaiping Cai, Jingxu Liu, Yingwu Chen, and Hao Wang. Survey of
the research on dynamic weapon-target assignment problem. Journal
of Systems Engineering and Electronics, 17(3):559 -- 565, 2006.
[9] Guillermo Canas and Lorenzo Rosasco. Learning probability measures
In Advances in Neural
with respect to optimal transport metrics.
Information Processing Systems, pages 2492 -- 2500, 2012.
[10] Avishai Avi Ceder. Optimal multi-vehicle type transit timetabling and
vehicle scheduling. Procedia-Social and Behavioral Sciences, 20:19 --
30, 2011.
[11] Marco Cuturi. Sinkhorn distances: Lightspeed computation of optimal
transport. In Advances in neural information processing systems, pages
2292 -- 2300, 2013.
[12] Michael T Davis, Matthew J Robbins, and Brian J Lunday. Ap-
proximate dynamic programming for missile defense interceptor fire
control. European Journal of Operational Research, 259(3):873 -- 886,
2017.
[13] Gonc¸alo Homem de Almeida Correia and Bart van Arem. Solving the
user optimum privately owned automated vehicles assignment problem
(uo-poavap): A model to explore the impacts of self-driving vehicles
on urban mobility. Transportation Research Part B: Methodological,
87:64 -- 88, 2016.
[14] Tarek A El Moselhy and Youssef M Marzouk. Bayesian inference with
optimal maps. Journal of Computational Physics, 231(23):7815 -- 7850,
2012.
[15] Jan Faigl, Miroslav Kulich, and Libor Preucil. Goal assignment
In 2012 IEEE/RSJ
using distance cost in multi-robot exploration.
International Conference on Intelligent Robots and Systems, pages
3741 -- 3746. IEEE, 2012.
[16] Sira Ferradans, Nicolas Papadakis, Gabriel Peyr´e, and Jean-Franc¸ois
SIAM Journal on
Aujol. Regularized discrete optimal transport.
Imaging Sciences, 7(3):1853 -- 1882, 2014.
[17] R´emi Flamary and Nicolas Courty. Pot: Python optimal transport
library, 2017.
[18] Christina Frederick, Magnus Egerstedt, and Haomin Zhou. Multi-
robot motion planning via optimal transport theory. arXiv preprint
arXiv:1904.02804, 2019.
[19] Charlie Frogner, Chiyuan Zhang, Hossein Mobahi, Mauricio Araya,
and Tomaso A Poggio. Learning with a wasserstein loss. In Advances
in Neural Information Processing Systems, pages 2053 -- 2061, 2015.
[20] Alfred Galichon. Optimal transport methods in economics. Princeton
University Press, 2018.
[21] Nassif Ghoussoub, Young-Heon Kim, and Aaron Zeff Palmer. Optimal
transport with controlled dynamics and free end times. SIAM Journal
on Control and Optimization, 56(5):3239 -- 3259, 2018.
[22] Bryan S Graham. Econometric methods for the analysis of assignment
problems in the presence of complementarity and social spillovers. In
Handbook of social economics, volume 1, pages 965 -- 1052. Elsevier,
2011.
[23] Patrick A Hosein and Michael Athans. Some analytical results for
the dynamic weapon-target allocation problem. Technical report,
MASSACHUSETTS INST OF TECH CAMBRIDGE LAB FOR IN-
FORMATION AND DECISION SYSTEMS, 1990.
[24] Meng Ji, Shun-ichi Azuma, and Magnus B Egerstedt. Role-assignment
in multi-agent coordination. 2006.
[25] Roy Jonker and Anton Volgenant. A shortest augmenting path algo-
rithm for dense and sparse linear assignment problems. Computing,
38(4):325 -- 340, 1987.
[26] Stephen Kloder and Seth Hutchinson. Path planning for permutation-
IEEE Transactions on Robotics,
invariant multirobot formations.
22(4):650 -- 665, 2006.
[27] Kwan S Kwok, Brian J Driessen, Cynthia A Phillips, and Craig A
Tovey. Analyzing the multiple-target-multiple-agent scenario using
optimal assignment algorithms. Journal of Intelligent and Robotic
Systems, 35(1):111 -- 122, 2002.
[28] Zne-Jung Lee, Chou-Yuan Lee, and Shun-Feng Su. An immunity-
based ant colony optimization algorithm for solving weapon -- target
assignment problem. Applied Soft Computing, 2(1):39 -- 47, 2002.
[29] Zne-Jung Lee, Shun-Feng Su, and Chou-Yuan Lee. Efficiently solving
general weapon-target assignment problem by genetic algorithms
IEEE Transactions on Systems, Man, and
with greedy eugenics.
Cybernetics, Part B (Cybernetics), 33(1):113 -- 121, 2003.
[30] Dimitra Panagou, Matthew Turpin, and Vijay Kumar. Decentralized
goal assignment and trajectory generation in multi-robot networks.
arXiv preprint arXiv:1402.3735, 2014.
[31] Gabriel Peyr´e and Marco Cuturi. Computational optimal transport.
Foundations and Trends R(cid:13) in Machine Learning, 11(5-6):355 -- 607,
2019.
[32] Francesco Sabatino. Quadrotor control: modeling, nonlinearcontrol
design, and simulation, 2015.
[33] Mehmet Alper S¸ahin and Kemal Leblebicioglu. Approximating the
optimal mapping for weapon target assignment by fuzzy reasoning.
Information Sciences, 255:30 -- 44, 2014.
[34] C´edric Villani.
Topics in optimal
American Mathematical Soc., 2003.
transportation. Number 58.
[35] C´edric Villani. Optimal transport: old and new, volume 338. Springer
Science & Business Media, 2008.
[36] Jacques L Willems and Iven MY Mareels. A rigorous solution of the
infinite time interval lq problem with constant state tracking. Systems
& control letters, 52(3-4):289 -- 296, 2004.
[37] Bin Xin, Jie Chen, Juan Zhang, Lihua Dou, and Zhihong Peng.
Efficient decision makings for dynamic weapon-target assignment by
virtual permutation and tabu search heuristics. IEEE Transactions on
Systems, Man, and Cybernetics, Part C (Applications and Reviews),
40(6):649 -- 662, 2010.
[38] Brian Yamauchi. Decentralized coordination for multirobot explo-
ration. Robotics and Autonomous Systems, 29(2-3):111 -- 118, 1999.
[39] Anmin Zhu and Simon X Yang. A neural network approach to
dynamic task assignment of multirobots. IEEE transactions on neural
networks, 17(5):1278 -- 1287, 2006.
|
1106.0223 | 1 | 1106 | 2011-06-01T16:17:03 | Decentralized Markets versus Central Control: A Comparative Study | [
"cs.MA",
"cs.AI"
] | Multi-Agent Systems (MAS) promise to offer solutions to problems where established, older paradigms fall short. In order to validate such claims that are repeatedly made in software agent publications, empirical in-depth studies of advantages and weaknesses of multi-agent solutions versus conventional ones in practical applications are needed. Climate control in large buildings is one application area where multi-agent systems, and market-oriented programming in particular, have been reported to be very successful, although central control solutions are still the standard practice. We have therefore constructed and implemented a variety of market designs for this problem, as well as different standard control engineering solutions. This article gives a detailed analysis and comparison, so as to learn about differences between standard versus agent approaches, and yielding new insights about benefits and limitations of computational markets. An important outcome is that "local information plus market communication produces global control". | cs.MA | cs | Journal of Artificial Intelligence Research 11 (1999) 301-333
Submitted 3/99; published 10/99
Decentralized Markets versus Central Control:
A Comparative Study
Fredrik Ygge
EnerSearch AB and Uppsala University
Chalmers Science Park
S-412 88 Gothenburg, Sweden
www.enersearch.se/ygge
[email protected]
Hans Akkermans
AKMC and Free University Amsterdam
Department of Information Management and Software Engineering
Computer Science Division
De Boelelaan 1081a, NL-1081 HV Amsterdam, The Netherlands
[email protected]
Abstract
Multi-Agent Systems (MAS) promise to offer solutions to problems where established,
older paradigms fall short.
In order to validate such claims that are repeatedly made
in software agent publications, empirical in-depth studies of advantages and weaknesses of
multi-agent solutions versus conventional ones in practical applications are needed. Climate
control in large buildings is one application area where multi-agent systems, and market-
oriented programming in particular, have been reported to be very successful, although
central control solutions are still the standard practice. We have therefore constructed and
implemented a variety of market designs for this problem, as well as different standard
control engineering solutions. This article gives a detailed analysis and comparison, so as
to learn about differences between standard versus agent approaches, and yielding new
insights about benefits and limitations of computational markets. An important outcome
is that “local information plus market communication produces global control”.
1. Introduction
When new paradigms arise on the scientific horizon, they must prove their value in com-
parison and competition with existing, more established ones. The multi-agent systems
(MAS) paradigm is no exception. In a recent book on software agents (Bradshaw, 1997),
Norman observes that perhaps “the most relevant predecessors to today’s intelligent agents
are servomechanisms and other control devices”. And indeed, a number of applications for
which multi-agent systems have recently claimed success, are close to the realm of what is
traditionally called control engineering. One clear example is the climate control of large
buildings with many office rooms. Here, Huberman & Clearwater (1994, 1995) have con-
structed and tested a working MAS solution based on a market approach, that they reported
to outperform existing conventional control.
The key question studied in this article is:
in what respect and to what extent are
multi-agent solutions better than their (conventional) alternatives? We believe that the
c(cid:13)1999 AI Access Foundation and Morgan Kaufmann Publishers. All rights reserved.
Ygge & Akkermans
above-mentioned application provides a nice opportunity to study this question in a de-
tailed empirical way. It is practically very relevant, it lends itself to alternative solutions,
and it is quite prototypical for a wide range of industrial applications in distributed re-
source allocation (including energy management applications (Ygge & Akkermans, 1996;
Akkermans & Ygge, 1997; Ygge & Akkermans, 1998), telecoms applications, the file alloca-
tion problem of Kurose and Simha (1989), and the flow problems investigated by Wellman
(1993)).
This article gives a detailed analysis of a published MAS solution to building climate
control, and it compares multi-agent markets with traditional control approaches. We also
introduce an improved and novel multi-agent solution to this problem based on an equilib-
rium market. From our comparative analysis we are able to draw general conclusions about
the suitability of the various approaches. Briefly, we show how computational markets can
be designed that perform as well as centralized controllers having global information about
the total system. However, a major advantage of the market framework is that it achieves
this in a fully decentralized fashion using only locally available data. We finally outline that
it should be possible to come to a more general theory concerning the connections between
markets and conventional control concepts. Here, we show that for the considered type
of applications the quasi-equation “local data + market communication = global control”
holds.
The structure of the article is as follows. After an introduction (Section 2) to market-
oriented programming and available theory, Section 3 gives the problem definition. Section 4
introduces the application domain: it describes the office environment and gives the phys-
ical model for cooling power and the various temperature and outside weather influences.
We then discuss the results of a standard control engineering solution, based on local and
independent integral controllers regulating the building climate (Section 5). Next, we re-
view the market-based approach as put forward by Huberman & Clearwater (1994, 1995)
(Section 6), and validate their claim that this market approach performs better than con-
ventional independent controllers. We subsequently analyze this market protocol in detail
and show that its success is related to the fact that the agents possess global information
before the auction is started (Section 7). In Section 8 we then develop an improved stan-
dard control engineering scheme that also exploits global data. Such a control scheme turns
out to perform much better than the Huberman-Clearwater market. Finally, we propose a
market design of our own based on general equilibrium theory. It performs as well as the
controller having access to global data, but operates on local data only and thus represents
a really decentralized solution (Section 9). Section 10 puts our results into perspective and
summarizes the general conclusions in comparing different approaches.
2. Market-oriented Programming
The use of market mechanisms for resource allocation by computer systems has a rather
long history in computer science, e.g. (Sutherland, 1968), and more recently markets have
been used in a number of different application areas.
302
Decentralized Market Control
There is rather extensive theory available for the relations between optimization and
markets. For example:
• Jennergren (1973) has shown how a price schedule decomposition algorithm can be
used for solving linear programming problems.
• Kurose & Simha (1989) showed how an equilibrium constitutes an optimal solution
to a file allocation problem. A similar result was shown by Bertsekas (1992) for the
assignment problem.
• Bikhchandani & Mamer (1997) showed that a Pareto efficient outcome1 maximizes
the sum of the utilities in an exchange market with agents holding quasi-linear utility
functions2 This is a significant extension to the above, as it also applies to non-linear
problems.3
• The results of Bikhchandani and Mamer were extended to markets that include pro-
duction and uncertainty by Ygge (1998, Chapter 3). The relations between these
types of markets and traditional optimization problems were also made more explicit
in the latter work.
Markets approaches have been applied to a number of different computerized applica-
tions, and some of them are briefly discussed here. Already in 1968 Sutherland proposed an
auction mechanism for allocation of computational resources on a PDP-1 computer (Suther-
land, 1968). Different amounts of money were assigned to different users in accordance with
the importance of their projects. It was reported that the users then over time learn how
to bid properly for computational resources. This basic approach has been further refined
by, for example, Gagliano et al. (Gagliano et al., 1995).
Kurose & Simha (1989) investigate a file allocation problem. In this work the agents
report their marginal utility (for having a certain amount of storage) and its derivative to
an auctioneer, which reallocates the resource using a resource-oriented Newton-Raphson
algorithm (cf. Ygge & Akkermans, 1998) until an equilibrium has been reached in which
the marginal utilities of all agents are the same. Although the paper is based on a number of
microeconomic abstractions, it does not for example utilize prices and there is no trade-off
between different commodities. So, it is debatable whether this approach can be referred
to as really market-based.4
The assigning problem of allocating n objects to n users has been investigated by Bert-
sekas (1992). Each user has a valuation of each object, and cannot be assigned more than
one object. It is reported that each user can be seen as an economic agent, and it is shown
how an auction (which essentially is an English auction) results in an equilibrium. The
1. An allocation is Pareto efficient or Pareto optimal if there is no alternative allocation that makes any
agent better off without making the outcome worse for some other agent (Varian, 1996, p. 15).
2. An example of a quasi-linear utility function is given in Eq. (19).
3. However, one should remember that this theory does not provide any computational advantages. If it is
hard to find the allocation that maximizes the sum of the utilities, then it is also hard to find a Pareto
optimal one (as they are the same in this case).
4. One should also note that the formulation of the Newton-Raphson scheme of this approach is overly
simplistic, and there are much better standard methods available (Press et al., 1994; Ygge & Akkermans,
1998).
303
Ygge & Akkermans
Auctioneer
Trading Agent
Initiate Auction ❍
❍
✟✙
✏
❍
❍❥
✟
✟
✏
✏
No
Express demand
✏✶
Supply = Demand?
❳❳❳❳❳❳③
Yes
Register and implement
Figure 1: High-level view of an equilibrium market mechanism.
assumed agent behavior is that an agent bids v − w for its most highly valued object (i.e.
the object with the highest difference, v, between the valuation and the price). w is the
difference between the valuation and the price of the second most preferred object. There
is however no motivation given for the assumed agent behavior, and it is not clear why any
agent would use this strategy unless it can be externally imposed. Though there is some
economical interpretation of the prices, the approach is not very market-like due to the
rather unrealistic assumptions of agent behavior.
The equilibria in the applications by Kurose and Simha, and Bertsekas are proven to be
optimal. It is not hard to see that the problem of Kurose and Simha can be reformulated
as a proper market with quasi-linear utility functions, and that the competitive equilib-
rium then is equivalent to the equilibrium described by Kurose and Simha, cf. (Ygge, 1998,
Corollary 3.3.1). Similarly, the price vector obtained by Bertsekas clearly constitutes a
competitive equilibrium. At the same time, it is shown by Ygge (Ygge, 1998, Theorem 3.2),
that all separable optimization problems can be formulated in market terms and the (com-
petitive) general equilibrium (if existing) is identical to the optimal solution to the original
optimization problem. Consequently, this recent theory generalizes the earlier theory by for
example Kurose and Simha, and Bertsekas.
Wellman et al. have contributed significantly in developing market-based approaches to
resource allocation into a programming paradigm, which they have given the name market-
oriented programming, e.g. (Wellman, 1993; Mullen & Wellman, 1995; Wellman, 1995, 1996;
Yamaki, Wellman, & Ishida, 1996; Hu & Wellman, 1996; Cheng & Wellman, 1998; Wellman
& Hu, 1998; Walsh, Wellman, Wurman, & MacKie-Mason, 1998). Particularly, the micro-
economic framework of general equilibrium theory has been successfully used as a resource
allocation mechanism. In such a market which we call an equilibrium market agents send
demand functions telling how much they like to consume or produce at different prices.
The auctioneer then tries to establish an equilibrium price vector such that supply meets
demand for all commodities, cf. Figure 1.
The process of submitting parts of the demand function may be iterated if an equilibrium
price is outside the region captured by the submitted demand functions. One such process
is the basic price tatonnement process, cf. e.g. (Cheng & Wellman, 1998), in which demand
functions for the respective commodities are sent to an auctioneer. Each of those demands is
based on expected prices of the other commodities. That is, if those other prices change, a set
of new demand functions may need to be submitted. Once the auctioneer has established
an equilibrium price, the agents will exchange the resources as stated by their bid and
304
Decentralized Market Control
the equilibrium price. (For example, if an agent states that it wants to buy 1/p units of
a commodity—where p is the price in the commodity money—and the equilibrium price
becomes 1, the agent will buy one unit of resource for one unit of money.)
Equilibrium markets have many attractive theoretical properties. For example, if all
agents act competitively5, the outcome is Pareto efficient. Furthermore, if all utility func-
tions are quasi-linear, the outcome is globally optimal (Ygge, 1998, Theorem 3.2), and
in the presence of uncertainty, the outcome maximizes the expected global utility (Ygge,
1998, Theorem 3.5). We note that equilibrium markets be computationally implemented in
a computationally very efficient manner (Ygge, 1998, Chapter 4).
Wellman et al. have applied equilibrium markets to a number of applications, such
as multi-commodity flow problems, design problems, and bandwidth allocation problems.
They have also introduced a market-based approach to scheduling which has many similar-
ities with the assignment problem of Bertsekas described above, but relies on more realistic
assumptions on agent behavior.
The present authors have introduced a market-oriented approach to power load man-
agement (Ygge & Akkermans, 1996; Ygge, 1998; Ygge et al., 1999).
We note that the aim of market-oriented programming in computer science is funda-
In
mentally different from the aim of economic theory. This is visualized in Figure 2.
market-oriented programming, microeconomic theory is taken as given and serves as the
theory for implementation of computational agents. Whether or not the microeconomic
theory actually reflects human behavior is not the critical issue. The important question
is instead how microeconomic theory can be utilized for the implementation of successful
resource allocation mechanisms in computer systems. For example, even though no (or at
least very few) people believe that humans use explicit utility functions when making their
decisions, such functions do appear very useful to concisely represent human preferences for
use in computational agents.
It is obviously very interesting to investigate the use of computational markets for au-
tomating trades between different self-interested parties, where information is private and
is revealed only if there is an expected gain from doing so. However, the use of markets has
also been proposed for standard resource allocation where the true utility/costs for all nodes
that consume and produce resource is assumed to be available (though possibly uncertain
and/or distributed in the system). The main arguments found in the literature for applying
market to these types of problems are:
• The numerous similarities between economic systems and distributed computer sys-
tems suggest that models and methods previously developed within the field of math-
ematical economics can serve as blueprints for engineering similar mechanisms in
distributed computer systems (Kurose & Simha, 1989).
• Auction algorithms are highly intuitive and easy to understand; they can be explained
in terms of economic competition concepts, which are couched on everyday experi-
ence (Bertsekas, 1992).
5. An agent that acts competitively treats prices as exogenous, that is, the impact on the prices due to its
own behavior is negligible (Varian, 1996, p. 516). This is a very reasonable assumption if the market is
of at least moderate size and/or if there is uncertainty about the behavior of the other agents (Sandholm
& Ygge, 1997).
305
Ygge & Akkermans
Micro-economic theory
Study
Economist
Generate
Study
Computer
scientist
Generate
Real World
Human agents on
human markets
Computational agents on
computational markets
Figure 2: A simplified view on the relation between economics and computer science with respect
to microeconomic theory. Economists study humans and generate theory that is used
for the explanation of human economic behavior. Computer scientists doing market-
oriented programming use this theory as a basis for building working computational market
systems.
• Market approaches enable a natural decomposition, both from a software engineering
perspective as well as from a computational perspective (Schreiber et al., 1999; Ygge,
1998, Chapter 15).
• Market approaches are very flexible in that they allow for ongoing addition and dele-
tion of agents. No global changes are required—merely the demand/supply relation
is altered (Ygge, 1998, Chapter 15).
• Markets are informationally efficient in terms of information dimensionality (Jordan,
1982), and the abstractions used are the most natural ones for the user (Ygge, 1998,
Chapter 15).
• The introduction of trading resources for some sort of money enables evaluation of
local performance and valuation of resources, so that it becomes apparent which re-
sources are the most valuable and which agents are using the most of these (Ygge,
1998, Chapter 15).
The above arguments are mainly conceptual and related to software/system design and
engineering issues, and must prove their value from acceptance by software and system
designers. But there are also different and in some respects stronger claims. For exam-
ple, Huberman and Clearwater state (Huberman & Clearwater, 1995) for the application
of building control that: ”While in principle an omniscient central controller with access
to all the environmental and thermal parameters of a building (i.e. a perfect model) could
306
Decentralized Market Control
optimally control it, in practice such knowledge is seldom available to the system. Instead,
partial information about local changes in the variables (such as instantaneous office occu-
pancy, external temperature, and computer use) is the only reliable source that can be used
for controlling the building.” As an alternative to such an omniscient controller Huberman
and Clearwater propose a market-based multi-agent approach to this problem. This raises
a very interesting question: Are there applications in which the information structure is
such that market-based approaches do better than traditional approaches? In this paper
we will carefully examine this issue for a building climate control problem. We will inves-
tigate what information different alternatives (traditional and new market-based) require,
and what the performance of these different approaches are. We will use exactly the same
problem formulation as Huberman and Clearwater in order to reproduce their results and
evaluate other new approaches with their original formulation. This problem formulation
is given in the next section.
3. Problem Definition
The task is to allocate a resource (cold air) in an office building, given the setpoint temper-
atures of the respective offices. As a measure of the success of the allocation, the standard
deviation of the deviation from the setpoint is used (Huberman & Clearwater, 1995), i.e.
StdDev(Ti − T setp) = vuut
1
N
[(Tio − T setp
o
N
Xo=1
) − (hTii − hT setpi)]2,
(1)
o
where h·i denotes the average value of a variable, Tio is the actual temperature of an office,
and T setp
is the setpoint temperature. The index i denotes a time interval under observation
and the index o denotes the office under observation. This naming convention is used
throughout the article. (In addition the index k will also be used to denote time periods.)
It may be debated whether or not this is the best measure, but we stick to it in this
article in order to evaluate the approach taken by Huberman and Clearwater using their
own measure.
4. The Office Environment
The case study we consider for the comparison of decentralized markets versus central
control solutions is the building climate control of a large office environment.
In this section, we present a mathematical-physical model of the office environment.
We first give a conceptual summary so that it is possible to understand the basic ideas of
the model without studying the equations. The offices are attached to a pipe in which the
resource (cold air) is transported as in Figure 3. The characteristics of this system are similar
to the characteristics of a district heating system, but with offices instead of households.
We assume that there are 100 offices in total, and that they are equally distributed towards
East, South, West, and North.
The thermodynamics of the office environment is actually quite simple. Every office is
seen as a storage place for heat, but heat may dissipate to its environment. In the model,
the thermodynamic behavior of an office is equivalent to a basic electrical RC-circuit. Here,
307
Ygge & Akkermans
Noon sun
Morning sun
Afternoon sun
Air out
Air in
Figure 3: Offices and air transportation.
voltage is analogous to temperature, and electrical current is analogous to heat flow. C and
R then respectively denote heat capacitance and thermal resistance.
A good general reference on thermodynamic models as the one we use here is the book
by Incropera & Witt (1990). The heat equations are continuous in time, but are discretized
according to standard procedures from control engineering, cf. (Ogata, 1990). The ontol-
ogy and reusability aspects involved in thermodynamics model construction are discussed
extensively by Borst, Akkermans, & Top (1997).
4.1 Thermodynamic Properties
The resource treated is cooling power. Each office can make use only of a fraction, η, of the
available resource at that office, P avail
, so that
io
P cons
io ≤ η · P avail
io
,
(2)
io
where P cons
is the consumed power. The available resource at one office is equal to the
available resource at the previous office minus the consumed resource at the previous office.
Throughout this article we assume an η of 0.5.
We treat everything in discrete time. The time interval we use in the calculations is
one minute. For all offices the temperature, Tio, is obtained by integrating a differential
equation in discretized form:
i
ko
)/Co,
(3)
Tio = T0,o +
(P heat
ko − P cons
Xk=1
where P heat
described by
ko
is the heating power and Co is the thermal capacitance. The heating power is
P heat
io = (T virt
io − Tio)/Ro,
(4)
308
Decentralized Market Control
where Ro is the thermal resistance and T virt
more detail below.
io
is a virtual outdoor temperature, described in
From Eqs. (3) and (4) we see that there is a feedback loop between the office temperature
and the heating power. Solving for the temperature we obtain
Tio =
1
1 + 1
RoCo
Ti−1,o +
T virt
io
Ro
io
− P cons
Co
, i > 0.
This is the equation for the dynamics of the system that can be directly computed. At the
right-hand side we have known quantities, where Co and Ro are externally given building
parameters, P cons
is the output of the utilized controller (as will be described in detail later
in the article for various different controllers), and T virt
is obtained from the weather model
below.
io
io
(5)
(6)
(7)
4.2 Weather Model
All external weather influences on the office environment are modeled by a virtual tem-
perature, representing the outdoor temperature, sun radiation, etc. We assume that there
is sunshine every day and that the outdoor temperature, T outd, varies from 22 to 35◦C
according to
T outd
i
= 22 + 13 · e−((i·s−4) mod 24−12)2/20,
where s is the length of each time interval expressed in hours, so here s = 1/60.
The virtual temperature, T virt
io
, is described by
T virt
io = T outd
i
+ T sun
o + T f luct
io
,
where T f luct is a random disturbance, thought to represent small fluctuations caused by for
example the wind. T f luct is Gaussian distributed with zero mean and a standard deviation
equal to unity. T sun is the sun radiation component. For the offices located at the East
side T sun is described by
T sun,East
i
= 8 · e−((i·s+4) mod 24−12)2/5,
and correspondingly for the South and the West offices
and
T sun,South
i
= 15 · e−(i·s mod 24−12)2/5,
T sun,W est
i
= 8 · e−((i·s−4) mod 24−12)2/5.
The various temperatures are plotted in Figure 4.
4.3 Office Temperatures without Control
(8)
(9)
(10)
In Figure 5, the temperature for a South-oriented office is plotted with different thermal
resistances, Ro, and thermal capacitances, Co. For simplicity we assume all Ro to be equal
and all Co to be equal. From this figure we observe two things: first, the higher RoCo
309
Ygge & Akkermans
C
e
r
u
t
a
r
p
e
m
e
T
35
30
25
20
15
10
5
0
C
e
r
u
t
a
r
e
p
m
e
T
15
10
5
0
-5
0 3 6 9
2
1
5
1
8
1
1
2
4
2
Time of day, h
C
e
r
u
t
a
r
e
p
m
e
T
50
40
30
20
10
0
0 3 6 9
2
1
5
1
8
1
1
2
4
2
Time of day, h
0 3 6 9
2
1
5
1
8
1
1
2
4
2
Time of day, h
Figure 4: The plot at the left shows the outdoor temperature, T outd
. The middle plot shows the sun
radiation components, T sun, (with peaks at time 8, 12, and 16 hours for offices located
at the East, South, and West sides, respectively). Finally, the outdoor temperature plus
the sun radiation components are plotted at the right.
i
C
e
r
u
t
a
r
e
p
e
m
e
T
45
40
35
30
25
20
15
R=0 or C=0
R= 10, C= 10,
R=10 and C= 20 or R=20 and
C=10
R=20 and C=20
0 2 4 6 8
0
1
2
1
4
1
6
1
8
1
0
2
2
2
Time of day, h
Figure 5: The indoor temperature for an uncontrolled office is plotted for different values of the
thermal resistance and the heat capacitance. Small values of the thermal resistance and
capacitance give higher peaks, while higher values give smoother curves.
the bigger the lag in temperature changes, and second, the higher RoCo the smaller the
fluctuations in temperature. For the simulation experiments in this article we took Ro = 10
and Co = 10. An Ro or a Co equal to zero implies that Tio = T virt
, as can be seen by
letting Ro or Co approach zero in Eq. (5). Clearly, without control the office temperatures
strongly fluctuate and reach unacceptably high values in all cases.
io
310
Decentralized Market Control
5. Control-A: Conventional Independent Controllers
5.1 Integral Control for the Offices
The application of regulating office temperature has a long tradition in control theory. The
most widely known controllers are different variants of the PID controller. The letters PID
denote that the control signal is proportional (P) to the error (that is, to the difference
between the setpoint and the actual value); proportional to the integral (I) of the error; or
proportional to the derivative (D) of the error. Here, we use a variant of an integrating
controller6 of the form
Fio = Fi−1,o + β(Tio − T setp
o
),
(11)
where F is the output signal from the controller, and β is a so-called gain parameter (that
can be set externally in the design of the controller). For the simulations it is assumed
that Fio is limited to a value between zero and three. This is in order to model that the
valves can be closed but that cooling resources are not delivered from one room to another
(the lower bound), and that there is a maximum to the amount of resources that can be
obtained by opening the valve fully (the upper bound). The control signal Fio is sent to the
actuator and the actual P cons
is obtained from
io
P cons
io = ( Fio,
η · P avail
io
Fio ≤ η · P avail
, Fio > η · P avail
io
io
.
(12)
Plots of the office temperatures with different gains are shown in Figure 6. The gain of
the controller is not critical for this application. Too high a gain will result in the controller
overreacting when the temperature exceeds the setpoint, after which it will be under the
setpoint for quite some time. This leads to a larger error than if smaller adjustments are
made. Also, the amplitude of the control signal then gets unnecessarily high, but the system
does not get dangerously unstable. We note that the maximum deviation here is ±0.06◦C.
Thus, controllers using any of the three gains perform very well. In the further calculations
of this article a gain equal to 10 has been adopted.
5.2 The Implications of Limited Resources
So far, we have assumed that the total amount of available resources is unlimited. Now,
we suppose that there is a maximum value for the cooling power that is inserted into the
system. In such a situation, offices that are situated close to the air input will obtain a
sufficient amount of cool air, but those near the end will suffer if totally uncoordinated
controllers are used. Thus, the smaller the total amount of available resources, the larger
the standard deviation will be. This is visualized in Figure 7. As a reasonable figure we
have chosen an upper limit for the total resource amount of 140.
We conclude, as shown by the example, that independent integrating controllers perform
very well when the amount of cooling resources is unlimited. On the other hand, when there
6. The main reason for choosing an integrating controller is that we want to have a setting that is as close
as possible to the setting described by Huberman and Clearwater (1995). Other controllers for this
application may well be considered, but as long as the performance is as good as shown in Figure 6, this
is not at all crucial for the central argument of this article.
311
Ygge & Akkermans
20,06
20,04
20,02
20
19,98
19,96
19,94
1
Gain = 100
Gain = 10
Gain = 1
11
21
Minutes in an observed interval
C
,
e
r
u
t
a
r
e
p
m
e
T
Figure 6: The indoor temperature for an office, utilizing an integral controller, is plotted for different
controller gains. The setpoint temperature is 20◦C.
i
n
o
i
t
a
v
e
d
d
r
a
d
n
a
t
S
6
5
4
3
2
1
0
0 1 2 3 4 5 6 7 8 9
0
1
4
1
5
1
6
1
7
1
8
1
9
1
0
2
1
2
2
2
3
2
4
2
1
1
2
1
3
1
Time of day, h
Figure 7: The standard deviation (in ◦C) , as defined in Eq. (1) for each interval, i, is plotted
for different amounts of available cold air resources (130, 140, 150, and 160) with 100
offices. The lower the amount of available resources, the higher the standard deviation.
312
Decentralized Market Control
is a shortage of available resources, the standard deviation increases dramatically, yielding
poor performance.
6. Market-A: The Approach by Huberman and Clearwater
A multi-agent systems solution to the problem of building control has been presented by
Huberman and Clearwater (1994, 1995). The approach taken is to model the resource
allocation problem of the building environment as a computational market where agents
buy and sell cooling power resources. The non-separability in terms of agents is ignored.7
The basic idea is that every office is represented by an agent that is responsible for
making good use of its resources, and to this end trades resources with other agents. The
agents send bids to an auctioneer, which calculates a clearing price, and makes sure that
no agent has to buy for a price higher than its bid nor has to sell for a price lower than its
bid.
In this section we give the market protocol proposed by Huberman and Clearwater, and
we reproduce their results. In order to make the paper self-contained, the interested reader
can find the original equations underlying the Huberman-Clearwater market protocol in
Appendix A.
6.1 Market protocol
A bid is constructed as the following tuple:
bid = [sellio, vio, Bio],
(13)
where sell is a boolean variable indicating whether the current bid is a sell bid (true) or
buy bid (f alse), v is the volume traded for, and B is the price that the agent demands (sell
bid) or is prepared to pay (buy bid).
Each of the variables in Eq. (13) is a function of other variables according to
sellio = sellio(Tio, T setp
vio = vio(Ti, Tsetp, α), and
Bio = Bio(Tio, T setp
o
o
, hTii, hT setp
o
i),
(14)
, hTii, hT setp
o
i, mio),
1
, T setp
, . . . , T setp
where Ti = [Ti1, Ti2, . . . , Ti100], Tsetp = [T setp
100 ], α is a strength parameter of
the auction, and mio is called a money parameter. The trade volume is directly proportional
to α and, hence, doubling α doubles the traded volume in an auction. Thus, α is a free
parameter that can be externally set to tune the trade volumes to proper levels. The
money parameter does not correspond to any real currency; it is merely a control variable,
varying between 100 and 200, and it does not have any direct connection to, for example,
the value of the cooling resource. The money cannot be saved between auction rounds
2
7. A resource allocation problem is separable if the total utility of the system of the system can be expressed
as the sum of the utilities of each node (producer/consumer), and the only constraints on how much
resource that can be assigned to each node is only restricted by that their sum must not exceed the total
available resource (Ibaraki & Katoh, 1988). Hence, the problem treated in this paper is not separable as
there are other constraints on how the resource can be distributed. For example, if we assign sufficiently
much to the penultimate agent, the ultimate will have a significant amount of resource available.
313
Ygge & Akkermans
in the Huberman-Clearwater protocol, another indication that it simply functions as an
adjustment parameter in this protocol.
An auction consists of the following three phases:
1. All
agents
Bio(Tio, T setp
o
, hTii, hT setp
o
send
their
bids,
[sellio(Tio, T setp
o
i, mio)], to the auctioneer.
, hTii, hT setp
o
i,
vio(Ti, Tsetp, α),
2. The auctioneer then computes a market clearing price by searching for the following
minimum:
min
pi
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)
Xosell=true,Bio≤pi
vio −
Xosell=f alse,Bio≥pi
.
(15)
vio(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)
This yields a price such that supply matches demand as closely as possible.
3. Finally, the resources are allocated as dictated by the above bids and the obtained
market price, according to the rule: all sellers that are offering vio for a price, Bio,
that is lower than or equal to the market price will sell vio; and correspondingly for
buyers.8
As an example of the computation of the equilibrium price, assume that the auctioneer
has received the following bids [true, 2, 4], [true, 1, 3], [true, 2, 2], [f alse, 1, 3], [f alse, 2, 2],
[f alse, 2, 1]. Then the market clearing price is 3, leading to acceptance of bid 2, 3, 4, and 5.
(Bid 1 is too high a sell price and bid 6 is too low a buy price.)
6.2 Simulations
Figure 8 shows two plots of a simulation for the period between 3 p.m. and 7 p.m.9 The
initial temperatures for all offices were set to 20◦C. The upper plot is the standard de-
viation when independent integrating controllers are used, and the lower one shows the
agent-based control scheme as defined above. We found that for the adjustment parameter
α (see Eq. (23)) a value of 64 led to the smallest overall standard deviation. The key ob-
servation from the figure is that the agent approach offers at least one order of magnitude
of improvement.
Compared to independent conventional controllers this is indeed a major advance, and
this is the central claim made by Huberman and Clearwater. The market approach given
above leads to a reduced control error and thus to increased comfort compared to stan-
dard controllers. Our simulations thus reproduce and validate the results of Huberman &
Clearwater (1994, 1995).
8. Since the bids are given using discrete volumes, supply will seldomly match demand exactly at the
clearing price. Normally, there will be a very small excess demand or supply. If there is an excess supply,
all buyers that are willing to pay at most the clearing price will buy, but not all sellers that are willing
to accept at least the clearing price can sell. In this situation, a seller is selected randomly from the
valid candidates does deliver only a fraction of its bid. A corresponding procedure is used when there is
a small excess demand.
9. All solutions discussed in this article have been implemented in and simulated by the authors using
C++ on a PC running Windows95. Furthermore, all simulations have been independently recreated and
verified by Bengt Johannesson from various relevant papers (Ygge & Akkermans, 1997; Huberman &
Clearwater, 1995; Clearwater & Huberman, 1994)), as part of a master’s thesis project, using Python
on a PC running Linux.
314
Decentralized Market Control
4,5
4
3,5
3
2,5
2
1,5
1
0,5
0
5
1
Control-A
Market-A
6
1
7
1
Time of day, h
8
1
9
1
i
n
o
i
t
a
v
e
d
d
r
a
d
n
a
t
S
Figure 8: Standard deviation for independent controllers (top) and agent-based control (bottom).
However, this cannot be the last word in a successful system study. A first question to
be raised is whether we can find out in more detail what the actual reason is for the success
of the above market-based approach. A second relevant question is whether there are
alternative, market-based and/or central control-based, solutions to the building control
problem that are even better. The answer to both questions is yes, as we set out to
demonstrate now.
7. Market-A′: A Suite of Variations
In this section we present a suite of variations on the scheme presented in Section 6. The
main aim is to understand which of many factors involved are actually responsible for the
good performance of the Huberman-Clearwater market approach.
7.1 Deleting the Money Dependency
A first simplification is to remove the adjustment parameter called money. This is done by
setting mio to a very high value, C, regardless of the resource allocation.10 The simplified
market protocol then is:
1. All
agents
Bio(Tio, T setp
o
send
their
bids,
[sellio(Tio, T setp
o
, hTii, hT setp
o
i,
vio(Ti, Tsetp, α),
, hTii, hT setp
o
i, mio = C)], to the auctioneer.
2. The auctioneer computes a market price from
3. Allocate the resource as dictated by the bids and the market clearing price.
min
pi
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)
Xosell=true,Bio≤pi
315
vio −
Xosell=f alse,Bio≥pi
.
(16)
vio(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)
Ygge & Akkermans
0,25
0,2
0,15
0,1
0,05
0
5
1
Market-A
Market-A',
No Money
6
1
7
1
Time of day, h
8
1
9
1
i
n
o
i
t
a
v
e
d
d
r
a
d
n
a
t
S
Figure 9: Standard deviation for the original Huberman-Clearwater scheme and a scheme without
any money dependencies.
Plots of the standard deviation with the original scheme as well as with a scheme where
all money dependencies have been removed are shown in Figure 9. For the scheme without
money, setting the α parameter to 66 turned out to be optimal. The scheme without
money dependencies performs as well as the original scheme. The reason for this is that
Bio’s dependency on mio is completely negligible.11 Hence, the money parameter does not
play any significant role in the success of the Huberman-Clearwater market scheme.
7.2 Deleting the Temperature Dependency
Another factor of interest is the impact of the temperature on the bid prices. We remove
this dependency by setting the bid price to 10 for all selling agents and to 100 for all buying
agents. That is, we now use the following market scheme:
1. All agents send their bids,
[sellio(Tio, T setp
o
, hTii, hT setp
o
to the auctioneer.
i), vio(Ti, Tsetp, α), Bio =( 10,
100, sell = f alse
sell = true
],
2. Now, all prices larger than 10 and smaller than 100 are equally good candidates. If
there is a mismatch between supply and demand, say, supply exceeds demand, the
agents that will sell are picked randomly among the valid candidates, and the resources
are allocated accordingly.
10. More precisely, this is done by setting U (0, m) in Eq. (28) (Appendix A) to a constant value, 2000. This
corresponds to letting mio approach infinity.
11. In actual fact, U (0, m) in Eq. (28) of Appendix A will vary only between 1999.86 and 2000 for all possible
mio.
316
Decentralized Market Control
0,25
0,2
0,15
0,1
0,05
0
15
Market-A',
No Money
Market A',
No Money,
No Temp
16
17
Time of day, h
18
19
i
n
o
i
t
a
v
e
d
d
r
a
d
n
a
t
S
Figure 10: Standard deviation for the scheme with the money dependencies removed, compared to
a scheme with both the money and temperature dependencies removed.
In Figure 10 the standard deviation is plotted for the scheme without money, mentioned
above, and for a scheme where the dependency on the temperature has been removed as
well. Here, setting the fit parameter α to 65 turned out to be optimal. We see that also
here the performance is as good as that of the original scheme. Note that the temperature
is still used to determine both vio and the boolean variable sell. But the conclusion is that
the temperature dependency does not affect the quality of the market-based solution to the
building control problem.
7.3 Deleting the Auction
Next, we let the agents assign their bids to themselves without any auction whatsoever. This
means that the sum total of the controller outputs, Fio, might sometimes exceed the total
resource amount and sometimes be below that. The physical model is of course still obeyed,
so that the total resource amount actually used, the total consumed cooling power P cons
,
will never exceed the totally available resource amount, as described by Eq. (2). Hence, the
resource updates are described by:
io
F ′
(17)
io = Fi−1,o( +vio(Ti, Tsetp, α), sell = f alse
Fio =
−vio(Ti, Tsetp, α), sell = true
F ′
io < 0
0,
io, 0 ≤ F ′
F ′
io > 3
3,
io ≤ 3
F ′
The result of this simulation is shown in Figure 11. Here, an α of 17 turned out to be
optimal. The surprising conclusion is that the multi-agent scheme without performing any
auction is roughly ten times better than the auction-based Market-A scheme.12
12. From a practical point of view this is a pathological solution, revealing a loophole in the problem
definition of Clearwater and Huberman, cf. Section 3. The revealed loophole of the problem definition is
317
Ygge & Akkermans
0,25
0,2
0,15
0,1
0,05
0
15
Market-A
Market-A', No
Money, No
Temp, No
Auction
16
17
Time of day, h
18
19
i
n
o
i
t
a
v
e
d
d
r
a
d
n
a
t
S
Figure 11: Standard deviation with the auction mechanisms completely removed, compared to the
original Huberman-Clearwater Market-A scheme.
7.4 Discussion
At first glance, it might seem counterintuitive that performance actually improves signifi-
cantly when the core mechanisms of a market are removed. First we showed that introducing
the market improves performance considerably compared to conventional independent con-
trol, and then we showed that market mechanisms are superfluous. What, then, is the big
difference between the uncoordinated integrating controller, the Control-A scheme, and
the multi-agent scheme without any auction that we ended up with? The simple answer, in
our view, is the access to global data that each agent has, in terms of the average temper-
ature and the average setpoint temperature (as follows from Eq. (14)), in the Market-A
and Market-A′ schemes. Knowing average quantities means that an agent has some infor-
mation about the other agents c.q. offices. This information is not available in the case of
independent conventional controllers. The exploitation of this non-local information makes
the big difference.
that it does not take absolute temperature into account, but only the differences between temperature
(i.e. minimizing standard deviation while potentially sacrificing average temperature). In the proper
approaches introduced in the remainder of this article we do not allow ourselves to take advantage
of this loophole, but minimize differences while using all available resource. That is, all approaches
that are introduced from now on solve a problem which is strictly harder than the problem defined
in Section3. What happens in the Market-A scheme without an auction can be seen from observing the
definition of tio in Eq. (22). It is based on a quotient between the setpoint temperature and the actual
temperature. Then the request volume, Eq. (24), is proportional to this quotient. This always results in
a significant excess supply. (Hint, think of a small example with two offices, both with setpoint 20, and
with temperatures 19 and 21. Now, 20
21 , and hence the selling volume will
exceed the buying volume.) This implies that at each trade occasion, many offices are prevented from
selling (because of poor definitions of the volumes). The offices that are prevented to sell will deviate
significantly, and hence this results in a high value of the measure. When the auction is deleted, all
agents that are below the average distance to the setpoints are now able to get rid of the resource and
hence the differences in temperature will decrease.
19 is farther away from 1 than 20
318
Decentralized Market Control
Thus, the upshot of our factor analysis of the success of the Huberman-Clearwater
market scheme of Section 6 is that the agents have to share crucial office and control
information first, before the auction takes place. This is why one can remove the auction
without any deterioration of the results: a major function of an auction is to share necessary
information through the bidding procedure, but in the Huberman-Clearwater protocol the
needed information has already been shared. A more appropriate description of this market
scheme would therefore be to say that it consists of not three (as described in Section 6),
but four phases, in which the first phase is that all agents send their current temperatures
Tio as well as their setpoint temperatures T setp
to all other agents.
o
In sum, we have now answered the first question raised at the end of the previous section:
What is the reason for the success of the Huberman-Clearwater market scheme, compared
to conventional independent controllers? The single most important factor is contained in
the first step above: before the market procedure is carried out, the agents communicate key
information about their current situation to all other agents. If that is done neither money
nor auction mechanisms are needed. For conventional independent controllers, with which
Huberman and Clearwater compare their own approach, this globally shared information is
not available, however. This explains why these two solutions perform so very differently.
Now, we turn to the second question raised in the previous section: are there alternative
and perhaps better solutions? The above analysis suggests that we look into two different
directions. If one wants to persuade control engineers of the value of agent-based approaches,
it will be more convincing to compare the Huberman-Clearwater scheme not to strictly local
controllers, but to controllers that have access to the same global information as the agents
have. Secondly, this dependency on global information by the agents is a highly undesirable
feature that clearly runs counter to a decentralized computational market philosophy. So,
one should investigate whether it is possible to design a market protocol that exploits only
strictly local information in the agents’ bid construction. These issues we investigate in
the following two sections, first treating central control and subsequently devising a strictly
local market protocol. It will be seen that both yield significantly improved performance.
8. Control-B: A Standard Controller Using Global Data
Having concluded that the access to global data is crucial for performance, it is of course
of interest to analyze what the performance would be of an integrating controller, like the
one introduced in Eq. (11), but now incorporating global data.
We would like the controller to take into account not only its own deviation from its set-
point, but to consider also the deviations of the other offices from their setpoints. Therefore,
the controller in Eq. (11) is extended to
Fio = Fi−1,o + β[(Tio − T setp
o
) − (hTii − hT setpi)],
(18)
where β is set to 10 as previously. P cons
io
is, as before, obtained from Eq. (12).
The plot from the simulation with this controller, compared to the Market-A sim-
ulation, and to the Market-A′ simulation where the auction was removed, is shown in
Figure 12.
We see that the standard deviation is approximately the same for the Control-B and
the Market-A′ schemes. Thus, the Control-B scheme also performs roughly ten times
319
Ygge & Akkermans
0,25
0,2
0,15
0,1
0,05
0
5
1
Market-A
Market-A',
No Money,
No Temp,
No Auction
Control-B
6
1
7
1
Time of day, h
8
1
9
1
i
n
o
i
t
a
v
e
d
d
r
a
d
n
a
t
S
Figure 12: Standard deviation with an integrating controller that utilizes global data compared to
the Huberman-Clearwater Market-A scheme, and to the Market-A′ scheme with the
auction removed.
better than Market-A. An important difference, though, is that Control-B employs a
well-known integrating controller for which there are well-understood methods and theories
for e.g. stability analysis.13 In contrast, the Market-A scheme is not easily analyzable
from a formal theory perspective, since it does not rely on such well established concepts.
While Control-B is relatively clear, see Eq. (18), it is much harder to conceptually grasp
the principles behind Market-A, as it consists of a large number of complicated and not
easily justified equations (see Eqs. (21)–(33) in Appendix A). The main conclusion from
the present section is that, if we enable conventional controllers to act upon the same global
information as the Huberman-Clearwater agents do, the central control approach performs
best and is easiest to understand.
9. Market-B: A Market with Local Data Only
Thus, the computational market Market-A is outperformed by the global control scheme
Control-B. Therefore, an interesting follow-up question is whether a simple and well
performing computational market approach can be devised that does not depend on hav-
ing available global information, in contrast to both these schemes.
In this section we
show that this is indeed the case, such that a decentralized market performs comparably
to fully centralized conventional control. The approach derived in this section relies on
more general theory for the relations between optimization problems and markets–(Ygge,
1998, Chapter 3) and (Bikhchandani & Mamer, 1997) – applicable to this and many other
applications.
13. This holds under the assumption that the characteristic time scale of the variations of the average
temperature is much larger than that of the fluctuation of the temperature. This is a very reasonable
assumption in the present case.
320
Decentralized Market Control
We use a market-oriented programming approach based on an equilibrium market. The
basic protocol for this is (cf. Figure 1):
1. Each agent submits a net demand function zio(p) to the auctioneer, describing what
change in allocation is desired by agent o at price p.
2. The auctioneer computes an equilibrium, by calculating a price pi such that
Po zio(pi) = 0 (or, strictly speaking, Po zio(pi) ≤ ǫ, where ǫ is a small (positive)
numerical tolerance).
3. Each agent receives its demanded resource zio(pi) as calculated at the obtained market
equilibrium price.
The computation of zio(p) and the process of computing the equilibrium are described
further below. Note that this is a truly distributed approach, as it does not rely on any
global data, or communication of temperatures between the agents before the market com-
munication starts.
9.1 The Relation Between Markets and Conventional Controllers utilizing
Global Data
The performance measure for the system is given by Eq. (1). The best system is therefore
one that minimizes this equation. Hence, the most straightforward move one can think of
to come to a market model, is to take this measure as representing the utility function for
the overall system. So, the utility functions for the individual agents are ideally related to
[(Tio − T setp
) − (hTii − hT setpi)]2. 14 However, this is still a formulation containing global
information.
o
Thus, we want to obtain a purely local reformulation, by getting rid of the terms with
hT i containing the global information. We might replace them, though, by terms relating
to the changes in the local resource. In doing so, we take inspiration from the standard
controller equations Eqs. (11) and (18), indicating that we get good results (for uncon-
strained resources) with the update equation Fio = Fi−1,o + φio, when φio has the form
φio = β(Tio − T setp
). The intended interpretation of φio is to represent the output that the
local controller would have delivered if it acted independently with unconstrained resources.
In the market setting each agent updates its control signal Fio through Fio = Fi−1,o + ∆Fio,
where ∆Fio is determined by the outcome of the market. Since the resource is only re-
o=1 ∆Fio = 0. Accordingly, as a step in the
design of a Market-B scheme, based on local data only, we employ the following definition.
distributed among the agents, we have that PN
o
Definition 9.1 Let the utility function for the individual office agents be defined by
u(∆Fio, m) = −α2
o(∆Fio − φio)2 + m,
(19)
where αo is a strength parameter for each office representing its physical properties such as
Ro and Co. (The proper choice of αo is discussed in Theorem 9.3 later on.)
Furthermore, let all agents be price-takers.
14. Since utilities are expressions of preference orderings, they are invariant under monotonic transforma-
tions.
321
Ygge & Akkermans
Due to the simple quadratic form of the utility function in Eq. (19), the net demand,
zio(p), is easily computed for price-taking agents by analytical means. Note that the money
m here are fundamentally different from the money of Market-A, c.f. Section 6. Here the
money represents a commodity and the agent needs to decide how much money to trade
for the commodity cold air. As described above, the money in Section 6 is just a control
variable without an intuitive interpretation.
Theorem 9.1 With the utility functions and behavior given by Definition 9.1, there exists
a unique equilibrium price piPo zio(pi) = 0, and the allocation obtained by the equilibrium
market is Pareto optimal.
Proof. See (Mas-Colell, Whinston, & Green, 1995; Varian, 1992; Takayama, 1985). ✷
In this setting, there is a wide variety of different algorithms that are guaranteed to
converge to the clearing price piPo zio(pi) = 0, in the second step of our equilibrium
market protocol given above. Examples of such algorithms are price tatonnement, Wal-
ras (Cheng & Wellman, 1998), and various Newton-Raphson type methods. A detailed
discussion of communication and computation efficiency aspects of such algorithms is given
by Ygge (1998, Chapter 4).
Theorem 9.2 Any Pareto optimal outcome in a market in which the agents hold the utility
function of Eq. (19) is equivalent to an integrating controller that exploits global infor-
mation as described by the following resource update equation :
∆Fio = φio −
1
α2
o · h1/α2i
hφii,
(20)
given that no agent is at its boundary. Here, h1/α2i and hφii are the average 1/α2
respectively.
o, and φi0
At a Pareto-optimal allocation where no agent is at its bounds, all
Proof.
∂u(∆Fio)/∂∆Fio are equal.
(Assume ∂u(∆Fip)/∂∆Fip < ∂u(∆Fiq)/∂∆Fiq, then at any
price ∂u(∆Fip)/∂∆Fip < p < ∂u(∆Fiq)/∂∆Fiq, there exists a (sufficiently small) amount
of ∆Fi, say ǫ, such that up(∆Fip − ǫ, mip + pǫ) > up(∆Fip, mip) and uq(∆Fiq + ǫ, miq −
pǫ) > uq(∆Fiq, miq). Correspondingly for ∂u(∆Fip)/∂∆Fip > ∂u(∆Fiq)/∂∆Fiq. Hence,
∂u(∆Fip)/∂∆Fip = ∂u(∆Fiq)/∂∆Fiq).
Thus, it will hold for every office that ∆Fio − φio =
α2
N
α2
o
(∆FiN − φiN ). Summing the
. Adding ∆FiN −φiN to
o=1 ∆Fio =
1
α2
o
o=1
o=1 φio = α2
o=1 ∆Fio−PN −1
equations yieldsPN −1
both sides and dividing both sides by N together with the resource constraint (PN
0) yields
N ·h1/α2i hφii. For reasons of symmetry, this equation holds for all offices. ✷
α2
N (∆FiN −φiN )PN −1
N (∆FiN − φiN )PN
o=1 φio
N
−PN
1
α2
o
o=1
N
which is equivalent to ∆FiN = φiN −
1
= α2
Corollary 9.1 For the special case where all αo are equal, and φio = β(Tio−T setp
becomes exactly the Control-B scheme captured by Eq. (18).
o
), Eq. (20)
322
Decentralized Market Control
Consequently,
it also follows that simulation results for an equilibrium Market-B
scheme, based on the utility function of Eq. (19) with the provisions given in the above corol-
lary, are identical to those of the centralized Control-B scheme, cf. Figure 12. This fully
decentralized market scheme thus performs better than the original Huberman-Clearwater
market protocol.
In sum, we see that (under suitable conditions which are fulfilled here) local data plus
market communication is equivalent to conventional central control utilizing global data.
Even though our proof was based on the assumption that the agents are never at their
boundary values, it will be a close approximation in many practical applications. It should
also be noted that managing the boundaries is not required for a successful implementation.
As seen above, omitting the management of boundaries in the current application leads to
Control-B, which was shown to have a very high performance.
9.2 Finding an Optimal Utility Function
In this section we show how an optimal utility function is constructed in the constrained
case, from an optimal controller for the unconstrained case.15 Earlier we noted that it is
debatable whether or not the measure in Eq. (1) is a good one. One argument against it is
that it allows for pathological solutions, as it does not take the average indoor temperature
into consideration.
If we for example increase the indoor temperature in every office by
10◦C, all of them could be unbearably hot, while the measure might be minimized. A
reasonable thing to do here, to prevent these kind of solutions, is to treat the average
temperature as given (the result of using all available resources). If we do so, the following
theorem shows how an optimal utility function is constructed in the constrained case, from
an optimal controller for the unconstrained case.
Theorem 9.3 If Tio is a linear function of ∆Fio,16 and if φio minimizes Eq. (1) in the
unconstrained case, then in a market where the utility functions are described by Eq. (19),
with αo = ∂Tio
, any associated Pareto optimal allocation minimizes Eq. (1) in the con-
∂∆Fio
strained case, if the resource can be independently allocated among the agents (i.e., when
o=1 ∆Fio = 0), and the
the only constraint on ∆Fio is the upper and lower bound, and PN
Proof. Minimizing Eq. (1) boils down to minimizing f (Ti1, Ti2, . . . , Tin) = PN
average temperature is considered as given.
o
T setp
φio minimizes Eq. (1), it holds that
is considered as given, we have that
for ∆Fio = φio. This gives that Tio(φio) = T setp
o=1[(Tio −
)−(hTii−hT setpi)]2, since this is just a monotonic transformation. Due to the fact that
= 0 for ∆Fio = φio. Since the average temperature
) − (hTii − hT setpi)] · ∂Tio
∂φio
o + (hTii − hT setpi). Thus, f can be
o=1[Tio(∆Fio)−Tio(φio)]2. Since Tio is a linear function of ∆Fio, we have that
Tio(∆Fio) = Tio(φio) + ∂Tio
(∆Fio −
∂∆Fio
φio)2. As the reallocation of m does not effect the total (summed) utility, minimizing
· (∆Fio − φio), and hence f becomes PN
rewritten as PN
∂∆Fio(cid:17)2
o=1(cid:16) ∂Tio
= 2[(Tio(φio) − T setp
o
∂f
∂∆Fio
∂f
∂∆Fio
15. The resource is constrained when the action of any agent is limited by Pio, see Eq. (12) and Figure 7. It
is unconstrained when such a limitation is not present, cf. Figure 6.
16. From the thermal model discussed in Section 4 (especially Eqs. (5) and (12)) we note that this is indeed
the case for a reasonably wide range.
323
Ygge & Akkermans
o=1 uo.
io + uo(∆F a
o=1 uo, with αo = ∂Tio
∂∆Fio
f is equivalent to minimizing −PN
Eq. (19) maximizes PN
maximize PN
. Furthermore, we have that
any Pareto optimal allocation in a market where the utility functions are described by
io that does not
io =
ma
is always a Pareto
improvement. Hence, a non-maximized sum implies a non-Pareto optimal allocation, and
a Pareto optimal allocation implies a maximized sum.) Then (Ygge, 1998, Theorem 3.1,
p. 44) implies that any Pareto-optimal allocation in a market where the utility functions
are described by Eq. (19) with αo = ∂Tio
∂∆Fio
(Suppose that there is an allocation ∆F a
io and letting mb
io does. Then reallocating ∆Fio to ∆F b
io,ma
io)
o=1 uo, but that ∆F b
io, mb
io, ma
io) − uo(∆F b
io) +PN
, minimizes f . ✷
o=1 uo(∆F b
io,mb
o=1 uo(∆F a
io)−PN
N
Thus, we have constructed a fully distributed market design that yields an optimal
outcome. Particularly note that Theorem 9.3 was not based on the assumption that an
integral controller was used, rather it said that if φio (the desired resource by the controller)
is optimal, then the proposed utility function generates a globally optimal outcome.
9.3 Discussion
Previously, we saw that the independent controller Control-B that incorporates global
data, viz. the average temperatures, performs very well. In the present section we positively
answered the question if one can construct a market, Market-B, that is based on local
data only and that performs as well.
For this result we have employed a market approach based on general equilibrium theory.
This is of course not the only available mechanism for resource allocation in multi-agent
systems. It seems interesting to try out other mechanisms, like the contract net protocol
(Davis & Smith, 1983), and see if they perform better. However, Theorem 9.3 tells us
that, if we treat the problem of building control as being separable in terms of agents (as
also done by Huberman and Clearwater), there is no better scheme.17 For example, if
we assigned all the resources to an auctioneer, that on its turn would iteratively assign the
total resource in small portions to bidders bidding with their true marginal utility, we would
end up with something close to the competitive equilibrium, but we cannot do better than
Market-B. Furthermore, this would be a computationally extremely inefficient way to
arrive at equilibrium compared to other available methods (Ygge, 1998, Chapter 4). That
is, we can use different mechanisms for achieving the competitive equilibrium, but we can
never hope to find a mechanism that would do better than the Market-B scheme.
17. We note that, as mentioned earlier, the problem is actually not fully separable in terms of agents and
therefore better solutions may exist if this is taken into account. Another observation is that in this article
we have investigated only the case of using the currently available resource as the interesting commodity,
in accordance with the work of Huberman and Clearwater, and we found an optimal mechanism for that.
We note however that extending the negotiations to future resources as well could potentially increase
performance. But this is a different problem setting with different demands on available local and/or
global information items, such as predictions. We have given a solution to this problem in recent work,
see Ygge et al. (1999).
324
Decentralized Market Control
10. Conclusions
We believe that both the approach and the results, as presented in this article, pose an
interesting challenge to the software agent community. Multi-agent systems offer a new
way of looking at information systems development, with a potentially large future im-
pact. However, new approaches must prove their value in comparison and competition with
existing, more established ones. The agent paradigm is no exception.
We have therefore deliberately played the role of the devil’s advocate in this article. In
our view, a key question not yet satisfactorily answered by the software agent community
is:
in what respect and to what extent are multi-agent solutions better than their more
conventional alternatives? This article has shown that arguing in favor of the multi-agent
systems approach does require careful analysis beyond the disciplinary boundaries of com-
puter science. Empirical and comparative studies in the multi-agent literature of the kind
carried out in the present article are all too rare as yet. But as we have shown in techni-
cal detail, established paradigms such as conventional central control cannot be that easily
dismissed. A similar argument holds, by the way, regarding mathematical optimization
techniques in distributed resource allocation problems, cf. our previous discussions (Ygge
& Akkermans, 1996; Ygge, 1998). Many of them are, in a distributed guise, better than
many newly proposed market protocols.
Abstract considerations alone, concerning the general nature of agenthood, autonomy,
rationality, or cooperation, are not sufficient to prove the value of the agent paradigm. Such
theoretical reflections are worthwhile, but do not diminish the need for thorough analysis of
(agent and market) failures and successes in real-life applications. Therefore, we have taken
a different approach, aimed at obtaining experimental data points on the basis of which
convincing software agent claims can be established.
The data point considered in this article is climate control within a large building con-
sisting of many offices. Given a measure, Eq. (1), a local controller approach, Eq. (11),
current temperatures, and the setpoint temperature, we have investigated the problem on
how to properly distribute the resource among the offices. This is a rather prototypical
application relating to the general problem of optimal resource allocation in a highly dis-
tributed environment. This class of problems has already received much attention in the
multi-agent area. Reportedly, this type of application is very suitable for market-oriented
programming (Huberman & Clearwater, 1995). On the other hand, we have devised some
better conventional control engineering solutions, as well as alternative and better market
designs.
The main conclusions of our investigation are:
• The market approach by Huberman & Clearwater (1994, 1995) indeed outperforms
a standard control solution based on local, independent controllers. So, the market-
based multi-agent approach indeed yields a working solution to this type of problem.
Our analysis has shown that the success of this market approach depends on the
agents communicating their local information to all other agents before the auction
starts.
• However, if conventional central control schemes are allowed to exploit the same global
information, they perform even better.
325
Ygge & Akkermans
• We have proposed an alternative market design based on general equilibrium theory
that uses local data only. It performs better than the Huberman-Clearwater market
and as well as a centralized control scheme having access to global information.
• Our general conclusion can be formulated as a quasi-equation: “local information
+ market communication = global control”. This holds under suitable conditions
(existence of market equilibrium, price-taking agents) and its validity has been specif-
ically shown here for the case of building climate control (compare particularly the
Control-B and the Market-B schemes we developed). However, as we intend to
show in forthcoming work, this is a much more generally valid result.
• The important difference is that in computational markets this global information is
an emergent property rather than a presupposed concept, as it is in central control.
In our analysis we have focused on the market approach. It is tempting to ask whether
things are different when a non-market multi-agent approach is followed, say, using the
contract net (Davis & Smith, 1983). As we argued, the answer in our opinion is a straight-
forward no. The goal in the considered class of problems is to find the optimal distributed
solution. Alternative agent approaches, market as well as non-market ones, only change the
multi-agent dynamics on the way to this goal. This might be done in a better or poorer way,
but it is not possible to change this goal itself. The goal state in any multi-agent approach
is, however formulated, equivalent to market equilibrium, the yardstick for having achieved
it is given by some quantitative performance measure as we discussed, and both are stable
across different agent approaches.
Thus, one of the main conclusions of this article is that one must be very careful when
promoting multi-agent approaches to resource allocation problems for which traditional
approaches are available.
In particular, one should be cautious using arguments related
to distribution of information (as was done by Huberman and Clearwater), or other com-
putational aspects. Still, we argue that there are conceptual advantages of market-based
approaches to this type of problems, as well as other advantages such as evaluation of local
performance (cf. Section 2). These advantages do not show off very clearly in the present
application setting – for example, it was assumed that all offices have the same thermal
characteristics and office agents on the market are not added and deleted continuously on
the fly – but they are clearly visible in other more general settings.
A final note is that in this article we have devised an optimal market design given the
problem formulation rather than devised an optimal approach to the general problem of
building control. This is in line with the objective of this paper to give a comparative study
of different possible approaches. That is, we have focused on a published and well-known
problem formulation in order to focus on the subject of markets for resource allocation
alone. As stated earlier in the article, several aspects can be improved, for example:
• The local controllers. I-controllers are seldom used, rather PI- or PID-controllers are
preferred. Furthermore, for these kind of computerized settings, modern digital con-
trollers, based on e.g. pole-placement methods are preferable (Astrom & Wittenmark,
1990).
326
Decentralized Market Control
• The measure. The average value is at least as important as the standard deviation.
(We have as a consequence excluded pathological solutions from our analysis by taking
the average temperature as given in Theorem 9.3).
• The incentives for office agents to reveal their true preferences in order to avoid spec-
ulation. Reasonably, personnel in the offices should have the opportunity to make
trade-offs between comfort and economical value. (It has been shown that generally
speaking it is very difficult to benefit from speculation if the number of agents on the
market is sufficiently large, and/or if uncertainty about the other agents’ behavior
exists (Sandholm & Ygge, 1997).)
• Taking several time periods into account. As each office serves as a storage for heat,
agents can for example gain by using relatively much resource during certain hours
when the total resource need is small.
That is, a more realistic approach to the building control problem is to use minimized
cost as the measure, give the users real incentives to reveal their energy preferences (by
letting them pay their actual energy costs so that attempted speculation will generally
cost money), and take future time periods into account. Elsewhere we have solved the
problem of dealing with simultaneous optimization over different time periods, by means of
a multi-commodity market (Ygge et al., 1999).
In such a more realistic and large-scale setting, the market-based approach is attractive
compared to its alternatives. The abstractions used (prices and demands) are natural and
easily understood by everyone, and they are uniform over all types of agents (even ones
that do not use the resource for controlling a temperature).
A major qualitative conclusion of this article is that “local data plus market communi-
cation yields global control”. This conclusion is based on the discussed application setting
of building control, as an instance of a distributed resource allocation problem. It suggests
that generally for this type of problem both central control engineering and multi-agent
market solutions can be devised that give comparable optimal control quality. A next step
is to prove this more generally in a rigorous mathematical fashion, delineating the precondi-
tions in more detail. Such a proof can be based upon the (continuous and matrix-algebraic)
dynamic systems theory available from control engineering, and especially upon results con-
cerning what is called optimal control. We believe that this indeed can be done in a formal
way, and as a conjecture we state the following general result. Multi-agent equilibrium mar-
kets yield optimal decentralized solutions to distributed resource allocation problems that
are of the same quality, in terms of a given overall systems performance index, as solutions
given by the optimal central (multi-input, multi-output) systems controller that has access
to all relevant local data. These local data involve the total system state and control vectors
(in building control these are the vectors formed from the difference between the actual and
setpoint temperatures for each office, and the cooling power for each office, respectively).
Preconditions for this to be true are: (i) agents act competitively; (ii) the equilibrium ex-
ists; (iii) the systems performance index can be written as a linear combination of local
contributions (implying diagonality of certain matrices; if not, agents are not independent).
These local contributions are directly related to the agents’ utility functions. The agent
approach will be more readily generalizable to large-scale systems and non-linear control
327
Ygge & Akkermans
solutions (linearity is the main case where control engineering can get analytical mathe-
matical expressions). This is indeed a strong and general statement about the relationship
(and even outcome equivalence) between decentralized markets and central control.
Acknowledgments
The present work was mainly carried out at the University of Karlskrona/Ronneby. We
thank Rune Gustavsson and Hans Ottosson for all their support. A special acknowledgment
goes to Olle Lindeberg whose very detailed comments on the draft papers led to significant
improvements in the simulations and whose ideas also helped us in the design of the market
in Section 9. We benefit significantly from several discussions with Michael Wellman. We
also thank Bengt Johannesson, who, as a part of his master’s thesis, went through all details
of this article and independently recreated and verified all the simulations. We thank Arne
Andersson, Eric Astor, and the SoC team for useful comments and discussions of draft
material. This work was partially sponsored by NUTEK and EnerSearch AB.
An earlier version of this paper was presented at the MAAMAW’97 workshop (Ygge &
Akkermans, 1997).
328
Decentralized Market Control
Appendix A. Original Formulation of the Huberman-Clearwater Market
All formulae in this section were directly taken from the papers by Huberman & Clearwa-
ter (1994, 1995).
Trade volumes First, the decision for an agent to buy or sell is based on
tio =
T setp
o
Tio
·
hTii
hT setpi ( tio > 1, seller
tio < 1,
buyer
Then, the total trade volume, V , is calculated from
Vi =
N
Xo=1
1 − tio ,
where N is the number of offices.
Every agent calculates its request volume, v, according to
vio = α
1 − tio
Vi
.
.
(21)
(22)
(23)
When an agent buys or sells its v the actual movement of a valve, called V AV , is
computed from
∆V AVio = f (f lowio, vio, V AVio),
after which the actual V AV position for each interval is updated according to
V AVi+1,o = V AVio + ∆V AVio.
(24)
(25)
The function f in Eq. (24) stems from the physics of the office control, but it is not
easy to derive in the general case and it is neither explicitly given in the original papers
(Clearwater & Huberman, 1994; Huberman & Clearwater, 1995). A reasonable and simple
choice is to assume a linear relationship (the cited papers suggest that they do so in practice
as well), replacing Eq. (24) and Eq. (25) by
Fi+1,o = Fio ± vio,
(26)
where plus or minus depend on whether it refers to an accepted buy or sell bid. Pcio is
obtained from Eq. (12). We have employed Eq. (26) in our simulations. The nature of this
assumption is not crucial to our central line of reasoning.
Bids The bids are based on a marginal utility 18 of the form described by19
U (tio/T setp
o
, mio) = [U (0, mio)](1−tio/T setp
o
) = [U (0, mio)]
(1− hTii
Tio hT setp i
)
,
(27)
18. This is called utility in the work of Huberman and Clearwater. We prefer to use the term marginal utility
instead, because it is directly related to price. This terminology conforms better to that of microeconomic
theory.
19. This notion of a utility function used by Clearwater and Huberman is very much based on the work of
Steiglitz & Honig (1992)
329
Ygge & Akkermans
with
and
U (0, mio) = u3 − (u3 − u1)e−γmio ,
γ = ln(cid:20) u3 − u1
u3 − u2(cid:21) ,
(28)
(29)
where u1 = 20, u2 = 200, and u3 = 2000, and m is the amount of money that an agent has,
given by
With the above relation between Fio and V AV , we rewrite Eq. (30) as
mio = 100(2 − V AVio).
mio = 100(2 −
F max
o
− Fio
F max
o
).
Observing Eqs. (28) and (29), we note that these equations can be simplified to
(30)
(31)
(32)
U (0, mio) = u3 − (u3 − u1)e−γmio = u3 − (u3 − u1)(eγ)−mio =
u3 − (u3 − u1)(cid:16) u3−u1
u3−u2(cid:17)−mio
.
The bids are calculated from multiplying the marginal utility with the previous price,
price, according to
Bi,o = Uio(tio/T setp
o
, mio) · pricei.
(33)
o
o
, mio) will be well above 20001− 2
, mio) is minimized for minimized Tio and maximized hTii
This is the equation given by Huberman and Clearwater. Straightforward application
of Eq. (33) turns out to produce major problems in simulations, however. Equation (27)
shows that U (tio/T setp
hT setpi . As we
can expect Tio to be well above 10◦C and hTii
hT setpi to be well below 2, and U (0, m) ≈ 2000,
we can be sure that U (tio/T setp
10 ≈ 437. Thus, the bidding
price will never be below 437. Then, Eq. (33) tells us that the market price will be at
least price0 · 437i. This leads to numerical overflow after a few iterations. We note however
that, since all agents multiply their bids with the previous price, this has no effect on the
reallocation itself:
it affects only the price level. Therefore, we omit multiplying by the
previous price in our simulations, so that the agents’ bid prices in Eq. (33) equal their
marginal utilities of Eq. (27). Huberman and Clearwater state that they burn all money
after each auction round in order to avoid inflation and overflow, indicating that they may
adopt a similar procedure. In any case, this procedure leads to exactly the same allocations
but avoids numerical overflow.
330
Decentralized Market Control
References
Akkermans, J. M., & Ygge, F. (1997). Smart software as customer assistant in large-scale
In Proceedings of Distribution Automation/Demand
distributed load management.
Side Management (DA/DSM) ’97. PenWell Conferences and Exhibitions.
Bertsekas, D. (1992). Auction algorithms for network flow problems: A tutorial introduc-
tion. Computational Optimization and Applications, pp. 7–66.
Bikhchandani, S., & Mamer, J. W. (1997). Competitive equilibrium in an exchange economy
with indivisibilities. Journal of Economic Theory, 74, 385–413.
Borst, W. N., Akkermans, J. M., & Top, J. L. (1997). Engineering ontologies. International
Journal of Human-Computer Studies, 46, 365–406. ISSN 1071-5819.
Bradshaw, J. M. (Ed.). (1997). Software Agents. AAAI Press/The MIT Press, Menlo Park,
CA.
Cheng, J., & Wellman, M. P. (1998). The walras algorithm—a convergent distributed
implementation of general equilibrium outcomes. Computational Economics, 12, 1–
24.
Clearwater, S., & Huberman, B. A. (1994). Thermal markets for controlling building envi-
ronments. Energy Engineering, 91 (3), 25–56.
Davis, R., & Smith, R. G. (1983). Negotiation as a metaphor for distributed problem
solving. Artificial Intelligence, 20 (1), 63–109.
Gagliano, R. A., Fraser, M. D., & Schaefer, M. E. (1995). Allocation of compting resources.
Communications of the ACM, 38, 88–103.
Hu, J., & Wellman, M. P. (1996). Self-fulfilling bias in multiagent learning. In Tokoro, M.
(Ed.), Proceedings of the Second International Conference on Multi-Agent Systems,
ICMAS’96, pp. 118–125. AAAI Press, Menlo Park, CA.
Huberman, B. A., & Clearwater, S. (1995). A multi-agent system for controlling building
environments. In Lesser, V. (Ed.), Proceedings of the First International Conference
on Multi-Agent Systems, ICMAS’95, pp. 171–176. AAAI Press / The MIT Press,
Menlo Park, CA.
Ibaraki, T., & Katoh, N. (1988). Resource Allocation Problems—Algorithmic Approaches.
The MIT Press, Cambridge, MA.
Incropera, F. P., & Witt, D. P. D. (1990). Fundamentals of Heat and Mass Transfer. Wiley
and Sons, New York. Third Edition, ISBN 0-471-51729-1.
Jennergren, P. (1973). A price schedules decomposition algorithm for linear programming
problems. Econometrica, 41 (5), 965–980.
Jordan, J. S. (1982). The competitive allocation process is informationally efficient uniquely.
Journal of Economic Theory, 28, 1–18.
331
Ygge & Akkermans
Kurose, J. F., & Simha, R. (1989). A microeconomic approach to optimal resource allocation
in distributed computer systems. IEEE Transactions on Computers, 38 (5), 705–717.
Mas-Colell, A., Whinston, M., & Green, J. R. (1995). Microeconomic Theory. Oxford
University Press.
Mullen, T., & Wellman, M. P. (1995). A simple computational market for network informa-
tion services. In Lesser, V. (Ed.), Proceedings of the First International Conference
on Multi-Agent Systems, ICMAS’95, pp. 283–289 San Francisco, CA.
Ogata, K. (1990). Modern Control Engineering. Prentice-Hall, Englewood Cliffs, NJ. Second
Edition, ISBN 0-13-589128-0.
Press, W., Teukolsky, S., Vetterling, W., & Flannery, B. (1994). Numerical Recipies in C.
Cambridge University Press. Second Edition.
Sandholm, T. W., & Ygge, F. (1997). On the gains and losses of speculation in equilibrium
markets. In Proceeding of the Fifteenth International Joint Conference on Artificial
Intelligence, IJCAI 97, pp. 632–638.
Schreiber, A. T., Akkermans, J. M., & al. (1999). Knowledge Engineering and Management.
The MIT Press, Cambridge, MA. In Press.
Steiglitz, K., & Honig, M. L. (1992). Chaotic behavior in an auction-based microeconomic
model. Unpublished Manuscript.
Sutherland, I. E. (1968). A futures market in computer time. Communications of the ACM,
11 (6), 449–451.
Takayama, A. (1985). Mathematical Economics. Cambridge University Press.
Varian, H. R. (1992). Microeconomic Analysis. New York: W. W. Norton. Third Edition.
Varian, H. R. (1996). Intermediate Microeconomics—A Modern Approach. W. W. Norton
and Company, New York. Fourth Edition.
Walsh, W. E., Wellman, M. P., Wurman, P. R., & MacKie-Mason, J. K. (1998). Some
economics of market-based distributed scheduling. In Proceedings of the Eighteenth
International Conference on Distributed Computing Systems, pp. 612–621.
Wellman, M. P. (1993). A market-oriented programming environment and its application to
distributed multicommodity flow problems. Journal of Artificial Intelligence Research,
pp. 1–23.
Wellman, M. P. (1996). Market-oriented programming: Some early lessons. In Clearwater,
S. (Ed.), Market-Based Control: A Paradigm for Distributed Resource Allocation,
chap. 4. World Scientific.
Wellman, M. P. (1995). A computational market model for distributed configuration design.
AI EDAM, 9, 125–133.
332
Decentralized Market Control
Wellman, M. P., & Hu, J. (1998). Conjectural equilibrium in multiagent learning. Machine
Learning, 33, 179–200.
Yamaki, H., Wellman, M. P., & Ishida, T. (1996). A market-based approach to allocating
QoS for multimedia applications.
In Tokoro, M. (Ed.), Proceedings of the Second
International Conference on Multi-Agent Systems, ICMAS’96, pp. 385–392. AAAI
Press, Menlo Park, CA.
Ygge, F. (1998). Market-Oriented Programming and its Application to Power Load Man-
ISBN
agement. Ph.D. thesis, Department of Computer Science, Lund University.
91-628-3055-4, CODEN LUNFD6/(NFCS-1012)/1-224/(1998).
Ygge, F., & Akkermans, J. M. (1996). Power load management as a computational market.
In Tokoro, M. (Ed.), Proceedings of the Second International Conference on Multi-
Agent Systems, ICMAS’96, pp. 393–400. AAAI Press, Menlo Park, CA.
Ygge, F., & Akkermans, J. M. (1997). Making a case for multi-agent systems. In Boman,
M., & de Velde, W. V. (Eds.), Proceedings of MAAMAW ’97, pp. 156–176. Springer
Verlag, Berlin. ISBN-3-540-63077-5.
Ygge, F., & Akkermans, J. M. (1998). On resource-oriented multi-commodity market com-
putations. In Demazeau, Y. (Ed.), Proceedings of the Third International Conference
on Multi-Agent Systems ICMAS’98, pp. 365–371. IEEE Computer Society.
Ygge, F., Akkermans, J. M., Andersson, A., Krejic, M., & Boertjes, E. (1999). The Home-
Bots system and field tests: A multi-commodity market for predictive load manage-
ment. In Proceedings of the Fourth International Conference and Exhibition on The
Practical Application of Intelligent Agents and Multi-Agents (PAAM99), pp. 363–382.
Astrom, K.-J., & Wittenmark, B. (1990). Computer-Controlled Systems - Theory and
Design. Prentice Hall, Englewood Cliffs, NJ. ISBN 0-13-168600-3.
333
|
1203.2315 | 1 | 1203 | 2012-03-11T06:23:44 | Modeling multistage decision processes with Reflexive Game Theory | [
"cs.MA",
"cs.AI"
] | This paper introduces application of Reflexive Game Theory to the matter of multistage decision making processes. The idea behind is that each decision making session has certain parameters like "when the session is taking place", "who are the group members to make decision", "how group members influence on each other", etc. This study illustrates the consecutive or sequential decision making process, which consist of two stages. During the stage 1 decisions about the parameters of the ultimate decision making are made. Then stage 2 is implementation of Ultimate decision making itself. Since during stage 1 there can be multiple decision sessions. In such a case it takes more than two sessions to make ultimate (final) decision. Therefore the overall process of ultimate decision making becomes multistage decision making process consisting of consecutive decision making sessions. | cs.MA | cs |
Modeling multistage decision processes with
Reflexive Game Theory
Sergey Tarasenko
[email protected]
Abstract. This paper introduces application of Reflexive Game Theory
to the matter of multistage decision making processes. The idea behind is
that each decision making session has certain parameters like "when the
session is taking place", "who are the group members to make decision",
"how group members influence on each other", etc. This study illustrates
the consecutive or sequential decision making process, which consist of
two stages. During the stage 1 decisions about the parameters of the
ultimate decision making are made. Then stage 2 is implementation of
Ultimate decision making itself. Since during stage 1 there can be mul-
tiple decision sessions. In such a case it takes more than two sessions to
make ultimate (final) decision. Therefore the overall process of ultimate
decision making becomes multistage decision making process consisting
of consecutive decision making sessions.
Key words: Reflexive Game Theory (RGT), multi-stage decision mak-
ing
1 Introduction
The Reflexive Game Theory (RGT) [1, 2] allows to predict choices of subjects
in the group. To do so, the information about a group structure and mutual
influences between subjects is needed. Formulation and development of RGT
was possible due to fundamental psychological research in the field of reflexion,
which had been conducted by Vladimir Lefebvre [3].
The group structure means the set of pair-wise relationships between sub-
jects in the group. These relationships can be either of alliance or conflict type.
The mutual influences are formulated in terms of elements of Boolean algebra,
which is built upon the set of universal actions. The elements of Boolean algebra
represent all possible choices. The mutual influences are presented in the form
of Influence matrix.
In general, RGT inference can be presented as a sequence of the following
steps [1, 2]:
1) formalize choices in terms of elements of Boolean algebra of alternatives;
2) presentation of a group in the form of a fully connected relationship graph,
where solid-line and dashed-line ribs (edges) represent alliance and conflict rela-
tionships, respectively;
2
Sergey Tarasenko
3) if relationship graph is decomposable, then it is represented in the form of
polynomial: alliance and conflict are denoted by conjunction (·) and disjunction
(+) operations;
4) diagonal form transformation (build diagonal form on the basis of the
polynomial and fold this diagonal form);
5) deduct the decision equations;
6) input influence values into the decision equations for each subject.
Let us call the process of decision making in a group to be a session. Therefore,
in RGT models a single session.
2 Model of two-stage decision making: formation of points
of view
This study is dedicated to the matter of setting mutual influences in a group
by means of reflexive control [4]. The influences, which subjects make on each
other, could be considered as a result of a decision making session previous to
ultimate decision making (final session). We will call the influences, obtained
as a result of a previous session(s), a set-up influences. The set-up influences
are intermediate result of the overall decision making process. The term set-up
influences is related to the influences, which are used during the final session,
only.
Consequently, the overall decision making process could be segregated into
two stages. Let the result of such discussion (decision making) be a particular
decision regarding the matter under consideration. We assume the actual decision
making regarding the matter (final session - Stage 2) is preceded by preliminary
session (Stage 1). Stage 1 is about a decision making regarding the influences
(points of view), which each subject will support during the final session. We call
such overall decision making process to be a two-stage decision making process.
The general schema of a two-stage decision making is presented in Fig.1.
Fig. 1. The general schema of the two-stage decision making.
To illustrate such model we consider a simple example.
Example 1. Let director of some company has a meeting with his advisors.
The goal of this meeting is to make decision about marketing policy for the next
half a year. The background analysis and predictions of experts suggest three
distinct strategies: aggressive (action α), moderate (action β) and soft (action
γ) strategies. The points of view of director and his advisors are formulated
Modeling Mixed Groups of Humans and Robots
3
in terms of Boolean algebra of alternatives. Term point of view implies that a
subject makes the same influences on the others. Director supports moderate
strategy ({α}), the 1st and the 2nd advisors are supporting aggressive strategy
({β}), and the 3rd advisor defends the idea of soft strategy ({γ}). The matrix
of initial influences is presented in Table 1.
Table 1. Matrix of initial points of view (influences) used in Example 1
a
c
b
d
a a {α} {α} {α}
b {α} b {α} {α}
c {β} {β} c {β}
c {γ} {γ} {γ} d
Let director is in a conflict with all his advisors, but his advisors are in
alliance with each other. Variable c represents the Director, variables a, b and d
correspond to the 1st , the 2nd and the 3rd advisor, respectively.
The relationship graph is presented in Fig.2. Polynomial abd + c corresponds
to this graph.
Fig. 2. Relationship graph for a director-advisors group.
After diagonal form transformation the polynomial does not change:
[a][b][d]
[abd]
+[c]
1 + [c]
[abc + d]
= [abd + c]
= abd + c.
Then we obtain four decision equations and their solutions (decision intervals)
(Table 2).
ence matrix:
Next we calculate the decision intervals by using information from the influ-
subject a: (bd + c) ⊇ a ⊇ c ⇒ ({α}{γ} + {β}) ⊇ a ⊇ {β} ⇒ a = {β};
subject b: (ad + c) ⊇ b ⊇ c ⇒ ({α}{γ} + {β}) ⊇ b ⊇ {β} ⇒ b = {β};
subject c: 1 ⊇ c ⊇ abd⇒ 1 ⊇ c ⊇ {α}{α}{γ} ⇒ 1 ⊇ c ⊇ 0 ⇒ c = c;
subject d: (ab + c) ⊇ d ⊇ c ⇒ ({α}c + {β}) ⊇ b ⊇ {β} ⇒ {α, β} ⊇ d ⊇ {β}.
4
Sergey Tarasenko
Table 2. Decision intervals for Example 1
Subject Decision Equations Decision Intervals
a = (bd + c)a + ca (bd + c) ⊇ a ⊇ c
(ad + c) ⊇ b ⊇ c
b = (ad + c)b + cb
b
a
c
d
c = c + abdc
1 ⊇ c ⊇ abd
d = (ab + c)d + cd (ab + c) ⊇ d ⊇ c
Therefore, after the preliminary sessions, the point of view of the subjects
have changed. Director has obtained a freedom of choice, since he can choose
any alternative: 1 ⊇ c ⊇ 0 ⇒ c = c. At the same time, the 1st and the 2nd
advisors support moderate strategy (a = b = {β}). Finally, the 3rd advisor now
can choose between points of view {α, β} (aggressive of moderate strategy) and
{β} (moderate strategy): {α, β} ⊇ d ⊇ {β}.
Thus, the point of view of the 1st and the 2nd advisors is strictly determined,
while the point of view of 3rd advisor is probabilistic.
Next we calculate choice of each subject during the final session, considering
the influences resulting from the preliminary session. The matrix of set-up influ-
ences is presented in Table 3. The intervals in the matrix imply that a subject
can choose either of alternatives from the given interval as a point of view.
Table 3. The matrix of set-up influences for Example 1.
a
a
{β}
a
b
b
{β}
b
c
{β}
{β}
1 ⊇ c ⊇ 0
1 ⊇ c ⊇ 0
c
c {α, β} ⊇ d ⊇ {β} {α, β} ⊇ d ⊇ {β} {α, β} ⊇ d ⊇ {β}
c
d
{β}
{β}
1 ⊇ c ⊇ 0
d
Subject a:
d = {α, β}: (bd + c) ⊇ a ⊇ c ⇒({β}{α, β} + c) ⊇ a ⊇ c ⇒({β} + c) ⊇ a ⊇ c;
d = {β}: (bd + c) ⊇ a ⊇ c ⇒({β}{β} + c) ⊇ a ⊇ c ⇒({β} + c) ⊇ a ⊇ c;
Subject b:
d = {α, β}: (ad + c) ⊇ b ⊇ c ⇒({β}{α, β} + c) ⊇ b ⊇ c ⇒({β} + c) ⊇ b ⊇ c;
d = {β}: (ad + c) ⊇ b ⊇ c ⇒({β}{β} + c) ⊇ b ⊇ c ⇒({β} + c) ⊇ b ⊇ c;
Subject c:
d = {α, β}: 1 ⊇ c ⊇ abd ⇒1 ⊇ c ⊇ {β}{β}{α, β} ⇒1 ⊇ c ⊇ {β};
d = {β}: 1 ⊇ c ⊇ abd ⇒1 ⊇ c ⊇ {β}{β}{β} ⇒1 ⊇ c ⊇ {β};
Subject d:
Modeling Mixed Groups of Humans and Robots
5
(ab + c) ⊇ d ⊇ c ⇒({β}{β} + c) ⊇ d ⊇ c ⇒({β} + c) ⊇ d ⊇ c.
Now we compare the results of a single session with the ones of the two-stage
decision making.
The single session case has been considered above. If the final decision has to
be made after the single session, then the 3rd advisor would be able to choose
alternative {α, β} and realize action α. This option implies that each advisor is
responsible for a particular part of the entire company and can take management
decisions on his own.
Next we consider the decision made after the two-stage decision making.
In such a case, regardless of influence of the 3rd advisor (subject d), choice of
advisors a and b is defined by the interval {β} + c ⊇ x ⊇ c, where x is either a
or b variable. Thus, if director is inactive (c = 0), subjects a and b can choose
either moderate strategy ({β}) or make no decision (0 = {}). The same is true
for subject d.
If the director makes influence {β}, then all advisors will choose alternative
{β}.
The director himself can choose from the interval 1 ⊇ c ⊇ {β} after the final
session. This means that the director can choose any alternative, containing
action β. Thus, occasionally the director can realize his initial point of view as
moderate strategy.
This example illustrates how using the two-stage decision making it is possi-
ble to make ones opponents choose the ones point of view. Meanwhile a person
interested in such reflexive control can still sustain the initial point of view. The
obtained results are applicable in both cases when 1) only the director makes a
decision; or 2) the decision are made individually by each subject.
3 A Model of a multi-stage decision making: set-up
parameters of the final session
Now we consider the two-stage model in more details. In the considered example,
during the preliminary session only the decision regarding the influences has been
under consideration. In general case, however, before the final session has begun,
there can be made decisions regarding any parameters of the final session. Such
parameters include but are not limit to:
1) group structure (number of subjects and relationships between subjects
in a group);
2) points of view;
3) decision to start a final session (a time when the final session should start),
etc.
We call the decision regarding a single parameter to be consecutive decision,
and decisions regarding distinct parameters to be parallel decisions.
Therefore, during the first stage (before the final session) it is possible to
make multiple decisions regarding various parameters of the final session. This
decisions could be both parallel and consecutive ones. We call such model of
decision making to be a multi-stage process of decision making (Fig.3).
6
Sergey Tarasenko
Fig. 3. Multi-stage decision making model.
4 Modeling multi-stage decision making processes with
RGT
Next we consider realization of multi-stage decision making with RGT.
Example 2: Change a group structure. Considering the subject from Example
1, we analyze the case when director wants to exclude the 3rd advisor from the
group, which will make the final decision.
In such a case, there is a single action 1 to exclude subject d from the
group. Then Boolean algebra of alternatives includes only two elements: 1 and
0. Furthermore, it is enough that director just raise a question to exclude subject
d from a group and make influence 1 on each subject: if = 1, then a = 1, b = 1
and d = 1 (Table 2). Thus the decision to exclude subject d from the group
would be made automatically (Fig.4).
Fig. 4. Exclusion of a subject d from a group.
Example 3: Realization of a multi-stage decision making. Let the first deci-
sion discussed during the first stage is a decision regarding influences (points
of view). The next decision was about exclusion of a subject d from the group.
Thus, during the first step the formation (setting-up) of points of view has been
implemented, then the structure of a group was changed. Therefore the group,
which should make a final decision is described by polynomial ab+c. The decision
equations and their solutions are presented in Table 4.
The overall multi-stage decision making process is presented in Fig.5.
We consider that the point of view cannot change without preliminary session
regarding the parameter. Therefore we assume that the points of view do not
change after the change of group structure.
Modeling Mixed Groups of Humans and Robots
7
Table 4. Decision intervals for Example 3
Subject Decision Equations Decision Intervals
(b + c) ⊇ a ⊇ c
(a + c) ⊇ b ⊇ c
a = (b + c)a + ca
b = (a + c)b + cb
a
b
c
c = c + abc
1 ⊇ c ⊇ ab
Fig. 5. Illustration of multi-stage decision making process. The influences are indicated
by the arrow-ends of the ribs. The actual influence is presented near the arrow-end.
Therefore, during the final session the subjects would make the set-up influ-
ences derived from the preliminary session: subjects a and b will make influences
{β} and subject c will have a choice from the interval 1 ⊇ c ⊇ {β}.
Such process is introduced in Fig. 5. During the 1st stage (first step), the
points of view of subjects have been formed. On the 2nd stage (second step), the
decision to exclude subject d from a group has been made. Finally, during the
3rd stage the final decision regarding the marketing strategy has been made.
5 Discussion and conclusion
This study introduces the two-stage and multi-stage decision making processed.
During the last stage the final decision is made. During the earlier stages the
decisions regarding the parameters of a final session are considered.
This study shows how before the final decision making the intermediate de-
cision regarding parameters of the final session can be made and how to overall
8
Sergey Tarasenko
process of decision making could be represented as a sequence of decision making
sessions.
This approach enables complex decision making, which involves numerous
parameters.
The important feature of the multi-stage decision making is that during the
preliminary sessions subjects can convince other subjects to accept their own
point of view. Therefore other subjects can be convince to make decisions bene-
ficial for a particular one. Such approach also allows to distribute the responsi-
bility between all the members of the group, who make the final decision.
The results presented in this study allow to extend the scope of applications of
RGT to modeling of multi-stage decision making processes. Therefore it becomes
possible to perform scenario analysis of various variants of future trends and
apply reflexive control to the management of projects.
References
1. Lefebvre, V.A.: Lectures on Reflexive Game Theory. Cogito-Centre, Moscow (2009)
(in Russian)
2. Lefebvre, V.A.: Lectures on Reflexive Game Theory. Leaf & Oaks, Los Angeles
(2010)
3. Lefebvre, V.A.: Algebra of Conscience. D. Reidel, Holland (1982)
4. Lefebvre, V.A.: The basic ideas of reflexive game's logic. Problems of systems and
structures research. 73 -- 79 (1965) (in Russian)
|
1712.05987 | 1 | 1712 | 2017-12-16T16:44:26 | Priority Rules on ATN (PRT) Intersections | [
"cs.MA"
] | In Autonomous Transit Networks some basic elements influence the throughput: network structure, maximum velocity, number of vehicles etc. Other parameters like station structure, dynamic routing or vehicle behavior on intersections play minor role. Yet in highly congested nets, when vehicles interfere in the traffic, some subtle decisions may influence overall system ridership. We tested the impact of intersection priority rules on passenger waiting time, which measures the throughput. The dependence occurred its relevance in a crowded network. | cs.MA | cs | Waldemar Grabski, Wiktor B. Daszczuk
I
PRIORITY RULES ON ATN (PRT) INTERSECTIONS
In Autonomous Transit Networks some basic elements influence the throughput: network structure, maximum velocity,
number of vehicles etc. Other parameters like station structure, dynamic routing or vehicle behavior on intersections play
minor role. Yet in highly congested nets, when vehicles interfere in the traffic, some subtle decisions may influence overall
system ridership. We tested the impact of intersection priority rules on passenger waiting time, which measures the
throughput. The dependence occurred its relevance in a crowded network.
INTRODUCTION
Autonomous Transit Network ATN (Personal Rapid Transit
PRT) is a communication means using autonomous guided vehicles
traveling on a track separated from urban traffic (typically elevated)
[1]. It consists of nodes: stations, capacitors and intersections,
interconnected by track segments. We assume two types of
segments: road with lower maximum velocity and highway with
higher maximum velocity. Moreover, highway segments to dot
connect stations nor capacitors, only intersections are allowed. The
intersections are of two types: "fork" and "join" ("x" type intersections
are not allowed).
A research concentrates on effectiveness of Personal Rapid
Transit [2][3][4][5][6]. If a network works in equilibrium conditions [7],
the main method of performance improvement is empty vehicle
management [5][7][8] (as little may be done with occupied ones: the
only option is ride-sharing [9][10][11]). Yet, if the number of vehicles
causes congestion, some subtle decision may improve the traffic
one-way road
station
E
F
L
suburbs
roundabout
G
B
city
A
C
D
K
Fig. 1. „City" benchmark
two-way highway
H
capacitor
I
J
3000m
1
I
conditions. We have
the
throughput of ATN network: dynamic routing and intersection priority
rules.
two concepts of
tested
increasing
The question arises: how to identify congestion conditions? Of
course, inserting many vehicles to the network causes they
interference and the throughput drops down. But for research we
need a single parameter that measures congestion degree, and a
single value of this parameter (a threshold) which identifies the
network is overcrowded. We decided to use average squared delay
for this purpose.
The research on dynamic routing is based on insertion of
"Sunday driver" vehicles, which drive slowly and block other
vehicles. As the only point of decision in ATN vehicle run is "fork"
type intersection, we run the route planning algorithm in front of
every such intersection. The Dijkstra planning algorithm [12] is
equipped with segment cost function dependent on segment length,
segment maximum velocity and segment occupation, everyone with
coefficient parameter, The experiments gave inconclusive results,
as output parameter (average passenger waiting time) is not
monotonic as a function of the segment occupation coefficient.
The second investigation concerns priority rules on "join"
intersections. If two vehicles approach an intersection, and if driving
with their actual velocities would cause their bringing too close to
each other (closer than assumed separation), one of the vehicles
must slow down or even stop. Of course, other vehicles that
possibly follow this slowing down vehicle must slow down as well.
This causes a congestion effect.
to
the both segments). The
We assume the fair rule on intersection of one type segments,
if they are both road segments of both highway segments. The
is achieved using slider principle (priority assigned
fairness
alternately
research concerns
intersection of different type segments: road and highway. We
tested the variants of choosing a vehicle which is not forced to slow
down in described situation: on highway, on road or slider principle.
In the research we use the Feniks simulation tool [13],
elaborated in Eco-Mobility project [14]. In the project, several
simulation-based research programs were carried [7][8][15][16]. The
Feniks simulator is still under development, a next step concerns
dual-mode operation, in which the vehicle may leave PRT network
and continue their trips in ordinary urban traffic.
In Section 1 the benchmark network is presented. Section 2
describes the manner of identification of network saturation point.
Simulation results are covered in Section 3. The research is
concluded in Section 4.
1. THE BENCHMARK
The "City" benchmark [17] is presented in Fig. 1. Double-line
segments are two-way highways (two tracks in opposite directions).
Single-line segments are ordinary roads. Circles with letters are
stations while dashed squares are capacitors. Bold circles are
roundabouts allowing to change direction to any of four outcoming
track segments.
It is a model of a town, with central city and suburbs. A highway
surrounds the city and connects suburbs with each other and with
the city. There are 12 stations and 4 capacitors. Total track length is
about 33km.
The traffic parameters are:
– 5 berths in every station,
– Highway max velocity 15m/s,
– Road max velocity 10m/s,
– Max acceleration and deceleration 2m/s2,
– Boarding and alighting: triangle distribution with parameters
(10, 20, 30) seconds,
– separation 10m,
– Origin-destination matrix a matrix filled with equal values
(every trip target chosen randomly).
2.
IDENTIFICATION OF NETWORK SATURATION POINT
Saturation point is a situation in which the vehicles interfere
„disturbing" each other. The disturbing reveals in enlarging of a trip
time.
In papers concerning ATN simulation, some measures of traffic
quality are used. For example, maximum passenger waiting time or
average waiting time is used [18]. Yet, we prefer a single scalar
which unambiguously measures
the network saturation. We
elaborated a synthetic parameter: Average Squared Delay (ASD [7])
(1)
(square root of sum of squared relative delays of full trips (ft)
divided by number of full trips). The delay ft (in [%]) is counted as
actual trip time divided by nominal trip time (with maximal allowed
velocity). When the vehicles do not interfere, in typical PRT network
ASD is about 15%. A designer may designate a threshold of
average squared delay over which the network is assumed to be
congested. The results of ASD for a number of vehicles between 48
and 320 is shown in Table 1 and illustrated in Fig. 2. In our
example, having the basis of ASD=15%, we may define that the
network is congested if ASD rises 25%. This is reached at the
number of vehicles about 240.
Tab. 1. Identification of network saturation point
Number of vehicles
Average Squared Delay [%]
48
72
96
120
144
192
240
280
320
192
15.29
15.71
16.35
16.87
18.08
20.28
24.77
28.76
35.97
20.28
2
I
Fig. 2. Identification of network saturation point
3. SIMULATION RESULTS
For the „City" model (Fig. 1) 240 vehicles were used in
simulations (saturation point). The three input intensities were used:
320, 480 and 960 groups/h (one trip is organized for every group of
passengers of cardinality 1-4 persons). For every input intensity, all
three priority rules were tested:
– Priority for highway,
– Slider principle (alternating priority for highway and for
road),
– Priority for road.
The results show influence of priority rules on the throughput of
PRT network. The influence rises in the input intensity. It is
reasonable because higher input results in more trips to be
organized and the actual congestion of the network is higher.
Because the differences are not clearly visible for input races 320
and 480 groups/h, they are enlarged in Fig. 4. The plots clearly
show, that taking the "priority for road" improves the throughput by
9-30% compared with "priority for highway". Furthermore, "slider"
improves by 11-14% compared with "priority for highway". This
unintuitive behavior (we expected that the highway should be
favored) may be explained such that vehicle queues waiting to
cross the intersection are easier to create on the roads because
there is a lower maximum speed than on the highway.
4. CONCLUSIONS
In the design of a PRT network, many decisions should be
made: on a location of stations and capacitors, on the segments
category (road/highway), which may differ in curvature and slope,
stations size and number of vehicles. In the paper we showed that
in the network working in congestion conditions, even subtle traffic
rules may tune the throughput of ATN system. We tested priority
rules, but station capacity, dynamic routing (with other algorithm
than ours) and similar mechanisms may also improve the quality.
BIBLIOGRAPHY
1.
2.
J. Irving, Fundamentals of Personal Rapid Transit, Lexington
Books, Lexington, MA, 1978. ISBN: 0-669-02520-8
I. Andréasson, Reallocation of Empty PRT vehicles en route,
in: TRB Annu. Meet. Washingt. DC, 12-16 January 2003,
Transportation Research Board, 2003: pp. 1–13.
3. P. Zheng, D. Jeffery, M. McDonald, Development and
evaluation of traffic management strategies for personal rapid
transit, in: Ind. Simul. Conf. 2009, Loughborough, UK, 1-3 June
2009, 2009: pp. 191–195.
4. M. van der Heijden, M. Ebben, N. Gademann, A. van Harten,
Scheduling vehicles in automated transportation systems, OR
Spectr. 24 (2002) 31–58. doi:10.1007/s291-002-8199-x.
J.D. Lees-Miller, R.E. Wilson, Proactive empty vehicle
redistribution for personal rapid transit and taxis, Transp. Plan.
Technol.
17–30.
doi:10.1080/03081060.2012.635414.
(2012)
5.
35
6. O. Chebbi, J. Chaouachi, Reducing the wasted transportation
capacity of Personal Rapid Transit systems: An integrated
model and multi-objective optimization approach, Transp. Res.
Part E Logist. Transp. Rev. 89
(2016) 236–258.
doi:10.1016/j.tre.2015.08.008.
7. W.B. Daszczuk, J. Mieścicki, W. Grabski, Distributed algorithm
for empty vehicles management in personal rapid transit (PRT)
3
I
network,
Adv.
doi:10.1002/atr.1365.
J.
Transp.
50
(2016)
608–629.
8. W.B. Daszczuk, W. Choromański, J. Mieścicki, W. Grabski,
Empty vehicles management as a method
for reducing
passenger waiting time in Personal Rapid Transit networks,
IET Intell. Transp. Syst. 9 (2015) 231–239. doi:10.1049/iet-
its.2013.0084.
I. Andréasson, Ride-Sharing on PRT, in: 10th Autom. People
Movers, Orlando, Florida, 1-4 May 2005, American Society of
Civil
1–7.
doi:10.1061/40766(174)22.
Engineers,
Reston,
2005:
VA,
pp.
9.
10. I.J. Andreasson, Extending PRT Capabilities, in: 12th Autom.
People Movers, Atlanta, GA, 31 May - 3 June 2009, American
Society of Civil Engineers, Reston, VA, 2009: pp. 343–349.
doi:10.1061/41038(343)29.
11. R. Johnson, Doubling Personal Rapid Transit Capacity with
Ridesharing, Transp. Res. Rec. J. Transp. Res. Board. 1930
(2005) 107–112. doi:10.3141/1930-13.
12. E.W. Dijkstra, A note on two problems in connexion with
269–271.
(1959)
Math.
1
graphs,
doi:10.1007/BF01386390.
Numer.
15. M. Kozłowski, W. Choromański, J. Kowara, Parametric
sensitivity analysis of ATN-PRT vehicle (Automated transit
network – personal rapid transit), J. Vibroengineering. 17
(2015)
1436–1451.
https://www.scopus.com/inward/record.uri?eid=2-s2.0-
84946555953&partnerID=40&md5=1b3eb293ddc7bca0d8e9cc
fba1974cdb.
16. W. Choromański, I. Grabarek, M. Kozłowski, Simulation and
Experimental Study of Selected Parameters of
the
Multifunction Steering Wheel in the View of Users' Abilities and
Accuracy of Vehicle Maneuvers, Procedia Manuf. 3 (2015)
3085–3091. doi:10.1016/j.promfg.2015.07.855.
17. J. Mieścicki, W.B. Daszczuk, Proposed benchmarks for PRT
networks simulation, Arch. Transp. 27–28 (2013) 123–133.
18. J. Lees-Miller, J. Hammersley, R. Wilson, Theoretical
Maximum Capacity as Benchmark
for Empty Vehicle
Redistribution in Personal Rapid Transit, Transp. Res. Rec. J.
Transp. Res. Board. 2146 (2010) 76–83. doi:10.3141/2146-10.
13. W.B. Daszczuk, Discrete Event Simulation of Personal Rapid
Transit (PRT) Systems, in: Autobusy-TEST, 2016(6), 2016: pp.
1302–1310. ArXiv: 1705.05237
14. W.
Choromański,
Eco-Mobility,
http://www.eco-
mobilnosc.pw.edu.pl/?sLang=en.
Zasady pierwszeństwa na skrzyżowaniach sieci ATN(PRT)
W sieciach transportowych ATN (Autonomous Transit
Network) na przepustowość mają wpływ jej główne elementy
jak struktura sieci, maksymalna prędkość, liczba pojazdów
itd. Inne parametry jak struktura przystanków, dynamiczny
Fig. 3. The effect of priority rules on the „join" intersection to
average waiting time, with different input rates
Fig. 4. Plot from Fig. 3, except for the case of the largest input
4
I
wybór drogi czy zachowania pojazdów na skrzyżowaniach
grają niewielką rolę. Jednak przy dużym zagęszczeniu
pojazdy przeszkadzają sobie wzajemnie i pewne subtelne
decyzje mogą wpłynąć na zdolność przewozową sieci.
Zbadaliśmy wpływ zasad pierwszeństwa na skrzyżowaniach
na czas oczekiwania na pojazdy, który
jest miarą
przepustowości. Zależność okazała się istotna w zatłoczonej
sieci.
Authors:
Waldemar Grabski, MSc – Warsaw University of Technology,
Institute of Computer Science, Nowowiejska str. 15/19, 00-665
Warsaw, [email protected]
Wiktor B. Daszczuk, PhD – Warsaw University of Technology,
Institute of Computer Science, Nowowiejska str. 15/19, 00-665
Warsaw, [email protected]
5
|
1510.00109 | 3 | 1510 | 2016-03-25T02:17:22 | Confinement Control of Double Integrators using Partially Periodic Leader Trajectories | [
"cs.MA",
"eess.SY",
"math.OC"
] | We consider a multi-agent confinement control problem in which a single leader has a purely repulsive effect on follower agents with double-integrator dynamics. By decomposing the leader's control inputs into periodic and aperiodic components, we show that the leader can be driven so as to guarantee confinement of the followers about a time-dependent trajectory in the plane. We use tools from averaging theory and an input-to-state stability type argument to derive conditions on the model parameters that guarantee confinement of the followers about the trajectory. For the case of a single follower, we show that if the follower starts at the origin, then the error in trajectory tracking can be made arbitrarily small depending on the frequency of the periodic control components and the rate of change of the trajectory. We validate our approach using simulations and experiments with a small mobile robot. | cs.MA | cs | Confinement Control of Double Integrators using Partially Periodic
Leader Trajectories
Karthik Elamvazhuthi, Sean Wilson, and Spring Berman
6
1
0
2
r
a
M
5
2
]
A
M
.
s
c
[
3
v
9
0
1
0
0
.
0
1
5
1
:
v
i
X
r
a
Abstract- We consider a multi-agent confinement control
problem in which a single leader has a purely repulsive effect
on follower agents with double-integrator dynamics. By decom-
posing the leader's control inputs into periodic and aperiodic
components, we show that the leader can be driven so as to
guarantee confinement of the followers about a time-dependent
trajectory in the plane. We use tools from averaging theory and
an input-to-state stability type argument to derive conditions
on the model parameters that guarantee confinement of the
followers about the trajectory. For the case of a single follower,
we show that if the follower starts at the origin, then the error
in trajectory tracking can be made arbitrarily small depending
on the frequency of the periodic control components and the
rate of change of the trajectory. We validate our approach using
simulations and experiments with a small mobile robot.
I. INTRODUCTION
In this work, we present a leader-follower control strategy
for multi-robot applications such as exploration, environmen-
tal monitoring, disaster response, and targeted drug delivery
at the micro-nanoscale. We consider a scenario in which
a leader agent must confine a group of follower agents to
a certain region around a target trajectory while steering
them along this trajectory. For example, a leader agent with
sophisticated sensing, localization, and planning capabilities
may be required to herd a group of followers, which lack
these capabilities, through an environment with obstacles.
The problem that we consider is closely related to con-
tainment control problems [31] in the multi-agent systems
literature. In these problems,
the objective is to design
interaction rules between leader and follower agents so that
the followers are eventually contained in the convex hull
spanned by the leaders. In contrast to most other work on
such problems,
the system that we consider is naturally
unstable for steady-state control inputs due to the repulsive
nature of the interaction between the leader and the followers.
Hence, a stabilization mechanism is needed to achieve con-
finement of the followers. One way to stabilize the system
is to incorporate feedback on the followers' positions and
velocities into the leader trajectories. Our control approach
does not require this feedback, and instead uses open-loop
oscillatory strategies to (practically) stabilize the follower
positions about near-zero velocity conditions.
The use of oscillatory inputs in control theory has a rich
history. There has especially been extensive work on motion
*This research was supported by NSF Award CMMI-1436960 and by
DARPA Young Faculty Award D14AP00054.
The authors are with the School
for Engineering of Matter,
State University, Tempe, AZ
E-mail: {karthikevaz, sean.t.wilson,
and Energy, Arizona
Transport
85287, USA.
spring.berman}@asu.edu
planning of driftless systems. In this work, sinusoidal inputs
of appropriately chosen frequencies are used to produce exci-
tations along different independent directions (corresponding
to Lie brackets of system vector fields) in the system's state
space [37], [24], [11]. In fact, for a certain class of systems
with a specific geometric structure, solutions of some optimal
control problems are of a periodic nature [6], [34]. Similarly,
oscillatory inputs have also played an important role in
stabilization problems [1], [2], [39], [13], [33]. While most
of these works have considered the control of systems with a
range of rest conditions (equilibrium points), there has also
been some work on practical stabilization of systems for
which no such rest condition exists [23]. The application of
oscillatory inputs can also be found in the physics literature.
Kapitza's pendulum is an example of a system whose unsta-
ble equilibrium is rendered stable when subject to oscillatory
vibrations [20]. The method of using oscillatory potentials
for trapping charged particles is also well-known [14], [26].
Our approach is also motivated by animal foraging and
livestock herding behaviors, which have inspired a number of
algorithms and multi-robot control strategies [17], [28], [3],
[22], [12], [5]. The approaches in [17], [5], and [12] are most
similar to ours in their use of sinusoidal leader trajectories
that
introduce repulsion terms into the agent dynamics.
While [17] uses sinusoidal trajectories to mimic the foraging
strategies of dolphins, the analysis is based on Snell's law
and the agent interactions arise from prey "bouncing" off of
predators by specular reflection. In [5] and [12], the follower
population is modeled as a probability density over space and
time, and the objective is to control the support of this density
function. The followers are diffusing at a finite speed, and
their models are of single-integrator type. These two works
derive conditions for confinement to be possible under these
assumptions. Attraction-type potentials are also considered
in [12], and conditions are also derived for the confinement
of followers in dimensions greater than two. Although these
works do not consider the trajectory tracking problem, [5]
does study the existence of control inputs for point-to-point
steering problems.
Other works that consider similar problems use methods
based on consensus protocols and multiple leaders [18], [8].
Multi-agent controllability problems have also received some
attention in related contexts [9], [29], [38], [27], [7].
II. PROBLEM STATEMENT
We consider a system with a single leader agent, whose
position at time t is given by [xl(t),yl(t)]T , and N follower
agents, whose positions at
i =
time t are [xi(t),yi(t)]T ,
1, ...,N. We denote the x and y velocity components of
follower agent i at time t by [vi
y(t)]T . The dynamics of
the leader and followers are defined by the following system
of equations:
x(t),vi
(1)
xl = ux
yl = uy
xi = vi
x
vi
x =
yi = vi
y
A(xi − xl)
[(xi − xl)2 + (yi − yl)2]α − kvi
x
vi
y =
A(yi − yl)
[(xi − xl)2 + (yi − yl)2]α − kvi
y
where A,k,α ∈ R+ and i = 1, ...,N. This model produces
one-way interaction between the leader and the followers
for any non-zero value of A. The interaction potentials are
of gravitational type but repulsive in nature.
We formulate our confinement control problem using the
following definition, in which (cid:107)x(cid:107) is the Euclidean norm of
x ∈ Rn:
Definition II.1. Let γ : [0,1] → R2 and R > 0. Then the
system (32) is said to be R-confinement controllable about
the trajectory γ if there exist T > 0, ux : [0,T ] → R, and uy :
[0,T ] → R such that the solution of (32) satisfies (cid:107)γ(t/T )−
[xi(t),yi(t)]T(cid:107) < R and (cid:107)γ(t/T )− [xl(t),yl(t)]T(cid:107) ≥ R for all
i ∈ {1, ...,N} and all t ∈ [0,T ].
Our objective is to derive conditions on the parameters A,
k, and α and on the trajectory γ(t) and its time derivative
γ(t) which guarantee that system (32) is R-confinement
controllable about the trajectory γ. The requirement that the
leader must maintain a minimum distance from the trajectory
differentiates our approach from other confinement strategies
that use a single leader, which typically employ attraction-
type interactions between the leader and followers. Moreover,
this distance requirement provides a way to prevent collisions
between the leader and the followers without explicitly
modeling the physical dimensions of the agents.
System (32) can be expressed in the affine control form
x = f(x) + ∑i uigi(x), which enables the application of Lie
algebraic conditions of geometric control to study its con-
trollability properties [35], [36]. However, the system has
no fixed point for any time-independent set of control
inputs {ui}. Therefore, one cannot conclude much more
than accessibility at points of interest. While Lie algebraic
conditions for controllability do exist for the case of non-rest
conditions, they require the assumption of global bounds on
the vector fields [15], which is not a valid assumption for
system (32). Alternatively, certain results on controllability
about trajectories can be applied if the admissibility of the
trajectories can be characterized beforehand [4].
We take a different approach by using averaging theory
to show that
the
target trajectory with a particular choice of control inputs.
Averaging theory is built on the principle that the behavior of
the followers can be stabilized about
a dynamical system with a rapidly oscillating vector field can
be accurately represented by the averaged system behavior
over a time interval that is dependent on a perturbation
parameter ε. For small enough ε, one can relate the solutions
of the averaged system, a set of autonomous differential
equations, to the solutions of the original non-autonomous
differential equations. Moreover, the stability of the solutions
is easier to characterize in the averaged system than in the
original system. We apply averaging analysis to our system
in the next section.
III. AVERAGING ANALYSIS
In the forthcoming analysis, we prove that system (32)
is R-confinement controllable about a trajectory γ(t) under
suitable bounds on γ(t) and γ(t). We also demonstrate that
if a follower starts at the origin, then its distance from the
trajectory can be made arbitrarily small while the leader
maintains a distance R from the trajectory. To simplify the
analysis, we consider the case where R = 1 and N = 1,
i.e., there is a single follower. We show that the analysis
also holds for any follower population N, since there are no
interactions between the followers. The results for general
R > 0 follow trivially from an appropriate scaling of the
parameter A.
Denote the initial position of the leader by [xl(0),yl(0)]T =
[1,0]T , and let ux(t) = −ω sinωt and uy(t) = −ω cosωt for
some ω > 0. With these control inputs, one can explicitly
solve for xl(t) and yl(t). Then system (32) can be expressed
in the following reduced form,
x =
vx =
y =
vy =
A(x− cosωt)
vx
[(x− cosωt)2 + (y− sinωt))2]α − kvx
vy
[(x− cosωt)2 + (y− sinωt))2]α − kvy.
A(y− sinωt)
(2)
We change the time variable to τ = ωt and define ε = 1/ω.
Then the solution of (2) satisfies,
(3)
dx
dτ = εvx
dvx
dτ =
dy
dτ = εvy
dvx
dτ =
εA(x− cosτ)
[(x− cosτ)2 + (y− sinτ)2]α − εkvx
εA(y− sinτ)
[(x− cosτ)2 + (y− sinτ)2]α − εkvy.
Now the system can be expressed in the so-called standard
averaging form,
where X = [x,vx,y,vy]T and
f(τ,X) =
dX
dτ = εf(τ,X),
vx
A(x−cosτ)
[(x−cosτ)2+(y−sinτ)2]α − kvx
[(x−cosτ)2+(y−sinτ)2]α − kvy
vy
A(y−sinτ)
(4)
(5)
.
Then we can consider the averaged system,
¯X(0) = ¯X0,
¯X = εfav( ¯X)
where ¯X = [ ¯x, ¯vx, ¯yy, ¯vy]T and
(cid:82) 2π
(cid:82) 2π
0
0
1
2π
1
2π
fav( ¯X) =
¯vx
A( ¯x−cos(s))
[( ¯x−cos(s))2+( ¯y−sin(s))2]α ds− k ¯vx
[( ¯x−cos(s))2+( ¯y−sin(s))2]α ds− k ¯vy
A( ¯y−sin(s))
¯vy
(6)
(7)
.
If the origin of the averaged system is an exponentially
stable equilibrium point, then there exists a neighborhood
of the origin for which solutions of the original system
remain bounded and close to the origin for infinite time. The
following lemma gives conditions for exponential stability
of the origin in the averaged system. The existence and
uniqueness of solutions to the averaged system follow from
this result for initial conditions sufficiently close to the
origin.
Lemma III.1. The origin is an exponentially stable equilib-
rium point of the averaged system (6) for all k > 0 if A > 0
and α > 1.
Proof. The proof is based on the linearization principle. The
Jacobian map for fav( ¯X) at
¯X = 0 is given by (see the
Appendix for computations):
0
0
0
0
0
0
Dfav(0) =
0
1
−A(α − 1) −k
0
0
1
0 −A(α − 1) −k
The spectrum of Dfav(0) can be computed to be
(k2 − 4A(α − 1))
Then the result follows from [21][Corollary 4.3].
σ (Dfav(0)) = − k
2
± 1
2
1
2 .
.
(8)
(9)
The following proposition demonstrates that this result
can be used to obtain estimates for the solutions of system
(4). The proposition gives bounds on solutions of general
systems in which the vector field can be decomposed into
(1) a highly oscillatory, state-dependent component, and (2)
a state-independent component, which is not necessarily pe-
riodic, that evolves on a slower time scale. By converting our
system into this form through a coordinate transformation,
we can use this result to construct control inputs for the
leader to confine followers about a trajectory. The proof is
similar to the proofs of the averaging theorems in [21], [16].
Since our result does not immediately follow from these
theorems, we adapt the initial steps of their proofs to our
problem.
Proposition III.2. Let a function f(t,x,ε) and its partial
derivatives with respect to (x,ε) up to the first order be
continuous and bounded for (t,x,ε) ∈ [0,∞)×U0× [0,ε0] for
every compact set U0 ⊂ U, where U ⊂ Rn, and some ε0 > 0.
Additionally, let g : [0,∞) → Rn be continuous. Suppose that
f is T -periodic in t for some T > 0. Then x ≡ x(t,ε,g) and
z ≡ z(t) evolve according to the following equations:
x = εf(t,x,ε) + εg(t),
x(0,ε,g) = x0,
(10)
(cid:82) T
z(0) = z0,
z = εfav(z),
(11)
where fav(z) = 1
0 f(τ,z,0)dτ. Suppose that the origin z =
T
0 ∈ U is an exponentially stable equilibrium point of the
averaged system Eq. (11), Ω ⊂ U is a compact subset of its
region of attraction, and x0 ∈ Ω. Then there exist positive
constants k, δ∗, ε∗, β1, β2, and µ such that if (cid:107)g(t)(cid:107) ≤ δ for
all t ≥ 0, then the condition (cid:107)x(0,ε,g)− z(0)(cid:107) ≤ µ implies
that
(cid:107)x(t,ε,g)− z(t)(cid:107) ≤ ke−λεt(cid:107)x0 − z0(cid:107) + β1ε + β2δ
(12)
for all ε ∈ (0,ε∗), δ ∈ (0,δ∗), and t ≥ 0.
Proof. Define the functions
h(t,x) = f(t,x,0)− fav(x)
and
u(t,x) =
h(τ,x)dτ.
(cid:90) t
0
(13)
(14)
Since h(t,x) is T -periodic in t and has zero mean,
the
function u(t,x) is T -periodic in t. Hence, u(t,x) is bounded
for all (t,x)∈ [0,∞)×Ω. Moreover, ∂u/∂t and Dxu are given
by
∂u
∂t = h(t,x),
Dxu =
(cid:90) t
0
Dxh(τ,x)dτ.
Consider the change of variables
x = y + εu(t,y).
(15)
(16)
Differentiating both sides of Eq. (16) with respect to t, we
obtain
x = y + ε
∂u
∂t (t,y) + εDyu(t,y)y.
(17)
∂u
∂t
= εf(t,y + εu,ε) + εg(t)− εf(t,y,0)
Substituting Eq. (10) for x into Eq. (17), the new state
variable y satisfies the equation
(cid:2)I + εDyu(cid:3)y = εf(t,y + εu,ε) + εg(t)− ε
(t,x) ∈ [0,∞)×U0 imply that for small enough ε,(cid:2)I +εDyu(cid:3)
y = εfav(y) + εg(t) + ε(cid:2)εDyf(t,y,0)u + ε
−εDyufav(y)− εDyug(t)(cid:3) + O(ε3)
The assumption of bounds on the partial derivatives of f over
is invertible. Hence, the state variable y satisfies
∂f
∂ε (t,y,0)
+εfav(y).
:= εfav(y) + εg(t) + ε2q(t,y,ε,g),
(18)
where q(t,y,ε,g) is not necessarily periodic. From the
assumptions on f(t,x,ε) and g(t), q(t,y,ε,g) is continuous
and bounded for (t,x,ε) ∈ [0,∞)× Ω× [0,ε0].
Now consider the change of variables s = εt. Then the
solutions of Eq. (18) and Eq. (11) satisfy
dy
ds = fav(y) + g(s) + εq(s/ε,y,ε,g)
and
dz
ds = fav(z),
(19)
(20)
the origin z = 0 is an ex-
respectively. By assumption,
ponentially stable equilibrium point of Eq. (20). Then by
[21][Theorem 9.1], there exist positive constants ε∗, δ∗, µ,
β1, β2, δ , k, and λ such that the conditions (cid:107)g(s)(cid:107) < δ and
(cid:107)y0 − z0(cid:107) ≤ µ imply that,
(cid:107)y(s)− z(s)(cid:107) ≤ ke−λ s(cid:107)y0 − z0(cid:107) + β1ε + β2c
(21)
for all ε ∈ (0, ε∗), δ ∈ (0,δ∗), and s ≥ 0. For small enough
ε, the transformation (16) is a one-to-one mapping from
Ω to its image for all t ≥ 0 and ε ∈ [0,εo] for some εo >
0 [32][Lemma 2.8.3]. Therefore, x − y = O(ε). Hence, it
follows from the triangle inequality and the estimate (21) that
there exist positive constants δ∗, ε∗, µ, and c such that the
conditions (cid:107)g(t)(cid:107) ≤ δ and (cid:107)x(0,ε,g)−z(0)(cid:107) ≤ µ imply that
Eq. (12) is true for all ε ∈ (0,ε∗), δ ∈ (0,δ∗), and t ≥ 0.
Note that this result is not the same as general averaging,
which is a generalization of the above proposition for the
case where g = 0 and f(t,x,ε) is required to be only almost-
periodic in t [21], [32], since we have explicit bounds on the
solution of Eq. (11) that depend on ε as well as δ . One can
impose the additional assumption that f(t,x,ε) has partial
derivatives up to the second order. Under this assumption,
g = 0 implies the existence of exponentially stable periodic
orbits that approach the equilibrium point of the averaged
system as ε tends to 0. See, for example, [16]. In this
case, one can interpret
the result as "uniform" input-to-
state stability of the system about ε-dependent exponentially
stable T -periodic orbits. Our result can also be seen as
a special case of the results in [25], where input-to-state
stability of general time-varying systems via averaging is
analyzed using the notion of strong and weak averages.
In the next two results, we use Proposition III.2 to show
the existence of leader control inputs that can locally stabilize
the followers about general trajectories in the plane that start
at the origin. We consider leader inputs with an oscillatory
component, as in Eq. (3), and an additional component
that depends on the target trajectory to be tracked. Using a
coordinate transformation, we show that this system can be
converted to the form in Eq. (11), and hence we can obtain
bounds on the distances between the follower positions and
the target trajectory.
Remark on notation: We say that a function f : U → R, where
U ⊂ Rn, is in C1(U) if it has continuous derivatives up to
order 1.
Lemma III.3. Suppose that γ1 and γ2 are elements in
C1([0,1]) such that γ1(0) = γ2(0) = 0, and define the tra-
jectory γ(t) = (γ1(t),γ2(t)). Additionally, let γδ
2 be
1 and γδ
elements in C1([0,1/δ ]) such that γδ
2 (t) =
γ2(δt) for each t ∈ [0,1/δ ], where δ > 0. Define γδ (t) =
(γδ
1 (t),γδ
2 (t)). Let X = [x,vx,y,vy]T and define F(t,X,ω,γδ )
as
1 (t) = γ1(δt) and γδ
[(x−cosωt−γδ
F(t,X,ω,γδ ) =
2 (t))2]α − kvx
2 (t))2]α − kvy
where A > 0, k > 0, and α > 1. Then consider the system
vx
A(x−cosωt−γδ
1 (t))2+(y−sinωt−γδ
vy
A(y−sinωt−γδ
2 (t))
1 (t))2+(y−sinωt−γδ
[(x−cosωt−γδ
1 (t))
(22)
X = F(t,X,ω,γδ ),
X(0) = X0.
(23)
There exist positive constants r1 > 0, ω1 > 0, and δ1 > 0,
which depend on A, k, and α, such that ω > ω1, δ > δ1
and (cid:107)X0(cid:107) ≤ r1 implies that the solution X(t) to Eq. (23) is
defined over the interval t ∈ [0,1/δ ] and that
2 (t))(cid:107) < 1
(24)
for all t ∈ [0,1/δ ]. Moreover, if X0 = 0, then for each ν > 0
there exist ω2 > 0 and δ2 > 0 such that for all ω > ω2 and
δ ∈ (0,δ2),
(cid:107)(x(t),y(t)− (γδ
1 (t),γδ
(cid:107)(x(t),y(t)− (γδ
1 (t),γδ
2 (t))(cid:107) < ν
(25)
for all t ∈ [0,1/δ ].
Proof. Consider
X − [γδ
1 (t),0,γδ
problem
the
E =
2 (t),0]T . Then we have the initial value
variables
change
of
E = F(t,E,ω,0) + δg(t),
(26)
where g(t) = [ γ1(δt),0, γ2(δt),0]T . Let ε = 1/ω and consider
the change of variable s = t/ε. Then the solution of Eq. (26)
satisfies
E(0) = X0,
dE
ds = εF(s,E(s),1,0) + εδg(εs).
(27)
The estimates in Eq. (24) and Eq. (25) follow from Propo-
sition III.2. Note that the dependence of g on the εs time
scale does not affect the proof, since g is still bounded from
above as required.
For the case where the follower agent starts at the origin,
this proposition implies that one can choose leader control
inputs that drive the follower to track the trajectory γ
arbitrarily closely, albeit over a longer period of time than
if the required bounds on the tracking error were weaker.
This is a stronger result than is needed to ensure general R-
confinement controllability, for which it is sufficient for the
follower agent to be within a distance R of the trajectory.
Theorem III.4. Suppose that [xl(0),yl(0)] = [1,0]T . Then
there exists r > 0 such that (cid:107)[xi,yi,vi
y](cid:107) < r for all i =
1,2....N implies that system (32) is 1-confinement control-
lable about all trajectories γ for which γ ∈ {(γ1,γ2) : γ1,γ2 ∈
C1([0,1]), γ1(0) = γ2(0) = 0}.
x,vi
Proof. Let ω and δ be positive scalars. Consider the follow-
ing control inputs for the leader:
ux(t) = −ω sinωt + δ γx(δt)
uy(t) = ω cosωt + δ γy(δt).
(28)
Integrating these functions from 0 to t for each t ∈ [0,1/δ ],
we can explicitly solve for the state variables xl(t) and yl(t):
xl(t) = cos(ωt) + γx(δt),
yl(t) = sin(ωt) + γx(δt).
(29)
Define F as in Eq. (22) and substitute Eq. (29) into system
(32). Then the state variables xi,vi
y in the solution of
system (32) satisfy
x,yi,vi
dXi
dt = F(t,Xi,ω,γδ ),
for each i∈{1,2, ...,N}, where Xi = [xi,vi
follows from Lemma III.3.
Xi(0) = Xi
0,
y]T . The result
x,yi,vi
(30)
The assumption that
too
restrictive. If [xl(0),yl(0)]T is any element on the unit circle,
then the leader control inputs are
[xl(0),yl(0)] = [1,0]T is not
ux(t) = −ω sin(ωt + φ ) + δ γx(δt)
uy(t) = ω cos(ωt + φ ) + δ γy(δt)
(31)
for an appropriately chosen φ. These inputs will have the
same effect on the system. Due to the continuous dependence
of the solutions of system (32) on its initial conditions
and parameters, it can be argued further that there exists
a neighborhood of the unit circle from which the leader can
always be driven to the circle, after which it can execute the
control inputs defined in Eq. (31).
Remark III.5. We can also consider a more general setting
in which the follower agents are running a consensus pro-
tocol while being confined by the leader. In this case, the
followers' interactions can be modeled using an undirected
simple graph with fixed topology, G = (V , E ), where V is
the set of follower agents and E identifies the pairs of agents
that interact with each other. The graph is not necessarily
connected. Then the x-coordinates of the follower agents'
positions and velocities evolve according to
xi = vi
x
vi
x =
[(xi − xl)2 + (yi − yl)2]α − kvi
x − v j
− ∑
(vi
j∈N (i)
A(xi − xl)
(xi − x j)− ∑
j∈N (i)
x
x) ,
(32)
with similar dynamics for the y-coordinates. As in Eq. (8),
the Jacobian map for the averaged vector field fav,c of the
composite group of followers can be computed as
(cid:20)B 0
(cid:21)
0 B
,
IN
Dfav,c(0) =
(cid:20)
where
B =
0
−βIN − L −kIN − γL
(cid:21)
,
(33)
(34)
λi± = − k
2
in which IN is the identity matrix of size N × N, L is
the Laplacian of the graph G , and β = A(α − 1), γ, and
k are positive scalars. The eigenvalues of Dfav,c(0) can be
computed according to [30][Chapter 4] as:
γµi ±(cid:112)(γµi − k)2 − 4(β − µi)
(35)
where µi is the ith eigenvalue of −L . Since the spectrum of
Dfav,c(0) lies in the open left half-plane of C whenever β =
A(α −1), k, and γ are positive, this implies that confinement
controllability of the leader-follower system is retained under
inter-follower interactions that can be modeled as a graph
with fixed topology.
+
2
,
IV. SIMULATIONS
We validate our confinement control approach with simu-
lations of two scenarios with different parameter values. In
Case 1, the target trajectory is γ(θ ) = [2cos2πθ 2sin2πθ ]T ,
the final time condition is T = 40π, and the other parameters
are A = 1, k = 0.05, α = 10, and ω = 10. In Case 2, we
set γ(θ ) = [10cos4πθ 2πθ ]T , T = 80π, A = 1, k = 0.03,
α = 5, and ω = 20. In both cases, the leader control inputs
are chosen according to Eq. (28), and there are three follower
agents. The initial positions and velocities of the followers
are drawn uniformly randomly from a ball of radius 0.125
(Case 1) or 0.5 (Case 2) that is centered at the origin.
Fig. 1 shows the agent trajectories during the two sim-
ulated scenarios. In both cases, the followers remain well
within a distance of 1 from the target
trajectory, which
confirms that the system is 1-confinement controllable about
this trajectory. The followers in Case 2 display larger initial
oscillations about the target trajectory than the followers in
Case 1. This is because the followers in Case 2 have a lower
damping coefficient k and initial velocities that were chosen
from a larger neighborhood of the origin, and thus tended to
be higher.
We also note that the higher value of ω in Case 2 implies
that the region of attraction of the original system is closer
to the region of the attraction of the averaged system than in
Case 1. This caused the confinement strategy in Case 2 to
be successful for a larger ball of possible initial conditions
than in Case 1. Indeed, we found that the followers in Case
1 did not remain confined when the initial conditions were
drawn from outside the ball of radius 0.125.
V. ROBOT EXPERIMENTS
A. Experimental Setup
We also tested our confinement control approach with
an experiment in which a small differential-drive robotic
platform Pheeno [40] emulated a follower agent that was
confined by a virtual leader. The experiment was performed
in the ASU Autonomous Collective Systems Laboratory. One
robot was placed in a 1.5 m × 2.1 m arena and marked
with a 2D binary identification tag to allow for real-time
position and orientation tracking. The tags were tracked
using one overhead Microsoft LifeCam Studio Webcam with
a resolution of 1920×1080 pixels at a frame rate of 30 FPS.
(a) Case 1
Fig. 2. The robot being herded by a virtual leader along a target trajectory
γE, shown in green. The blue dot is the virtual leader's position, the pink
dot is the center of the leader's orbit, and the dark red dot is the position
of a simulated follower agent. The light blue line on the robot indicates its
orientation.
(b) Case 2
Fig. 1. Evolution of leader and follower agent positions over time. The
followers start at random positions within a neighborhood of the origin.
The 2D binary tags were identified using standard OpenCV
algorithms on a Windows computer.
To accommodate the nonholonomic constraint of the robot
platform, the robot used a PI controller to keep its head-
ing facing away from the virtual leader at all times. This
heading control produces approximate holonomic motion
in a differential-drive platform. To facilitate this motion,
the leader's oscillation frequency was maintained below
the bandwidth of the robots' motors. A desktop computer
updated and transmitted the virtual leader's position and the
robot's global position to the robot via WiFi at a frequency
of 3 Hz.
We defined a circular target trajectory, shown in Fig. 2,
for the robot to track in the experiment. The trajectory was
given by γE (t) = [Rp cos(ωpt) Rp(sinωpt)]T , where Rp =
67 cm and ωp = 0.02. The robot was controlled using the
parameters A = R2α−1
, RL = 38 cm, k = 1, α = 4, and ω = 2.
L
Fig. 3. Time evolution of the positions of the leader agent (blue), simulated
follower agent (red), and robot (black) for an experiment with the target
trajectory γE (green).
B. Results
We compared the trajectory of the robot during the ex-
periment with the corresponding trajectory of a simulated
follower agent, indicated by a dark red dot in Fig. 2, that
moves under the influence of the same leader agent. Note
that while the robot is nonholonomic, the simulated follower
is holonomic. Fig. 3 plots the trajectories of the virtual
leader, the robot, and the simulated follower agent during
the experiment. The robot was initially placed inside the
region of confinement bounded by the leader's path, and the
simulated follower was initialized at the center of the leader's
orbit. The figure illustrates that the robot was successfully
kept inside the region of confinement for the duration of the
experiment.
050100150−3−2.5−2−1.5−1−0.500.51−2−1.5−1−0.500.511.52 tx yFollower1Follower2Follower3Leader0100200300−25−20−15−10−505−1012345678 tx yFollower1Follower2Follower3Leader50100150200250300−10001002003000200400600800100012001400 X (cm)Y (cm) Time (s)RobotTarget TrajectorySimulated FollowerLeaderFig. 3 shows that the trajectory of the robot deviates farther
from γE than the trajectory of the simulated follower. This
is likely due to the nonlinear effects of friction on the shafts
of the robots' motors. The motors require a minimum input
voltage to drive the robot's motion, which can be controlled
at speeds above 2 cm/s. These speeds are generated by the
repulsive interaction potential in the robot's controller when
the distance between the robot and the leader is below a
threshold value. Hence,
the robot moves away from the
leader only when it is within this distance; otherwise, it
is stationary. In contrast, the simulated follower does not
have such a constraint on its speed and will move when
the leader is farther away, causing its trajectory to adhere
more closely to γE. Thus, the experiment shows that when
our confinement strategy is implemented in practice, the
controller design must account for unmodeled dynamics in
the physical platform by allowing only those velocity control
inputs that exceed an appropriate lower bound.
VI. CONCLUSION
We presented a leader-follower control strategy for confin-
ing a group of agents to a region around a target trajectory.
By constructing oscillatory leader inputs, we used averaging
theory to show that follower agents can be confined to a
neighborhood of the origin. From a control design perspec-
tive, one could investigate the quantitative effects of different
parameters on the stability properties of the system. Well-
developed computational tools can be used to estimate the
size of the region of attraction of the origin [10], [19]. One
could also augment this open-loop strategy with feedback to
develop a more robust stabilization mechanism. Incorporat-
ing multiple leaders and inter-agent collision avoidance into
the control strategy is another direction for future work.
VII. ACKNOWLEDGMENT
K.E. thanks Matthias Kawski for useful suggestions re-
garding the proofs.
APPENDIX
Let U be a subset of Rn. The Jacobian map for a function
f : U → Rm at a state x ∈ U is given by:
∂ f1
(x)
∂ xn
...
∂ fm
(x)
∂ xn
(x)
∂ x1
...
∂ fm
(x)
∂ x1
···
...
···
Df(x) =
∂ f1
.
Let U be a subset of the unit sphere in R4, and define the
function f : U → R4 as:
(cid:82) 2π
(cid:82) 2π
f(x) =
1
2π
0
1
2π
0
x2
A(x1−cos(s))
[(x1−cos(s))2+(x3−sin(s))2]α ds− kx2
[(x1−cos(s))2+(x3−sin(s))2]α ds− kx4
A(x3−sin(s))
x4
,
where A,k,α ∈ R+. Define g1(x,t) = x−cos(t), g2(x,t) = x−
sin(t), and h(x,y,t) = g1(x,t)2 + g2(y,t)2. The function f is
=
continuously differentiable everywhere in U and has a well-
defined Jacobian at the origin. We compute the nontrivial
partial derivatives of the Jacobian map Df(x) using Leibniz's
rule for partial derivatives of integrals:
∂ f2
∂ x1
∂ f2
∂ x3
∂ f4
∂ x1
∂ f4
∂ x3
Evaluating these partial derivatives at the origin, we ob-
h(x1,x3,s)α − 2αg1(x1,s)2h(x1,x3,s)α−1
−2αg1(x1,s)g2(x3,s)h(x1,x3,s)α−1
−2αg1(x1,s)g2(x3,s)h(x1,x3,s)α−1
h(x1,x3,s)α − 2αg2(x3,s)2h(x1,x3,s)α−1
(cid:90) 2π
(cid:90) 2π
(cid:90) 2π
(cid:90) 2π
A
2π
A
2π
A
2π
A
2π
h(x1,x3,s)2α
h(x1,x3,s)2α
h(x1,x3,s)2α
h(x1,x3,s)2α
ds.
ds
ds
ds
=
=
=
0
0
0
0
tain:
∂ f2
∂ x1
∂ f2
∂ x3
∂ f4
∂ x1
∂ f4
∂ x3
(0) =
(0) =
(0) =
(0) =
A
2π
A
2π
A
2π
A
2π
0
(cid:90) 2π
(cid:90) 2π
(cid:90) 2π
(cid:90) 2π
0
0
0
(1− 2α sin2(s))ds = − A(α − 1)
−2α sin(s)cos(s)ds = 0
−2α sin(s)cos(s)ds = 0
(1− 2α cos2(s))ds = − A(α − 1).
REFERENCES
[1] John Baillieul. Stable average motions of mechanical systems subject
to periodic forcing. Dynamics and Control of Mechanical Systems:
The falling cat and related problems, 1:1–23, 1993.
[2] Richard E. Bellman, Joseph Bentsman, and Semyon M. Meerkov.
Vibrational control of nonlinear systems: Vibrational stabilizability.
IEEE Trans. on Automatic Control, 31(8):710–716, 1986.
[3] Brandon Bennett and Matthew Trafankowski. A comparative investi-
gation of herding algorithms. In Proc. of the Symp. on Understanding
and Modelling Collective Phenomena (UMoCoP), pages 33–38, 2012.
[4] Rosa Maria Bianchini and Gianna Stefani. Controllability along a
trajectory: A variational approach. SIAM Journal on Control and
Optimization, 31(4):900–927, 1993.
[5] Alberto Bressan and Dongmei Zhang. Control problems for a class of
set valued evolutions. Set-Valued and Variational Analysis, 20(4):581–
601, 2012.
[6] Roger W. Brockett. Control theory and singular Riemannian geometry.
Springer, 1982.
[7] Roger W. Brockett. On the control of a flock by a leader. Proc. of
the Steklov Institute of Mathematics, 268(1):49–57, 2010.
[8] Yongcan Cao, Wei Ren, and Magnus Egerstedt. Distributed contain-
ment control with multiple stationary or dynamic leaders in fixed and
switching directed networks. Automatica, 48(8):1586–1597, 2012.
[9] Marco Caponigro, Massimo Fornasier, Benedetto Piccoli, and Em-
manuel Trélat. Sparse stabilization and control of alignment models.
Mathematical Models and Methods in Applied Sciences, 25(3):521–
564, 2015.
[10] Graziano Chesi. Domain of attraction: analysis and control via SOS
programming. Springer Science & Business Media, 2011.
[11] Yacine Chitour, Frédéric Jean, and Ruixing Long. A global steering
method for nonholonomic systems. Journal of Differential Equations,
254(4):1903–1956, 2013.
[12] Rinaldo M. Colombo and Nikolay Pogodaev. Confinement strategies
in a model for the interaction between individuals and a continuum.
SIAM Journal on Applied Dynamical Systems, 11(2):741–770, 2012.
[13] Jean-Michel Coron. Global asymptotic stabilization for controllable
systems without drift. Mathematics of Control, Signals and Systems,
5(3):295–312, 1992.
[14] Ido Gilary, Nimrod Moiseyev, Saar Rahav, and Shmuel Fishman.
Trapping of particles by lasers:
the quantum Kapitza pendulum.
Journal of Physics A: Mathematical and General, 36(25):L409, 2003.
[15] J.-M. Godhavn, Andrea Balluchi, Lara S. Crawford, and S. Shankar
Sastry. Steering of a class of nonholonomic systems with drift terms.
Automatica, 35(5):837–847, 1999.
[16] John Guckenheimer and Philip Holmes. Nonlinear oscillations, dy-
namical systems, and bifurcations of vector fields, volume 42. Springer
Science & Business Media, 1983.
[17] Musad A. Haque, Amir R. Rahmani, and Magnus Egerstedt. Bio-
logically inspired confinement of multi-robot systems. International
Journal of Bio-Inspired Computation, 3(4):213–224, 2011.
[18] Meng Ji, Giancarlo Ferrari-Trecate, Magnus Egerstedt, and Annalisa
IEEE Trans. on
Buffa. Containment control in mobile networks.
Automatic Control, 53(8):1972–1975, 2008.
[19] Reza Kamyar and Matthew Peet.
Polynomial optimization with
applications to stability analysis and control-alternatives to sum of
squares. arXiv preprint arXiv:1408.5119, 2014.
[20] P. L. Kapitza. Dynamic stability of a pendulum with an oscillating
point of suspension. Journal of Experimental and Theoretical Physics,
21(5):588–597, 1951.
[21] Hassan Khalil. Nonlinear Systems. Prentice Hall, 3rd edition, 2002.
[22] Jyh-Ming Lien, Burchan Bayazit, Ross T. Sowell, Samuel Rodriguez,
and Nancy M. Amato. Shepherding behaviors. In Proc. IEEE Int'l.
Conf. on Robotics and Automation (ICRA), pages 4159–4164, 2004.
[23] Luc Moreau and Dirk Aeyels. Practical stability and stabilization.
IEEE Trans. on Automatic Control, 45(8):1554–1558, 2000.
[24] Richard M. Murray and S. Shankar Sastry. Nonholonomic motion
planning: Steering using sinusoids. IEEE Trans. on Automatic Control,
38(5):700–716, 1993.
[25] D. Neši´c and Andrew R. Teel.
Input-to-state stability for nonlinear
time-varying systems via averaging. Mathematics of Control, Signals
and Systems, 14(3):257–280, 2001.
[26] Wolfgang Paul. Electromagnetic traps for charged and neutral parti-
cles. Reviews of Modern Physics, 62(3):531, 1990.
[27] Benedetto Piccoli, Francesco Rossi, and Emmanuel Trélat. Control
arXiv preprint
to flocking of the kinetic Cucker-Smale model.
arXiv:1411.4687, 2014.
[28] Alyssa Pierson and Mac Schwager. Bio-inspired non-cooperative
multi-robot herding. In Proc. Int'l. Conf. on Robotics and Automation
(ICRA), 2015.
[29] Amirreza Rahmani, Meng Ji, Mehran Mesbahi, and Magnus Egerstedt.
Controllability of multi-agent systems from a graph-theoretic perspec-
tive. SIAM J. on Control and Optimization, 48(1):162–186, 2009.
[30] Wei Ren and Randal W. Beard. Distributed consensus in multi-vehicle
cooperative control. Springer, 1st edition, 2008.
[31] Wei Ren and Yongcan Cao. Distributed coordination of multi-agent
networks: emergent problems, models, and issues. Springer Science
& Business Media, 2010.
[32] Jan A. Sanders, Ferdinand Verhulst, and James A. Murdock. Averaging
methods in nonlinear dynamical systems. Springer-Verlag New York,
2nd edition, 2007.
[33] Andrey Sarychev. Stability criteria for time-periodic systems via high-
order averaging techniques. In Nonlinear Control in the Year 2000,
volume 2, pages 365–377. Springer, 2001.
[34] S. Shankar Sastry and Richard Montgomery. The structure of optimal
controls for a steering problem. In IFAC Symp. on Nonlinear Control
Systems Design (NOLCOS), pages 385–390, 1992.
[35] Eduardo D. Sontag. Mathematical control theory: deterministic finite
dimensional systems, volume 6. Springer Science & Business Media,
2013.
[36] Héctor J. Sussmann. A general theorem on local controllability. SIAM
Journal on Control and Optimization, 25(1):158–194, 1987.
[37] Héctor J. Sussmann and Wensheng Liu. Limits of highly oscillatory
controls and the approximation of general paths by admissible trajec-
tories. In Proc. IEEE Conf. on Decision and Control (CDC), pages
437–442, 1991.
[38] Herbert G. Tanner. On the controllability of nearest neighbor inter-
connections. In Proc. IEEE Conf. on Decision and Control (CDC),
pages 2467–2472, 2004.
[39] Andrew R. Teel, Richard M. Murray, and Gregory C. Walsh. Non-
holonomic control systems: from steering to stabilization with sinu-
soids. International Journal of Control, 62(4):849–870, 1995.
[40] Sean Wilson, Ruben Gameros, Michael Sheely, Matthew Lin, Kathryn
Dover, Robert Gevorkyan, Matt Haberland, Andrea Bertozzi, and
Spring Berman.
Pheeno, a versatile swarm robotic research and
education platform. Accepted to IEEE Robotics and Automation
Letters (RA-L), 2016.
|
1312.2642 | 1 | 1312 | 2013-12-10T02:20:24 | Cellular Automata based Feedback Mechanism in Strengthening biological Sequence Analysis Approach to Robotic Soccer | [
"cs.MA",
"cs.RO"
] | This paper reports on the application of sequence analysis algorithms for agents in robotic soccer and a suitable representation is proposed to achieve this mapping. The objective of this research is to generate novel better in-game strategies with the aim of faster adaptation to the changing environment. A homogeneous non-communicating multi-agent architecture using the representation is presented. To achieve real-time learning during a game, a bucket brigade algorithm is used to reinforce Cellular Automata Based Classifier. A technique for selecting strategies based on sequence analysis is adopted. | cs.MA | cs | Cellular Automata based Feedback Mechanism in Strengthening
biological Sequence Analysis Approach to Robotic Soccer
P. Kiran Sree 1 , G.V.S. Raju2, .S. Viswandha Raju3 and N.S.S.S.N Usha Devi4
1. Associate Professor, Department of Computer Science, S.R.K Institute of Technology, Enikepadu,
Vijayawada,India, [email protected], Mobile: +919959818274.
2. Prof and Head of the Department, Computer Science, Swarnandhra Engineering college,Narasapur.
3. Professor, Department of CSE, Gokaraju Rangaraju Institute of Engineering & Technology
4. Graduate Student of C.S.E,J.N.T.University.
ABSTRACT
This paper reports on the application of sequence
analysis algorithms for agents in robotic soccer and
a suitable representation is proposed to achieve this
mapping. The objective of this research is to
generate novel better in-game strategies with the
aim of
faster adaptation
to
the changing
environment. A homogeneous non-communicating
multi-agent architecture using the representation is
presented. To achieve real-time learning during a
game, a bucket brigade algorithm is used to
reinforce Cellular Automata Based Classifier. A
technique
for
selecting
strategies based on
sequence analysis is adopted.
Keywords: Multi-agent architecture, bucket brigade
algorithm, reinforce learning, Cellular Automata
Classifer.
1. Introduction
Although each domain presents a variety of
approaches, from a research perspective the ideal
domain embodies as many issues as possible. Robotic
soccer is a particularly good domain for studying
multi-agent systems. Originated by Alan Mackworth
[1], it has been gaining popularity in recent years
with several international competitions taking place
[2]. Even though robotic soccer is a game, most real-
world complexities are maintained. Some of the
distinguishing characteristics of the domain include:
real-time, noisy with hidden state, collaborative and
adversarial goals. It is the ideal test bed for
evaluating different machine learning techniques in a
direct manner, as it provides for multiple levels of
evaluation such as evaluation of low-level behavior
e.g. maneuvering on the field as well as evaluation of
strategic responses to changing scenarios.
Several Multi-agent system scenarios are possible:
• Homogeneous, on-communicating
• Homogeneous, communicating
• Heterogeneous, on-communicating
• Heterogeneous, communicating
Each of which have their own set of challenging
research
issues.
In
homogeneous,
non-
communicating multi-agent systems, all of the agents
have the same internal structure including goals,
domain knowledge, and possible actions. They also
have the same procedure for selecting among their
actions. The only differences among agents are their
sensory inputs and the actual actions they take: they
are
situated
differently
in
the world.
A DNA fragment is usually written as a sequence of
letters A, C, T and G – representing the four
nucleotides Adenine, Cytosine, Thymine and
Guanine. DNA is the master behind all the activities
in the cell and is responsible for the synthesis of
proteins. In this paper, Section-2 gives an overview
of related work. A representation scheme for robotic
soccer is presented in Section-3. An architecture
depicting a homogeneous non-communicating agent
utilizing the above representation is proposed in
Section-4. Section-5 discusses experimental results
and Section-6 deals with future directions and
concludes the paper.
2. Related Work
Balch and Arkin [6] use homogeneous, reactive,
non-communicating agents
to study
formation
maintenance in autonomous robots. The robots' goal
is to move together in a military formation such as a
diamond, column, or wedge. They periodically come
across obstacles which prevent one or more of the
robots from moving in a straight line. After passing
the obstacle, all robots must adjust in order to regain
their formation. The actual robot motion is a simple
ICGST-AIML Journal, Volume 8, Issue I, June 200829
PATTERN
PLAYER
Action
Base
Kick towards goal
Pass to team-mate
Move towards ball
Table 2: Distinct patterns and their occurrence in each player
sequence
the provided input sequence against these patterns for
matches. Table 2 gives the different patterns and
occurrences of players.
vectors.
these
of
sum
weighted
Levy and Rosenschein [7] create agents that each act
in service of its own goals. They use game theoretic
techniques to find equilibrium points and thus to
decide how
to act. These agents are clearly
deliberative, as they search for actions rather than
simply retrieving them. There are also several
existing systems and techniques that mix reactive and
deliberative behaviors. One example is the OASIS
system which reasons about when to be reactive and
when to follow goal-directed plans [8]. Another
example is reactive deliberation [9]. As the name
implies, it mixes reactive and deliberative behavior:
an agent reasons about which reactive behavior to
follow under the constraint that it must choose
actions at a rate of 60 Hz. Reactive deliberations was
developed on the first robotic soccer platform.
3. Sequential representation of robotic soccer
The game of robotic soccer involves a vast amount
of data with respect
to both player and ball
movement. The movement of the ball during the
course of a match is tracked to obtain a game
sequence. Also, each individual's contribution to the
game can be assessed by focusing on player
movements during the game, yielding a player
sequence. This is instrumental in characterizing a
player's contribution to the success or failure of the
game. For example, we consider a game played over
a period of 60 minutes and represent this game as a
sequence of length 60, where each letter represents
the player who is in possession of the ball at that
minute. Game 1: bcgad-bccc-g-aab—bbaggd.
and the Player sequence for player 'a' would be
represented as –
The agent has just four actuators for physically
manipulating the world: turn, dash, kick and catch.
Player a: ACTTGC-AG--TTCCCA-... .
The server only executes one of these commands for
each player at the end of each simulator cycle. If an
where '-' denotes an idle action or that the ball is in
agent sends more than one such command during the
motion. A history of games played can be collected
same
cycle,
only
one
is
executed
non-
and analyzed using the sequence analysis algorithms
deterministically.
runs
simulator
the
Since
employed frequently in bio-informatics.
asynchronously from the agents, there is no way to
keep perfect time with the server's cycle. Therefore
3.1 Algorithm for Finding Tandem Repeats
any given command could be missed by the server. It
The concept of finding tandem repeats has been
is up to the agent to determine whether a given
employed here to trace subsequences or regions that
command has been executed by observing the future
frequently repeat in the game and whether such
state of the world.
repetition is ideal for the game.
4. Proposed Work
It involves two subtasks
We propose soccer-playing agent architecture with a
• Finding all possible unique subsequences of a
sequential
analysis
component, which was
specified length.
strengthened by using CA classifier for providing
• Finding the location and number of tandem
feed back during the match.
We utilize the
repeats.
representation described in the previous sections.
The input to the first subtask is the starting and
ending lengths of the pattern and the result is the
creation of a list of unique patterns that range from
the specified lower to the upper range. This list
becomes the input to the second stage which checks
NO. OF
OCCURENCES
4
3
3
5
5
2
2
3
CACC
ACCC
ACCC
ACCC
CCCC
CCCCB
CCCAGCC
CC-G
player-a
player-b
player-d
player-c
player-a
player-b
player-a
player-d
Table 1: Task Table
Turn towards ball
A
C
G
T
ICGST-AIML Journal, Volume 8, Issue I, June 200830Figure. 1 : Sequence Driven Classifier System Architecture
Figure 2: The soccer server display. Each player is represented as a two-halved circle. The light side is the side towards which the
player is facing. All players are facing the ball, which is in the middle of the field. The black bars on the left and right sides of the
field are the goals
Shooting Behavior
We make a simple strategy for shooting the ball into
the goal. To shoot the ball to the goal, it is important
that the robot can see both ball and goal. Therefore,
the robot must round the ball until the robot can see
both ball and goal with the camera toward the ball.
Finally, the robot kicks the ball strongly. The
concrete procedure of shooting behavior is follows:
1)Find the ball
2)Approach the ball
While approaching the ball
if the area of the ball > 20 then stop
3)Round the ball
d (cid:197)the direction of the goal
switch(d) right: clockwise round the ball(AGGGT)
with the camera toward the ball(ACCCT)
left: counterclockwise round the ball(AAACT)
with the camera toward the ball(TTTAC)
if the robot can see both ball and goal then stop
4)Turn
towards
robot
the
the body of
ball(ATACT)
5) Use the CA Feed Back
6)Kick the ball strongly(AATAA)
the
ICGST-AIML Journal, Volume 8, Issue I, June 200831following dependency matrix While moving from one
state to other, the dependency matrix indicates on
which neighboring cells the state should depend. So
cell 254 depends on its state, left neighbor, and right
neighbor figure (3). Now we represented the transition
function in the form of matrix. In the case of
complement FMACA we use another vector for
representation of chromosome.
Table 4. CA Fuzzy Rules
Fig3: Matrix Representation
4.1.4 FMACA Based Tree-Structured Classifier
Cellular Automata choose the rules carefully after
trying many other possibilities, some of which caused
the cells to die too fast and others which caused too
many cells to be born. Life balances these tendencies,
making it hard to tell whether a pattern will die out
completely, form a stable population, or grow
forever. Life is just one example of a cellular
automaton, which is any system in which rules are
applied to cells and their neighbors in a regular grid.
A good way to get started in Life is to try out
different patterns and see what happens. Even
completely random starting patterns rapidly turn into
Life objects recognizable to anyone with a little
experience. In this section, we follow a simple-
looking pattern called the R-pantomime. It starts out
with just five cells, but gets complicated very fast.
We can see many of the early discoveries in Life just
by running this one pattern in the applet Like
decision
tree classifiers, FMACA based
tree
structured classifier uses
the distinct k-means
algorithm recursively partitions the training set to get
nodes (attractors of a FMACA) belonging to a single
class. Each node (attractor basin) of the tree is either
a leaf indicating a class; or a decision (intermediate)
node which specifies a test on a single FMACA,
according to equations 1,2. Suppose, we want to
design a FMACA based pattern classifier to classify a
Table 3: The Soccer server agent's commands
4.1. Cellular Automata (CA) and Fuzzy Cellular
Automata (FCA)
A CA [4], [5], [6], consists of a number of cells
organized in the form of a lattice. It evolves in discrete
space and time. The next state of a cell depends on its
own state and the states of its neighboring cells. In a 3-
neighborhood dependency, the next state qi (t + 1) of a
cell is assumed to be dependent only on itself and on
its two neighbors (left and right), and is denoted as
qi(t + 1) = f (qi−1(t), q i(t), qi+1(t)) (1)
where qi (t) represents the state of the ith cell at tth
instant of time, f is the next state function and referred
to as the rule of the automata. The decimal equivalent
of the next state function, as introduced by Wolfram,
is the rule number of the CA cell. In a 2-state 3-
neighborhood CA, there are total 256 distinct next
state functions.
4.1.1 FCA Fundamentals
FCA [2], [6] is a linear array of cells which evolves in
time. Each cell of the array assumes a state qi, a rational
value in the interval [0, 1] (fuzzy states) and changes its
state according to a local evolution function on its own
state and the states of its two neighbors. The degree to
which a cell is in fuzzy states 1 and 0 can be calculated
with the membership functions. This gives more
accuracy in finding the coding regions. In a FCA, the
conventional Boolean functions are AND , OR, NOT.
4.1.2 Dependency Matrix for FCA
Rule defined in equation 1 should be represented as a
local transition function of FCA cell. That rules are
converted into matrix form for easier representation of
chromosomes [16].
Example 1: A 4-cell null boundary hybrid FCA with
the following rule
< 238, 254, 238, 252 > (that is, < (qi+qi+1),
(qi−1+qi+qi+1), (qi + qi+1), (qi−1 + qi) >) applied
from left to right, may be characterized by the
ICGST-AIML Journal, Volume 8, Issue I, June 200832
training set S = {S1, S2, · , SK} into K classes. First, a
FMACA with k-attractor basins
is Once we
formulated the transition function, we can move form
one state to other. For the example 1 if initial state is
P (0) = (0.80, 0.20, 0.20, 0.00) then the next states
will be
P (1) = (1.00 1.00, 0.20, 0.20),
P (2) = (1.00 1.00, 0.40, 0.40),
P (3) = (1.00 1.00, 0.80, 0.80),
P (4) = (1.00 1.00, 1.00, 1.00).
We just introduced the concept of Cellular Automata
in this section. CA is a linear array of cells which
evolves in time. Each cell of the array assumes a state
qi, a rational value in the interval [0, 1] (fuzzy states)
and changes its state according to a local evolution
function on its own state and the states of its two
neighbors. The degree to which a cell is in fuzzy
states 1 and 0 can be calculated with the membership
functions. This gives more accuracy in finding the
coding regions. In a FCA, the conventional Boolean
functions are AND , OR, NOT. Figure 1,2 shows the
architecture of
sequence-driven
the proposed
classifier system. This system differs from standard
classifier systems [5] in two main ways generated.
The training set S is then distributed into k attractor
basins (nodes). Let, S’ be the set of elements in an
attractor basin. If S’ belongs to only one class, then
label that attractor basin for that class. Otherwise, this
process is repeated recursively for each attractor
basin (node) until all the examples in each attractor
basin belong to one class. Tree construction is
reported in [7]. The above discussions have been
formalized in the following algorithm. We are using
genetic algorithm classify the training set.
Algorithm 1: FMACA Tree Building (using
distinct K means algorithms)
Input : Training set S = {S1, S2, · ·, SK}
Output: FMACA Tree.
Partition(S, K)
Step 1: Generate a FMACA with k number of
attractor basins.
Step 2: Distribute S into k attractor basins (nodes).
Step 3: Evaluate the distribution of examples in each
attractor basin (node).
Step 4: If all the examples (S’) of an attractor basin
(node) belong to only one class, then label the
attractor basin (leaf node) for that class.
Step 5: If examples (S’) of an attractor basin belong
to K’ number of classes, then Partition (S’, K’).
Step 6: Stop.
First, the proposed system adds an event-analysis
section and prepares a record of past game
sequences/player sequences that are analyzed using
sequence analysis. Second, the classifier discovery
section using genetic algorithms targets only actions
while the conditions are generated using information
provided by sequence analysis. The systems also
provides for different types of reward – a large
reward for winning matches and smaller rewards that
can be obtained from succeeding in a single play,
such as passing the ball
5. Experimental Results
The Sequence Analysis algorithms were tested on
player and game sequences of varying lengths and
distinct sub sequences yielded the following results
from which various inferences for improving the next
match were made.
Client 1 sends movement commands after every
perception it receives. This strategy works out fine in
cycle t-1; but in cycle t it misses the opportunity to
act because it receives no perceptions; and in cycle
t+1 it sends two movement commands, only one of
which will be executed. Client 2, on the other hand,
successfully sends one movement command every
cycle. Note that in cycle t it must act with no new
perceptual information, while in cycle t+1, it receives
two perceptions prior to acting and one afterwards.
Ideally, it would act after receiving and taking into
account all three perceptions. However, it does not
know precisely when the simulator cycle will change
internally in the soccer server and it cannot know
ahead of time when it will receive perceptions. Thus,
in exchange for the ability to act every simulator
cycle, it sometimes acts with less than the maximal
amount of information about the world. However, as
each simulator cycle represents only a short amount
of real time (simulator_step msec), the world does
not change very much from cycle to cycle, and the
client can act accurately even if it takes some of its
perceptions into account only before its subsequent
action.
Figure 4: A sample period of the server-client
interface over the course of 3 simulator cycles at
times t-1, t, and t+1. The thick central horizontal line
represents the real time as kept by the server. The top
and bottom horizontal lines represent the time-lines
of two separate clients. The dashed arrows from the
server towards a client represent perceptions for that
client. The solid arrows from a client towards the
server represent movement commands sent by that
client. These arrows end at the point in time at which
the server executes the movement commands, namely
the end of the simulator cycle during which they are
sent. Asynchronous sensing and acting, especially
when the sensing can happen at unpredictable
intervals, is a very challenging paradigm for agents to
handle. Agents must balance the need to act regularly
ICGST-AIML Journal, Volume 8, Issue I, June 200833and as quickly as possible with the need to gather
information about the environment. Along with
asynchronous sensing and action, the soccer server
captures several other real-world complexities, as will
become evident throughout the remainder of this
section.
5.1 Entropy
Entropy is the measure of randomness of a system.
The maximum entropy (close to 1) of a system
signifies chaotic behavior, whereas low entropy
indicates ordered behavior. In case of complex
system, mean entropy is close to the critical value
0·84 with high variance. To measure the entropy, we
select a moving window of 10 time steps (w=10). The
CA rule vector is operated for 10000 time steps from
a random initial state. The mean entropy and the
standard deviation from
the mean have been
computed. For each CA the procedure is repeated for
15 times with different random initial states. The high
entropy with high standard deviation indicates that
the evolved CA performing pattern recognition task
are at the edge of chaos.
5.2 Mutual Information
Mutual information measures the correlation between
patterns generated at a fixed time interval. If a pattern
P1 is the copy of P2, then mutual information
between P1 and P2 is 1. The mutual information
between two statistically independent patterns is 0.
Both the ordered and chaotic CA rules do not create
highly correlated patterns and in effect generate
pattern set with low mutual information. On the other
hand, the complex CA rules create highly correlated
structures producing maximum mutual information.
To measure the mutual information of the patterns
generated by CA, we follow the method proposed.
These results were translated into strength values and
directly modified within the LCS. In order to justify
that this proposed architecture is indeed faster at
learning targeted behavior at a much faster pace,
conditions were
“Clean Slate”
experimental
maintained. The Classifier rule set
initially
is
completely randomly generated – to simulate a blank
knowledge base. The rule set is then generated prior
to the first iteration and the LCS was run for up to
200,000 iterations. Initialization parameters for the
Genetic Algorithm specify the algorithm to run every
4000 iterations – this interval is necessary so that the
strengths of the rule sets are given time to stabilize
after credit apportionment. The entropy and mutual
information of the CA in successive generations of
GA are reported in Figure 5,6 ,7,8
For four different CA size (n= 10, 15, 20, 30). For
each of the cases, the values of entropy and mutual
information reach their steady state once the AIS
FMACA for a given pattern set gets evolved. For
understanding the motion, the initial population (IP)
is randomly generated. All these figures points to the
fact that as the CA evolve towards the desired goal of
maximum pattern recognizing capability, the entropy
values fluctuate in the intermediate generations, but
saturate to a particular value (close to the critical
value 0·84 [245]) when fit rule
is obtained.
Simultaneously, the values of mutual information
fluctuate at the intermediate points prior to reaching
maximum value that remains stable in subsequent
generations. All these figures indicate that the CA
move from chaotic region to the edge of chaos to
perform complex computation associated with pattern
recognition. Table 3 shows the application of the
algorithm for a single game which when applied to
hundreds of games, useful inferences could be made.
The patterns thus identified through the application of
tandem repeats algorithm served to identify the risk
of threats and goals thereby enabling dynamic
decision making in future games with reference to
past history of games played. The goal sequences
identified were xxCCT, where x represents any of the
4 characters. The following is a table showing the
sequences that are likely to occur in the case of a goal
or threat and their percentage of occurrences. The
goal sequences were identified by application of the
algorithm
repeats. These
tandem
finding
for
sequences were in turn checked using the algorithm
for Trans-membrane region to find the percentage of
occurrences of these patterns in multiple numbers of
games.
Table 3: Percentage of occurrence of Goal and Threat sequences
SEQUEN
CES
95%
75%
50%
< 50%
TCCCT CACCT CxCCT CCAT
Goal
(xxCCT)
Threat CTCCC CCACC CCxCC GCAC
The Learning classifier system was first tested by
first evolving completely random classifier rules and
then placed in the environment to gage the learning
rate. Figure 2 shows the proportion of correct actions
proposed by the learning classifier system versus the
time epochs taken. Subsequent experiments were
conducted by constructing a history of 10,000 games
– and the performance of the classifier system was
observed. Figure 7. shows the performance of LCS,
an accuracy rate of nearly 75% was obtained after
merely 100,000 iterations. This is observed to be far
less when compared
to other agent
learning
mechanisms based on reinforcement learning. Given
a good balance between desired accuracy and training
time, this technique will yield a good “knowledge
base” of conditions and actions upon which the agent
will base all its responses.
ICGST-AIML Journal, Volume 8, Issue I, June 200834 6 .Conclusion
The advantage of adopting sequence analysis for
evaluating strategy is that the analysis is capable of
distinguishing individual strategy of an agent as well
the overall strategic play of the team as such. This
approach could easily be adapted towards developing
squad-based tactics of team behavior evolution, by
evolving specific strategies for specific groups - for
example, creating a group of defenders whose overall
goal is to defend their goal, and a squad of offensive
players whose only aim is to target the opposing
team's goal. Furthermore, use of advanced genetic
operations during the discovery stages could enable
the classifier system to discover better actions within
a smaller time-bound and improve the real-time
response of the system. A representation scheme for
robotic soccer in the form of biological sequence has
been presented. Two new algorithms to find repeating
patterns and
ideal game strategies similar
to
biological problems have been developed and tried on
the sequences generated. A number of sequences has
been generated from various games played and the
algorithms proved effective in analysing various
repeating patterns before a goal and finding faulty
moves. The entire system was improved by using the
feed back generated by CA Classifier.
Figure 5: Entropy & Mutation information for n=10
Figure 6: Entropy & Mutation information for n=15
Figure 7: Entropy & Mutation information for n=20
Figure 8: Entropy & Mutation information for n=30
ICGST-AIML Journal, Volume 8, Issue I, June 200835Figure 9. Graph (Proportion Correct VS Iterations)
7. References
[1] Michael Sahota, Alan K. Mackworth, Rod A.
Barman, and Stewart J. Kingdon , “Real-time
control of soccer-playing robots using off-board
vision: the dynamite testbed”, IEEE
International Conference on Systems, Man, and
Cybernetics, pages 1995 ,3690-3663.
[2] Hiroaki Kitano, Yasuo Kuniyoshi, Itsuki Noda,
Minoru Asada, Hitoshi Matsubara, and Ei-Ichi
Osawa, “ Robocup: A challenge problem for ai ”,
AI Magazine, Volume 18(Issue 1), 1997,pp. 73-
85.
[3] Needleman, S.B., Wunsch C.D., “A general
method applicable to the search for similarities in
the amino acid sequences of two proteins”,
Journal of Molecular Biology Volume 48, 2000,
pp. 443-453.
[4] Smith T.F, Waterman M.S., “Identification of
common molecular subsequences” Journal of
Molecular Biology, Volume 14, 1998,pp.95-197.
[5] Goldberg, D.E. , “ Genetic algorithms in Search
,Optimization
and Machine Learning
”,
Addison-Wesley, 1989,Reading.
[6] Tucker Balch and Ronald C. Arkin. , “ Motor
schema-based formation control for multi agent
Proceedings of
the First
robot
teams ”,
International Conference
on Multi-Agent
Systems ICMAS-95, 1995,pp. 10-16.
[7] Ran Levy and Jeffrey S. Rosenschein , ”A game
theoretic approach to the pursuit problem ”,
Working Papers of
the 11th International
Workshop on Distributed Artificial Intelligence,
1992,pp.195-21.
[8] Anand S. Rao and Michael P. George , ” BDI
agents: From theory to practice.”, Proceedings of
the First International Conference on Multi-
Agent Systems ICMAS-95, 1995, pp. 31
[9] Michael K. Sahota. , “Reactive deliberation:
An architecture for real-time intelligent control
in dynamic environments”, Proceedings of the
Twelfth National Conference on Artificial
Intelligence, pages 1303-1308,1994, pp. 184,
185, 202.
[10] P.Kiran Sree, I .Ramesh Babu ,”Identification of
Protein Coding Regions in Genomic DNA Using
Unsupervised FMACA Based Pattern Classifier”
in International Journal of Computer Science &
Network Security with
ISSN: 1738-7906
Volume Number: Vol.8, No.1,2008.
[11] P.Kiran Sree, R.Ramachandran, “Identification
of Protein Coding Regions in Genomic DNA
Cellular
Fuzzy
Supervised
Using
of
International
Automata”.in
journal
in Computer Science
Advances
and
Engineering, with
ISSN: 0973-6999, Vol:
1,2008.
[12] Eric E. Snyder ,Gary D. Stormo, “ Identification
of Protein Coding Regions
In Genomic
DNA”.ICCS Transactions 2002.
[13] E E Snyder and G D Stormo,”Identification of
coding regions in genomic DNA sequences: an
application of dynamic programming and neural
networks “ Nucleic Acids Res. 1993 February
11; 21(3): 607–613.
[14] P. Flocchini, F. Geurts, A. Mingarelli, and N.
Santoro (2000),“Convergence and Aperiodicity
in Fuzzy Cellular Automata: Revisiting Rule
90,”Physica D.
[15] P. Maji and P. P. Chaudhuri (2004),“FMACA:
A Fuzzy Cellular Automata Based Pattern
Classifier,” Proceedings of 9th International
Conference on Database Systems , Korea, pp.
494–505, 2004.
[16] C.G. Langton (2000), “Self-reproduction in
cellular automata,” Physica D, vol.10, pp.135–
144.
[17] T. Toffoli(1998), “Reversible computing,” in
Automata, Languages and Programming,
ed. J.W. De Bakker and J. Van Leeuwen,
pp.632–644.
[18] G. Vichniac(1994), “Simulating physics with
cellular automata,” Physica D,vol.10, pp.96–
115.
ICGST-AIML Journal, Volume 8, Issue I, June 200836[19] S. Chattopadhyay, S. Adhikari, S. Sengupta, and
M. Pal (2000), “Highly regular, modular, and
cascadable design of cellular automata-based
pattern classifier,” IEEE Trans. Very Large
Scale Integr. Syst., vol.8, no.6,
[20] J. Fickett (1982), “Recognition of protein coding
regions in dna sequences,”Nucleic Acids Res.,
vol. 10, pp. 5303–5318.
[21] B. E. Blaisdell(1983), “A prevalent persistent
global non randomness that distinguishes
coding and non-coding eukaryotic nuclear dna
sequence,” J. Molec. Evol., vol. 19, pp. 122–
133.
[22] R. Farber, A. Lapedes, and K. Sirotkin(1992),
“Determination of eukaryotic protein
coding regions using neural networks and
information theory,” J. Mol. Biol., vol. 226, pp.
471–479
[23] E. Uberbacher and R. Mural(1991), “Locating
protein-coding regions in human dna sequences
by a multiple sensor-neural network approach,”
Proc. Natl. Acad. Sci., USA, vol. 88, pp. 11261–
11265.
[24] Aickelin U and Cayzer S (2002): The Danger
Theory and Its Application to AIS, Proceedings
1st International Conference on AIS, pp 141-148,
Canterbury, UK.
[25] D. Dasgupta, 1999. Artificial Immune Systems
and Their Application. Berlin, Germany:
Springer-verlag.
[26] Jerne, N. K. (1974), “Towards a Network Theory
of the Immune System”, Ann. Immunol. (Inst.
Pasteur) 125C, pp. 373-389.
Biography
P.KIRAN SREE received his
B.Tech in Computer Science &
Engineering, from J.N.T.U and
in Computer Science &
M.E
Engineering
from
Anna
University. He is pursuing Ph.D
in Computer Science
from
J.N.T.U, Hyderabad. He has
published many
technical papers; both
in
international and national Journals& Conferences
.His areas of interests include Cellular Automata,
Parallel Algorithms, Artificial
Intelligence,
Compiler Design and Computer Networks. He also
wrote books on Analysis of Algorithms, Theory of
Computation and Artificial Intelligence. He was the
reviewer for many International Journals and IEEE
Society Conferences in Artificial Intelligence and
Networks. He was also member
in many
International Technical Committees. He was the
Associate Editor for Asian Journal of Scientific
Research (ISSN: 1992-1454), Journal of Artificial
Intelligence
(ISSN:
1994-5450),
Information
Technology Journal (ISSN: 1812-5646), Journal of
Software Engineering (ISSN: 1819-4311), and
Research Journal of Information Technology. He
was also invited speaker and organizing chairman
for special sessions
in WSEAS
international
conferences. He is the member of C.S.I, I.E.T.E,
I.S.T.E (India), ICST (Europe) and IAENG (U.S.A).
He is now associated with S.R.K Institute of
Technology, Vijayawada
G.V.S.Raju
is working as a
Professor in the Department of
C.S.E, Swarnandhra Engineering
College, Narasapuram, West
Godavari , Dt. He has published
good number of papers
in
international conferences.
journals
Dr S. Viswanadha Raju is
working as a Professor
in
Department of CSE, Gokaraju
Rangaraju Engineering College,
Hyderabad. He has published
good number of papers both in
international conferences and
N.S.S.S.N Usha Devi was a
graduate student of C.S.E from
J.N.T.U. She has published 5
research papers in international
conferences
in
two
and
international journals
ICGST-AIML Journal, Volume 8, Issue I, June 200837 |
1507.03826 | 1 | 1507 | 2015-07-14T12:41:14 | Modelling Structured Societies: a Multi-relational Approach to Context Permeability | [
"cs.MA",
"cs.SI",
"physics.soc-ph"
] | The structure of social relations is fundamental for the construction of plausible simulation scenarios. It shapes the way actors interact and create their identity within overlapping social contexts. Each actor interacts in multiple contexts within different types of social relations that constitute their social space. In this article, we present an approach to model structured agent societies with multiple coexisting social networks. We study the notion of context permeability, using a game in which agents try to achieve global consensus. We design and analyse two different models of permeability. In the first model, agents interact concurrently in multiple social networks. In the second, we introduce a context switching mechanism which adds a dynamic temporal component to agent interaction in the model. Agents switch between the different networks spending more or less time in each one. We compare these models and analyse the influence of different social networks regarding the speed of convergence to consensus. We conduct a series of experiments that show the impact of different configurations for coexisting social networks. This approach unveils both the limitations of the current modelling approaches and possible research directions for complex social space simulations. | cs.MA | cs |
Modelling Structured Societies: a Multi-relational
Approach to Context Permeability
Davide Nunesa,∗, Luis Antunesa
aGUESS/BioISI -- Instituto de Biosistemas e Ciencias Integrativas, Faculdade de Ciencias,
Universidade de Lisboa, 1749-016 Lisboa, Portugal.
Abstract
The structure of social relations is fundamental for the construction of plausible
simulation scenarios. It shapes the way actors interact and create their identity
within overlapping social contexts. Each actor interacts in multiple contexts
within different types of social relations that constitute their social space. In this
article, we present an approach to model structured agent societies with multiple
coexisting social networks. We study the notion of context permeability, using a
game in which agents try to achieve global consensus. We design and analyse two
different models of permeability. In the first model, agents interact concurrently
in multiple social networks.
In the second, we introduce a context switching
mechanism which adds a dynamic temporal component to agent interaction in
the model. Agents switch between the different networks spending more or
less time in each one. We compare these models and analyse the influence of
different social networks regarding the speed of convergence to consensus. We
conduct a series of experiments that show the impact of different configurations
for coexisting social networks. This approach unveils both the limitations of
the current modelling approaches and possible research directions for complex
social space simulations.
Keywords: Social Simulation and Modelling, Agent Societies, Consensus,
Context, Social Networks
'
∗Corresponding author
Email addresses: [email protected] (Davide Nunes),
[email protected] (Luis Antunes)
Preprint submitted to Elsevier
September 5, 2018
1. Introduction
In most simulations of complex social phenomena, agents are considered to in-
habit a space in which structure is very simple. This space has little resemblance
with the social world it is supposed to depict and for which conclusions are sup-
posed to be extrapolated. This simplicity does not come by chance, rather, it
is necessary and desired by the researchers: the problems to be approached are
themselves so complex that whichever factors of complexity can be reduced (or
at least postponed), the reduction is always welcome. So, it is common practice
that geographical space is reduced to a two-dimensional grid, and all social re-
lations between agents are condensed into one more or less structured abstract
relation. Most social simulation and modelling approaches disregard the fact
that we engage in multiple social relations. Moreover, each kind of social rela-
tion can possess distinctive characteristics that include: rich information such
as degree of connectivity, centrality, trust, interactions frequency, asymmetry,
and so on.
To explore the addition of multiple relations and its consequences for the
dissemination of phenomena in social simulations, we put forward to reduce
the emphasis given on agent individual interactions. We accomplished this by
choosing a simple -- and especially neutral -- game to model those interactions.
Our main concern was that the game itself would not provide biases or trends
in the collective phenomenon being studied, so we chose the consensus forma-
tion game, with a straightforward majority rule to decide the outcome of each
individual move.
While most models are simplified descriptions -- reductions -- of real-world
phenomena, many constitute complex systems themselves and thus, we need
techniques such as simulation to explore their properties. We can make a
distinction between two types of complexity: the complexity of real systems
(ontological complexity) and the complexity of models (descriptive complex-
ity) [1]. The levels of abstraction in a simulation model can then range from
data-driven paradigms to more abstract descriptions that allow us to create
what-if-scenarios. The study of this abstract descriptive complexity in simu-
lation models is as valuable as its data-driven counterpart. We may not be
able to make predictions based on the direct application of such models; but,
their study can inspire the engineering of artificial complex systems and reveal
properties with applications beyond the explanation of observable phenomena.
Studying consensus formation can thus advance our understanding of related
real-world social phenomena.
Examples of thematic real-world phenomena in social simulation models in-
clude for instance the joint assessments of policies or, in the context of economics
and politics, the voting problem. Herbert Simon's investigations on this problem
were one of the first stepping stones to the field of social simulation [2]; which
then inspired models (like the one we present in this article) related to evolution
and dissemination of opinions, which we call opinion dynamics. In agent-based
opinion dynamics, agent interactions are guided by social space abstractions.
In some models, the dimensionality and structure of this space is irrelevant
2
(any agent can interact with any other agent). Other models use an underlying
artefact that structures agent neighbourhoods. Axelrod for instance, represents
agent neighbourhoods as a bi-dimensional grid in its model of dissemination
of culture [3]. In an attempt to mimic real social systems, one can also make
use of complex network models to create the infrastructure that guides agent
interaction (see [4] for an example).
In real-world scenarios, actors engage in a multitude of social relations dif-
ferent in kind and quality. Most simulation models don't explore social space
designs that take into account the differentiation between coexisting social net-
works. Modelling multiple coexisting relations was an idea pioneered by Peter
Albin in [5] but without further development. The process of interacting in these
different complex social dimensions can be seen as the basis for the formation
of our social identity [6, 7].
In this article, we explore the of modelling opinion dynamics with multiple
social networks. We look at how the properties of different network models in-
fluence the convergence to opinion consensus. We present a series of models that
use these networks in different ways: which create distinct emergent dynamics.
We want to study the consequences of using multiple social networks at the
same time while maintaining the interaction model as simple and abstract as
possible (following the methodology in most opinion dynamics literature). We
present two models where agents can: interact at the same time in the multiple
networks (choosing partners from any network); or switch between networks
(choosing only partners from their current network).
1.1. Article Structure
This article is organised as follows. In the next section, we present the work
related to opinion dynamics, social space modelling and complex network mod-
els. In the following section, we describe our game of consensus and introduce
our multiple model variations. These are designed to study the notion of con-
text permeability and consensus formation in multiple social networks. Section
4 describes the experimental setup; the set of tool and methodologies followed
to conduct our investigations. In section 5, we present and discuss our results
and compare the different simulation models. Finally, we summarise what we
learned from our experiments and point out future research directions.
2. Related Work
In this section, we present work related to opinion dynamics, social space mod-
elling, and complex network models.
2.1. Opinion Dynamics and Consensus Formation
Formal opinion dynamics models provide an understanding, if not an analysis, of
opinion formation processes. An early formulation of such models was created
as a way to understand complex phenomena found empirically in groups [8].
The work on consensus building (in the context of decision-making) was first
3
studied by DeGroot [9] and Lehrer [10]. Empirical studies of opinion formation
in large populations have methodological limitations. Computational sociology
arises with a set of tools -- simulation models in particular -- to cope with such
limitations. We use multi-agent simulation (MAS) as a methodological frame-
work to study such social phenomena in a larger scale. Most opinion dynamics
models make use of binary opinion values [11, 12], or continuous values [13, 14].
For a detailed analysis over some opinion dynamics models, refer to [15].
Opinion dynamics models allow us to discover under which circumstances
a population of agents reaches consensus or polarisation. Agent-based models
can have broader application outside social simulation though.
In computa-
tional distributed systems, consensus is a means by which processes agree on
some data value needed during computation. Typically, this agreement is the
result of a negotiation process (often with the aid of a mediator). In human soci-
eties, social conventions emerge to deal with coordination and subsequently with
cooperation problems [16]. These conventions are regularities of behaviour that
can turn normative if they come to be persistent solutions to recurrent prob-
lems. MAS are also capable of producing emergent conventions in coordination
or cooperation problems [17]. The decentralised nature of these computational
models of consensus is highly desirable for dynamic control problems. In these
scenarios, creating conventions before hand (off-line), or developing a central
control mechanism for generating them, can be a difficult and intractable task:
either due to the uncertainty and complexity associated with the environment,
or due to the system scale and heterogeneity (which makes it very difficult to
handcraft each component).
Consensus models are also investigated as means to create conventions in
MAS. Shoham and Tennenholtz create a bridge between economic literature
and machine learning by studying a series of models in which multiple agents
are engaged in learning a particular convention [18]. They call this process co-
learning. The complexity of these systems comes from its concurrent nature:
one agent adapts to the behaviour of another agents it has encountered, these
other agents update their behaviour in a similar fashion, which results in a
highly non-linear system dynamics.
In their work, Shoham and Tennenholtz
define the notion of stochastic social games and compare different rules with
the objective of establishing conventions in a decentralised fashion.
In their
stochastic games, they present one particular rule that we use in our models:
Definition 1. External Majority (EM) update rule: adopt action i if so far it
was observed in other agents more often than other action and remain with your
current action in the case of equality.
This EM rule was shown to coincide with Highest Cumulative Reward (HCR),
which is a simple rule that states that "an agent should adopt an action that
has yielded the highest cumulative reward to date." We use the EM rule in our
simulation models for its simplicity and success in the evolution of conventions.
4
2.2. Social Structure in Simulation Models
The usage of a bi-dimensional grid to represent abstract social spaces in simula-
tion models, is one of the most widely used approaches in the agent-based simu-
lation and modelling literature. This has its origins in the "checkerboard" model
introduced in computational social sciences by Schelling and Sakoda [19, 20].
Another famous example that uses bi-dimensional grids as social structure is
the social simulation model of dissemination of culture from Axelrod [3].
Cellular automata (CA) are an example from the area of artificial life that
also makes use of bi-dimensional structures to model neighbourhood interac-
tions. While these models are idealised frameworks, their exploration can bring
us deeper insights than models with high level of descriptive complexity (which
would render their analysis very difficult). The work of Flache and Hegsel-
mann relaxes the standard CA assumptions about the regular bi-dimensional
grids by considering irregular grid structures (Voronoi diagrams) [21]. They
present results on the robustness of some important general properties in re-
lation to variations in the typical grid structure. There are also contributions
that incorporate both the complexity of network models and the behaviour of
dynamic processes. One example is the work in [22], which explores a graph-
based cellular automaton to study the relationship between spatial forms of
urban systems and the robustness of different process dynamics under spatial
change. Moreover, this shows how we can use real geographical information
to construct graph-based cellular automata (thus making a connection between
purely abstract models and data-driven models).
Finally, another type of social space models are the random graph/network
models. Each complex network -- or class of complex networks -- captures spe-
cific topological properties. These properties are found in real-world network
structures. One of the first complex network models is the random graph from
Erdos and R´enyi [23]. Other examples include the model of preferential attach-
ment [24], and the small-world networks [25]. One common issue of these models
is the fact that once generated, the network structure is static. The models are
not really suitable for the description of highly dynamic groups or communities.
An example of a model that takes such dynamics into account is the model of
team formation in [26]. A more in-depth review of network models (and their
properties) is given in [27].
3. Multi-context Models
In this section, we present our modelling approach to explore the concept of
permeability between contexts. We use multiple social networks to represent
the complex social space in which an agent is inserted. In a simulation model,
this setting can be seen as a n-dimensional scenario where each dimension con-
tains a network that represents a different social relation (see figure 1). The
word "context" is used in many different senses and it is by itself subjected to
many analysis [28]. Here, we use the term social context in a simpler and more
strict way. Agents belong to distinct social contexts which are their neighbour-
hoods in these multiple networks. The social context of an agent is thus a set
5
of neighbours currently available for interaction at a particular network or set
of networks. Context permeability is the ability of a particular norm, strategy,
opinion, or trend, to permeate from one social relation to another. Agents be-
longing to disjoint neighbourhoods in different networks serve as bridges between
subsets of the population that wouldn't otherwise be influenced by a consensus
formed in a distant coalition.
Figure 1: Multiple social network structure that shapes the social space
in our simulation models.
We study the notion of context permeability in different simulation models
in which agents interact using a simple consensus game. The society of agents
has to adopt a binary opinion value according to a majority rule. We use the
speed of consensus as a measure for self-organisation and explore the relationship
between different network topologies and this measure.
We partitioned the design space of our experiments using different simu-
lation models. Each model is designed to analyse different aspects of context
permeability. In a first model [29, 30], we study the notion of permeability by
overlapping social networks.
In a second model [12], we analyse the dynam-
ics introduced by switching between social contexts(neighbourhoods in different
networks). This adds a temporal component that changes the dynamics of the
game: agents can only perform encounters with neighbours that are active in
their current context. (It also adds the chance for some agents to be isolated
during the simulation.)
3.1. Simulation and Consensus Game
Our agent-based models are designed as discrete-event models. On each simula-
tion cycle, every agent executes a simulation step. The agents are selected in a
random uniform fashion for execution. This is common practice in agent-based
simulation and guarantees that there is no bias caused by the order in which
the agents are executed. For each simulation model, we present a description
of the individual agent behaviour. Every model we present can be seen as a
binary opinion dynamics model, or a consensus game. In this game, the soci-
ety of agents tries to reach an arbitrary global consensus about two possible
choices or opinion values. During a simulation run, each agent keeps track of
the number of each opinion value of their interaction partners. In each itera-
tion, each agent selects an available neighbour to interact with and observes its
current opinion value. The agent decides to switch its current opinion choice
6
if the observed opinion value becomes the majority of the two possible choices.
The goal of the game is to reach a global consensus, but the particular choice
that gets collectively selected is irrelevant. What is important is that overall
agreement is achieved. In the consensus game we consider, each agent uses the
previously presented external majority (EM) rule to update its opinion value
(see definition 1 in section 2).
The reason we are not interested in which exact option gets selected is the
same reason why we chose such a content-neutral game for the individual inter-
actions. From the very beginning, our research questions were focused on the
collective properties, the structure of the networks involved, and the dynami-
cal outcomes of the simulations: thus leaving out issues related with individual
motivations and desired results (either for any individual agent or the society).
Granted, most applications of this research will often include such goals, for
inquisition into complex social issues, including possibly policy design, in which
the individual rationality must be considered, and will have a very strong influ-
ence on the collective outcomes.
3.2. Context Permeability
The first model of context permeability [29, 30] is designed to study the setting
where an agent is immersed in a complex social world: where it engages in
a multitude of relations with other agents.
In this model, we consider that
the context permeability is created by agents that can belong simultaneously to
several relations. As an example, two agents can be simultaneously family and
co-workers. While some links might not connect two agents directly, others can
contain neighbourhoods in which they are related (either directly or through a
common neighbour). Model 1 describes the behaviour of each agent for each
simulated step.
7
Model 1 Context Permeability
M {Simulation Model / Environment}
A {Current Agent in Execution}
{Randomly select a network}
r ← randomUniform(0,M.networks.length())
network ← M.networks[r]
{Randomly select a neighbour}
neighbours ← network.neighboursOf(A)
r ← randomUniform(0,neighbours.length())
partner ← neighbours[r]
{Update opinion and memory}
{opinions take the values {0,1} -- so they can be used as an index}
A.memory[partner.opinion]++
if (A.memory[partner.opinion] > A.memory[A.opinion]) then
A.opinion ← partner.opinion
end if
In this model, on each time step, each agent select a random neighbour from
any social network available and updates its opinion based on the opinion of the
selected partner using the external majority rule.
3.3. Context Switching
In the context switching model [12], agents are embedded in multiple relations
represented as static social networks and they switch contexts with a probability
ζCi associated with context Ci. The switching probability is the same for every
agent in a given network. Each agent switches from its current neighbourhood
to another network. The agents are only active in one context at a time, and
can only perform encounters with neighbours in the same context. We can think
of context switching as a temporary deployment in another place, such as what
happens with temporary immigration. The network topology is static; when
an agent switches from one network to another, they become inactive in one
network and active in their destination.
8
Model 2 Context Switching
M {Simulation Model / Environment}
A {Current Agent in Execution}
{Get the current network (context is a network index)}
cNetwork ← M.networks[A.context]
{Get the neighbours for the current network}
neighbours ← cNetwork.neighboursOf(A)
{filter by agents active in the same network}
neighbours ← {n n ∈ neighbours ∧ (n.context = A.context)}
{Randomly select a neighbour}
r ← randomUniform(0,neighbours.length())
partner ← neighbours[r]
{Update opinion and memory}
{opinions take the values {0,1} -- so they can be used as an index}
A.memory[partner.opinion]++
if (A.memory[partner.opinion] > A.memory[A.opinion]) then
A.opinion ← partner.opinion
end if
{Switch to another network}
switchingProb ← M.params.switchingProb(A.context)
r ← randomUniform(0,1)
if (r < switchingProb) then
numNets ← M.networks.length()
nextNetworks ← {i (i ∈ [0,numNets[) ∧ (M.networks[i] != A.context)}
r ← randomUniform(0,nextNetworks.length())
A.context ← nextNetworks[r]
end if
In this model, agents select an (active) partner from their current neighbour-
hood. If a partner is available, the agents update their opinion value based on
EM. At the end of the interaction, the agent switches from the current context
to a different one with a probability associated with its current context.
This model describes an abstract way to represent the time spent on each
network using the switching probability ζCi. Here, the permeability between
contexts is achieved using this temporal component. Context switching intro-
duces a notion that has not been explored in the literature so far: the fact that,
although some social contexts can be relatively stable, our social peers are not
always available for interaction and spend different amounts of time in distinct
social contexts.
9
4. Experimental Setup
In this section, we present all the tools and processes necessary to produce
the current research output. The experiments were developed using the MA-
SON [31] simulation framework written in Java. All the code for the simulation
models can be found here [32]. Moreover, all the results presented in this article
were made reproducible by using the statistical computing language R [33] and
the R package knitr [34]. Knitr is used for generating reports that contain the
code, the results of its execution (plots and tables), and the textual description
for such results. All the R code used to produce the data analysis and the
configuration files used to reproduce the data can be found in [35].
For each configuration in our experiments, we performed 100 independent
simulation runs. The results are analysed in terms of value distribution, average
and standard deviation, or variance over the 100 runs. Like we described in
section 3.1, our models are discrete-event models. In each cycle agents execute
a step in a random order: this is so that this dynamical system -- our simulation
model -- is not influenced by the order in which agents are executed. Simulations
end when total consensus is achieved or 2000 steps have passed.
4.1. Social Network Models
The social networks used in our models are k-regular and scale-free. A k-regular
network is a network where all the nodes have the same number of connections.
These networks are constructed by arranging the nodes in a ring and connecting
each node to their next k neighbours. Each network has 2k edges per vertex.
Scale-free networks are networks in which the degree distribution follows
a power law, at least asymptotically. That is, the fraction P (k) of nodes in
the network having k connections to other nodes goes for large values of k
as: P (k) ∼ k−γ where γ is a parameter whose value is typically in the range
2 < γ < 3.
We use the method proposed in [24] by Barab´asi and Albert to construct the
scale-free network instances using a preferential attachment. This model builds
upon the perception of a common property of many large networks: a scale-
free-power-law distribution of node connectivity. This feature was found to be a
consequence of two generic mechanisms: networks expand continuously by the
addition of new vertices, and new vertices attach preferentially to sites that are
already well connected (more commonly known as "preferential attachment").
In these networks, the probability P (k) of two nodes being connected to each
other decays as a power law, following P (k) ∼ k−γ.
The network instances were generated using the b-have network library [36].
This is a Java library that allows the creation and manipulation of network/graph
data structures. It also includes the more commonly used random network mod-
els from the literature.
4.2. Measuring Network Properties
We measure two structural properties of our networks: the average path length
and the clustering coefficient. The average path length measures the typical sep-
aration between two vertices in the graph. The clustering coefficient measures
10
the average cliquishness of the graph neighbourhood. This measure quantifies
how close the neighbours of a node are to forming a clique. Duncan J. Watts and
Steven Strogatz [25] introduced the measure to characterise a class of complex
networks called small-world networks.
These properties characterise structures that can be found in the real scenar-
ios. The small-world networks generated by the models of Watts and Strogatz
for instance, model real-world social networks with short average path length,
local clustering structures, and triadic closures between the nodes [25]. One
shortcoming of this model, is the fact that these networks do not possess node
hubs found in many real-world social networks. (Nevertheless, these models are
designed to create networks with specific properties, not as general models for
all kinds of real social networks)
Since we construct scenarios where we overlap highly clustered k-regular
networks and scale-free networks with node hubs, we are interested in the kind
of properties that emerge from merging these structures -- and if/how they are
comparable to the existing models -- . The networks were produced by the b-
have network library [36], exported to files, and analysed using the igraph R
package [37].
5. Results and Discussion
In this section, we analyse and discuss the results for different experiments
with both the context permeability and context switching models. We start by
analysing the structural properties that arise from combining different networks.
We then observe the impact of different model configurations in the convergence
to consensus. We correlate the outcomes of our context permeability model sim-
ulations with the structural properties of the multi-network structures. We also
explore how the new dynamics introduced by the context switching mechanism
affects the consensus building process.
5.1. Overlapping Network Properties
In this first analysis, we investigate the properties of different network topologies
used in our models. One of the parameters in some experiments is the number
of networks in which the agents interact. Adding more networks implies the
addition of more connections. We show that what is important is not just the
the number of connections, but the properties of the resulting structure (when
we merge the networks). We analyse the networks as follows.
Each network is generated in such a way that the node indexes are ran-
domised. This means that we can have multiple networks with the same topol-
ogy and each node can have different neighbourhoods in different networks.
Also, neighbourhoods do not necessarily overlap due to the node shuffling.
Adding more networks to the social space is not the same as creating a sin-
gle network with twice the number of connections.
11
Figure 2: Overlapping of two k-regular networks, each with k=10.
Table 1: Properties for overlapping of two k-regular networks, each with
k=10.
Nodes Edges Clustering Coef. Avg. Path Length
10-regular 1
10-regular 2
Combined
20-regular
100
100
100
100
1,000
1,000
1,790
2,000
0.711
0.711
0.512
0.731
2.980
2.980
1.638
1.788
Consider figure 2. We created two random k-regular networks with k=10 and
merged them ignoring edges from common neighbours. (In the simulation mod-
els this edge agglutination is not performed, we use it here for the purposes of
network analysis.) Common edges are highlighted with a different colour.
The networks are drawn using the
Kamada-Kawai Layout [38] which treats
the "geometric" (Euclidean) distance be-
tween two vertices in the drawing as the
"graph theoretic" distance between them
in the corresponding graph. We can
see by the results of the layout in fig-
ure 2, that the distance between nodes
in the network has decreased, this is also
confirmed by the reduced average path
length of the combined networks (see ta-
ble 1). To illustrate our point, we anal-
ysed one k-regular network with k = 20
(see figure 3 and the corresponding entry on table 1). The clustering coefficient
of a 20-regular network is approximately the same as the one of a 10-regular
network (higher than the combination of two 10-regular networks). The average
path length also decreases as there are more connections between previously dis-
tant nodes. As we will show, these properties may vary due to the node indexes
being subjected to random permutations.
Figure 3: Single k-regular
network with k=20.
12
10−Regular 1llllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll10−Regular 2llllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllCombined 10−RegularsllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllK−Regular with K=20llllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllSince we model the agent social space as a multitude of networks, we need
to investigate the properties resulting from the merging of these networks. We
do this empirically by taking the network instances used in the simulations, and
analysing the distribution of clustering coefficient and average path length for
the different configurations.
5.1.1. Properties of Overlapping K-Regular Networks
We will now investigate what kind of properties we can get from merging k-
regular networks. First, we analysed the distribution for the average path length
and the clustering coefficient values over 100 network instances (each with 100
nodes). From a box plot preliminary analysis (see figures A.2 and A.1), we can
see that the average path length does not vary much for the 100 instances, as
such, the average makes a good descriptor for these properties.
Figure 4 shows the average value for the average path length of 100 k-regular
network instances (each with 100 nodes). We can see that the average path
length changes more drastically when we go from 1 to 2 networks. This is
precisely the effect we can see in figure 2. Merging these networks at random
effectively creates multiple shortcuts between points that were not connected in
the original k-regular topology. Beyond this point, adding more networks does
not modify this structural property in a significant way. Note that, since each
network has 100 nodes, with k = 50 the network is fully connected (hence the
average path length being 1).
(a)
(b)
Figure 4: Average value for the average path length of 100 instances
of overlapping k-regular networks (containing 100 nodes each) with
k={1,2,3,4,5} (4a), and k= {10,20,30,40,50} (4b).
Figure 5 shows the results for the average clustering coefficient of 100 instances
of overlapping k-regular networks. Adding multiple networks changes the clus-
tering coefficient of the resulting structure. For k ≤ 20, the clustering coefficient
drops when we add a second network. This happens because when we merge
these networks, their connectivity is not high enough to generate shortcuts with
13
lllll51015202512345Number of NetworksAverage of Average Path LengthKl12345lllll1.01.52.02.53.012345Number of NetworksAverage of Average Path LengthKl1020304050tightly clustered neighbourhoods. The clustering coefficient is computed by
taking the average local clustering coefficient of each node in the network. An
initial highly clustered k-regular network (with all the nodes having the same
structure) is affected when you modify the node neighbourhoods in such a way
that some are more clustered than others. Networks with k = 1 have a ring-like
structure, so there are no nodes forming a clique1 with their neighbours.
(a)
(b)
Figure 5: Average value for the clustering coefficient of 100 instances
of overlapping k-regular networks (containing 100 nodes each) with
k={1,2,3,4,5} (5a), and k = {10,20,30,40,50} (5b).
5.1.2. Properties of Overlapping Scale-free Networks
We also looked at the properties that result from merging scale-free networks
(see figure A.3). Like the previous results, the properties don't vary much
between the 100 different instances. We can then say that specific configurations
display a specific average path length and clustering coefficient both for k-regular
networks and scale-free networks. We plotted the average of the average path
length (figure 6a) and clustering coefficient (figure A.3b) for each overlapping
network configuration.
1A clique is a group of nodes such that every two nodes are connected by an edge.
14
lllll0.00.20.40.612345Number of NetworksAverage of Clustering CoefficientKl12345lllll0.50.60.70.80.91.012345Number of NetworksAverage of Clustering CoefficientKl1020304050(a)
(b)
Figure 6: Average value for the average path length (A.3a) and clustering
coefficient (A.3b) for 100 instances of overlapping scale-free networks
(containing 100 nodes each).
The parameter d (figure 6) dictates how many edges are added by preferential
attachment (see section4.1). For d = 1, the resulting network is a forest: a
network composed of disjoint tree graphs. Figure 6a shows us that the average
path length still decreases consistently when we add more networks. One of the
characteristics of scale-free networks is its short average path length, thus, for
d ≥ 2, adding more edges does not make a significant difference. Scale-free
networks also have a reduced clustering coefficient (see figure 6b). When we
add more networks the clustering coefficient increases.
5.1.3. Merging K-Regular with Scale-Free Networks
Finally, we look at what happens when we merge k-regular networks with scale-
free networks. We didn't make an exhaustive analysis for this configuration,
but we show what is the resulting structure of such merging. You can see in
figure 7 that this results in a network with a lower average path length due to
the shortcuts created by the scale-free network. It is also less dense than the
structure with two 10-regular networks (figure 2). We consider only the merging
of two networks.
15
lllll23412345Number of NetworksAverage of Average Path LengthDl12345lllll0.00.10.20.30.412345Number of NetworksAverage of Clustering CoefficientDl12345Figure 7: Overlapping of a 10-regular with a scale-free network with
D=2.
(a)
(b)
Figure 8: Average average path length for 100 instances of heterogeneous
network configurations: one scale-free with d = {1, 2, 3, 4, 5} and one k-
regular network with k = {1, 2, 3, 4, 5} (8a) and k = {10, 20, 30, 40, 50}
(8b). (See the respective box plots in the appendix: figure A.4).
Figure 8 shows the average path length of 100 independently generated in-
stances of combinations of one k-regular network and one scale-free network
with different values k and d respectively. For configurations where the k-regular
networks have low values of k (figure 8a), adding a scale-free network always de-
creases the average path length. Moreover, the higher the d, the lower the path
length (as more connections are formed between different nodes). With higher
values of k (figure 8b) however, increasing the value of d does not decrease the
average path length. This is not surprising given the level of connectivity of this
structure. The first network is already highly dense and connected, so adding
a few extra connections doesn't matter; what does matter is that we have a
scale-free network creating shortcuts between nodes that were not previously
connected.
16
10−Regular NetworkllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllScale−Free with D = 2llllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllCombined Networkslllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll1.82.12.42.73.03.312345DAverage of Average Path LengthKl12345lllll1.21.51.812345DAverage of Average Path LengthKl1020304050(a)
(b)
Figure 9: Average clustering coefficient for 100 instances of hetero-
geneous network configurations: one scale-free with d = {1, 2, 3, 4, 5}
and one k-regular network with k = {1, 2, 3, 4, 5} (A.3b) and k =
{10, 20, 30, 40, 50} (See the respective box plots in the appending: fig-
ureA.5).
Figure 9 shows the results for the clustering coefficient. These are similar to
the results we get for k-regular networks (see figure 5). The difference is that
we are not adding more networks but rather increasing the parameter d of the
scale-free (number of connections added by preferential attachment for each
note). In this case, the effects are qualitatively similar with the ones of merged
k-regular network with low value of k. In contrast, for high values of k (figure
9b), a higher value of d is not enough to make the network more clustered.
This happens because scale-free networks are more sparse and have a very low
number of triangles between nodes.
5.2. Context Permeability
In this section, we discuss the results for various sets of experiments on the con-
text permeability model [29, 30]. First, we used k-regular and scale-free networks
with our model. Each network layer was configured with the same topology. We
analyse the context permeability model in terms of convergence to consensus:
the ratio of simulations that converged to total consensus over 3000 runs; and
how many agent encounters were needed for this to happen.
5.2.1. Convergence Ratio
To analyse the ratio of convergence to consensus for different network configu-
rations, we correlate this ratio with the properties that the combined network
structure exhibits. As we have seen in section 5.1, the properties don't vary
much for different random instances, so we use the average as the descriptor for
these properties.
The following tables show the results of our simulations. Table 2 shows
the percentage of total consensus achieved with 2000 cycles for 3000 runs. For
17
lllll0.10.20.30.40.512345DAverage of Clustering CoefficientKl12345lllll0.50.60.70.80.91.012345DAverage of Clustering CoefficientKl1020304050k-regular networks with a small k, consensus is rarely achieved with a single
network. However, as soon as we add more networks, consensus is achieved in
a significantly greater number of occasions. These results are especially inter-
esting for the scale-free networks (table 3): as soon as we add more networks,
for a scale-free with d ≥ 2, we can achieve consensus in a lot of occasions. This
is to show that achieving consensus is not just a matter of connectivity. With
scale-free networks, we can achieve consensus more often with less clustered
networks. This convergence is achieved not because of the clustering coefficient
but rather due to lower average path length. This is difficult to visualise us-
ing only the tables and the previous plots so, to confirm this hypothesis, we
measured the Spearman's correlation 2 between the ratio of convergences to con-
sensus, the average average path length, and the average clustering coefficient
for the corresponding network configurations (see table 4).
Table 2: Ratio of convergence to total consensus in 3000 independent
runs with with a number of concomitant networks (# nets.) equal in
kind: k-regular networks with k = {1, 2, 3, 4, 5, 10, 20, 30, 40, 50}.
# nets.
1
2
3
4
1
2
3
4
5
0.00
0.08
0.66
0.88
0.95
0.00
0.59
0.94
0.99
0.99
0.00
0.81
0.98
1.00
1.00
0.01
0.90
0.99
1.00
1.00
value for k
5
10
0.02
0.93
0.99
1.00
1.00
0.18
0.98
1.00
1.00
1.00
20
30
40
50
0.67
1.00
1.00
1.00
1.00
0.97
1.00
1.00
1.00
1.00
1.00
1.00
1.00
1.00
1.00
1.00
1.00
1.00
1.00
1.00
Table 3: Ratio of convergence to total consensus in 3000 independent
runs with a number of concomitant networks (# nets.) equal in kind:
scale-free networks with d = {1, 2, 3, 4, 5}.
# nets.
1
2
3
4
value for d
1
2
3
4
5
0.00
0.28
0.78
0.93
0.97
0.29
0.93
0.99
1.00
1.00
0.86
0.99
1.00
1.00
1.00
0.96
1.00
1.00
1.00
1.00
5
0.99
1.00
1.00
1.00
1.00
2The Spearman's rank correlation coefficient is a non-parametric measure of statistical
dependence between two variables. It assesses how well the relationship between two variables
can be described using a monotonic function.
18
Table 4: Spearman's correlation between convergence ratio (CR), average aver-
age path length (APL) and clustering coefficient (CC) along with the respective
p-value and confidence interval, for a confidence level of 95%.
network model
X
Y
Correlation CI(95%)
k-regular CR APL
k-regular CR
CC
scale-free CR APL
CC
scale-free CR
-0.726
0.264
-0.912
0.633
[-0.836, -0.561]
[-0.015, 0.505]
[-0.961, -0.808]
[0.318, 0.823]
p-value
2.44 × 10−9
6.40 × 10−2
2.28 × 10−10
6.78 × 10−4
5.2.2. Number of Encounters to Achieve Consensus
We now analyse the convergence in terms of average number of meetings during
a simulation run. Since the maximum number of simulation cycles is 2000, the
maximum number of encounters is 2 000 000 (we have 100 agents and each
one performs one encounter per cycle). We show that for some configurations,
the average of encounters is not a good descriptor since it varies greatly from
run to run. Rather than considering the average, it is better to look at the
distributions of these measures. Nevertheless, we included the data with all the
average number of encounters, as well as the respective standard deviations for
different network configurations. You can find this data in appendix B.
First, we present the results for k-regular networks. To observe the distri-
bution of the number of encounters, consider the box plots for k = {1, 2, 3, 4, 5}
(figure 10a) and k = {10, 20, 30, 40, 50} (figure 10b). Figure 10 shows the results
for configurations with a number of networks ≥ 3 (since less networks lead to
much worse results in terms of convergence speed). These plots reveal two types
of situations: the typical runs, in which the number of encounters doesn't vary
much, and some "outlier runs," which present some interesting dynamics, as we
will see later on.
(a)
(b)
Figure 10: Number of meetings over 100 independent simulation runs
for multiple k-regular networks: k = {1, 2, 3, 4, 5} (10a) and k =
{10, 20, 30, 40, 50} (10b)).
19
llllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll050000100000150000200000345Number of NetworksNumber of EncountersK12345lllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll0200004000060000345Number of NetworksNumber of EncountersK1020304050Figure 10 shows us results qualitatively similar to what we previously observed
for convergence ratios (see section 5.2.1). Networks with lesser connectivity and
a greater average path length lead to total convergence less often. The simula-
tion outcomes also vary much more in comparison with the other configurations
(k > 1 and networks ≥ 3).
Notice that for k = 3 and networks = 3 (10b), we still have runs that deviate
from what we consider the typical behaviour. Instead of disregarding this as
an outlier, we explore this behaviour to better understand the dynamics of our
External Majority consensus game.
We analysed the network structure from this run and observed that there
were no distinct differences between the network instances from the "outlier
run" and the ones of the "typical" run. This pointed to the consensus game
itself as a possible cause for the irregular behaviour -- not to the network struc-
ture -- . What happens is that the agents reach a state from which converging
towards consensus is significantly harder. Villatoro [39] found that some com-
plex network models lead consensus games to form metastable sub-conventions.
These are very difficult to break and reaching 100% agreement is not as straight-
forward as assumed by previous researchers. We are not concerned with this
difficulty, instead, we want to explore how to describe what happens in simi-
lar cases. Figure 11 shows the consensus progression for two simulation runs a
typical case and the outlier.
(a) Typical Run
(b) Outlier Run
Figure 11: Number of agents with each opinion during a simulation run:
typical run in 11a and "outlier run" in 11b.
We take the outlier in the configuration with k = 3 and networks = 3, and
look at the memory that agents use in the consensus game. As we described
previously, agents record the number of individuals encountered with each opin-
ion value (two possible values in this case). We look at the average difference
between the number of values observed for all the agents. We also look at the
variance to find how the opinion observations evolve throughout the simulation.
Figure 12 shows the average difference between opinion memory for the first 10
steps (which was when the simulation converged for the normal run).
20
02550751000369Simulation StepNumber of Agentsnum−opinion−0num−opinion−1Normal Run02550751000200400600Simulation StepNumber of Agentsnum−opinion−0num−opinion−1Outlier Run(a) Typical Run
(b) Outlier Run
Figure 12: Average and variance of the difference between opinions
observed for the 100 agents: typical run in figure 12a and first steps of
the"outlier run" in figure 12b.
We can see that both the average difference in the opinion memory and
the variance grow faster in the normal run than in the outlier run. This is
not enough to establish a significant difference between the two. Moreover,
the memory differences are quite similar, but the number of agents for each
opinion was quite even. This happens due to the position of agents in the
network and their initial opinion values. These circumstances led the agents to
a initial stability. Note that the opinion difference continues to rise throughout
the simulation along with the variance. The variance starts to increase more
rapidly after 200 steps. The exponential growth reveals that the convergence
to consensus is not done evenly throughout the network, this is one of the
reasons why consensus takes more time to be achieved. Also, the low variance
in the first 200 steps shows us that the opinion strength was evenly distributed:
we have almost the same number of agents for each opinion but the memory
differences are qualitatively the same for both opinions. As soon as this variance
increases, one of the opinions breaks the stable state and convergence towards
global consensus begins.
21
02460.02.55.07.510.0Simulation StepAverage Memory Difference0240.02.55.07.510.0Simulation StepVariance of Opinion Memory Difference0120.02.55.07.510.0Simulation StepAverage Memory Difference0123450.02.55.07.510.0Simulation StepVariance of Opinion Memory DifferenceFigure 13: Average and variance of the difference between opinions
observed for the 100 agents throughout the outlier run.
In other words, different neighbourhoods in the network lead to different opinion
observation configurations (possibly even creating self-reinforcing structures).
Thus, the influence of heterogeneous connectivity is reflected on the growth of
opinion difference variance.
(a)
(b)
Figure 14: Number of meetings over 100 independent simulation runs
for multiple scale-free networks: with d={1,2,3,4,5} (14a) with a zoom
on the best configurations in 14b.
Figure 14 shows the average number of encounters during 100 independent sim-
ulation runs for scale-free networks. (We don't include the configuration for one
network and d = 1 because these never converge.) The convergence ratio is very
low for the configurations with one network d = 2 and 2 networks with d = 1;
hence the high number of encounters (see also table 3).
These results are similar to those of k-regular in that adding more networks
speeds up the convergence to consensus. The difference is that more "atypi-
cal" runs occur with multiple scale-free networks. Again, this is the effect of
these types of topologies. As we discussed previously, in these less connected
topologies, agents are more prone to be arranged in such a way that progres-
22
01002003000200400600Simulation StepAverage Memory Difference0500010000150000200400600Simulation StepVariance of Opinion Memory Differencelllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll05000010000015000020000012345Number of NetworksNumber of Encountersd12345llllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll25005000750010000345Number of NetworksNumber of Encountersd2345sion towards consensus is more difficult to attain due to bottlenecks. Different
regions in the network might converge towards different opinion values.
5.2.3. Heterogeneous Network Configuration
We also performed experiments with mixed network topologies: we used one
scale-free and one k-regular networks. Table 5 shows the convergence ratio for
the heterogeneous network configuration with the multiple values for d and k
for the scale-free and k-regular respectively.
Table 5: Ratio of convergence to total consensus in 3000 independent
runs with two networks: one k-regular and one scale-free network with
different k and d values respectively.
k
d
1
2
3
4
5
1
2
3
4
5
10
20
30
40
0.18
0.63
0.77
0.73
0.87
0.47
0.72
0.86
0.92
0.85
0.55
0.88
0.87
0.92
0.94
0.67
0.89
0.97
0.97
0.94
0.61
0.90
0.98
0.96
0.98
0.76
0.97
0.99
0.96
0.99
0.77
1.00
0.98
0.99
1.00
0.81
1.00
0.99
1.00
1.00
0.75
0.99
1.00
1.00
1.00
50
0.82
1.00
1.00
1.00
1.00
One of the differences between this configuration and the previous ones can be
observed in the simulations with d = 1 and k = 1. The convergence ratio is
higher than with 2 1− regular networks (see table 2) -- but not better than two
scale-free networks. This happens because with k = 1 the network is basically a
ring and has the maximum possible average path length for a connected graph.
Adding two rings improves the convergence ratio but the underlying structure
is still very susceptible to self-reinforcing structures (a connected sub-graph is
basically a line). Adding a scale-free changes this drastically as we are mixing
tree-like network components with a ring.
23
(a)
(b)
Figure 15: Number of meetings over 100 independent simulation runs
for heterogeneous configuration:
one k-regular network with k =
{1, 2, 3, 4, 5} and one scale-free network with d{1, 2, 3, 4, 5}. Figure 15b
shows a zoom on the best configurations.
Figure 15 shows the results for the number of encounters necessary for the
agents to achieve consensus. We focus on the k-regular networks with higher
values of k. We can see that with these two networks, the configurations with
values of d >= 2 for scale-free networks produce drastically better results in
terms of speed of convergence. The data for the average number of encounters,
as well as the respective standard deviations referent to the results in figure 15,
can be found in appendix B, table B.3.
5.3. Context Switching
In this section, we present the results relative to the context switching model.
The difference between this model and the previous one is that the agents no
longer interact in multiple networks at the same time (being able to select any
neighbour at a given simulation step). In this model, they become active in a
single network at a time. Agents can switch to a different network at the end
of each step. The switching mechanism uses a probability associated with each
network. With this new idea of swapping contexts, we covered some space left
undeveloped in Antunes and colleagues original work [29, 30].
As we discussed in section 3.3 (see model 2), the switching probability dic-
tates the frequency with which an agent switches from the current network
after an encounter has been performed. In an abstract manner, this allows us
to model how much time agents spend on each network. A further development
of this model will be to assign different preferences to different networks for
each agent. This can help us model phenomena such as real-world agents that
dedicate more or less time consuming content from different social networks.
For now, we attribute this probability to the network to restrain the model
complexity.
24
lllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll05000010000015000020000012345DNumber of EncountersK1020304050lllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll250050007500100002345DNumber of EncountersK10203040505.3.1. Exploring the Switching Probability
We first look at the influence of the new parameter (switching probability) in the
convergence to consensus. We span the switching probability between 0 and 1 in
intervals of 0.05. We do this for 2 networks with k-regular and scale-free topolo-
gies. Figure 16 shows the results for two k-regular networks: one configuration
with k = 10 and one configuration with k = 30. We use these two configura-
tions to study the relationship between the number of encounters, the switching
probability parameter, and the connectivity of the networks. Remember that
with k = 30 the average path length is also lower (section 5.1.1).
(a) 10-regular Networks
(b) 30-regular Networks
Figure 16: Contour plot for the average number of meets during a sim-
ulation for 100 independent runs: 2 10-regular networks (16a) and 30-
regular networks (16b). See the perspective plots in appendix C.
For smaller values of k, symmetry in the context switching probability (having
the same probability in both networks) is more important if the agent switches
less from one of the networks. Switching less from one network means spending
more time in that network. This means that switching more from the other
network can be disruptive to a neighbourhood that has already converged to a
sub-convention. This can be observed in configurations with k-regular networks
(figure 16a) but it is especially apparent in scale-free networks (figure 17a).
25
500010000100001000010000100001000020000200002000020000500020000700001200001700002e+05500050005000500050005000100000.000.250.500.751.000.000.250.500.751.00Switching for Network 1 regular network, k=10Switching for Network 2 regular network, k=1050000100000150000200000Average Encounters500050005000500010000100001000010000100001000010000500010000200007000011111150005000500050005000500050000.000.250.500.751.000.000.250.500.751.00Switching for Network 1 regular network, k=30Switching for Network 2 regular network, k=30250005000075000100000Average Encounters(a) Scale-Free d = 1
(b) Scale-Free d = 5
Figure 17: Contour plot for the average number of meets during a simu-
lation for 100 independent runs: 2 scale-free networks with d = 1 (17a)
and d = 5 (17b). See the perspective plots in appendix C.
When we increase the connectivity (and lower the average path length),
both in k-regular and scale-free networks, the switching probability becomes
"irrelevant" -- for any probability value, the speed of convergence will be the
same -- . The exception is obviously when considering the switching probability
with value 0. In this case, agents are isolated (they are initially equally dis-
tributed throughout the networks) and reaching consensus becomes very hard.
(Especially because agents are active only in one network and this can create
disconnected graphs.)
One major difference from the previous model is that the agents no longer
interact with a neighbour from any network at any time. The neighbour selec-
tion has to be made from the network they are currently active in. This causes
the agents to spend different amounts of time in different networks. An agent
can be very influential in one network -- being a very central node in that context
-- and marginally important in another:
in a sense its opinion in one network
can be more important to overall convergence than in other network, due to its
position in the network.
To explore the contribution of connectivity to the new context switching
dynamics, we setup two scale-free networks; one with d = 1 and the other with
d = 5. We then spanned the switching probability in increments of 0.05. The
results can be seen in figure 18.
26
120000170000170000199957.580.000.250.500.751.000.000.250.500.751.00Switching for Network 1 scale−free network, d=1Switching for Network 2 scale−free network, d=190000120000150000180000Average Encounters50005000500050005000500050005000500050005000500050005000500010000100001000010000100001000010000500010000100001000010000100001000020000700001200001700005000187865.59500050005000500050000.000.250.500.751.000.000.250.500.751.00Switching for Network 1 scale−free network, d=5Switching for Network 2 scale−free network, d=550000100000150000Average EncountersFigure 18: Contour plot for the average number of meets during a sim-
ulation for 100 independent runs: 2 scale-free networks, the first with
d = 5 and the second with d = 1. See the perspective plots in appendix
C (figure C.5).
In this case it is more important (to convergence speed) to switch from the
network with lower average path length and a forest-like composition (and a
probability of at least the same value or more than the one of the other network
with d = 5). The same can be observed when we mix k-regular with scale-free
networks (see figure 19).
Switching less from the less connected network is bad in both cases:
it is
possible that spending more time in the network with bigger neighbourhoods
allows for a stabler convergence. Sub-conventions can emerge in scale-free net-
works with d = 1 because usually some network regions are isolated by a single
node -- the root of the sub-tree they belong to.
27
500050001000010000100001000010000100001000010000100005000100001000010000100001000010000100002000020000700005000120000170000199979.665000500050005000500050000.000.250.500.751.000.000.250.500.751.00Switching for Network 1 scale−free network, d=5Switching for Network 2 scale−free network, d=150000100000150000Average EncountersFigure 19: Contour plot for the average number of meets during a sim-
ulation for 100 independent runs: one 10-regular network (k=10) and a
scale-free network with d = 1. See the perspective plots in appendix C
(figure C.6).
5.3.2. Comparison with Context Permeability
Finally, to compare the context switching model with the previous model of con-
text permeability, we froze the switching probabilities with values ζ = 0.25, 0.5, 0.75
and varied the number of networks. (We considered these values because they
conveniently characterise the probability in low, medium and high switching.)
We compare the results with the context permeability in terms of average num-
ber of encounters to achieve consensus. Note that in some cases, due to the
distribution of the number of encounters, the average is not an accurate de-
scriptor for the convergence. Nonetheless, configurations with highly variable
outcomes usually produce an average that is qualitatively distinct from the rest
(see figure 10 in section 5.2.2). We took the average number of encounters dur-
ing the simulations to compare the context switching model with the context
permeability model.
28
20000199985.852000020000700001200001200001200001700001700000.000.250.500.751.000.000.250.500.751.00Switching for Network 1 regular network, k=10Switching for Network 2 scale−free network, d=150000100000150000Average Encounters(a)
(b)
(c)
(d)
Figure 20: Average number of encounters during a simulation for 100
independent runs with k-regular topologies in all the network layers.
We compare the results of context switching with context permeability
with a numberof networks = {2, 3, 4, 5}. The switching probability is
the same in all the networks.
Figure 20 shows that for 2 networks the results in terms of number of en-
counters for the context switching approximate those for context permeability.
When we increase the number of networks (n ≥ 3), the configurations with
higher switching probability lead the results to be closer to what happens in
context permeability. This is no surprise since more switching makes agents
switch more often between networks and consequently allows them too choose
more often from different neighbourhoods. This is almost the same as having
a larger neighbourhood to choose from, which is what happened in the context
permeability model.
The surprise was that for values of k ≥ 20, the results where practically the
same for both models independently of the switching probability -- even when we
increased the number of networks, the number of encounters remained around
2000 on average for all the models. Above a certain level of neighbourhood size
(and overlapping, which causes the average path length to drop), the switching
probability becomes less influential. It is still important that we get compara-
29
llllllllll050000100000150000200000123451020304050KAverage EncountersCSll0.250.50.75permeabilityK−Regular Networks With Number of Networks = 2llllllllll0250005000075000100000123451020304050KAverage EncountersCSll0.250.50.75permeabilityK−Regular Networks With Number of Networks = 3llllllllll010000200003000040000123451020304050KAverage EncountersCSll0.250.50.75permeabilityK−Regular Networks With Number of Networks = 4llllllllll100002000030000123451020304050KAverage EncountersCSll0.250.50.75permeabilityK−Regular Networks With Number of Networks = 5ble results because we are introducing a temporal component that was never
explored before in these types of opinion dynamics models: the fact that the
agents can become active in different networks at different points in time.
(a)
(b)
(c)
(d)
Figure 21: Average number of encounters during a simulation for 100
independent runs with scale-free topologies in all the network layers.
We compare the results of context switching with context permeability
with a numberof networks = {2, 3, 4, 5}. The switching probability is
the same in all the networks.
For scale-free networks, figure 21 shows us similar results. Switching with a
higher probability displays results similar with those of context permeability. In
this case, adding more networks makes so that lowering switching probabilities
displays slightly worse results. This influence comes from the neighbourhoods
being considerably smaller in scale-free networks -- even with values of d = 5 --
so the impact of low switching was bound to be noticed.
An increasing number of networks seems to always reduce the number of
encounters to achieve consensus in both models. This happens due to what
we called permeability. Having multiple points of dissemination that permeate
between different social networks enhances the overall convergence to consensus.
With permeability there are more previously isolated nodes being reached in
30
lllll0e+005e+041e+0512345DAverage EncountersCSll0.250.50.75permeabilityScale−Free Networks With Number of Networks = 2lllll020000400006000012345DAverage EncountersCSll0.250.50.75permeabilityScale−Free Networks With Number of Networks = 3lllll100002000012345DAverage EncountersCSll0.250.50.75permeabilityScale−Free Networks With Number of Networks = 4lllll5000100001500012345DAverage EncountersCSll0.250.50.75permeabilityScale−Free Networks With Number of Networks = 5sparsely connected networks such as scale-free networks.
6. Conclusions
In this article, we analysed and discussed our modelling framework for multi-
relational models of social spaces. These results show that not only contexts
play an important role in the dissemination of consensus in artificial agent soci-
eties, but also that simple mechanisms can generate a great deal of complexity
(especially in those scenarios where conventions are being co-learned by mul-
tiple agents). Adding more networks to our opinion dynamics model leads to
outcomes where consensus was achieved not only more often but also faster. In
particular, our results show that achieving convergence (i.e. total consensus in a
network) is not a matter of connectivity. With scale-free networks we managed
to achieve consensus more often and quicker than with less clustered networks.
This conclusion is especially important for application (or models) dealing with
real-world social phenomena, many times represented with such networks.
The second innovation presented in this article was the fact that our model
describes an abstract way to represent the time spent on each network using
the switching probability. This temporal component introduces a new dynamic
to the study of opinion dynamics. Considering that in agent neighbourhoods,
agents might not be available at all times -- and spend different amounts of
time in different neighbourhoods -- , this is an important factor to be included in
simulation models (either representing real-world systems with different levels
of abstraction, or artificial agent societies for particular applications).
Future work includes the analysis of different complex network models.
While k-regular and scale-free networks are two of the most pervasive network
examples in social simulation, there has been a growing number of models with
different properties inspired by real-world phenomena that can be considered.
We will also analyse the networks according to different properties such as be-
tweeness centrality of certain nodes. Moreover, we plan to apply what we learned
with our consensus games to cooperation problems. Constructing agents that
can learn both behaviour and coordination procedures is a difficult task (espe-
cially when working with large distributed artificial societies). Consensus games
such as this one can be used to reduce the search space in problems where agents
need to cooperate or coordinate in a decentralised fashion.
While the convergence and number of encounters seem to be correlated with
the average path length, this might not be the only property that plays a role in
faster convergence to consensus. Correlation is just an informal tool that helps
us assert if some monotonic relationship exists. More research is needed to find
out, for instance, if self-reinforced structures -- like the ones reported by [39] --
exist in our multi-network structures. In particular, we are interested in finding
out if permeability mitigates the effects of such phenomenon.
We have seen that context permeability by context overlapping or switching
can provide a fairly straightforward modelling methodology. This can be used
to compose simulation scenarios for more complex social spaces. What remains
31
to be done is to identify more precise contextual structures in real-world net-
works. While capturing the structure of real social network can be a daunting
task, we do have pervasive records of networking activity between social actors:
online social networks. Analysing these can lead us to insights about complex
structural properties that emerge from user activity, and contexts that can be
identified within those networks. A difficult -- but not impossible -- prospect for
further research would be to track similar contexts between different real online
social networks.
Acknowledgements
Work supported by the Funda¸cao para a Ciencia e a Tecnologia under the
grant SFRH/BD/86034/2012 and by centre grant (to BioISI, Centre Reference:
UID/MULTI/04046/2013), from FCT/MCTES/PIDDAC, Portugal
32
A. Overlapping Network Properties
A.1. Homogeneous Network Topology Configurations
(a)
(b)
Figure A.1: Average path length for 100 instances of overlap-
ping k-regular networks(containing 100 nodes each) with
k =
{1, 2, 3, 4, 5} (A.1a), and k = {10, 20, 30, 40, 50} (A.1b). Since there
is barely any variation in the property values for each configuration, the
colours cannot be seen correctly, they are presented in the same order
as the legend nonetheless.
(a)
(b)
Figure A.2: Clustering coefficient
for 100 instances of overlap-
ping k-regular networks (containing 100 nodes each) with
k =
{1, 2, 3, 4, 5} (A.2a) and k = {10, 20, 30, 40, 50} (A.2b). Note that the
variation is bigger for networks with less connectivity. Also, for k = 50,
the network is fully connected.
33
lllllllllllllllllllllllllll51015202512345Number of NetworksAverage Path LengthK12345lllllllllllllllllllllllllll1.01.52.02.53.012345Number of NetworksAverage Path LengthK1020304050lllllllllllllllllllllllllllllll0.00.20.40.612345Number of NetworksClustering CoefficientK12345lllllllllllllllllllllllllllll0.50.60.70.80.91.012345Number of NetworksClustering CoefficientK1020304050(a) Average path length
(b) Clustering Coefficient
Figure A.3: Average path length and clustering coefficient for 100 in-
stances of overlapping scale-free networks. D is a parameter used to
construct the network. It dictates how many edges are added by prefer-
ential attachment each time a new node is added to the networks. For
more details refer to [24].
A.2. Heterogeneous Network Topology Configurations
(a)
(b)
Figure A.4: Average path length for 100 instances of two overlapping
networks: 1 scale-free with d = {1, 2, 3, 4, 5} and 1 k-regular network
with k = {1, 2, 3, 4, 5} (A.4a), and k = {10, 20, 30, 40, 50} (A.4b). Since
there is barely any variation in the property values for each configu-
ration, the colours cannot be seen correctly in some cases, they are
presented in the same order as the legend nonetheless.
34
llllllllllllllllllllllllllllllllllllll2345612345Number of NetworksAverage Path LengthD12345llllllllllllllllllllllll0.00.10.20.30.412345Number of NetworksClustering CoefficientD12345lllllllllllllllllllllllllllllllll2.02.53.03.512345DAverage Path LengthK12345lllllllllllllllllllll1.21.51.82.112345DAverage Path LengthK1020304050(a)
(b)
Figure A.5: Clustering coefficient for 100 instances of two overlapping
networks: 1 scale-free with d = {1, 2, 3, 4, 5} and 1 k-regular network
with k = {1, 2, 3, 4, 5} (A.4a), and k = {10, 20, 30, 40, 50} (A.4b). Since
there is barely any variation in the property values for each configu-
ration, the colours cannot be seen correctly in some cases, they are
presented in the same order as the legend nonetheless.
35
llllllllllllllllllllllllllll0.00.10.20.30.40.512345DClustering CoefficientK12345llllllllll0.60.81.012345DClustering CoefficientK1020304050B. Context Permeability Analysis
Table B.1: Average number of meetings during a simulation run for 100 agents and a maximum of 2000 simulation
cycles for different configuration of k-regular networks.
Number of Networks
k
1
2
3
4
5
10
20
30
40
50
avg.
200000
200000
198033
198093
196042
178207
75541
11703
1694
1788
1
2
sd
0.0
0.0
19670.0
19070.0
27845.6
62301.7
95871.3
43425.0
954.5
786.9
avg.
191237
99744
68555
38359
21287
8066
2338
1952
1646
1724
sd
35780.6
89096.9
82808.5
69305.4
48141.1
28298.4
2739.9
1087.9
821.9
744.7
avg.
97770
22690
10217
5028
3444
2894
2178
1726
1862
1776
3
sd
86648.0
50813.5
33963.1
10680.0
5144.0
6424.5
1588.3
936.6
872.3
827.7
avg.
44827
7514
6539
3710
2834
1800
1936
1930
1806
1842
4
sd
71714.8
21352.6
22227.3
4618.7
4334.5
1148.2
989.4
1096.3
884.6
896.8
avg.
14210
4602
2828
2678
2278
2180
1802
1956
1686
1896
5
sd
31633.6
6116.7
2283.6
2127.4
1921.5
2078.3
823.6
1273.5
647.1
911.4
3
6
Table B.2: Average number of meetings during a simulation run for 100 agents and a maximum of 2000 simulation
cycles for different configuration of scale-free networks.
1
Number of Networks
2
3
4
d
1
2
3
4
5
avg.
sd
avg.
sd
200000
150632
37824
13751
8802
0
78710
64073
33295
18754
141085
21654
12309
4846
2536
83720
41341
36441
7921
1880
avg.
66020
7555
5299
2852
3204
sd
82601
21407
20035
2766
11008
avg.
17712
5890
2804
2370
2166
sd
42444
10889
3791
1441
1269
avg.
14917
3638
2618
2200
1958
5
sd
38343.6
5127.0
2445.4
1433.4
971.6
3
7
Table B.3: Average number of meetings during a simulation run for 100 agents and a maximum of 2000 simulation
cycles for different configuration of 1 k-regular and 1 scale-free networks.
1
2
avg.
sd
avg.
sd
173312
118591
109155
80035
89179
62416
61371
51559
58625
48702
61519
90107
88722
88719
91823
81036
81409
77468
83049
74718
100175
72054
38270
33339
31044
11017
6680
4980
5483
6568
88406
86077
66714
64075
62485
35071
17900
12740
20169
22611
k
1
2
3
4
5
10
20
30
40
50
d
3
avg.
63191
43308
34899
21289
13908
9095
6944
5095
2726
2566
sd
81071
70318
65533
45725
36791
27266
27826
20028
3735
1716
4
5
sd
84549
58760
55589
39516
39490
39798
19832
1355
1503
1619
avg.
51313
43281
23436
24034
9252
5559
2390
2046
2412
1980
sd
67704
72182
49978
52407
28404
20448
2313
1225
1874
1081
avg.
73715
31756
26412
15575
14112
12182
4721
2268
2346
2362
C. Context Switching Analysis
Figure C.1: Perpective plot for the average number of meets during a
simulation for 100 independent runs: 2 10-regular networks (k = 30).
Figure C.2: Perpective plot for the average number of meets during a
simulation for 100 independent runs: 2 30-regular networks (k = 30).
Figure C.3: Perpective plot for the average number of meets during a
simulation for 100 independent runs: 2 scale-free networks with d = 1.
38
Switching for Network 1 regular network, k=100.00.20.40.60.81.0Switching for Network 2 regular network, k=100.00.20.40.60.81.0 Avg. Encounters50000100000150000200000Switching for Network 1 regular network, k=100.20.40.60.81.0Switching for Network 2 regular network, k=100.20.40.60.81.0 Avg. Encounters20000400006000080000Switching for Network 1 regular network, k=100.40.50.60.70.80.91.0Switching for Network 2 regular network, k=100.40.50.60.70.80.91.0 Avg. Encounters10000200003000040000Switching for Network 1 regular network, k=300.00.20.40.60.81.0Switching for Network 2 regular network, k=300.00.20.40.60.81.0 Avg. Encounters2e+044e+046e+048e+041e+05Switching for Network 1 regular network, k=300.20.40.60.81.0Switching for Network 2 regular network, k=300.20.40.60.81.0 Avg. Encounters2000300040005000Switching for Network 1 regular network, k=300.40.50.60.70.80.91.0Switching for Network 2 regular network, k=300.40.50.60.70.80.91.0 Avg. Encounters2000250030003500Switching for Network 1 scale−free network, d=10.00.20.40.60.81.0Switching for Network 2 scale−free network, d=10.00.20.40.60.81.0 Avg. Encounters100000120000140000160000180000Switching for Network 1 scale−free network, d=10.20.40.60.81.0Switching for Network 2 scale−free network, d=10.20.40.60.81.0 Avg. Encounters100000120000140000Switching for Network 1 scale−free network, d=10.40.50.60.70.80.91.0Switching for Network 2 scale−free network, d=10.40.50.60.70.80.91.0 Avg. Encounters90000100000110000120000130000R
Figure C.4: Perpective plot for the average number of meets during a
simulation for 100 independent runs: 2 scale-free networks with d = 5.
Figure C.5: Perspective plot for the average number of meets during
a simulation for 100 independent runs: 2 scale-free networks, the first
with d = 5 and the second with d = 1.
Figure C.6: Perspective plot for the average number of meets during a
simulation for 100 independent runs: 1 10-regular network (k = 10) and
a scale-free network with d = 1.
39
Switching for Network 1 scale−free network, d=50.00.20.40.60.81.0Switching for Network 2 scale−free network, d=50.00.20.40.60.81.0 Avg. Encounters50000100000150000Switching for Network 1 scale−free network, d=50.20.40.60.81.0Switching for Network 2 scale−free network, d=50.20.40.60.81.0 Avg. Encounters400060008000Switching for Network 1 scale−free network, d=50.40.50.60.70.80.91.0Switching for Network 2 scale−free network, d=50.40.50.60.70.80.91.0 Avg. Encounters3000400050006000Switching for Network 1 scale−free network, d=50.00.20.40.60.81.0Switching for Network 2 scale−free network, d=10.00.20.40.60.81.0 Avg. Encounters50000100000150000Switching for Network 1 scale−free network, d=50.20.40.60.81.0Switching for Network 2 scale−free network, d=10.20.40.60.81.0 Avg. Encounters50000100000150000Switching for Network 1 scale−free network, d=50.40.50.60.70.80.91.0Switching for Network 2 scale−free network, d=10.40.50.60.70.80.91.0 Avg. Encounters50000100000150000Switching for Network 1 regular network, k=100.00.20.40.60.81.0Switching for Network 2 scale−free network, d=10.00.20.40.60.81.0 Avg. Encounters50000100000150000Switching for Network 1 regular network, k=100.20.40.60.81.0Switching for Network 2 scale−free network, d=10.20.40.60.81.0 Avg. Encounters50000100000150000Switching for Network 1 regular network, k=100.40.50.60.70.80.91.0Switching for Network 2 scale−free network, d=10.40.50.60.70.80.91.0 Avg. Encounters50000100000150000References
[1] C. Emmeche, Aspects of complexity in life and science, PHILOSOPHICA-
GENT- (1997) 41 -- 68.
[2] H. A. Simon, Bandwagon and underdog effects and the possibility of elec-
tion predictions, The Public Opinion Quarterly 18 (3) (1954) pp. 245 -- 253.
[3] R. Axelrod, The Dissemination of Culture, Journal of Conflict Resolution
41 (2) (1997) 203 -- 226.
[4] G. Weisbuch, Bounded confidence and social networks, The European
Physical Journal B - Condensed Matter and Complex Systems 38 (2004)
339 -- 343.
[5] P. S. Albin, The analysis of complex socioeconomic systems, Lexington,
Mass. : Lexington Books, 1975.
[6] S. Roccas, M. B. Brewer, Social identity complexity, Personality and Social
Psychology Review 6 (2) (2002) 88 -- 106.
[7] N. Ellemers, R. Spears, B. Doosje, Self and social identity*, Annual Review
of Psychology 53 (1) (2002) 161 -- 186.
[8] J. French, A formal theory of social power, Psychological Review 63 (1956)
181 -- 194.
[9] M. H. DeGroot, Reaching a Consensus, Journal of the American Statistical
Association 69 (345) (1974) 118 -- 121.
[10] K. Lehrer, Social consensus and rational agnoiology, Synthese 31 (1975)
141 -- 160.
[11] S. Galam, Rational group decision making: A random field ising model t
= 0, Physica A: Statistical Mechanics and its Applications 238 (1) (1997)
66 -- 80.
[12] L. Antunes, D. Nunes, H. Coelho, J. a. Balsa, P. Urbano, Context Switching
versus Context Permeability in Multiple Social Networks, in: Progress in
Artificial Intelligence, Vol. 5816 of Lecture Notes in Computer Science,
2009, pp. 547 -- 559.
[13] G. Deffuant, D. Neau, F. Amblard, G. Weisbuch, Mixing beliefs among
interacting agents, Advances in Complex Systems 3 (01n04) (2000) 87 -- 98.
[14] G. Deffuant, F. Amblard, G. Weisbuch, T. Faure, How can extremism pre-
vail? A study based on the relative agreement interaction model, Journal
of Artificial Societies and Social Simulation 5 (4) (2002) 1.
[15] R. Hegselmann, U. Krause, Opinion dynamics and bounded confidence:
models, analysis and simulation, Journal of Artificial Societies and Social
Simulation 5 (3) (2002) 2.
40
[16] D. K. Lewis, Convention: a philosophical study, Harvard University Press
Cambridge, 1969.
[17] J. Delgado, Emergence of social conventions in complex networks, Artificial
intelligence 141 (1) (2002) 171 -- 185.
[18] Y. Shoham, M. Tennenholtz, Co-learning and the evolution of social activ-
ity, Tech. rep., DTIC Document (1994).
[19] T. C. Schelling, Dynamic models of segregation†, Journal of mathematical
sociology 1 (2) (1971) 143 -- 186.
[20] J. M. Sakoda, The checkerboard model of social interaction, The Journal
of Mathematical Sociology 1 (1) (1971) 119 -- 132.
[21] A. Flache, R. Hegselmann, Do irregular grids make a difference? relaxing
the spatial regularity assumption in cellular models of social dynamics.,
Journal of Artificial Societies and Social Simulation 4 (4).
[22] D. B. O'Sullivan, Graph-based cellular automaton models of urban spatial
processes, Ph.D. thesis, University of London (2000).
[23] P. Erdos, A. R´enyi, On random graphs, Publ. Math. Debrecen 6 (1959)
290 -- 297.
[24] A. Barab´asi, R. Albert, Emergence of scaling in random networks, science
286 (5439) (1999) 509.
[25] D. J. Watts, S. H. Strogatz, Collective dynamics of 'small-world' networks,
Nature 393 (6684) (1998) 440 -- 442.
[26] M. E. Gaston, M. desJardins, Agent-organized networks for dynamic team
formation, in: Proceedings of the fourth international joint conference on
Autonomous agents and multiagent systems, ACM, 2005, pp. 230 -- 237.
[27] D. Nunes, L. Antunes, Consensus by segregation - the formation of local
consensus within context switching dynamics, Proceedings of the 4th World
Congress on Social Simulation.
[28] P. J. Hayes, Contexts in context, in: Context in knowledge representation
and natural language, AAAI Fall Symposium, 1997.
[29] L. Antunes, J. Balsa, P. Urbano, H. Coelho, The challenge of context per-
meability in social simulation, in: Proceedings of the Fourth European
Social Simulation Association, 2007.
[30] L. Antunes, J. Balsa, P. Urbano, H. Coelho, Exploring context permeability
in multiple social networks, in: K. Takadama, C. Cioffi-Revilla, G. Deffuant
(Eds.), Simulating Interacting Agents and Social Phenomena, Vol. 7 of
Agent-Based Social Systems, Springer Japan, 2010, pp. 77 -- 87.
41
[31] S. Luke, C. Cioffi-Revilla, L. Panait, K. Sullivan, G. Balan, MASON: A
Multiagent Simulation Environment, Simulation 81 (7) (2005) 517 -- 527.
[32] D. Nunes, L. Antunes, Context Permeability Modelsdoi:{10.5281/
zenodo.11067}.
URL http://dx.doi.org/10.5281/zenodo.11067
[33] R. D. C. Team, R: A Language and Environment for Statistical Computing,
R Foundation for Statistical Computing, Vienna, Austria, ISBN 3-900051-
07-0 (2008).
URL http://www.R-project.org
[34] Y. Xie, knitr: A comprehensive tool for reproducible research in R, in:
V. Stodden, F. Leisch, R. D. Peng (Eds.), Implementing Reproducible Com-
putational Research, Chapman and Hall/CRC, 2014.
URL http://www.crcpress.com/product/isbn/9781466561595
[35] D. Nunes, L. Antunes, Context Permeability Analysisdoi:{10.5281/
zenodo.11898}.
URL http://dx.doi.org/10.5281/zenodo.11898
[36] D. Nunes, L. Antunes, B-Have Network Librarydoi:{10.5281/zenodo.
11069}.
URL http://dx.doi.org/10.5281/zenodo.11069
[37] G. Csardi, T. Nepusz, The igraph software package for complex network
research, InterJournal Complex Systems (2006) 1695.
URL http://igraph.org
[38] S. Tomihisa, K. Kawai, An algorithm for drawing general undirected
graphs, Information Processing Letters 31 (1) (1989) 7 -- 15. doi:10.
1016/0020-0190(89)90102-6.
[39] D. Villatoro, J. Sabater-Mir, S. Sen, Robust convention emergence in social
networks through self-reinforcing structures dissolution, ACM Trans. Au-
ton. Adapt. Syst. 8 (1) (2013) 2:1 -- 2:21. doi:10.1145/2451248.2451250.
42
|
1903.12086 | 2 | 1903 | 2019-10-22T18:35:40 | Towards a Theory of Systems Engineering Processes: A Principal-Agent Model of a One-Shot, Shallow Process | [
"cs.MA"
] | Systems engineering processes coordinate the effort of different individuals to generate a product satisfying certain requirements. As the involved engineers are self-interested agents, the goals at different levels of the systems engineering hierarchy may deviate from the system-level goals which may cause budget and schedule overruns. Therefore, there is a need of a systems engineering theory that accounts for the human behavior in systems design. To this end, the objective of this paper is to develop and analyze a principal-agent model of a one-shot (single iteration), shallow (one level of hierarchy) systems engineering process. We assume that the systems engineer maximizes the expected utility of the system, while the subsystem engineers seek to maximize their expected utilities. Furthermore, the systems engineer is unable to monitor the effort of the subsystem engineer and may not have a complete information about their types or the complexity of the design task. However, the systems engineer can incentivize the subsystem engineers by proposing specific contracts. To obtain an optimal incentive, we pose and solve numerically a bi-level optimization problem. Through extensive simulations, we study the optimal incentives arising from different system-level value functions under various combinations of effort costs, problem-solving skills, and task complexities. | cs.MA | cs | SUBMITTED TO IEEE SYSTEMS JOURNAL
1
Towards a Theory of Systems Engineering
Processes: A Principal-Agent Model of a One-Shot,
Shallow Process
†School of Mechanical Engineering, Purdue University, West Lafayette, Indiana 47907-2088
Salar Safarkhani†, Ilias Bilionis†∗, Jitesh H. Panchal†
∗Corresponding author, email: [email protected]
9
1
0
2
t
c
O
2
2
]
A
M
.
s
c
[
2
v
6
8
0
2
1
.
3
0
9
1
:
v
i
X
r
a
Abstract -- Systems engineering processes coordinate the effort
of different individuals to generate a product satisfying certain
requirements. As the involved engineers are self-interested agents,
the goals at different levels of the systems engineering hierarchy
may deviate from the system-level goals which may cause budget
and schedule overruns. Therefore, there is a need of a systems
engineering theory that accounts for the human behavior in sys-
tems design. Undertaking such an ambitious endeavor is clearly
beyond the scope of any single paper due to the inherent difficulty
of rigorously formulating the problem in its full complexity along
with the lack of empirical data. However, as experience in the
physical sciences shows, a lot of knowledge can be generated by
studying simple hypothetical scenarios which nevertheless retain
some aspects of the original problem. To this end, the objective of
this paper is to study the simplest conceivable systems engineering
process, a principal-agent model of a one-shot (single iteration),
shallow (one level of hierarchy) systems engineering process. We
assume that the systems engineer maximizes the expected utility
of the system, while the subsystem engineers seek to maximize
their expected utilities. Furthermore, the systems engineer is un-
able to monitor the effort of the subsystem engineer and may not
have complete information about their types or the complexity of
the design task. However, the systems engineer can incentivize the
subsystem engineers by proposing specific contracts. To obtain
an optimal incentive, we pose and solve numerically a bi-level
optimization problem. Through extensive simulations, we study
the optimal incentives arising from different system-level value
functions under various combinations of effort costs, problem-
solving skills, and task complexities. Our numerical examples
show that, the passed-down requirements to the agents increase
as the task complexity and uncertainty grow and they decrease
with increasing the agents' costs.
Index Terms -- systems engineering theory, systems science,
complex systems, game theory, principal-agent model, mechanism
design, contract theory, expected utility, bi-level programming
problem, optimal incentives.
I. INTRODUCTION
C OST and schedule overruns plague the majority of large
systems engineering projects across multiple industry
sectors including power [1], defense [2], and space [3]. As
design mistakes are more expensive to correct during the
production and operation phases,
the design phase of the
systems engineering process (SEP) has the largest potential
impact on cost and schedule overruns. Collopy et al. [4] argued
that requirements engineering (RE), which is a fundamental
part of the design phase, is a major source of inefficiencies
in systems engineering. In response, they developed value-
driven design (VDD) [5], a systems design approach that starts
with the identification of a system-level value function and
guides the systems engineer (SE) to construct subsystem value
functions that are aligned with the system goals. According to
VDD, the subsystem engineers (sSE) and contractors should
maximize the objective functions passed down by the SE
instead of trying to meet requirements.
RE and VDD make the assumption that the goals of the
human agents involved in the SEP are aligned with the
SE goals. In particular, RE assumes that, agents attempt to
maximize the probability of meeting the requirements, while
VDD assumes that they will maximize the objective functions
supplied by the SE. However, this assumption ignores the
possibility that the design agents, as all humans, may have
personal agendas that not necessarily aligned with the system-
level goals.
Contrary to RE and VDD, it is more plausible that the
design agents seek to maximize their own objectives. Indeed,
there is experimental evidence that the quality of the outcome
of a design task is strongly affected by the reward antici-
pated by the agent [6 -- 8]. In other words, the agent decides
how much effort and resources to devote to a design task
after taking into account the potential reward. In the field,
the reward could be explicitly implemented as an annual
performance-based bonus, or, as it is the case most often, it
could be implicitly encoded in expectations about job security,
promotion, professional reputation, etc. To capture the human
aspect in SEPs, one possible way is one needs to follow a
game-theoretic approach [9], [10]. Most generally, the SEP
should can be modeled as a dynamical hierarchical network
game with incomplete information. Each layer of the hierarchy
represents interactions among the SE and some sSEs, or
the sSEs and other engineers or contractors. With the term
"principal," we refer to any individual delegating a task, while
we reserve the term "agent" for the individual carrying out the
task. Note that an agent may simultaneously be the principal in
a set of interactions down the network. For example, the sSE is
the agent when considering their interaction with the SE (the
principal), but the principal when considering their interaction
with a contractor (the agent). At each time step, the principals
pass down delegated tasks along with incentives, the agents
choose the effort levels that maximize their expected utility,
perform the task, and return the outcome to the principals.
The iterative and hierarchical nature of real SEPs makes
them extremely difficult to model in their full generality. Given
SUBMITTED TO IEEE SYSTEMS JOURNAL
2
that our aim is to develop a theory of SEPs, we start from the
simplest possible version of a SEP which retains, nevertheless,
some of the important elements of the real process. Specifi-
cally, the objective of this paper is to develop and analyze a
principal-agent model of a one-shot, shallow SEP. The SEP
is "one-shot" in the sense that decisions are made in one
iteration and they are final. The term "shallow" refers to a
one-layer-deep SEP hierarchy, i.e., only the SE (principal)
and the sSEs (agents) are involved. The agents maximize their
expected utility given the incentives provided by the principal,
and the principal selects the incentive structure that maximizes
the expected utility of the system. We pose this mechanism
design problem [11] as a bi-level optimization problem and
we solve it numerically.
A key component of our SEP model is the quality function
of an agent. The quality function is a stochastic process
that models the principal's beliefs about the outcome of the
delegated design task given that the agent devotes a certain
amount of effort. The quality function is affected by what the
principal believes about the task complexity and the problem
solving skills of the agent. Following our work [12], we model
the design task as a maximization problem where the agent
seeks the optimal solution. The principal expresses their prior
beliefs about the task complexity by modeling the objective
function as a random draw from a Gaussian process prior with
a suitably selected covariance function.
As we showed in [12], conditioned on knowing the task
complexity and the agent type, the quality function is well
approximated by an increasing, concave function of effort
with additive Gaussian noise. However, we will use a linear
approximation for the quality function.
We study numerically two different scenarios. The first
scenario assumes that the SE knows the agent types and the
task complexity, but they do not observe the agent's effort.
This situation is known in game theory as a moral hazard
problem [13]. The most common way to solve a moral hazard
problem is to use the first order approach (FOA) [14]. In the
FOA, the incentive compatibility constraint of the agent is
replaced by its first order necessary condition. However, the
FOA depends on the convexity of the distribution function
in effort which is not valid in our case. There have been
several attempts to solve the principal-agent model where the
requirements of the FOA may fail, nonetheless they must still
satisfy the monotone likelihood ratio property [15].
In the second scenario, we study the case of moral haz-
ard with simultaneous adverse selection [16], i.e., the SE
observes neither the effort nor the type of agents nor the
task complexity. This is a Bayesian game with incomplete
information.. In this case, the SE experiences additional loss
in their expected utility, because the sSEs' can pretend to
have different types. The revelation principle [17] guarantees
that it suffices to search for the optimal mechanism within
the set of incentive compatible mechanisms, i.e., within the
set of mechanisms in which the sSEs are telling the truth
about their types and technology maturity. In this paper, we
solve the optimization problem in the principal-agent model,
numerically with making no assumptions about the quality
function.
The paper is organized as follows. In section II we will
derive the mathematical model of the SEP and we will study
the type-independent and type-dependent optimal contracts.
We will also introduce the value and utility functions. In sec-
tion III, we perform an exhaustive numerical study and show
the solutions for several case studies. Finally, we conclude in
section IV.
II. MODELING A ONE-SHOT, SHALLOW SYSTEMS
ENGINEERING PROCESS
A. Basic definitions and notation
As mentioned in the introduction, we develop a model of a
one-shot (the game evolves in one iteration and the decisions
are final), shallow (one-layer-deep hierarchy) SEP. The SE has
decomposed the system into N subsystems and assigned a
sSE to each one of them. We use i = 1, . . . , N to label each
subsystem. From now on, we refer to the SE as the principal
and the sSEs as the agents. The principal delegates tasks to
the agents along with incentives. The agents choose how much
effort to devote on their task by maximizing their expected
utility. The principal, anticipates this reaction and selects the
incentives that maximize the system-level expected utility.
Let (Ω,F, P) be a probability space where, Ω is the sample
space, F is a σ-algebra, and P is the probability measure.
With ω ∈ Ω we refer to the random state of nature. We use
upper case letters for random variables (r.v.), bold upper case
letters for their range, and lower case letters for their possible
values. For example, the type of agent i is a r.v. Θi taking
Mi discrete values θi in the set Θi ≡ Θi(Ω) = {1, . . . , Mi}.
Collectively, we denote all types with the N-dimensional tuple
Θ = (Θ1, . . . , ΘN ) and we reserve Θ−i to refer to the (N−1)-
dimensional tuple containing all elements of Θ except Θi. This
notation carries to any N-dimensional tuple. For example, θ
and θ−i are the type values for all agents and all agents except
i, respectively. The range of Θ is Θ = ×N
The principal believes that the agents types vary indepen-
dently, i.e., they assign a probability mass function (p.m.f.) on
Θ that factorizes over types as follows:
i=1Θi.
N(cid:89)
N(cid:89)
P[Θ = θ] =
P[Θi = θi] =
piθi,
(1)
type k, for k in Θi. Of course, we must have(cid:80)Mj
for all θ in Θ, where pik ≥ 0 is the probability that agent i has
k=1 pik = 1,
i=1
i=1
for all i = 1, . . . , N.
Each agent knows their type, but their state of knowledge
about all other agents is the same as the principal's. That is,
if agent i is of type Θi = θi, then their state of knowledge
about everyone else is captured by the p.m.f.:
P[Θ−i = θ−iΘi = θi] =
P[Θ = θ]
P[Θi = θi]
=
pjθj .
(2)
(cid:89)
j(cid:54)=i
Agent i chooses a normalized effort level ei ∈ [0, 1] for
his delegated task. We assume that this normalized effort is
the percentage of an agent's maximum available effort. The
units of the normalized effort depend on the nature of the
agent's subsystem. If the principal and the agent are both
SUBMITTED TO IEEE SYSTEMS JOURNAL
3
part of same organization then the effort can be the time
that the agent dedicates to the delegated task in a particular
period of time, e.g., in a fiscal year. On the other hand, if
the agent is a contractor, then the effort can be the percentage
of the available yearly budget that the contractor spends on
the assigned task. We represent the monetary cost of the i-th
agent's effort with the random process Ci (ei). In economic
terms, Ci (ei) is the opportunity cost, i.e., the payoff of the best
alternative project in agent could devote their effort. In general,
we know that the process Ci(ei) should be an increasing
function of the effort ei. For simplicity, we assume that the
cost of effort of the agents is quadratic,
Ci(ei) := ciΘie2
i ,
(3)
with a type-dependent coefficient cik > 0 for all k in Θi.
The quality function of the i-th agent
is a real valued
random Qi(ei) := Qi(ei) process paremeterized by the effort
ei. The quality function models everybody's beliefs about
the design capabilities of agent i. The interpretation of the
quality function is as follows. If agent i devotes to the task
an effort of level ei, then they produce a random outcome
of quality Qi(ei). In our previous work [12], we created a
stochastic model for the quality function of a designer where
we explicitly captured its dependence on the problem-solving
skills of the designer and on the task complexity. In that
work, we showed that Qi(ei) has increasing and concave
sample paths, that its mean function is increasing concave,
and the standard deviation is decreasing with effort, albeit
mildly,
is independent of the problem-solving skills of
the designer, and it only increases mildly with increasing
task complexity. Examining the spectral decomposition of the
process for various cases, we observed that it can be well-
approximated by:
it
these independence assumptions, the state of knowledge of the
principal is captured by the following probability measure:
(cid:3) =
(cid:20)
N(cid:89)
i=1
(cid:90)
Bi
(cid:21)
i=1Bi
piθi
φ(ξi)dξi
,
(6)
P(cid:2)Θ = θ, Ξ ∈ ×N
for all θ ∈ Θ and all Borel-measurable Bi ⊂ R. Assuming
that all these are common knowledge, the state of knowledge
of agent i after they observe their type θi (but before they
observe Ξi) is
P(cid:2)Θ−i = θ−i, ξ ∈ ×N
= P[Θ−i = θ−iΘi = θi](cid:81)N
P[Θ=θ,ξ∈×N
P[Θi=θi]
=
i=1Bi
i=1Bi]
(cid:3)
(cid:12)(cid:12)Θi = θi
(cid:104)(cid:82)
(cid:105)
(7)
i=1
Bi
φ(ξi)dξi
Finally, we use E[·] to denote the expectation of any quantity
over the state of knowledge of the principal as characterized
by the probability measure of Eq. (6). That is, the expectation
of any function f (Θ, Ξ) of the agent types Θ and the state of
nature Ξ is
E[f (Θ, Ξ)] =
f (θ, ξ)
[piθiφ(ξi)] dξ.
(8)
Similarly, we use the notation Eiθi [·] to denote the conditional
expectation over the state of knowledge of an agent i who
knows that their type is Θi = θi. This is the expectation
E[·Θi = θi] with respect to the probability measure of Eq. (2)
and we have:
(cid:90)
(cid:88)
θ∈Θ
RN
N(cid:89)
i=1
Eik[f (Θ, Ξ)] =
f (θi, θ−i, ξ)
(cid:88)
(cid:90)
θ−i∈Θ−i
RN
(cid:81)N
j=1
(cid:2)pjθj φ(ξj)(cid:3)
piθi
dξ.
(9)
Qi(ei) = q0
iΘi
(ei) + σiΘiΞi,
(4)
where, for k in Θi, q0
ik(ei) is an increasing, concave, type-
dependent mean quality function, σik > 0 is a type-dependent
standard deviation parameter capturing the aleatory uncertainty
of the design process, and Ξi is a standard normal r.v. If we
further assume that the time window for design is relatively
small, then the q0
ik(ei) term can be approximated as a linear
function. Therefore, we will assume that the quality function
is:
Qi(ei) = κiΘiei + σiΘiΞi,
(5)
where, κ is inversely proportional to the complexity of the
problem. For instance, a large κ corresponds to a low-
complexity task while a κ corresponds to a high-complexity
task. The standard deviation parameter σ captures the inherent
uncertainty of the design process and depends on the maturity
of the underlying technology. In summary, an agent's type is
characterized by the triplet cost-complexity-uncertainty.
From the perspective of the principal,
the r.v.'s Ξi are
independent of the agents' types Θi as they represent the
uncertain state of nature. A stronger assumption that we
employ is that the Ξi's are also independent to each other.
This assumption is strong because it essentially means that
the qualities of the various subsystems are decoupled. Under
B. Type-independent optimal contracts
We start by considering the case where the principal offers
a single take-it-or-leave-it contract independent of the agent
type. This is the situation usually encountered in contractual
relationships between the SE and the sSEs within the same
organization. The principal offers the contract and the agent
decides whether or not to accept it. If the agent accepts, then
they select their level of effort by maximizing their expected
utility, they work on their design task, they return the outcome
quality back to the principal, and they receive their reward.
We show a schematic view of this type of contracts in Fig.
1a. A contract is a monetary transfer function ti : R → R
that specifies the agent's compensation ti(qi) contingent on
the quality level qi. Therefore, the payoff of the i-th agent is
the random process:
Πi(ei) = ti (Qi (ei)) − Ci(ei).
(10)
We assume that the agent knows their type, but they choose
the optimal effort level ex-ante, i.e., they choose the effort
level before seeing the state of the nature Ξi. Denoting their
monetary utility function by Ui(πi) = uiΘi(πi), the i-th agent
selects an effort level by solving:
∗
θi
ei
= arg max
ei∈[0,1]
Eiθi [Ui (Πi(ei))] .
(11)
SUBMITTED TO IEEE SYSTEMS JOURNAL
4
Let Q∗
i be the r.v. representing the quality function that the
principal should expect from agent i if they act optimally, i.e.,
Q∗
i = Qi(e∗
iΘi
).
(12)
Then the system level value is a r.v. of the form
V = v(Q∗),
(13)
where v : RN → R is a function of the subsystem outcomes
Q∗. We introduce the form of the value function, v(q), in Sec.
III. Note that, even though in this work the r.v. V is assumed
to be just a function of Q∗, in reality it may also depend
on the random state of nature, e.g., future prices, demand for
the system services. Consideration of the latter is problem-
dependent and beyond the scope of this work.
Given the system value V and taking into account
transfers to the agents, the system-level payoff is the r.v.
Π0 = V − N(cid:88)
ti(Q∗
i ).
the
(14)
i=1
If the monetary utility of the principal is u0(π0), then they
should select the transfer functions t(·) = (t1(·), . . . , tN (·))
by solving:
t∗ (·) = arg max
t(·)
E [u0 (Π0)] .
(15)
However, guarantee that they want to participate in the SEP,
the expected utility of the sSEs must be greater than the
expected utility they would enjoy if they participated in
another project. Therefore, the SE must solve Eq. (15) subject
to the participation constraints:
Eiθi [Ui (Πi)] ≥ ¯uiθi ,
(16)
for all possible values of θi, and all i = 1, . . . , N, where ¯uiθi
is known as the reservation utility of agent i.
C. Type-depdenent optimal contracts
By offering a single transfer function, the principal is unable
to differentiate between the various agent types when adverse
selection is an issue. That is, all agent types, independently of
their cost, complexity, and uncertainty attributes, exactly the
same transfer function. In other words, with a single transfer
function the principal is actually targeting the average agent.
This necessarily leads to inefficiencies stemming from prob-
lems such as paying an agent involved in a low-complexity
task more than a same cost and uncertainty agent involved in
a high-complexity task.
The principal can gain in efficiency by offering different
transfer functions (if any exist) that target specific agent types.
For example, the principal could offer a transfer function that
is suitable for cost-efficient, low-complexity, low-uncertainty
agents, and one for cost-inefficient agents, low-complexity,
low-uncertainty, etc., for any other combination that is sup-
ported by the principal's prior knowledge about the types of
the agent population. To implement this strategy the princi-
pal can employ the following extension to the mechanism
of Sec. II-B. Prior to initiating work, the agents announce
their types to the principal and they receive a contract that
matches the announced type. In Fig. 1b, we show how this
type of contract evolves in time. Let us formulate this idea
mathematically. The i-th agent announces a type θ(cid:48)
i in Θi (not
necessarily the same as their true type θi), and they receive the
(·). The payoff
associated, type-specific, transfer function tiθ(cid:48)
to agent i is now:
i
Πi(ei, θ(cid:48)
i) = tiθ(cid:48)
i
(Qi(ei)) − Ci(ei),
(17)
where all other quantities are like before. Given the announce-
ment of a type θ(cid:48)
i, the rational thing to do for agent i is to
i (θi, θ(cid:48)
select a level of e∗
i) by maximizing their expected utility,
i.e., by solving:
e∗
iθiθ(cid:48)
Eiθi[Ui(Πi(ei, θ(cid:48)
(18)
i))].
= arg max
ei∈[0,1]
i
Of course, the announcement of θ(cid:48)
i is also a matter of choice
and a rational agent should select also by maximizing their
expected utility. The obvious issue here is that agents can lie
about their type. For example, a cost-efficient agent (agent with
low cost of effort) may pretend to be a cost-inefficient agent
(agent with high cost of effort). Fortunately, the revelation
principle [17] comes to the rescue and simplifies the situation.
It guarantees that, among the optimal mechanisms, there is
one that is incentive compatible. Thus it will be sufficient if
the principal constraints their contracts to over truth-telling
mechanisms. Mathematically, to enforce truth-telling, the SE
must satisfy the incentive compatibility constraints:
, θ(cid:48)
, θi))] ≥ Eiθi [Ui(Πi(e∗
Eiθi[Ui(Πi(e∗
(19)
i))],
iΘiθi
iΘiθ(cid:48)
i
for all θi (cid:54)= θ(cid:48)
i in Θi. Eq. (19) expresses mathematically that
"the expected payoff of agent i when they are telling the truth
is always greater than or equal to the expected payoff they
would enjoy if they lied."
Similar to the developments of Sec. II-B, the quality that
the SE expects to receive is:
Q∗
i = Qi(e∗
iΘiΘi
),
(20)
where we use the fact
compatible. The payoff of the SE becomes:
that
the mechanism is incentive-
Π0 = V − N(cid:88)
tiΘi(Q∗
i ).
(21)
i=1
Therefore, to select the optimal transfer functions, the SE must
solve:
E [u0(Π0)] ,
max
t(·,·)
(22)
subject to the incentive compatibility constraints of Eq. (19),
and the participation constraints:
Eiθi[Ui(Πi(e∗
(23)
for all θi ∈ Θi, where we also assume that the incentive
compatibility constrains hold.
iΘiΘi
, Θi))] ≥ ¯uiθi,
SUBMITTED TO IEEE SYSTEMS JOURNAL
5
(a)
(b)
Fig. 1: (a): Timing of the contract for type-independent con-
tracts. (b): Timing of the contract for type-dependent contracts.
D. Parameterization of the transfer functions
Transfer functions must be practically implementable. That
is, they must be easily understood by the agent when expressed
in the form of a contract. To be easily implementable, transfer
functions should be easy to convey in the form of a table.
To achieve this, we restrict our attention to functions that
are made out of constants, step functions, linear functions,
or combinations of these.
Despite the fact that including such functions would likely
enhance the principal's payoff, we exclude transfer functions
that encode penalties for poor agent performance, i.e., transfer
functions that can take negative values. First, contracts with
penalties may not be implementable if the principal and the
agent reside within the same organization. Second, even when
the agent is an external contractor penalties are not commonly
encountered in practice. In particular, if the SE is a sensitive
government office, e.g., the department of defense, national
security may dictate that the contractors should be protected
from bankruptcy. Third, we do not expect our theory to be
empirically valid when penalties are included since, according
to prospect theory [18], humans perceive losses differently.
They are risk-seeking when the reference point starts at a loss
and risk-averse when the reference point starts at a gain.
To overcome these issues we restrict our attention to transfer
functions that include three simple additive terms: a constant
term representing a participation payment, i.e., a payment
received for accepting to be part of the project; a constant
payment that is activated when a requirement is met; and a
linear increasing part activated after meeting the requirement.
The role of the latter two part is to incentivize the agent to
meet and exceed the requirements.
We now describe this parameterization mathematically. The
transfer function associated with type k in Θi of agent i is
parameterized by:
aik,0 + aik,1 H (qi − aik,2)
tik (qi) =
+aik,3 (qi − aik,2) H (qi − aik,2) ,
(24)
where H is the Heaviside function (H(x) = 1 if x ≥ 0
and 0 otherwise), and all the parameters aik,0, . . . , aik,3 are
non-negative. In Eq. (24), aik,0 is the participation reward,
aik,1 is the award for exceeding the passed-down requirement,
aik,2 is the passed-down requirement, and aik,3 the payoff
per unit quality exceeding the passed-down requirement. We
will call these form of transfer functions the "requirement
based plus incentive" (RPI) transfer function. In case the
aik,3 = 0, we call it the "requirement based" (RB) transfer
function. At this point, it is worth mentioning that the passed-
down requirement aik,2 is not necessarily the same as the
true system requirement ri, see our reults in Sec. III. As we
have shown in earlier work [10], the optimal passed-down
requirement differs from the true system requirement. For
example, the SE should ask for higher requirements for the
design task with low-complexity. On the other hand, for the
task with high-complexity, the SE should pass down less than
the actual requirement. For notational convenience, we denote
by aik ∈ R4
+ (R = {x ∈ R : x ≥ 0}) the transfer parameters
pertaining to agent i of type k ∈ Θi, i.e.,
aik = (aik,0, . . . , aik,3) .
(25)
Similarly, with ai ∈ R4Mi
pertaining to agent i for all types, i.e.,
+ we denote the transfer parameters
ai = (ai1, . . . , aiMi) ,
(26)
and with a ∈ R4(cid:80)N
+
tively, i.e.,
i=1 Mi
all the transfer parameters collec-
a = (a1, . . . , aN ) .
(27)
E. Numerical solution of the optimal contract problem
The optimal contract problem is a an intractable bi-level,
non-linear programming problem.In particular, the SE's prob-
lem is for the case of type-dependent contracts is to maximize
the expected system-level utility over the class of imple-
mentable contracts, i.e.,
E [u0(Π0)] ,
max
a
subject to
1) contract implementability constraints:
aik,j ≥ 0,
(28)
(29)
for all i = 1, . . . , N, k = 1, . . . , Mi, j = 0, . . . , 3;
2) individual rationality constraints:
e∗
ikl = arg max
ei∈[0,1]
Eik[Ui(Πi(ei, l))],
(30)
for all i = 1, . . . , N, k = 1, . . . , Mi, l = 1, . . . , Mi;
3) participation constraints:
Eik[Ui(Πi(e∗
ikk, k))] ≥ ¯uik,
for all i = 1, . . . , N, k = 1, . . . , Mi; and
4) incentive compatibility constraints:
Eik[Ui(Πi(e∗
ikk, k))] ≥ Eik[Ui(Πi(e∗
ikl, l))],
for all i = 1, . . . , N and k (cid:54)= l in {1, . . . , Mi}.
(31)
(32)
For the case of type-independent contracts, one adds the
constraint aik = ail for all i = 1, . . . , N and k (cid:54)= l in
{1, . . . , Mi} and the incentive compatibility constraints are
removed.
SUBMITTED TO IEEE SYSTEMS JOURNAL
6
Nc(cid:88)
A common approach to solving bi-level programming prob-
lems is to replace the internal optimization with the cor-
responding Karush-Kuhn-Tucker (KKT) condition. This ap-
proach is used when the internal problem is concave, i.e., when
it has a unique maximum. However, in our case, concavity
is not guaranteed, and we resort to nested optimization. We
implement everything in Python using the Theano [19] sym-
bolic computation package exploit automatic differentiation.
We solve the follower problem using sequential least squares
programming (SLSQP) as implemented in the scipy package.
We use simulated annealing to find the global optimum point
of the leader problem. We first convert the constraint problem
to the unconstrained problem using the penalty method such
that:
f (a) = E [u0(Π0)] +
(33)
where gi (·)'s are the constraints in Eqs. (29-32). Maximizing
the f (a) in Eq. 33, is equivalent to finding the mode of the
distribution:
min (gi (a) , 0) ,
i=1
πγ (a) ∝ exp (γf (a)) ,
(34)
we use Sequential Monte Carlo (SMC) [20] method to sample
from this distribution by increasing γ from 0.001 to 50. To
perform the SMC, we use the "pysmc" package [21]. To ensure
the computational efficiency of our approach, we need to use a
numerical quadrature rule to approximate the expectation over
Ξ. This step is discussed in Appendix A. To guarantee the
reproducibility of our results, we have published our code in
an open source Github repository (https://github.com/ebilionis/
incentives) with an MIT license.
F. Value Function and Risk Behavior
We assume two types of value functions, namely,
the
requirement based (RB) and requirement based plus incentive
(RPI). Mathematically, we define these two value functions as:
N(cid:89)
VRB := v0
{H(Q∗
i − 1)} .
and,
VRPI := v0
N(cid:89)
i=1
i=1
{H(Q∗
i − 1)} [1 + 0.2(Q∗
i − 1)] ,
Fig. 2: The RB value function (black solid line) and RPI value
function (green dashed line).
Fig. 3: The utility functions for risk averse (RA) (black solid
line), risk neutral (RN) (green dashed line).
III. NUMERICAL EXAMPLES
In this section, we start by performing an exhaustive numer-
ical investigation of the effects of task complexity, agent's cost
of effort, uncertainty in the quality of the returned task, and
adverse selection. In Sec. III-A1, we study the "moral hazard
only" scenario with the RB transfer and value functions. In
Sec. III-A2, we study the effect of the RPI transfer and value
functions. We study the "moral hazard with adverse selection"
in Sec. III-A3.
A. Numerical investigation of the proposed model
In these numerical investigations we consider a single risk
neutral principal and a risk averse agent. Each case study
corresponds to a choice of task complexity (κ in Eq. (5)),
cost of effort (c in Eq. (3)), and performance uncertainty (σ in
Eq. (5)). With regards to task complexity, we select κ = 2.5
for an easy task and κ = 1.5 for a hard task. For the cost of
effort parameter, we associate c = 0.1 and c = 0.4 with the
(35)
(36)
(37)
respectively. In Fig. 2, we show these two value functions for
one subsystem.
We consider two different risk behaviors for individuals, risk
averse (RA) and risk neutral (RN). We use the utility function
in Eq. (37), for the risk behavior of the agents and principal,
(cid:40)
u (π (·)) =
a − be−cπ(·), for RA
π (·) , for RN,
where c = 2 for a RA agent. The parameters a and b are:
a = b =
1
1 − e−c .
We show these utility functions for the two different risk
behaviors in Fig. 3.
SUBMITTED TO IEEE SYSTEMS JOURNAL
7
low- and high-cost agents, respectively. Finally, low- and high-
uncertainty tasks are characterized by σ = 0.1 and σ = 0.4,
respectively.
Note that, the parameters κiθi, ciθi, and σiθi have two
indices. The first index i is the agent's (subsystem's) number
and the second index is the type of the agent. We begin
with a series of cases with a single agent with a known
type denoted by 1 (moral-hazard-only case studies). In these
cases, the parameters corresponding to complexity, cost and
uncertainty are denoted by κ11, c11, and σ11, respectively.
We end with a series of cases with a single agent but
with an unknown type that can take two discrete, equally
probable values 1 and 2 (moral-hazard-and-adverse-selection
case studies). Consequently, κ11 denotes the effort coefficient
of a type-1 agent 1, κ12 the same for a type-2 agent, and so
on for all the other parameters.
To avoid numerical difficulties and singularities, we replace
all Heaviside functions with a sigmoids, i.e.,
Hα(x) =
1
1 + e−αx ,
(38)
where the parameter α controls the slope. We choose α = 50
for the transfer functions and α = 100 for the value function.
We consider two types of value functions, RB and RPI value
functions, see Sec. II-F. For the RB value function we use
the transfer function of Eq. (24) constrained so aik, 3 = 0
(RB transfer function). In other words, the agent is paid a
constant amount if they achieve the requirement and there is
no payment per quality exceeding the requirement. For the
case of RPI value function, we remove this constraint.
1) Moral hazard with RB transfer and value functions:
Consider the case of a single risk-averse agent of known type
and a risk-neutral principal with an RB value function. In
Fig. 4a, we show the transfer functions for several agent types
covering all possible combinations of low/high complexity,
low/high cost, and low/high task uncertainty. Fig. 4b depicts
the probability that the principal's expected utility exceeds a
given threshold for all these combinations. We refer to this
curve as the exceedance curve. Finally, in tables I and II, we
report the expected utility of the principal for the low and high
cost agents, respectively. We make the following observations:
1) For the same level of task complexity and uncertainty,
but with increasing cost of effort:
a) the optimal passed-down requirement decreases;
b) the optimal payment for achieving the requirement
increases;
c) the principal's expected utility decreases; and
d) the exceedance curve shifts to the left.
Intuitively, as the agent's cost of effort increases, the
principal must make the contract more attractive to
ensure that the participation constraints are satisfied.
As a consequence, the probability that the principal's
expected utility exceeds a given threshold decreases.
2) For the same level of task uncertainty and cost of effort,
but with increasing complexity:
a) the optimal passed-down requirement decreases;
b) the optimal payment for achieving the requirement
increases;
c) the principal's expected utility decreases; and
d) the exceedance curve shifts to the left.
Thus, we see that an increase in task complexity has the
same a similar effect as an increase in the agent's cost
of effort. As in the previous case, to make sure that the
agent wants to participate, the principal has to make the
contract more attractive as task complexity increases.
3) For the same level of task complexity and cost of effort,
but with increasing uncertainty:
a) the optimal passed-down requirement increases;
b) the optimal payment for achieving the requirement
c) the principals expected utility decreases;
d) the exceedance curve shifts towards the bottom
increases;
right.
This case is the most interesting. Here as the uncertainty
of the task increases, the principal must increase the
passed-down requirement to ensure that they are hedged
against failure. At the same time, however, they must
also increase the payment to ensure that the agent still
has an incentive to participate.
4) For all cases considered, the optimal passed down re-
quirement is greater than the true requirement (which is
set to one). Note, however, this is not universally true.
Our study does not examine all possible combinations of
cost, quality, and utility functions that could have been
considered. Indeed, as we showed in our previous work
[10], there are situations in which a smaller-than-the-true
requirement can be optimal.
TABLE I: The expected utility of the principal for low cost
agent with RB value function.
Low Uncertainty
High Uncertainty
Low Complexity
High Complexity
0.97
0.92
0.93
0.79
TABLE II: The expected utility of the principal for high cost
agent with RB value function.
Low Uncertainty
High Uncertainty
Low Complexity
High Complexity
0.89
0.72
0.77
0.45
2) Moral hazard with RPI transfer and value functions:
This case is identical to Sec. III-A1, albeit we use the RPI
value function, see Sec. II-F, and the RPI transfer function,
see Eq. (24). Fig 5a, depicts the transfer functions for all
combinations of agent types and task complexities. In Fig.
5b, we show the exceedance curve using the RPI value and
transfer functions. Finally, in tables III and IV, we report the
expected utility of the principal using the RPI transfer and
value functions for the low and high cost agents, respectively.
The results are qualitative similar to Sec. III-A1, with the
additional observations:
1) For the same level of task complexity, uncertainty and
agent cost, the optimal reward for achieving the re-
quirement decreases compared to the same cases in
SUBMITTED TO IEEE SYSTEMS JOURNAL
8
(a) Transfer functions using RB value function.
(b) Exceedance curve.
Fig. 4: L and H stand for low and high, respectively, Comp. and Unc. stand for complexity and uncertainty, respectively. The
low and high complexity denote the κ11 = 2.5 and κ11 = 1.5, respectively, low and high cost denote c11 = 0.1 and c11 = 0.4,
respectively, low and high uncertainty denote σ11 = 0.1 and σ11 = 0.4, respectively, RA denotes the risk averse agent. (a):
The RB transfer functions for several different agent types with respect to outcome of the subsystem (Q1) for moral hazard
scenario. (b): The exceedance for the moral hazard scenario using the RB transfer function.
Sec. III-A1. Intuitively, as the principal has the option
to reward the agent based on the quality exceeding the
requirement, they prefer to pay less for fulfilling the
requirement. Instead, the principal incentivizes the agent
to improve the quality beyond the optimal passed-down
requirement.
2) The slope of the transfer function beyond the passed-
down requirement is almost identical to the slope of the
value function.
TABLE III: The expected utility of the principal for low cost
agent with RPI value function.
Low Uncertainty
High Uncertainty
Low Complexity
High Complexity
1.2
1.0
1.2
0.89
TABLE IV: The expected utility of the principal for high cost
agent with RPI value function.
Low Uncertainty
High Uncertainty
Low Complexity
High Complexity
0.95
0.76
0.93
0.56
In table V, we summarize our observations for the results
in Sec.
III-A1 and III-A2. In this table, we show how the
passed-down requirement and payment change when we fix
two parameters of the model (we denote it by "fix" in the
table) and vary the third parameter. We denote increase by ↑
and decrease by ↓.
3) Moral hazard with adverse selection: Consider the case
of a single risk-averse agent of unknown type which takes two
possible values, and a risk-neutral principal with a RB value
function. We consider two possibilities for the unknown type:
TABLE V: Summary of the observations.
complexity
↑
fix
fix
agent cost
uncertainty
fix
↑
fix
fix
fix
↑
requirement
↓
↓
↑
payment
↑
↑
↑
1) Unknown cost of effort. Here, we set κ11 = κ12 = 1.5
(p(κ11 = 1.5) = 1), σ11 = σ12 = 0.1 (p(σ11 = 0.1)),
and p(c11 = 0.1) = 0.5 and p(c12 = 0.4) = 0.5
2) Unknown task complexity. For the unknown quality we
assume that p(κ11 = 2.5) = 0.5 and p(κ12 = 1.5) =
0.5, σ11 = σ12 = 0.4 (p(σ11 = 0.4) = 1), and c11 =
c12 = 0.4 (p(c11 = 0.4) = 1).
In this scenario, we maximize the expected utility of the
principal subject to constraints in Eqs. (29-32). The incentive
compatibility constraint, Eq. (32), guarantees that the agent
will choose the contract that is suitable for their true type. In
other words, as there are two agent types' possibilities, the
principal must offer two contracts, see Fig. 1b. These two
contracts must be designed in a way that there is no benefit
for the agent to deviate from their true type, i.e., the contracts
enforce the agent to be truth telling.
Solving the constraint optimization problem yields:
a11 = a12 = (0, 0.29, 1.06),
i.e., the two contracts collapse into one. Note that the resulting
contract is the same as the pure moral hazard case, Sec. III-A1,
for an agent with type κ11 = 1.5, σ11 = 0.1, and c11 =
0.4. In other words, the principal must behave as if there was
only a high-cost agent. That is, there are no contacts that can
differentiate between a low- and a high-cost agent in this case.
A similar outcome occurs for unknown task complexity.
The solution of the constraint optimization problem for this
SUBMITTED TO IEEE SYSTEMS JOURNAL
9
(a) Transfer functions using RPI value function.
(b) Exceedance curve.
Fig. 5: L and H stand for low and high, respectively, Comp. and Unc. stand for complexity and uncertainty, respectively. The
low and high complexity denote the κ11 = 2.5 and κ11 = 1.5, respectively, low and high cost denote c11 = 0.1 and c11 = 0.4,
respectively, low and high uncertainty denote σ11 = 0.1 and σ11 = 0.4, respectively, RA denotes the risk averse agent. (a):
The RPI transfer functions for several different agent types with respect to outcome of the subsystem (Q1) for moral hazard
scenario. (b): The exceedance curve for the moral hazard scenario using the RPI transfer function.
scenario is:
a11 = a12 = (0, 0.08, 1.11),
which is the same as the optimum contract that is offered for
the pure moral hazard case, Sec. III-A1, for an agent with
type κ11 = 1.5, σ11 = 0.4, and c11 = 0.4. Therefore, in this
case the principal must behave as if there the task is of high
complexity.
Note that in both cases above, the collapse of the two
contracts to one contract is not a generalizable property of our
model. In particular, it may not happen if more flexible trans-
fer functions are allowed, e.g., ones that allow performance
penalties.
In Fig. 6, we show the transfer functions for the adverse
selection scenarios with unknown cost and unknown quality.
In tables VI and VII, we show the expected utility of two
types of agents and the principal using the optimum contract
for unknown cost and unknown quality, respectively. To sum
up:
1) The unknown cost:
a) the optimum transfer function for this problem is
as same as that the principal would have offered for
a single-type high-cost agent with c11 = c12 = 0.4
(moral hazard scenario with no adverse selection);
b) the expected utility of the low cost agent (efficient
agent) is greater than that of the high cost agent.
In this case,
the low-cost agent benefits because of
information asymmetry. In other words, the principal
must pay an information rent to the low-cost agent to
reveal their type.
2) The unknown task complexity:
a) the optimum contract in this case is the contract
that the principal would have offered for the single-
type high-complexity task with κ11 = κ12 = 1.5;
b) the expected utility of an agent dealing with a low-
complexity task is greater than that of an agent
dealing with a high-complexity task.
Again, due to the information asymmetry,
the agent
benefits if the task complexity is low. The principal must
pay an information rent to reveal the task complexity.
Fig. 6: The transfer function for the adverse selection scenarios
with unknown cost (solid line) and unknown quality (dashed
line), the agent is risk averse. For unknown cost: κ11 = κ12 =
1.5 with probability 1, σ11 = σ12 = 0.1 with probability 1, and
c11 = 0.1 with probability 0.5 and c12 = 0.4 with probability
0.5. For unknown quality: κ11 = 2.5 with probability 0.5
and κ12 = 1.5 with probability 0.5, σ11 = σ12 = 0.4 with
probability 1, and c11 = c12 = 0.4 with probability 1.
SUBMITTED TO IEEE SYSTEMS JOURNAL
10
TABLE VI: The expected utility of the agent with unknown
cost for two different contracts.
Low Cost Agent (Type 1)
High Cost Agent (Type 2)
E[u1(·)]
0.39
0
E[u0(·)]
0.72
0.72
TABLE VII: The expected utility of the agent with unknown
quality for two different contracts.
Low Complexity (Type 1)
High Complexity (Type 2)
E[u1(·)]
0.52
0
E[u0(·)]
0.45
0.45
B. Satellite Design
In this section we apply our method on a simplified satellite
design. Typically a satellite consists of seven different subsys-
tems [22], namely, electrical power subsystem, propulsion, at-
titude determination and control, on-board processing, teleme-
try, tracking and command, structures and thermal subsystems.
We focus our attention on the propulsion subsystem (N = 1).
To simplify the analysis, we assume that the design of these
subsystems is assigned to a sSE in a one-shot fashion. Note
that, the actual systems engineering process of the satellite
design is an iterative process and the information and results
are exchanged back and forth in each iteration. Our model
is a crude approximation of reality. The goal of the SE is to
optimally incentivize the sSE to produce subsystem designs
that meet the mission's requirements. Furthermore, we assume
that the propulsion subsystem is decoupled from the other
subsystems, i.e., there is no interactions between them, and
that the SE knows the types of each sSE and therefore, there
is no information asymmetry.
To extract the parameters of the model, i.e., a11, σ11, c11,
we will use available historical data. To this end,
let I1
be the cumulative, sector-wide investment on the propulsion
subsystem and G1 be the delivered specific impulse of solid
propellants (Isp). The specific impulse is defined as the ratio
of thrust to weight flow rate of the propellant and is a measure
of energy content of the propellants [22].
Historical data, say D1 = {(I1,i, G1,i)}S
i=1, of these quanti-
ties are readily available for many technologies. Of course,
cumulative investment and best performance increase with
time, i.e., I1,i ≤ I1,i+1 and G1,i ≤ G1,i+1. We model the
relationship between G1 and I1 as:
G1 = G1,S + A1(I1 − I1,S) + Σ1Ξ1,
(39)
where G1,S and I1,S are the current states of these variables,
Ξ1 ∼ N (0, 1), and A1 and Σ1 are parameters to be estimated
from the all available data, D1. We use a maximum likelihood
estimator for A1 and Σ1. This is equivalent to a least squares
estimate for Ai:
A1 = arg min
A1
[G1,S + A1(I1,i − I1,S) − G1,i]2 ,
(40)
(cid:105)2
S(cid:88)
(cid:104)
S(cid:88)
i=1
i=1
and to setting Σ1 equal to the mean residual square error:
Σ1 =
1
S
G1,S + A1(I1,i − I1,S) − G1,i
.
(41)
Now, let Gr
1 be the required quality for the propulsion
subsystem in physical units. The scaled quality of a subsystem
Q1, can be defined as:
Q1 =
G1 − G1,S
1 − G1,S
Gr
,
(42)
with this definition, we get Q1 = 0 for the state-of-the-art, and
Q1 = 1 for the requirement. Substituting Eq. (39) in Eq. (42)
and using the maximum likelihood estimates for A1 and Σ1,
we obtain:
Q1 =
A1
1 − G1,S
Gr
(I1 − I1,S) +
Σ1
1 − G1,S
Gr
Ξ1.
(43)
From this equation, we can identify the uncertainty σ11 in the
quality function as:
σ11 =
Σ1
1 − G1,S
Gr
.
(44)
Finally, we need to define effort. Let T1 represents the time
for which the propulsion engineer is to be hired. The cost
of the agent per unit time is C1. T1 is just the duration of
the systems engineering process we consider. The value C1T1
can be read from the balance sheets of publicly traded firms
related to the technology. We can associate the effort variable
e1 with the additional investment required to buy the time of
one engineer:
e1 =
I1 − I1,S
C1T1
,
(45)
that is, e1 = 1 corresponds to the effort of one engineer for
time T1. Let us assume there are Z engineers work on the
subsystem. Comparing this equation, Eq. (43), and Eq. (5),
we get that the κ11 coefficient is given by:
κ11 =
ZC1T1 A1
1 − G1,S
Gr
.
(46)
To complete the picture, we need to talk about the value V0
(in USD) of the system if the requirements are met. We can
use this value to normalize all dollar quantities. That is, we
set:
v0 = 1,
(47)
and for the cost per square effort of the agent we set:
c11 =
ZC1T1
V0
.
(48)
Finally, we use some real data to fix some of the parameters.
Trends in delivered Isp (G1 (sec.)) and investments by NASA
(I1 (millions USD)) in chemical propulsion technology with
time are obtained from [23] and [24], respectively. The state-
of-the-art solid propellant technology corresponds to a G1,S
value of 252 sec. and I1,S value of 149.1 million USD. The
maximum likelihood fit of the parameters results in a regres-
sion coefficient of A1 = 0.0133 sec. per million USD, and
standard deviation Σ1 = 0.12 sec. The corresponding data and
the maximum likelihood fit are illustrated in Fig. 7. The value
of C1 is the median salary (per time) of a propulsion engineer
which is approximately 120,000 USD / year, according to
the data obtained from [25]. For simplicity, also assume that
T1 = 1 year. Moreover, we assume that there are 200 engineers
SUBMITTED TO IEEE SYSTEMS JOURNAL
11
work on the subsystem, Z = 200. We will examine two case
studies which is summarized in table VIII.
Fig. 7: Satellite case study (propulsion subsystem): Histor-
ical data (1979 -- 1988) of specific impulse of solid mono-
propellants vs cumulative investment per firm. The solid line
and the shaded area correspond to the maximum likelihood
fit of a linear regression model and the corresponding 95%
prediction intervals, respectively.
TABLE VIII: The model parameters for two case studies.
Gr
1
252.2 s
252.25 s
V0
50,000,000 USD
60,000,000 USD
κ11
1.6
1.28
σ11
0.6
0.48
c11
0.5
0.4
Using RB value function, we depict the contracts for these
two scenarios in Fig. 8.
Fig. 8: The contracts for two case studies in satellite design.
IV. CONCLUSIONS
We developed a game-theoretic model for a one-shot shal-
low SEP. We posed and solved the problem of identifying the
contract (transfer function) that maximizes the principal's ex-
pected utility. Our results show that, the optimum passed-down
requirement is different from the real system requirement.
For the same level of task complexity and uncertainty, as the
agent cost of effort increases, the passed-down requirement de-
creases and the award to achieving the requirement increases.
In this way, the principal makes the contract more attractive to
the high-cost agent and ensures that the participation constraint
is satisfied. Similarly, for the same level of task uncertainty
and cost of effort, increasing task complexity results in lower
passed-down requirement and larger award for achieving the
requirement. For the same level of task complexity and cost
of effort, as the uncertainty increases both the passed-down
requirement and the award for achieving the requirement
increase. This is because the principal wants to make sure that
the system requirements are achieved. Moreover, by increasing
the task complexity, the task uncertainty, or the cost of effort,
the principal earns less and the exceedance curve is shifted to
the left. Using the RPI contracts, the principal pays smaller
amount for achieving the requirement but, instead, they pay
for per quality exceeding the requirement.
For the adverse selection scenario with RB value function,
we observe that when the principal is maximally uncertain
about the cost of the agent, the optimum contracts are equiv-
alent to the contract designed for the high cost agent in the
single-type case with no adverse selection. The low-cost agent
earns more expected utility than the high-cost agent. This is
the information rent that the principal must pay to reveal the
agents' types. Similarly, if the principal is maximally uncertain
about the task complexity, the two optimum contracts for the
unknown quality are equivalent to the contract that is offered to
the high-complexity task where there is no adverse selection.
Note that, the equivalence of the contracts in adverse selection
scenario with the contract that is offered in absence of adverse
selection is not universal. If the class of possible contracts is
enlarged, e.g., to allow penalties, there may be a set of two
contracts that differentiate types.
There are still many remaining questions in modeling SEPs
using a game-theoretic approach. First, there is a need to study
the hierarchical nature of SEPs with potentially coupled sub-
systems. Second, true SEPs are dynamic in nature with many
iterations corresponding to exchange of information between
the various agents. These are the topics of ongoing research
towards a theoretical foundation of systems engineering design
that accounts for human behavior.
APPENDIX A
NUMERICAL ESTIMATION OF THE REQUIRED
EXPECTATIONS
For the numerical implementation of the suggested model,
we need to be able to carry out expectations of the form
of Eq. 9 a.k.a. Eq. 8 and Eq. 7. Since, we have at most
two possible types in our case studies, the summation over
the possible types is trivial. Focusing on expectations over
Ξ, we evaluate them using a sparse grid quadrature rule
[26]. In particular, any expectation of the form E[g(Ξ)] is
approximated by:
w(s)g
,
(49)
E[g(Ξ)] ≈ Ns(cid:88)
s=1
(cid:16)
ξ(s)(cid:17)
SUBMITTED TO IEEE SYSTEMS JOURNAL
12
[13] J. A. Mirrlees, "The theory of moral hazard and
unobservable behaviour: Part i," The Review of Economic
Studies, vol. 66, no. 1, pp. 3 -- 21, 1999.
[Online].
Available: http://www.jstor.org/stable/2566946
[14] W. P. Rogerson, "The first-order approach to principal-
agent problems," Econometrica, vol. 53, no. 6, pp.
1357 -- 1367, 1985. [Online]. Available: http://www.jstor.
org/stable/1913212
[15] R. Ke, C. T. Ryan et al., "A general solution method for
moral hazard problems."
[16] R. Myerson, Game Theory: Analysis of Conflict.
Harvard University Press, 1991. [Online]. Available:
https://books.google.com/books?id=1w5PAAAAMAAJ
[17] R. B. Myerson, "Optimal auction design," Mathematics
of operations research, vol. 6, no. 1, pp. 58 -- 73, 1981.
[18] D. Kahneman and A. Tversky, "Prospect
theory.. an
analy-sis of decision under risk," 2008.
[19] Theano Development Team, "Theano: A Python frame-
work for fast computation of mathematical expressions,"
arXiv e-prints, vol. abs/1605.02688, May 2016. [Online].
Available: http://arxiv.org/abs/1605.02688
[20] A. Doucet, S. Godsill, and C. Andrieu, "On sequential
monte carlo sampling methods for bayesian filtering,"
Statistics and computing, vol. 10, no. 3, pp. 197 -- 208,
2000.
[21] Ilias bilionis, "Sequential Monte Carlo working on
top of pymc." [Online]. Available: https://github.com/
PredictiveScienceLab/pysmc
[22] J. R. Wertz, D. F. Everett, and J. J. Puschell, Space
mission engineering: the new SMAD.
Hawthorne,
CA: Microcosm Press : Sold and distributed world-
wide by Microcosm Astronautics Books, 2011, oCLC:
747731146.
[23] "Solid."
[Online]. Available: http://www.astronautix.
com/s/solid.html
[24] "NASA Historical Data Books." [Online]. Available:
https://history.nasa.gov/SP-4012/vol6/cover6.html
[25] "Propulsion Engineer Salaries." [Online]. Available:
https://www.paysa.com/salaries/propulsion-engineer--t
[26] T. Gerstner and M. Griebel, "Numerical
integration
using sparse grids," Numerical Algorithms, vol. 18,
no. 3, p. 209, Jan 1998. [Online]. Available: https:
//doi.org/10.1023/A:1019129717644
where w(s) and ξ(s) are the Ns = 127 quadrature points of
the level 6 sparse grid quadrature constructed by the Gauss-
Hermite 1D quadrature rule.
ACKNOWLEDGMENT
This material is based upon work supported by the National
Science Foundation under Grant No. 1728165.
REFERENCES
[1] G. Locatelli, "Why are megaprojects, including nuclear
power plants, delivered overbudget and late? reasons and
remedies," arXiv preprint arXiv:1802.07312, 2018.
[2] U. S. G. A. Office, "Navy shipbuilding past performance
provides valuable lessons for future investments," 2018.
[3] N. GAO, "Assessments of major projects," 2018.
[4] I. Maddox, P. Collopy, and P. A. Farrington, "Value-based
assessment of dod acquisitions programs," Procedia
Computer Science, vol. 16, pp. 1161 -- 1169, 2013, 2013
Conference on Systems Engineering Research. [Online].
Available: http://www.sciencedirect.com/science/article/
pii/S1877050913001233
[5] P. D. Collopy and P. M. Hollingsworth, "Value-Driven
Design," Journal of Aircraft, vol. 48, no. 3, pp.
749 -- 759, 2011. [Online]. Available: https://doi.org/10.
2514/1.C000311
[6] A. Bandura, "Social cognitive theory: An agentic per-
spective," Annual review of psychology, vol. 52, no. 1,
pp. 1 -- 26, 2001.
[7] M. Shergadwala, I. Bilionis, K. N. Kannan, and J. H. Pan-
chal, "Quantifying the impact of domain knowledge and
problem framing on sequential decisions in engineering
design," Journal of Mechanical Design, vol. 140, no. 10,
p. 101402, 2018.
[8] A. M. Chaudhari, Z. Sha, and J. H. Panchal, "Analyzing
participant behaviors in design crowdsourcing contests
using causal inference on field data," Journal of Mechan-
ical Design, vol. 140, no. 9, p. 091401, 2018.
[9] S. D. Vermillion and R. J. Malak, "Using a principal-
agent model to investigate delegation in systems engi-
neering," in ASME 2015 International Design Engineer-
ing Technical Conferences and Computers and Infor-
mation in Engineering Conference. American Society
of Mechanical Engineers, 2015, pp. V01BT02A046 --
V01BT02A046.
[10] S. Safarkhani, V. R. Kattakuri, I. Bilionis, and J. Panchal,
"A principal-agent model of systems engineering pro-
cesses with application to satellite design," arXiv preprint
arXiv:1903.06979, 2019.
[11] J. Watson, "Contract, mechanism design, and technologi-
cal detail," Econometrica, vol. 75, no. 1, pp. 55 -- 81, 2007.
[12] S. Safarkhani, I. Bilionis, and J. Panchal, "Understanding
the effect of task complexity and problem-solving skills
on the design performance of agents in systems engineer-
ing," the ASME 2018 International Design Engineering
Technical Conferences and Computers and Information
in Engineering Conference, Aug 2018.
|
cs/0001008 | 3 | 0001 | 2003-06-20T14:20:48 | Predicting the expected behavior of agents that learn about agents: the CLRI framework | [
"cs.MA",
"cs.LG"
] | We describe a framework and equations used to model and predict the behavior of multi-agent systems (MASs) with learning agents. A difference equation is used for calculating the progression of an agent's error in its decision function, thereby telling us how the agent is expected to fare in the MAS. The equation relies on parameters which capture the agent's learning abilities, such as its change rate, learning rate and retention rate, as well as relevant aspects of the MAS such as the impact that agents have on each other. We validate the framework with experimental results using reinforcement learning agents in a market system, as well as with other experimental results gathered from the AI literature. Finally, we use PAC-theory to show how to calculate bounds on the values of the learning parameters. | cs.MA | cs |
Autonomous Agents and Multiagent Systems, January, 2003.
Predicting the Expected Behavior of Agents that
Learn About Agents: The CLRI Framework
Jos´e M. Vidal and Edmund H. Durfee
Swearingen Engineering Center, University of South
Carolina, Columbia, SC, 29208
Advanced Technology Laboratory, University of
Michigan, Ann Arbor, MI, 48102
October 29, 2018
Abstract
We describe a framework and equations used to model and predict the
behavior of multi-agent systems (MASs) with learning agents. A difference
equation is used for calculating the progression of an agent's error in its
decision function, thereby telling us how the agent is expected to fare in
the MAS. The equation relies on parameters which capture the agent's
learning abilities, such as its change rate, learning rate and retention rate,
as well as relevant aspects of the MAS such as the impact that agents
have on each other. We validate the framework with experimental results
using reinforcement learning agents in a market system, as well as with
other experimental results gathered from the AI literature. Finally, we
use PAC-theory to show how to calculate bounds on the values of the
learning parameters.
Multi-Agent Systems, Machine Learning, Complex Systems.
1 Introduction
With the steady increase in the number of multi-agent systems (MASs) with
learning agents [9, 5, 10, 31] the analysis of these systems is becoming increas-
ingly important. Some of the research in this area consists of experiments where
a number of learning agents are placed in a MAS, then different learning or sys-
tem parameters are varied and the results are gathered and analyzed in an
effort to determine how changes in the individual agent behaviors will affect the
system behavior. We have learned about the dynamics of market-based MASs
using this approach [34]. However, in this article we will take a step beyond
these observation-based experimental results and describe a framework that can
be used to model and predict the behavior of MASs with learning agents. We
give a difference equation that can be used to calculate the progression of an
c(cid:13) Kluwer Academic Publishers 2002.
PSfrag replacements
w:
δ
δ
δ
δ2
δ3
a:
δ1
Figure 1: The agents in a MAS.
agent's error in its decision function. The equation relies on the values of pa-
rameters which capture the agents' learning abilities and the relevant aspects
of the MAS. We validate the framework by comparing its predictions with our
own experimental results and with experimental results gathered from the AI
literature. Finally, we show how to use probably approximately correct (PAC)
theory to get bounds on the values of some of the parameters.
The types of MAS we study are exemplified by the abstract representation
shown in Figure 1. We assume that the agents observe the physical state of
the world (denoted by w in the figure) and take some action (a) based on their
observation of the world state. An agent's mapping from states to actions is
denoted by the decision function (δ) inside the agent. Notice that the "physical"
state of the world includes everything that is directly observable by the agent
using its sensors. It could include facts such as a robot's position, or the set
outstanding bids in an auction, depending on the domain. The agent does not
know the decision functions of the other agents. After taking action an agent
can change its decision function as prescribed by whatever machine-learning
algorithm the agent is using.
We have a situation where agents are changing their decision function based
on the effectiveness of their actions. However, the effectiveness of their actions
depends on the other agents' decision functions. This scenario leads to the
immediate problem: if all the agents are changing their decisions functions then
it is not clear what will happen to the system as a whole. Will the system
settle to some sort of equilibrium where all agents stop changing their decision
functions? How long will it take to converge? How do the agents' learning
abilities influence the system's behavior and possible convergence? These are
some of the questions we address in this article.
Section 2 presents our framework for describing an agent's learning abilities
and the error in its behavior. Section 3 presents an equation that can be used
to predict an agent's expected error, as a function of time, when the agent is
in a MAS composed of other learning agents. This equation is simplified in
Section 4 by making some assumptions about the type of MAS being modeled.
Section 5 then defines the last few parameters used in our framework -- volatility
and impact. Section 6 gives an illustrative example of the use of the framework.
The predictions made by our framework are verified by our own experiments, as
2
shown in Section 7, and with the experiments of others, as shown in Section 8.
The use of PAC theory for determining bounds on the learning parameters is
detailed in Section 9. Finally Section 10 describes some of the related work and
Section 12 summarizes our claims.
2 A Framework for Modeling MASs
In order to analyze the behaviors of agents in MASs composed of learning
agents, we must first construct a formal framework for describing these agents.
The framework must state any assumptions and simplifications it makes about
the world, the agents, and the agents' behaviors. It must also be mathemati-
cally precise, so as to allow us to make quantitative predictions about expected
behaviors. Finally, the simplifications brought about because of the need for
mathematical precision should not be so constraining that they prevent the ap-
plicability of the framework to a wide variety of learning algorithms and different
types of MASs. We now describe our framework and explain the types of MASs
and learning behaviors that it can capture.
2.1 The World and its Agents
A MAS consists of a finite number of agents, actions, and world states. We
let N denote the finite set of agents in the system. W denotes the finite set of
world states. Each agent is assumed to have a set of perceptors (e.g., a camera,
microphone, bid queue) with which it can perceive the world. An agent uses is
sensors to "look" at the world and determine which world state w it is in; the
set of all these states is W . Ai, where Ai ≥ 2, denotes the finite set of actions
agent i ∈ N can take.
We assume discrete time, indexed in the various functions by the superscript
t, where t is an integer greater than or equal to 0. The assumption of discrete
time is made, for practical reasons, by a number of learning algorithms.
It
means that, while the world might be continuous, the agents perceive and learn
in separate discrete time steps.
We also assume that there is only one world state w at each time, which all
the agents can perceive in its completeness. That is, we asume the enviroment
is accessible (as defined in [26, p46]). This assumption holds for market systems
in which all the actions of all the agents are perceived by all the agents, and
for software agent domains in which all the agents have access to the same
information. However, it might not hold for robotic domains where one agent's
view of the world might be obscured by some physical obstacle. Even in such
domains, it is possible that there is a strong correlation between the states
perceived by each agent. These correlations could be used to create equivalency
classes over the agents' perceived states, and these classes could then be used
as the states in W .
Finally, we assume the environment is determistic [26, p46]. That is, the
agents' combined actions will always have the expected effect. Of course, agent
3
New world wt ∈ D
/Perceive world wt
iSSSSSSSSSSSSSSSSSS
t←t+1
Learn
/Take action δi(wt)
Receive payoff
or feedback.
Figure 2: Action/Learn loop for an agent.
i might not know what action agent j will take so i might not know the eventual
effect of its own individual action.
2.2 A Description of Agent Behavior
In the types of MASs we are modeling, every agent i perceives the state of the
world w and takes an action ai, at each time step. We assume that every agent's
behavior, at each moment in time, can be described with a simple state-to-
action mapping. That is, an agent's choice of action is solely determined by its
current state-to-action mapping and the current world w.
Formally, we say that agent i's behavior is represented by a decision func-
tion (also known as a "policy" in control theory and a "strategy" in game
theory), given by δt
i : W → Ai. This function maps each state w ∈ W to the
action ai ∈ Ai that agent i will take in that state, at time t. This function can
effectively describe any agent that deterministically chooses its action based on
the state of the world. Notice that the decision function is indexed with the
time t. This allows us to represent agents that change their behavior.
The action agent i should take in each state w is given by the target func-
tion ∆t
i : W → Ai, which also maps each state w ∈ W to an action ai ∈ Ai.
The agent does not have direct access to its target function. The target function
is used to determine how well an agent is doing. That is, it represents the "per-
fect" behavior for a given agent. An agent's learning task is to get its decision
function to match its target function as much as possible.
i, one would need to know δt
Since the choice of action for agent i often depends on the actions of other
agents, the target function for i needs to take these actions into account. That
is, in order to generate ∆t
j(w) for all j ∈ N−i and
w ∈ W . These δt
j(w) functions tell us the actions that all the other agents will
take in every state w. For example, in order for one to determine what an agent
should bid in every world w of an auction-based market system, one will need
to know what the other agents will bid in every world w. One can use these
actions, along with the state w, in order to identify the best action for i to take.
i . These changes
in an agent's decision function reflect its learned knowledge. The agents in
the MASs we consider are engaged in the discrete action/learn loop shown in
Figure 2. The loop works as follows: At time t the agents perceive a world
wt ∈ W which is drawn from a fixed distribution D(w). They then each take
the action dictated by their δt
i functions; all of these actions are assumed to
be taken effectively in parallel. Lastly, they each receive a payoff which their
i (w) can change over time, so that δt+1
An agent's δt
6= δt
i
4
/
/
i
o
o
i
j of all other agents j ∈ N−i.
respective learning algorithms use to change the δt
i so as to, hopefully, better
i. By time t + 1, the agents have new δt+1
match ∆t
functions and are ready to
perceive the world again and repeat the loop. Notice that, at time t, an agent's
∆t
i is derived by taking into account the δt
We assume that D(w) is a fixed probability distribution from which we take
the worlds seen at each time. This assumption is not unreasonably limiting.
For example, in an economic domain where the new state is the new good being
offered, or in an episodic domain where the agents repeatedly engage in different
games (e.g. a Prisoner's Dilemma competition) there is no correlation between
successive world states or between these states and the agents' previous actions.
However, in a robotic domain one could argue that the new state of the world
will depend on the current state of the world; after all, the agents probably
move very little each time step.
Our measure of the correctness of an agent's behavior is given by our error
measure. We define the error of agent i's decision function δt
i (w) as
e(δt
i ) = Xw∈W
= Prw∈D[δt
D(w)Pr[δt
i (w) 6= ∆t
i(w)]
i (w) 6= ∆t
i(w)].
(1)
e(δt
i ) gives us the probability that agent i will take an incorrect action; it
is in keeping with the error definition used in computational learning theory
[17]. We use it to gauge how well agent i is performing. An error of 0 means
that the agent is taking all the actions dictated by its target function. An
error of 1 means that the agent never takes an action as dictated by its target
function. Each action the agent takes is either correct or incorrect, that is, it
either matches the target function or it does not. We do not model degrees of
incorrectness. However, since the error is defined as the average over all possible
world states, an agent that takes the correct action in most world states will
have a small error. Extending the theory to handle degrees of incorrectness is
one of the subjects of your continuing work, see Section 11. All the notation
from this section is summarized in Figure 3.
2.3 The Moving Target Function Problem
The learning problem the agent faces is to change its δt
i (w) so that it matches
∆t
i(w). If we imagine the space of all possible decision functions, then agent i's
δt
i and ∆t
i will be two points in this space, as shown in Figure 4. The agent's
learning problem can then be re-stated as the problem of moving its decision
function as close as possible to its target function, where the distance between
the two functions is given by the error e(δt
i ). This is the traditional machine
learning problem.
However, once agents start to change their decision functions (i.e., change
their behaviors) the problem of learning becomes more complicated because
these changes might cause changes in the other agents' target functions. We
end up with a moving target function, as seen in Figure 5. In these systems, it
5
N the set of all agents, where i ∈ N is one particular agent.
W the set of possible states of the world, where w ∈ W is one particular
state.
Ai the set of all actions that agent i can take.
δt
i : W → Ai the decision function for agent i at time t.
It tells which
action agent i will take in each world.
∆t
i : W → Ai the target function for agent i at time t. It tells us what
It takes into account the actions that
action agent i should take.
other agents will take.
e(δt
i ) = Pr[δt
i (w) 6= ∆t
i(w) w ∈ D] the error of agent i at time t. It is the
probability that i will take an incorrect action, given that the worlds
w are taken from the fixed probability distribution D.
Figure 3: Summary of notation used for describing a MAS and the agents in it.
8q
qqqqq
Learn
qqqq
qqq
δt
i
δt+1
i
e(δt+1
i
)
e(δt
i )
∆i
Figure 4: The traditional learning problem.
6
)
i
)
i
)
i
)
i
)
i
)
i
)
i
)
i
)
i
)
i
)
i
)
i
8
/
o
/
o
/
o
/
o
/
o
/
o
/
o
/
o
/
o
/
o
/
o
/
o
/
o
/
o
/
o
/
o
/
o
/
o
/
o
/
o
/
o
/
o
is not clear if the error will ever reach 0 or, more generally, what the expected
error will be as time goes to infinity. Determining what will happen to an agent's
error in such a system is what we call the moving target function problem,
which we address in this article. However, we will first need to define some
parameters that describe the capabilities of an agent's learning algorithm.
8q
qq
qq
Learn
qqq
qq
qq
q
δt
i
δt+1
i
e(δt
i )
e(δt+1
i
)
∆t
i Move
/ ∆t+1
i
Figure 5: The learning problem in learning MASs.
2.4 A Model of Learning Algorithms
i into δt+1
An agent's learning algorithm is responsible for changing δt
so that it
is a better match of ∆t
i. Different machine learning algorithms will achieve this
match with different degrees of success. We have found a set of parameters that
can be used to model the effects of a wide range of learning algorithms. The
parameter are: Change rate, Learning rate, Retention rate, and Impact; and
they will be explained in this section, except for Impact which will be introduced
in Section 5. These parameters, along with the equations we provide, form the
CLRI framework (the letters correspond to the first letter of the parameters'
names).
i
After agent i takes an action and receives some payoff, it activates its learning
algorithm, as we showed in Figure 2. The learning algorithm is responsible for
using this payoff in order to change δt
i as much
as possible. We can expect that for some w it was true that δt
i(w),
while for some other w this was not the case. That is, some of the w → ai
mappings given by δt
In general, a learning
algorithm might affect both the correct and incorrect mappings. We will treat
these two cases separately.
i (w) might have been incorrect.
i match ∆t
, making δt+1
i into δt+1
i (w) = ∆t
i
We start by considering the incorrect mappings and define the change rate
of the agent as the probability that the agent will change at least one of its
incorrect mappings. Formally, we define the change rate ci for agent i as
∀w Pr[δt+1
i
(w) 6= δt
i (w) δt
i (w) 6= ∆t
i(w)] = ci.
(2)
The change rate tells us the likelihood of the agent changing an incorrect
mapping into something else. This "something else" might be the correct action,
but it could also be another incorrect action. The probability that the agent
changes an incorrect mapping to the correct action is called the learning rate
of the agent. It is defined as li where
∀w Pr[δt+1
i
(w) = ∆t
i(w) δt
i (w) 6= ∆t
i(w)] = li.
(3)
7
+
k
+
k
+
k
+
k
+
k
+
k
+
k
+
k
+
k
+
k
+
k
+
k
+
k
+
k
+
k
+
k
+
k
8
/
o
/
o
/
o
/
o
/
o
/
o
/
o
/
o
/
o
/
o
/
o
/
o
/
o
/
o
/
o
/
o
/
o
/
o
/
o
/
o
/
o
/
o
/
There are two constraints which must always be satisfied by these two rates.
Since changing to the correct mapping implies that a change was made, the
value of li must be less than or equal to ci, that is, li ≤ ci must always be true.
Also, if Ai = 2 then ci = li since there are only two actions available, so the
one that is not wrong must be right.
The complementary value for the learning rate is 1 − li and refers to the
probability that an incorrect mapping does not get changed to a correct one. An
example learning rate of li = .5 means that if agent i initially has all mappings
wrong it will make half of them match the original target function after the first
iteration.
We now consider the agent's correct mappings and define the retention
rate as the probability that a correct mapping will stay correct in the next
iteration. The retention rate is given by ri where
∀w Pr[δt+1
i
(w) = ∆t
i(w) δt
i (w) = ∆t
i(w)]. = ri.
(4)
We propose that the behavior of a wide variety of learning algorithms can be
captured (or at least approximated) using appropriate values for ci, li, and
ri. Notice, however, that these three rates claim that the w → a mappings
that change are independent of the w that was just seen. We can justify this
independence by noting that most learning algorithms usually perform some
form of generalization. That is, after observing one world state w and the
payoff associated with it, a typical learning algorithm is able to generalize what
it learned to some other world states. This generalization is reflected in the
fact that the change, learning, and retention rates apply to all w's. However, a
more precise model would capture the fact that, in some learning algorithms,
the mapping for the world state that was just seen is more likely to change than
the mapping for any other world state.
The rates are not time dependent because we assume that agents use one
learning algorithm during their lifetimes. The rates capture the capabilities of
this learning algorithm and, therefore, do not need to vary over time.
Finally, we define volatility to mean the probability that the target function
will change from time t to time t + 1. Formally, volatility is given by vi where
∀w Pr[∆t+1
i
(w) 6= ∆t
i(w)] = vi
(5)
In Section 5, we will show how to calculate vi in terms of the error of the other
agents. We will then see that volatility is not a constant but, instead, varies
with time.
3 Calculating the Agent's Error
We now wish to write a difference equation that will let us calculate the agent's
expected error, as defined in Eq. (1), at time t+1 given the error at time t and the
other parameters we have introduced. We can do this by observing that there
are two conditions that determine the new error: whether ∆t+1
i(w) or
(w) = ∆t
i
8
not, and whether δt
and b ≡ δt
i (w) = ∆t
where: a ∧ b, a ∧ ¬b, ¬a ∧ b, and ¬a ∧ ¬b. Formally, this implies that
i (w) = ∆t
i(w),
i(w), we can then say that we need to consider the four cases
i(w) or not. If we define a ≡ ∆t+1
(w) = ∆t
i
Pr[δt+1
i
(w) 6= ∆t+1
i
(w)] =
i
Pr[δt+1
Pr[δt+1
i
(w) 6= ∆t+1
(w) 6= ∆t+1
i
i
(w) ∧ a ∧ b] + Pr[δt+1
(w) ∧ ¬a ∧ b] + Pr[δt+1
i
(w) 6= ∆t+1
i
(w) ∧ a ∧ ¬b]+
(6)
(w) 6= ∆t+1
i
(w) ∧ ¬a ∧ ¬b],
i
since the four cases are exclusive of each other. Applying the chain rule of
probability, we can rewrite each of the four terms in order to get
Pr[δt+1
i
(w) 6= ∆t+1
i
(w)] = Pr[a ∧ b] · Pr[δt+1
(w) 6= ∆t+1
(w) a ∧ b]+
i
Pr[a ∧ ¬b] · Pr[δt+1
Pr[¬a ∧ b] · Pr[δt+1
Pr[¬a ∧ ¬b] · Pr[δt+1
i
i
i
i
(w) 6= ∆t+1
(w) 6= ∆t+1
i
i
(w) a ∧ ¬b]+
(w) ¬a ∧ b]+
(7)
(w) 6= ∆t+1
i
(w) ¬a ∧ ¬b].
We can now find values for these conditional probabilities. We start with the
first term where, after replacing the values of a and b, we find that
Pr[δt+1
i
(w) 6= ∆t+1
i
(w) ∆t+1
i
(w) = ∆t
i(w) ∧ δt
i (w) = ∆t
i(w)] = 1 − ri.
(8)
Since the target function does not change from time t to t + 1 and the agent was
correct at time t, the agent will also be correct at time t + 1; unless it changes
its correct w → a mapping. The agent changes this mapping with probability
1 − ri.
The value for the second conditional probability is
Pr[δt+1
i
(w) 6= ∆t+1
i
(w) ∆t+1
i
(w) = ∆t
i(w) ∧ δt
i (w) 6= ∆t
i(w)] = 1 − li.
(9)
In this case the target function still stays the same but the agent was incorrect.
If the agent was incorrect then it will change its decision function to match
the target function with probability li. Therefore, the probability that it will
be incorrect next time is the probability that it does not make this change, or
1 − li.
The third probability has a value of
Pr[δt+1
(w) 6= ∆t+1
(w) ∆t+1
i
= (ri + (1 − ri) · B)
i
i
(w) 6= ∆t
i(w) ∧ δt
i (w) = ∆t
i(w)]
(10)
In this case the agent was correct and the target function changes. This means
that if the agent retains the same mapping, which it does with probability ri,
then the agent will definitely be incorrect at time t + 1. If it does not retain the
same mapping, which happens with probability 1 − ri, then it will be incorrect
with probability B, where
B = Pr[δt+1
(w) 6= ∆t+1
(w) 6= ∆t
i
∧ δt+1
i
i
i(w)].
(w)δt
i (w) = ∆t
i(w) ∧ ∆t+1
i
(w) 6= ∆t
i(w)
(11)
9
Finally, the fourth conditional probability has a value of
Pr[δt+1
(w) 6= ∆t+1
(w) ∆t+1
i
= (1 − ci)D + li + (ci − li)F,
i
i
(w) 6= ∆t
i(w) ∧ δt
i (w) 6= ∆t
i(w)]
where
D = Pr[δt
F = Pr[δt+1
∧ δt+1
i
i
i (w) 6= ∆t+1
i
(w)δt
i (w) 6= ∆t
i(w) ∧ ∆t+1
i
(w) 6= ∆t
i(w)]
(w)δt
(w) 6= ∆t+1
i
i(w) ∧ δt+1
(w) 6= ∆t
i
(w) 6= δt
i (w)].
i (w) 6= ∆t
i(w) ∧ ∆t+1
i
(w) 6= ∆t
i(w)
(12)
(13)
(14)
This is the case where the target function changes and the agent was wrong.
We have to consider three possibilities. The first possibility is for the agent
not to change its decision function, which happens with probability 1 − ci. The
probability that the agent will be incorrect in this case is given by D. The
second possibility, when the agent changes its mapping to the correct function,
has a probability of li and ensures that the agent will be incorrect the next time.
The third possibility happens, with probability ci − li when the agent changes
its mapping to an incorrect value. In this case, the probability that it will be
wrong next time is given by F .
We can substitute Eqs. (8), (9), (10), and (12) into Eq. (7), substitute the
values of a and b, and expand Pr[a ∧ b] into Pr[a b] · Pr[b], in order to get
E[e(δt+1
i
)] = E[ Xw∈W
D(w)Pr[δt+1
i
(w) 6= ∆t+1
i
i
Pr[∆t+1
+ Pr[∆t+1
+ Pr[∆t+1
(w) = ∆t
(w) = ∆t
(w) 6= ∆t
i(w)δt
i(w)δt
i(w)δt
i (w) = ∆t
i (w) 6= ∆t
i (w) = ∆t
i(w)] · Pr[δt
i(w)] · Pr[δt
i(w)]
i
i
· Pr[δt
i (w) = ∆t
i(w)] · (ri + (1 − ri) · B)
D(w)(
(w)]] = Xw∈W
i (w) = ∆t
i (w) 6= ∆t
i(w)] · (1 − ri)
i(w)] · (1 − li)
(15)
+ Pr[∆t+1
i
(w) 6= ∆t
i(w)δt
i (w) 6= ∆t
i(w)] · Pr[δt
i (w) 6= ∆t
i(w)]
· (1 − ci)D + li + (ci − li)F.
Equation (15) will model any MAS whose agent learning can be described with
the parameters presented Section 2.4 and whose action/learn loop is the same
as we have described. We can use Eq. (15) to calculate the successive expected
errors for agent i, given values for all the parameters and probabilities. In the
next section we show how this is done in a simple example game.
3.1 The Matching game
In this matching game we have two agents i and j each of whom, in every
world w, wants to play the same action as the other one. Their set of actions is
Ai = Aj , where we assume Ai > 2 (for Ai = 2 the equation is simpler). After
every time step, the agents both learn and change their decision functions in
10
accordance to their learning rates, retention rates, and change rates. Since the
agents are trying to match each other, in this game it is always true that ∆t
i(w) =
δt
j(w) and ∆t
i (w). Given all this information, we can find values for
some of the probabilities in Eq. (15) (including values for Equations (11) (13)
(14)) and rewrite (see Appendix A for derivation) it as:
j (w) = δt
i
E[e(δt+1
)] = Xw∈W
+ (1 − cj) · Pr[δt
i (w) 6= ∆t
i(w)] · (1 − li)
D(w){rj · Pr[δt
i (w) = ∆t
i(w)] · (1 − ri)
+ (1 − rj ) · Pr[δt
i (w) = ∆t
i(w)] ·(cid:18)ri + (1 − ri) ·(cid:18) Ai − 2
Ai − 1(cid:19)(cid:19)
(16)
+ cj · Pr[δt
i (w) 6= ∆t
i(w)] ·(cid:18)1 − lj +
cilj(Ai − 1) + li(1 − lj) − ci
Ai − 2
(cid:19)}
We can better understand this equation by plugging in some values and sim-
plifying. For example, lets assume that ri = rj = 1 and li = lj = 1, which
implies that ci = cj = 1. This is the case where the two agents always change
all their incorrect mappings so as to match their respective target functions at
i (w1) = x and δt
time t. That is, if we had δt
j(w1) = y, then at time t + 1 we will
have δt+1
(w1) = y and δt+1
(w1) = x. This means that agent i changes all its
incorrect mappings to match j, while j changes to match i, so all the mappings
stay wrong after all (i.e., i ends up doing what j did before, while j does what
i did before). The error, therefore, stays the same. We can see this by plugging
the values into Eq. (16). The first three terms will become 0 and the fourth
term will simplify to the definition of error, as given by Eq. (1). Since the fourth
term is the only one that is non-zero, we end up with E[e(δt+1
)] = e(δt
j
i
i ).
i
)] = cie(δt
We can also let ci and li (keeping cj = lj = 1) be arbitrary numbers, which
gives us E[e(δt+1
i ). This tells us that the error will drop faster for
a smaller change rate ci. The reason is that i's learning (remember li ≤ ci) in
this game is counter-productive because it is always made invalid by j's learning
rate of 1. That is, since j is changing all its mappings to match i's actions, i's
best strategy is to keep its actions the same (i.e., ci = 0).
i
4 Further Simplification
We can further simplify Eq. (15) if we are willing to make two assumptions.
The first assumption is that the new actions chosen when either δt
i (w) changes
(and does not match the target), or when ∆t
i(w) changes, are both taken from
flat probability distributions over Ai. By making this assumption we can find
values for B, D, and F , namely:
B = D =
Ai − 2
Ai − 1
F =
Ai − 3
Ai − 2
(17)
The second assumption we make is that the probability of ∆t
for a particular w, is independent of the probability that δt
i(w) changing,
i (w) was correct.
11
i (w) changing were correlated since, if δt
In Section 3.1 we saw that in the matching game the probabilities of ∆t
and δt
also wrong, which meant j would probably change δt
∆t
i(w)
j(w) was
j(w), which would change
i (w) was wrong then δt
i(w).
However, the matching game is a degenerate example in exhibiting such tight
coupling between the agents' target functions. In general, we can expect that
there will be a number of MASs where the probability that any two agents i and
j are correct is uncorrelated (or loosely correlated). For example, in a market
system all sellers try to bid what the buyer wants, so the fact that one seller
bids the correct amount says nothing about another seller's bid. Their bids are
all uncorrelated. In fact, the Distributed Artificial Intelligence literature is full
of systems that try to make the agents' decisions as loosely-coupled as possible
[19, 21].
This second assumption we are trying to make can be formally represented
by having Eq. (18) be true for all pairs of agents i and j in the system.
Pr[δt
i (w) = ∆t
= Pr[δt
i(w) ∧ δt
i (w) = ∆t
j(w) = ∆t
i(w)] · Pr[δt
j(w)]
j(w) = ∆t
j(w)]
(18)
Once we make these two assumptions we can rewrite Eq. (15) as:
E[e(δt+1
i
)] = Xw∈W
D(w)(Pr[∆t+1
i
(w) = ∆t
i(w)] · (Pr[δt
i (w) = ∆t
i(w)] · (1 − ri)
+ Pr[δt
i (w) 6= ∆t
i(w)] · (1 − li))
+ Pr[∆t+1
i
(w) 6= ∆t
i(w)] · (Pr[δt
i (w) = ∆t
i(w)] ·(cid:18)ri + (1 − ri) ·(cid:18) Ai − 2
Ai − 1(cid:19)(cid:19)
(cid:19)))
+ Pr[δt
i (w) 6= ∆t
i(w)] ·(cid:18) Ai − 2 − ci + 2li
Ai − 1
Some of the probabilities in this equation are just the definition of vi, and others
simplify to the agent's error. This means that we can simplify Eq. (19) to:
(19)
E[e(δt+1
i
)] = 1 − ri + vi(cid:18) Airi − 1
Ai − 1 (cid:19)
i )(cid:18)ri − li + vi(cid:18) Ai(li − ri) + li − ci
+ e(δt
Ai − 1
(cid:19)(cid:19) (20)
Eq. (20) is a difference equation that can be used to determine the expected
error of the agent at any time by simply using E[e(δt+1
i ) for the
next iteration. While it might look complicated, it is just the function for a line
y = mx + b where x = e(δt
). Using this observation, and the
fact that e(δt+1
) will always be between 0 and 1, we can determine that the
final convergence point for the error is the point where Eq. (20) intersects the
line y = x. The only exception is if the slope equals −1, in which case we will
see the error oscillating between two points.
i ) and y = e(δt+1
)] as the e(δt
i
i
i
12
)
1
+
t
δ
(
e
i
PSfrag replacements
learning
volatility
t+1
i
e(δ
)
1
0.8
0.6
0.4
0.2
0
0
0.2
0.4
0.6
e(δt
i )
0.8
1
Figure 6: Error progression for agent i, assuming a fixed volatility vi = .2,
ci = 1, li = .3, ri = 1, Ai = 20. We show the error function (e(δt+1
)), as well
as its two components: learning and volatility. The line y = x allows us trace
the agent's error as it starts at .95 and converges to .44.
i
By looking at Eq. (20) we can also determine that there are two "forces"
acting on the agent's error: volatility and the agent's learning abilities. The
volatility tends to increase the agent's error past its current value while the
learning reduces it. We can better appreciate this effect by separating the vi
terms in Eq. (20) and plotting the vi terms (volatility) and the rest of the terms
(learning) as two separate lines. By definition, these will add up to the line
given by Eq. (20). We have plotted these three lines and traced a sample error
progression in Figure 6. The error starts at .95 and then decreases to eventually
converge to .44. We notice the learning curve always tries to reduce the agent's
error, as confirmed by the fact that its line always falls below y = x. Meanwhile,
the volatility adds an extra error. This extra error is bigger when the agent's
error is small since, any change in the target function is then likely to increase
the agent's error.
5 Volatility and Impact
Equation (20) is useful for determining the agent's error when we know the
volatility of the system. However, it is likely that this value is not available
to us (if we knew it we would already know a lot about the dynamics of the
In this section we determine the value of vi in terms of the other
system).
agents' changes in their decision functions. That is, in terms of Pr[δt+1
j],
for all other agents j.
6= δt
j
In order to do this we first need to define the impact Iji that agent j's
13
changes in its decision function have on i's target function.
∀w∈W Iji = Pr[∆t+1
i
(w) 6= ∆t
i(w) δt+1
j
(w) 6= δt
j(w)]
(21)
We can now start to define volatility by first determining that, for two agents
i and j
∀w∈W vt
i
i = Pr[∆t+1
= Pr[∆t+1
+ Pr[∆t+1
i
i
(w) 6= ∆t
(w) 6= ∆t
(w) 6= ∆t
i(w)]
i(w) δt+1
i(w) δt+1
j
j
(w) 6= δt
(w) = δt
j(w)] · Pr[δt+1
j(w)] · Pr[δt+1
j
(w) 6= δt
(w) = δt
j(w)]
j(w)].
j
(22)
The reader should notice that volatility is no longer constant;
it varies
with time (as recorded by the superscript). The first conditional probability
in Eq. (22) is just Iji. The second one we will set to 0, since we are specifically
interested in MASs where the volatility arises only as a side-effect of the other
agents' learning. That is, we assume that agent i's target function changes only
when j's decision function changes. For cases with more than two agents, we
similarly assume that one agent's target function changes only when some other
agent's decision function changes. That is, we ignore the possibility that outside
influences might change an agent's target function.
We can simplify Eq. (22) and generalize it to N agents, under the assumption
that the other agents' changes in their decision functions will not cancel each
other out, making ∆t
∀w∈W vt
i then becomes
i stay the same as a consequence. vt
i = Pr[∆t+1
= 1 − Yj∈N−i
(w) 6= ∆t
(1 − IjiPr[δt+1
i(w)]
j
i
(w) 6= δt
j(w)]).
(23)
We now need to determine the expected value of Pr[δt+1
(w) 6= δt
j(w)] for
j
any agent. Using i instead of j we have
(w) 6= δt
∀w∈W Pr[δt+1
i (w)]
i (w) 6= ∆t
i (w) = ∆t
where the expected value is:
i
= Pr[δt
+ Pr[δt
i(w)] · Pr[δt+1
i(w)] · Pr[δt+1
i
i
(w) 6= ∆t
(w) 6= ∆t
i(w) δt
i(w) δt
i (w) 6= ∆t
i (w) = ∆t
i(w)]
i(w)],
E[Pr[δt+1
i
(w) 6= δt
i (w)]] = cie(δt
i ) + (1 − ri) · (1 − e(δt
i )).
(24)
(25)
We can then plug Eq. (25) into Eq. (23) in order to get the expected volatility
E[vt
i ] = 1 − Yj∈N−i
1 − Iji(cje(δt
j) + (1 − rj) · (1 − e(δt
j))).
(26)
We can use this expected value of vt
i in Eq. (20) in order to find out how the
other agents' learning will affect agent i. In MASs that have identical learning
agents (i.e., their c, l, r, and I rates are all the same and they start with the
same initial error) we can replace the multiplier in Eq. (26) with an exponent
of N − 1. We use this simplification later in Section 8.2.
14
Final Error for i
1
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0
PSfrag replacements
0
0.2
0.4
Iij
0.6
0.8
1
0
0.4
0.2
Error
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
1
0.8
Iji
0.6
Figure 7: Plot of Final Error for agent i, given li = lj = .2, ri = rj = 1,
ci = cj = 1, Aj = Ai = 20.
6 An Example with Two Agents
In a MAS with just two agents i and j, we can use Eq. (26) to rewrite Eq. (20)
as
E[e(δt+1
i
)] = 1 − ri + Iji(cje(δt
j) + (1 − rj) · (1 − e(δt
Ai − 1 (cid:19)
j)))(cid:18) Airi − 1
+ e(δt
i ){ri − li + Iji(cje(δt
j) + (1 − rj) · (1 − e(δt
j)))
(27)
·(cid:18) Ai(li − ri) + li − ci
Ai − 1
(cid:19)}.
We can now use Eq. (27) to plot values for one particular example. Let us
say that li = lj = .2, ci = cj = 1, ri = rj = 1, Aj = Ai = 20 and we let
the impacts Iij and Iji vary between zero and one. Figure 7 shows the final
error, after convergence, for this situation. It shows an area where the error is
expected to be below .1, corresponding to low values for either Iij , Iji or both.
This area represents MASs that are loosely coupled, i.e., one agent's change
in behavior does not significantly affect the other's target function.
In these
systems we can expect that the error will eventually1 reach a value close to zero.
We see that as the impact increases the final error also increases, with a fairly
abrupt transition between a final error of 0 and bigger final errors. This abrupt
transition is characteristic of these types of systems where there are tendencies
for the system to either converge or diverge, and both of them are self-enforcing
behaviors. Notice also that the graph is not symmetric -- Iij has more weight in
determining i's final error than Iji. This result seems counterintuitive, until we
realize that it is j's error that makes it hard for i to converge to a small error.
1Notice that we are not representing how long it takes for the error to converge. This can
easily be done and is just one more of the parameters our theory allows us to explore.
15
1
0.8
0.6
0.4
0.2
)
tj
δ
(
e
PSfrag replacements
0
0
0.2
0.4
0.6
e(δt
i )
0.8
1
Figure 8: Vector plot for e(δt
j), where Ai = Aj = 20, li = lj = .2,
ri = rj = 1, ci = .5, cj = 1, Iij = .1, Iji = .3. It shows the error progression for
a pair agents i and j. For each pair of errors (e(δt
j)), the arrows indicate
the expected (e(δt+1
i ) and e(δt
i ), e(δt
i
), e(δt+1
)).
j
If Iij is high then, if i has a large error then j's error will increase, which will
make j change its decision function often and make it hard for i to reduce its
error. If Iij is low then, even if Iji is high, j will probably settle down to a low
error and as it does i will also be able to settle down to a low error.
If we were about to design a MAS we would try to build it so that it lies
in the area where the final error is zero. This way we can expect all agents to
eventually have the correct behavior. We note that a substantial percentage of
the research in DAI and MAS deals with taking systems that are not inherently
in this area of near-zero error and designing protocols and rules of encounter so
as to move them into this area, as in [25].
The fact that the final error is 1 for the case with Iij = Iji = 1 can seem
non-intuitive to readers familiar with game theory. In game theory there are
many games, such as the "matching game" from Section 3.1, where two agents
have an impact of 1 on each other. However, it is known [3] that, in these
games, two learning agents will eventually converge to one of the equilibria (if
there are any), making their final error equal to 0. This is certainly true, and
it is exactly what we showed in Section 3.1. The same result is not seen in
Figure 7 because the figure was plotted using our simplified Equation. (20),
which makes the simplifying independence assumption given by Eq. (18). This
assumption cannot be made in games such as the matching game because, in
these games, there is a correlation between the correctness of each of the agents
actions. Specifically, in the matching game it is always true that both agents are
either correct, or incorrect, but it is never true that one of them is correct while
the other one is incorrect, i.e., either they matched, or they did not match.
Another view of the system is given by Figure 8 which shows a vector plot
16
PSfrag replacements
r
o
r
r
e
lj = .005
lj = .04
lj = .055
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0
0
αj = .1
αj = .3
αj = .9
PSfrag replacements
αj = .1
αj = .3
αj = .9
r
o
r
r
e
200
400
600
800
1000
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0
0
lj = .005
lj = .04
lj = .055
200
400
600
800
1000
time
time
(a) Experiment
(b) Theory
Figure 9: Comparison of observed and predicted error.
of the agents' errors. We can see how the bigger errors are quickly reduced but
the pace of learning decreases as the errors get closer to the convergence point.
Notice also that an agent's error need not change in a monotonic fashion. That
is, an agent's error can get bigger for a while before it starts to get smaller.
7 A Simple Application
In order to demonstrate how our theory can be used, we tested it on a simple
market-based MAS. The game consists of three agents, one buyer and two seller
agents i and j. The buyer will always buy at the cheapest price -- but the sellers
do not know this fact. In each time step the sellers post a price and the buyer
decides which of the sellers to buy from, namely, the one with the lowest bid.
The sellers can bid any one of 20 prices in an effort to maximize their profits.
The sellers use a reinforcement learning algorithm with their reinforcements
being the profit the agent achieved in each round, or 0 if it did not sell the good
at the time. In this system we had one good being sold (W = 1).As predicted
by economic theory, the price in this system settles to the sellers' marginal cost,
but it takes time to get there due to the learning inefficiencies.
We experimented with different αj rates2 for the reinforcement learning of
agent j, while keeping αi = .1 fixed, and plotted the running average of the
error of agent i. A comparison is shown in Figure 9. Figure 9(a) gives the
experimental results for three different values of αj. It shows i's average error,
over 100 runs, as a function of time. Since both sellers start with no knowledge,
their initial actions are completely random which makes their error equal to .5.
2
α is the relative weight the algorithm gives to the most recent payoff. α = 1 means that
it will forget all previous experience and use only the latest payoff to determine what action
to take.
17
Then, depending on αj, i's error will either start to go down from there or will
first go up some and then down. Eventually, i's error gets very close to 0, as
the system reaches a market equilibrium.
We can predict this behavior using Eq. (27). Based on the game description,
we set Ai = Aj = 20, since there were 20 possible actions. We let ri =
rj = 1 because reinforcement learning with fixed payoffs enforces the condition
that once an agent is taking the correct action it will never change its decision
function to take a different action. The agent might, however, still take a wrong
action but only when its exploration rate dictates it.
We then let Iij = Iji = .17 based on the rough calculation that each agent
has an equal probability of bidding any one of the 20 prices. If ∆t
i = 20 then
Iji for this situation is the probability that j was also bidding 20 or above,
i.e., 1/20, times the probability that j's new price is lower than 20, i.e. 19/20.
Similarly, if ∆t
i = 19 then Iji is equal to 2/20 times 18/20. The average of all
of these probabilities is .17. A more precise calculation of the impact would
require us to find it via experimentation by actually running the system.
Finally, we chose li = lj = ci = cj = .005 for the first curve (i.e., the one that
compares with αj = .1). We knew that for such a low αj the learning and change
rate should be the same. The actual value was chosen via experimentation. The
resulting curve is shown in Figure 9(b). At this moment, we do not possess a
formal way of deriving learning and change rates from α-rates.
For the second curve (αj = .3) we knew that, since only αj had changed
from the first experiment, we should only change lj and cj.
In fact, these
two values should only be increased. We found their exact values, again by
experimentation, to be lj = .04, cj = .4. For the third curve we found the
values to be lj = .055, cj = .8.
One difference we notice between the experimental and the theoretical results
is that the experimental results show a longer delay before the error starts to
decrease. We attribute this delay to the agent's initially high exploration rate.
That is, the agents initially start by taking all random actions but progressively
reduce this rate of exploration. As the exploration rate decreases the discrepancy
between our theoretical predictions and experimental results is reduced.
In summary, while it is true that we found lj and cj by experimentation,
all the other values were calculated from the description of the problem. Even
the relative values of lj and cj follow the intuitive relation with αj that, as
αj increases so does lj and (even more) cj. Section 9 shows how to calculate
lower bounds on the learning rate. We believe that this experiment provides
solid evidence that our theory can be used to approximately determine the
quantitative behaviors of MASs with learning agents.
18
n
o
i
t
c
a
t
n
o
i
j
l
a
m
i
t
p
o
n
a
i
g
n
s
o
o
h
c
f
o
y
t
i
l
i
b
a
b
o
r
P
PSfrag replacements
time
1 - error
li = .1
1
0.95
0.9
0.85
0.8
0.75
0.7
0.65
0.6
0.55
0.5
0
Choosing optimal joint actions
Independent learners
Joint action learners
PSfrag replacements
r
o
r
r
e
-
1
1
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0
0
li = .1
5
10
15
20
25
30
35
40
45
50
5
10
15
20
30
Number of Interactions
25
35
40
45
50
(a) Experiment
time
(b) Theory
Figure 10: Comparing theory (b) with results from [6] (a).
8 Application of our Theory to Experiments in
the Literature
In this section we show how we can apply our theory to experimental results
found in the AI and MAS literature. While we will often not be able to com-
pletely reproduce the authors' results exactly, we believe that being able to
reproduce the flavor and the main quantitative characteristics of experimental
results in the literature shows that our theory can be widely applied and used
by practitioners in this area of research.
8.1 Claus and Boutilier
Claus and Boutilier [6] study the dynamics of a system that contains two re-
inforcement learning agents. Their first experiment puts the two agents in a
matching game exactly like the one we describe in Section 3.1 with Ai =
Aj = 2. Their results show the probability that both agents matched (i.e., 1
- e(δt
i )) as time progressed. Since they were using two reinforcement learning
agents, it was not surprising that the curve they saw, seen in Figure 10(a), was
nearly identical to the curve we saw in our experiments with the two buying
agents (Figure 9(a) with αj = αi = .1, except upside-down).
We can reproduce their curve using our equation for the matching game
Eq. (16). The results can be seen in Figure 10(b). Our theory again fails to
account for the initial exploration rate. We can, however, confirm that by time
15 their Boltzmann temperature (the authors used Boltzmann exploration) had
been reduced from an initial value of 16 to 3.29 and would keep decreasing by
a factor of .9 each time step. This means that by time 15 the agents were,
indeed, starting to do more exploitation (i.e., reduce their error) while doing
19
Success
3800
3600
3400
3200
PSfrag replacements
li
final error
theory
experiment
r
o
r
r
e
l
a
n
fi
PSfrag replacements
1
0.8
0.6
0.4
0.2
theory
experiment
50
100
150
200
Update delay
0
0.001
0.01
li
0.1
(a) Original Experiment
(b) Theory and Experiment
Figure 11: Comparing theory (b) with results from [30] (a).
little exploration.
8.2 Shoham and Tennenholtz
Shohan and Tennenholtz [30] investigate how learning agents might arrive at
social conventions. The authors introduce a simple learning algorithm (strategy-
selection rule) called highest cumulative reward (HCR) which their agents use for
learning these conventions. Shoham and Tennenholtz also provide the results of
a series of experiments using populations of learning agents. We try to reproduce
the results they present in their Section 4.1 where they study the "coordination
game" which is similar to our matching game, but with only two actions.
The experiment in question involves 100 agents, all of them identical and all
of them using HCR. At each time instant the agents take one of two available
actions. The aim is for every pair of chosen agents to take the same action
as each other. Agents are randomly made to form pairs. The agents update
their behavior (i.e., apply HCR) after a given delay. The authors try a series
of delays (from 0 to 200) and show that increasing the update delay decreases
the percentage of trials where, after 1600 iterations, at least 95% of the agents
reached a convention. The authors show surprise at finding this phenomenon.
Their results are reproduced in Figure 11(a) (cf. Figure 1 in their article).
The number of actions for all agents is easily set to Ai = 2, which implies that
we must have li = ci. By examining HCR, it is easy to determine that ri = 1
(i.e if an agent took the right action, it will only get more support for it). At
first intuition, one's impulse is to set Iij = 1 for every pair of agents i and j.
However, since there are 100 of them and only pairs of them interact at every
time instant, the real impact is Iij = 1/99.
We will now convert from their units of measurement into ours.
In Fig-
20
ure 11(a) we can see that their x-axis is called the update delay, which we will
refer to as d. This value is the number of time units that pass before the agent
is allowed to learn. For d = 0 the agent learns after every interaction (i.e., on
every time t), while for d = 200 the agent takes the same action for 200 time in-
stances and only learns after every 200 iterations. This means that we must set
li = 1
p(d+1) where p > 0. The value of p depends on their learning algorithm's
performance, but we know that it must be a small number (< 50) greater than
0. Through some experimentation we settled on p = 6 (other values close to
this one give similar results). Since in their graph they look at 0 ≤ d ≤ 200, we
must then look at li where
6 Finally, we find the value of d in terms
of li to be
1206 ≤ li ≤ 1
1
d =
− 1
(28)
1
pli
The y-axis of Figure 11(a) is the success, i.e., number of trials, out of 4000,
where at least 95% of the agents reached a convention. We will refer to this
value as s. We know that in s/4000 of the trials at least 95% of the agents have
error close to 0 (i.e., reaching a convention means that the agents take the right
action almost all the time), and for the rest of the trials the error was greater.
We can approximately map this to an error by saying that in s/4000 of the trials
the error was 0 (a slight underestimate), while in 1 − s/4000 of the trials the
error was 1 (a slight overestimate). We add these two up (the 0 makes the first
term disappear) and arrive at an equation that maps s to e(δt
i ).
e(δt
4000 (cid:19)
i ) ≈ (cid:18) 4000 − s
(29)
The mapping from d to s is given by their actual data. Their data can be
fit by the following function:
s = 3900 − 4d −
(d − 100)2
100
(30)
Plugging Eq. (28) into Eq. (30), and the result into Eq. (29), we finally arrive
at a function that maps their experimental results into our units:
Final error =
4000 −(cid:16)3900 − 4(1/pli − 1) −(cid:16) (1/pli−1−100)2
100
4000
(cid:17)(cid:17)
(31)
for the range
1
1206 ≤ li ≤ 1
6 .
Now that we have values for ci, li, ri, Iij , Ai, a range for li and an equation
that maps their experimental results into our units, we can plot both functions,
as seen in Figure 11(b). The x-axis was plotted on a log-scale in order to better
show the shape of the experiment curve, otherwise it would appear mostly as a
straight line. For our theory curve we used Equations (20) and (26), and iterated
for 1600 time units, just like in the experiment, and plotted the error at that
point. For the experiment curve we used Eq. (31). We plotted both of these
curves in the specified range for li. The reader will notice that our theory was
21
able to make precise quantitative predictions. The maximum distance from our
theory curve to the experimental curve is .05, which means that our predictions
for the final error were, at worst, within 5% of the experimental values. Also, an
error of about 5% was introduced when mapping from their success percentage
s to our error.
8.3 Others
There are several other examples in the literature where we believe our theory
can be successfully applied.
[16, chapter 3.7] gives results of an experiment
where two agents try to find each other in a 100 by 100 grid. He shows that if
the grid has few obstacles it is faster if both agents move towards each other,
while if there are many obstacles it is faster if one of the agents stays still
while the other one searches for it. We believe that the number of obstacles is
proportional to the change rate that the agents experience and, perhaps, to the
impact that they have on each other. When there are no obstacles the agents
never change their decision functions (because their initial Manhattan heuristics
lead them in the correct path). As the number of obstacles increases, the agents
will start to change their decision functions as they move, which will have an
impact on the other agent's target function. If, however, one of them stays put,
this means that his change rate is 0 so the other agent's target function will
stay still and he will be able to reach his target (i.e., error 0) quicker.
Notice that the problem of a moving target that Ishida studies is different
from the problem of a moving target function which we study. It is, however,
interesting to note their similarities and how our theory can be applied to some
aspects of that domain.
Another possible example is given by [29]. They show two Q-learning agents
trying to cooperate in order to move a block. The authors show how different α
rates (β in their article) affect the quality of the result that the agents converge
to. This quality roughly corresponds to our error, except for the fact that their
measurements implicitly consider some actions to be better than others, while
we consider an action to be either correct or incorrect. This discrepancy would
make it harder to apply our theory to their results but we still believe that a
rough approximation is possible. Our future work includes the extension of the
CLRI framework to handle a more general definition of error -- one that attaches
a utility to each state-action pair, rather than the simple correct/incorrect cat-
egorization we use.
9 Bounding the Learning Rate with Sample Com-
plexity
In the previous examples we have used our knowledge of the learning algorithms
to determine the values of the agent's ci, li, and ri parameters. However, there
might be cases where this is not possible -- the learning algorithm might be too
complicated or unknown. It would be useful, in these cases, to have some other
22
measure of the agent's learning abilities, which could be used to determine some
bounds on the values of these parameters.
One popular measure of the complexity of learning is given by Probably
Approximately Correct (PAC) theory [17], in the form of a measure called the
sample complexity. The sample complexity gives us a loose upper bound on
the number of examples that a consistent learning agent must observe before
arriving at a PAC hypothesis.
There are two important assumptions made by PAC-theory. The first as-
sumption is that the agents are consistent learners3. Using our notation, a
consistent learner is one who, once it has learned a correct w → a mapping does
not forget it. This simply means that the agent must have ri = 1. The second
assumption is that the agent is trying to learn a fixed concept. This assumption
makes ∆t+1
i true for all t.
i = ∆t
The sample complexity m of an agent's learning problem is given by
m ≥
1
ǫ (cid:18)ln
H
γ (cid:19) ,
(32)
where H is the size of the hypothesis space for the agent. In other words, H
is the total number of different δi(w) functions that the agent will consider. For
an agent with no previous knowledge we have H = AiW . However, agents
with previous knowledge might have smaller H, since this knowledge might be
used to eliminate impossible mappings. If a consistent learning agent has seen
m examples then, with probability at least (1 − γ), it has error at most ǫ.
While we cannot map the sample complexity m to a particular learning rate
li, we can use it to put a lower bound on the learning rate for a consistent
learning agent. That is, we can find a lower bound for the learning rate of an
agent who does not forget anything it has seen, and who is trying to learn a
fixed target function. Since the agent does not forget anything it has seen, we
can deduce that its retention rate must be ri = 1. Since the target function
is not changing, we know that Pr[∆t+1
(w) =
∆t
i(w)] = 1. We can plug these values into Eq. (19) and simplify in order to
get:
i(w)] = 0 and Pr[∆t+1
(w) 6= ∆t
i
i
We can solve the difference Eq. (33), for any time n, in order to get:
E[e(δt+1
i
)] = e(δt
i ) · (1 − li).
E[e(δn
i )] = e(δ0
i ) · (1 − li)n.
(33)
(34)
We now remember that after m time steps we expect, with probability (1 − γ),
the error to be less than ǫ. Since Eq. (34) only gives us an expected error,
not a probability distribution over errors, we cannot use it to calculate the
likelihood of the agent having that expected error. That is, we cannot calculate
the "probably" (γ) part of probably approximately correct. We will, therefore,
assume that the γ chosen for m is small enough so that it will be safe to say
that, after m time steps, the error is less than ǫ. In a typical application one
3See [24, p162] for a formal definition of a consistent learner.
23
uses a small γ because it guarantees a high degree of certainty on the upper
bound of the error.
Since we can now safely say that, after m time steps, the error is less than ǫ,
we can then deduce that the li for this agent should be small enough such that,
if n = m, then E[e(δn
i )] ≤ ǫ. This is expressed mathematically as:
e(δ0
i ) · (1 − li)m ≤ ǫ.
We solve this equation for li in order to get:
li ≥ 1 −(cid:18) ǫ
e(δ0
i )(cid:19)1/m
(35)
(36)
.
This equation is not defined for e(δ0
i ) = 0. However, given our assumption of
a fixed target function and ri = 1, we already know, from Eq. (33), that if an
agent starts with an error of 0 it will maintain this error of 0 for any future time
t > 0. Therefore, in this case, the choice of a learning rate has no bearing on
the agent's error, which will always be 0.
Equation (36) gives us a lower bound on the learning rate that a consistent
learner must have, given that it has sample complexity m, and based on an
error ǫ and a sufficiently small γ. A designer of an agent that uses a reason-
able learning algorithm can expect that, if his agent has sample complexity m
(for ǫ error), then his agent will have a learning rate of at least li, as given by
Eq. (36). Furthermore, if a designer is comparing two possible agent designs,
each with a different sample complexity but both with similarly powerful learn-
ing algorithms, he can calculate bounds on the learning rates of both agents
and compare their relative performance.
10 Related Work
The topic of agents learning about agents arises often in the studies of com-
In fact, systems where the agents try to adapt to endogenously
plexity [7].
created dynamics are being widely studied [15, 2].
In these systems, like in
ours, the agents co-create their expectations as they learn and change their be-
haviors. Complexity research uses simulated agents in an effort to understand
the complex behaviors of these systems as observed in the real world.
One example is the work of Arthur et. al. [2], who arrive at the conclusion
that systems of adaptive agents, where the agents are allowed to change the
complexity of their learning algorithms, end up in one of two regimes: a sta-
ble/simple regime where it is trivial to predict an agent's future behavior, and a
complex regime where the agents' behaviors are very complex. It is this second
regime that interests complexity researchers the most. In it, the agents are able
to reach some kind of "equilibrium" point in model building complexity. These
same results are echoed by Darley and Kauffman [8] in a similar experiment. In
this article we have not allowed the agents to dynamically change the complex-
ity of their learning algorithms. Therefore, our dynamics are simpler. Allowing
24
the agents to change their complexity amounts to allowing them to change the
values of their c, l, and r parameters while learning.
However, while complexity research is very important and inspiring, it is only
partially relevant to our work. Our emphasis is on finding ways to predict the
behavior of MASs composed of machine-learning agents. We are only concerned
with the behavior of simpler artificial programmable agents, rather than the
complex behavior of humans or the unpredictable behavior of animals.
The dynamics of MASs have also been studied by Kephart et. al. [18]. In
this work the authors show how simple predictive agents can lead to globally
cyclic or chaotic behaviors. As the authors explain, the chaotic behaviors were a
result of the simple predictive strategies used by the agents. Unlike our agents,
most of their agents are not engaged in learning, instead they use simple fixed
predictive strategies, such as "if the state of the world was x ten time units
before, then it will be x next time so take action a". The authors later show
how learning can be used to eliminate these chaotic global fluctuations.
Matari´c [22] has studied reinforcement learning in multi-robot domains. She
notes, for example, how learning can give rise to social behaviors [23]. The
work shows how robots can be individually programmed to produce certain
group behaviors. It represents a good example of the usefulness and flexibility
of learning agents in multi-agent domains. However, the author does not offer
a mathematical justification for the chosen individual learning algorithms, nor
does she explain why the agents were able to converge to the global behaviors.
Our research hopes to provide the first steps in this direction.
One particularly interesting approach is taken by Carmel and Markovitch
[4]. They work on model-based learning, that is, agents build models of other
agents via observations. They use models based on finite state machines. The
authors show how some of these models can be effectively learned via observation
of the other agent's actions. The authors concentrate on the development of
learning algorithms that would let one agent learn a finite-state machine model
of another agent. They have not considered the case where two or more agents
are simultaneously learning about each other, which we study in this article.
However, their work is more general in the sense that they model agents as
state machines, rather than the state-action pairs we use.
Finally, a lot of experimental work has been done in the area of agents
learning about agents [27, 36]. For example, Sen and Sekaran [28] show how
learning agents in simple MAS converge to system-wide optimal behavior. Their
agents use Q-learning or modified classifier systems in order to learn. The
authors implement these agents and compare the performance of the different
learning algorithms for developing agent coordination. Hu and Wellman [14, 12]
have studied reinforcement learning in market-base MASs, showing how certain
initial learning biases can be self-fulfilling, and how learning can be useful but
is affected by an agent's models of other agents. Claus and Boutilier [6] have
also carried out experimental studies of the behavior of reinforcement learning
agents. We have been able to use the CLRI framework to predict some of their
experimental results [33]. Other researchers [32, 20, 13] have extended the basic
Q-learning [35] algorithm for use with MASs in an effort to either improve or
25
prove convergence to the optimal behavior.
We have also successfully experimented with reinforcement learning simula-
tions [34], but we believe that the formal treatment elucidated in these pages
will shed more light into the real nature of the problem and the relative im-
portance of the various parameters that describe the capabilities of an agent's
learning algorithm.
11 Limitations and Future Work
The CLRI framework places some constraints on the type of systems it can
model, which limits its usability. However, it is important to understand that,
as we remove the limitations from the CLRI framework, the dynamics of the
system become much harder to predict. In the extreme, without any limitations
on the agents' abilities, the system becomes a complex adaptive system, as
studied by Holland [11] and others in the field of complexity. The dynamic
behavior of these systems continues to be studied by complexity researchers
with only modest progress. It is only by placing limitations on the system that
we were able to predict the expected error of agents in the systems modeled by
the CLRI framework.
Our ongoing work involves the relaxation of some of the constraints made by
the CLRI framework so that it may become more easily and widely applicable,
without making the system dynamics impossible to analyze. We are targeting
three specific constraints.
1. The values of ci, li, ri, and Iij cannot, in all situations, be mathematically
determined from the system's description. We have found that bounds for
the ci, li, and ri values can often be determined when using reinforcement
learning or supervised learning. However, the bounds are often very loose.
The values of the Iij parameter depend on the particular system. Some-
times it is trivial to calculate the impact, sometimes it requires extensive
simulation.
2. The CLRI framework assumes that an agent's action is either correct or
incorrect. The framework does not allow degrees of correctness. Specifi-
cally, in many systems the agents can often take several actions, any one
of which is equally good. When modeling these systems, the CLRI frame-
work requires the user to designate one of those actions as the correct one,
thereby ignoring some possibly useful information.
3. The world states are taken from a uniform probability distribution which
does not change over time. The environment is assumed to be episodic.
As such, the framework is limited in the type of domains it can effectively
describe.
We are attacking these challenges with some of the same tools used by re-
searchers in complex adaptive systems, namely, agent-based simulations and
26
co-evolving utility landscapes. We believe we can gain some insight into the dy-
namics of adaptive MASs by constructing and analyzing various types of MASs.
We also believe that the next step for the CLRI framework is the replacement of
the current error definition with a utility function. The agents can then be seen
as searching for the maximum value in the changing utility landscape defined
by their utility function. The degree to which the agents are successful on their
climb to the landscape peaks depends on the abilities of their learning algo-
rithm (change rate, learning rate, and retention rate), and the speed at which
the landscape changes as the other agents change their behavior (impact).
The use of utility landscapes will allow us to consider an agent's utility
for any particular action, rather than simply considering whether an action is
correct or incorrect. The landscapes will also allow us to consider systems where
agents cannot travel between any two world states in one time step. That is, the
agents' moves on the landscape will be constrained in the same manner as their
actions or behaviors are constrained the actual system. Finally, the new theory
will likely need to redefine the CLRI parameters. We hope the new parameters
will be easy to derive directly from the values that govern the machine-learning
algorithms' behavior. These extensions will make the new theory applicable to
a much wider set of domains.
12 Summary
We have presented a framework for studying and predicting the behavior of
MASs composed of learning agents. We believe that this framework captures the
most important parameters that describe an agents' learning and the system's
rules of encounter. Various comparisons between the framework's predictions
and experimental results were given. These comparisons showed that the theo-
retical predictions closely match our experimental results and the experimental
results published by others. Our success in reproducing these results allows us
to confidently state the effectiveness and accuracy of our theory in predicting
the expected error of machine learning agents in MASs.
Since our theory describes an agent's behavior at a high-level (i.e., the agent's
error), it is not capable of making system-specific predictions (e.g., predicting
the particular actions that are favored). These types of system-specific predic-
tions can only be arrived at by the traditional method of implementing popula-
tions of such agents and testing their behaviors. However, we expect that there
will be times when the predictions from our theory will be enough to answer a
designer's questions. A MAS designer that only needs to determine how "good"
the agent's behavior will be could probably use the CLRI framework. A de-
signer that needs to know which particular emergent behaviors will be favored
by his agents will need to implement the agents.
Finally, while we have given some examples as to how learning rates can be
determined for particular machine learning implementations, we do not have
any general method for determining these rates. However, we showed how to
use the sample complexity of a learning problem to determine a lower bound on
27
the learning rate of a consistent learning agent. This bound is useful for quickly
ruling out the possibility of having agents with high expected errors and of
stating that an agent's expected error will be, at most, a certain constant value.
Still, if the agent's learning algorithm is much better than the one assumed by
a consistent learner (e.g., the agent is very good at generalizing from one world
state to many others), then these lower bounds could be significantly inaccurate.
A Derivation for Matching Game
If we can assume that the action chosen when an agent changes δt
result does not match ∆t
distribution, then we can say that:
i (w) and the
i(w) (for some specific w) is taken from a flat probability
B =
Ai − 2
Ai − 1
.
(37)
We will now show how to calculate the fourth term in (16). For the matching
game we find that we can set:
D = 1 − lj
F = lj + (1 − lj)(cid:18) Ai − 3
Ai − 2(cid:19) .
(38)
(39)
Having Ai = 2 implies that ci = li, this means that for this case we have
(1 − ci)D + li + (ci − li)F = li + (1 − ci)(1 − lj).
(40)
For the case where Ai > 2, which is the case we are interested in, we can
plug in the values for D and F and simplify, in order to get the fourth term:
(1 − ci)D + li + (ci − li)F = 1 − lj +
cilj(Ai − 1) + li(1 − lj) − ci
Ai − 2
.
(41)
References
[1] W. Brian Arthur, Steven Durlauf, and David Lane, editors. The Economy
as an Evolving Complex System II. Series in the Sciences of Complexity.
Addison-Wesley, Reading, MA, 1997.
[2] W. Brian Arthur, John H. Holland, Blake LeBaron, Richard Palmer, and
Paul Tayler. Asset pricing under endogenous expectations in an artificial
stock market. In Arthur et al. [1].
[3] Ken Binmore. Modeling rational players, part 2. Economics and Philoso-
phy, 4:9 -- 55, 1988.
[4] David Carmel and Shaul Markovitch. Exploration and adaptation in mul-
tiagent systems: A model-based approach. In Proceedings of the Interna-
tional Joint Conference on AI, 1997.
28
[5] A. Chavez and P. Maes. Kasbah: An agent marketplace for buying and sell-
ing goods. In First International Conference on the Practical Application
of Intelligent Agents and Multi-Agent Technology, pages 75 -- 90, 1996.
[6] Caroline Claus and Craig Boutilier. The dynamics of reinforcement learn-
In Proceedings of Workshop on
ing in cooperative multiagent systems.
Multiagent Learning. AAAI Press, 1997.
[7] George A. Cowan, David Pines, and David Meltzer, editors. Complexity:
Metaphors, Models and Reality. Addison-Wesley, Reading, MA, 1995.
[8] Vince M. Darley and Stuart Kauffman. Natural rationality. In Arthur et al.
[1].
[9] Edmund H. Durfee, Daniel L. Kiskis, and William P. Birmingham. The
agent architecture of the University of Michigan Digital Library. IEE Pro-
ceedings on Software Engineering, 144(1):61 -- 71, 1997.
[10] Oren Etzioni. Moving up the information food chain: Deploying softbots
on the world wide web.
In Proceedings of the Thirteenth National Con-
ference on Artificial Intelligence and the Eighth Innovative Applications of
Artificial Intelligence Conference, pages 1322 -- 1326, Menlo Park, August4 --
8 1996. AAAI Press / MIT Press.
[11] John H. Holland. Hidden Order. Addison-Wesley, 1995.
[12] Junling Hu and Michael P. Wellman. Self-fulfilling bias in multiagent learn-
ing. In Proceedings of the Second International Conference on Multi-Agent
Systems, pages 118 -- 125, 1996.
[13] Junling Hu and Michael P. Wellman. Multiagent reinforcement learning:
Theoretical framework and an algorithm. In Proceedings of the Fifteenth
International Conference on Machine Learning, 1998.
[14] Junling Hu and Michael P. Wellman. Online learning about other agents in
a dynamic multiagent system. In Proceedings of the Second International
Conference on Autonomous Agents, 1998.
[15] Alfred Hubler and David Pines. Complexity: Methaphors, Models and Re-
ality, chapter Prediction and Adaptation in an Evolving Chaotic Environ-
ment, pages 343 -- 379. In Cowan et al. [7], 1994.
[16] Toru Ishida. Real-Time Search for Learnig Autonomous Agents. Kluwer
Academic Publishers, 1997.
[17] Michael J. Kearns and Umesh V. Vazirani. An Introduction to Computa-
tional Learning Theory. The MIT Press, Cambridge, MA, 1994.
[18] Jeffery O. Kephart, Tad Hogg, and Bernardo A. Huberman. Collective
behavior of predictive agents. Physica D, 42(2):48 -- 65, 1990.
29
[19] Victor R. Lesser and Daniel D. Corkill. Functionally accurate, cooperative
distributed systems. IEEE Transactions on Systems, Man, and Cybernet-
ics, 11(1):81 -- 96, January 1981.
[20] Michael L Littman. Markov games as a framework for multi-agent rein-
forcement learning. In Proceedings of the Eleventh International Conference
on Machine Learning, pages 157 -- 163. Morgan Kaufmann, 1994.
[21] Jyi-Shane Liu and Katia P. Sycara. Multiagent coordination in tightly
In Victor Lesser, editor, Proceedings of
coupled real-time environments.
the First International Conference on Multi-Agent Systems. MIT Press,
1995.
[22] Maja J. Matari´c.
Issues and approaches in the design of collective au-
tonomous agents. Robotics and Autonomous Systems, 16(2-4):321 -- 331, Dec
1995.
[23] Maja J. Matari´c. Learning social behaviors. Robotics and Autonomous
Agents, 20:191 -- 204, 1997.
[24] Tom M. Mitchell. Machine Learning. McGraw-Hill, 1997.
[25] Jeffrey S. Rosenschein and Gilad Zlotkin. Rules of Encounter. The MIT
Press, Cambridge, MA, 1994.
[26] Stuart Russell and Peter Norvig. Artificial Intelligence: A Modern Ap-
proach. Prentice Hall, 1995.
[27] Sandip Sen, editor. Working Notes from the AAAI Symposium on Adap-
tation, Co-evolution and Learning in Multiagent Systems, 1996.
[28] Sandip Sen and Mahendra Sekaran.
Individual learning of coordination
knowledge. Journal of Experimental and Theoretical AI, pages 156 -- 170,
1998.
[29] Sandip Sen, Mahendra Sekaran, and John Hale. Learning to coordinate
without sharing information. In Proceedings of the Twelfth National Con-
ference on Artificial Intelligence, 1994.
[30] Yoav Shoham and Moshe Tennenholtz. On the emergence of social con-
ventions: modeling, analysis, and simulations. Artificial Intelligence,
94(1):139 -- 166, 1997.
[31] Peter Stone and Manuela Velos. Multiagent systems: A survery from a
machine learning perspective. Technical Report CMU-CS-97-193, Carnegie
Mellon University, December 1997.
[32] Peter Stone and Manuela Veloso. Team-partitioned, opaque-transition re-
inforcement learning. In Proceedings of the Third International Conference
on Autonomous Agents. Springer-Verlag, 1999.
30
[33] Jos´e M. Vidal. Computational Agents That Learn About Agents: Algorithms
for Their Design and a Predictive Theory of Their Behavior. PhD thesis,
University of Michigan, 1998.
[34] Jos´e M. Vidal and Edmund H. Durfee. Learning nested models in an in-
formation economy. Journal of Experimental and Theoretical Artificial In-
telligence, 10(3):291 -- 308, 1998.
[35] Christopher J. Watkins and Peter Dayan. Q-learning. Machine Learning,
8:279 -- 292, 1992.
[36] Gerhard Weiss, editor. Distributed Artificial Intelligence meets Machine
Learning. Springer, 1997.
31
|
0903.2282 | 1 | 0903 | 2009-03-12T21:49:36 | Multiagent Learning in Large Anonymous Games | [
"cs.MA",
"cs.GT",
"cs.LG"
] | In large systems, it is important for agents to learn to act effectively, but sophisticated multi-agent learning algorithms generally do not scale. An alternative approach is to find restricted classes of games where simple, efficient algorithms converge. It is shown that stage learning efficiently converges to Nash equilibria in large anonymous games if best-reply dynamics converge. Two features are identified that improve convergence. First, rather than making learning more difficult, more agents are actually beneficial in many settings. Second, providing agents with statistical information about the behavior of others can significantly reduce the number of observations needed. | cs.MA | cs | Multiagent Learning in Large Anonymous Games
Ian A. Kash
Computer Science Dept.
Cornell University
[email protected]
Eric J. Friedman
School of Operations
Research and Information
Engineering
Cornell University
[email protected]
Joseph Y. Halpern
Computer Science Dept.
Cornell University
[email protected]
9
0
0
2
r
a
M
2
1
]
A
M
.
s
c
[
1
v
2
8
2
2
.
3
0
9
0
:
v
i
X
r
a
ABSTRACT
In large systems, it is important for agents to learn to act ef-
fectively, but sophisticated multi-agent learning algorithms
generally do not scale. An alternative approach is to find re-
stricted classes of games where simple, efficient algorithms
converge.
It is shown that stage learning efficiently con-
verges to Nash equilibria in large anonymous games if best-
reply dynamics converge. Two features are identified that
improve convergence. First, rather than making learning
more difficult, more agents are actually beneficial in many
settings. Second, providing agents with statistical informa-
tion about the behavior of others can significantly reduce
the number of observations needed.
Categories and Subject Descriptors
I.2.11 [Artificial Intelligence]: Distributed Artificial Intel-
ligence -- Multiagent systems; J.4 [Social and Behavioral
Sciences]: Economics
General Terms
Algorithms, Economics, Theory
Keywords
Multiagent Learning, Game Theory, Large Games, Anony-
mous Games, Best-Reply Dynamics
1.
INTRODUCTION
Designers of distributed systems are frequently unable to
determine how an agent in the system should behave, be-
cause optimal behavior depends on the user's preferences
and the actions of others. A natural approach is to have
agents use a learning algorithm. Many multiagent learning
algorithms have been proposed including simple strategy up-
date procedures such as fictitious play [10], multiagent ver-
sions of Q-learning [25], and no-regret algorithms [5].
However, as we discuss in Section 2, existing algorithms
are generally unsuitable for large distributed systems. In a
distributed system, each agent has a limited view of the ac-
tions of other agents. Algorithms that require knowing, for
Cite as: Title, Author(s), Proc. of 8th Int. Conf. on Au-
tonomous Agents and Multiagent Systems (AAMAS 2009),
Decker, Sichman, Sierra and Castelfranchi (eds.), May, 10 -- 15, 2009, Bu-
dapest, Hungary, pp. XXX-XXX.
Copyright c(cid:13) 2009, International Foundation for Autonomous Agents and
Multiagent Systems (www.ifaamas.org). All rights reserved.
1
example, the strategy chosen by every agent cannot be im-
plemented. Furthermore, the size of distributed systems re-
quires fast convergence. Users may use the system for short
periods of time and conditions in the system change over
time, so a practical algorithm for a system with thousands
or millions of users needs to have a convergence rate that is
sublinear in the number of agents. Existing algorithms tend
to provide performance guarantees that are polynomial or
even exponential. Finally, the large number of agents in the
system guarantees that there will be noise. Agents will make
mistakes and will behave in unexpectedly. Even if no agent
changes his strategy, there can still be noise in agent payoffs.
For example, a gossip protocol will match different agents
from round to round; congestion in the underlying network
may effect message delays between agents. A learning algo-
rithm needs to be robust to this noise.
While finding an algorithm that satisfies these require-
ments for arbitrary games may be difficult, distributed sys-
tems have characteristics that make the problem easier. First,
they involve a large number of agents. Having more agents
may seem to make learning harder -- after all, there are more
possible interactions. However, it has the advantage that the
outcome of an action typically depends only weakly on what
other agents do. This makes outcomes robust to noise. Hav-
ing a large number of agents also make it less useful for an
agent to try to influence others; it becomes a better policy to
try to learn an optimal response. In contrast, with a small
number of agents, an agent can attempt to guide learning
agents into an outcome that is beneficial for him.
Second, distributed systems are often anonymous [1]; it
does not matter who does something, but rather how many
agents do it. For example, when there is congestion on a link,
the experience of a single agent does not depend on who is
sending the packets, but on how many are being sent.
Finally, and perhaps most importantly, in a distributed
system the system designer controls the game agents are
playing. This gives us a somewhat different perspective than
most work, which takes the game as given. We do not need
to solve the hard problem of finding an efficient algorithm
for all games.
Instead, we can find algorithms that work
efficiently for interesting classes of games, where for us "in-
teresting" means "the type of games a system designer might
wish agents to play." Such games should be "well behaved,"
since it would be strange to design a system where an agent's
decisions can influence other agents in pathological ways.
In Section 3, we show that stage learning [9] is robust,
implementable with minimal information, and converges ef-
ficiently for an interesting class of games. In this algorithm,
agents divide the rounds of the game into a series of stages.
In each stage, the agent uses a fixed strategy except that
he occasionally explores. At the end of a stage, the agent
chooses as his strategy for the next stage whatever strategy
had the highest average reward in the current stage. We
prove that, under appropriate conditions, a large system of
stage learners will follow (approximate) best-reply dynamics
despite errors and exploration.
For games where best-reply dynamics converge, our theo-
rem guarantees that learners will play an approximate Nash
equilibrium. In contrast to previous results where the con-
vergence guarantee scales poorly with the number of agents,
our theorem guarantees convergence in a finite amount of
time with an infinite number of agents. While the assump-
tion that best-reply dynamics converge is a strong one, many
interesting games converge under best-reply dynamics, in-
cluding dominance solvable games and games with mono-
tone best replies. Marden et al. [17] have observed that
convergence of best-reply dynamics is often a property of
games that humans design. Moreover, convergence of best-
reply dynamics is a weaker assumption than a common as-
sumption made in the mechanism design literature, that the
games of interest have dominant strategies (each agent has
a strategy that is optimal no matter what other agents do).
Simulation results, presented in Section 4, show that con-
vergence is fast in practice: a system with thousands of
agents can converge in a few thousand rounds. Further-
more, we identify two factors that determine the rate and
quality of convergence. One is the number of agents: having
more agents makes the noise in the systen more consistent
so agents can learn using fewer observations. The other
is giving agents statistical information about the behavior
of other agents; this can speed convergence by an order of
magnitude. Indeed, even noisy statistical information about
agent behavior, which should be relatively easy to obtain
and disseminate, can significantly improve performance.
2. RELATED WORK
One approach to learning to play games is to generalize
reinforcement learning algorithms such as Q-learning [25].
One nice feature of this approach is that it can handle games
with state, which is important in distributed systems.
In
Q-learning, an agent associates a value with each state-
action pair. When he chooses action a in state s, he up-
dates the value Q(s, a) based on the reward he received
and the best value he can achieve in the resulting state s′
(maxa′ Q(s′, a′)). When generalizing to multiple agents, s
and a become vectors of the state and action of every agent
and the max is replaced by a prediction of the behavior
of other agents. Different algorithms use different predic-
tions; for example, Nash-Q uses a Nash equilibrium calcula-
tion [15]. See [22] for a survey.
Unfortunately, these algorithms converge too slowly for
a large distributed system. The algorithm needs to expe-
rience each possible action profile many times to guarantee
convergence. So, with n agents and k strategies, the naive
convergence time is O(kn). Even with a better represen-
tation for anonymous games, the convergence time is still
O(nk) (typically k ≪ n). There is also a more fundamen-
tal problem with this approach: it assumes information that
an agent is unlikely to have. In order to know which value
to update, the agent must learn the action chosen by ev-
ery other agent. In practice, an agent will learn something
2
about the actions of the agents with whom he directly in-
teracts, but is unlikely to gain much information about the
actions of other agents.
Another approach is no-regret learning, where agents choose
a strategy for each round that guarantees that the regret of
their choices will be low. Hart and Mas-Colell [13] present
such a learning procedure that converges to a correlated equi-
librium [21] given knowledge of what the payoffs of every
action would have been in each round. They also provide
a variant of their algorithm that requires only information
about the agent's actual payoffs [14]. However, to guarantee
convergence to within ǫ of a correlated equilibrium requires
O(kn/ǫ2 log kn), still too slow for large systems. Further-
more, the convergence guarantee is that the distribution of
play converges to equilibrium; the strategies of individual
learners will not converge. Better results can be achieved
in restricted settings. For example, Blum et al. [2] showed
that in routing games a continuum of no-regret learners will
approximate Nash equilibrium in a finite amount of time.
Foster and Young [7] use a stage-learning procedure that
converges to Nash equilibrium for two-player games. Ger-
mano and Lugosi [11] showed that it converges for generic n-
player games (games where best replies are unique). Young [26]
uses a similar algorithm without explicit stages that also
converges for generic n-player games. Rather than selecting
best replies, in these algorithms agents choose new actions
randomly when not in equilibrium. Unfortunately, these
algorithms involve searching the whole strategy space, so
their convergence time is exponential. Another algorithm
that uses stages to provide a stable learning environment is
the ESRL algorithm for coordinated exploration [24].
Marden et al. [18, 19] use an algorithm with experimen-
tation and best replies but without explicit stages that con-
verges for weakly acyclic games, where best-reply dynamics
converge when agents move one at a time, rather than mov-
ing all at once, as we assume here. Convergence is based on
the existence of a sequence of exploration moves that lead
to equilibrium. With n agents who explore with probability
ǫ, this analysis gives a convergence time of O(1/ǫn). Fur-
thermore, the guarantee requires ǫ to be sufficiently small
that agents essentially explore one at a time, so ǫ needs to
be O(1/n).
There is a long history of work examining simple learn-
ing procedures such as fictitious play [10], where each agent
makes a best response assuming that each other player's
strategy is characterized by the empirical frequency of his
observed moves. In contrast to algorithms with convergence
guarantees for general games, these algorithms fail to con-
verge in many games. But for classes of games where they
do converge, they tend to do so rapidly. However, most work
in this area assumes that the actions of agents are observed
by all agents, agents know the payoff matrix, and payoffs are
deterministic. A recent approach in this tradition is based
on the Win or Learn Fast principle, which has limited con-
vergence guarantees but often performs well in practice [4].
There is also a body of empirical work on the convergence
of learning algorithms in multiagent settings. Q-learning has
had empirical success in pricing games [23], n-player coop-
erative games [6], and grid world games [3]. Greenwald at
al. [12] showed that a number of algorithms, including stage
learning, converge in a variety of simple games. Marden et
al. [19] found that their algorithm converged must faster in a
congestion game than the theoretical analysis would suggest.
Our theorem suggests an explanation for these empirical ob-
servations: best-reply dynamics converge in all these games.
While our theorem applies directly only to stage learning, it
provides intuition as to why algorithms that learn "quickly
enough" and change their behavior "slowly enough" rapidly
converge to Nash equilibrium in practice.
u) be Lipschitz continuous.1 For definiteness, we use
the L1 norm as our notion of distance when specifying
continuity (the L1 distance between two vectors is the
sum of the absolute values of the differences in each
component). Note that this formulation assumes all
agents share a common utility function.
3. THEORETICAL RESULTS
3.1 Large Anonymous Games
We are interested in anonymous games with countably
many agents. Assuming that there are countably many
agents simplifies the proofs; it is straightforward to extend
our results to games with a large finite number of agents.
Our model is adapted from that of [1]. Formally, a large
anonymous game is characterized by a tuple Γ = (N, A, P, Pr).
• N is the countably infinite set of agents.
• A is a finite set of actions from which each agent can
choose (for simplicity, we assume that each agent can
choose from the same set of actions).
• ∆(A), the set of probability distributions over A, has
two useful interpretations. The first is as the set of
mixed actions. For a ∈ A we will abuse notation and
denote the mixed action that is a with probability 1 as
a. In each round each agent chooses one of these mixed
actions. The second interpretation of ρ ∈ ∆(A) is as
the fraction of agents choosing each action a ∈ A. This
is important for our notion of anonymity, which says
an agent's utility should depend only on how many
agents choose each action rather than who chooses it.
• G = {g : N → ∆(A)} is the set of (mixed) action
profiles (i.e. which action each agent chooses). Given
the mixed action of every agent, we want to know the
fraction of agents that end up choosing action a. For
g ∈ G, let g(i)(a) denote the probability with which
agent i plays a according to g(i) ∈ ∆(A). We can then
express the fraction of agents in g that choose action
a as limn→∞(1/n) Pn
i=0 g(i)(a), if this limit exists. If
the limit exists for all actions a ∈ A, let ρg ∈ ∆(A)
give the value of the limit for each a. The profiles g
that we use are all determined by a simple random
process. For such profiles g, the strong law of large
numbers (SLLN) guarantees that with probability 1 ρg
is well defined. Thus it will typically be well defined
(using similar limits) for us to talk about the fraction
of agents who do something.
• P ⊂ R is a finite set of payoffs agents can receive.
• Pr : A × ∆(A) → ∆(P ) denotes the distribution over
payoffs that results when the agent performs action
a and other agents follow action profile ρ. We use a
probability distribution over payoffs rather than a pay-
off to model the fact that agent payoffs may change
even if no agent changes his strategy. The expected
utility of an agent who performs mixed action s when
other agents follow action distribution ρ is u(s, ρ) =
Pa∈A Pp∈P ps(a) Pra,ρ(p). Our definition of Pr in
terms of ∆(A) rather than G ensures the the game
is anonymous. We further require that Pr (and thus
An example of a large anonymous game is one where, in
each round, each agent plays a two-player game against an
opponent chosen at random. Then A is the set of actions
of the two-player game and P is the set of payoffs of the
game. Once every agent chooses an action, the distribution
over actions is characterized by some ρ ∈ ∆(A). Let pa,a′
denote the payoff for the agent if he plays a and the other
agent plays a′. Then the utility of mixed action s given
distribution ρ is
u(s, ρ) = X
s(a)ρ(a′)pa,a′.
a,a′∈A2
3.2 Best-Reply Dynamics
Given a game Γ and an action distribution ρ, a natural
goal for an agent is to play the action that maximizes his
expected utility with respect to ρ: argmaxa∈A u(a, ρ). We
call such an action a best reply to ρ. In a practical amount
of time, an agent may have difficulty determining which of
two actions with close expected utilities is better, so we will
allow agents to choose actions that are close to best replies.
If a is a best reply to ρ, then a′ is an η-best reply to ρ if
u(a′, ρ) + η ≥ u(a, ρ). There may be more than one η-best
reply; we denote the set of η-best replies ABRη(ρ).
We do not have a single agent looking for a best reply;
every agent is trying to find a one at the same time.
If
agents start off with some action distribution ρ0, after they
all find a best reply there will be a new action distribution ρ1.
We assume that ρ0(a) = 1/A (agents choose their initial
strategy uniformly at random), but our results apply to any
distribution used to determine the initial strategy. We say
that a sequence (ρ0, ρ1, . . .) is an η-best-reply sequence if the
support of ρi+1 is a subset of ABRη(ρi); that is ρi+1 gives
positive probability only to approximate best replies to ρi.
A η best-reply sequence converges if there exists some t such
that for all t′ > t, ρt′ = ρt. Note that this is a particularly
strong notion of convergence because we require the ρt to
converge in finite time and not merely in the limit. A game
may have infinitely many best-reply sequences, so we say
that approximate best-reply dynamics converge if there exists
some η > 0 such that every η-best-reply sequence converges.
The limit distribution ρt determines a mixed strategy that
is an η-Nash equilibrium.
Our theorem shows that learners can successfully learn in
large anonymous games where approximate best-reply dy-
namics converge. The number of stages needed to converge
is determined by the number of best replies needed before
the sequence converges. It is possibly to design games that
have long best-reply sequences, but it practice most games
have short sequences. One condition that guarantees this is
if ρ0 and all the degenerate action distributions a ∈ A (i.e.,
1Lipschitz continuity imposes the additional constraint that
there is some constant K such that Pr(a, ρ)−Pr(a, ρ′)/ρ−
ρ′1 ≤ K for all ρ and ρ′. Intuitively, this ensures that the
distribution of outcomes doesn't change "too fast." This is a
standard assumption that is easily seen to hold in the games
that have typically been considered in the literature.
3
distributions that assign probability 1 to some a ∈ A) have
unique best replies. In this case, there can be at most A
best replies before equilibrium is reached. Furthermore, in
such games the distinction between η-best replies and best
replies is irrelevant; for sufficiently small η, a η-best reply is
a best reply. It is not hard to show that the property that
degenerate strategies have unique best replies is generic; it
holds for almost every game.
3.3 Stage Learners
An agent who wants to find a best reply may not know the
set of payoffs P , the mapping from actions to distributions
over payoffs Pr, or the action distribution ρ (and, indeed, ρ
may be changing over time), so he will have to use some type
of learning algorithm to learn it. Our approach is to divide
the play of the game into a sequence of stages. In each stage,
the agent almost always plays some fixed action a, but also
explores other actions. At the end of the stage, he chooses a
new a′ for the next stage based on what he has learned. An
important feature of this approach is that agents maintain
their actions for the entire stage, so each stage provides a
stable environment in which agents can learn. To simplify
our results, we specify a way of exploring and learning within
a stage (originally described in [9]), but our results should
generalize to any "reasonable" learning algorithm used to
learn within a stage. (We discuss what is "reasonable" in
Section 5.) In this section, we show that, given a suitable
parameter, at the each stage most agents will have learned
a best reply to the environment of that stage.
Given a game Γ, in each round t agent i needs to se-
lect a mixed action si,t. Our agents use strategies that we
denote aǫ, for a ∈ A, where aǫ(a) = 1 − ǫ and aǫ(a′
6=
a) = ǫ/(A − 1). Thus, with aǫ, an agent almost always
plays a, but with probability ǫ explores other strategies uni-
formly at random. Thus far we have not specified what
information an agent can use to choose si,t. Different games
may provide different information. All that we require is
that an agent know all of his previous actions and his pre-
vious payoffs. More precisely, for all t′ < t, he knows his
action at′ (i) (which is determined by si,t′ ) and his payoffs
pt′ (i) (which is determined by Pr(ai,t′ , ρt′), where ρt′ is the
action distribution for round t′; note that we do not as-
sume that the agent knows ρt′ .) Using this information, we
can express the average value of an action over the pre-
vious τ = ⌈1/ǫ2⌉ rounds (the length of a stage).2 Let
H(a, i, t) = {t − τ ≤ t′ < t at′ (i) = a} be the set of recent
rounds in which a was played by i. Then the average value
is V (a, i, t) = Pt′ ∈H(a,i,t) pt′ (i)/H(a, i, t) if H(a, i, t) > 0
and 0 otherwise. While we need the value of H only at
times that are multiples of τ , for convenience we define it
for arbitrary times t.
We say that an agent is an ǫ-stage learner if he chooses
his actions as follows. If t = 0, st is chosen at random from
{aǫ a ∈ A}. If t is a nonzero multiple of τ , si,t = a(i, t)ǫ
where a(i, t) = argmaxa∈A V (a, i, t). Otherwise, si,t = si,t−1.
Thus, within a stage, his mixed action is fixed and at the end
of a stage he updates it to use the action with the highest
average value during the previous stage.
The evolution of a game played by stage learners is not
deterministic; each agent chooses a random si,0 and the se-
2The use of the exponent 2 is arbitrary. We require only
that the expected number of times a strategy is explored
increases as ǫ decreases.
quence of at(i) and pt(i) he observes is also random. How-
ever, with a countably infinite set of agents, we can use the
SLLN to make statements about the overall behavior of the
game. Let gt(i) = si,t. A run of the game consists of a
sequence of triples (gt, at, pt). The SLLN guarantees that
with probability 1 the fraction of agents who choose a strat-
egy a in at is ρgt (a). Similarly, the fraction of agents who
chose a in at that receive payoff p will be Pr(a, ρgt )(p) with
probability 1.
To make our notion of a stage precise, we refer to the se-
quence of tuples (gnτ , anτ , pnτ ) . . . (g(n+1)τ −1, a(n+1)τ −1, p(n+1)τ −1)
as stage n of the run. During stage n there is a stationary
action distribution that we denote ρgnτ . If si,(n+1)τ = aǫ
and a ∈ ABRη(gnτ ), then we say that agent i has learned
an η-best reply during stage n of the run. As the following
lemma shows, for sufficiently small ǫ, most agents will learn
an η-best reply.
Lemma 3.1. For all
large anonymous games Γ, action
profiles, approximations η > 0, and probabilities of error
e > 0, there exists an ǫ∗ > 0 such that for ǫ < ǫ∗ and all n,
if all agents are ǫ-stage learners, then at least a 1−e fraction
of agents will learn an η-best reply during stage n.
Proof. (Sketch) On average, an agent using strategy aǫ
plays action a (1 − ǫ)τ times during a stage and plays all
other actions ǫτ /(n − 1) times each. For τ large, the realized
number of times played will be close to the expectation value
with high probability. Thus, if ǫτ is sufficiently large, then
the average payoff from each action will be exponentially
close to the true expected value (via a standard Hoeffding
bound on sums of i.i.d. random variables), and thus each the
learner will correctly identify an action with approximately
the highest expected payoff with probability at least 1 − e.
By the SLLN, at least a 1 − e fraction of agents will learn
an η-best reply. A detailed version of this proof in a more
general setting can be found in [9].
3.4 Convergence Theorem
Thus far we have defined large anonymous games where
approximate best-reply dynamics converge. If all agents in
the game are ǫ-stage learners, then the sequence ρ0, ρ1, . . . of
action distributions in a run of the game is not a best-reply
sequence, but it is close. The action used by most agents
most of the time in each ρn is the action used in ρn for some
approximate best reply sequence.
In order to prove this, we need to define "close." Our
definition is based on the error rate e and exploration rate
ǫ that introduces noise into ρn. Intuitively, distribution ρ
is close to ρ if, by changing the strategies of an e fraction
of agents and having all agents explore an ǫ fraction of the
time, we can go from an action profile with corresponding
action distribution ρ to one with corresponding distribution
ρ. Note that this definition will not be symmetric.
In this definition, g identifies what (pure) action each
agent is using that leads to ρ, g ′ allows an e fraction of
agents to use some other action, and g incorporates the fact
that each agent is exploring, so each strategy is an aǫ (the
agent usually plays a but explores with probability ǫ).
Definition 3.2. Action distribution ρ (e, ǫ)-close to ρ if
there exist g, g ′, and g ∈ G such that:
• ρ = ρg and ρ = ρg;
4
• g(i) ∈ A for all i ∈ N;
• ρg − ρg′ 1 ≤ 2e (this allows an e fraction of agents
in g ′ to play a different strategy from g);
• for some ǫ′ ≤ ǫ, if g ′(i) = a then g(i) = aǫ′ .
The use of ǫ′ in the final requirement ensures that if two
distributions are (e, ǫ)-close then they are also (e′, ǫ′)-close
for all e′ ≥ e and ǫ′ ≥ ǫ. As an example of the asymmetry
of this definition, aǫ is (0, ǫ) close to a, but the reverse is
not true. While (e, ǫ)-closeness is a useful distance measure
for our analysis, it is an unnatural notion of distance for
specifying the continuity of u, where we used the L1 norm.
The following simple lemma shows that this distinction is
unimportant; if ρ is sufficiently (e, ǫ)-close to ρ then it is
close according to the L1 measure as well.
Lemma 3.3. If ρ is (e, ǫ)-close to ρ, then ρ−ρ1 ≤ 2(e+
ǫ).
Proof. Since ρ is (e, ǫ)-close to ρ, there exist g, g ′, and
g as in Definition 3.2. Consider the distributions ρg = ρ,
ρg′ , and ρg = ρ. We can view these three distributions as
vectors, and calculate their L1 distances. By Definition 3.2,
ρg′ − ρg1 ≤ 2ǫ because an ǫ fraction
ρg − ρg′ 1 ≤ 2e.
of agents explore. Thus by the triangle inequality, the L1
distance between ρ and ρ is at most 2(e + ǫ).
We have assumed that approximate best reply sequences
of ρn converge, but during a run of the game agents will
actually be learning approximate best replies to ρn. The
following lemma shows that this distinction does not matter
if ρ and ρ are sufficiently close.
Lemma 3.4. For all η there exists a dη such that if ρ
is (e, ǫ)-close to ρ, e > 0, ǫ > 0, and e + ǫ < dη then
ABR(η/2)(ρ) ⊆ ABRη(ρ).
Proof. Let K be the maximum of the Lipschitz con-
stants for all u(a, ·) and dη = η/(8K). Then for all ρ that
are (e, ǫ)-close to ρ and all a, u(a, ρ−u(a, ρ) ≤ ρ−ρ1K ≤
2η/(8K)K = η/4 by Lemma 3.3.
Let a /∈ ABRη(ρ) and a′ ∈ argmaxa′∈ABRη (ρ) u(a′, ρ).
Then u(a, ρ) + η < u(a′, ρ). Combining this with the above
gives u(a, ρ) + η/2 < u(a′, ρ). Thus a /∈ ABRη/2(ρ).
Lemmas 3.1 and 3.4 give requirements on (e, ǫ). In the
statement of the theorem, we call (e, ǫ) η-acceptable if they
satisfy the requirements of both lemmas for η/2 and all η-
best-reply sequences converge in Γ.
Theorem 3.5. Let Γ be a large anonymous game where
approximate best-reply dynamics converge and let (e, ǫ) be
η-acceptable for Γ. If all agents are ǫ-stage learners then,
for all runs, there exists an η-best-reply sequence ρ0, ρ1, . . .
such that in stage n at least a 1 − e fraction will learn a best
reply to ρn with probability 1.
Proof. ρ0 = ρ0, so ρ0 is (e, ǫ)-close to ρ. Assume ρn is
(e, ǫ)-close to ρ. By Lemma 3.1 at least a 1 − e fraction will
learn a η/2-best reply to ρn. By Lemma 3.4, this is a η-best
reply to ρn. Thus ρn+1 will be (e, ǫ)-close to ρn+1.
Theorem 3.5 guarantees that after a finite number of stages,
agents will be close to an approximate Nash equilibrium pro-
file. Specifically, ρn will be (e, ǫ)-close to an η-Nash equi-
librium profile ρn. Note that this means that ρn is actually
an η′-Nash equilibrium for a larger η′ that depends on η,e,ǫ,
and the Lipschitz constant K.
Our three requirements for a practical learning algorithm
were that it require minimal information, converge quickly
in a large system, and be robust to noise. Stage learning re-
quires only that an agent know his own payoffs, so the first
condition is satisfied. Theorem 3.5 shows that it satisfies
the other two requirements. Convergence is guaranteed in
a finite number of stages. While the number of stages de-
pends on the game, in Section 3.2 we argued that in many
cases it will be quite small. Finally, robustness comes from
tolerating an e fraction of errors. While in our proofs we
assumed these errors were due to learning, the analysis is
the same if some of this noise is from other sources such
as churn (agents entering and leaving the system) or agents
making errors. We discuss this issue more in Section 5.
4. SIMULATION RESULTS
Theorem 3.5 guarantees convergence for a sufficiently small
exploration probability ǫ, but decreasing ǫ also increases τ ,
the length of a stage. Increasing the length of a stage means
that agents take longer to reach equilibrium, so for stage
learning to be practical, ǫ needs to be relatively large. To
show that ǫ can be large in practice, we tested populations
of stage learners in a number of games where best reply
dynamics converge and experienced convergence with ǫ be-
tween 0.01 and 0.05. This allows convergence within a few
thousand rounds in many games. While our theorem applies
only to stage learning, the analysis provides intuition as to
why a reasonable algorithm that changes slowly enough that
other learners have a chance to learn best replies should con-
verge as well. To test a very different type of algorithm, we
also implemented the no-regret learning algorithm of Hart
and Mas-Collell [14]. This algorithm also quickly converged
close to Nash equilibrium, although in many games it did
not converge as closely as stage learning.
Our theoretical results make two significant predictions
about factors that influence the rate of convergence. Lemma 3.1
tells us that the length of a stage is determined by the num-
ber of times each strategy needs to be explored to get an
accurate estimate of its value. Thus the amount of infor-
mation provided by each observation has a large effect on
the rate of convergence. For example, in a random match-
ing game, an agents payoff provides information about the
strategy of one other agent. On the other hand, if he receives
his expected payoff for being matched, a single observation
provides information about the entire distribution of strate-
gies. In the latter case the agent can learn with many fewer
observations.
A related prediction is that having more agents will lead to
faster convergence, particularly in games where payoffs are
determined by the average behavior of other agents, because
variance in payoffs due to exploration and mistakes decreases
as the number of agents increases. Our experimental results
illustrate both of these phenomena.
We tested the learning behavior of stage learners and no-
regret learners in a number of games, including prisoner's
dilemma, a climbing game [6], the congestion game described
in [12] with both ACP and serial mechanisms, and two differ-
ent contribution games (called a Diamond-type search model
in [20]). We implemented payoffs both by randomly match-
ing players and by giving each player what his expected pay-
off would have been had he been randomly matched (some
5
m
u
i
r
b
i
l
i
u
q
E
m
o
r
f
e
c
n
a
t
s
D
i
6
5
4
3
2
1
0
0
Stage 2
Stage 10
Stage 100
No−Regret 2
No−Regret 10
No−Regret 100
m
u
i
r
b
i
l
i
u
q
E
m
o
r
f
e
c
n
a
t
s
D
i
Stage 2
Stage 10
Stage 100
No−Regret 2
No−Regret 10
No−Regret 100
6
5
4
3
2
1
0.5
1
1.5
2
Time
2.5
x 104
0
0
1
2
3
Time
4
5
x 104
Figure 1: Convergence with the average
Figure 2: Convergence with random matching
payoffs were adjusted to make the games symmetric). Re-
sults were similar across the different games, so we report
only the results for a contribution game.
In the contribution game, agents choose strategies from 0
to 19, indicating how much effort they contribute to a collec-
tive enterprise. The value to an agent depends on how much
he contributes, as well as how much other agents contribute.
If he contributes x and the contribution of the other agents
is y, then his utility is 2xy − c(x), where c(0) = 0, c(1) = 1,
c(x) = (x − 1)2 for x ∈ 2, . . . , 8 and c(x) = x2 + 2n for x > 8.
We considered two versions of this game. In the first, y is
determined by the average strategy of the other agents. In
the second, y is determined by randomly matching the agent
with another agent.
Our implementation of stage learners is as described in
Section 3.3, with ǫ = 0.05 when y is determined by the av-
erage and ǫ = 0.01 when y is determined by random match-
ing. Rather than taking the length of stage τ as 1/ǫ2, we
set τ = 250 and 2000, respectively; this gives better perfor-
mance. Our implementation of no-regret learners is based
on that of Hart and Mas-Colell [14], with improvements sug-
gested by Greenwald et al. [12].
Figure 1 shows the results for learners in the version of the
game where y is the average strategy of other agents. Each
curve shows the distance from equilibrium as a function of
the number of rounds of a population of agents of a given size
using a given learning algorithm. The results were averaged
over 10 runs. Since the payoffs for nearby strategies are
close, we want our notion of distance to take into account
that agents playing 7 are closer to equilibrium (8) than those
playing zero. Therefore, we consider the expected distance
of ρ from equilibrium: Pa ρ(a)a − 8. To determine ρ, we
counted the number of times each action was over the length
of a stage, so in practice the distance will never be zero
due to mistakes and exploration. For ease of presentation,
the graph shows only populations of size up to 100; similar
results were obtained for populations up to 5000 agents.
For stage learning, increasing the population size has a
dramatic impact. With two agents, mistakes and best replies
to the results of these mistakes cause behavior to be quite
chaotic. With ten agents, agents successfully learn, although
mistakes and suboptimal strategies are quite frequent. With
one hundred agents, all the agents converge quickly to equi-
librium strategies and mistakes are rare; almost all of the
distance from equilibrium is due to exploration.
No-regret learning also converges quickly, but the "qual-
ity" of convergence (how close we get to equilibrium) is not
as high. The major problem is that a significant fraction of
agents play near-optimal actions rather than optimal action.
This may have a number of causes. First, the guarantee is
that the asymptotic value of ρ will be an equilibrium, which
allows the short periods that we consider to be far from equi-
librium. Second, the quality of convergence depends on ǫ,
so tight convergence may require a much lower rate of ex-
ploration and thus a much longer convergence time. Finally,
this algorithm is guaranteed to converge only to a correlated
equilibrium, which may not be a Nash equilibrium.
Figure 2 shows the results when agent payoffs are deter-
mined by randomly matching agents. Even for large num-
bers of stage learners, convergence is not as tight and takes
on the order of ten times longer. This is a result of the infor-
mation available to agents. When payoffs were determined
by the average strategy, a single observation was sufficient
to evaluate a strategy, so we could use very short stages. To
deal with the noise introduced by random matching we need
much longer stages. The number of stages to convergence
is similar. Even with longer stages and a large number of
agents, mistakes are quite common. Nevertheless agents do
successfully learn. The performance of no-regret learners is
less affected because they use payoff information from the
entire run of the game, while stage learners discard payoff
information at the end of each stage.
Convergence in the random-matching game takes approx-
imately 20,000 rounds, which is too slow for many applica-
tions. If a system design requires this type of matching, this
makes learning problematic. However, the results of Fig-
ure 1 suggest that the learning could be done much faster
if the system designer could supply agents with more infor-
mation. This suggests that collecting statistical information
about the behavior of agents may be a critical feature for
ensuring fast convergence. If agents know enough about the
game to determine their expected payoffs from this statisti-
cal information, then they can directly learn, as in Figure 1.
Even with less knowledge about the game, statistical infor-
mation can still speed learning, for example, by helping an
agent determine whether the results of exploring an action
were typical or due to the other agent using a rare action.
6
5. DISCUSSION
While our results show that a natural learning algorithm
can learn efficiently in an interesting class of games, there
are many further issues that merit exploration.
Other Learning Algorithms
Our theorem assumes that agents use a simple rule for lear-
ing within each stage:
they average the value of payoffs
received. However, there are certainly other rules for es-
timating the value of an action; any of these can be used
as long as the rule guarantees that errors can be made ar-
bitrarily rare given sufficient time. It is also not necessary
to restrict agents to stage learning. Stage learning guar-
antees a stationary environment for a period of time, but
such strict behavior may not be needed or practical. Other
approaches, such as exponentially discounting the weight of
observations [12, 19] or Win or Learn Fast [4] allow an algo-
rithm to focus its learning on recent observations and pro-
vide a stable environment in which other agents can learn.
Other Update Rules
In addition to using different algorithms to estimate the val-
ues of actions, a learner could also change the way he uses
those values to update his behavior. For example, rather
than basing his new strategy on only the last stage, he could
base it on the entire history of stages and use a rule in the
spirit of fictitious play. Since there are games where fictitious
play converges but best-reply dynamics do not, this could
extend our results to another interesting class of games, as
long as the errors in each period do not accumulate over
time. Another possibility is to update probabilistically or
use a tolerance to determine whether to update (see e.g. [7,
14]). This could allow convergence in games where best-
reply dynamics oscillate or decrease the fraction of agents
who make mistakes once the system reaches equilibrium.
Model Assumptions
Our model makes several unrealistic assumptions, most no-
tably that there are countably many agents who all share
the same utility function. Essentially the same results holds
with a large, finite number of agents, adding a few more
"error terms".
In particular, since there is always a small
probability that every agent makes a mistake at the same
time, we can prove only that no more than a 1 − e fraction
of the agents make errors in most rounds, and that agents
spending most of their time playing equilibrium strategies.
We have also implicitly assumed that the set of agents is
fixed. We could easily allow for churn: agents entering and
leaving the system. A reasonable policy for newly-arriving
agents is to pick a random aǫ to use in the next stage. If
all agents do this, it follows that convergence is unaffected:
we can treat the new agents as part of the e fraction that
made a mistake in the last stage. Furthermore, this tells us
that newly arriving agents "catch up" very quickly. After a
single stage, new agents are guaranteed to have learned a
best reply with probability at least 1 − e.
Finally, we have assumed that all agents have the same
utility function. Our results can easily be extended to in-
clude a finite number of different types of agents, each with
their own utility function, since the SLLN can be applied to
each type of agent. We believe that our results hold even
if the set of possible types is infinite. This can happen, for
example, if an agent's utility depends on a valuation drawn
from some interval. However, some care is needed to define
best-reply sequences in this case.
State
One common feature of distributed systems not addressed
in this work is state. For example, in a scrip system where
agents pay each other for service using an internal currency
or scrip, whether an agent should seek to provide service
depends on the amount of money he currently has [8].
In principle, we could extend our framework to games
with state:
in each stage each agent chooses a policy to
usually follow and explores other actions with probability ǫ.
Each agent could then use some off-policy algorithm (one
where the agent can learn without controlling the sequence
of observations; see [16] for examples) to learn an optimal
policy to use in the next stage. One major problem with this
approach is that standard algorithms learn too slowly for our
purposes. For example, Q-learning [25] typically needs to
observe each state-action pair hundreds of times in practice.
The low exploration probability means that the expected
SA/ǫ rounds needed to explore each even once for each
pair is large. Efficient learning requires more specialized
algorithms that can make better use of the structure of a
problem, but this also makes providing a general guarantee
of convergence more difficult. Another problem is that, even
if an agent explores each action for each of his possible local
states, the payoff he receives will depend on the states of
the other agents and thus the actions they chose. We need
some property of the game to guarantees this distribution
of states is in some sense "well behaved."
Despite these concerns, preliminary results suggest that
simple learning algorithms work well for games with state.
In experiments on a game using the model of a scrip system
from [8], we found that a stage-learning algorithm that uses
a specialized algorithm for determining the value of actions
in each stage converges to equilibrium quickly despite churn
and agents learning at different rates.
Mixed Equilibria
Another restriction of our results is that our agents only
learn pure strategies. One way to address this is to discretize
the mixed strategy space (see e.g. [7]). If one of the resulting
strategies is sufficiently close to an equilibrium strategy and
best-reply dynamics converge with the discretized strategies,
then we expect agents to converge to a near-equilibrium dis-
tribution of strategies. We have had empirical success using
this approach to learn to play rock-paper-scissors.
Unexpected and Byzantine Behavior
In practice, we expect that not all agents will be trying to
learn optimal behavior in a large system. Some agents may
simply play some particular (possibly mixed) strategy that
they are comfortable with, without trying to learn a better
strategy. Others may be learning but with an unanticipated
utility function. Whatever their reasons, if these sufficiently
few such agents are choosing their strategies i.i.d. from fixed
distribtions (or at least fixed for each stage), then our results
hold without change. This is because we already allow an
e fraction of agents to make arbitrary mistakes, so we can
treat these agents as simply mistaken.
Byzantine agents, who might wish to disrupt learning as
much as possible, do not fit as neatly into our framework;
they need not play the same strategy for an entire stage.
7
However, we expect that since correct agents are random-
izing their decisions, a small number of Byzantine agents
should not be able to cause many agents to make mistakes.
6. CONCLUSION
Learning in distributed systems requires algorithms that
are scalable to thousands of agents and can be implemented
with minimal information about the actions of other agents.
Most general-purpose multiagent learning algorithms fail one
or both of these requirements. We have shown here that
stage learning can be an efficient solution in large anonymous
games where approximate best-reply dynamics lead to ap-
proximate pure strategy Nash equilibria. Many interesting
classes of games have this property, and it is frequently found
in designed games. In contrast to previous work, the time
to convergence guaranteed by the theorem does not increase
with the number of agents.
If system designers can find
an appropriate game satisfying these properties on which to
base their systems, they can be confident that nodes can
efficiently learn appropriate behavior.
Our results also highlight two factors that aid conver-
gence. First, having more learners often improves perfor-
mance. With more learners, the noise introduced into pay-
offs by exploration and mistakes becomes more consistent.
Second, having more information typically improves perfor-
mance. Publicly available statistics about the observed be-
havior of agents can allow an agent to learn effectively while
making fewer local observations.
Acknowledgements
EF, IK, and JH are supported in part by NSF grant ITR-
0325453. JH is also supported in part by NSF grant IIS-
0812045 and by AFOSR grants FA9550-08-1-0438 and FA9550-
05-1-0055. EF is also supported in part by NSF grant CDI-
0835706.
7. REFERENCES
[1] M. Blonski. Equilibrium characterization in large
anonymous games. Technical report, U. Mannheim,
2001.
[2] A. Blum, E. Even-Dar, and K. Ligett. Routing
without regret: on convergence to Nash equilibria of
regret-minimizing algorithms in routing games. In
Proc 25th ACM Symp. on Principles of Distributed
Computing (PODC), pages 45 -- 52, 2006.
[3] M. H. Bowling. Convergence problems of general-sum
multiagent reinforcement learning. In
17th Int. Conf. on Machine Learning (ICML 2000),
pages 89 -- 94, 2000.
[4] M. H. Bowling and M. M. Veloso. Rational and
convergent learning in stochastic games. In 17th
Int. Joint Conference on Artificial Intelligence (IJCAI
2001), pages 1021 -- 1026, 2001.
[5] N. Cesa-Bianchi and G. Lugosi. Prediction, Learning
and Games. Cambridge University Press, 2006.
[6] C. Claus and C. Boutilier. The dynamics of
reinforcement learning in cooperative multiagent
systems. In AAAI-97 Workshop on Multiagent
Learning, pages 746 -- 752, 1998.
[7] D. P. Foster and P. Young. Regret testing: Learning
to play Nash equilibrium without knowing you have
an opponent. Theoretical Economics, 1:341 -- 367, 2006.
8
[8] E. J. Friedman, J. Y. Halpern, and I. A. Kash.
Efficiency and Nash equilibria in a scrip system for
P2P networks. In Proc. Seventh ACM Conference on
Electronic Commerce (EC), pages 140 -- 149, 2006.
[9] E. J. Friedman and S. Shenker. Learning and
implementation on the internet. 1998.
[10] D. Fudenberg and D. Levine. Theory of Learning in
Games. MIT Press, 1998.
[11] F. Germano and G. Lugosi. Global Nash convergence
of Foster and Young's regret testing. Games and
Economic Behavior, 60(1):135 -- 154, July 2007.
[12] A. Greenwald, E. J. Friedman, and S. Shenker.
Learning in networks contexts: Experimental results
from simulations. Games and Economic Behavior,
35(1-2):80 -- 123, 2001.
[13] S. Hart and A. Mas-Colell. A simple adaptive
procedure leading to correlated equilibrium.
Econometrica, 68(5):1127 -- 1150, 2000.
[14] S. Hart and A. Mas-Colell. A reinforecement learning
procedure leading to correlated equilibrium. In
G. Debreu, W. Neuefeind, and W. Trockel, editors,
Economic Essays, pages 181 -- 200. Springer, 2001.
[15] J. Hu and M. P. Wellman. Nash Q-learning for
general-sum stochastic games. Journal of Machine
Learning Research, 4:1039 -- 1069, 2003.
[16] L. P. Kaelbling, M. L. Littman, and A. P. Moore.
Reinforcement learning: A survey. J. Artif. Intell. Res.
(JAIR), 4:237 -- 285, 1996.
[17] J. R. Marden, G. Arslan, and J. S. Shamma.
Connections between cooperative control and
potential games. In Proceedings of the 2007 European
Control Conference (ECC), 2007.
[18] J. R. Marden, G. Arslan, and J. S. Shamma. Regret
based dynamics: convergence in weakly acyclic games.
In 6th Int. Joint Conf. on Autonomous Agents and
Multiagent Systems (AAMAS), pages 42 -- 49, 2007.
[19] J. R. Marden, H. P. Young, G. Arslan, and J. S.
Shamma. Payoff-based dynamics for multi-player
weakly acyclic games. SIAM Journal on Control and
Optimization, 2008. To appear.
[20] P. Milgrom and J. Roberts. Rationalizability, learning,
and equilibrium in games with strategic complement-
arities. Econometrica, 58(6):1255 -- 1277, 1900.
[21] M. Osborne and A. Rubenstein. A Course in Game
Theory. MIT Press, 1994.
[22] Y. Shoham, R. Powers, and T. Grenager. Multi-agent
reinforcement learning: a critical survey. Technical
report, Stanford, 2003.
[23] G. Tesauro and J. O. Kephart. Pricing in agent
economies using multi-agent Q-learning. Autonomous
Agents and Multi-Agent Systems, 5(3):289 -- 304, 2002.
[24] K. Verbeeck, A. Now´e, J. Parent, and K. Tuyls.
Exploring selfish reinforcement learning in repeated
games with stochastic rewards. Journal of
Autonomous Agents and Multi-agent Systems,
14:239 -- 269, 2007.
[25] C. J. Watkins and P. Dayan. Technical note
Q-learning. Machine Learning, 8:279 -- 292, 1992.
[26] H. P. Young. Learning by trial and error. Games and
Economic Behavior, forthcoming.
|
1511.07209 | 2 | 1511 | 2016-07-28T09:11:40 | Multi-Agent Continuous Transportation with Online Balanced Partitioning | [
"cs.MA",
"cs.AI",
"cs.RO"
] | We introduce the concept of continuous transportation task to the context of multi-agent systems. A continuous transportation task is one in which a multi-agent team visits a number of fixed locations, picks up objects, and delivers them to a final destination. The goal is to maximize the rate of transportation while the objects are replenished over time. Examples of problems that need continuous transportation are foraging, area sweeping, and first/last mile problem. Previous approaches typically neglect the interference and are highly dependent on communications among agents. Some also incorporate an additional reconnaissance agent to gather information. In this paper, we present a hybrid of centralized and distributed approaches that minimize the interference and communications in the multi-agent team without the need for a reconnaissance agent. We contribute two partitioning-transportation algorithms inspired by existing algorithms, and contribute one novel online partitioning-transportation algorithm with information gathering in the multi-agent team. Our algorithms have been implemented and tested extensively in the simulation. The results presented in this paper demonstrate the effectiveness of our algorithms that outperform the existing algorithms, even without any communications between the agents and without the presence of a reconnaissance agent. | cs.MA | cs | Multi-Agent Continuous Transportation with Online
Balanced Partitioning
(Extended Abstract)
Chao Wang†, Somchaya Liemhetcharat§, Kian Hsiang Low†
Institute for Infocomm Reserach, Agency for Science, Technology and Research, Singapore§
Department of Computer Science, National University of Singapore, Singapore†
{wangchao, lowkh}@comp.nus.edu.sg†, [email protected]§
6
1
0
2
l
u
J
8
2
]
A
M
.
s
c
[
2
v
9
0
2
7
0
.
1
1
5
1
:
v
i
X
r
a
ABSTRACT
We introduce the concept of continuous transportation task
to the context of multi-agent systems. A continuous trans-
portation task is one in which a multi-agent team visits a
number of fixed locations, picks up objects, and delivers
them to a transportation hub. The goal is to maximize
the rate of transportation while the objects are replenished
over time . In this extended abstract, we present a hybrid of
centralized and distributed approaches that minimize com-
munications in the multi-agent team. We contribute a novel
online partitioning-transportation algorithm with informa-
tion gathering in the multi-agent team.
Keywords
Multi-agent system; Partitioning; Transportation; Coopera-
tion
1.
INTRODUCTION
We are interested in multi-agent coordination and con-
tinuous transportation, where agents visit locations in the
environment to transport objects (passengers or items) and
deliver them to a transportation hub. The objects replen-
ish over time, and we consider Poisson model of object re-
plenishment. Poisson model is suitable for scenarios with
independently-occurring objects, such as passengers appear
at the transit stops. Thus, the continuous transportation
task is general and applicable to many real-life scenarios,
e.g., first/last mile problem, package or mail collection and
delivery.
The most similar work has been done is in multi-robot
foraging and delivery problem [2, 3]. A multi-robot team
forages resources from environment to a home location or
delivers items to locations on request while the resources
replenish over time. The goal of continuous foraging is to
maximize the rate of resource foraging. Thus, continuous
foraging has similarities to continuous transportation, and
thus we compare our algorithms with that of [2, 3].
In addition, continuous area sweeping (e.g., [1]) problem
has similarities to continuous transportation, with the main
difference being that the agents have a carrying capacity and
Appears in: Proceedings of the 15th International Conference
on Autonomous Agents and Multiagent Systems (AAMAS 2016),
J. Thangarajah, K. Tuyls, C. Jonker, S. Marsella (eds.),
May 9 -- 13, 2016, Singapore.
Copyright c(cid:13) 2016, International Foundation for Autonomous Agents and
Multiagent Systems (www.ifaamas.org). All rights reserved.
must periodically return to the transportation hub. Hence,
we compare to the benchmark of [1]. Besides, [1] uses area
partitioning algorithm that relies on communications and
negotiations among robots. Thus, it is prone to message
loss and inconsistency. In contrast, our approach does not
require communications among agents, and the partition-
ing is conducted separately. Hence, we present a hybrid of
centralized and distributed approaches, and the efficacy is
demonstrated in the evaluation section.
2. PROBLEM AND APPROACH
In this section, we formally define the multi-agent continu-
ous transportation problem in detail, and give an overview of
our approach. In a continuous transportation task, a multi-
agent team visits a number of fixed locations and transport
objects to a transportation hub.
2.1 Formal Problem Definition
The multi-agent continuous transportation problem can
be defined as follows:
e.g., the autonomous vehicles.
• A = {a1, ..., ak} is the set of transportation agents,
• si, ci, and yi (≤ ci) denote agent ai's speed, maximum
capacity, and current load, i.e., the number of objects
carried.
• L = {l1, ..., ln} is the set of locations, where l0 is the
transportation hub.
• vj,t denotes the number of objects available at location
lj at time step t, e.g., the number of passengers appear
at the transit stop lj.
j,t denotes ai's estimate of vj,t at time step t.
• v(i)
• oj denotes the observation made at location lj. When a
transportation agent ai arrives at a location lj (j > 0),
min(vj,t, ci − yi) objects at lj are picked up by ai, and
ai makes an observation oj of the number of objects
remaining. When ai arrives at l0, all yi objects carried
by ai are transferred to l0.
• D : L × L → R+ is the distance function of the loca-
tions.
• t(ai, lj, lk) =
(cid:108) D(lj ,lk)
(cid:109)
si
is the time steps taken for an
agent ai to move from location lj to lk.
The goal is to maximize the rate of objects delivered to
the transportation hub l0 within T time steps, i.e., maximize
v0,T
T .
2.2 Our Approach
Our approach for solving the continuous transportation
problem is:
• We assume that vj,t follows a known model -- in this
paper, we assume that vj,t follows the Poisson model,
where the number of objects replenished every time
step follows a Poisson distribution with mean λj. How-
ever, the parameters of the models (i.e., λj) are not
known in advance;
• The estimates v(i)
j,t are updated using the model and
observations from transportation agents ai visiting lo-
cation lj;
• Following [2], the transportation agents do not share
their models v(i)
j,t since it could be expensive subject to
the communication bandwidth and team size. Differ-
ent from [2], in our approach, the sharing of destination
and load among agents are not required.
We contribute an online algorithm that partition the loca-
tions based on their 2D-position and estimated replenish-
ment rate, and controls the transportation agents ai, that
use v(i)
j,t to plan their next destination within the cluster of
locations assigned. The algorithm dynamically repartitions
locations based on information gathered by the multi-agent
team.
3. ALGORITHM AND EVALUATION
Our Online Balanced Partitioning (OBP) algorithm be-
gins with statically partition the locations into clusters based
on 2D-position of locations with k-means algorithm. The
algorithm is inspired by algorithms proposed for continuous
foraging [2]. The main difference is that the agents replan
destinations in the cluster of locations assigned, instead of
all the locations. The replanning of destination within each
cluster is based on Greedy Rate [2], i.e., maximizing the
transportation rate. Further, due to partitioning, communi-
cations of destinations and loads are not required.
By only considering the 2D-position of locations, the work-
load of each agent might not be balanced, i.e., the total re-
plenishment rate of some clusters could be so high that the
agents cannot afford it, while some other agents are idle. On
the other hand, the result of standard k-means algorithm
depends on the choice of initial centroid which is randomly
generated. In this case, we introduce online balanced par-
titioning, i.e., balance estimated total replenishment rate of
each cluster with information gathering. The replenishment
rate is not known in advance. The agents use preset esti-
mated replenishment rate to update its estimated number of
objects. The estimate can only be corrected when they visit
the location and make an observation. Since we focus on
Poisson replenishment model, where number of objects re-
plenished per time step follows a mean value, we believe that
estimated replenishment rate can be corrected with contin-
uous observations, i.e., the total number of objects replen-
ished divided by time steps elapsed.
Our online partitioning algorithm dynamically corrects
the estimated replenishment rate by visiting a location and
making observation. Once the deviation of total replenish-
ment rate of clusters are greater than a preset threshold,
repartitioning will be done immediately.
Figure 1 shows the performance of our Online Balanced
Partitioning (OBP) algorithm when the capacities of the
Figure 1: Comparison of our Online Balanced Partitioning
(OBP) algorithm against the benchmark of Greedy Rate
with Expected Observation (GR+EO) and Continuous Area
Sweeping (CAS) algorithm.
agents are 10 and the number of locations are 20. In order
to demonstrate the effectiveness of OBP, we compared OBP
with GR+EO [2] which requires the presence of a reconnais-
sance agent. The solid red, blue, and gray lines show Online
Balanced Partitioning (OBP), Greedy Rate with Expected
Observation (GR+EO), and Random Transportation (R),
and the shaded areas show the standard deviations of these
algorithms.
As the number of agents increase, OBP outperforms all
other algorithms, even GR+EO (p = 3 × 10−23), primar-
ily because of the dynamic partitioning with information
gathering by the multi-agent team. It clearly illustrates the
efficacy of our OBP algorithms over GR. Without the use
of reconnaissance agent and communications among agents,
our OBP algorithm can still outperform GR+EO algorithm.
Acknowledgments
This work was supported by NUS Computer Center through
the use of its high performance computing facilities.
REFERENCES
[1] M. Ahmadi and P. Stone. A multi-robot system for
continuous area sweeping tasks. In Robotics and
Automation, 2006. ICRA 2006. Proceedings 2006 IEEE
International Conference on, pages 1724 -- 1729. IEEE,
2006.
[2] S. Liemhetcharat, R. Yan, and K. P. Tee. Continuous
foraging and information gathering in a multi-agent
team. In Proceedings of the 2015 International
Conference on Autonomous Agents and Multiagent
Systems, pages 1325 -- 1333. International Foundation for
Autonomous Agents and Multiagent Systems, 2015.
[3] S. Liemhetcharat, R. Yan, K. P. Tee, and M. Lee.
Multi-robot item delivery and foraging: Two sides of a
coin. Robotics, 4(3):365 -- 397, 2015.
|
1009.5346 | 1 | 1009 | 2010-09-27T18:20:56 | A Novel Approach for Cardiac Disease Prediction and Classification Using Intelligent Agents | [
"cs.MA",
"cs.AI"
] | The goal is to develop a novel approach for cardiac disease prediction and diagnosis using intelligent agents. Initially the symptoms are preprocessed using filter and wrapper based agents. The filter removes the missing or irrelevant symptoms. Wrapper is used to extract the data in the data set according to the threshold limits. Dependency of each symptom is identified using dependency checker agent. The classification is based on the prior and posterior probability of the symptoms with the evidence value. Finally the symptoms are classified in to five classes namely absence, starting, mild, moderate and serious. Using the cooperative approach the cardiac problem is solved and verified. | cs.MA | cs | A Novel Approach for Cardiac Disease
Prediction and Classification Using
Intelligent Agents
Murugesan Kuttikrishnan
Department of Computer Science and Engineering
Anna University, Chennai, India
[email protected]
Manjula Dhanabalachandran
Department of Computer Science and Engineering
Anna University, Chennai, India
[email protected]
Abstract— The goal is to develop a novel approach for
cardiac disease prediction and diagnosis using intelligent
agents. Initially the symptoms are preprocessed using filter
and wrapper based agents. The filter removes the missing
or irrelevant symptoms. Wrapper is used to extract the
data in the data set according to the threshold limits.
Dependency of each
symptom
is
identified using
dependency checker agent. The classification is based on
the prior and posterior probability of the symptoms with
the evidence value. Finally the symptoms are classified in
to five classes namely absence, starting, mild, moderate
and serious. Using the cooperative approach the cardiac
problem is solved and verified.
Keywords- Traditional Chinese Medicine (TCM), Naïve
Bayesian Classification (NBC), Bayesian Networks (BN).
I. INTRODUCTION
Intelligent agents are a new paradigm
for
developing software applications. More than this,
agent-based computing has been hailed as „the next
significant breakthrough in software development‟
(Sargent, 1992), and „the new revolution
in
software‟ (Ovum, 1994). Currently, agents are the
focus of intense interest on the part of many sub-
fields of computer science and artificial intelligence.
Agents are being used in an increasingly wide
variety of applications, ranging from comparatively
small systems such as email filters to large, open,
complex, mission critical systems such as air traffic
control. At first sight, it may appear that such
extremely different types of system can have little
in common. And yet this is not the case: in both, the
key abstraction used is that of an agent.
First, an agent is a computer system situated
in some environment, and that is capable of
autonomous action in this environment in order to
meet its design objectives. Autonomy is a difficult
concept to pin down precisely, but we mean it
simply in the sense • that the system should be able
to act without the direct intervention of humans (or
other agents), and should have control over its own
actions and internal state. It may be helpful to draw
an analogy between the notion • of autonomy with
respect to agents and encapsulation • with respect to
object oriented systems. An object encapsulates
some state, and has some control over this state in
that it can only be accessed or modified via the
methods
that
the object provides. Agents
encapsulate state in just the same way. However, we
also think of agents as encapsulating behavior, in
addition to state. An object does not encapsulate
behavior: it has no control over the execution of
methods – if an object x invokes a method m on an
object y, then y has no control over whether m is
executed or not – it just is. In this sense, object y is
not autonomous, as it has no control over its own
actions. In contrast, we think of an agent as having
exactly this kind of control over what actions it
performs. Because of this distinction, we do not
think of agents as invoking methods (actions) on
agents – rather, we tend to think of them requesting
actions
to be performed. The decision about
whether to act upon the request lies with the
recipient. .
An intelligent agent is a computer system
that is capable of flexible autonomous action in
order to meet its design objectives. By flexible, we
mean that the system must be:
responsive: agents should perceive their
environment (which may be the physical
world, a user, a collection of agents, the
Internet, etc.) and respond in a timely
fashion to changes that occur in it.
proactive: agents should not simply act in
response to their environment, they should
be able
to exhibit opportunistic, goal-
directed behavior and take the initiative
where appropriate, and Applications of
Intelligent Agents
social: agents should be able to interact,
when they deem appropriate, with other
artificial agents and humans in order to
complete their own problem solving and to
help others with their activities.
Hereafter, when we use the term „agent‟, it
should be understood that we are using it as an
abbreviation
for
„intelligent
agent‟. Other
researchers emphasize different aspects of agency
(including, for example, mobility or adaptability).
Naturally, some agents may have additional
characteristics, and for certain types of applications,
some attributes will be more important than others.
However, we believe that it is the presence of all
four attributes in a single software entity that
provides the power of the agent paradigm and
which distinguishes agent systems from related
software paradigms – such as object-oriented
systems, distributed sysems, and expert systems
(see Wooldridge (1997) for a more detailed
discussion). By an agent-based system, we mean
one in which the key abstraction used is that of an
agent. In principle, an agent-based system might be
conceptualized in terms of agents, but implemented
without any software structures corresponding to
agents at all. We can again draw a parallel with
object-oriented software, where
it
is entirely
possible to design a system in terms of objects, but
to implement it without the use of an object-
oriented software environment. But this would at
best be unusual, and at worst, counterproductive. A
similar situation exists with agent technology; we
therefore expect an agent-based system to be both
designed and implemented in terms of agents. A
number of software tools exist that allow a user to
implement software systems as agents, and as
societies of cooperating agents. Note that an agent-
based system may contain any non-zero number of
agents. The multi-agent case – where a system is
designed and implemented as several interacting
agents, is both more general and significantly more
complex than the single-agent case. However, there
are a number of situations where the single-agent
case is appropriate.
II. RELATED WORK
Traditional diagnosis in TCM requires long
experiences and a high level of skill, and is
subjective and deficient in quantitative diagnostic
criteria. This seriously affects the reliability and
repeatability
of
diagnosis
and
limits
the
popularization of TCM. So the focal problem that
needs to be solved urgently is to construct methods
or models to quantify the diagnosis in TCM.[1]
Recently, a
few researchers developed some
methods and systems to modernize TCM. But most
of them are built incorporating totally or partially
rulebased reasoning model, which are lack of the
feasibility of implementing all possible inference by
chaining rules and limits their practical applications
in clinical medicines.An attraction
tool
for
managing various forms of uncertainty is Bayesian
networks (BNs) [2], [3] which is able to represent
knowledge with uncertainty
and
efficiently
performing
reasoning
tasks.Naive Bayesian
classifier (NBC) is a simplified form of BNs that
assumes independence of the observations. Some
research results [4], [5], [6] have demonstrated that
the predictive performance of NBC can be
competitive with more complicated classifiers.In
this study, a novel computerized diagnostic model
based on naive Bayesian classifier (NBC)
is
proposed. Firstly, a Bayesian network structure is
learned from a database of cases [7] to find the
symptom set that are dependent on the disease
directly.Secondly, the symptom set is utilized as
attributes of NBC and the mapping relationships
between the symptom set and the disease are
constructed.To
reduce
the dimensionality and
improve the prediction accuracy of diagnostic
model, symptom selection is requisite.Many feature
selection methods, such as filters [8] and wrappers
[9], have developed. But
the dependency
relationships among symptoms and the mapping
relationships between symptom and syndrome are
not considered
these methods, which are
in
important to diagnosis in TCM.
irrelative
To
lower
the
influences of
symptoms, the mutual information between each
symptom and disease
is computed based on
information entropy theory [10], which is utilized to
assess the significance of symptoms.The paper [11]
presents a multiagent system
for supporting
physicians in performing clinical studies in real
time. The multiagent system is specialized in the
controlling of patients with respect
their
to
appointment behavior. Novel types of agents are
designed to play a special role as representatives for
humans in the environment of clinical studies.
OnkoNet mobile agents have been used successfully
for patient-centric medical problems
solving
[12].,emerged from a project covering all relevant
issues, from empirical process studies in cancer
diagnosis/therapy, down to system implementation
and validation. In the paper [13], a medical
diagnosis multiagent system
that
is organized
according to the principles of swarm intelligence is
proposed. It consists of a large number of agents
that interact with each other by simple indirect
communication.
In the paper [14], a system called Feline
composed of five autonomous agents (expert
systems with some proprieties of the agents)
endowed with medical knowledge is proposed.
These agents cooperate to identify the causes of
anemia at cats. The paper [39], also presents a
development methodology for cooperating expert
systems.In the paper [15], a Web-centric extension
to a previously developed expert system specialized
in
the glaucoma diagnosis
is proposed. The
proposed telehealth solution publishes services of
the developed Glaucoma Expert System on the
World Wide Web.Each agent member of the CMDS
system has problems solving capability and capacity
(the notions are defined in [16, 17]). The capacity of
an agent Agf (Agf U MDUAS)consists in the
amount of problems that can be solved by the agent,
using the existent problem solving resources.The
cooperative medical diagnosis problems solving by
the diagnosis system is partially based on the
blackboard-based problem solving [18, 19]. The
problem solving by the BMDS system is similar
with the situations, when more physicians with
different medical specializations plans a treatment
to cure an illness that is in an advanced stage.
Treatments known to be effective for the curing of
the illness in a less advanced stage cannot be
applied.
the entire discussions one can
From
comprehend and classify the medical agent-based
IDSS research [20] into two categories, namely
Clinical Management and Clinical Research.
Clinical Management envelops all clinical systems
that are designed to help the doctor with diagnosing
and deciding on treatment for medical conditions.
the erstwhile envelopes
Clinical Research on
systems
that are used
to research facts and
connections in attempt to detect new trends and
patterns; it covers systems for both diagnosing
patients and treating them.
III. PREPROCESSING AND CLASSIFICATION
3.1 Filter agent
Feature selection, as a preprocessing step to
reducing
effective
learning,
machine
in
is
dimensionality,
removing
irrelevant data,
in-
creasing learning accuracy, and improving result
comprehensibility. In this work, we introduce a
novel concept, predominant correlation, and
propose a faster method which can identify relevant
features as well as redundancy among relevant
features without pair wise correlation analysis. The
efficiency and effectiveness of our method is
demonstrated through extensive comparisons with
other methods using real-world data of high
dimensionality.
3.2 Wrapper agent
In Wrapper based feature selection, the more
states that are visited during the search phase of the
algorithm the greater the likelihood of finding a
feature subset that has a high internal accuracy
while generalizing poorly. It removes the irrelevant
attributes that are below the threshold value.
3.3 Classifier agent
The classifier agent uses the naïve Bayesian
classification
algorithm. Bayesian
network
algorithm is used to classify the collected attributes
in
to five classes (0-normal,1-starting,2-low,3-
mild,4serious). The mutual information between
each symptom and disease is computed based on
information entropy theory. F and C are symptom
and disease. f, c are events of F and C. I(F,C)=(cid:1)P(f,
c)logP(f,c)/P(f)P(c) Suppose I0 is the prior entropy
of C. I0 =(cid:1)(P(c=1)logp(c=1)+p(c=0)logp(c=0))
The significance of each symptom is calculated by
S(F,C)=I(F,C)/I0. All the symptoms are evaluated
and ranked by significance index S(F,C).
Input Attributes Documentation
1 id: patient identification number
2 ccf: social security number (I replaced this with a
dummy value of 0)
3 age: age in years
4 sex: sex (1 = male; 0 = female)
5 painloc: chest pain location (1 = substernal; 0 =
otherwise)
6 painexer (1 = provoked by exertion; 0 =
otherwise)
7 relrest (1 = relieved after rest; 0 = otherwise)
8 pncaden (sum of 5, 6, and 7)
9 cp: chest pain type
--Value 1: typical angina
--Value 2: atypical angina
--Value 3: non-anginal pain
--Value 4: asymptomatic
10 trestbps: resting blood pressure (in mm Hg on
admission to the hospital)
11 htn
12 chol: serum cholestoral in mg/dl
13 smoke: I believe this is 1 = yes; 0 = no (is or is
not a smoker)
14 cigs (cigarettes per day)
15 years (number of years as a smoker)
16 fbs: (fasting blood sugar > 120 mg/dl) (1 = true;
0 = false)
17 dm (1 = history of diabetes; 0 = no such history)
18 famhist: family history of coronary artery disease
(1 = yes; 0 = no)
19 restecg: resting electrocardiographic results
--Value 0: normal
--Value 1: having ST-T wave abnormality (T
wave inversions and/or ST elevation or depression
of > 0.05 mV)
--Value 2: showing probable or definite left
ventricular hypertrophy by Estes' criteria
20 ekgmo (month of exercise ECG reading)
21 ekgday(day of exercise ECG reading)
22 ekgyr (year of exercise ECG reading)
23 dig (digitalis used furing exercise ECG: 1 = yes;
0 = no)
24 prop (Beta blocker used during exercise ECG: 1
= yes; 0 = no)
25 nitr (nitrates used during exercise ECG: 1 = yes;
0 = no)
26 pro (calcium channel blocker used during
exercise ECG: 1 = yes; 0 = no)
27 diuretic (diuretic used used during exercise ECG:
1 = yes; 0 = no)
28 proto: exercise protocol
1 = Bruce
2 = Kottus
3 = McHenry
4 = fast Balke
5 = Balke
6 = Noughton
7 = bike 150 kpa min/min (Not
sure if "kpa min/min" is what was written!)
8 = bike 125 kpa min/min
9 = bike 100 kpa min/min
10 = bike 75 kpa min/min
11 = bike 50 kpa min/min
12 = arm ergometer
29 thaldur: duration of exercise test in minutes
30 thaltime: time when ST measure depression was
noted
31 met: mets achieved
32 thalach: maximum heart rate achieved
33 thalrest: resting heart rate
34 tpeakbps: peak exercise blood pressure (first of 2
parts)
35 tpeakbpd: peak exercise blood pressure (second
of 2 parts)
36 dummy
37 trestbpd: resting blood pressure
38 exang: exercise induced angina (1 = yes; 0 = no)
39 xhypo: (1 = yes; 0 = no)
40 oldpeak = ST depression induced by exercise
relative to rest
41 slope: the slope of the peak exercise ST segment
--Value 1: upsloping
--Value 2: flat
--Value 3: downsloping
42 rldv5: height at rest
43 rldv5e: height at peak exercise
44 ca: number of major vessels (0-3) colored by
flourosopy
45 restckm: irrelevant
46 exerckm: irrelevant
47 restef: rest raidonuclid (sp?) ejection fraction
48 restwm: rest wall (sp?) motion abnormality
0 = none
1 = mild or moderate
2 = moderate or severe
3 = akinesis or dyskmem (sp?)
49 exeref: exercise radinalid (sp?) ejection fraction
50 exerwm: exercise wall (sp?) motion
51 thal: 3 = normal; 6 = fixed defect; 7 = reversable
defect
52 thalsev: not used
53 thalpul: not used
54 earlobe: not used
55 cmo: month of cardiac cath (sp?) (perhaps "call")
56 cday: day of cardiac cath (sp?)
57 cyr: year of cardiac cath (sp?)
58 num: diagnosis of heart disease (angiographic
disease status)
--Value 0: < 50% diameter narrowing
--Value 1: > 50% diameter narrowing
(in any major vessel: attributes 59 through 68
are vessels)
59 lmt
60 ladprox
61 laddist
62 diag
63 cxmain
64 ramus
65 om1
66 om2
67 rcaprox
68 rcadist
69 lvx1: not used
70 lvx2: not used
71 lvx3: not used
72 lvx4: not used
73 lvf: not used
74 cathef: not used
75 junk: not used
76 name: last name of patient
(I replaced this with the dummy string "name")
EXPERIMENTAL RESULTS
IV.
Table: 1 Data Sets Used
S.No. DATA SET NAME NO. OF INSTANCES
303
CLEVELAND
1
294
HUNGARIAN
2
3
SWITZERLAND
123
4
LONG BEACH
200
Table: 2 Preprocessed Results-Cleveland Data Set
PID FILTER WRAPPER
1
2
3
4
5
6
7
8
9
10
12
10
11
14
11
12
22
11
11
9
13
12
7
10
13
12
15
12
10
10
Table: 3 Preprocessed Results-Hungarian Data Set
PID FILTER WRAPPER
1254
1255
1256
1257
10
9
8
7
12
11
11
10
1258
1259
1260
1261
1262
1263
12
11
13
11
10
13
13
10
12
10
12
13
Table: 4 Preprocessed Results-Swiz Data Set
PID FILTER WRAPPER
6
11
3001
8
10
3002
9
11
3003
3004
8
11
10
9
3005
11
10
3006
11
10
3007
3008
12
11
11
11
3009
3010
11
10
Table: 5 Preprocessed Results-Longbeach Data Set
PID FILTER WRAPPER
1
2
3
4
5
6
7
8
9
10
11
10
11
13
14
12
11
12
6
11
13
8
12
11
6
9
10
10
11
14
Table: 6 Prior Probability of Symptoms
START
ING
0.4
0.4
0.34
0.43
0.2
0.4
0.2
0.3
0.4
0.4
0.3
0.2
0.3
0.333
0.12
0.3
0.3
0.3
O.3
MILD MODE
RATE
0.7
0.85
0.7
0.6
0.4
0.5
0.5
0.6
0.5
0.5
0.466
0.4
0.5
0.5
0.3
0.5
0.488
0.4
0.455
0.6
0.7
0.4
0.5
0.3
0.45
0.4
0.5
0.45
0.4
0.4
0.3
0.4
0.388
0.2
0.4
0.4
0.395
0.35
SYMP
TOM
PAINLOC
PAINEXER
RELREST
PNCADEN
CP
TRESTBPS
HTN
CHOL
SMOKE
CIGS
YEARS
FBS
DM
FAMHIST
RESTECG
EKGMO
EKGDAY
EKGYR
DIG
ABSEN
CE
0.3
0.1
0.2
0.1
0.3
0.3
0.2
0.3
0.23
0.14
0.15
0.16
0.3
0.3
0.1
0.2
0.3
0.2
0.23
SERI
OUS
0.9
0.89
0.8
0.7
0.8
0.76
0.7
0.778
0.8
0.9
0.8
0.7
0.888
0.677
0.55
0.6
0.7
0.9
0.8
TABLE: 7 CLASSIFICATION RESULTS
S.NO
.
DATA SET
ABSE
N
CE
1
2
3
4
CLEVELAND
164
HUNGARIAN
188
SWITZERLAN
D
LONG BEACH
8
51
STAR
T
ING
MIL
D
MOD
E
RATE
SER
I
OUS
55
37
48
56
36
26
32
41
35
28
30
42
13
15
5
10
Figure: 1 Preprocessed Chart for Cleveland Data Set
In the current work, input symptom values are
preprocessed using filter and wrapper approach.
Retained symptom values are used to classify
cardiac patients in to five classes viz. Normal,
Starting, Mild, Moderate and Serious. Classified
values determine severity of the cardiac disease.
Future work represents Heuristic seed selection to
increase classification accuracy over the supervised
naïve Bayesian classification. In this approach five
seeds are selected for five classes. Future work
represents diagnosis of cardiac patients using the
co-operative elaboration algorithm. It uses contract
net protocol that allows autonomy and sharing
among the agents to solve all cardiac problems.
Diagnosis results will be accurate in all conditions
and then intelligent based decision support system is
used to retrieve the patient information from the
database.
VI. ACKNOWLEDGEMENT
Primarily, my gratitude goes to Dr. D.Manjula,
A.P, DCSE, Anna University Chennai, who guided
me to carry out this research with interest and
involvement. With profound reverence and high
regards, I thank Dr. P. Narayanasamy, Professor and
HOD, DISE, Anna University Chennai and
Dr.R.Krishnamoorthy, Professor and Dean, Anna
University Trichy, for the motivation provided by
them during this research work which enabled me to
complete this work successfully.
REFERENCES
Figure: 2 Classification Chart for all Data Sets
V. CONCLUSIONS AND FUTURE WORK
[1] B. Ma, “Expert Systems and Knowledge Bases in
Traditional Chinese Medicine”, Beijing Press, Beijing, 1994
.
[2] J. Pearl, “Probabilistic Reasoning in Intelligent Systems:
Networks of Plausible
Inference” Morgan Kaufmann
Publishers, Inc. San Francisco, California, 1988.
051015202512345678910PIDFILTERWRAPPER[3] J. Cheng,, C. Hatzis,, H. Hayashi, M.A. Krogel, S.
Morishita, D. Page, J. Sese, “KDD Cup 2001 report” SIGKDD
Explor. Newsl, 2002. (2), pp.47-64.
[4] W. Buntine, “Learning classification rules using Bayes”, in
Proc. 6th Int. Workshop Machine Learning, 1989, pp. 94–96.
[5] B. Cestnik, “Estimating probabilities: A crucial task in
machine learning,” in Proc. Euro. Conf. Artif. Intell., 1990, pp.
147–149.
[6] P. Langley, W. Iba, and K. Thompson, “An analysis of
1992”, pp. 223–228.
[7] J. Cheng, R. Greiner, J. Kelly, D. A. Bell, W. Liu,
“Learning Bayesian Networks from Data: An Information-
Theory Based Approach”, Artificial Intelligence, 2002,
Vol.137, pp.43-90.
[8] G. Isabelle, “An Introduction to Variable and Feature
Selection”, Journal of Machine Learning Research, Vol. 3,
pp.1157-1182.
[9] R. Kohavi, G.
for Feature
“Wrappers
John,
Selection”,Artificial Intelligence, Vol. 97, No. 1, 1997,
pp.273-324.
[10] C. E. Shannon, W. Weaver, “The Mathematical Theory of
Communication.Urbana, IL: University of Illinois Press,1949.
[11] H. Myritz, G. Lindemann, G. Zahlmann, Hans -Dieter
Burkhard. “Patient scheduling
in clinical studies with
multiagent techniques”. Proceedings of the 2nd International
Workshop on Multi-Agent Systems for Medicine and
Computational Biology, Hakodate, Japan, pages 87–103, 2006
[12] S. Kirn. Ubiquitous healthcare: “The onkonet mobile
agents architecture”. Proceedings of the 3.rd International
Conference
Netobjectdays.
Objects,
Components,
Architectures,Services,
a
for
Applications
and
NetworkedWorld, Aksit, M.,Mezini, M., Unland, R. (Eds.),
Springer-Verlag, Germany, LNCS, (2591), 2003.
[13] R. Ulieru, M. Unland. “A stigmergic approach to medical
diagnosis”.Proceedings of the 2nd International Workshop on
Multi-Agent Systems
for Medicine and Computational
Biology, Hakodate, Japan, pages 87–103, 2006.
[14] G. Weiss. (Ed.)” Multiagent Systems: A Modern
Approach to Distributed Artificial Intelligence” MIT Press
Cambridge, Massachusetts London, 2000.
[15] M. Wooldridge, G. M. P. O‟Hare, R. Elks. Feline – “a
case study in the design and implementation of a co -operating
expert system”. Proceedings of the International Conference
on Expert Systems and their Applications, France, 1991.
[16] A. Ulieru, M. Grabelkovsky. “Telehealth approach for
glaucoma progression monitoring.”International
Journal:
Information Theories and Applications, (10):326–329, 2005.
[17] B. Iantovics, C. Chira, D. Dumitrescu. “Principles of the
Intelligent Agents”Casa Cartii de Stiinta Press, Cluj-Napoca,
2007.
[18] J. Ferber. “Multi-Agent Systems: An Introduction to
Distributed Artificial Intelligence” Addison Wesley, 1999.
[19] V. Jagannathan, R. Dodhiawala, L. S. Baum. (Eds.)
“Blackboard Architectures and Application”. Academic Press,
San Diego, 1989.
[20] Murugesan.K., Manjula. D., "Applications of Intelligent
Agents in Health Care Systems using Decision Support
Systems," Proceedings of International Conference on D igital
Factory (ICDF 2008), CIT, Coimbatore, India, Aug.1113,
2008: p.173.
AUTHORS PROFILE
K. Murugesan, is pursuing his Ph.D in Computer
Science from Anna University and also working for
Anna University as a Superintendent. His research
interests include Data Mining, Multi agent based
systems etc.,
D.Manjula is working for Anna University as an
Assistant Professor. Her research interests include
Natural Language Processing, Text Mining,
Artificial
Intelligence, Databases and Parallel
Computing.
|
1809.07225 | 2 | 1809 | 2019-06-24T10:34:07 | Deterministic limit of temporal difference reinforcement learning for stochastic games | [
"cs.MA"
] | Reinforcement learning in multiagent systems has been studied in the fields of economic game theory, artificial intelligence and statistical physics by developing an analytical understanding of the learning dynamics (often in relation to the replicator dynamics of evolutionary game theory). However, the majority of these analytical studies focuses on repeated normal form games, which only have a single environmental state. Environmental dynamics, i.e., changes in the state of an environment affecting the agents' payoffs has received less attention, lacking a universal method to obtain deterministic equations from established multistate reinforcement learning algorithms.
In this work we present a novel methodological extension, separating the interaction from the adaptation time scale, to derive the deterministic limit of a general class of reinforcement learning algorithms, called temporal difference learning. This form of learning is equipped to function in more realistic multistate environments by using the estimated value of future environmental states to adapt the agent's behavior. We demonstrate the potential of our method with the three well established learning algorithms Q learning, SARSA learning and Actor-Critic learning. Illustrations of their dynamics on two multiagent, multistate environments reveal a wide range of different dynamical regimes, such as convergence to fixed points, limit cycles, and even deterministic chaos. | cs.MA | cs |
Deterministic limit of temporal difference reinforcement learning for stochastic games
Wolfram Barfuss,1, 2, ∗ Jonathan F. Donges,1, 3 and Jurgen Kurths1, 2, 4
1Potsdam Institute for Climate Impact Research, Germany
2Department of Physics, Humboldt University Berlin, Germany
3Stockholm Resilience Centre, Stockholm University, Sweden
4Saratov State University, Russia
(Dated: June 25, 2019)
Reinforcement learning in multiagent systems has been studied in the fields of economic game
theory, artificial intelligence and statistical physics by developing an analytical understanding of
the learning dynamics (often in relation to the replicator dynamics of evolutionary game theory).
However, the majority of these analytical studies focuses on repeated normal form games, which
only have a single environmental state. Environmental dynamics, i.e., changes in the state of an
environment affecting the agents' payoffs has received less attention, lacking a universal method to
obtain deterministic equations from established multistate reinforcement learning algorithms.
In this work we present a novel methodological extension, separating the interaction from the
adaptation time scale, to derive the deterministic limit of a general class of reinforcement learning
algorithms, called temporal difference learning. This form of learning is equipped to function in
more realistic multistate environments by using the estimated value of future environmental states
to adapt the agent's behavior. We demonstrate the potential of our method with the three well
established learning algorithms Q learning, SARSA learning and Actor-Critic learning.
Illustra-
tions of their dynamics on two multiagent, multistate environments reveal a wide range of different
dynamical regimes, such as convergence to fixed points, limit cycles, and even deterministic chaos.
I.
INTRODUCTION
Individual learning through reinforcements is a central
approach in the fields of artificial intelligence [1 -- 3], neu-
roscience [4, 5], learning in games [6] and behavioral game
theory [7 -- 10], thereby offering a general purpose princi-
ple to either solve complex problems or explain behavior.
Also in the fields of complexity economics [11, 12] and so-
cial science [13], reinforcement learning has been used as
a model for human behavior to study social dilemmas.
However, there is a need for improved understand-
ing and better qualitative insight into the characteris-
tic dynamics that different learning algorithms produce.
Therefore, reinforcement learning has also been studied
from a dynamical systems perspective. In their seminal
work, Borgers and Sarin showed that one of the most ba-
sic reinforcement learning update schemes, Cross learn-
ing [14], converges to the replicator dynamics of evolu-
tionary games theory in the continuous time limit [15].
This has led to at least two, presumably nonoverlapping
research communities, one from statistical physics [16 -- 26]
and one from computer science machine learning [27 -- 35].
Thus, Sato and Crutchfield [18] and Tuyls et al. [27] inde-
pendently deduced identical learning equations in 2003.
The statistical physics articles usually consider the de-
terministic limit of the stochastic learning equations, as-
suming infinitely many interactions between the agents
before an adaptation of behavior occurs. This limit can
either be performed in continuous time with differen-
tial equations [17 -- 19] or discrete time with difference
∗ [email protected]
equations [20 -- 22]. The differences between both vari-
ants can be significant [21, 23]. Deterministic chaos was
found to emerge when learning simple [17] as well as
complicated games [25]. Relaxing the assumption of in-
finitely many interactions between behavior updates re-
vealed that noise can change the attractor of the learning
dynamics significantly, e.g., by noise-induced oscillations
[20, 21].
However, these statistical physics studies so far consid-
ered only repeated normal form games. These are games
where the payoff depends solely on the set of current ac-
tions, typically encoded in the entries of a payoff matrix
(for the typical case of two players). Receiving payoff
and choosing another set of joint actions is performed
repeatedly. This setup lacks the possibility to study
dynamically changing environments and their interplay
with multiple agents. In those systems, rewards depend
not only on the joint action of agents but also on the
states of the environment. Environmental state changes
may occur probabilistically and depend also on joint ac-
tions and the current state. Such a setting is also known
as a Markov game or stochastic game [36, 37]. Thus, a
repeated normal form game is a special case of a stochas-
tic game with only one environmental state. Notably,
Akiyama and Kaneko [38, 39] did emphasize the impor-
tance of a dynamically changing environment; however
did not utilize a reinforcement learning update scheme.
The computer science machine-learning community
dealing with reinforcement learning as a dynamical sys-
tem (see Ref.
[28] for an overview) particularly empha-
sizes the link between evolutionary game theory and mul-
tiagent reinforcement learning as a well grounded theo-
retical framework for the latter [28 -- 31]. This dynamical
systems perspective is proposed as a way to gain quali-
tative insights about the variety of multiagent reinforce-
ment learning algorithms (see Ref. [2] for a review). Con-
sequently, this literature developed a focus on the trans-
lation of established reinforcement learning algorithms to
a dynamical systems description, as well as the develop-
ment of new algorithms based on insights of a dynamical
systems perspective. While there is more work on state-
less games (e.g., Q learning [27] and frequency-adjusted
multiagent Q learning [32]), multiagent learning dynam-
ics for multistate environments have been developed as
well, such as piecewise replicator dynamics [34], state-
coupled replicator dynamics [33] or reverse engineering
state-coupled replicator dynamics [35].
Both communities, statistical physics and machine
learning, share the interest in better qualitative insights
into multiagent learning dynamics. While the statistical
physics community focuses more on dynamical proper-
ties the same set of learning equations can produce, it
leaves a research gap of learning equations capable of
handling multiple environmental states. The machine-
learning community, on the other hand, aims more to-
ward algorithm development, but so far has put their
focus less on a dynamical systems understanding. Taken
together, there is the challenge of developing a dynam-
ical systems theory of multiagent learning dynamics in
varying environmental states.
With this work, we aim to contribute to such a dynam-
ical systems theory of multiagent learning dynamics. We
present a novel methodological extension for obtaining
the deterministic limit of multistate temporal difference
reinforcement learning. In essence, it consists of formu-
lating the temporal difference error for batch learning,
and sending the batch size to infinity. We showcase our
approach with the three prominent learning variants of
Q learning, SARSA learning and Actor-Critic learning.
Illustrations of their learning dynamics reveal multiple
different dynamical regimes, such as fixed points, peri-
odic orbits, and deterministic chaos.
In Sec. II we introduce the necessary background and
notation. Section III presents our method to obtain the
deterministic limit of temporal difference reinforcement
learning and demonstrates it for multistate Q learning,
SARSA learning and Actor-Critic learning. We illustrate
their learning dynamics for two previously utilized two-
agents two-actions two-states environments in Sec. IV.
In Sec. V we conclude with a discussion of our work.
II. PRELIMINARIES
We introduce the components (including notation) of
our multiagent environment systems (see Fig. 1), fol-
lowed by a brief introduction of temporal difference rein-
forcement learning.
X(cid:104)◦(cid:105) :=
:=
sa1 ··· X N
X 1
saN · ◦.
(1)
A. Multiagent Markov environments
2
(cid:80)
1, . . . , Ai
A multiagent Markov environment (also called stochas-
tic game or Markov game) consists of N ∈ N agents. The
environment can exist in Z ∈ N states S = {S1, . . . , SZ}.
In each state each agent has M ∈ N available actions
Ai = {Ai
M}, i = 1, . . . , N to choose from. Hav-
ing an identical number of actions for all states and all
agents is notational convenience, no significant restric-
tion. A joint action of all agents is referred to by a ∈ A =
A1×···×AN , the joint action of all agents but agent i is
denoted by a−i ∈ A−i = A1×···×Ai−1×Ai+1×···×AN .
Environmental dynamics are given by the probabilities
for state changes expressed as a transition tensor T ∈
[0, 1]Z×M×...(N times)···×M×Z. The entry Tsas(cid:48) denotes the
probability P (s(cid:48)s, a) that the environment transitions to
state s(cid:48) given the environment was in state s and the
agents have chosen the joint action a. Hence, for all s, a,
s(cid:48) Tsas(cid:48) = 1 must hold. The assumption that the next
state only depends on the current state and joint action
makes our system Markovian. We here restrict ourselves
to ergodic environments without absorbing states (c.f.
Ref. [35]).
The rewards receivable by the agents are given by the
reward tensor R ∈ RN×Z×M×...(N times)···×M×Z. The en-
try Ri
sas(cid:48) denotes the reward agent i receives when the
environment transits from state s to state s(cid:48) under the
joint action a. Rewards are also called payoffs from a
game theoretic perspective.
Agents draw their actions from their behavior profile
sa = P (a i, s) denotes
X ∈ [0, 1]N×Z×M . The entry X i
the probability that agent i chooses action a in state s.
sa = 1 must hold. We
here focus on the case of independent agents, able to
fully observe the current state of the environment. With
correlated behavior (see e.g., Ref. [2]) and partially ob-
servable environments [40, 41] one could extend the mul-
tiagent environment systems to be even more general.
Note that what we call behavior profile is usually termed
policy from a machine-learning perspective or behavioral
strategy from a game theoretic perspective. We chose
to introduce our own term because policies and strate-
gies suggest a deliberate choice which we do not want to
impose.
Thus, for all i and all s, (cid:80)
a X i
B. Averaging out behavior and environment
We define a notational convention, that allows a sys-
tematic averaging over the current behavior profile X and
the environmental transitions T. It will be used through-
out the paper.
Averaging over the whole behavioral profile yields
(cid:88)
(cid:88)
a
Xsa · ◦
··· (cid:88)
a1∈A1
aN∈AN
3
FIG. 1: Multiagent Markov environment (also known as stochastic or Markov game). N agents choose a joint
action a = (a1, . . . , aN ) from their action sets Ai, based on the current state of the environment s, according to their
sa = P (ai, s). This will change the state of the environment from s to s(cid:48) with probability Tsas(cid:48),
behavior profile X i
and provide each agent with a reward Ri
sas(cid:48).
a1∈A1
a−i
(cid:88)
(cid:88)
(cid:124)
(cid:88)
s(cid:48)
(cid:125)
(cid:88)
s(cid:48)∈S
Here, ◦ serves as a placeholder.
If the quantity to be
inserted for ◦ depends on the summation indices, then
those indices will be summed over as well. If the quantity,
which is averaged out, is used in tensor form, then it is
written in bold. If not, then remaining indices are added
after the right angle bracket.
Averaging over the behavioral profile of the other
agents, keeping the action of agent i, yields
X−i(cid:104)◦(cid:105) :=
:=
sa−i · ◦
X−i
··· (cid:88)
(cid:123)(cid:122)
excl. i
aN∈AN
(cid:123)(cid:122)
sa1 ··· X N
X 1
(cid:124)
excl. i
(cid:125)
saN
· ◦ .
(2)
Last, averaging over the subsequent state s(cid:48) yields
T(cid:104)◦(cid:105) :=
Tsas(cid:48) · ◦ :=
Tsa1...aN s(cid:48) · ◦.
(3)
TX(cid:104)◦(cid:105) and
Of course, these operations may also be combined as
TX−i(cid:104)◦(cid:105) by multiplying both summations.
For example, given a behavior profile X, the resulting
effective Markov Chain transition matrix reads X(cid:104)T(cid:105)ss(cid:48),
which encodes the transition probabilities from state s
to s(cid:48). From X(cid:104)T(cid:105)ss(cid:48) the stationary distribution of envi-
ronmental states σ(X) can be computed. σ(X) is the
eigenvector corresponding to the eigenvalue 1 of X(cid:104)T(cid:105)ss(cid:48).
Its entries encode the ratios of the average durations the
agents find themselves in the respective environmental
states.
The average reward agent i receives from state s under
action a, given all other agents follow the behavior profile
sa. Including agent i's behavior profile
X reads
gives the average reward it receives from state s: TX(cid:104)R(cid:105)i
s.
Hence, TX(cid:104)R(cid:105)i
s =(cid:80)
TX−i(cid:104)R(cid:105)i
TX−i(cid:104)R(cid:105)i
sa holds.
sa ·
a X i
C. Agent's preferences and values
Gi(t) = (1 − γi)(cid:80)∞
Typically, agents are assumed to maximize their expo-
nentially discounted sum of future rewards, called return
k=0(γi)kri(t + k), where γi ∈ [0, 1) is
the discount factor of agent i and ri(t + k) denotes the
reward received by agent i at time step t + k. Expo-
nential discounting is most commonly used for its math-
ematical convenience and because it ensures consistent
preferences over time. Other formulations of a return
use e.g., finite-time horizons, average reward settings, as
well as other ways of discounting, such as hyperbolic dis-
counting. Those other forms require their own form of
reinforcement learning.
Given a behavior profile X, the expected return defines
(cid:10)Gi(t) s(t) = s(cid:11)i
TX
time t.
s (X) :=
the state-value function V i
s
which is
independent of
The operation
TX(cid:104). . . s(t) = s(cid:105) denotes the behavioral and environ-
mental average as defined in Eqs. 1 and 3 given that
in the current time step t the environment is in state s.
Inserting the return yields the Bellman equation [42],
s(t+1)(X) s(t) = s
(1 − γi)ri(t) + γiV i
V i
s (X) =
(cid:69)i
(cid:68)
s.
TX
(4)
This recursive relationship between state values de-
clares that the value of a state s is the discounted value
of the subsequent state s(t + 1) plus (1− γi) times the re-
ward received along the way. Evaluating the behavioral
and environmental average TX(cid:104) (cid:105) and writing in matrix
form we get:
Vi(X) = (1 − γi) · TX(cid:104)R(cid:105)i + γi · X(cid:104)T(cid:105) · Vi(X).
(5)
The reward ri(t) received at time step t is evaluated to
reward TX(cid:104)R(cid:105)i
s for state s, since the behavioral and en-
vironmental average was conditioned on starting in state
s(t) = s. The average subsequent state value V i
s(t+1)(X)
Environmentstate transitionstate setstate observationrewardAgentaction setjoint actionfrom behavior profilefrom the current state s can be expressed as a matrix
multiplication of the effective Markov transition matrix
and the vector of state values: (cid:80)
Vi(X) = (1 − γi)(cid:0)1Z − γi
using matrix inversion
X(cid:104)T(cid:105)(cid:1)−1
A solution of the state values Vi(X) can be obtained
s(cid:48) X(cid:104)T(cid:105)ss(cid:48) · Vi
s(cid:48)(X).
TX(cid:104)R(cid:105)i .
(6)
The computational complexity of matrix inversion makes
this solution strategy infeasible for large systems. There-
fore many iterative solution methods exist [3].
Equivalently, state-action-value functions Qi
(cid:10)Gi(t) s(t) = s, a(t) = a(cid:11)i
sa are de-
fined as the expected return, given agent i applied action
a in state s and then followed X accordingly: Qi
sa(X) :=
sa. Even though this is the
TX
behavioral average over the whole behavioral profile, the
resulting object carries an action index because the oper-
ation is conditioned on the current action to be a(t) = a.
They can be computed via
sa(X) = (1 − γi) TX−i(cid:104)R(cid:105)i
Qi
sa + γi(cid:88)
s (X) =(cid:80)
a X i
s(cid:48)
X(cid:104)T(cid:105)ss(cid:48) · V i
s(cid:48)(X).
(7)
One can show that V i
saQi
sa(X) holds for
the inverse relation of state-action and state values.
D. Learning through reinforcement
In contrast to the typical game-theoretic assumption of
perfect information, we assume that agents know nothing
about the game in advance. They can only gain infor-
mation about the environment and other agents through
interactions. They do not know the true reward tensor
R or the true transition probabilities Tsas(cid:48). They experi-
ence only reinforcements (i.e., particular rewards Ri
sas(cid:48)),
while observing the current true Markov state of the en-
vironment.
In essence, reinforcement learning consists of iterative
behavior changes toward a behavior profile with maxi-
mum state values. However, due to the agents' limited in-
formation about the environment, they generally cannot
compute a behavior profile's true state- and state-action
values, V i
sa(X), as defined in the previous sec-
tion. Therefore, agents use time-dependent state-value
and state-action-value approximations, V i
sa(t),
during the reinforcement learning process.
s (t) and Qi
s (X) and Qi
1. Temporal difference learning
Basically, state-action-value approximations Qi
sa get
iteratively updated by a temporal difference error
TDi
sa(t):
Qi
sa(t + 1) = Qi
sa(t) + αiTDi
sa(t),
(8)
4
with αi ∈ (0, 1) being the learning rate of agent i. These
state-action propensities Qi
sa can be interpreted as esti-
mates of the state-action values Qi
sa.
The temporal difference error expresses a difference in
the estimation of state-action values. New experience is
used to compute a new estimate of the current state-
action value and corrected by the old estimate. The esti-
mate from the new experience uses exactly the recursive
relation of value functions from the Bellmann equation
(Eq. 4),
TDi
(cid:34)
sa(t) = δss(t)δaa(t)·
(cid:124)
(1 − γi)Ri
s(t)a(t)a−i(t)s(t+1) + γi (cid:103)i
(cid:35)
estimate from new experience
(cid:123)(cid:122)
s(t+1) (t)
(cid:125)
− (cid:103)i
(cid:124) (cid:123)(cid:122) (cid:125)
s(t)(t)
old estimate
.
(9)
Here s and a denote the state-action pair whose tempo-
ral difference error is calculated. With s(t), a(t), etc. we
refer to the state, action, etc. that occurred at time step
t. Thus, the notation Ri
s(t)a(t)a−i(t)s(t+1) refers to the
entry of the reward tensor Ri
saa−is(cid:48) when at time step t
the environmental state was s [s(t) = s], agent i chose
action a [a(t) = a], the other agents chose the joint ac-
tion a−i [a−i(t) = a−i] and the next environmental state
was s(cid:48) [s(t + 1) = s(cid:48)]. The (cid:103)i
s(t+1)(t) indicates the state-
value estimate at time step t of the state visited at the
next time step s(t + 1). (cid:103)i
s(t)(t) denotes the state-value
estimate at time step t of the current state s(t). Differ-
ent choices for these estimations are possible, leading to
different learning variants (see below).
The Kronecker deltas δss(t), δaa(t) indicate that the
temporal difference error for state-action pair (s, a) is
only nonzero when (s, a) was actually visited in time
step t. This denotes and emphasizes that agents can
only learn from experience. In contrast, e.g., experience-
weighted-attraction learning [9] assumes that action
propensities can be updated with hypothetical rewards
an agent would have received if they had played a dif-
ferent action than the current action. These two cases
have been referred to as full vs. partial information [16].
Thus, the Kronecker deltas in Eq. 9 indicate a partial
information update. The agents use only information
experienced through interaction.
The state-action-value approximations Qi
sa are trans-
lated to a behavior profile according to the Gibbs-
Boltzmann distribution [1] (also called softmax)
X i
sa(t) =
(cid:80)
sa(t))
exp(βi Qi
b exp(βi Qi
sb(t))
.
(10)
The behavior profile X becomes a dynamic variable
as well. The parameter βi controls the intensity of
choice or the exploitation level of agent i controlling the
exploration-exploitation trade-off. In analogy to statisti-
cal physics, βi is the inverse temperature. For high βi
agents tend to exploit their learned knowledge about the
environment, leaning toward actions with high estimated
state-action value. For low βi, agents are more likely to
deviate from these high value actions in order to explore
the environment further with the chance of finding ac-
tions, which eventually lead to even higher values. Other
behavior profile translations exist as well (e.g., -greedy
[1]).
2. Three learning variants
The specific choices of the value estimates (cid:103) in the
temporal difference error result in different reinforcement
learning variants.
s(t)(t) = Qi
s(t+1)b(t) and (cid:103)i
a. Q learning. For the Q learning algorithm [1, 3],
(cid:103)i
s(t+1)(t) = maxb Qi
s(t)a(t)(t).
Thus, the Q learning update takes the maximum of the
next state-action-value approximations as an estimate for
the next state value, regardless of the actual next action
the agent plays. This is reasonable because the maxi-
mum is the highest value achievable given the current
knowledge. For the state-value estimate of the current
state, the Q learner takes the current state-action-value
approximation Qi
s(t)a(t)(t). This is reasonable because it
is exactly the quantity that gets updated by Eq. 8.
s(t)(t) = Qi
s(t+1)(t) = V i
s(t+1)a(t+1)(t) and (cid:103)i
b. SARSA learning. For SARSA learning [1, 3],
(cid:103)i
s(t+1)(t) = Qi
s(t)a(t)(t),
where a(t + 1) denotes the action taken by agent i at the
next time step a(t + 1) = Ai(t + 1). Thus, the SARSA
algorithm uses the five ingredients of an update sequence
of State, Action, Reward, next State, next Action to per-
form one update. In practice, the SARSA sequence has
to be shifted one time step backward to know what the
actual "next" action of the agent was.
c. Actor-Critic (AC) learning. For AC learning [1,
3], (cid:103)i
s(t)(t). Com-
pared to Q and SARSA learners, it has an additional data
structure of state-value approximations which get sepa-
s (t)+αi·Di
rately updated according to V i
s (t+1) = V i
sa(t).
The state-action-value approximations Qi
sa serve as the
actor which gets criticized by the state-value approxima-
tions V i
s .
Tab. Ia summarizes the values estimates (cid:103) for these
three learning variants. Q and SARSA learning are
structurally more similar compared to the Actor-Critic
learner, which uses an additional data structure of state-
value approximations V i
s .
s(t+1)(t) and (cid:103)i
s(t)(t) = V i
III. DETERMINISTIC LIMIT
So far we gave a brief introduction to temporal dif-
ference reinforcement learning. A more comprehensive
5
[1].
presentation can be found in Ref.
In this section
we will present a novel extension to the methodology of
interaction-adaptation timescales separation to the gen-
eral class of temporal difference reinforcement learning.
In summary, we (i) give a batch formulation of the tempo-
ral difference error, (ii) separate the timescales of interac-
tion and adaptation by sending the batch size to infinity
and (iii) present a resulting deterministic limit conver-
sion rule for discrete time updates. We showcase our
method in the three learning variants of Q, SARSA and
Actor-Critic learning. For the statistical physics com-
munity, the novelty consists of learning equations, ca-
pable of handling environmental state transitions. For
the machine learning community the novelty lies in the
systematic methodology we use to obtain the determin-
istic learning equations. Note that these deterministic
learning equations will not depend on the state-value or
state-action-value approximations anymore, being iter-
ated maps of the behavior profile alone.
Following e.g., Refs. [18, 19, 22], we first combine Eqs.
8 and 10 and obtain
X i
sa(t + 1) =
(cid:80)
X i
sa(t) exp
αiβiTDi
sa(t)
b X i
sb(t) exp
αiβiTDi
sb(t)
(11)
(cid:17)
(cid:17) .
(cid:16)
(cid:16)
Although it appears that only the product αiβi matters
for a behavior profile update, the temporal difference er-
sa may depend only on the exploitation level βi,
ror TDi
as we will show below.
Next, we formulate the temporal difference error for
batch learning.
A. Batch learning
With batch learning we mean that several time steps
of interaction with the environment and the other agents
take place before an update of the state-action-value ap-
proximations and the behavior profile occurs. It has also
been interpreted as a form of history replay [43] which is
essential to stabilize the learning process when function
approximation (e.g., by deep neural networks) is used
[44]. History (i.e., already experienced state, action, next
state triples) is used again for an update of the state-
action-value approximations.
Imagine that the information from these interactions
are stored inside a batch of size K ∈ N. We introduce
the corresponding temporal difference error of batch size
K:
TDi
sa(t; K) :=
1
·(cid:16)
K(s, a)
(1 − γi)Ri
+ γi (cid:103)i
δss(t+k)δaa(t+k)
s(t+k)a(t+k)a−i(t+k)s(t+k+1)
s(t+k+1) (t) − (cid:103)i
s(t)(t)
(12)
(cid:17)(cid:105)
K−1(cid:88)
(cid:104)
k=0
(cid:103)i
s(t+1)(t)
(cid:103)i
s(t)(t)
(cid:103)i
s(t+1)(t)
(cid:103)i
s(t)(t)
6
Q learning
SARSA learning
maxb Qi
s(t+1)b(t)
Qi
s(t)a(t)(t)
Qi
s(t+1)a(t+1)(t)
Qi
s(t)a(t)(t)
Actor Critic (AC) learning
V i
s(t+1)(t)
V i
s(t)(t)
maxQi
nextV i
nextV i
sa(X)
sa(X)
sa(X)
1
βi log X i
sa(t)
1
βi log X i
sa(t)
/
(a) K = 1
(b) K = ∞
TABLE I: Overview of the three reinforcement learning variants. Shown in the columns are the value estimates for
s(t)(t) for both ends of the batch size spectrum: K = 1 and K = ∞.
the next state (cid:103)i
s(t+1)(t) and the current state (cid:103)i
and transition probabilities according to
K−1(cid:88)
δss(t+k)δaa(t+k) →(cid:88)
(cid:88)
1
K(s, a)
k=0
s(cid:48)
a−i
X−i
sa−iTsaa−is(cid:48).
(15)
For example, the immediate reward Ri
in the temporal difference error becomes
time t gets resealed accordingly, as well.
s(t)a(t)a−i(t)s(t+1)
TX−i(cid:104)R(cid:105)i
sa. The
Taking the limit K → ∞ in this way, we choose to
stay in discrete time, leaving the continuous time limit
following Refs. [18, 19, 25] for future work.
C. Three learning variants
Next, we present the deterministic limit of the tempo-
ral difference error of the three learning variants of Q,
SARSA and Actor-Critic learning. Inserting them into
Eq. 11 yields the complete description of the behavior
profile update in the deterministic limit. Table I presents
an overview of the resulting equations and a comparison
to their batch size K = 1 versions.
1. Q learning
three
The temporal difference error of Q learning con-
(i) Ri
(ii)
s(t)a(t)(t). As already stated,
sa under K → ∞.
s(t+1)b(t), and (iii) Qi
s(t)a(t)a−i(t)s(t+1),
TX−i(cid:104)R(cid:105)i
sa(X), which is defined as
terms:
sists of
maxb Qi
s(t)a(t)a−i(t)s(t+1) →
Ri
s(t+1)b(t) → maxQi
(cid:88)
(cid:88)
maxb Qi
X−i
maxQi
sa(X) :=
Qi
s(cid:48)b(X) (16)
sa−iTsaa−is(cid:48) max
b
s(cid:48)
a−i
using the deterministic limit conversion rule (Eq. 15).
Because of the assumption of infinite interactions, we
can here replace the state-action-value approximations
where K(s, a) = max(1,(cid:80)K−1
k=0 δss(t+k)δaa(t+k)) denotes
the number of times the state-action pair (s, a) was vis-
ited. If the state-action pair (s, a) was never visited, then
K(s, a) = 1. The agents interact K times under the same
behavior profile and use the sample average to summarize
the new experience in order to update the state-action-
value approximations:
Qi
sa(t + K) = Qi
sa(t) + αiTDi
sa(t; K).
(13)
The notation TDi
size 1: TDi
sa(t) = TDi
sa(t; 1).
sa(t) denotes a batch update of batch
B. Separation of timescales
We obtain the deterministic limit of the temporal dif-
ference learning dynamics by sending the batch size to
infinity, K → ∞. Equivalently, this can be regarded
as a separation of timescales. Two processes can be dis-
tinguished during an update of the state-action-value ap-
proximations ∆ Qi
sa(t): adaptation
and interaction,
sa(t+1)− Qi
sa(t) := Qi
∆ Qi
(cid:122)
(cid:16)
sa(t) = αiδss(t)δaa(t)·
(cid:124)
(cid:123)(cid:122)
(1 − γi)Ri
interaction
(cid:125)(cid:124)
adaptation
s(t)a(t)a−i(t)s(t+1) + γi (cid:103)i
s(t+1) (t)
(cid:123)
(cid:17)
− (cid:103)i
s(t) (t)
(cid:125)
(14)
By separating the timescales of both processes, we as-
sume that (infinitely) many interactions happen before
one step of behavior profile adaptation occurs.
Under this assumption and because of the assumed er-
godicity one can replace the sample average, i.e., the sum
over sequences of states and actions with the behavior
profile average, i.e., the sum over state-action behavior
s(cid:48)b as defined
sa(t)+consti
s, where consti
s(t+1)b with the true state-action values Qi
For the third term, we invert Eq. 10, yielding Qi
Qi
by Eq. 7.
sa(t) =
(βi)−1 log X i
s is constant in ac-
tions but may vary for each agent and state. Now, one
can show that the dynamics induced by Eq. 11 are in-
variant against additive transformations in the tempo-
sa(t,∞) + consti
ral difference error TDi
s.
Thus, the third term can be converted according to
s(t)a(t)(t) → (βi)−1 log X i
Qi
All together, the temporal difference error for Q learn-
sa(t,∞) → TDi
sa(t).
ing in the deterministic limit reads
s(t)(t) := (cid:80)
think of a conversion V i
(βi)−1(cid:80)
7
s(t)a(t)(t) →
Qi
sa(t). However, the remaining
term is constant in action, and therefore irrelevant for
the dynamics, as we have argued above. Thus, we can
simply put V i
sa(t) log X i
s(t)(t) → 0.
a X i
sa
a X i
All together, the temporal difference error of the Actor-
Critic learner in the deterministic limit reads
acTDi
sa(t,∞) =(1 − γi) TX−i(cid:104)R(cid:105)i
sa(X)
+ γi nextV i
sa
(21)
qTDi
sa(t,∞) =(1 − γi) TX−i(cid:104)R(cid:105)i
sa
+ γi maxQi
sa(X) − 1
βi log X i
sa(t).
2. SARSA learning
IV. APPLICATION TO EXAMPLE
ENVIRONMENTS
(17)
Two of the three terms of the SARSA temporal differ-
ence error are identical to the one of Q learning, leaving
Qi
s(t+1)a(t+1)(t), which we replace by
nextQi
(cid:88)
(cid:88)
(cid:88)
X−i
sa(X) :=
X i
s(cid:48)bQi
s(cid:48)b(X)
sa−iTsaa−is(cid:48)
s(cid:48)
a−i
b
(18)
using again the deterministic limit conversion rule (Eq.
15) and the state-action value Qi
s(cid:48)b(X) of the behavior
profile X according to Eq. 7.
Thus, the temporal difference error for the SARSA
learning update in the deterministic limit reads
sarsaTDi
sa(t;∞) = (1 − γi) TX−i(cid:104)R(cid:105)i
sa(X) − 1
+ γi nextQi
sa
βi log X i
sa(t).
(19)
3. Actor-Critic (AC) learning
For the temporal difference error for AC learning
s(t+1)(t) and (ii)
s(t+1)(t) →
we have to find replacements for (i) V i
V i
s(t)(t). Applying again Eq.
nextV i
15 yields V i
sa defined as
nextV i
sa :=
X−i
sa−iTsaa−is(cid:48)V i
s(cid:48)(X),
(20)
(cid:88)
(cid:88)
s(cid:48)
a−i
using Eq. 6 for the state value V i
s(cid:48)(X). This is the average
value of the next state given that in the current state the
agent took action a. One can show that nextV i
sa(X) =
nextQi
sa(X) from the SARSA update.
The second remaining term belongs to the slower
adaptation timescale or,
in other words, occurs out-
side the batch. Thus, our deterministic limit con-
version rule (Eq.
15) does not apply. We could
In the following we apply the derived deterministic
learning equations in two different environments. Specif-
ically, we compare the three well established temporal
difference learning variants (Q learning, SARSA learn-
ing and Actor-Critic (AC) learning) in two different two-
agent (N = 2), two-action (M = 2) and two-state
(Z = 2) environments: a two-state Matching Pennies
game and a two-state Prisoner's Dilemma. Since the
main contribution of this paper is the derivation of the
deterministic temporal difference learning equations, we
are not trying to make a case with our example environ-
ments beyond a systematic comparison of our learners.
Therefore, we chose environments that have been used
previously in related literature [33 -- 35, 45]. Note also
that we leave a comparison between the deterministic
limit and the stochastic equations to future work, which
would add a noise term to our equations following the
example of Ref. [20].
To measure the performance of an agent's behavior
profile in a single scalar, we use the dot product between
the stationary state distribution σ(X) of the effective
Markov Chain with the transition matrix X(cid:104)T(cid:105) and the
behavior average reward TX(cid:104)R(cid:105)i. Interestingly, we find
this relation to be identical to the dot product of the
stationary distribution and the state value Vi(X):
σ(X) · TX(cid:104)R(cid:105)i = σ(X) · Vi(X).
(22)
This relation can be shown by using Eq. 6 and the fact
that σ(X) is an eigenvector of X(cid:104)T(cid:105).
In the following examples we will only investigate ho-
mogeneous agents, i.e., agents whose parameters will not
differ from each other. We will therefore drop the agent
indices from αi, βi, and γi. The heterogeneous agent case
is to be explored in future work.
A. Two-state Matching Pennies
The single-state matching pennies game is a paradig-
matic two-agents, two-actions game. Imagine the situa-
tion of soccer penalty kicks. The keeper (agent 1) can
8
learners for both learning rates α. For the low learning
rate α = 0.02, Q and SARSA learners reach a fixed point
of playing both actions with equal probability in both
states, yielding a reward of 0.5. Due to the low α, this
takes approximately 600 time steps. In contrast, the re-
ward trajectory of the AC learner appears to be chaotic.
Figure 5 confirms this observation, which we will discuss
in more detail below.
For the high learning rate α = 0.8, both Q and SARSA
learners enter a periodic limit cycle. Differences in the
trajectories of Q and SARSA learner are clearly visible.
The time average reward of this periodic orbit appears
to be approximately 0.5 for each agent, identical to the
reward of the fixed point at lower α. The AC learner,
however, converges to a fixed point after oscillating near
the edges of the phase space. At this fixed point agent
1 plays action 1 in state 1 with probability 1. Thus, it
has trapped the system into state 2. In state 2, agent 1
plays action 2 and agent 2 plays action 1 with probabil-
ity 1 and, consequently, agent 1 receives a reward of 1,
whereas agent 2 receives 0 reward. One might ask, Why
does agent 2 not decrease their probability for playing
action 1, thereby increasing their own reward? And, in-
deed, the arrows of the temporal difference error suggest
this change of behavior profile. However, agent 2 cannot
follow because their behavior is trapped on the simplex
of nonzero action probabilities X 2
2a. For only M = 2 ac-
tions, X 2
21 = 1 thus can no longer change, regardless of
the temporal difference error.
Increasing the discount factor to γ = 0.9, we observe
the learning rate α to set the timescale of learning (Fig.
4). The intensity of choice remained β = 5.0. A high
learning rate α = 0.8 corresponds to faster learning in
contrast to a low learning rate α = 0.02. Also, the ratio
of learning timescales is comparable to the inverse ratio of
learning rates. For both α, Q and SARSA learners reach
a fixed point, whereas the AC learners seem to move
chaotically (details to be investigated below). Comparing
the trajectories between the learning rates α, we observe
a similar shape for each pair of learners. However, the
similarity of the AC trajectories decreases at larger time
steps.
So far, we varied two parameters: the discount factor
γ ∈ [0, 1) and the learning rate α ∈ (0, 1). Combining
Figs. 3 and 4, we investigated all four combinations of a
low and a high γ with a low and a high α. We can sum-
marize that Q and SARSA learners converge to a fixed
point for all combinations of discount factor γ and learn-
ing rate α, except when γ is low and α simultaneously
high. AC dynamics seem chaotic for all combinations of
α and γ.
To investigate the relationship between the parameters
more thoroughly, Fig. 5 shows bifurcation diagrams with
the bifurcation parameters α and γ. Additionally, it also
gives the largest Lyapunov exponents for each learner and
each parameter combination. A largest Lyapunov expo-
nent greater than zero is a key characteristic of chaotic
motion. We computed the Lyapunov exponent from the
FIG. 2: Two-state Matching Pennies. Rewards are
given in black type in the payoff tables for each state.
State-transition probabilities are indicated by (blue)
arrows.
choose to jump either to the left or right side of the goal,
and the kicker (agent 2) can choose to kick the ball also
either to the left or the right. If both agents choose the
identical side, then the keeper agent wins, otherwise the
kicker wins.
In the two-state version of the game, according to Ref.
[35], the rules are extend as follows: In state 1 the situ-
ation is as described in the single-state version. When-
ever agent 1 (the keeper) decides to jump to the left, the
environment transitions to state 2, in which the agents
switch roles: Agent 1 now plays the kicker and agent 2
the keeper. From here, whenever agent 1 (now the kicker)
decides to kick to the right side the environment transi-
tion again to state 1 and both agents switch their roles
again.
Figure 2 illustrates this two-state Matching Pennies
games. Formally, the payoff matrices are given by
in state 2 for s(cid:48) ∈ {1, 2}. State transitions are governed
by (cid:0) T1112 T1122
T1212 T1222
(cid:1) = ( 1 1
Thus, by construction, the probability of transition-
ing to the other state is independent of agent 2's ac-
tion. Only agent 1 has agency over the state transi-
tions. By playing a uniformly random behavior pro-
file (X 1
21) = (0.5, 0.5, 0.5, 0.5), both agents
would obtain an average reward of 0.5 per time step.
21, X 2
11, X 2
11, X 1
With Fig. 3 we compare the temporal difference er-
ror in the behavior space sections for each environmental
state at a comparable low discount factor γ ∈ (0, 1) of
γ = 0.1, as well as learning trajectories for an exem-
plary initial condition for two learning rates α ∈ (0, 1),
a low one (α = 0.02) and a high one (α = 0.8). Overall,
we observe a variety of qualitatively different dynamical
regimes, such as fixed points, periodic orbits and chaotic
motion.
Specifically, we see that Q learners and SARSA learn-
ers behave qualitatively similarly in contrast to the AC
(cid:16) R1
in state 1 and(cid:16) R1
R1
111s(cid:48) ,R2
121s(cid:48) ,R2
111s(cid:48) R1
121s(cid:48) R1
211s(cid:48) ,R2
221s(cid:48) ,R2
211s(cid:48) R1
221s(cid:48) R1
R1
(cid:17)
(cid:17)
0,1 1,0
112s(cid:48)
122s(cid:48)
112s(cid:48) ,R2
122s(cid:48) ,R2
=(cid:0) 1,0 0,1
(cid:1)
=(cid:0) 0,1 1,0
(cid:1)
(cid:1) = ( 0 0
0 0 ) and (cid:0) T2111 T2121
212s(cid:48) ,R2
222s(cid:48) ,R2
212s(cid:48)
222s(cid:48)
T2211 T2221
1,0 0,1
1 1 ) .
state 1action 1(left)action 2(right)action 1(left)action 2(right)1,00,11,00,1Agent 2: KickerAgent 1: Keeperstate 2action 1(left)action 2(right)action 1(left)action 2(right)0,11,00,11,0Agent 2: KeeperAgent 1: Kicker9
FIG. 3: Three learners in two-state Matching Pennies environment for low discount factor γ = 0.1;
intensity of choice β = 5.0. At the top, the temporal difference errors for the Q learner (Eq. 17), SARSA learner
(Eq. 19 ) and Actor-Critic (AC) learner (Eq. 21) are shown in two behavior phase-space sections, one for each state.
The arrows indicate the average direction the temporal difference errors drive the learner toward, averaged over all
phase-space points of the other state. Arrow colors (and shadings) additionally encode their lengths. Selected
trajectories are shown in the phase-space sections, as well as by reward trajectories, plotting the average reward
11, X 2
21, X 2
value (Eq. 22) over time steps. Crosses in the phase-space subsections indicate the initial behavior
11, X 1
(X 1
21) = (0.01, 0.99, 0.3, 0.4). Circles signal the arrival at a fixed point, determined by the absolute
difference of behavior profiles between two subsequent time steps being below = 10−6. Trajectories are shown for
two different learning rates α = 0.02 (light red) and α = 0.8 (dark blue). The bold reward trajectory belongs to
agent 1 and the thin one to agent 2. Note that the temporal difference error is independent from the learning rate α.
A variety of qualitatively different dynamical regimes can be observed.
FIG. 4: Two-state Matching Pennies environment for high discount factor γ = 0.9; otherwise identical to Fig.
3.
analytically derived Jacobian matrix, iteratively used in a
QR decomposition according to Ref. [46]. See Appendix
A for details.
The largest Lyapunov exponent for Q and SARSA
learners align almost perfectly with each other, whereas
the largest Lyapunov exponent of the AC learners be-
haves qualitatively different. We first describe the behav-
ior of the Q and SARSA learner: For high learning rates
α and low farsightedness γ, Fig. 5 shows a periodic orbit
with few (four) points in phase space. Largest Lyapunov
exponents are distinctly below 0 at those regimes.
In-
creasing the farsightedness γ both learners enter a regime
10
FIG. 6: Varying intensity of choice β under
constant α · β in two-state Matching Pennies
environment for discount factor γ = 0.9. On the left
trajectories of the three learners (Q: green dashed,
SARSA: blue straight, Actor-Critic(AC): red dotted)
are shown in the two behavior space sections, one for
each state. On the right, the corresponding reward
trajectories are shown. The initial behavior was
11, X 2
(X 1
21) = (0.01, 0.99, 0.3, 0.4). The bold
reward trajectory belongs to agent 1 and the thin one
11, X 1
21, X 2
to agent 2. One observes the deterministic limit of
Actor-Critic learning to be invariant under constant
α · β and SARSA learning to converge to AC learning
under β → ∞.
decrease as distinctly as for high γ.
The behavior of the Actor-Critic dynamics is quali-
tatively different from the one of Q and SARSA. The
placement of the fixed points on the natural numbers
grid suggests that the AC learner get confined on one of
the 16 (M N Z) corners of the behavior phase space. No
regularity to which fixed point the AC learner converges
can be deduced. The largest Lyapunov exponent is al-
ways above zero and experiences an overall decreasing
behavior. Similarly, for a decreasing bifurcation param-
eter α, the largest Lyapunov exponent tends to decrease
as well. Different from the bifurcation diagram along γ,
for low α the system might enter a periodic motion, but
only for some parameters α. No regularity can be de-
termined at which parameters α the AC learners enter a
periodic motion. A more thorough investigation of the
nonlinear dynamics, especially those of the Actor-Critic
learner, seems of great interest but is, however, beyond
the scope of this article and leaves promising paths for
future work.
Concerning the parameter β, the intensity of choice,
one can infer from the update equations (Eq. 11 com-
bined with Eq. 19 and Eq. 21) that the dynamics for
the AC learner are invariant for a constant product αβ.
This is because the temporal difference error of the Actor-
Critic learner in the deterministic limit is independent of
FIG. 5: Varying discount factor γ and learning
rate α in two-state Matching Pennies
environment for intensity of choice β = 5.0 for the Q
learners (green crosses), the SARSA learners (blue dots)
and the Actor-Critic (AC) learners (red triangles). On
the left, the discount factor γ is varied with learning
rate α = 0.8, as indicated by the gray vertical lines on
the right. On the right, the learning rate α is varied
with discount factor γ = 0.1 as indicated by the gray
vertical lines on the left. The three top panels show the
visited behavior points during 1000 iterations after a
transient period of 100 000 time steps from initial
behavior (X 1
21) = (0.01, 0.99, 0.3, 0.4).
11, X 2
11, X 1
21, X 2
Visited points are mapped to the function
21 + 4X 1
8X 2
11 on the vertical axes to give a
fuller image of the visited behavior profiles. The bottom
21 + 2X 2
11 + X 1
panel shows the corresponding largest Lyapunov
exponents for the three learners. Overall, Q and
SARSA learner behave qualitatively more similarly
than the Actor-Critic learner.
21, X 2
11, X 1
11, X 2
of visiting many points in phase space around the stable
fixed point (X 1
21) = (0.5, 0.5, 0.5, 0.5). The
largest Lyapuonv exponents are close to zero. With in-
creasing γ the distance around this fixed-point solution
decreases until the dynamics converge from a farsighted-
ness γ slightly greater than 0.5 onward. From there the
largest Lyapunov exponent decreases again for further
increasing γ. The same observations can be made along
a decreasing bifurcation parameter α, except that at the
end, for low α, the largest Lyapunov exponents do not
111s(cid:48) ,R2
121s(cid:48) ,R2
111s(cid:48) R1
121s(cid:48) R1
112s(cid:48) ,R2
122s(cid:48) ,R2
112s(cid:48)
122s(cid:48)
211s(cid:48) ,R2
221s(cid:48) ,R2
211s(cid:48) R1
221s(cid:48) R1
212s(cid:48) ,R2
222s(cid:48) ,R2
212s(cid:48)
222s(cid:48)
R1
(cid:17)
(cid:17)
(cid:1)
(cid:1)
10,0 2,2
=(cid:0) 3,3 0,10
=(cid:0) 4,4 0,10
(cid:1) = ( 0.1 0.9
10,0 1,1
0.9 0.1 ) .
agents chose opposite actions.
11
Figure 7 illustrates these game dynamics. Formally,
the payoff matrices are given by
(cid:16) R1
in state 1 and(cid:16) R1
R1
in state 2 for s(cid:48) ∈ {1, 2}, respectively. The corresponding
state transition probabilities are given by
(cid:0) T1112 T1122
T1212 T1222
(cid:1) =(cid:0) T2111 T2121
T2211 T2221
To be precise, the rewards in each state do not resem-
ble a classical social dilemma situation. This is because if
both agents would alternately cooperate and defect, both
could receive a larger reward per time step compared to
always cooperating. Hence, this stochastic game, as it
was used in Refs. [33 -- 35], presents more a coordination
than a cooperation challenge to the agents. The mul-
tistate environment can here function as a coordination
device.
A behavior profile in which one agent exploits the other
in one state, while being exploited in the other state,
would result in an average reward per time step of 5 for
each agent, e.g., (X 1
21) = (0, 1, 1, 0).
11, X 2
11, X 1
21, X 2
However, for all three learning types with a mid-ranged
farsightedness (γ = 0.45) and an intensity of choice
β = 5.0, the temporal difference error arrows are point-
ing on average toward the lower left defection-defection
point for each state in behavior phase space (Fig. 8). To
see whether the three learning types may converge to the
described defect-cooperate-cooperate-defect equilibrium,
individual trajectories from two exemplary initial condi-
tions and for two learning rates α are shown, a small one
(α = 0.02) and a high one (α = 0.8).
We observe qualitatively different behavior across all
three learners. The Q learners converge to equilibria
with average rewards distinctly below 5, and the SARSA
learners converge to equilibira with average rewards of
almost 5 for both learning rates α and both exemplary
initial conditions. Both Q and SARSA learners con-
verge to solutions of proper probabilistic behavior, i.e.,
choosing action cooperate and action defect with nonva-
nishing chance. The Actor-Critic learners, on the other
hand, converge to the deterministic defect-cooperate-
cooperate-defect behavior described above for the initial
condition shown with the non-dashed lines in Fig. 8 for
both learning rates α (shown in light red and dark blue).
For the other exemplary initial condition, shown with the
dashed lines, it converges to an all-defection solution in
both states for both α.
Interestingly, for all learners, all combinations of initial
conditions and learning rates converge to a fixed point
solution, except for the Q learners with a comparably
high learning rate α = 0.8, which enter a periodic behav-
ior solution for the initial condition with the nondashed
FIG. 7: Two-state Prisoners Dilemma. Rewards
are given in black type in the payoff tables for each
state. State-transition probabilities are indicated by
(blue) arrows.
β. Further, the dynamics of the SARSA learner will con-
verge to the dynamics of the AC learner under β → ∞.
Figure 6 nicely confirms these two observations. Observ-
ing Table I is another way to see this. Since the value
estimate of the future state is identical for SARSA and
AC learning, letting the value estimate of the current
state vanish by sending β → ∞ makes the SARSA learn-
ers approximate the AC learners.
sa).
11, X 2
11, X 1
21, X 2
As mentioned before, β controls the exploration-
exploitation trade-off.
In the temporal difference er-
rors of the Q and SARSA learner it appears in the
term indicating the value estimate of the current state
−1/βi log(X i
If this term dominates the tempo-
ral difference error (i.e., if β is small), then the learn-
ers tend toward the center of behavior space,
i.e.,
(X 1
21) = (0.5, 0.5, 0.5, 0.5), forgetting what
they have learned about the obtainable reward. This
characteristic happens to be favorable in our two-
state Matching Pennies environment, which is why Q
and SARSA learners perform better in finding the
(X 1
21) = (0.5, 0.5, 0.5, 0.5) solution. On
the other hand, if β is large, then the temporal difference
error is dominated by the current reward and future value
estimate. Not being able to forget, the learners might get
trapped in unfavorable behavior, as we can see observ-
ing the Actor-Critic learners. To calibrate β it is useful
to make oneself clear that it must come in units of [log
behavior] / [reward].
21, X 2
11, X 2
11, X 1
B. Two-state Prisoner's Dilemma
The single state Prisoners Dilemma is another paradig-
matic two-agents, two-actions game. It has been used to
model social dilemmas and study the emergence of coop-
eration. It describes a situation in which two prisoners
are separately interrogated, leaving them with the choice
to either cooperate with each other by not speaking to
the police or defecting by testifying.
The two-state version, which has been used as a test
environment also in Refs. [33 -- 35], extends this situation
somewhat artificially by playing a Prisoner's Dilemma in
each of the two states with a transition probability of
10% from one state to the other if both agents chose the
same action, and a transition probability of 90% if both
state 1action 1(coop.)action 2(defect)action 1(coop.)action 2(defect)3,30,102,210,0Agent 2Agent 1state 2action 1(coop.)action 2(defect)action 1(coop.)action 2(defect)4,40,101,110,0Agent 2Agent 112
FIG. 8: Two-state Prisoners Dilemma environment for discount factor γ = 0.45; otherwise identical to Fig. 3.
line. The same phenomenon occurred also in the Match-
ing Pennies environment for low farsightedness γ = 0.1,
however, there for both Q and SARSA learners. It seems
to be caused by the comparably high learning rate. A
high learning rate overshoots the behavior update, re-
sulting in a circling behavior around the fixed point. As
in Fig. 3, the time average reward of the periodic orbit
seems to be comparable to the reward of the correspond-
ing fixed point at lower α. Furthermore, we observe the
same time rescaling effect of the learning rate α in Figure
8 as in Fig. 4.
To visualize the influence of the discount factor γ
on the converged behavior, Fig. 9 shows a bifurca-
tion diagram along the bifurcation parameter γ for two
initial conditions. Pluses in blue result from a uni-
formly random behavior profile of (X 1
21) =
(0.5, 0.5, 0.5, 0.5), whereas the crosses in red initially
started from the behavior profile (X 1
21) =
(0.51, 0.49, 0.49, 0.51).
11, X 2
11, X 2
11, X 1
21, X 2
11, X 1
21, X 2
Across all learners, lower discount factors γ correspond
to all-defect solutions, whereas for higher γ the solu-
tions from the initial condition shown with red crosses
tend toward the cooperate-defect-defect-cooperate solu-
tion. For low γ, the agents are less aware of the pres-
ence of other states and find the all-defect equilibrium
solution of the iterated normal form Prisoner's Dilemma.
The state transition probabilities have less effect on the
learning dynamics. Only above a certain farsightedness
do the agents find the more rewarding cooperate-defect-
defect-cooperate solution.
11 and X 2
The observation from Fig. 8 is confirmed that the prob-
ability to cooperate (i.e., here X 1
21 ) is lowest for
the Q learners, midrange for the SARSA learners and 1
for the Actor-Critic learners. One reason for this observa-
tion can be found in the intensity of choice parameter β.
It balances the reward obtainable in the current behavior
space segment with the forgetting of current knowledge
to be open to new solutions. Such forgetting expresses
itself by temporal difference error components pointing
toward the center of behavior space. Thus, a relatively
small β = 5.0 can explain why solutions at the edge of
the behavior space cannot be reached by Q and SARSA
learners. The AC learner misses this forgetting term in
the deterministic limit and can therefore easily enter be-
havior profiles at the edge of the behavior space.
Q and SARSA learners have a critical discount fac-
tor γ above which the cooperate-defect-defect-cooperate
high reward solution is obtained and below which the
all-defect low reward solution gets selected. However,
for increasing discount factors γ up to 1, Q and SARSA
learners experience a drop in playing the cooperative ac-
tion probability.
The Actor-Critic learners approach the cooperate-
defect-defect-cooperate solution in two steps. For in-
creasing γ, first the probability of agent 2 cooperating
in state 2 (X 2
21) jumps from zero to 1 while agent 1 still
defects in state 1. Only after a slight increase of γ does
agent 1 also cooperate in state 1 (X 1
11).
Interestingly, for the uniformly random initial behav-
ior condition shown with blue pluses, there is no criti-
cal discount factor γ and no learners come close to the
cooperate-defect-defect-cooperate solution. Here, only
for γ close to 1 do all cooperation probabilities X i
s1
gradually increase. Furthermore, exactly at those γ,
where the cooperate-defect-defect-cooperate solution is
obtained from the initial behavior condition shown with
red crosses, the solutions from the uniformly random ini-
tial behavior condition (blue pluses) have a largest Lya-
puonv exponent greater than 0. At other values of γ,
the largest Lyapunov exponents for the two initial con-
ditions overlap. This suggests that the largest Lyapunov
exponents greater than zero may point to the fact that
other, perhaps more rewarding solutions may exist in
phase space. A more thorough investigation regarding
this multistability is an open point for future research.
As we have argued above, the two-state Prisoner's
13
FIG. 9: Varying discount factor γ in two-state Prisoners Dilemma environment for learning rate α = 0.2
and intensity of choice β = 5.0 for the Q learners on the left, the SARSA learners in the middle and the Actor-Critic
learners on the right. The four top panels for each learner show the visited behavior points X 1
11, X 2
11, X 1
21, X 2
21
during 1000 iterations after a transient period of 5000 time steps from initial behavior
11, X 2
(X 1
21, X 2
11, X 2
(X 1
21) = (0.51, 0.49, 0.49, 0.51) in red crosses. The bottom panels show the corresponding largest
Lyapunov exponents for the two initial conditions. Above a critical discount factor γ all learners find the high
rewarding solution from the red crosses initial condition, but do not do so from the blue pluses initial condition.
21) = (0.5, 0.5, 0.5, 0.5) in blue pluses and from initial behavior
11, X 1
21, X 2
11, X 1
also capable of solving a cooperation challenge in a
stochastic game setting, for which we adapt a two-state
Prisoner's Dilemma in analogy to Ref.
[45]. Figure 10
confirms previous findings that cooperation emerges only
in the stochastic game, compared to playing each Pris-
oner's Dilemma repeatedly [45]. Further, cooperation
only emerges for sufficiently large farsightedness γ.
V. DISCUSSION
The main contribution of this paper is the develop-
ment of a technique to obtain the deterministic limit
of temporal difference reinforcement learning. Through
our work we have combined the literature on learning
dynamics from statistical physics with the evolutionary
game theory-inspired learning dynamics literature from
machine learning. For the statistical physics community,
the novelty consists of learning equations, capable of han-
dling environmental state transitions. For the machine
learning community the novelty lies in the systematic
methodology we have used to obtain the deterministic
learning equations.
We have demonstrated our approach with the three
prominent reinforcement learning algorithms from com-
puter science: Q learning, SARSA learning, and Actor-
Critic learning. A comparison of their dynamics in pre-
viously used two-agent, two-actions, two-states environ-
ments has revealed the existence of a variety of qualita-
tively different dynamical regimes, such as convergence
to fixed points, periodic orbits and deterministic chaos.
We have found that Q and SARSA learners tend
to behave qualitatively more similar in comparison to
the Actor-Critic learning dynamics. This characteris-
FIG. 10: Cooperation challenge in a two-state
Prisoner's Dilemma. Top panel shows a two-state
Prisoner's Dilemma game, whose state games
individually favor defection. Bottom panels shows the
level of cooperation SARSA learners with α = 0.016,
β = 250 play after reaching a fixed point from the
center of behavior space (X i
sa = 0.5 for all i, s, a) for
varying discount factors γ. Results for Q and AC
learners are similar. Cooperation levels are shown for
the full stochastic game as well as for each individual
state game played repeatedly. For sufficiently large
farsightedness, cooperation can emerge in the stochastic
game, in contrast to the individual repeated games.
Dilemma as it was used in Refs. [33 -- 35] presents rather a
coordination than a cooperation challenge to the agents.
Figure 10 demonstrates that our learning dynamics are
state 1game 1action 1(coop.)action 2(defect)action 1(coop.)action 2(defect)9,9-1,100,010,-1Agent 2Agent 1state 2game 2action 1(coop.)action 2(defect)action 1(coop.)action 2(defect)1,1-1,20,02,-1Agent 2Agent 1tic results at least partly from our relatively low inten-
sity of choice parameter β, controlling the exploration-
exploitation trade-off via a forgetting term in the tempo-
ral difference errors. Sending β → ∞, the SARSA learn-
ing dynamics approach the Actor-Critic learning dynam-
ics, as we have shown. Overall the Actor-Critic learn-
ers have a tendency to enter confining behavior profiles,
due to their nonexisting forgetting term. This charac-
teristic leaves them trapped at the edges of the behavior
space. In contrast, Q and SARSA learner do not show
such learning behavior. Interestingly, this characteristic
of the AC learners turns out to be favorable in the two-
state Prisoner's Dilemma environment, where they find
the most rewarding solution in more cases compared to
Q and SARSA but hinders the convergence to the fixed
point solution in the two-state Matching Pennies envi-
ronment. Thus, the most favorable level of forgetting
depends on the environment. In order to tune the respec-
tive parameter β, our consideration that it must come in
the unit of [log behavior] / [reward] may be helpful.
We have demonstrated the effect of the learning rate α
adjusting the speed of learning by controlling the amount
of new information used in a behavior profile update.
Thereby, within limits, α functions as a time rescaling.
However, a comparably large learning rate α might cause
an overshooting phenomenon, hindering the convergence
to a fixed point. Instead, the learners enter a limit cy-
cle around that point. Nevertheless, the average reward
of the limit-cycling behavior was approximately equal to
the one of the fixed point obtained at lower α but took
fewer time steps to reach. Thus, perhaps other dynamical
regimes than fixed points, such as limit cycles or strange
attractors, could be of interest in some applications of
reinforcement learning.
We have also shown the effect of the discount factor
γ adjusting the farsightedness of the agents. At low γ
the state transition probabilities have less effect on the
learning dynamics compared to high discount factors.
To summarize the three parameters α, β, and γ: The
level of exploitation β and the farsightedness γ con-
trol where the learner adapts toward in behavior space,
weighting current reward, expected future reward and
the level of forgetting. The learning rate α controls how
fast the learner adapts along these directions.
We hope that our work might turn out useful for the
application of reinforcement learning in various domains,
14
joint-action) learners (cf. Ref.
with respect to parameter tuning, the design of new al-
gorithms, and the analysis of complex strategic interac-
tions using meta strategies, as Bloembergen et al.
[28]
have pointed out. In this regard, future work could ex-
tend the presented methodology to partial observability
of the Markov states of the environment [40, 41], be-
havior profiles with history, and other-regarding agent
(i.e.
[2] for an overview
of other-regarding agent learning algorithms). Also, the
combination of individual reinforcement learning and so-
cial learning through imitation [47 -- 50] seems promising.
Such endeavors would naturally lead to the exploration of
network effects. It is important to note that only a few
dynamical systems reinforcement learning studies have
begun to incorporate network structures between agents
[22, 23].
Apart from these more technical extensions, we hope
that our learning equations will prove themselves useful
when studying the evolution of cooperation in stochastic
games [45]. With stochastic games one is able to explic-
itly account for a changing environment. Therefore, such
studies are likely to contribute to the advancement of
theoretical research on the sustainability of interlinked
social-ecological systems [51, 52].
Interactions, syner-
gies, and trade-offs between social [13, 53] and ecological
[54] dilemmas can be explored using the framework of
stochastic games. More realistic environments, modeling
e.g., the harvesting of common-pool renewable resources
[55, 56] or the prevention of dangerous climate change
[57, 58], for our learning dynamics are likely to prove
themselves useful. Here, it may be of interest to evaluate
the learning process not only in terms of efficiency but
also how close it came to the optimal behavior. Other
paradigms than value optimization may also be impor-
tant [59], such as sustainability or resilience [60].
Python code to reproduce the figures of this article is available
at https://doi.org/10.5281/zenodo.1495091.
ACKNOWLEDGMENTS
This work was developed in the context of the COPAN project
on Coevolutionary Pathways in the Earth System at the Pots-
dam Institute for Climate Impact Research (PIK). We are grate-
ful for financial support by the Heinrich Boll Foundation, the
Stordalen Foundation (via the Planetary Boundaries Research Net-
work PB.net), the Earth League's EarthDoc program and the Leib-
niz Association (project DOMINOES). We thank Jobst Heitzig for
discussions and comments on the manuscript.
Appendix A: Computation of Lyapunov Exponents
We compute the Lyapunov exponents using an iterative QR decomposition of the Jacobian matrix according to Sandri [46]. In the
following we present the derivation of the Jacobian matrix.
Eq. 11 constitutes a map f , which iteratively updates the behavior profile X ∈ RN×M×Z . Consequently, we can represent its derivative
as a Jacobian tensor f(cid:48)(X) ∈ RN×M×Z×N×M×Z .
Let Ai
sa := X i
sa exp
(cid:16)
αiβiTDi
sa(X)
(cid:17)
be the numerator of Eq. 11, and Bi
s :=(cid:80)
f(cid:48)(X) =
A(cid:48)B − B(cid:48)A
B2
b Ai
sb its denominator, i.e. f =: A/B. Hence,
or, more precisely, in components,
s(X) − dBi
Bi
s
dXj
rb
s(X))2
A and B are known, and if A(cid:48) is known, then B(cid:48) is easily obtained by dBi
dXj
rb
df i
sa(X)
dX j
rb
sa(X)
dXj
rb
(Bi
dAi
=
s(X)
(X)Ai
sa(X)
=(cid:80)
.
dAi
sc(X)
dXj
rb
c
the three learner types Q, SARSA and Actor-Critic learning.
. Therefore we need to compute A(cid:48) for
Let us rewrite Ai
sa for the Q learner according to
Ai
sa := (X i
sa)(1−αi) exp
(cid:16)
αiβi TD
1. Q learning
(cid:17)
i
sa(X)
,
where we removed the estimate of the current value from the temporal difference error, leaving the truncated TD error as
TD
i
sa(X) := (1 − γi)
TX−i(cid:104)R(cid:105)i
sa + γi maxQi
sa(X).
Hence, we can write the derivative of A as
Since(cid:80)
dAi
sa(X)
dX j
rb
sa/dX j
c X i
sc = 1, dX i
rb can be expressed as
(cid:16)
(cid:17)(cid:32)
= exp
αiβi TD
i
sa(X)
(1 − αi)(X i
sa)−αi dX i
sa
dX j
rb
+ αiβi(X i
sa)(1−αi) d TD
i
sa(X)
dX j
rb
(cid:33)
.
The derivative of the truncated temporal difference error reads
= δij δsr(2δab − 1).
dX i
sa
dX j
rb
d TD
i
sa(X)
dX j
rb
= (1 − γi)
d
+ γi d maxQi
dX j
rb
sa(X)
.
sa
TX−i(cid:104)R(cid:105)i
dX j
rb
(cid:88)
dX−i
sa−i
dX j
rb
(cid:88)
s(cid:48)
a−i
Let us write the derivative of the reward as
d
TX−i(cid:104)R(cid:105)i
dX j
rb
using Eq. 2 and Eq. 3, where the derivatives dX−i
dX−i
sa−i
dX j
rb
d maxQi
dX j
rb
(cid:88)
(cid:88)
sa(X)
=
s(cid:48)
a−i
sa−i /dX j
sa
=
For the derivative of the maximum next value we write accordingly
rb need to be executed according to Eq. A6.
Tsaa−is(cid:48) max
Qi
s(cid:48)c(X) +
c
X−i
sa−i Tsaa−is(cid:48)
s(cid:48)c(X)
d maxc Qi
dX j
rb
.
Tsaa−is(cid:48) Ri
saa−is(cid:48)
(cid:88)
(cid:88)
s(cid:48)
a−i
15
(A1)
(A2)
(A3)
(A4)
(A5)
(A6)
(A7)
(A8)
(A9)
(A10)
(A11)
(A12)
Let am := arg maxa Qi
sa(X), then
and
dQi
sa(X)
dX j
rb
= (1 − γi)
d
d maxc Qi
dX j
rb
TX−i(cid:104)R(cid:105)i
dX j
rb
sa
For the derivative of the effective Markov Chain transition tensor we can write
dX j
rb
using Eqs. 2 and 3, where again the derivatives dXsa/dX j
For the derivative of the state value let us rewrite Eq. 6 as V i
d X(cid:104)T(cid:105)ss(cid:48)
sc(X)
= δaam
dQi
sa(X)
dX j
rb
d X(cid:104)T(cid:105)ss(cid:48)
s(cid:48)
dX j
rb
+ γi(cid:88)
(cid:88)
s = (1 − γi)(cid:80)
dXsa
dX j
rb
=
a
Tsaa−is(cid:48) ,
s(cid:48) (X) + X(cid:104)T(cid:105)ss(cid:48)
V i
dV i
s(cid:48) (X)
dX j
rb
.
dV i
s (X)
dX j
rb
= (1 − γi)
rb need to be executed according to Eq. A6.
(cid:88)
s(cid:48)(cid:48)
d(M−1
ss(cid:48)(cid:48) )
dX j
rb
s(cid:48) M−1
s(cid:48)(cid:48) + M−1
ss(cid:48)(cid:48)
TX(cid:104)R(cid:105)i
d TX(cid:104)R(cid:105)i
s(cid:48)(cid:48)
dX j
rb
ss(cid:48) TX(cid:104)R(cid:105)i
s(cid:48) with M := (1Z − γi
X(cid:104)T(cid:105)). Thus,
.
(A13)
To obtain the derivative of the inverse matrix M−1 we use (M−1M )(cid:48) = 0 = (M−1)(cid:48)M + M−1M(cid:48) and therefore (M−1)(cid:48) =
−M−1M(cid:48)M−1. For M(cid:48) we write,
dMss(cid:48)
dX j
rb
= −γi d X(cid:104)T(cid:105)ss(cid:48)
dX j
rb
.
(A14)
We obtain the derivative of the reward according to
d TX(cid:104)R(cid:105)i
s
dX j
rb
=
(cid:88)
(cid:88)
s(cid:48)
a
dXsa
dX j
rb
Tsas(cid:48) Ri
sas(cid:48) ,
16
(A15)
using Eq. 1 and Eq. 3, where the derivatives dX i
sa/dX j
rb need to be executed according to Eq. A6.
Now we can compute the Jacobian matrix for the Q learning dynamics in their deterministic limit.
The computation of the Jacobian matrix for the SARSA learning update in its deterministic limit is similar, except the truncated
2. SARSA learning
temporal difference error reads
instead of Eq. A4. Hence,
TD
i
sa(X) := (1 − γi)
d TD
i
sa(X)
= (1 − γi)
d
and
The derivative of(cid:80)
sa(X)
d nextQi
dX j
rb
s(cid:48)cQi
c X i
=
s(cid:48)
a−i
s(cid:48)c(X) reads
(cid:88)
dX j
rb
dX−i
sa−i
dX j
rb
(cid:88)
d[(cid:80)
TX−i(cid:104)R(cid:105)i
TX−i(cid:104)R(cid:105)i
dX j
rb
sa
sa + γi nextQi
sa(X).
sa(X)
,
+ γi d nextQi
dX j
(cid:88)
rb
(cid:88)
X−i
s(cid:48)
a−i
(cid:88)
c
=
(cid:32)
(cid:88)
c
dX i
s(cid:48)c
dX j
rb
(cid:33)
.
dQi
s(cid:48)c
dX j
rb
Tsaa−is(cid:48)
X i
s(cid:48)cQi
s(cid:48)c(X) +
sa−i Tsaa−is(cid:48)
d[(cid:80)
s(cid:48)c(X)]
c X i
s(cid:48)cQi
dX j
rb
s(cid:48)c(X)]
c X i
s(cid:48)cQi
dX j
rb
Qi
s(cid:48)c(X) + X i
s(cid:48)c
All remaining terms have already been given in the previous section for the Q learner Jacobian matrix.
3. Actor-Critic learning
For the Actor-Critic learning update, Eq. A3 reads
Ai
sa := X i
sa exp
(cid:16)
αiβi TD
(cid:17)
i
sa(X)
,
with the truncated temporal difference error
The derivative of the next value estimate is obtained by
dX−i
sa−i
dX j
rb
d nextV i
dX j
rb
sa(X)
=
s(cid:48)
a−i
i
TD
sa(X) := (1 − γi)
(cid:88)
(cid:88)
TX−i(cid:104)R(cid:105)i
sa(X).
sa + γi nextV i
(cid:88)
(cid:88)
s(cid:48)
a−i
Tsaa−is(cid:48) V i
s(cid:48) (X) +
X−i
sa−i Tsaa−is(cid:48)
dV i
s(cid:48) (X)
dX j
rb
.
(A16)
(A17)
.
(A18)
(A19)
(A20)
(A21)
(A22)
The derivative of the next value V i
learning update.
s(cid:48) is given by Eq. A13. These are all terms necessary to compute the Jacobian matrix for the Actor-Critic
[1] Richard S Sutton and Andrew G Barto, Reinforcement
learning: An introduction (MIT Press, 1998).
[2] L. Busoniu, R. Babuska, and B. De Schutter, "A com-
prehensive survey of multiagent reinforcement learning,"
IEEE Transactions on Systems, Man, and Cybernetics,
Part C (Applications and Reviews) 38, 156 -- 172 (2008).
[3] M Wiering and Merendel van Otterlo, Reinforcement
Learning: State-of-the-Art (Springer Berlin Heidelberg,
2012).
[4] Ashvin Shah, "Psychological and neuroscientific con-
nections with reinforcement learning," in Reinforcement
Learning (Springer Berlin Heidelberg, 2012) pp. 507 -- 537.
[5] Demis Hassabis, Dharshan Kumaran, Christopher Sum-
and Matthew Botvinick, "Neuroscience-
intelligence," Neuron 95, 245 -- 258
merfield,
inspired artificial
(2017).
[6] Drew Fudenberg and David K Levine, The Theory of
Learning in Games (MIT Press, 1998).
[7] Alvin E Roth and Ido Erev, "Learning in extensive-form
games: Experimental data and simple dynamic models in
the intermediate term," Games and Economic Behavior
8, 164 -- 212 (1995).
[8] Ido Erev and Alvin E Roth, "Predicting how people play
games: Reinforcement learning in experimental games
with unique, mixed strategy equilibria," The American
Economic Review 88, 848 -- 881 (1998).
[9] Colin Camerer and Teck Hua Ho, "Experience-weighted
attraction learning in normal form games," Econometrica
67, 827 -- 874 (1999).
[10] Colin F Camerer, Behavioral Game Theory: Exper-
iments in Strategic Interaction (Princeton University
Press, 2003).
[11] W Brian Arthur, "On designing economic agents that be-
have like human agents," Journal of Evolutionary Eco-
nomics 3, 1 -- 22 (1993).
[12] W Brian Arthur, "Complexity and the economy," Science
284, 107 -- 109 (1999).
[13] Michael W Macy and Andreas Flache, "Learning dy-
namics in social dilemmas," Proceedings of the National
Academy of Sciences 99, 7229 -- 7236 (2002).
[14] John G. Cross, "A stochastic learning model of economic
behavior," The Quarterly Journal of Economics 87, 239
(1973).
[15] Tilman Borgers and Rajiv Sarin, "Learning through rein-
forcement and replicator dynamics," Journal of Economic
Theory 77, 1 -- 14 (1997).
[16] Matteo Marsili, Damien Challet, and Riccardo Zecchina,
"Exact solution of a modified el farol's bar problem:
Efficiency and the role of market impact," Physica A:
Statistical Mechanics and its Applications 280, 522 -- 553
(2000).
[17] Yuzuru Sato, Eizo Akiyama,
and J Doyne Farmer,
"Chaos in learning a simple two-person game," Proceed-
ings of the National Academy of Sciences 99, 4748 -- 4751
(2002).
[18] Yuzuru Sato and James P Crutchfield, "Coupled replica-
tor equations for the dynamics of learning in multiagent
systems," Physical Review E 67 (2003), 10.1103/phys-
reve.67.015206.
[19] Yuzuru Sato, Eizo Akiyama, and James P Crutchfield,
"Stability and diversity in collective adaptation," Physica
D: Nonlinear Phenomena 210, 21 -- 57 (2005).
[20] Tobias Galla, "Intrinsic noise in game dynamical learn-
ing," Physical Review Letters 103 (2009), 10.1103/phys-
revlett.103.198702.
[21] Tobias Galla, "Cycles of cooperation and defection in im-
perfect learning," Journal of Statistical Mechanics: The-
ory and Experiment 2011, P08007 (2011).
[22] Alex J. Bladon and Tobias Galla, "Learning dynamics
in public goods games," Physical Review E 84 (2011),
10.1103/physreve.84.041132.
[23] John Realpe-Gomez, Bartosz Szczesny, Luca Dall'Asta,
and Tobias Galla, "Fixation and escape times in stochas-
tic game learning," Journal of Statistical Mechanics:
Theory and Experiment 2012, P10022 (2012).
[24] James BT Sanders, Tobias Galla,
and Jonathan L
Shapiro, "Effects of noise on convergent game-learning
dynamics," Journal of Physics A: Mathematical and The-
oretical 45, 105001 (2012).
[25] Tobias Galla and J. Doyne Farmer, "Complex dynam-
ics in learning complicated games," Proceedings of the
National Academy of Sciences 110, 1232 -- 1236 (2013).
[26] Aleksandra Aloric, Peter Sollich, Peter McBurney, and
Tobias Galla, "Emergence of Cooperative Long-Term
Market Loyalty in Double Auction Markets," PloS ONE
11, e0154606 (2016).
[27] Karl Tuyls, Katja Verbeeck,
and Tom Lenaerts, "A
selection-mutation model for q-learning in multi-agent
17
systems," in Proceedings of the Second International
Joint Conference on Autonomous Agents and Multiagent
Systems, AAMAS 2003 (2003) pp. 693 -- 700.
[28] Daan Bloembergen, Karl Tuyls, Daniel Hennes,
and
Michael Kaisers, "Evolutionary dynamics of multi-agent
learning: A survey," Journal of Artificial Intelligence Re-
search 53, 659 -- 697 (2015).
[29] Karl Tuyls and Ann Now´e, "Evolutionary game theory
and multi-agent reinforcement learning," The Knowledge
Engineering Review 20, 63 -- 90 (2005).
[30] Karl Tuyls, Pieter Jan'T Hoen, and Bram Vanschoen-
winkel, "An evolutionary dynamical analysis of multi-
agent learning in iterated games," Autonomous Agents
and Multi-Agent Systems 12, 115 -- 153 (2006).
[31] Karl Tuyls and Simon Parsons, "What evolutionary game
theory tells us about multiagent learning," Artificial In-
telligence 171, 406 -- 416 (2007).
[32] Michael Kaisers and Karl Tuyls, "Frequency adjusted
multi-agent q-learning," in Proceedings of the 9th Inter-
national Conference on Autonomous Agents and Multia-
gent Systems: Volume 1, AAMAS 2010 (2010) pp. 309 --
315.
[33] Daniel Hennes, Karl Tuyls, and Matthias Rauterberg,
"State-coupled replicator dynamics," in Proceedings of
the 8th International Conference on Autonomous Agents
and Multiagent Systems, AAMAS 2009 (2009) pp. 789 --
796.
[34] Peter Vrancx, Karl Tuyls, and Ronald Westra, "Switch-
ing dynamics of multi-agent learning," in Proceedings of
the 7th International Joint Conference on Autonomous
Agents and Multiagent systems, AAMAS 2008 (2008) pp.
307 -- 313.
[35] Daniel Hennes, Michael Kaisers, and Karl Tuyls, "Resq-
learning in stochastic games," in Proceedings of the Adap-
tive and Learning Agents Workshop, ALA 2010 (2010)
pp. 8 -- 15.
[36] Lloyd S Shapley, "Stochastic games," Proceedings of the
National Academy of Sciences 39, 1095 -- 1100 (1953).
[37] J-F Mertens and Abraham Neyman, "Stochastic games,"
International Journal of Game Theory 10, 53 -- 66 (1981).
[38] Eizo Akiyama and Kunihiko Kaneko, "Dynamical sys-
tems game theory and dynamics of games," Physica D:
Nonlinear Phenomena 147, 221 -- 258 (2000).
[39] Eizo Akiyama and Kunihiko Kaneko, "Dynamical sys-
tems game theory II: A new approach to the problem of
the social dilemma," Physica D: Nonlinear Phenomena
167, 36 -- 71 (2002).
[40] Matthijs T. J. Spaan, "Partially observable markov de-
cision processes," in Reinforcement Learning (Springer
Berlin Heidelberg, 2012) pp. 387 -- 414.
[41] Frans A. Oliehoek, "Decentralized POMDPs," in Adap-
tation, Learning, and Optimization (Springer Berlin Hei-
delberg, 2012) pp. 471 -- 503.
[42] Richard Bellman, "A markovian decision process," Indi-
ana University Mathematics Journal 6, 679 -- 684 (1957).
[43] Sascha Lange, Thomas Gabel, and Martin Riedmiller,
"Batch reinforcement learning," in Reinforcement Learn-
ing (Springer Berlin Heidelberg, 2012) pp. 45 -- 73.
[44] Volodymyr Mnih, Koray Kavukcuoglu, David Silver, An-
drei A. Rusu, Joel Veness, Marc G. Bellemare, Alex
Graves, Martin Riedmiller, Andreas K. Fidjeland, Georg
Ostrovski, Stig Petersen, Charles Beattie, Amir Sadik,
Ioannis Antonoglou, Helen King, Dharshan Kumaran,
Daan Wierstra, Shane Legg,
and Demis Hassabis,
"Human-level control through deep reinforcement learn-
ing," Nature 518, 529 -- 533 (2015).
[45] Christian Hilbe, Step´an Simsa, Krishnendu Chatterjee,
and Martin A. Nowak, "Evolution of cooperation in
stochastic games," Nature 559, 246 -- 249 (2018).
[46] Marco Sandri, "Numerical calculation of lyapunov expo-
nents," The Mathematica Journal 6, 78 -- 84 (1996).
[47] A. Bandura, Social learning Theory (Englewood Cliffs,
NJ: Prentice Hall, 1977).
[48] Marco Smolla, R. Tucker Gilman, Tobias Galla,
and
Susanne Shultz, "Competition for resources can explain
patterns of social and individual learning in nature," Pro-
ceedings of the Royal Society B: Biological Sciences 282,
20151405 (2015).
[49] Wolfram Barfuss, Jonathan F Donges, Marc Wieder-
mann,
and Wolfgang Lucht, "Sustainable use of re-
newable resources in a stylized social -- ecological network
model under heterogeneous resource distribution," Earth
System Dynamics 8, 255 -- 264 (2017, P1).
[50] S. Banisch and E. Olbrich, "Opinion polarization by
learning from social feedback," The Journal of Mathe-
matical Sociology 0, 1 -- 28 (2018).
[51] Simon Levin, "The mathematics of sustainability," No-
tices of the American Mathematical Society 60, 1 (2013).
[52] Jonathan F Donges, Ricarda Winkelmann, Wolfgang
Lucht, Sarah E Cornell, James G Dyke, Johan Rock-
strom, Jobst Heitzig, and Hans Joachim Schellnhuber,
"Closing the loop: Reconnecting human dynamics to
earth system science," The Anthropocene Review 4, 151 --
157 (2017).
[53] R M Dawes, "Social dilemmas," Annual Review of Psy-
18
chology 31, 169 -- 193 (1980).
[54] J. Heitzig, T. Kittel, J. F. Donges,
and N. Molken-
thin, "Topology of sustainable management of dynami-
cal systems with desirable states: from defining planetary
boundaries to safe operating spaces in the earth system,"
Earth System Dynamics 7, 21 -- 50 (2016).
[55] Emilie Lindkvist and Jon Norberg, "Modeling experi-
ential learning: The challenges posed by threshold dy-
namics for sustainable renewable resource management,"
Ecological Economics 104, 107 -- 118 (2014).
[56] Caroline Schill, Therese Lindahl,
and Anne-Sophie
Cr´epin, "Collective action and the risk of ecosystem
regime shifts:
insights from a laboratory experiment,"
Ecology and Society 20 (2015), 10.5751/es-07318-200148.
[57] Manfred Milinski, Ralf D Sommerfeld, Hans-Jurgen
Krambeck, Floyd A Reed, and Jochem Marotzke, "The
collective-risk social dilemma and the prevention of simu-
lated dangerous climate change," Proceedings of the Na-
tional Academy of Sciences 105, 2291 -- 2294 (2008).
[58] S. Barrett and A. Dannenberg, "Climate negotiations un-
der scientific uncertainty," Proceedings of the National
Academy of Sciences 109, 17372 -- 17376 (2012).
[59] Wolfram Barfuss, Jonathan F Donges, Steven J Lade,
and Jurgen Kurths, "When optimization for governing
human-environment tipping elements is neither sustain-
able nor safe," Nature communications 9, 2354 (2018,
P4).
[60] Jonathan F. Donges and Wolfram Barfuss, "From math
to metaphors and back again: Social-ecological resilience
from a multi-agent-environment perspective," GAIA -
Ecological Perspectives for Science and Society 26, 182 --
190 (2017, P2).
|
0811.2551 | 3 | 0811 | 2019-07-09T20:25:22 | Modeling Cultural Dynamics | [
"cs.MA",
"cs.AI",
"q-bio.NC"
] | EVOC (for EVOlution of Culture) is a computer model of culture that enables us to investigate how various factors such as barriers to cultural diffusion, the presence and choice of leaders, or changes in the ratio of innovation to imitation affect the diversity and effectiveness of ideas. It consists of neural network based agents that invent ideas for actions, and imitate neighbors' actions. The model is based on a theory of culture according to which what evolves through culture is not memes or artifacts, but the internal models of the world that give rise to them, and they evolve not through a Darwinian process of competitive exclusion but a Lamarckian process involving exchange of innovation protocols. EVOC shows an increase in mean fitness of actions over time, and an increase and then decrease in the diversity of actions. Diversity of actions is positively correlated with population size and density, and with barriers between populations. Slowly eroding borders increase fitness without sacrificing diversity by fostering specialization followed by sharing of fit actions. Introducing a leader that broadcasts its actions throughout the population increases the fitness of actions but reduces diversity of actions. Increasing the number of leaders reduces this effect. Efforts are underway to simulate the conditions under which an agent immigrating from one culture to another contributes new ideas while still fitting in. | cs.MA | cs | Gabora, L. (2008, November). Modeling cultural dynamics. In A. Davis & J. Ludwig (Co-Chairs), Adaptive agents in a
cultural context: Papers from the AAAI Fall Symposium (pp. 18-25). Symposium conducted at the meeting of Association
for the Advancement of Artificial Intelligence (AAAI), Palo Alto, CA. Retrieved from http://arxiv.org/abs/0811.2551
Modeling Cultural Dynamics
Liane Gabora
University of British Columbia
Okanagan campus, 3333 University Way
Kelowna BC, V1V 1V7, CANADA
[email protected]
Abstract
EVOC (for EVOlution of Culture) is a computer model of
culture that enables us to investigate how various factors such
as barriers to cultural diffusion, the presence and choice of
leaders, or changes in the ratio of innovation to imitation affect
the diversity and effectiveness of ideas. It consists of neural
network based agents that invent ideas for actions, and imitate
neighbors' actions. The model is based on a theory of culture
according to which what evolves through culture is not memes
or artifacts, but the internal models of the world that give rise
to them, and they evolve not through a Darwinian process of
competitive exclusion but a Lamarckian process involving
exchange of innovation protocols. EVOC shows an increase in
mean fitness of actions over time, and an increase and then
decrease in the diversity of actions. Diversity of actions is
positively correlated with population size and density, and with
barriers between populations. Slowly eroding borders increase
fitness without sacrificing diversity by fostering specialization
followed by sharing of fit actions. Introducing a leader that
broadcasts its actions throughout the population increases the
fitness of actions but reduces diversity of actions. Increasing
the number of leaders reduces this effect. Efforts are underway
to simulate the conditions under which an agent immigrating
from one culture to another contributes new ideas while still
'fitting in'.
Introduction
What impact do leaders and role models have on the views
and behaviors in a given culture? Is a dictatorial or a
distributed mode of leadership more effective? What is the
effect of complete or semi-permeable barriers to trade and
immigration, or barriers that erode or strengthen with time?
And what implications do these kinds of cultural patterns
have on how best to negotiate, conduct business, or simply
behave in a foreign land? These questions and others are
addressed using a computer model of culture referred to as
EVOC (for EVOlution of Culture). EVOC consists of
neural network based agents that invent ideas for actions,
and imitate neighbors' actions (Gabora, 2008). EVOC is an
elaboration of Meme and Variations, or MAV (Gabora,
1994, 1995), the earliest computer program to model
culture as an evolutionary process in its own right. MAV
was inspired by the genetic algorithm (GA), a search
technique that finds solutions to complex problems by
generating a 'population' of candidate solutions through
processes akin to mutation and recombination, selecting
the best, and repeating until a satisfactory solution is
found. Although MAV has inspired the incorporation of
cultural phenomena (such as imitation, knowledge-based
operators, and mental simulation) into evolutionary search
algorithms (e.g. Krasnogor & Gustafson, 2004), the goal
behind MAV was not to solve search problems, but to gain
insight into how ideas evolve. It used neural network based
agents that could (1) invent new ideas by modifying
previously learned ones, (2) evaluate ideas, (3) implement
ideas as actions, and (4) imitate ideas implemented by
neighbors. Agents evolved
in a cultural sense, by
generating and sharing ideas for actions, but not in a
biological sense; they neither died nor had offspring. The
approach can thus be contrasted with computer models of
the interaction between biological evolution and individual
learning (Best, 1999, 2006; Higgs, 2000; Hinton &
Nowlan, 1987; Hutchins & Hazelhurst, 1991).
MAV
successfully modeled how
'descent with
modification' can occur in a cultural context, but it had
limitations arising from the outdated methods used to
program it. Moreover, although new ideas in MAV were
generated making use of acquired knowledge and pattern
detection, the name 'Meme and Variations' implied
acceptance of the notion that cultural novelty is generated
randomly, and that culture evolves through a Darwinian
process operating on discrete units of culture, or 'memes'.
Problems with memetics and other Darwinian approaches
to culture have become increasingly apparent (Boone &
Smith, 1998; Fracchia & Lewontin, 1999; Gabora, 2004,
2006, 2008; Jeffreys, 2000). One problem is that natural
selection prohibits the passing on of acquired traits (thus
you don't inherit your mother's tattoo).1 In culture,
however, 'acquired' change -- that is, modification to ideas
between the time they are learned and the time they are
expressed -- is unavoidable. Darwinian approaches must
assume that elements of culture are expressed in the same
form as that in which they are acquired. Natural selection
also assumes that lineages do not intermix. However,
1 That isn't to say that inheritance of acquired traits never
occurs in biological evolution; it does. However to the
extent that this is the case natural selection cannot provide
an accurate model of biological evolution. Because
inheritance of acquired traits is the exception in biology
not the rule, natural selection still provides a roughly
accurate model of biological evolution.
because ideas cohabit a distributed memory with a
multitude of other ideas, they are constantly combining to
give new ideas, and their meanings, associations, and
implications are constantly revised.
It has been proposed what evolves through culture is not
discrete memes or artifacts, but the internal models of the
world that give rise to them (Gabora, 2004), and they
evolve not through a Darwinian process of competitive
exclusion but a Lamarckian process involving exchange of
innovation protocols
(Gabora, 206, 2008). EVOC
incorporates this in part by allowing agents to have
multiple interacting needs, thereby fostering complex
actions that fulfill multiple needs. Elsewhere (Gabora,
2008) the results of experiments using different needs
and/or multiple needs are described.
This paper describes other experiments carried out with
EVOC that were not possible to carry out with MAV.
These experiments investigate how cultural evolution is
affected by leadership, and by affordances of the agents'
world, such as world shape and size, population density,
and barriers that impede information flow, and potentially
erode with time.
Architecture
EVOC consists of an artificial society of agents in a two-
dimensional grid-cell world. It is written in Joone, an
object oriented programming environment, using an open
source neural network library written in Java. This section
describes the key components of the agents and the world
they inhabit.
The Agent
Agents consist of (1) a neural network, which encodes
ideas for actions and detects trends in what constitutes a fit
action, and (2) a body, which implements actions. In MAV
there was only one need -- to attract a mate. Thus actions
were limited to gestures that attract mates. In EVOC agents
can also engage in tool-making actions.
The Neural Network. The core of an agent is a neural
network, as shown in Figure 1. It is composed of six input
nodes that represent concepts of body parts (LEFT ARM,
RIGHT ARM, LEFT LEG, RIGHT LEG, HEAD, and
HIPS), six matching output nodes, and six hidden nodes
that represent more abstract concepts (LEFT, RIGHT,
ARM, LEG, SYMMETRY and MOVEMENT). Input
nodes and output nodes are connected to 'hidden' nodes of
which they are instances (e.g. RIGHT ARM is connected
to RIGHT.) Activation of any input node increases
activation of the MOVEMENT hidden node. Opposite-
direction activation of pairs of limb nodes (e.g. leftward
motion of one arm and rightward motion of the other)
activates the SYMMETRY node.
The neural network learns ideas for actions. An idea is a
pattern of activation across the output nodes consisting of
six elements that instruct the placement of the six body
parts. Training of the neural network is as per (Gabora,
1995). In brief, the neural network starts with small
random weights, and patterns that represent ideas for
actions are presented to the network. Each time a pattern is
presented, the network's actual output is compared to the
desired output. An error term is computed, which is used to
modify the pattern of connectivity in the network such that
its responses become more correct. Since the neural
network is an autoassociator, training continues until the
output is identical to the input. At this point training stops
and the run begins. The value of using a neural network is
simply that trends about what makes for a fit action can be
detected using the symmetry and movement nodes (see
below). The neural network can also be turned off to
compare results to those obtained using instead of a neural
network a simple data structure that cannot detect trends,
and thus invents ideas at random.
they adapt
Knowledge-based Operators. Brains detect regularity and
build schemas with which
the mental
equivalents of mutation and recombination to tailor actions
to the situation at hand. Thus they generate novelty
strategically, on the basis of past experience. Knowledge-
based operators are a crude attempt to incorporate this into
the model. Since a new idea for an action is not learned
unless it is fitter than the currently implemented action,
newly learned actions provide valuable information about
what constitutes an effective idea. This information is used
by knowledge-based operators to probabilistically bias
invention such that new ideas are generated strategically as
opposed to randomly. Thus the idea is to translate
knowledge acquired during evaluation of an action into
educated guesses about what makes for a fit action.
Two rules of thumb are used. The first rule is: if
movement is generally beneficial, the probability increases
that new actions involve movement of more body parts.
Each body part starts out at a stationary rest position, and
with an equal probability of changing to movement in one
direction or the other. If the fitter action codes for more
movement, increase the probability of movement of each
body part. Do the opposite if the fitter action codes for less
movement. This rule of thumb is based on the assumption
FROM
NEIGH-
BOR
Head
Left Arm
Right
Arm
Left Leg
Right
Leg
Hips
INPUT
NODES
Symmetry
Move-
ment
Arm
Leg
Right
Left
HIDDEN
NODES
Head
Left Arm
Right
Arm
TO
Left Leg
BODY
Right
Leg
Hips
OUTPUT
NODES
Figure 1. The neural network. See text for details.
that movement in general (regardless of which particular
body part is moving) can be beneficial or detrimental. This
seems like a useful generalization since movement of any
body part uses energy and increases the likelihood of being
detected. It is implemented as follows:
am1 = movement node activation for current action
am2 = movement node activation for new action
p(im)i = probability of increased movement at body part i
p(dm)i = probability of decreased movement at body part i
realistic mating displays, and exhibits a cultural analog of
epistasis. In biological epistasis, the fitness conferred by
the allele at one gene depends on which allele is present at
another gene. In this cognitive context, epistasis is present
when the fitness contributed by movement of one limb
depends on what other limbs are doing.
The fitness of an action with respect to the second need,
the need to make tools, uses a second fitness function, F2,
and is calculated as in (Gabora, 2008).
IF (am2 > am1)
THEN p(im)i = MAX(1.0, p(im)i + 0.1)
ELSE IF (am2 < am1)
THEN p(im)i = MIN(0.0, p(im)i - 0.1)
p(dm)i = 1 - p(im)i
The second rule of thumb is: if fit actions tend to be
symmetrical (e.g. left arm moves to the right and right arm
moves to the left), the probability increases that new
actions are symmetrical. This generalization is biologically
sensible, since many useful actions (e.g. walking) entail
movement of limbs in opposite directions, while others
(e.g. pushing) entail movement of limbs in the same
direction. This rule is implemented in a manner analogous
to that of the first rule.
In summary, each action is associated with a measure of
its effectiveness, and generalizations about what seems to
work and what does not are translated into guidelines that
specify the behavior of the algorithm.
The Body. If the fitness of an action is evaluated to be
higher than that of any action learned thus far, it is copied
from the output nodes of the neural network that represent
concepts of body parts to a six digit array that contains
representions of actual body parts, referred to as the body.
Since it is useful to know how many agents are doing
essentially the same thing, when node activations are
translated into limb movement they are thresholded such
that there are only three possibilities for each limb:
stationary, left, or right. Six limbs with three possible
positions each gives a total of 729 possible actions. Only
the action that is currently implemented by an agent's body
can be observed and imitated by other agents.
The Fitness Functions
Agents evaluate the effectiveness of their actions according
to how well they satisfy needs using a pre-defined equation
referred to as a fitness function. Agents have two possible
needs. The fitness of an action with respect to the need to
attract mates is referred to as F1, and it is calculated as in
(Gabora, 1995). F1 rewards actions that make use of trends
detected by the symmetry and movement hidden nodes and
used by knowledge-based operators to bias the generation
of new ideas. F1 generates actions that are relatively
Incorporation of Cultural Phenomena
In addition
to knowledge-based operators, discussed
previously, agents incorporate the following phenomena
characteristic of cultural evolution as parameters that can
be turned off or on (in some cases to varying degrees):
•
Imitation. Ideas for how to perform actions spread
when agents copy neighbors' actions. This enables
them to share effective, or 'fit', actions.
Invention. This code enables agents to generate new
actions by modifying their initial action or a previously
invented or imitated action using knowledge-based
operators (discussed previously).
•
simulation.
Before
• Mental
to
implementing an idea as an action, agents can use the
fitness function to assess how fit the action would be if
it were implemented.
committing
The World
MAV allowed only worlds that were toroidal, or 'wrap-
around'. Moreover, the world was always maximally
densely populated, with one agent per cell. In EVOC the
world can be either toroidal or square, and as sparsely or
densely populated as desired, with agents placed in any
configuration. EVOC also allows the creation of complete
or semi-permeable permanent or eroding borders that
decrease the probability of imitation along a frontier.
A Typical Run
Each iteration, every agent has the opportunity to (1)
acquire an idea for a new action, either by imitation,
copying a neighbor, or by invention, creating one anew, (2)
update the knowledge-based operators, and (3) implement
a new action. To invent a new idea, the current action is
copied to the input layer of the neural network, and this
previous action is used as a basis from which to generate a
new one. For each node the agent makes a probabilistic
decision as to whether change will take place. If it does,
the direction of change is stochastically biased by the
knowledge-based operators using the activations of the
SYMMETRY and MOVEMENT nodes. Mental simulation
is used to determine whether the new idea has a higher
fitness than the current action. If so, the agent learns and
implements the action specified by the new idea.
To acquire an idea through imitation, an agent randomly
chooses one of its neighbors, and evaluates the fitness of
the action the neighbor is implementing using mental
simulation. If its own action is fitter than that of the
neighbor, it chooses another neighbor, until it has either
observed all of its immediate neighbors, or found one with
a fitter action. If no fitter action is found, the agent does
nothing. Otherwise, the neighbor's action is copied to the
input layer, learned, and implemented.
Fitness of actions starts out low because initially all
agents are immobile. Soon some agent invents an action
that has a higher fitness than doing nothing, and this action
gets imitated, so fitness increases. Fitness increases further
as other ideas get invented, assessed, implemented as
actions, and spread through imitation. The diversity of
actions initially increases due to the proliferation of new
ideas, and then decreases as agents hone in on the fittest
actions.
The Graphical User Interface
The graphical user interface (GUI) makes use of the open-
source charting project, JFreeChart, enabling variables to
be user defined at run time, and results to become visible
as the computer program runs. Figure 2 shows the topmost
output panel using the mating fitness function (F1). At the
upper left one specifies the Invention to Imitation Ratio.
This refers to the probability that a given agent, on a given
iteration, invents a new idea for an action, versus the
probability that it imitates a neighbor's action. Below that
is Rate of Conceptual Change, where one specifies the
degree to which a newly invented idea differs from the one
it was based on. Below that is Number of Agents, which
allows the user to specify the size of the artificial society.
Below that is where one specifies Number of Iterations, i.e.
the duration of a run. The agents that make up the artificial
society can be accessed individually by clicking the
appropriate cell in the grid on the upper right. This enables
one to see such details as the action currently implemented
by a particular agent, or the fitness of that action. The
graphs at the bottom plot the mean idea fitness and
diversity of ideas. Tabs shown at the top give access to
other output panels of the GUI.
Summary of Previous Results
EVOC closely replicates
the results of experiments
conducted with MAV (Gabora, 1995). The graph on the
Figure 2. Output panel of GUI using F1. See text for details.
bottom left of Figure 2 shows the increase in fitness of
actions. The graph on the bottom right of Figure 2 shows
the increase and then decrease in the diversity of actions.
Other MAV results that are replicated with EVOC include:
• Fitness increases most quickly with an invention to
imitation ratio of approximately 2:1.
•
• For the agent with the fittest actions, however, the less
it imitates, the better it does.
Increasing the invention-to-imitation ratio increases the
diversity of actions. If increased much beyond 2:1, it
takes more than twice as many iterations for all agents
to settle on optimal actions.
• As in biology, epistatically linked elements take longer
to optimize. (As explained earlier, in the present
context epistasis refers to the situation where the effect
on fitness of what one limb is doing depends on what
another is doing.)
• The program exhibits drift -- the term biologists use to
refer to changes in the relative frequencies of alleles
(forms of a gene) as a statistical byproduct of randomly
sampling from a finite population (Wright, 1969). With
respect to culture, the term pertains not to alleles but to
possible forms of a component of an idea (e.g. if the
idea is to implement the gesture 'wave', one can do this
with one's left hand or one's right).
These results show that concepts from biology are useful in
the analysis of cultural change, but that culture also
exhibits phenomena that have no biological equivalent.
Previous work on EVOC focused on the effects of
changing the need, and integrating multiple needs (Gabora,
2008). It was found that changing the need (modeled as a
change in the fitness function) or giving agents multiple
needs to fulfill, does not change the overall pattern of
results. Mean fitness of actions still increases gradually,
and diversity of actions rises and then falls, exhibiting the
typical inverted U-shaped curve, the magnitude of which is
a function of population size. However, increasing the
number of needs consistently results in a higher diversity
of actions, and tends to decrease mean fitness with respect
to any given need.
Experiments
We now outline the results of current experiments with
EVOC. Unless stated otherwise, the world is toriodal and
consists of 100 cells, with maximum density (one agent per
cell), no broadcasting, no barriers to idea flow, a 1:1
invention to imitation ratio, and a 0.17% probability of
change to any body part during invention (since, with six
body parts, on average each newly invented action differs
from the one it was based on with respect to one body
part).
Complete and Semi-permeable Barriers
Throughout history, the flow of ideas has been impeded
geographical barriers and political/cultural borders. It is
possible to simulate this in EVOC by reducing the
probability of imitation between agents on opposite sides
of a barrier. Barriers were found to increase latency to
converge on fit actions, and to increase diversity, by
effectively dividing the population. Interesting results are
achieved when barriers erode over time such that the
probability of imitation by agents on opposite sides is
initially zero but increases over the duration of a run,
simulating globalization. Figure 3 shows the diversity of
actions implemented after 4 iterations with an eroding
barrier. Eroding barriers foster specialization -- honing in
on unique solutions -- on different sides of the border,
followed by sharing of the best to reach a diverse final set.
Figure 3. Diversity of actions after four iterations with
8x8 grid and eroding barrier between 3rd and 4th
columns. Different actions represented by different
colored cells (which will appear in print as different
shades of grey). Invention to imitation ratio of agents to
right of border twice is that of agents to the left.
Diversity similarly affected by whether the shape of the
world is square -- which simulates a situation where the
flow of ideas is bounded by natural or political boundaries
-- versus toroidal -- which simulates the situation where
such barriers are overcome through globalization. A global
(toroidal) world accelerates fitness and increases diversity
in the short term but decreases it in the long term. This
makes sense; agents at the edges of a square world have
fewer neighbors, and thus more opportunity to retain
deviant actions.
Effect of Population Density
EVOC allows not just the shape of the world to be
changed, but how densely populated it is. Figure 4
illustrates the diversity of actions over a run with different
population densities.
The lower the population density, the more the typical
inverted-U shaped action diversity curve is disrupted; both
the
less
initial peak and subsequent decline are
2/3 of Cells Occupied
4/5 of Cells Occupied
All Cells Occupied
1/3 of Cells
Occupied
Figure 4. Effect of varying population density on
diversity of actions.
pronounced. Further analysis reveals
that decreasing
population density fosters the existence of small isolated
clusters that are unable to learn from one another and share
effective actions, impairing the ability of the society to
converge on only the fittest actions.
Broadcasting
Broadcasting allows the action of a leader, or broadcaster,
to be visible to not just immediate neighbors, but all
agents, thereby simulating the effects of media such as
public performances, television, radio, or internet, on
patterns of cultural change. When broadcasting is turned
on, an agent is no longer limited to its immediate neighbors
as potential role models. Each agent adds the broadcaster
as a possible source of actions it can imitate. A particular
agent can be chosen as the broadcaster before the run, or
the broadcaster can be chosen at random, or the user can
specify that the agent with the fittest action is the
broadcaster. Broadcasting can be intermittent, or continued
throughout the duration of a run. Broadcasting does not
have a significant effect on the fitness of actions, but as
shown in Figure 5, it accelerates convergence on optimal
actions, and consistently reduces diversity.
By varying the number of broadcasters EVOC allows
simulation of the effect on fitness and diversity of ideas of
a dictorial style of leadership (one broadcaster) versus a
distributed style of leadership (multiple leaders). In figure
6 we see how adding the presence of a broadcaster
(comparing column 1 without broadcaster to column 2 with
broadcaster) decreases the diversity of actions. This i seen
clearly looking to the lowest row: 20 iterations. Whereas
without a broadcaster there are eight different actions, and
41% of agents are executing the most popular action, with
a broadcaster there are five different actions, and 84% of
agents are executing the most popular action. However, as
shown in columns 3 to 6, these trends become increasingly
reversed the greater the number of broadcasters. With five
broadcasters, the society converges on nine different
actions, and the percentage of agents executing the most
popular action is down to 31%. These data potentially
speak to the changing effect of media on society. With
only one television or radio station, the effect of media
may have been to make opinions and behaviors more
homogeneous. However with the proliferation of different
radio and television stations, as well as web-based media,
available from not just local sources but around the world,
the effect might well be the reverse: an explosion of
different views and behaviors.
Discussion
the
effects
investigating
This paper has given an overview of factors impacting the
spread of ideas and behaviors that can be investigated with
a computer model of cultural evolution, focusing on new
results
broadcasting
of
(leadership), population density, and
the shape and
penetrability (e.g. presence of boundaries) of the terrain.
Results suggest that properties of the world can have as
great an impact on the evolution of culture as properties of
the agents themselves. The results also show that the
benefits of leadership with respect to enhanced fitness of
ideas may be tempered by decreased diversity of ideas.
This echoes previous simulation findings that leadership
can have adverse effects when agents can communicate
(Gigliotta, Miglino, & Parisi, 2007).
• Building Blocks. Agents will implement actions that
that
function
evaluates
A primary aim of future work will be to examine the
distinctively human phenomenon of cultural open-
endedness. Although presently agents' actions become
more complex and adapted over time, and change is
cumulative in that new actions build on existing ones, once
agents settle on some subset of optimal actions, the
program comes to a standstill. Future versions will use a
fitness
actions differently
depending on the relative strengths of the different needs.
The strength of a need will be a function of both how many
iterations have passed since execution of an action that
satisfied that need, and the degree to which that action
satisfied that need. It is expected that the program will not
come to a standstill because once an agent has filled one
need it will change the kind of action it implements to
satisfy another. Moreover to avoid that agents still zero in
on predictable subsets of actions that fulfill these needs,
future versions of EVOC will incorporate the following:
• Context-sensitive concepts. We plan to move to a more
subsymbolic level, incorporating how constellations of
activated microfeatures are influenced by context
(Aerts & Gabora, 2005a,b; Gabora, Rosch, & Aerts,
2008). This will allow for a richer repertoire of actions.
• Chained Actions. Agents will be allowed to chain
actions into arbitrarily long action sequences.
Figure 6. Diversity of actions over a run with 0, 1, 2, 3, 4, and 5 broadcasters. Different actions are represented by
differently colored cells (which will appear in the printed version as different shades of grey). In all cases there is an
increase followed by a decrease in diversity over time (moving down any column from the first iteration, at the top, to the
20th iteration, at the bottom). However, the decrease is less pronounced the more broadcasters there are. These runs used a
toroidal, maximally dense world, with a 10x10 grid. In this run, broadcasters were chosen at random every iteration, and
when their were multiple broadcasters, agents selected the broadcaster whose action was most similar to their own.
cumulatively modify their world using building blocks
to create structures that satisfy needs, and add to (or
destroy) structures made by others.
With these modifications it is expected that there will no
longer be an a priori limit to the number or complexity of
actions. The role of each of these modifications in bringing
about genuine cultural evolution will be assessed. The
effort will be judged successful if cultural change is not
just cumulative, but cumulative in a way that responds to
needs and situations, and open-ended, such that one
innovation creates niches for the invention of others (as
cars paved the way for seat belts and gas stations).
Further experiments with eroding barriers has potential
implications for the impact of free trade on global diversity
the conditions under which
of ideas, and for investigating the complex relationship
between creativity and culture (Kaufman & Sternberg,
2006). Future efforts will also focus on a more in-depth
analysis of
immigrant
contributes to the fitness and diversity of ideas versus the
conditions under which the immigrant's actions are so
different that they merely stand out and do not contribute
in a productive way. A wider range of needs will be made
available in order to determine the relationship between
degree of similarity between needs of the native and
immigrant populations and latency of the immigrant
population to 'fit in'. Other questions will also be
investigated, such as 'How does the probability of 'fitting
in' change as a function of the number of immigrants?
These issues are timely, and have potential implications for
how individuals should go about negotiating, conducting
business, and simply behaving in a foreign land. Even
when such simulations do not provide specific directives,
they help us to think in more precise terms about the
issues.
Acknowledgments
Thanks to Martin Denton and Jillian Dicker for their work
on EVOC. This project is funded by the Social Sciences
and Humanities Research Council of Canada (SSHRC).
References
Aerts, D. & Gabora, L. 2005a. A state-context-property
model of concepts and their combinations I: The
structure of the sets of contexts and properties.
Kybernetes 34(1&2): 151 -- 175.
Aerts, D. & Gabora, L. 2005b. A state-context-property
model of concepts and their combinations II: A Hilbert
space representation. Kybernetes 34(1&2): 176 -- 205.
Best, M. 1999. How culture can guide evolution: An
inquiry into gene/meme enhancement and opposition.
Adaptive Behavior 7(3): 289 -- 293.
Best, M. 2006. Adaptive value within natural language
discourse. Interaction Studies 7(1), 1-15.
Boone, J. L., Smith, E. A. 1998. Is it evolution yet? A
archaeology. Current
evolutionary
critique of
Anthropology, 39, S141 -- 73.
Fracchia, J. & Lewontin, R. C. 1999. Does culture evolve?
History and Theory 38(4): 52 -- 78.
Gabora, L. 1994. A computer model of the evolution of
culture. In R. Brooks & P. Maes (Eds.) Proceedings of
the 4th International Conference on Artificial Life, July
4-6, Boston MA.
Gabora, L. 1995. Meme and Variations: A computer model
of cultural evolution. In L. Nadel & D. Stein (Eds.)
1993 Lectures in Complex Systems, pp. 471−486.
Reading MA: Addison-Wesley.
Gabora, L. 2004. Ideas are not replicators but minds are.
Biology & Philosophy 19(1): 127−143.
Gabora, L. 2006. The fate of evolutionary archaeology:
Survival or extinction? World Archaeology 38(4):
690−696.
Gabora, L. 2008. The cultural evolution of socially situated
cognition. Cognitive Systems Research 9(1 -- 2): 104 --
113.
Gabora, L. 2008. EVOC: A computer model of cultural
evolution. In V. Sloutsky, B. Love & K. McRae
(Eds.), 30th Annual Meeting of the Cognitive Science
Society. Washington DC, July 23-26, North Salt
Lake, UT: Sheridan Publishing.
Gabora, L., Rosch, E., & Aerts, D. 2008. Toward an
ecological theory of concepts. Ecoogical Psychology
20(1): 84−116.
Gigliotta, O. Miglino, O. & Parisi, D. 2007. Groups of
agents with a leader. Journal of Artificial Societies and
Social
10(4).
http://jasss.soc.surrey.ac.uk/10/4/1.html
Simulation,
Gilbert, D. & Morgner, T. JfreeChart. http://www.jfree.
org/jfreechart/index.html
Higgs, P. G. 2000. The mimetic transition: a simulation
study of the evolution of learning by imitation.
Proceedings of
the Royal Society B: Biological
Sciences 267(1450): 1355 -- 1361.
Hinton, G. E. 1981. Implementing semantic networks in
parallel hardware. In Parallel Models of Associative
Memory. Hillsdale NJ: Erlbaum Press.
Hinton, G. E. & Nowlan, S. J. 1987. How learning can
guide evolution. Complex Systems 1: 495 -- 502.
Holland, J. K. 1975. Adaptation in Natural and Artificial
Systems. Ann Arbor: University of Michigan Press.
Hutchins, E. & Hazelhurst, B. (1991). Learning in the
cultural crocess. In Langton, C., Taylor, J., Farmer, D.,
& Rasmussen, S. (Eds.) Artificial Life II. Redwood
City, CA: Addison-Wesley.
Jeffreys, M. (2000). The meme metaphor. Perspectives in
Biology and Medicine 43(2): 227 -- 242.
Karmiloff-Smith, A. 1992. Beyond modularity: A
developmental perspective on cognitive science.
Cambridge MA: MIT Press.
Kaufman, J. C., & Sternberg, R. J. (Eds). 2006. The
international handbook of creativity. Cambridge:
Cambridge University Press.
Krasnogor, N. & Gustafson, S. 2004. A study on the use of
in memetic algorithms. Natural
"self-generation"
Computing 3(1): 53 -- 76.
Marrone, P. Java Object Oriented Neural Engine (JOONE).
www.jooneworld.com
Wright, S. 1969. Evolution and
the genetics of
Populations. Chicago: University of Chicago Press.
|
1210.5936 | 1 | 1210 | 2012-10-22T15:37:36 | Mod\'elisation multi-niveaux dans AA4MM | [
"cs.MA"
] | In this article, we propose to represent a multi-level phenomenon as a set of interacting models. This perspective makes the levels of representation and their relationships explicit. To deal with coherence, causality and coordination issues between models, we rely on AA4MM, a metamodel dedicated to such a representation. We illustrate our proposal and we show the interest of our approach on a flocking phenomenon. | cs.MA | cs | Modélisation multi-niveaux dans AA4MM
B. Camusa,b
J. Siebertc
C. Bourjota,b
V. Chevriera,b
[email protected] [email protected] [email protected]
[email protected]
a Université de Lorraine, LORIA, UMR 7506 , Vandoeuvre les Nancy, F-54506 France
b Inria, Villers-Lès-Nancy, F-54600 France
c Lab-STICC, Ecole Nationale d'Ingénieurs de Brest, France
Résumé
Dans cet article, nous proposons de représen-
ter un phénomène multi-niveaux sous la forme
de plusieurs modèles en interaction. Cette vi-
sion structure la réflexion en rendant expli-
cites les niveaux de représentation et leurs
relations. Pour répondre aux défis de cohé-
rence, causalité et coordination entre ces mo-
dèles, nous nous appuyons sur le méta-modèle
AA4MM dédié à ce type de représentation. Un
phénomène de flocking permet d'illustrer notre
propos et de monter l'intérêt de cette ap-
proche.
Cette démarche pose des bases conceptuelles
relativement simples pour aborder une ques-
tion encore largement ouverte de la modélisa-
tion des systèmes complexes
Mots-clés : modélisation et simulation multi-
niveaux ; émergence ; méta-modèle
Abstract
In this article, we propose to represent a mul-
ti-level phenomenon as a set of interacting
models. This perspective makes the levels of
representation and their relationships explicit.
To deal with coherence, causality and coordi-
nation issues between models, we rely on
AA4MM, a metamodel dedicated to such a
representation. We illustrate our proposal and
we show the interest of our approach on a
flocking phenomenon.
Keywords: Modeling and simulation multi-
level representation, emergence, metamodel.
1. Introduction
Lorsque l'on aborde la modélisation de phé-
nomènes collectifs, que ce soit en sciences
humaines et sociales ou en biologie, il est sou-
vent nécessaire de représenter le système selon
plusieurs niveaux (Troitzsch, 1996).
Par exemple en biologie (Sloot, 2010) (Uhr-
macher, 2009) (Ballet, 2012), le système à
modéliser fait "naturellement" intervenir plu-
sieurs niveaux ; tels celui des molécules,
membranes, cellules, groupes de cellules, etc. ;
qu'il est nécessaire de représenter et ainsi pou-
voir étudier les liens entre ces niveaux.
Les systèmes multi-agents font partie des ap-
proches intégrant à la fois les aspects indivi-
duels et collectifs d'un système. Ils ont ainsi
permis la modélisation de phénomènes où des
individus en interactions locales font émerger
un comportement collectif et permettent de
répondre à des questions quant aux relations
entre comportements individuels et propriétés
collectives.
De manière plus générale, cette question s'ins-
crit dans l'étude des systèmes complexes. Ain-
si dans (Chavalarias, 2008), les auteurs écri-
vent : "La complexité des systèmes naturels et
sociaux provient de l’existence de plusieurs
niveaux d’organisation correspondant à diffé-
rentes échelles spatio-temporelles. L’un des
principaux défis de la science des systèmes
complexes consiste à développer … des mé-
thodes de modélisation capables de saisir
toutes
les dynamiques d’un système par
l’intégration de ses activités à de nombreux
niveaux, souvent organisés hiérarchiquement."
Cet article tente d'apporter une première ré-
ponse à ce défi.
Après avoir situé la problématique de la modé-
lisation multi-niveaux, nous proposons de re-
présenter un phénomène multi-niveaux sous la
forme de plusieurs modèles (ici on se limitera
aux niveaux micro et macro) en interaction
(partie 2). Cette vision structure la réflexion en
rendant explicites les niveaux de représenta-
tion et leurs relations. Après avoir décrit un
exemple de phénomène multi-niveaux simple,
le flocking (partie 3), nous nous appuyons
(partie 4) sur les concepts du méta-modèle
AA4MM (Agent et Artefact pour la Multi-
Modélisation) dédié à ce type de représenta-
tion pour réaliser une preuve de concepts au-
tour de l'exemple choisi (partie 5).
2. La modélisation multi-niveaux
L’étude des phénomènes collectifs nécessite
donc au moins deux niveaux de représenta-
tions (individuel et collectif). Les SMA offrent
un paradigme intéressant car on a deux ni-
veaux de discours qui sont le niveau micro
(l'agent) et le niveau macro (le système). Ce-
pendant seul le niveau micro y est traditionnel-
lement explicitement représenté, le niveau
macro se contente le plus souvent d'être obser-
vé mais n'est pas défini en tant que tel. Par
conséquent, ce niveau n'existe que par la pré-
sence d'un observateur extérieur au système et
ne prend pas place dans un processus de modé-
lisation. C'est ce que (Quijano, 2010) décrivent
comme une approche "mono-niveau dans la
conception et bi-niveaux dans l’analyse des
comportements produits".
Il existe toutefois un certain nombre de tra-
vaux qui vont au delà de cette approche.
(David, 2009, David 2010, David 2011) pro-
posent une démarche pour réifier les propriétés
émergentes. Une première étape (processus
d'introspection) consiste en la détection des
propriétés émergentes. Cette détection s'appuie
sur des connaissances du phénomène étudié.
Ensuite ces propriétés sont réifiées (si besoin)
sous la forme d'un agent émergent qui sera
doté de propriétés et comportements. Enfin, il
est possible de représenter l'influence de la
propriété émergente sur le système sous la
forme d'un élément d'interposition qui pourra
modifier la perception et/ou l'influence des
agents au niveau micro.
(Quijano, 2010) proposent une première ana-
lyse des manières dont peuvent être couplées
des organisations multi-agents multi-niveaux à
partir de différentes expériences de modélisa-
tion. Ils distinguent trois catégories de sys-
tèmes selon le type de couplage qui est réalisé
entre les modèles associés à ces niveaux. Ils
retiennent qu'il faut pouvoir intégrer des mo-
dèles existants aux formalismes potentielle-
ment hétérogènes, ainsi que de pouvoir détec-
ter, réifier et détruire dynamiquement les
structures émergentes.
Traounez (Traounez, 2005) analyse le système
au niveau micro pour détecter puis réifier des
propriétés émergentes (en l'occurrence des
tourbillons). De plus, il utilise une structure de
donnée récursive pour représenter leur envi-
ronnement à des échelles spatiales différentes.
Cette représentation peut se rapprocher de
celle de (Marilleau, 2008). Néanmoins, ces
représentations correspondent à un change-
ment d'échelle (plus ou moins précise) mais
pas un changement de niveau de description.
Ces travaux considèrent tous que pour étudier
un phénomène complexe à différents niveaux
de description, il est nécessaire de représenter
explicitement chacun des niveaux, de détecter
puis réifier (Bonabeau, 1997) (si besoin) les
propriétés collectives, et enfin, il doit être pos-
sible de contraindre le niveau micro à partir de
considérations du niveau macro.
(David, 2010) (Traounez, 2005) proposent
différents concepts mais
ils sont pensés
comme intégrés dans un tout. Ils n'abordent
les différents couplages
qu'insuffisamment
possibles entre les niveaux (tels qu'évoqués
dans (Quijano, 2010)). Notamment, les ques-
tions de comment représenter un phénomène à
partir de modèles différents, de comment for-
maliser les couplages entre modèles qui cor-
respondent aux relations entre niveaux de des-
criptions sont encore ouvertes.
(Bourgine, 2008) propose un cadre relative-
ment général qui apporte un début de réponse
à ces questions. Cette vision fait intervenir
explicitement les modèles utilisés pour chaque
niveau, ainsi que les relations entre ces ni-
veaux. Le principe général est résumé par le
schéma en figure 1.
L'idée sous-jacente est la suivante : on peut
décrire un phénomène à un niveau macro si
l’on est capable de caractériser ce phénomène
par un ensemble d'informations (noté Y) et que
l'on peut décrire l'évolution de Y temporelle-
ment sans avoir à faire référence au niveau
micro. Cette vision exprime les différents élé-
ments qui interviennent lors de la modélisation
multi-niveaux et la manière dont ils s'articu-
lent :
• X (resp. Y) correspond à l'ensemble
des informations représentant le phénomène au
niveau micro (resp. macro).
f (resp g) est une fonction qui décrit la
•
dynamique du phénomène au niveau micro
(resp. macro).
• e est une fonction d'interprétation
(émergence) permettant le passage du niveau
de description micro à celui macro. Elle cor-
respond aux méta-connaissances de (David,
2010).
i correspond à l'immergence, c'est à
•
dire, à l'influence du niveau macro sur le ni-
veau micro (ce que (David, 2010) appelle
fonction d'interposition). Cette influence modi-
fie le comportement au niveau micro.
Si cette vision permet de situer et mettre en
relation chacun des éléments, elle n'indique
rien quant à leurs expressions (Quels forma-
lismes pour exprimer e, i f ou g? Quelles cor-
respondances entre t et t' ? Etc.).
Figure 1 : Relations (d'après (Bourgine, 2008))
entre niveaux de description et évolution tempo-
relle du phénomène.
Nous proposons de faire un pas vers une clari-
fication de ce principe en envisageant chaque
niveau comme un modèle et les relations entre
eux comme des interactions.
La partie suivante présente un exemple jouet
de modélisation multi-niveaux faisant interve-
nir les différents éléments évoqués par (Bour-
gine, 2008). Nous décrivons ensuite le méta-
modèle AA4MM qui nous permet de décrire
cette représentation comme une société de
modèles interagissant ; puis de l'implanter et la
simuler.
3. Exemple de modélisation multi-
niveaux
Cet exemple volontairement simple servira à
illustrer notre proposition de modélisation
multi-niveaux et à montrer comment s'instan-
cient les différents concepts évoqués.
Les deux niveaux de modélisation du
3.1.
flocking
Nous prenons comme exemple les nuées d'oi-
seaux. Nous considérons deux niveaux de des-
cription : celui des oiseaux (microscopique) et
celui des nuées (macroscopique).
La modélisation au niveau microscopique re-
prend le modèle multi-agent développé dans
(Wilensky, 1998). L'état d'un oiseau est défini
par un identifiant, une position et une orienta-
tion. Son comportement se déduit de ses com-
portements de cohésion, alignement et sépara-
tion vis à vis des autres oiseaux. La figure 2
visualise un état du niveau micro.
Après avoir détecté les nuées, celles-ci seront
réifiées dans le modèle macro par un agent
situé au centre de gravité de la nuée et orienté
selon la direction moyenne des oiseaux qui la
composent, la taille est fonction de la disper-
sion. Ainsi, au fur et à mesure que les nuées
apparaissent ou disparaissent, on met à jour le
modèle au niveau macroscopique.
Figure 2: vue du niveau micro.
Au niveau macroscopique, une nuée est modé-
lisée par un agent caractérisé par une position,
une orientation et une taille. Nous supposons
de manière arbitraire que le comportement
d'une nuée se déduit de ses comportements de
cohésion, alignement et séparation vis à vis
des autres nuées.
Ce modèle macroscopique est une adaptation
du modèle de (Wilensky, 1998) qui prend no-
tamment en compte la taille de l'agent. Par
simplification, il ne gère pas les fusions ni les
séparations des nuées. La figure 3 visualise un
état du niveau macro.
Les influences mutuelles
3.2.
L’influence du niveau micro sur le niveau ma-
cro est fonction de l’interprétation que nous
ferons d'une nuée (Cavagna, 2008) : si plu-
sieurs oiseaux sont suffisamment rapprochés et
possèdent des orientations proches, ils consti-
tueront une nuée évoluant dans un déplace-
ment commun.
Figure 3: vue du niveau macro.
Nous supposons que l’influence du niveau
macro sur le niveau micro est la suivante : tous
les oiseaux appartenant à une nuée se dépla-
cent de la même manière et ont la même orien-
tation. Le modèle macroscopique calcule le
déplacement de chaque nuée (vecteur de tran-
slation v ). Nous utilisons ce vecteur de dépla-
cement global pour déplacer, au niveau micro
chacun des oiseaux appartenant à la nuée. On
remarquera qu'il faut donc étendre le modèle
de (Wilensky, 1998) pour prendre en compte
ce deuxième mode de déplacement au niveau
microscopique.
Enfin, nous supposons également dans un
premier temps que les dynamiques évoluent à
la même vitesse.
La correspondance entre ce multi-modèle et le
schéma inspiré de (Bourgine, 2008) s'effectue
comme suit :
•
•
• X correspond aux caractéristiques des
oiseaux,
• Y correspond aux caractéristiques des
nuées,
f est le modèle de déplacement des oi-
seaux,
• g est le modèle de déplacement des
nuées,
• e est le mécanisme de détection des
nuées,
i est l'influence des nuées sur le com-
portement d’un oiseau.
4. Instanciation avec AA4MM
Nous proposons de représenter ce modèle mul-
ti-niveaux sous la forme de modèles (ici on se
limitera aux niveaux micro et macro) en inte-
raction (émergence et immergence). Pour cela,
nous nous appuyons sur AA4MM, un méta-
modèle dédié à ce type de représentation.
Le méta-modèle AA4MM
4.1.
AA4MM (Siebert, 2011) modélise un phéno-
mène complexe comme un ensemble de mo-
dèles en interaction (ce que nous appellerons
par la suite un multi-modèle). Il s’inscrit dans
le paradigme multi-agent : à tout modèle est
associé un agent et les interactions sont sup-
portées par des artefacts (Ricci, 2007).
On retrouve ce type d'approche également
dans Reiscop (Desmeulles, 2009), Ioda (Kube-
ra, 2011) ou encore Geamas (Marcenac, 1998).
Les dynamiques du phénomène (micro/macro)
sont représentées par des modèles différents.
La dynamique globale du phénomène est si-
mulée grâce à
l'interaction des modèles.
L’originalité vis à vis d'autres approches de
multi-modélisation est d'envisager les interac-
tions de manière indirecte, supportées par un
environnement, et ainsi de modéliser explici-
tement le partage d'informations entre modèles
(couplage structurel).
L'intérêt d'un méta-modèle dans notre cas est
de disposer d'un cadre conceptuel dans lequel
nous pourrons décrire les niveaux de représen-
tation et la manière dont ils interagissent, c'est
à dire modéliser un système sous la forme de
dynamiques à différents niveaux ainsi que de
leurs relations (influences).
D'un point de vue méthodologique, cette vi-
sion oblige à expliciter les choix de modélisa-
tion relatifs à chacun des modèles et à leurs
interactions dès la phase de conception du
multi-modèle et nous contraint sur la manière
de les exprimer. La contrepartie est que
AA4MM possède des spécifications opéra-
tionnelles et des algorithmes prouvés concer-
nant la cohérence temporelle entre modèles qui
permettent d'implanter le multi-modèle et de le
simuler en ne devant coder qu'un nombre res-
treint de fonctions spécifiques à l’application
visée. En effet, les spécifications opération-
nelles permettent de disposer d’un intergiciel.
Cette approche a donné lieu à des preuves de
concepts avec Netlogo (Siebert, 2010) et une
application dans le cadre des réseaux mobiles
ad-hoc (Leclerc, 2010) notamment en réutili-
sant des modèles existants et hétérogènes.
Représentation multi-niveaux avec
4.2.
AA4MM
Nous allons maintenant expliciter la représen-
tation multi-niveaux à l’aide des composants
de AA4MM. Il repose sur trois concepts à par-
tir desquels il est possible de décrire un multi-
modèle :
1. le m-agent contrôle un modèle et prend
en charge les aspects dynamiques des
interactions de ce modèle avec les
autres modèles (figure 4a),
2. chacune de ces interactions (entre m-
agents) est réifiée par un artéfact de
couplage (figure 4b),
3. enfin l'artéfact d'interface réifie les in-
teractions entre un m-agent et son mo-
dèle (figure 4c).
a b c
Figure 4 : symboles des composants du méta-
modèle AA4MM (a) m-agent, (b) artéfact de cou-
plage, (c) artéfact d'interface et son modèle m.
Le comportement d’un m-agent correspond au
cycle :
•
lecture des informations en provenance
des artefacts de couplage,
• mise-à-jour et exécution de son modèle
via l'artéfact d'interface,
• écriture d’informations à destination
des artefacts de couplage.
Un artéfact de couplage propose des opéra-
tions d'écriture (un m-agent écrit les informa-
tions à transmettre), de transformations (chan-
gement d'unités par exemple), et de lecture (un
m-agent lit des informations).
Un artéfact d'interface autorise les opérations
suivantes sur le modèle : initialisation des
données, mise à jour des caractéristiques indi-
viduelles, exécution d'un pas de simulation.
Démarche de modélisation d'un phé-
4.3.
nomène multi-niveaux
La création d'un multi-modèle via AA4MM se
déroule en plusieurs étapes que nous déclinons
ci-après dans le cas de la modélisation multi-
niveaux.
La première étape consiste à définir le graphe
d'interaction entre les modèles, c'est à dire,
quelles informations sont échangées.
Dans notre cas, ce graphe se déduit assez sim-
plement. Chaque niveau de représentation est
associé à un modèle (noté m pour le niveau
micro et M pour le niveau macro). Les interac-
tions sont les relations d'émergence (notée e)
de micro vers macro et d'immergence (notée i)
de macro vers micro (voir figure 5).
Figure 5 : Graphe des relations entre modèles.
La seconde étape consiste à exprimer ce
graphe à l’aide des concepts de AA4MM. Ain-
si à chaque modèle, et donc à chaque niveau,
correspond un m-agent et un artefact
d’interface. Le m-agent Am contrôle (gère) le
modèle du niveau micro et le m-agent AM con-
trôle le modèle du niveau macro. A chaque
relation entre modèles correspond un artefact
de couplage entre leurs m-agents correspon-
dants (cf. figure 6).
La mise en oeuvre de ce diagramme nécessite
des extensions de AA4MM par rapport à ses
spécifications initiales. En détaillant notre
exemple, nous soulignons les manques et indi-
quons1 la manière dont nous y répondons ci-
après.
Concernant les artéfacts d'interface, nous réuti-
liserons ceux existant pour Netlogo dans la
bibliothèque AA4MM.
Dans une démarche bottom-up, initialement le
niveau micro comporte un certain nombre
d’oiseaux créés aléatoirement. Le m-agent Am
fait exécuter un pas de simulation, récupère les
identifiants, positions et orientations des oi-
seaux et les écrit dans l’artefact de couplage e.
L'artefact de couplage e reçoit donc du m-
agent Am la liste des positions et orientation de
chacun des oiseaux et les interprète pour cons-
truire des nuées. Ceci est réalisé par un algo-
rithme d’identification de cluster avec deux
paramètres : un seuil de proximité et un seuil
1 La place disponible dans cet article ne nous
permet pas de fournir l'intégralité des spécifi-
cations. Nous nous contentons d'indiquer les
modifications qualitativement.
d’orientation. Ces informations (liste de nuées
avec centre de gravité, orientation et taille)
sont alors disponibles pour le m-agent AM.
Figure 6 : Diagramme AA4MM de la représenta-
tion multi-niveaux.
Dans sa conception originelle, un artéfact de
couplage conserve le cardinal des informations
qui lui sont fournies lorsqu'il les transmet. La
relation d'émergence oblige à concevoir un
nouveau type d'artéfact (dit d'interprétation)
qui dans le cas de la relation d'émergence ré-
duit les informations (ici en taille). De plus, il
se peut qu'il n'y ait aucune nuée.
Le m-agent AM lit les informations interprétées
par l'artéfact de couplage e ; met à jour les
nuées répertoriées, ajoute les nouvelles et sup-
prime celles disparues dans le simulateur ; fait
exécuter un pas de simulation ; récupère les
nouvelles positions des nuées ; calcule les vec-
teurs de déplacement des nuées puis écrit ces
informations dans l'artéfact de couplage i.
On constate que le m-agent doit pouvoir ajou-
ter ou supprimer des nuées dans le modèle,
qu'il doit également traiter l'absence d'informa-
tions en provenance de l'artéfact d'émergence.
Nous avons, en conséquence, adapté le com-
portement du m-agent et ses spécifications à
ces besoins. L'artefact d’interface est étendu
pour supporter ajout et suppression de nuées
dans le modèle.
L'artéfact de couplage i reçoit une liste de
nuées accompagnées chacune de son vecteur
de déplacement, transforme ces informations
pour fournir une liste d'oiseaux accompagnées
de leur vecteur déplacement et les rend dispo-
nibles au m-agent Am.
Cet artéfact est également un artéfact d'inter-
prétation car il y a augmentation de la quantité
d'informations transmises.
Le comportement du m-agent Am consiste à lire
les données en provenance de l'artéfact de
couplage i, à faire exécuter un pas de simula-
tion en tenant compte des deux modes de dé-
placement, à récupérer les identifiant, position
et orientation de chacun des oiseaux, puis à
écrire ceux-ci dans l'artéfact de couplage e.
Comme il est possible qu'il n'y ait pas de nuée,
ce m-agent doit être étendu pour traiter l'ab-
sence d'information en provenance de l'artéfact
d'immergence.
5. Expérimentations
L'objectif des expérimentations est de montrer
la faisabilité de notre proposition et d'en illus-
trer l'intérêt et les possibilités.
Figure 7 : exécution du multi-modèle.
Nous avons donc implanté l'exemple du flock-
ing. La figure 7 correspond à une copie d'écran
de la simulation multi-niveaux. Il faut noter
qu’ici les modèles s’exécutent dans deux ins-
tances Netlogo (Wilensky, 1999) séparées.
Concernant l'intérêt de l'approche au niveau du
"multi-modélisateur", nous montrons son pou-
voir explicatif (cf 5.1), sa capacité à construire
différentes déclinaisons du multi-modèle par
changement de modèles (cf 5.2), de couplages
(cf 5.3) ou de dynamique temporelle (cf 5.4) et
à comparer ces déclinaisons (cf 5.5).
Les propriétés prouvées de AA4MM (cohé-
rence, causalité et coordination entre modèles
(Siebert, 2011)) facilitent le développement
des différentes déclinaisons.
Niveaux micro-macro explicites
5.1.
Figure 8 : croisement de plusieurs nuées (gauche
niveau micro, droite niveau macro).
L'existence de deux niveaux de description
distincts utilisant chacun un vocabulaire diffé-
rent (Muller, 2004) permet de rendre compte
de phénomènes, comme par exemple, expri-
mer explicitement le croisement entre plu-
sieurs nuées (invisible au niveau micro mais
visible au niveau macro, voir figure 8).
Influence du modèle macro sur le
5.2.
phénomène
Outre le modèle M décrit en section 3, nous
avons utilisé deux autres modèles (dérivés de
M) pour le niveau macro : M1 utilise un fort
facteur de séparation et de faibles facteurs de
cohésion et alignement ; M2 utilise de forts
facteurs de cohésion et alignement et un faible
facteur de séparation.
Phénomène sans immergence
5.3.
Nous souhaitons également étudier le compor-
tement du phénomène sans immergence. L'im-
plantation se déduit à partir de la figure 9 : les
composants inutiles sont supprimés et les m-
agents modifiés de la manière suivante : AM se
contente de lire les informations en prove-
nance de e, Am n'a plus besoin de lire les don-
nées en provenance de i (lequel a disparu).
Cette déclinaison sera notée m en figure 10.
Yt
Yt
e
e
xt
Xt+=
f
Figure 9 : couplage sans immergence, ni compor-
tement macro.
Couplage avec des échelles tempo-
5.4.
relles différentes
Nous reprenons notre exemple tel qu'en sec-
tion 3 mais en supposant maintenant des
échelles de temps différentes : il y a quatre pas
de simulation au niveau micro pour un au ni-
veau macro (noté ici M3).
Nous revisitons l'interprétation que nous fai-
sons de l'immergence : le déplacement macro
est décomposé linéairement en quatre dépla-
cements micro. L'artéfact de couplage i trans-
forme donc les données qu'il reçoit pour cons-
truire quatre listes associant à un identifiant un
quart de vecteur déplacement. Au niveau de la
cohérence temporelle, nous tirons parti de l'al-
gorithme d'exécution prouvé de AA4MM qui
gère les relations temporelles et ne modifions
que i et la correspondance temporelle au ni-
veau de AM3.
Comparaison des déclinaisons du
5.5.
multi-modèle
Dans notre exemple, l'évolution du nombre de
de nuées dépend de plusieurs facteurs : le
comportement individuel micro, et en cas
d'immergence du niveau macro au travers des
paramètres du comportement des nuées.
La figure 10 montre une comparaison de
l'influence de ces différents facteurs. Chaque
point d'une courbe correspond à 100 exécu-
tions.
Dans une démarche de modélisation, ce type
d'étude est important pour comprendre les re-
lations entre niveaux. Notre approche permet
de situer précisément quelle partie du multi-
modèle est impliquée.
Figure 10 : comparaison du nombre de nuées selon
l'influence de différents facteurs. Les notations m,
M, M1, M2 et M3 font référence aux modèles pré-
sentés précédemment.
6. Conclusion
Dans cet article, nous avons apporté une pre-
mière réponse au problème de la représenta-
tion multi-niveaux de phénomènes complexes.
Notre proposition, au niveau conceptuel, s'ins-
pire de (Bourgine, 2008) qui envisage la repré-
sentation multi-niveaux comme un couplage
entre plusieurs systèmes dynamiques, ce que
nous exprimons de façon modulaire sous la
forme de plusieurs modèles multi-agents en
interaction. Pour répondre aux défis de cohé-
rence, causalité et coordination entre ces mo-
dèles, nous nous appuyons sur le méta-modèle
AA4MM dédié à ce type de représentation.
AA4MM nous offre de par son approche mo-
dulaire une flexibilité que nous pouvons ex-
ploiter dans le cadre d’une modélisation multi-
niveaux. Cela permet facilement le change-
ment de modèles, le changement d’échelle
temporelle, le changement de couplage entre
niveaux ; ainsi que la réutilisation de modèles
existants.
La démarche sous-jacente propose de partir du
problème de modélisation multi-niveaux, pour
établir un graphe de
relations
(émer-
gence/immergence) entre les deux niveaux
micro/macro que nous traduisons sous la
forme d’un diagramme AA4MM. Ce dia-
gramme est alors
implanté à partir de
l’intergiciel de AA4MM.
Ce travail pose des bases conceptuelles relati-
vement simples pour aborder une question
encore largement ouverte de la modélisation
des systèmes complexes. Nous envisageons
d'étendre cette approche à des systèmes qui ne
sont plus simplement bi-niveaux (micro-
macro), et de la confronter à d'autres phéno-
mènes dont les relations d'émergence et d'im-
mergence prennent d'autres formes.
Remerciements
Les auteurs remercient l'un des relecteurs pour
ses remarques constructives.
Références
Ballet P. BioDyn, une approche interdisciplinaire
pour la création et le développement de logiciels
intégrés de et de simulation en biologie computation-
nelle. Mémoire d'HDR, Université de Bretagne Occi-
dentale, 2012.
Bonabeau, E., Dessalles, J-L. Detection and emer-
gence. Intellectica, 25 (2), 85-94, 1997.
Bourgine, P. Distributed Problem Solving in natural
and artificial complex systems. Invited talk in Engi-
neering Societies in the Agents World IX, 9th Inter-
national Workshop, ESAW 2008.
Cavagna A., Giardina I., Orlandi A., Parisi G., Pro-
caccini A. The STARFLAG handbook on collective
animal behaviour: Part II, three-dimensional analy-
sis. Animal Behaviour. Volume: 76, Issue: 1, Pages:
237-248, 2008.
Chavalarias D., Bourgine P., Perrier E., Amblard F.,
Arlabosse F., Auger P., Baillon J.-B., Barreteau O.,
Baudot P., Bouchaud E. French Roadmap for com-
plex Systems 2008-2009, French National Network
for Complex Systems (RNSC), Paris Ile-de France
Complex Systems Institute (ISC-PIF) and IXXI,
Entretiens de Cargèse 2008, 2008.
David D., Courdier R. See Emergence as a Me-
taknowledge, a Way to Reify Emergent Phenomena
in Multiagent Simulations?, International Conference
on Agents and Artificial Intelligence (ICAART’09),
pp. 564-569, Porto, Portugal, Jan. 19-21, 2009.
David D. Prospective Territoriale par Simulation
Orientée Agent, Thèse de Doctorat, Université de La
Réunion, 2010.
David D., Payet, R. Courdier. Réification de zones
urbaines émergentes dans un modèle simulant
l’évolution de la population à La Réunion, Journées
Francophones sur les Systèmes Multi-Agents (JFS-
MA’11), pp. 63-72, Valenciennes, France, 17-19
Octobre 2011.
Desmeulles G., Bonneaud S., Redou P., Rodin V.,
Tisseau J. In virtuo experiments based on the multi-
interaction system framework: the reiscop meta-
model. CMES, Computer Modeling in Engineering &
Sciences, 2009.
Gil-Quijano J., Hutzler G., Louail T. Accroche-toi au
niveau, je retire l'échelle, Eléments d'analyse sur la
modélisation multi-niveaux dans
les simulations
multi-agents. Revue d'Intelligence Artificielle, Vol.
24, no 5, pp. 625-648, 2010.
Kubera Y., Mathieu P., Picault S. IODA: an interac-
tion-oriented approach for multi-agent based simula-
tions Autonomous Agents and Multi-Agent Systems,
pp. 1-41, 2011.
Leclerc T., Siebert J., Chevrier V., Ciarletta L., Fes-
tor O. Multi-Modeling and Co-Simulation-based
Mobile Ubiquitous Protocols and Services Develop-
ment and Assessment. In 7th International ICST Con-
ference on Mobile and Ubiquitous Systems (Mobiq-
uitous 2010), 2010.
Muller J.-P. Emergence of Collective Behaviour and
Problem Solving. A. Omicini, P. Petta, and J. Pitt
(Eds.): ESAW 2003, LNAI 3071, pp. 1–21, 2004.
Springer-Verlag, Berlin Heidelberg, 2004.
Marcenac P, Giroux S. GEAMAS: A Generic Archi-
tecture for Agent-Oriented Simulations of Complex
Processes. Applied Intelligence, Volume 8, Number
3, pp. 247-267, 1998.
Marilleau N., Cambier C., Drogoul A., Chotte J.-L.,
Perrier E., Blanchard E.. Environnement multi-
échelle à base de fractales pour la modélisation agent
d'écosystèmes. in Proc. JFSMA'08 René Mandiau et
Pierre Chevailler (eds), pp23-32, Cépaduès, 2008.
Ricci A., Viroli M., Omicini A. Give agents their
artifacts : the a&a approach for engineering working
environments in mas. In AAMAS '07: Proceedings of
the 6th international joint conference on Autonomous
agents and multiagent systems, pp601-603, New
York, USA, 2007.
Siebert J. Approche multi-agent pour la multi-
modélisation et le couplage de simulations. Applica-
tion à l'étude des influences entre le fonctionnement
des réseaux ambiants et le comportement de leurs
utilisateurs. Thèse de l'Université Henri Poincaré -
Nancy 1, September 2011.
Siebert J., Ciarletta L., Chevrier V. Agents and arte-
facts for multiple models co-evolution. Building
complex system simulation as a set of interacting
models. In Proceedings of the International Confer-
ence on Autonomous Agents and Multiagent Sys-
tems, in proc. of AAMAS 2010, May 10, 2010, To-
ronto, Canada, pp509-516.
Sloot P., Hoekstra A. Multi-scale modelling in com-
putational biomedicine Briefings in Bioinformatics,
Volume 11, Issue 1, pp. 142-152, 2010.
Traounez, P. Contribution à la modélisation et à la
prise en compte informatique de niveaux de descrip-
tions multiples. Application aux écosystèmes aqua-
tiques. Thèse de l'Université du Havre. 2005.
Troitzsch, K. Multilevel Simulation. In Troitzsch, K.,
Mueller, U., Gilbert, G., Doran, J., eds., Social Sci-
ence Microsimulation. Springer (1996) 107–120
Uhrmacher A., Degenring D., Zeigler B. Discrete
Event Multi-level Models for Systems Biology. in C.
Priami et al. (Eds.), Transactions on Computational
Systems Biology, LNBI 3380, pp. 66–89, Springer-
Verlag Berlin Heidelberg, 2009.
Wilensky, U. NetLogo Flocking model. http://ccl.
northwestern.edu/netlogo/models/Flocking. Center
for Connected Learning and Computer-Based Model-
ing, Northwestern University, Evanston, IL, 1998.
Wilensky, U. NetLogo. http://ccl.northwestern.edu/
netlogo/. Center for Connected Learning and Com-
puter-Based Modeling, Northwestern University,
Evanston, IL, 1999.
|
0705.1757 | 1 | 0705 | 2007-05-12T10:11:57 | Scalability and Optimisation of a Committee of Agents Using Genetic Algorithm | [
"cs.MA"
] | A population of committees of agents that learn by using neural networks is implemented to simulate the stock market. Each committee of agents, which is regarded as a player in a game, is optimised by continually adapting the architecture of the agents using genetic algorithms. The committees of agents buy and sell stocks by following this procedure: (1) obtain the current price of stocks; (2) predict the future price of stocks; (3) and for a given price trade until all the players are mutually satisfied. The trading of stocks is conducted by following these rules: (1) if a player expects an increase in price then it tries to buy the stock; (2) else if it expects a drop in the price, it sells the stock; (3)and the order in which a player participates in the game is random. The proposed procedure is implemented to simulate trading of three stocks, namely, the Dow Jones, the Nasdaq and the S&P 500. A linear relationship between the number of players and agents versus the computational time to run the complete simulation is observed. It is also found that no player has a monopolistic advantage. | cs.MA | cs | SCALABILITY AND OPTIMISATION OF A COMMITTEE OF AGENTS
USING GENETIC ALGORITHM
T. Marwala*, P. De Wilde*, L. Correia**, P. Mariano**, R. Ribeiro** V. Abramov***, N. Szirbik***, J.
Goossenaerts***
*Electrical and Electronic Engineering Department, Imperial College, Exhibition Road, London SW7
2BT, England
**FCT- Dept. Informatics, Universidade Nova Lisboa, 2825-114 Monte Caparica, Portugal
***Information & Technology Department, Faculty of Technology Management, Eindhoven University
of Technology, The Netherlands
ABSTRACT
A population of committees of agents that learn
by using neural networks is implemented to
simulate the stock market. Each committee of
agents, which is regarded as a player in a game,
is optimised by continually adapting
the
architecture of
the agents using genetic
algorithms. The committees of agents buy and
sell stocks by following this procedure: (1)
obtain the current price of stocks; (2) predict the
future price of stocks; (3) and for a given price
trade until all the players are mutually satisfied.
The trading of stocks is conducted by following
these rules: (1) if a player expects an increase in
price then it tries to buy the stock; (2) else if it
expects a drop in the price, it sells the stock; (3)
and the order in which a player participates in
the game is random. The proposed procedure is
implemented to simulate trading of three stocks,
namely, the Dow Jones, the Nasdaq and the
S&P 500. A linear relationship between the
number of players and agents versus
the
computational
time
to
run
the complete
simulation is observed. It is also found that no
player has a monopolistic advantage.
1.
In this work a population of committees of
agents is used to simulate the stock market.
Each committee of agents is viewed as a player
in a game. These players compete and interact.
The committee of agents [1] are optimised using
Introduction
genetic algorithm [2]. Perrone and Cooper [1]
introduced a committee of networks, which
optimises the decision-making of a population
of networks. They achieved this by assuming
that the trained networks were available and
then assigning to each network a weighting
factor, which indicates the contribution that the
network has on the overall decision of a
population of networks. The limitation of their
proposal is that in a situation where the problem
is changing such as the stock market the method
is not flexible enough to allow the dynamic
evolution of the population of networks. This
paper seeks
to fill
the
limitation on
the
committee procedure by ensuring
the
that
individual networks that make the committee are
allowed to dynamically evolve as the problem
evolves. This is achieved by employing genetic
algorithms [2]. The parameters defining the
architecture of the networks, such as the number
of hidden units, which form a committee, are
defined as design variables and are allowed to
evolve as the problem evolves. The network
attributes that are fit to survive replace those that
are not fit. On implementing genetic algorithm
to select the fit individuals three steps are
followed [2]: (1) crossover of network attributes
within the population; (2) Mutation of each
individual attributes; (3) and reproduction of the
successful attributes. The simple crossover, the
binary mutation and roulette wheel reproduction
techniques are used. Finally the proposed
technique is implemented to simulate the trading
of three stocks. The scalability of the number of
Structure of the simulation technique
agents and players in the simulations with
respect to computational time are investigated.
The evolution of
the complexity of
the
simulation as the players participate in more
trading is also investigated.
2.
The structure that is proposed consists of
committees of agents forming a player in the
stock market. Each agent contributes equally to
the overall decision-making of the player. The
simulation framework consists of a population
of these players that compete for fixed number
of stocks.
The agents learn using neural
networks. The schematic illustration of the
committee of agents is shown in Figure 1. The
structure of each agent evolves using genetic
algorithm such that its contribution to the overall
the
function of a committee adapts
to
evolutionary
time-varying nature of
the
problem. The characteristics of the agents that
evolve are the number of hidden units. The
numbers of hidden units are constrained to fall
within a given space, in this study 1 and 10. The
output activation function is randomly chosen to
be either linear or logistic [3].
Agent 1
Agent 2
Agent 3
. . . . . . .
Agent N
N
O 1
(cid:1)=
N
i
Agent
i
Figure 1: Schematic diagram representing the
committee of agents.
•
•
•
Each committee of agents known as a player has
trade stocks with other players. When prices of
stocks are announced, the players trade by
following these rules:
•
Once a price is announced, the committees
look at the current price and the future
price of stocks. The future price is
determined from the agents that that learn
using neural networks. For a player, the
predicted price is the average of the
prediction of each agent within
that
particular player.
If the predicted price of a stock is lower
than the current price, then the player tries
to sell the stock. If the predicted price for
the stock is higher than the current price,
then the committee tries to buy the stock.
At any given stage the committee is only
prepared to sell the maximum of 40% of
the volume of stocks it has.
The amount of stocks that a committee
buys or sells depends on, amongst other
factors,
the
If
the predicted price.
predicted price of a particular stock is x-%
higher
than
the current price,
the
committee tries to acquire x-% of the
volume available on the market of that
particular stock.
This simulation is started by choosing the
number of players that participate in the trading
of stocks together with the number of agents that
form a player. Then the agents are trained by
randomly assigning the number of hidden units
to fall in the interval [1 10]. The output
activation units are randomly chosen to be linear
or logistic. The agents are trained using the data
from the previous 50 trading days. The trained
agents are grouped into their respective players
and are then used predict the next price given
the current price. The players trade stocks using
the rules that are be described later on in the
paper. The schematic diagram of the simulation
is shown in Figure 2.
Mutation of hidden units of agents that make a
player
For each player agents that make are successful
reproduce at a high probability
Choose number of players and agents
Start
After 50 days have elapsed the performance of
each agent is evaluated and the number of
hidden units are transformed into 8 bits and
within each player exchange bits with other
players, a process called crossover. Thereafter,
the agents mutate at low probability. The
successful agents are duplicated while the less
successful ones are eliminated. Then the
networks are retrained again and the whole
process is repeated. When a price is announced
trading of stocks
the
is conducted until
consensus is reached [4]. At this state, the
Stop
Figure 2: Schematic diagram of the trading simulation.
Train the networks by randomising the network architecture. The number of
hidden units is randomly chosen
Evaluate the performance of networks on unseen data by letting
the players trade stocks
Crossover of hidden units of agents that make a
player
Evaluate the performance of networks
on new data by letting the players trade
for given prices of stocks
Introduction to Genetic Algorithms
overall wealth of the committees does not
increase as a result of trading.
3.
Genetic algorithms were inspired by Darwin’s
theory of natural evolution. In natural evolution,
members of the population compete with each
other to survive and reproduce. Evolutionary
successful individuals reproduce while weaker
members die. As a result the genes that are
successful are likely going to spread within the
population. This natural optimization method is
used in this paper to optimize the decision of a
committee of agents in Figure 1. The basic
genetic algorithm suggested by Holland [4] is
implemented.
The algorithm acts on a
population of binary-string
chromosomes.
These chromosomes are obtained by using the
Gray algorithm [5]. Each of these strings is
discretised representation of a point in the search
space. Here we are searching for the most
optimum combination of architectures that form
a committee and that give the least errors.
Therefore the objective function is the error
given by committee of agents. On generating a
new population three operators are performed:
(1)
crossover;
(2) mutation;
(3)
and
reproduction. Just like in natural evolution, the
probability of mutation occurring is lower than
that of crossover or reproduction. The crossover
operator mixes genetic
information
in
the
population by cutting pairs of chromosomes at
random points
along
their
length
and
exchanging over the cut sections. This operator
has a potential of joining successful operators
together. Simple crossover [4] is implemented
in this paper. The mutation operator picks a
binary digit of the chromosomes at random and
inverts it. This has the potential of introducing
population
to
the
new
information.
Reproduction
takes successful chromosomes
and reproduces them in accordance to their
fitness function. The fit parameters are allowed
to reproduce and the weaker parameters are
eliminated. This is done using the roulette
wheel [2] procedure.
4. Application: Simulating
market
stock
the
The example that is considered in this study is
the trading of three stocks, namely: (1) the Dow
Jones; (2) NASDAQ; (3) and S&P 500. The
time-histories of the stocks are downloaded
from the Internet and used to train agents. For a
given set of price of these stocks the committee
of agents predict the future prices of stocks. The
following procedure is followed:
mnt
.
=
mnt
-
t(mn
in
4.
3.
D
p
prices
change
p
)
1. Using the time histories of the stocks
generate N numbers of players trading M
number of stocks. Each player consists of
k-trained networks that form a committee.
2. Given the current price of pmt of the mth
stock the at time t, the nth player predicts
the price of the mth stock pmn(t+1) at time
t+1.
Evaluate
p(
the
+1
)
p
mnt
For the nth player mth stock, calculate the
factor
decision
D=
df
Qp
is
the
1 where Q
mnt
imi
mnt
„=
mi,
maximum quantity of stocks available for
the mth stock.
5. Randomly choose the order in which the
players are allowed to play.
For
player
mnt <
df
)
df
min(
max(
buy the stock.
7. Repeat 3
8.
Set t = t+1;
9. Go to 4.
It should be noted that on implementing this
procedure the total number of stocks available is
kept constant [6]. The sample results showing
the net worth of players are shown in Figure 5.
This figure indicates that sometimes the players
with successful strategies do not necessarily
dominate indefinitely. This is due to the fact
that strategies that are successful in one time
frame are not necessarily successful at a later
time.
6
m
if
then sell else
6.
)
mnt
x 107
h
t
r
o
w
t
e
N
5
4
3
2
1
0
0
600
Day
200
400
Figure 3: The net worth of each player versus
trading days.
800
1000
1200
Scalability
5.
In this section some aspect about the scalability
of the simulations are studied. It is found that
the method proposed is scalable. However,
generally it was observed that the computational
time increases with the increase in number of
agents and players. A linear relationship exists
between the average computational time taken
to run the complete simulation and the number
of players as well as the number of agents that
form a player. This may be seen in Figures 4
and 5.
900
800
700
600
500
400
300
200
)
s
e
t
u
n
i
m
U
P
C
(
n
o
i
t
a
l
u
m
i
s
e
t
e
l
p
m
o
c
e
h
t
n
u
r
o
t
n
e
k
a
t
e
m
i
t
U
P
C
5
10
15
30
25
20
Number of agents that makes a player: number of players is 20
35
40
Figure 4: CPU time versus the number of
players.
200
180
160
140
120
100
80
60
40
)
s
e
t
u
n
i
m
U
P
C
(
n
o
i
t
a
l
u
m
i
s
e
t
e
l
p
m
o
c
e
h
t
n
u
r
o
t
n
e
k
a
t
e
m
i
t
U
P
C
5
10
Figure 5: CPU time versus the number of agents.
15
30
25
20
Number of a players: the number of agents in a player is 4
35
40
6.
Complexity
In this section we present a study of the
complexity of the populations of agents that
make players of the game. In this paper we
view complexity as the measure of a degree of
variation in a population of agents. Each species
of agents form a dimension in space. Each
dimension has a variation indicating the level of
complexity of a population of that species. In
mathematical for this definition of complexity
may be written as:
N
s
=
i e
(cid:1)
i
=
i
1
Complexity
(1)
Figure 6 shows the average number of hidden
units of an agent that forms a player versus the
number of training conducted. This figure
shows that as the system evolves the number of
hidden units for a given player steadily
decreases and stabilizes around 3.
s
t
i
n
u
n
e
d
d
i
h
f
o
r
e
b
m
u
n
e
g
a
r
e
v
A
10
9
8
7
6
5
4
3
2
1
2
4
6
8
18
16
14
12
10
Number of adaptations − this player has 4 agents
20
22
24
Figure 6: Average number of hidden units of an
agent that forms a player versus the number of
training conducted.
committee of agents is found to be a feasible
approach to modelling a player in the stock
market.
Acknowledgement
This work has been carried in the framework of
research project No. IST-1999-10304 supported
by Commission of the European Communities,
European Union.
Reference:
1. Perrone, M.P. and Cooper, L.N., (1993)
When
networks
disagree:
ensemble
methods for hybrid neural networks Ed.
R.J. Mammone, Artificial Neural Networks
for Speech and Vision, Chapman and Hall,
London, UK, 126-142.
2. Goldberg, D.E., Genetic algorithms in
search, optimization and machine learning,
Addison-Wesley, Reading, MA, 1989.
3. Bishop, C.M., “Neural Networks
for
Pattern Recognition,” Oxford University
Press, 1995.
4. Holland, J., “Adaptation in natural and
artificial systems,” University of Michigan
Press, 1975.
5. Michalewicz, Z., “Genetic algorithms +
data structures = evolution programs,”
Springer-Verlag, 1996.
6. Mas-Colell, A., Whinston, M.D., and
Green, J., Microeconomic theory. Oxford
University Press, 1995.
5
4.8
4.6
4.4
4.2
4
3.8
3.6
t
u
p
t
u
o
r
a
e
n
i
l
/
c
i
t
s
i
g
o
l
h
t
i
w
s
t
n
e
g
a
=
s
e
n
i
l
d
e
t
t
o
d
/
d
i
l
o
s
−
y
t
i
x
e
l
p
m
o
C
3.4
0
5
10
15
Adptations − 10 players 4 agents
20
25
Conclusion
Figure 7: Complexity of species made of linear
and logistic output functions versus the number
of training conducted. Solid: Linear; Dashed:
Logistic
The graph showing the complexity of two
species i.e. logistic and linear output activation
functions versus time of training is shown in
Figure 7. This figure shows that on average the
complexity of the agents with linear output units
decreases as the time elapses. The complexity
of the agents with logistic output units is
approximately constant.
7.
A
simulation of
the
stock market was
successfully conducted. It is found that the
number of players and agents that form a player
that participate in the trading game are directly
proportional to the computational time taken to
run the simulation. It is further observed that no
player has the monopolistic advantage on the
prediction of the stock market. The simulation
also shows that as the time of the trading
elapses, the complexity of the players decreases.
This is due to the fact that as the time of trading
elapses the players become more adapted to the
time-varying nature of the problem, thereby
developing common features. Optimising a
|
0910.1865 | 1 | 0910 | 2009-10-09T21:27:36 | Towards Participatory Design of Multi-agent Approach to Transport Demands | [
"cs.MA"
] | The design of multi-agent based simulations (MABS) is up to now mainly done in laboratories and based on designers' understanding of the activities to be simulated. Domain experts have little chance to directly validate agent behaviors. To fill this gap, we are investigating participatory methods of design, which allow users to participate in the design the pickup and delivery problem (PDP) in the taxi planning problem. In this paper, we present a participatory process for designing new socio-technical architectures to afford the taxi dispatch for this transportation system. The proposed dispatch architecture attempts to increase passenger satisfaction more globally, by concurrently dispatching multiple taxis to the same number of passengers in the same geographical region, and vis-avis human driver and dispatcher satisfaction. | cs.MA | cs | IJCSI International Journal of Computer Science Issues, Vol. 4, No. 1, 2009
ISSN (Online): 1694-0784
ISSN (Print): 1694-0814
Towards Participatory Design of Multi-agent
Approach to Transport Demands
10
Yee Ming Chen1 , Bo-Yuan Wang
Department of Industrial Engineering and Management
Yuan Ze University
135 Yuan-Tung Rd., Chung-Li, Tao-Yuan.
Taiwan, ROC.
1E-MAIL: [email protected]
Abstract
The design of multi-agent based simulations (MABS) is up to
now mainly done in laboratories and based on designers’
understanding of the activities to be simulated. Domain experts
have little chance to directly validate agent behaviors. To fill this
gap, we are investigating participatory methods of design, which
allow users to participate in the design the pickup and delivery
problem (PDP) in the taxi planning problem. In this paper, we
present a participatory process for designing new socio-technical
architectures to afford the taxi dispatch for this transportation
system. The proposed dispatch architecture attempts to increase
passenger satisfaction more globally, by concurrently dispatching
multiple taxis to the same number of passengers in the same
geographical region, and vis-`a-vis human driver and dispatcher
satisfaction.
Key words: Multi-agent, Pickup and Delivery Problemt,
Simulation.
1. Introduction
Transportation systems are among the most ubiquitous and
complex large-scale systems found in modern society. In
many urban cities, public transportation systems are
broadly accepted as the preferred transportation alternative
for commuting to work, performing errands, or traveling to
social events. Taxis are a convenient means of public
transport in many countries. In providing quality customer
service, fast and efficient fleet dispatching is essential
[1,2]. The major focus of taxi dispatch systems has been
primarily on reaching individual passengers in the shortest
time possible to enhance passenger satisfaction. In the taxi
system, most fares start with a phone call. A customer
calls the taxi central and provides his or her location and
desired destination. The taxi central assigns the delivery
task to a taxi driver and drives his taxi to the customer.
Once the customer gets aboard the taximeter starts running
until the destination is reached. Abstracting from this
normal situation we touch the topic of the Pickup and
Delivery Problem (PDP) [3,4,5]. Various researches have
been done in this field to optimize the performance or
profit of the taxi companies. This means reaching the
passengers via the shortest real-time paths possible.
However,
merely increasing individual passenger
satisfaction, as is the current practice, is a local endeavor,
in that it entails assigning the nearest taxi to a customer
prioritized in a first come first serve queue, without
considering the effects of the assignment on other awaiting
customers in the request queue. To improve taxi fleet
service performance, ideally, we should simultaneously
and optimally assign taxis to service all customer bookings
that are made within the time window. This is a
challenging problem confronting current taxi dispatch
systems.
The classic way to solve PDP’s is to use heuristic
algorithms [6]. This is a centralized approach in which a
algorithms calculates the best routes for all the vehicles. It
results in a fully optimized solution for delivering the
goods in the minimum amount of time and costs with the
resources available. The disadvantage is that you need to
know all pickup and delivery points in advance. To deal
with dynamic environment new approaches were
introduced. One of them is the multi-agent approach. In
multi-agent systems several agents work together to find
the best solution for a problem [7].
In this paper, we focus on the multi-agent based
simulations used for a class of problems that treats the
real-time collaboration of human beings having very
different perceptions and actions. We are implementing an
agent-based simulator for this collaborative work. Each
actor is modeled by an agent which is itself replaceable by
a human actor in the simulations. We model the interaction
between the multi- agent by using AnyLogic [8].
2. Taxi dispatch architecture
In the current centralized taxi dispatch architecture in use
by a taxi operator in most of urban cities, incoming taxi
service requests are queued on a first come first serve basis
at the control center. For each passenger (mobile phone
booking) request, available taxis in the vicinity of the
IJCSI
IJCSI
IJCSI International Journal of Computer Science Issues, Vol. 4, No. 1, 2009
11
passenger location are considered, and a taxi among them
is dispatched to service it, upon the human driver
accepting the booking job (Figure 1.). An efficient way is
to assign a nearby taxi that can traverse the shortest-time
path to the customer location, computed using real-time
traffic information.
Figure 1. Taxi dispatch architecture
3. Simulation tool for participatory taxi
dispatch system design
With the aim of integrating the experts in the design
process, we have implemented an early version of the
simulator to be designed, based on the multi-agent
approach used for taxi dispatch system design. Towards
this end, we propose using passenger, taxi, and control
center agents capable of collaboration. And, to effectively
utilize such software agents for taxi dispatch, we deploy
them in a multi-agent architecture for PDP tasks, proposed
as depicted in Figure 2.
Figure 2. Proposed multi-agent based simulation for participatory taxi
dispatch
3.1 Agents interface with users
An essential element for this type of “participatory taxi
dispatch” is the existence of user interfaces. Their goal is
not so much to help with the evaluation of the
collaborative procedures but more to contribute so that the
users can improve the agent behavior design [9,10]. They
thus provide a perspective on the way in which the agents
make their decisions. Each interface for a user is attached
to an agent which can play alone the role of this user or
IJCSI
IJCSI
IJCSI International Journal of Computer Science Issues, Vol. 4, No. 1, 2009
12
can assist him. To achieve this, an attentive study of this
agent capacity is needed for efficient human-agent (user-
assistant) interactions.
A user plays the PDP task firstly to understand the agent
decision-making mechanisms, secondly to validate this
mechanism and finally to improve it. While executing the
simulator, he observes the actions performed by other
agents and his assistant. This human-agent relation leads to
a kind of interactive learning [11,12]. To reach their
learning application, a process consisting of three agents is
envisaged (Figure 3):
Figure 3(a) Definition of a Control Center agent
Figure 3(b) Definition of a passenger agent
Figure 3(c) Definition of a taxi agent
We now summarize our major findings as the followings:
The agent is designed to be able to build a log of
validated/amended actions during interaction sessions
with the user. The formed log must be structured in
such a way the user can use it to correct agent
behaviors.
The action log is re-structured so that any agent can
use it to learn its behaviors.
The multi-agent are given the capacity to learn offline
their behavior from the validated/amended actions
conserved in the log.
The learning techniques are applied in the on-line
mode, i.e. during human-agent interactions.
All participating agents are in one of the designated areas
of operation, and the taxi queues at the control center are
updated accordingly. The communication protocol
supporting the dispatch operations can then be prescribed
as the figure 4.
Figure 4 Participating agents interactions
IJCSI
IJCSI
IJCSI International Journal of Computer Science Issues, Vol. 4, No. 1, 2009
13
4. Simulation and performance evaluation
To study the performance of the proposed multi-agent
based simulation for participatory taxi dispatch, we
conducted personal computer simulations on AnyLogic
(Figure 5(a).)
(http://kem.iem.yzu.edu.tw/
),
which
simulating taxi operations in a selected urban road network
of reasonable complexity. We focused on operational
efficiency, in terms of passenger waiting time versus
empty cruising time. In our simulations, passenger waiting
time is measured from the moment a customer raises a
request to the moment an assigned taxi arrives to pick up
the passenger; empty taxi cruising time is measured from
the moment it is available to the moment it accepts (or
commits to service) a negotiated assignment.
cruising times)( (Figure 5(b).) gathered from the control
center and taxi agents were saved into a text file for off
line performance analysis.
The taxi company has to employ their taxis to satisfy the
passengers around a city. In this city, taxi company
provides PDP service mode. However, smaller taxi fleet
scale will cause higher passenger idle time. Contrary,
larger taxi fleet scale will cause higher taxi idle time. So
what’s the most suitable taxi fleet scale is a very
important issue for taxi company. On the other hand, the
path planning of taxi fleet also affects the passenger
waiting time and taxi idle time. There are two existing
paths planning: Shortest distance and least time. Therefore,
what’s the most suitable path planning for taxi fleet is also
an important issue.
In order to deal with all of issues mentioned above, we
have to construct the multi-agent based simulation for
participatory taxi dispatch to simulate the operation of the
participatory taxi system in this city. And our performance
measures are passenger average waiting time, participatory
taxi average idle time and participatory taxi average
waiting time in queue. Then we will collect and analyze
the data obtained from simulation. Finally, according to
analysis results, we will make recommendations for the
taxi company. The details of decision analysis for taxi
PDP operation system simulation are described as follows.
Figure 5(a). The taxi dispatch within a road network in the proposed
simulator
Figure 5(b). The simulation of taxi PDP operation system
The simulation data (raw passenger waiting and empty
Figure 6 Taxi fleet scale
From figure 6, we can obviously realize that if the scale of
taxi fleet is less than 7, the passenger average waiting time
is higher than others. Contrary, if the scale of taxi fleet is
more than 7, the taxi average idle time is too high. The
most important thing is what the most feasible scale of
taxi fleet is. We decide the scale of taxi fleet is 11. The
reason is that when taxi fleet scale is larger than or equals
to 11, the passenger average waiting time begins
converging.
Second, after deciding the scale of electric taxi fleet, the
company wants to know which paths planning is better or
IJCSI
IJCSI
IJCSI International Journal of Computer Science Issues, Vol. 4, No. 1, 2009
14
more suitable for its’ taxi fleet and taxi company
operation. In order to find out which paths planning is
better; we vary the participatory taxi number from 5 to 20
to observe the variances of passenger average waiting time
and taxi average idle time.
scale of taxi fleet increases, the participatory taxi average
idle time also increases. Contrary, if the scale of taxi fleet
decreases, the participatory taxi average idle time will
decrease. So we can make a brief summary: The taxi
company applies least time as path planning is more
suitable for taxi fleet and passengers. Even though the taxi
fleet scale increases causes the participatory taxi average
idle time significantly increases, it also represents that the
small scale of taxi fleet can achieve the lower passenger
average waiting time.
1.2000
1.0000
0.8000
0.6000
0.4000
0.2000
0.0000
s
e
m
i
T
5
6
7
8
9 10 11 12 13 14 15 16 17 18 19 20
T axi fleet scale
Figure 7 Passenger average waiting time
From figure 7, we can clearly know all of the
passenger average waiting time is better under least time
path planning. And there is a trend in figure 7. First, if the
scale of taxi fleet increases, the passenger average waiting
time will decrease. Contrary, if the scale of taxi fleet
decreases, the passenger average waiting time will
increase. Second, we find out that if the scale of taxi fleet
is equal to or large than 11, the passenger average waiting
time begins converging. In brief, the company adds more
participatory taxi in the taxi fleet that only decreases small
passenger average waiting time.
s
e
m
i
T
10.0000
9.0000
8.0000
7.0000
6.0000
5.0000
4.0000
3.0000
2.0000
1.0000
0.0000
Least T ime
Shortest Distance
5
6
7 8
9 10 11 12 13 14 15 16 17 18 19 20
T ax i fleet s cale
Figure 8 Taxi average idle time
In figure 8, we can clearly know most of the
participatory taxi average idle time is worse under least
time path planning. And there is a trend in figure 8. If the
Least T ime
Shortest D istance
5. Conclusions
The new idea of multi-agent based simulation for
automating participatory taxi dispatch is introduced in this
paper. The proposed participatory taxi dispatch
architecture
realizes the idea using collaborative
assignment through a proposed multi-agent architecture.
Using GIS simulations on an urban road network model,
we evaluated the performance of the proposed dispatch
system, and showed that, even on a basic infrastructure
(Fig. 1), the distributed multi-agent system approach is
promising in terms of improvements in operational
efficiency over the existing centralized approach.
Acknowledgements
This research work was sponsored by the National Science
Council, R.O.C., under project number NSC97-2221-
E-155-039.
[3]
References
[1] D. H. Lee, H. Wang, R. L. Cheu, and S. H. Teo, “A taxi
dispatch system based on current demands and real-time
traffic information,” Transportation Research Record, vol.
1882, pp. 193–200, 2004.
[2] Z. Liao, “Real-time taxi dispatching using global
positioning systems,” Communications of the ACM, vol. 46,
no. 5, pp. 81–83, May 2003.
J. Kozlak, J.C. Créput, V. Hilaire and A. Koukam,” Multi-
agent approach to dynamic pick-up and delivery problem
with uncertain knowledge about future transport demands”.
Fundamental Informaticae 71, p. 27-36,2006.
[4] N. Neagu, K. Dorerand M. Calisti,” Solving distributed
delivery problems with agent-based
technologies and
constraint satisfaction techniques”, Whitestein Technologies
AG, Zurich, Switzerland, 2006.
[5] C. Cubillos, B. Crawford, and N. Rodríguez, ,”Distributed
Planning for the On-Line Dial-a-Ride Problem”. Lecture
Notes in Computer Science (including subseries Lecture
Notes in Artificial Intelligence and Lecture Notes in
Bioinformatics) 4742 LNCS: pp 160-169,2007.
J. Renaud, F. F. Boctor, and J. Ouenniche. “A heuristic for
the pickup and delivery traveling salesman problem”,
Comput. Oper. Res.,27(9): pp.905–916, 2000.
[6]
IJCSI
IJCSI
IJCSI International Journal of Computer Science Issues, Vol. 4, No. 1, 2009
15
[7] H. Laıchour, S. Maouche, R. Mandiau,” Traffic control
assistance in connection nodes: multi-agent applications in
urban transport systems”, Comput. Int. Sci. J. 1 ,pp.37–42,
2002.
[8] Xjtechnologies
software Anylogic® v5.2 package.
http://www.xjtek.com/,2005.
[9] H. Ezzedine, A. Trabelsi, C. Kolski,” Modelling of agent
oriented interaction using petri nets, application to HMI
design for transport system”, P. Borne, E. Craye, N.
Proceedings CESA2003 IMACS
Dangourmeau (Eds.),
Multiconference Computational Engineering in Systems
Applications, Lille, France, July 9–11, Ecole Centrale Lille,
Villeneuve d’Ascq, , pp. 1–8, 2003.
[10] H. Ezzedine, A. Trabelsi and C. Kolski,” Modeling of an
interactive system with an agent-based architecture using
Petri nets, application of the method to the supervision of a
Mathematics and Computers in
transport system”.
Simulation, 70:pp 358–376, 2006.
[11] H. Ezzedine, C. Kolski, and A. Pe’ninou, “ Agent-oriented
design of human-computer interface:application to
supervision of an urban transport network” . Engineering
Applications of Artificial Intelligence 18: pp 255–270, 2005.
[12] M. Majid, A. Aickelin, and P. O. Siebers, “ Human
behaviors modeling for discrete event and agent based
simulation : A Case Study”. Annual Operational Research
pp 111-158,2007.
Yee Ming Chen is a professor in the Department of
Industrial Engineering and Management at Yuan
Ze University, where he carries out basic and
applied research in agent-based computing. His
current research interests include soft computing,
supply chain management,
and system
diagnosis/prognosis.
Bo-Yuan Wang is a graduated student in the
Department of Industrial Engineering and
Management at Yuan Ze University,, where he
is studying basic and applied research in
agent-based programming.
His current
research
interests
include web-based
programming and system analysis/synthesis.
IJCSI
IJCSI
|
1307.0284 | 2 | 1307 | 2013-07-03T09:06:09 | The effectiveness of altruistic lobbying: A model study | [
"cs.MA",
"cs.SI",
"eess.SY",
"math.OC",
"physics.soc-ph"
] | Altruistic lobbying is lobbying in the public interest or in the interest of the least protected part of the society. In fact, an altruist has a wide range of strategies, from behaving in the interest of the society as a whole to the support of the most disadvantaged ones. How can we compare the effectiveness of such strategies? Another question is: "Given a strategy, is it possible to estimate the optimal number of participants choosing it?" Finally, do the answers to these questions depend on the level of well-being in the society? Can we say that the poorer the society, the more important is to focus on the support of the poorest? We answer these questions within the framework of the model of social dynamics determined by voting in a stochastic environment. | cs.MA | cs | The effectiveness of altruistic lobbying: A model study
P.Yu. Chebotarev, Z.M. Lezina, A.K. Loginov, Ya.Yu. Tsodikova
Institute of Control Sciences of the Russian Academy of Sciences, Moscow, Russia
1. Introduction
Altruistic lobbying is lobbying in the public interest or in the interest of the least protected part of the
society. This “or” is the point: it is necessary to bear in mind that an altruist has a wide range of strategies, from
behaving in the interest of the society as a whole to the support of the most disadvantaged ones. How can we
compare the effectiveness of such strategies? The second question is: “Given a strategy, is it possible to assess
the optimal number of participants choosing it?” Finally, do the answers to these questions depend on the level
of well-being in the society? For example, can we say that the poorer the society, the more important is to focus
on the support of the poorest? We answer these questions within the framework of the model of social
dynamics determined by voting in a stochastic environment [1–5].
Consider a society consisting of n members (agents); each of them is characterized by a real scalar
interpreted as the utility (or capital) level; a negative value is naturally interpreted as a debt. Let the initial
distribution of capital be given. A proposal of the environment is a vector of increments of individual capitals.
Let these increments be random variables; in the simplest case, we assume that they are independent and
identically distributed with mean μ and standard deviation σ. The environment generates a series of proposals
each of which is put to the vote. Every agent takes part in the voting and has one vote. With some voting
procedure, the profile of votes is converted into a collective decision: the proposal is approved or rejected. The
approved proposals are implemented: the participants get the capital increments specified in the proposal.
Considering a large series of votes, one can explore the dynamics of the vector of agents’ capital: in different
environments, with different social attitudes, and with various voting procedures. An interesting version of the
model is that with ruining: the agents whose capital values become negative are ruined.
2. A study of altruistic lobbying
Consider a society consisting of two categories of agents: selfish and altruistic ones. An egoist votes for
a proposal if and only if this proposal increases his capital.
As noted in the introduction, the altruists have a wide range of strategies. Consider the following type
of strategy. We order all agents by the increase of the current capital value. Since the capital increments are
real-valued random variables, we can assume that all capitals are different. Let an integer be fixed. For
the current proposal, one calculates the total capital increment of poorest agents. An altruist supports the
proposal if and only if this total is positive, no matter what happens to his own capital. If , then the
altruist supports those proposals that enrich the society as a whole. When is smaller, then he supports more
or less numerous “lower” stratum of the society.
Let K be the same initial capital of all the agents. Assume that the distribution of capital increments is
Gaussian: ( ) Consider the case where bankrupt agents drop out. Let m be the number of steps of voting
constituting the “game”. The strategy of altruists is determined by . As a criterion of the effectiveness of this
strategy we consider the relative number of participants that “survive” till the end of the game. Another
important parameter is the number (percentage) of altruists in the society.
We study the following question: “How the effectiveness of altruists’ strategy depends on their
proportion and the threshold at different parameters μ and σ?” In other words, “What is the optimal
proportion of altruists in the society and what is their optimal strategy in a favorable (μ > 0), neutral (μ = 0),
and unfavorable (μ < 0) environment?”
Some simulation results are as follows. Let the society consist of agents; the number of
altruists, m, varies. The experiments are conducted at σ = 12; game lasts 500 steps. On the horizontal axes in
Fig. 1, we have the number of altruists, m, and their strategy parameter ; along vertical axis, the relative
number of agents at the end of the game. In the diagrams, μ and the initial capital K of the agents are also
shown. Some results are as follows.
1. In a neutral environment (μ = 0) and with the support of the poorest ( is small), the number of
altruists should be small, or they waste their influence, resulting in ruining players outside the “support
screen”. At a high , we have saturation with the increase of the number of altruists. With K = 40, the
optimum is reached at = 50 and m > 40 (at higher values of m, saturation holds). In other words,
altruists should support the lower half of the community. With the extension of the support screen, the
effectiveness of the altruistic strategy declines.
Fig. 1.
2. In an unfavorable environment (μ = –0.5) and a high initial capital (K = 130), the picture is very
similar. The only significant difference is that there is no pronounced effect of reducing the
effectiveness of the strategy with the increase of the right border of the support screen. Maximum is
reached at n0 = 30 and m = 10, but it does not change significantly with an increase of these parameters.
3. In an unfavorable environment (μ = –0.5) and a lower initial capital (K = 40), the maximum is reached
at n0 = 80 and m = 60. This is a very interesting conclusion: in a really harsh environment, we have to
support everyone!
4. Finally, in a supportive environment with a high initial capital (μ = 0.5, K = 130), the picture changes
dramatically: we should support a thin layer of the poorest; the others will “resurface themselves”.
The main conclusion is simple: in rich and affluent societies, support of the poorest is effective. The
poorer is the society, the more “wasteful” is the support of the poorest. If you focus on this support, then the
zone of trouble grows. A more detailed analysis of the results reveals some more subtle phenomena as well.
References
1. V.I. Borzenko, Z.M. Lezina, A.K. Loginov, Ya.Yu. Tsodikova, and P.Yu. Chebotarev. Strategies of voting in
stochastic environment: Egoism and collectivism // Automation and Remote Control, 2006, V. 67. No. 2.
P. 311–328.
2. P. Yu. Chebotarev. Analytical expression of the expected values of capital at votin g in the stochastic
environment // Automation and Remote Control, 2006. V. 67. No. 3. P. 480–492.
3. P.Yu. Chebotarev, A.K. Loginov, Ya.Yu. Tsodikova, Z.M. Lezina, V.I. Borzenko. Snowball of cooperation and
snowball communism // Proceedings of the Fourth International Conference on Control Sciences. Moscow ,
2009. P. 687–699 (in Russian).
4. P. Yu. Chebotarev, A. K. Loginov, Ya. Yu. Tsodikova, Z. M. Lezina, V. I. Borzenko. Analysis of collectivism and
egoism phenomena within the context of social welfare // Automation and Remote Control, 2010. V. 71. No. 6.
P. 1196–1207.
5. P.Yu. Chebotarev, A.K. Loginov, Ya.Yu. Tsodikova, Z.M. Lezina, V.I. Borzenko. Voting in a stochastic
environment: The case of two groups // Automation and Remote Control, 2011. V.72. No.7. P. 1537–1547.
|
1509.05112 | 1 | 1509 | 2015-09-17T03:33:26 | Models and Representations for Fractal Social Organizations | [
"cs.MA"
] | Our subject is oriented towards investigation of potential ways of societal organization, that allow for collective intelligent organization and management of resources. The main objective of such organizations is the exploration of the social energy from the existing societies. We conjecture that an organizational model that fulfills the mentioned requirements is the Fractal Social Organization (FSO). Our goal is to prove and verify the effectiveness of this model by performing various simulations using the NetLogo environment, a tool that allows agent-based rapid prototyping. We begin by simulating trivial real life activities that demonstrate the main properties of the core unit of the FSO, namely the SoC. Further, more complex scenarios involving various nested SoCs are simulated. Two main simulation models are presented, allowing us to obtain preliminary results using the FSO concepts as a potential solution. In the first simulation model we demonstrate that by the use of FSO properties the individuals may benefit by receiving more qualitative healthcare services, while in the second simulation model we show how it might be possible to improve the fall detection systems by the use of FSO mechanism. | cs.MA | cs |
UNIVERSITY OF ANTWERP
Faculty of Science
Department of Mathematics and Computer Science
2014-2015
Models and Representations for Fractal Social
Organizations
Arianit Pajaziti
A thesis submitted in partial fulfillment
of the requirements for the degree of
Master of Computer Science:
Computernetworks and Distributed Systems
Promoter:
Vincenzo De Florio
Co-promoter:
Chris Blondia
Contents
List of figures
List of Tables
1 Introduction
1.1 Contributions and goals
. . . . . . . . . . . . . . . . . . . . . . . . .
1.2 Structure
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2 Service oriented Communities
2.1 Mutualistic relationships in SoC . . . . . . . . . . . . . . . . . . . . .
3 Fractal Social Organizations
4 First model
iii
vi
1
4
5
7
9
13
18
4.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
4.2
"Walk in park" activity . . . . . . . . . . . . . . . . . . . . . . . . . . 21
4.3 Car sharing activity . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
4.4
"Go to office" activity . . . . . . . . . . . . . . . . . . . . . . . . . . 24
4.5
"Houses on fire" event . . . . . . . . . . . . . . . . . . . . . . . . . . 27
4.6 Case study: Health care services . . . . . . . . . . . . . . . . . . . . . 32
4.6.1 Traditional Case
. . . . . . . . . . . . . . . . . . . . . . . . . 32
i
4.6.2 FSO Cooperation . . . . . . . . . . . . . . . . . . . . . . . . . 33
4.6.3
"Health care" event . . . . . . . . . . . . . . . . . . . . . . . . 33
4.6.4 Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
ii
5 Second model
43
5.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
5.2 Simulation Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
5.3 Simulation Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
5.4 Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
Conclusions
Future Work
A Exemplary FSO structural organization
60
62
66
List of Figures
2.1
In a) the SOA architecture and b) a simple representation of SoC [9].
2.2 SoC representation [8].
. . . . . . . . . . . . . . . . . . . . . . . . . .
8
9
2.3 Abstract representation of a Mutualistic relationship in SoC [12]. . . . 11
2.4 Merging of two SoC members in a group performing the same activ-
ity [12].
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
3.1 Exemplary FSO structure [8].
. . . . . . . . . . . . . . . . . . . . . . 14
4.1 A screenshot of the simulation area, with the initialized agents.
. . . 19
4.2 A screenshot of the work-space from the NetLogo environment used
for simulations.
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
4.3 A representation of the hierarchy of Service-oriented Communities
(SoC) that forms the FSO. . . . . . . . . . . . . . . . . . . . . . . . . 20
4.4 Mutualistic relationship in the "Walk in park" activity.
. . . . . . . . 21
4.5 A representation of the flow of "walk in park" activities in the se-
quence diagram. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
4.6 Message exchange between the agents and SoC coordinator.
. . . . . 23
4.7 Mutualistic Relationship in car sharing activity.
. . . . . . . . . . . . 24
4.8 A representation of the flow of car sharing activities in the sequence
diagram. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
iii
iv
4.9
Individuals performing the "go to office" activity by various means
of transportation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
4.10 A representation of the flow of "walk in park" activities in the se-
quence diagram. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
4.11 A simple graph showing the usage of various means of movement of
individuals for performing the "go to office" activity.
. . . . . . . . . 27
4.12 FSO collaboration: Agents from two distinct SoCs handling the
"House burning" event. . . . . . . . . . . . . . . . . . . . . . . . . . . 29
4.13 Agents from the Local community SoC handling the "House burning"
event solely.
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
4.14 Results from the execution of "Burning houses" event with the use
of FSO infrastructure.
. . . . . . . . . . . . . . . . . . . . . . . . . . 31
4.15 Results from the execution of "Burning houses" event without using
the FSO infrastructure for collaboration between SoCs.
. . . . . . . . 31
4.16 A Netlogo screenshot of phases that "individual 256" goes through in
case of "health-care" events.
. . . . . . . . . . . . . . . . . . . . . . . 35
4.17 Netlogo screenshot of phases that "individual 256" goes through in
case of "health-care service" events. . . . . . . . . . . . . . . . . . . . 36
4.18 A sequence diagram of the flow of messages in the case where the
main Local Hospital handles the "healthcare" services exception. . . . 37
4.19 A sequence diagram of the flow of messages in the case where "noam-
bulances" exception is handled.
. . . . . . . . . . . . . . . . . . . . . 37
4.20 A sequence diagram of the flow of messages in the case where "nodoc-
tors" exception is handled . . . . . . . . . . . . . . . . . . . . . . . . 37
4.21 Comparison of patients treated/died ratio for each of the three sce-
narios for various threshold values.
. . . . . . . . . . . . . . . . . . . 40
4.22 Average Querying time for each of the three scenarios for various
threshold values.
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
5.1 NetLogo screenshot of the simulation area with initialized agents.
. . 47
v
5.2 A representation of the FSO structure of the simulation model. . . . . 48
5.3 Number of alarm requests handled by the system for S1 and S2 with
a number of IC's ranging from 0 to 40.
. . . . . . . . . . . . . . . . . 55
5.4 FP ratio for S1 and S2 with a number of IC's ranging from 0 to 40.
. 56
5.5 FN ratio for S1 and S2 with a number of IC's ranging from 0 to 40.
. 56
5.6 Average social costs of S1 and S2 with a number of IC's ranging from
0 to 40.
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
5.7 Average waiting times with S1 and S2 and a number of IC's ranging
from 0 to 40.
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
List of Tables
5.1 Pseudo-code of the DA agents. . . . . . . . . . . . . . . . . . . . . . . 49
5.2 Pseudo-code of the CA agents. . . . . . . . . . . . . . . . . . . . . . . 50
5.3 Pseudo-code of the IC agents.
. . . . . . . . . . . . . . . . . . . . . . 51
5.4 Pseudo-code of the MA agents.
. . . . . . . . . . . . . . . . . . . . . 52
5.5 Pseudo-code of the PC agents. . . . . . . . . . . . . . . . . . . . . . . 53
5.6 Results of S1 scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . 58
5.7 Results of S2 scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . 59
vi
Chapter 1
Introduction
Present-day technological development has reached a level where people are sur-
rounded by digital devices and information at every moment. They have become
an inseparable part of our lives. By the use of the inter-connectivity capabilities of
such devices we are exposed to an extensive range of information resources and
services. As a result endless communication and collaboration forms have pio-
neered. The newly established communication channels have become our source
of knowledge, leading to new forms of socialization. This has set the ground for
knowledge-based [1], cyber-physical societies [2] with enormous communication and
organization opportunities. These socio-technical systems characterized by virtually
instantaneous dissemination of knowledge have produced novel forms of collective
intelligence and social interaction. The complexity level of such socio-technical sys-
tems or societies keeps growing in time, and as a consequence, state of the art
organizational and structural approaches are in demand in order to maximize the
output, while deriving efficiency.
The emergence of sought properties such as economic and social welfare for all;
sustainability with respect to natural ecosystems; and especially manageability and
resilience, highly depends on the way social organizations are designed. The fast
growth of the human population is inducing a number of unprecedented critical
situations on the natural ecosystems. In particular, natural resources are becoming
scarcer, and the old ways in the organization of the human action reveal all their
limitation. A more intelligent way of organization and management of resources is
1
2
urgently called for. The ultimate achievement would be a society operating as a
large pool of cooperating, intelligent, mobile resources. This requires learning how
to engineer social-energy-aware solutions.
A typical case in point is given by traditional organizations operating in domains
such as healthcare and crisis management. A common assumption characterizing
those organizations is the adoption of a strict client-server model. This produces at
least the following major consequences:
Fragility. The artificial distinction: an active and a passive side of society severely
affects quality-of-emergence [3, 26]. This classification introduces penalties in
the performance of the society, meaning that only a subset of the social actors
is available to serve the whole set. As well known, the fast growth and the
progressive aging of the human population are introducing shortages in the
subset of "service providers". The problem is no more the ever increasing
social costs. The management of a fragile society that is unable to serve
its citizens is of the most concern. Provided the current trends the state of
unmanageability is down the line.
Absence of a referral service. Although provided with an incomplete view of
the current state of the server and its availability, it is the expected from
the client to identify which server to bind to.
It is the users responsibility
to know, e.g., which emergency service to invoke, which civil organization to
refer to, which hospital to call first, and so on. There are existing Referral
services, however they mainly cover a single domain (i.e., healthcare) and
very specific cases. An example observed in [4] is the seamless transfer of
patient information from a primary to a secondary practitioner. Such services
mostly possess an incomplete view of the available resources, because of their
specialization.
Lack of unitary responses to complex requests. To the best of our knowledge
there is no referral service that is capable of providing with composite response
to complex requests such that the action, knowledge, and assets of multiple
servers are combined and orchestrated in an automatic way. Even electronic
referral systems in use today are mostly limited [5] and only provide prede-
fined services in specific domains. Observed examples of such systems include
3
SHINE [6] and SHINE OS+ [7]. As a consequence, in the face of complex
servicing requests calling for the joint action of multiple servers, the client is
basically left on its own. Societal organizations do not provide unitary re-
sponses nor assist the client in composing and managing them. Reasons for
this may be found in lack of awareness and also improper shift of service
identification responsibilities from the server to the client.
The described vulnerabilities of current organizations urge the need for mutating
our organizational paradigms and assumptions. An organizational approach that
enables the utilization of the full potential of our societies is on demand. Conse-
quently, the artificial distinction between an active and a passive subset should be
removed or at least significantly reduced. Instead of restricting and declining the
participation of roles, the organizations should promote the participation of roles,
thus act as a provider and enabler. Moreover, the organization should stimulate the
cooperation among the role players at all levels, from the citizens to the governing
institutions. The knowledge should flow among the organization's participating en-
tities highlighting the needs and requirements. By exchanging such information, the
organization will have the capability of self-orchestrating responses, which lead to
right and timely decisions.
Our society's challenge is to define one such organizational model, while preserving
the fundamental aspects of the identity of the organization. A further requirement
is learning how to guarantee the resilience of our evolved organizations.
A potential answer for new ways of societal organization was proposed by De Flo-
rio [8]. The proposed organizational model represents a hierarchical distributed
organization of socio-technical systems, called "Fractal Social Organization" (FSO).
The FSO is a nested organizational structure, built of the lower-level organizations,
named Service-oriented Communities (SoC) [9]. SoCs serve as the FSOs building
block.
FSO takes the responsibility as a generalized referral service for the orchestration
of complex social services.
In FSO, the rigid client-server scheme of traditional
organizations is replaced by service orientation, while bottleneck-prone hierarchies
are replaced by communities of peer-level members. Role appointment is not static
and directed by the organization, but rather voluntary and context-driven.
It is
our conjecture that the just stated new design assumptions allow for the creation
1.1 Contributions and goals
4
of smarter societal organizations able to match the complexity of our new complex
world. In the next section we state the main goals and contributions of this thesis.
1.1 Contributions and goals
Our subject is oriented towards investigation of potential ways of societal organiza-
tion, that allow for collective intelligent organization and management of resources.
The main objective of such organizations is the exploration of the social energy from
the existing societies. We conjecture that an organizational model that fulfills the
above mentioned requirements is the Fractal Social Organization (FSO). Our goal is
to prove and verify the effectiveness of this model by performing various simulations
using the NetLogo environment[13], a tool that allows agent-based rapid prototyp-
ing. The development in NetLogo environment is based on the Logo programming
language.
We begin by simulating trivial real life activities that demonstrate the main proper-
ties of the core unit of the FSO, namely the SoC. Further, more complex scenarios
involving various nested SoCs are simulated. Two main simulation models have been
implemented.1 The first one simulates a virtual world, where people perform daily
activities, while the normal flow is perturbed either by some natural event, which
causes damage on their properties or they start having health issues, and as a result
healthcare services are demanded. We compare the efficiency of the FSO approach
in contrast to the Traditional social ways of organization. A detailed description of
this model is provided in Chapter 4.
The second model simulates an Ambient Assisted Living (AAL) organization, where
elder persons residing at their home are in need for healthcare services. By struc-
turing additional agents based on the FSO approach we try to improve the accuracy
of traditional ITC system. A detailed description is provided in Chapter 5.
The objectives of the simulations are:
• Design and implementation of FSO models that mimic social communities.
• Validation of the properties and behaviors of such organizational approaches
in the healthcare domain.
1Link for downloading the simulation files:
https://www.dropbox.com/s/y2vlb1ftmm5a3ns/simulation_files.rar?dl=0
1.2 Structure
5
• Collection of measures and quantitative evidence of the performance of the
FSO organizations based on the simulated models. In particular we are inter-
ested in service turn-around-times and service coverage.
• Assessment of resilience and trustworthiness with respect to timeliness, and
availability. Goal is to verify that the strategies enacted by the FSO do not
impact negatively on the design goals of existing, "traditional" organizations
(e.g., the current hierarchical organization of a hospital).
The work conducted during this thesis led to the writing of two papers in close
collaboration with the Promoter of the thesis. The first one with the title "How
Resilient Are Our Societies? Analyses, Models, and Preliminary Results" has been
accepted in the proceedings of the "Third World Conference on Complex Systems"
(WCCS15)2. The second paper with the title "Tapping Into the Wells of Social
Energy: An Example Based on Falls Identification" is submitted in "The 17th In-
ternational Conference on Information Integration and Web-based Applications &
Services" (iiWAS15)3.
1.2 Structure
The thesis is organized into four main chapters. In Chapter 2 we begin by describing
the main characteristics and properties of Service oriented Communities (SoC). In a
separate section we describe the establishment of Mutualistic Relationships within
the SoC communities. In Chapter 3 we give the main definitions of the Fractal Social
Organizations and describe their structure, based on the SoCs. Further, Chapter 4
introduces the first simulation model. Here we discuss the activities/events and the
implications they have on the individuals agents. The main focus is in the Health
care services case study. The results of the performed experiments are provided in
a separate section within this chapter. Chapter 5 describes the second simulation
model, namely the Ambient Assisted Living organization and the provision of health
care services to elder persons agents. After the description of the case study a
detailed interpretation of the results is performed, where we discuss the extent to
2Web: http://mscomplexsystems.org/wccs15/
3Web: http://www.iiwas.org/conferences/iiwas2015/
1.2 Structure
6
which our goals are met. Finally we give a conclusion of the thesis and the Future
work in separate sections.
Chapter 2
Service oriented Communities
A Service oriented Community (SoC) represents a socio-technical system composed
of peer entities that share services under the supervision of a coordinating agent
[9]. These peer entities can be anything, including human beings, cyber-physical
things etc. The participants of a SoC are named "Members". Members have dis-
tinct capabilities and goals. In [8] the characteristics of the members are named as
"Viewpoints". Within a SoC the members do not have specific roles assigned, in
terms of service providers or receivers. Depending on the context a member may
benefit by receiving a certain service, while another one provides services. In this
sense upon the occurrence of an event, members react accordingly, thus becoming
active. By becoming active they play a role in the community. The service re-
quests, or offered services are published to a service registry. The same stands for
events. The service registry is handled by the coordinating member of the SoC.
Based on the service registry information the coordinator is capable of estimating
the capabilities and availability of community members. Thus for a given particular
situation a member is assigned to play a role that enables an action. By enrolling
a member for a particular action, a certain cost is estimated. Enrollments are done
with a goal that might change from case to case. Sometimes a focus is given in the
speed of realization, while on others safety may be the priority or cost-effectiveness.
The optimization goals may be individual or social oriented. The member of the
community that hosts the service registry and semantic processing can be seen as
a representation of the domain of community. When an event triggers or a situa-
tion happens the coordinator is responsible for recognizing the similarities between
7
8
members and binding them together. An advantage of such organization is that
it brings great communication and linkage between the members, with the aim of
maximizing resource usage.
As observed in [9], the above mentioned organization reminds us of Service Oriented
Architecture (SOA) used in distributed systems. The participating entities or mem-
bers here have the role of a service, which is able to provide or request for an action.
The coordination is done depending on the situation at hand and the roles available.
Figure 2.1 highlights the similarities between SoC and SOA.
Figure 2.1: In a) the SOA architecture and b) a simple representation of SoC [9].
The interaction of different roles within a SoC creates Mutualistic relationships.
This behavior is described in [12] where it was concluded that different actions
performed by an entity have an effect on the domain of other entities being it
positive or negative. A discussion of Mutualistic Relationships in SoC is provided
in the next section. A more detailed representation of the organizational structure
of a SOC is depicted in Figure 2.2.
It is observed that SoC functions as a flat society, or a cloud of social resources
orchestrated by the focal point -- the service coordinator. A drawback of such
organization is that if the number of members that are under the management of
a single coordinator becomes very large, then we would have an overload of the
functions of the coordinator, which results in slow service times. Additionally, the
concentration of orchestration functions on a single node results in a single point
of failure issue. These issues are overcome by the Fractal Social Organizations,
described in Chapter 3. FSO represent a scalable version of the SoC.
2.1 Mutualistic relationships in SoC
9
Figure 2.2: SoC representation [8].
2.1 Mutualistic relationships in SoC
Mutualistic relationships represent the basis of collaboration between species in
nature.
In a mutualistic relationship the participating entities benefit from each
other. An example in nature is the one of bees and flowers. The bees fly from
flower to flower to gather the nectar, necessary for nutrition of their colonies. As
they land in a flower the pollen residing on the flower is attached to their hairy
bodies. When the bee moves to the next flower, some of the pollen attached to their
body is rubbed off their body falling on the other flower, thus pollinating the plant.
The pollination is the process of pollen transfer from flower to flower allowing for
plant reproducing. Like this both entities benefit from the process, the bees gather
the food, while the plants get to be reproduced. This exchange of services between
participating entities represents a typical case of mutualistic relationship, where each
of them benefits from the process. A mutualistic relationship can involve more than
one participating couple, thus creating a chain. De Florio in [12] introduces some
core definitions of a mutualistic relationship model. In what follows we will describe
these main definitions.
2.1 Mutualistic relationships in SoC
10
Action function. Given two domains or systems X and Y, AX represents a set of
actions that can be performed in X, while AY corresponds to actions in Y. The
bijective function:
act : AX → Ay
is a mapping of actions from domain X to Y.
(2.1)
Evaluation function. Given a system X and it's action set AX the following func-
tion:
evalX : AX → IX
(2.2)
maps actions, to a semantic evaluation of significance in domain X. The eval-
uation resides within at least one of the three classes: positive, meaning that
the action was beneficial, neutral - action is evaluated as insignificant, and
negative - action is disadvantageous.
Mutualistic precondition. Given two systems X and Y, corresponding action
sets AX and AY, and IX, IY, the mutualistic precondition between X and Y
fulfills the following conditions:
∃a ∈ AX : evalX(a) ≥ 0 ∧ evalY (act(a)) > 0
∃b ∈ AY : evalY (b) ≥ 0 ∧ evalX(act−1(b)) > 0
(2.3)
(2.4)
The first condition states that an action in X is evaluated as positive and
neutral, and its impact in domain Y is positive, while the second condition
implies the vice-versa, an action in Y evaluated as positive/neutral has a
beneficial impact in domain X.
Mutualistic relationship. Two domains or systems X and Y are in mutualis-
tic relation, when X and Y trigger individual actions manifested as a form
of social behavior that fulfill the mutualistic preconditions. The mutualistic
relation between two domains is written as X R Y.
Extended Mutualistic relationship. Finally, in [12] the notion of Extended mu-
tualistic relationship is defined. Given two systems X and Y by removing two
conditions from formula (2.3) and (2.4) the author describes the systems where
2.1 Mutualistic relationships in SoC
11
the establishment of a mutualistic relationship, has a certain cost for the entity.
The modified preconditions are modified as follows:
∃a ∈ AX : evalY (act(a)) > 0
∃b ∈ AY : evalX(act−1(b)) > 0
(2.5)
(2.6)
Figure 2.3: Abstract representation of a Mutualistic relationship in SoC [12].
Service oriented Communities or SoCs use semantic description of members services
to allow their matching, manifested as a mutualistic or extended mutualistic rela-
tionship. In Figure 2.3 an abstract representation of a mutualistic relationship is
depicted. The figure shows two actors part of two different systems. The activity
A1 triggered by actor1 involves the provision of services that are requested by ac-
tor2, while activity A2 triggered by actor2 provisions services requested by actor1.
If there are multiple members part of a SoC that provide the same services, and
the corresponding activities fulfill each other, the activities can be merged into a
so-called group activity, and the members are bound together. An example from
daily life, would be the one where two individuals are willing to go for a walk with
someone. Both members are providing and requesting the same services, thus they
can be bound by the walking activity. This merging of two members is depicted in
Figure 2.4 as a green dashed box.
2.1 Mutualistic relationships in SoC
12
Figure 2.4: Merging of two SoC members in a group performing the same activ-
ity [12].
The newly formed member of the SoC provides walking services and is open to other
members (member3 or member4 from Figure 2.4) that might request the offered
service. This group of members requests for a place to go for walking, e.g. a park.
A 4th member that offers such service (location) can come in help. The creation
and functioning of members of a SoC as groups sets the basis for the Fractal Social
Organizations. FSO are described in detail in the following chapter.
Chapter 3
Fractal Social Organizations
Fractal Social Organizations (FSO), introduced in [8], represent a class of socio-
technical systems characterized by a distributed, bio-inspired hierarchical architec-
ture. FSO can be described as a greater organizational structure, whose building
blocks are the SoCs. The SoCs of various levels and sizes communicate with each
other, thus enabling the information flow over all FSO levels. This set of rules that
allows for spontaneous emergence of "social overlay networks" (SON) is called a
"canon" [14], [17]. The FSO structure, can be seen as a nested SoC, whose mem-
bers are other SoCs. The SoC components at the same time act as individual and
social entities.
The key characteristic of FSO is the peer-to-peer approach for the collaborating
nodes, meaning that based on the given situation, a node can play the role of a
coordinating agent, or a simple participating member offering certain services. The
communication between the various hierarchical levels is realized by the use of the
so-called "exception" messages, explained more formally in what follows. These
messages are triggered by the coordinators of a lower level, which make decisions
whether an event should involve other entities part of the hierarchy or not. This
approach allows for multiple redundant responses for a given situation. An example
of FSO structural organization is observed in Figure 3.1. The SoC are placed at the
layer members.
FSO allow for aggregation of services offered by humans and technological compo-
13
14
Figure 3.1: Exemplary FSO structure [8].
nents. Given a certain event, the coordinator starts searching for roles by matching
their service by semantic matching for solving the problem. Whenever the solution
cannot be found an exception propagates to the next level of FSO. The procedure is
repeated until a solution is found. The response results in the SON (social-overlay
network) -- ad hoc SoC. We now introduce the main components of an FSO.
Agent. An agent is a member of the system that has an active behavior. It can
be a person, a digital device, a cyber-physical system, or a collection of these
entities. Agents have certain characteristics (for instance, mobility) and can
be equipped with assets (e.g. objects).
Community. FSO may be described as a hierarchy of the Service-oriented Com-
munities (SoC). Communities can be associated either to functional places
(e.g. a flat, a building [10], a hospital) or a region characterized by the occur-
rence of some event, such as an accident or a fire. Seen from a higher level
of the FSO a SoC is also an agent. Agents belong to communities. Based on
the said definitions one might easily derive that a child community can be a
participating member of another larger, parent community. This leads to the
term of nested communities.
Community representative or coordinator. A SoC community is represented
by one of its agents. This agent hosts the service registry of the SoC and is
seen as the representation of the domain of the community.
15
If the given community is of a small size, concretely an agent together with its
assets we call it an "individual SoC" (or iSoC). The community representative
is at the same time a coordinator of the community it represents, and a member
of the parent community.
Role. The Agents or members of an FSO can take a role, meaning that they perform
actions that belong to a certain class of activities (e.g. doctor-, driver-, nurse-,
or patient-specific activities).
Notification. Agents publish notifications, which can be of various natures. The
notifications are received by the community representative, which reacts ac-
cordingly depending on the type of notification. A notification can be a simple
message that informs about the status of an agent, a request for service, iden-
tification of a certain event etc.
Match. For each received notification, the community representative verifies [11]
whether the new notification and those already known "enable" actions.
Action. Actions are performed by agents. An action represents a series of steps
undertaken by the agents that initiate activities. By performing actions the
agents play a certain Role within the community, thus becoming an active
part of it. Every initiation of an action is followed by a notification to the
community representative.
Exception. For a given action or event if there is a shortage of roles capable of han-
dling it, a message is triggered from the community representative towards the
higher levels of the FSO. This message is called an Exception. The exception
message traverses the higher level communities until all the roles are allocated
or until a flooding threshold is overcome and a failure is issued.
Social Overlay Network. Once we have an enabled action, the participating
agents become a new temporary SoC. The lifespan of the new born SoC in lim-
ited to the duration of the activity. If the activity involves agents from distinct
SoCs, the new temporary SoC is coupled of agents from different communi-
ties. The newly formed community brings together nodes from different layers
of the FSO hierarchy. This temporal organization is called a Social Overlay
Network (SON).
16
FSO is based on inter- and intra-community cooperation. This allows for establish-
ment of mutualistic relationships between the members of within a community or
distinct communities. The dynamic infrastructure of FSO allows for cooperation
across the scales of the service, thus substituting the existing rigid hierarchies. The
following points describe a general scenario of event handling by FSO:
• An event takes place. Participating agents of an SoC sense the change.
• The agents become active, thus implicitly play a role. The change of the
status of an agent is followed by a notification published to the community
representative.
• The notification reaches the SoC representative -- for instance, a healthcare
institution.
• The community representative handles the notification and performs local
analysis for managing the response.
• An optimal response is found within the community. All roles are allocated
within the current "circle", thus the response is enacted and the state is ad-
justed. If there is no optimal response found the following point is performed.
• Exception message is propagated requesting for roles capable of accomplishing
the need. The messages traverse through the upper layers of the FSO hierarchy
until the response is finally enabled or a failure is declared.
• During the process execution, new knowledge is accrued both locally and glob-
ally. The response is adjusted according to the alternatives offered at various
levels of FSO.
Cases that require the above described organizational properties are quite
widespread.
In [26] the Katrina hurricane case that took place in New Orleans
is analyzed. The occurrence of such an event led to multiple and diverse conse-
quences. Several "social layers" were disrupted in parallel. This triggered multiple
responses from the different "social layers", starting from: the Private circle (individ-
uals, families, neighbors etc.), Private organizations, Local institutions (City Police,
Fire brigades, Flood rescue etc.), State organizations (Department of emergency
17
management), to end with the National circle. One major problem that followed
the event was the coordination of these social layers. A conclusion has been derived
showing that the lack of coordination between different institutional organizations
of different levels lead to catastrophic consequences to the human society of that
area. Moreover, the classification of the communities in informal respondents (the
private cycle) and institutional respondents resulted in conflicting goals and actions.
It can be easily observed that previously introduced properties of the FSO closely
match the organizational and coordination requirements of the given scenario.
In the upcoming chapters we describe two simulation models that are implemented
based on the given FSO concepts.
Chapter 4
First model
4.1 Overview
In this chapter, we describe one of our simulation models, its implementation and
functionality. For simulations the NetLogo environment [13] is used. The simula-
tion environment is coupled of a simulation area that functions as a "virtual world",
where the initialized agents perform their actions. It also contains a set of controls
that allow for adjustment of input parameters, such as the number of agents, and
various graphs that display the simulation measurements. The agents can move
freely throughout the simulation area in discrete-time steps called "ticks". A vi-
sualization of the simulation area containing the initialized agents can be seen in
Figure 4.1, while the complete work-space is depicted in Figure 4.2.
In our simulation model we define SoCs of various scale and specializations, which
together form a greater organizational structure, namely the FSO. Fig. 4.3 repre-
sents the hierarchical community structure used in the simulation experiments. The
atomic components of the defined organization are the individual SoCs, or iSoCs.
An iSoC represents a "small version" of a SoC and can be represented by a single
individual (agent) and his/her personal belongings, e.g. an individual and his per-
sonal vehicle. In this case the individual is the coordinator or the representative
of its iSoC, while the vehicle is a member of the given iSoC. We define agents of
diverse natures including Individuals, Doctors, Firefighters, and Taxi drivers. A
complete structure of the designed FSO and the participating members can be seen
18
4.1 Overview
19
Figure 4.1: A screenshot of the simulation area, with the initialized agents.
in Appendix A. The number of agents given in the table is not definitive, it changes
depending on the simulation scenario. The emphasis is on the individuals agents
and their actions or activities. By performing an activity individuals implicitly play
a Role within the Community. Whenever an activity is performed by an individual,
the representative of the corresponding Community records the state of the agent.
In cases when there are activities that request for resources that aren't available
within the community, the coordinator triggers "exception" messages to the up-
per level of the organization. This allows the coordinating agent to manage the
underlying resources and establishment of Mutualistic relationships.
As the simulation starts each individual starts performing an activity. The activity
can be a simple process like "going to market" or a more complex one as "going
to office", where the citizen has to be in office, at a certain time. For the latter,
the individual has to perform time, speed and distance calculations to find out the
fastest way of being there.
4.1 Overview
20
Figure 4.2: A screenshot of the work-space from the NetLogo environment used for
simulations.
There are six types of activities defined. On each "tick" of the simulation if there is
an idle individual, an activity is triggered for him. The activity type is chosen ac-
cording to the random1 function of NetLogo. For each activity we chose a triggering
probability of 0.18, except for the "health care" activity/event for which the chosen
probability is 0.09. This because it is considered that the chances for an individual
to get sick or be in need of healthcare services are smaller compared to other daily
activities. The activities have a certain lasting time measured in "ticks". A detailed
description of each of the activities is provided in the following sections. Our focus
is on the "health care" events, while the other simpler activities come in use for
simulating daily life activities, and help describing the main properties of SoC and
FSO. The simplest activities are those of "talk on the phone", and "go to market"
which are performed solely by the individual and do not involve any collaboration
between the agents. In the next section we discuss the "Walk in park" activity.
Figure 4.3: A representation of the hierarchy of Service-oriented Communities (SoC)
that forms the FSO.
1Random numbers: http://ccl.northwestern.edu/netlogo/docs/programming.html#random
4.2 "Walk in park" activity
21
4.2 "Walk in park" activity
In Section 2.1 we gave the main properties of Mutualistic Relationships. Here we
demonstrate the establishment of Mutualistic Relationships in terms of "Walk in
park" activity.
(a) Two agents
(b) Multiple agents
Figure 4.4: Mutualistic relationship in the "Walk in park" activity.
One of the basic activities to be performed by the Individuals is going for a walk in
park. The activity can be performed individually or in group. The former simulates
the situation where a person decides to go walking in the park alone, while the latter
simulates a group of individuals walking together in the park. In order to realize the
group activity the individuals must show interest of chatting with others while walk-
ing. The group activity is defined as a composite activity, containing the chatting
sub-activity. Once an individual chooses to perform such an activity, an informa-
tional message is sent to the corresponding SoC coordinator, containing information
regarding the individuals preferences for the sub-activity and its current state. In
cases when the individual sends a positive message, meaning that is interested to
perform the activity together with someone, the coordinator starts checking for a
matching activity (another individual performing the same activity, and willing to
collaborate). If there is a match, a Mutualistic Relationship between both individ-
uals is established and they proceed performing the activity together. Figure 4.4
depicts an extracted screen-shot from the simulated scenario. In Figure 4.4(a) the
establishment of the Mutualistic Relationship between two individuals (agents) can
4.2 "Walk in park" activity
22
be seen. The individuals performing such activity are colored in pink, same as the
relation which is visualized as a two-way arrow between the two.
As described in Section 2.1 a Mutualistic Relationship can be established between
two ore more agents. For the latter case, more than two individuals should be will-
ing to perform the "Walk in park" activity, while chatting at the same time. An
example of such scenario is depicted in Fig. 4.4b). Whenever one of the agents
finishes the activity he/she proceeds with the other activities, and the links to the
other agents are disconnected, thus ending the relationship.
A detailed representation of the flow of messages from the activity request sent from
individuals towards the coordinator, until the establishment of Mutualistic Relation-
ships is depicted in the sequence diagram in Figure 4.5. The green boxes represent
the process where the establishment of a Mutualistic relationship is performed, while
the vertical colored bold lines represent the duration of the activity.
Figure 4.5: A representation of the flow of "walk in park" activities in the sequence
diagram.
In the next section we describe the establishment of the Mutualistic Relationship in
a scenario where not only Individuals agents are involved.
4.3 Car sharing activity
23
4.3 Car sharing activity
Another activity that can be performed by individuals is traveling to a certain lo-
cation, within the two dimensional virtual world. It is assumed that the location is
too far for the individual to be reached on foot, thus a car is needed for transporta-
tion. A new type of agents introduced in the simulation are the cars. An individual
may or may not posses a car in his iSoC circle. In the former case he can travel to
a certain destination, and also offer sharing the ride. The destination of the indi-
vidual in need for transportation must be in the vicinity of the destination of the
individual that is offering to share the ride in order for the activity to be performed
together. Both individuals benefit from the performed activity, as one party gets
the transportation, while the traveling costs are decreased.
Figure 4.6: Message exchange between the agents and SoC coordinator.
The Individuals that are to perform the car sharing activity or "go to location"
action, as defined in the simulation, inform the corresponding SoC coordinator about
their state. In case the coordinator finds a match, meaning that there is an individual
offering to share a ride, and another one in need for transportation, the activity is
performed together resulting with the establishment of a Mutualistic Relationship.
We model such scenario in our simulation. The message exchange between the
agents extracted from the log of the simulation is depicted in Figure 4.6.
For the individuals that aren't in possession of a car and want to perform such an
activity an invalidation threshold for the activity is defined. Once such threshold
is exceeded the activity is canceled. Another type of activity can be performed
afterwards. Figure 4.7 depicts the three main phases of car sharing activity.
Another representation of the flow of the car sharing activities performed by the in-
4.4 "Go to office" activity
24
(a) The communication between
(b) The individual owning the
the agents is established.
car picks up the other Indi-
vidual.
(c) The car owner drops the
Individual, and continues rid-
ing towards its destination.
Figure 4.7: Mutualistic Relationship in car sharing activity.
dividuals is presented in the Sequence diagram in Figure 4.8. Same as in the previous
cases the green square shows the moment of Mutualistic Relationship establishment
between the two individuals, where an individual provides a certain service, which
turns out to satisfy the request of another individual. The next section introduces
another type of agent, which is specifically related to transportation of individuals.
4.4 "Go to office" activity
A somewhat more complex activity performed by individuals is the "go to office"
activity. There are three possible ways to perform the "go to office" activity: on
4.4 "Go to office" activity
25
Figure 4.8: A representation of the flow of car sharing activities in the sequence
diagram.
foot, by car, or by taxi. Figure 4.9 depicts an exemplary scenario extracted from
the simulation where the individuals are going towards the office in one of the three
above mentioned means of transportation.
Figure 4.9: Individuals performing the "go to office" activity by various means of
transportation.
Immediately after such an activity is triggered for an individual, a calculation of
the distance from its position to the office's location is performed. It is assumed
that the individuals already have knowledge about the location of their office. The
activity has a defined starting time. In order to reach the office at a particular time,
the individual has to choose a way of transportation that allows him to be there
on time. The decision is made after a distance-time calculation is performed by
the individual. In cases when there is enough time available to reach the office the
individual will go on foot. This type of activity can be performed independently,
4.4 "Go to office" activity
26
thus doesn't involve any resource sharing or collaboration. In case the individual is
late to walk, and possesses a car, it can be used to reach the office faster. However,
some individuals lack of personal cars. In this case the exception message is raised
towards the coordinator of the SoC, which tries to locate agents capable of resolving
the given situation within their circle. This could be another individual, willing
to share the ride (car sharing activity) or the newly defined type of agents within
the SoC, the taxi-drivers together with their cars. These agents wander around
the simulation area all the time, aiming to help individuals that are in need of
transportation. The transport request is forwarded by the coordinator towards an
available taxi. The taxi starts moving towards the individual immediately, and
after picking him up they move together towards the office. Again a Mutualistic
relationship is established within the Local residents circle where for a particular
cost the taxi-driver helps the individual with transportation. There might be cases
when no taxis are available immediately, thus the individual will be late for work,
but again less time is lost. Figure 4.10 shows a sequence diagram of the "go to
office" activities performed by the individuals.
Figure 4.10: A representation of the flow of "walk in park" activities in the sequence
diagram.
Running the simulation for 15000 ticks, with 4 offices, 60 Individuals, with only 15 of
them owning cars, and 10 Taxi-drivers/Taxis, the results as depicted in Figure 4.11
are achieved.
It can be observed that the dominating form of transportation used by the indi-
viduals was on foot, followed by the other two forms of transportation, which have
similar allocation. The scenario where the individuals are transported with the help
of taxidrivers shows the social benefits of such organization. The number of times
a civilian is transported by taxi represents the number of established mutualistic
4.5 "Houses on fire" event
27
Figure 4.11: A simple graph showing the usage of various means of movement of
individuals for performing the "go to office" activity.
relationships. In the graph this is depicted by the yellow line. In the next section
we describe a scenario, where the collaboration between two distinct SoCs within
the FSO is involved. As we will see next, it is possible for members of distinct SoCs
to establish Mutualistic Relationships.
4.5 "Houses on fire" event
The "Houses on fire" event mimics the scenario where some catastrophic natural
event takes place that has an impact on the individuals properties, and as a result
the houses catch on fire. In our simulator we define an event generator, that triggers
"house burning" events where a number of houses start burning.
After a few cycles from the start of the simulation, some random houses will start
catching on fire, thus disrupting the daily activities of the individuals. The number
of events to be generated or houses to catch on fire is given initially as an input value
upon initialization of simulation. The process is repeated after a certain amount of
simulation cycles ("ticks") until all the houses are either completely or partially
burned.
Each house has its own "health" level which starts at 100, and as it continues
4.5 "Houses on fire" event
28
burning, the value decreases by a "firelevel" damage value, which initially varies
within 1 to 5 range, and after each cycle it might be increased by 1 unit with
probability 0.5. Once the "health" level of the house reaches 0, it is considered that
the house is completely burned. The "firelevel" value is used to describe the damage
that the fire is causing to the house.
Whenever there is a "house burning" event, if an individual is within the observing
radius2 of 3 of the burning house he will postpone his current activity in order to
provide help. The postponed activity is continued later. In the simulation area an
arrow connecting the individual to the burning house is shown and this operation
will start decreasing the "firelevel" value of the house by 0.5. This mimics the
"help" provided by the individual to extinguish the fire.
In case the individual
realizes that the fire is getting out of control ("health" level of house is below 80),
and the situation cannot be handled by itself solely, an "exception" message is
sent to the Local residents coordinator. Given the current situation and the lack
of resources for helping for fire extinguishing the SoC coordinator forwards the
"exception" towards the Level 2 Emergency response organization. Among others,
this organization contains the Firefighters organization member within its circle.
The complete structure of the FSO was introduced earlier in Figure 4.3.
The Firefigters SoC is composed of Fire-trucks and Firefighters. These members are
also organized in iSoC fashion, where one fire-truck can hold a number of firefighters
ranging from 1 to 4. The number of firefighters in a truck has an impact on the time
that takes to extinguish the fire in a burning house.
The response of the firefighters organization comes immediately, by assigning a fire-
truck and a certain number of firefighters to go and extinguish the fire at the given
house in the "exception" message. This can be observed in the simulation area when
one of the white trucks will turn red and start moving towards the house on fire
(with color red). The firetrucks have greater capabilities for extinguishing fire, thus
they will decrease the "firelevel" value of the burning house by a value of 2 - 5 units
depending on the number of firefighters in the fire truck.
Two simulations are performed with regard to "Houses on fire" event. The number
of initialized agents is as follows: 50 Houses, 50 Individuals, 10 Fire Trucks, and
35 Firefighters. The "House burning" events are generated 10 per cycle, every 100
cycles. The number of activities to be performed by individuals is six. We run
2Netlogo measurement unit used to measure the distance of an agent to other objects.
4.5 "Houses on fire" event
29
(a) A view of the individual and fire-truck helping extin-
guish the fire of the house.
(b) A view of the scene after the intervention of the individ-
ual and the fire-truck. Fire is extinguished, the fire-truck is
freed, while the individual continues his previous activity.
Figure 4.12: FSO collaboration: Agents from two distinct SoCs handling the "House
burning" event.
the simulation for two scenarios: the first one there is no use of the FSO infras-
tructure, thus no "exception" messages are transmitted to firefighters organization
and individuals cope with the triggered events solely, and in the second one the
FSO infrastructure is established and the SoCs will collaborate. An extract of the
simulation area showing the agents handling the "Burning houses" event for each
scenario is shown in Figures 4.12, and 4.13. In the scenario where no FSO infras-
tructure is used, we see a group of three individuals are helping to extinguish the
fire for the given house, thus they succeed. This isn't always the case as the number
of individuals that are in the vicinity of a burning house isn't that high for regular
cases, and most of the times the houses end up completely burned. Such behavior is
4.5 "Houses on fire" event
30
also reflected in the simulation outcomes of the scenario explained in what follows.
(a) A view of a group of individuals helping extinguish the
fire of the house.
(b) A view of the scene after the intervention of the group
of individuals. Fire is extinguished, while the individuals
continue their previous activities.
Figure 4.13: Agents from the Local community SoC handling the "House burning"
event solely.
The metric used to describe the outcome of the simulations is the total number of
completely burned houses. The higher the number, the worse the result.
In the
case where FSO collaboration is enabled the number of completely burned houses is
29, while in the case where there is no FSO infrastructure established this number
reaches 49. The results for each scenario are depicted in the graphs in Figures 4.15,
and 4.14 respectively. In the first scenario we see that the "private social circle"
responds to the event solely, while in the second we scenario we have a joint col-
laboration between the private and the "local institutions circle". By establishing a
proper communication mechanism between the two level SoC communities we ob-
serve that the community benefits with less waste of resources. This reminds of the
4.5 "Houses on fire" event
31
Figure 4.14: Results from the execution of "Burning houses" event with the use of
FSO infrastructure.
Figure 4.15: Results from the execution of "Burning houses" event without using
the FSO infrastructure for collaboration between SoCs.
Katrina hurricane scenario described in chapter 3. It is observed that by a better
organization and collaboration between the "social layers" a better management of
resources is established. In the next section we discuss the Health care services case
study, which represents one of our main focuses of the thesis. We show that by the
full use of FSO capabilities better health care services, in terms of time management
and resource allocation can be offered to individuals.
4.6 Case study: Health care services
32
4.6 Case study: Health care services
A key cause of inefficiency in the interaction between users and social organizations
is often the fact that said interaction is almost completely managed by the indi-
vidual or by individual parts of the overall care system. The partial and outdated
knowledge that the individual has about the available social resources and their state
often translates in time-consuming and sequence querying or polling of services. The
major added value of FSO lies in the fact that it constructs a unitary Whole that
takes responsibility to assemble a coherent response to complex requests for service,
thus avoiding the inefficiencies.
Based on many real-life scenarios including those described in [15],[16] the formula-
tion of the following simulation scenarios was inspired:
Mary has just delivered her baby when she and her husband Joseph are told that
the little one suffers from unexpected complications requiring specific support that
is not available at the private clinic where they are now.
4.6.1 Traditional Case
Following the practices of traditional systems the initial step is to call the emergency
service. A verbal description of the situation and the immediate requirements is
provided. At the emergency service premises the case is tagged as life critical and
immediate attention is taken. The operators of the emergency service might have
knowledge regarding the number of hospitals in the vicinity and their specialties.
However, no further information is known in terms of the hospital's resources and
their availability. In search of this information, calls are made to hospitals, according
to some ordered list. Through the calls, a potential hospital that might be able to
handle the case is identified. An ambulance is assigned for transporting the little
one and her parents to the chosen hospital. Upon reaching the hospital, the doctors
discover that the situation is more complex than the way it had been described
on the phone. Due to the incomplete initial knowledge, it is concluded that the
needed treatment is not available at the current hospital. Calls are made to other
hospitals from the list. Another one is identified as a possible candidate to supply
the necessary treatment, however they lack a specific medical device crucial for
the current case. A third hospital located in a further distance is reached on the
4.6 Case study: Health care services
33
phone. From the conversation it is understood that the hospital is in possession of
the necessary medical device. If a complete knowledge of the resources and their
availability had been available, a mutualistic collaboration between the hospitals
would have fulfilled all the prerequisites for dealing with the case.
4.6.2 FSO Cooperation
A notification of the type "service request" is published from the emergency service
operator, thus reaching the coordinator of the corresponding SoC [8, 9, 18]. Having
partial knowledge about the event the SoC triggers an exception for lack of roles.
The exception reaches the regional SoC which includes the originating SoC and other
hospitals. At this level a more complete view of the available resources is available.
The regional SoC discovers that none of the members can fulfill the request on
their own. However, a combination of a set of roles from distinct SoCs (hospitals) is
observed to provide with a response. The members of the identified SoCs are merged,
thus becoming a SON (a temporary SoC). The new SoC elects a coordinator and
enriches the request with new roles necessary to make it possible for the SON to
deal with the case at hand. An ambulance is dispatched for transporting the little
one and his family, while at the same time another transporting vehicle is assigned
to bring the necessary medial devices to the hospital where the treatment will take
place.
4.6.3 "Health care" event
From all the previously simulated activities the type of events or activities that we
focus are the ones where Individuals are in need of health-care services. In these
cases, we say that the Individual takes the role of the patient.
Throughout the simulation among the standard activities, "health care" events are
triggered by Individuals, reporting that they are in need of health-care services.
The severity of patient's condition in need for treatment is given as a value in the
1 - 10 range. Values 1 - 3 represent a minor illness, and it is considered that the
patient can pay a visit to the local hospital by itself, whereas for values 4 - 10 an
ambulance is required to transport the Individual to one of the hospitals. There are
several hospitals defined, each of them in possession of a certain number of doctors,
4.6 Case study: Health care services
34
ambulances and medical appliances. A doctor can treat all three minor illnesses,
and is an expert for three other diseases. In order to treat the patient the doctor
uses corresponding medical appliances. In some cases the treatment of a particular
condition of patient requires the use of several medical appliances simultaneously.
The request for health-care services issued by a patient must be handled within a
defined threshold, otherwise it is considered that the condition degrades and results
in patient's death. In our "virtual world" this case is mimicked by removing the
Individual from the simulation. Based on the way the health-care request is handled
we simulate three distinct scenarios, namely the Traditional Organization Case, the
FSO case, and Perfect Oracle case.
In the Traditional Organization case, the individual in need for health-care services
picks a random hospital and triggers the request for visit. In cases when the value of
patient's condition is larger than 3 the hospital responds by sending an ambulance
to transport him. Once the patient reaches the hospital a doctor is assigned to treat
the patient, and based on the patient's condition the appropriate medical appliances
needed for treatment are allocated.
It might happen that there are no available
resources within the hospital to treat the patient, e.g. no available doctors that are
experts on treating a particular condition, or there are no medical appliances. In
these cases a "polling" in the other hospitals is performed. The patient's request
is forwarded to the next hospital, without an exact knowledge about the hospital's
resource availability. The procedure is repeated until the patient reaches a hospital
that is able to offer the appropriate treatment, or the request exceeds the predefined
threshold, and the patient dies.
The FSO approach treats the health-care service events in a different manner. First,
the Individual in need of health-care service raises an exception from its iSoC to the
representative of the corresponding SoC (Local residents community). The repre-
sentative or the coordinating agent handles the exception and checks for available
resources able to cope with the given event within its circle. In case of a negative
response the exception is forwarded to the upper level representative, namely the
"Emergency response" agent. Located at a higher hierarchical level the "Emergency
response" has broader knowledge regarding the agents that might be able to deal
with the situation at hand. After locating "Local hospital A" (the main local hospi-
tal) as a potential helping agent, the notification is directed towards it. The "Local
Hospital A" is well informed about its underlying agents, and resources.
In the
4.6 Case study: Health care services
35
(a) Patient waiting for ambu-
(b) Ambulance transporting
lance.
the patient.
(c) The arrival of patient in
hospital.
Figure 4.16: A Netlogo screenshot of phases that "individual 256" goes through in
case of "health-care" events.
positive case it replies to the exception by assigning a Doctor and an Ambulance (if
necessary) to deal with the given condition of the patient. If it happens that the
given Local Hospital is out of available resources capable of handling the given sit-
uation, or in case the condition of the patient is complex and the hospital isn't able
to cope with it, an exception towards "Regional hospitals" level is triggered. The
"Regional hospital" will be set in charge of finding another hospital in possession
of missing resources. With this setup the request will traverse the agents spread
throughout the layers of FSO organization, until the needed resources are found.
This process is manifested by the establishment of a new SON, or a temporary SoC,
coupled of shared resources from distinct SoCs, and it is the key feature behind FSOs
effectiveness. This represents a case where Mutualistic Relationship is established
4.6 Case study: Health care services
36
among members of distinct communities. A graphical representation of the phases
a patient goes through, before the start of its treatment is presented in Fig. 4.16
Fig. 4.17 shows an extracted command log from the simulator representing the
message flow between the agents. Fig. 4.17a) shows a trivial case of SON, where
the received exception, is handled within the local hospital SoC, without a need for
additional resources. We call this case an Infra-Community Cooperation. Fig. 4.17b)
represents a more complex case, where resources need to be shared between two local
hospitals, and this represents the Inter-community cooperation case.
(a) Infra-Community.
(b) Inter-community cooperation.
Figure 4.17: Netlogo screenshot of phases that "individual 256" goes through in case
of "health-care service" events.
In our simulation model we define three types of exceptions for local hospitals,
namely:
• lack of doctors capable of treating a particular type of patients disease
• no ambulances available, to transport patients with severe condition
• medical appliances needed to treat the patient missing.
In this way, by triggering exceptions whenever resources are missing within a partic-
ular hospital an interacting channel between hospitals is established, allowing them
to function as a greater organization, where resources are shared accordingly with
4.6 Case study: Health care services
37
an optimized usage.
The sequence diagrams that depict the flow of messages in cases where the exception
is handled within local hospital, local hospital lacks of ambulances for transporting
the Individual, and local hospital lacks of doctors capable of curing the Individual
are depicted in Figures 4.18,4.19, 4.20 respectively.
Figure 4.18: A sequence diagram of the flow of messages in the case where the main
Local Hospital handles the "healthcare" services exception.
Figure 4.19: A sequence diagram of the flow of messages in the case where "noam-
bulances" exception is handled.
Figure 4.20: A sequence diagram of the flow of messages in the case where "nodoc-
tors" exception is handled
Another scenario considered is the Perfect Oracle. Here the Individuals are assumed
to have perfect knowledge regarding the hospitals and services offered. However
in this setup there is no resource sharing between the hospitals. To simulate the
communication between Individuals and Hospitals the FSO "infrastructure" is used.
4.6 Case study: Health care services
38
A typical scenario would be one where the Individual in need of health-care services
reaches the hospital and once the doctor starts the treatment, it finds out that
there are no medical appliances available needed for treatment. In this case since
the hospitals don't share the resources, the patients request is disregarded and it is
directed to another hospital. The process is repeated until the Individual reaches
the appropriate hospital that offers treatment, otherwise the request is invalidated.
The health care service request is divided in two phases, the Querying time which
represents the time form the moment an Individual is in need of treatment until the
moment when all the needed resources are allocated, and the second phase which is
the Treatment time and it is the time it takes for a patient to get cured from the
moment when the treatment begins. In our experiments we are interested in the
former as it represents the measurement that helps differentiating the efficiency of
the approaches. The aim of simulations is to set a comparison point between the
different approaches and highlight the efficiency of FSO, when dealing with complex
situations involving agents generating requests of various natures. The experimental
results and a comparison between the introduced approaches is discussed in the next
section.
4.6.4 Results
In this section we evaluate the benefits of FSO with respect to Perfect oracle and
Traditional organization. The experiment outcomes are generated from the NETL-
ogo simulations. The simulations are run for all three scenarios for 3000 "ticks", and
with a fixed number of community members. There are 4 Local hospitals defined, as
well as 15 Doctors, 8 Ambulances, and 70 Medical appliances. The Doctors, Ambu-
lances and Medical appliances are distributed throughout the 4 hospitals according
to the NetLogo random function, generated by a deterministic process. This means
that using the same random "seed" the experiments can be reproduced. This ap-
proach was useful in our experiments since we wanted to have the same distribution
of resources for all three models, in order to have an equitable comparison.
To evaluate the model we use two main metrics, namely the Average Querying
Time, and the Number of Patients which could not receive the treatment within the
defined threshold, and thus die. The Average Querying time represents the average
4.6 Case study: Health care services
39
time an Individual in need for "health care" services has to wait until he receives the
necessary treatment. We ran the experiments for each scenario with three different
thresholds, as depicted in Fig. 4.21, 4.22. For each specified threshold the simulation
is ran 5 times, with a distinct number of Individuals, starting with 60 until 140, with
an increasing step of 20. Additionally for the FSO we use the SON metric, which
describes the number of times a solution to the given situation is solved as a result of
inter-community cooperation. This number also represents the usage of communities
social energy. Contrary to FSO, for the Traditional Organization where there is no
cooperation between the Hospitals, we measure the number of failures a patient
faces until the matching hospital for treatment is found.
Figure 4.21 shows a comparison of the number of treated patients, and the number
of patients died for each scenario. For example, in the simulation experiment with
a Threshold of 150, for 140 Individuals the following results are archived:
FSO 189 patients are treated, out of which 56 have died,
Perfect Oracle 177 treated, 71 died,
Traditional organization 175 treated 93 died.
Not only the number of patients treated in FSO is higher, but also the number of
deaths is lower. It can be observed that in all cases FSO performs better, followed
by Perfect Oracle, and Traditional Organization. In the FSO case the number of
patients that fail to receive the treatment is always lower, due to the sharing of re-
sources between the hospitals, while for Perfect Oracle this number is higher because
the patient knows at which hospital he should go, but if the hospital lacks neces-
sary medical appliances it doesn't borrow them from other hospitals, it redirects
the patient instead. In the traditional organization we have no interaction between
hospitals neither. However, in this case the patient chooses the hospitals randomly,
without any knowledge about the available doctors, ambulances or medical appli-
ances. This poor level of information leads to delays in resource discovery, thus the
number of patients that fail to receive treatment is the highest.
The fast service response-time of FSO, also allows for a higher number of patients
to be treated for the same number of simulation cycles. This is observed in the
experiment results too.
4.6 Case study: Health care services
40
(a) Threshold 150.
(b) Threshold 200.
(c) Threshold 250.
Figure 4.21: Comparison of patients treated/died ratio for each of the three scenarios
for various threshold values.
Another observation if we compare the scenarios from the three graphs of Figure
4.21, is that with an increase of the Threshold the number of patients that die
decreases, same as the number of patients treated. This because the request for
"health care" services has more time to receive a response, thus less requests are in-
validated. The number of patients treated also decreases, as the number of generated
cases decreases slightly, because of the longer period of service reception.
Fig. 4.22 depicts the performance of all three models with respect to Average Query-
ing time. If we analyze the querying time results, again we see that FSO outperforms
4.6 Case study: Health care services
41
the other two models. Such outcome comes as a result of exceptions usage, which
allow for fast inter-community communication and resource allocation. It can be
observed that by decreasing the number of Individuals, the FSO improves drasti-
cally, and the number of patients that fail to receive the treatment decreases two to
three times.
(a) Threshold 150.
(b) Threshold 200.
(c) Threshold 250.
Figure 4.22: Average Querying time for each of the three scenarios for various
threshold values.
The SON metric used for FSO ranges from around 100 up to 220 depending on the
number of Individuals participating in the simulation. The higher the number of
Individuals, the higher the SON metric. This due to the increase of number of col-
laborations between communities. On the other hand the number of service failures
4.6 Case study: Health care services
42
in the Traditional Organization ranges from around 50 up to 200. By increasing
the number of Individuals the number of failures increases too. This because the
number of times a patient fails to reach the appropriate hospital increases with a
higher number of Individuals.
Chapter 5
Second model
5.1 Overview
Falls present the major public health problem among elderly persons. According
to [19] falls are the "most significant cause of injury for elderly person" -- more
specifically "the most serious life-threatening events that can occur" in the 65+ age
group [20]. The key factor that determines the severity of a fall is the time until the
treatment is delivered [22],[20].
The number of systems aimed at fall detection has had a dramatic increase over
the recent years. Most of them are based on devices such as accelerometers, gyro-
scopes, or other sensors. A major limitation of such systems lies on the difficulties
of the algorithms and their implementations to provide a reliable assessment for a
fall under real life conditions. Other approaches are oriented towards smart-phones
and their rich set of embedded sensors. [23],[24],[25]. Despite the continuing tech-
nological progress, it is still very difficult to find a monitoring system that is able
to determine whether a person has actually fallen or whether, for example, he or
she has changed his position very quickly. A possible improvement might come by
the use of redundancy. For example two accelerometers of different technology and
design are coupled together [19]. As a result we would have an improved sensitiv-
ity. However, this solution comes with an impact on the social costs spent for the
verification of the false alarms.
There are two possible orientations when one tries to approach this issue. One
43
5.2 Simulation Model
44
way may be to try and improve the current ITC monitoring systems. There have
been numerous research actions, with the intention to improve both sensitivity and
specificity parameters, and yet no standardized solution has been found [22]. An-
other possibility it to search for alternative solutions. Here we discuss one way to
do so. Our proposal is to go beyond the purely technological solution and involve
the humans in the system. Consequently, a socio-technological system is introduced
and analyzed by means of the provided multi-agent simulation model. By the use
of the organizational structure of the FSO we show that the appointment of fall
verification tasks to a group of human agents allows to overcome, to some extent,
the limitations and inefficiencies of purely ITC-based solutions.
In what follows we briefly introduce a number of key measurements that will help
us evaluate the outcomes of our simulation model:
False positive ratio False Positive (FP) ratio or false alarm rate is the probability
of concluding that an event occurred, whereas this is not the case. The alarm
is fired, although the event did not take place.
Specificity Specificity is the probability that the event did not take place and the
system did not fire. Specificity is equal to 1 − FP.
False Negative ratio False Negative (FN) ratio is the probability that the system
indicates that an event has not occurred, when in fact it took place. It can
also be described as a missed alarm.
Sensitivity Sensitivity is the probability that the event took place and the system
did fire. Sensitivity is equal to 1 − FN.
In the next section we will describe the main characteristics of the implemented
simulation model.
5.2 Simulation Model
Again for the setup of the simulation model we make use of the NetLogo environ-
ment. The "virtual world" is now coupled of passive agents named the Elderly
persons. Each of these agents is associated with one or two monitoring devices,
5.2 Simulation Model
45
depending on the simulation scenario. The Elderly agents are positioned in a static
position in the simulation area, as an assumption of their living area (e.g. home).
There is one type of event that occurs, namely the fall of Elderly agents or the "fall
event". The two monitoring devices, (e.g. accelerometer, gyroscope) are in charge
of identifying such events, and raising alarms towards the Community Agents. How-
ever, these devices aren't always accurate identifying the "fall event". The alarms
are collected by the first level Community agent or the so-called "Middleware 1",
which then forwards them to the next level agent, namely the "Middleware 2".
"Middleware 2" is responsible for allocation of available Informal Carers for visit-
ing the Elderly persons whose alarm has been triggered. The Informal Carers are
agents that wander around the simulation area until they receive messages from the
Community agent that asks them to go towards a certain location, where an Elder
person is residing. Once at the Elder agent's site, the Informal carer verifies if the
triggered alarm was true.
At the same time the alarm message is forwarded to the "Middleware 3" community
agent, which represents the Hospital coupled of moving agents or Ambulances, and
Professional carers or Doctors. In cases where the triggered alarm is True, the inter-
vention of Ambulances is required to transport the Elderly person to the hospital,
for receiving the necessary treatment.
In what follows a formal definition of the
above described agents is given.
Elderly Agents. Elderly Agents (EA) are agents representing elderly or impaired
persons residing in their house where their condition is monitored by Device
Agents. In case of true fall detection the EA take the role of patient, thus
professional care is requested.
Professional Carers. Professional Carers (PC) represent agents able to supply
certified healthcare services to Elderly agents. Such agents are institutional,
and provide professional service (e.g the doctors of a hospital).
Informal Carers and Verification. Informal Carers (IC) are mobile agents ca-
pable of providing non-professional services. It is assumed that IC can pay a
visit to an EA and report whether the EA has truly experienced a fall or not.
This is called in what follows verification.
Device Agents. Device Agents (DA) are simple devices (e.g. accelerometers, mo-
5.2 Simulation Model
46
tion sensors, cameras etc.) that are able to provide monitoring services. DA's
are attached to EA agents, thus monitor their condition. A DA triggers an
alarm when it ascertains, with a certain probability, that an EA has fallen.
Another example of DA is a motion sensor stating that an observed EA is not
moving.
DA are characterized by a non-zero probability of false positives and false neg-
atives. Thus for instance in some cases an accelerometer may detect a fall
when this is not true, while in some other cases the accelerometer may not
detect a true case of fall.
Mobility Agents. Mobility Agents (MA) are agents able to provide mobility or
transportation services to other agents. In our case such agents are represented
by ambulances.
Community Agents. Community Agents (CA) are agents managing a "circle" of
other agents. A detailed description of such agents was provided in Chapter
3.
A visualization of the simulation area containing the initialized agents can be seen
in Figure 5.1. The green "person" shape represents the EA agents, while the con-
nected devices represent the DAs. The ICs can be seen close to their cars, used for
transportation. The white building represents the hospital, and connected to it we
have the MAs and PCs.
In terms of the FSO approach, the core unit of the given organizational structure is
the iSoC coupled of an EA, and corresponding DAs. Further all iSoCs form a Service-
oriented Community (SoC) coordinated by the Level 1 CA. The IC agents reside
within the Level 2 CA forming another SoC, similarly to the Level 3 CA coupled of
MA and PC. The agents associated with a CA may send it notifications. Whenever
there is a need for communication between the CAs of distinct levels, the "exception"
messages are triggered. It is assumed that these messages are transmitted reliably
and instantaneously. The overall FSO structure is depicted in Figure 5.2
In order to quantify the results of the various simulation scenarios described in the
upcoming section, we introduce the following metrics:
Social Cost. We define Social Cost (SC) as the number of cycles that a social
5.2 Simulation Model
47
Figure 5.1: NetLogo screenshot of the simulation area with initialized agents.
resource is used to intervene either for a true alarm or for a false positive
(FP).
Cumulative Social Cost. Cumulative Social Cost (CSC) is defined as the overall
number of cycles used by a community to deal with true alarms and FP's
throughout a (simulated) time interval T .
Waiting Time. Waiting Time (WT) is the number of cycles elapsed from the mo-
ment an alarm is triggered, being it true or false.
Cumulative Waiting Time. (CWT) is the overall number of cycles elapsed from
the moment an alarm is triggered, being it true or false. It is the sum of all
the individual WT's occurred throughout a simulation run.
5.3 Simulation Scenarios
48
Figure 5.2: A representation of the FSO structure of the simulation model.
5.3 Simulation Scenarios
Based on the participation of agents on the simulation, we distinguish three main
scenarios:
S1 : Only accelerometers. In this scenario we use only one DA to monitor the state
of EA. In addition, there are no ICs defined meaning that there is no Level 2
CA. This represents the simplest scenario, where once an alarm is triggered,
the message is directly transmitted to the Level 3 CA or the hospital. The CA
is responsible for allocating the MAs to pay a visit to the EA. In case treatment
needed the EA is transported to the hospital, where a PC is assigned to handle
the case at hand. We measure FP rate, FN rate, Sensitivity, Specificity, CSC
and NCSC during a given T . CSC refers to total number of cycles in which
MAs are serving the EAs.
S2 : Accelerometers combined with a second sensor (camera or gyroscope [19]). This
scenario is the same as S1, with a difference in the DA number. Here we use two
DAs, instead of one. This affects the FP, FN rate, Sensitivity and Specificity.
We measure the same as in S1.
S3 : One or two DAs and Informal carers [21, 26]. In these scenarios the complete
FSO structure as described earlier is used. S3 with one DA represents the S1
with added ICs, while S3 with two DAs is the S2 with added ICs. We measure
as in S1 and S2, with various numbers of ICs. Here as described in the results
section we observe a better usage of Social resources.
5.3 Simulation Scenarios
49
We consider the following configuration of agents for the given scenarios:
• 30 EA's residing in their houses. House locations are assigned in cells chosen
pseudo-randomly in the virtual world.
• In scenario S1, 1 DA (an accelerometer) is deployed with each EA. In scenario
S2, an additional DA (e.g., a gyroscope) is added for each EA.
• 1 hospital (Level 3 CA), located in a cell chosen as described above.
• 6 PC's and 5 MA's (ambulances) are located with the hospital.
Scenario S3 extends scenarios S1 and S2 with the addition of IC's. We perform
simulations with an increasing step of 5 IC's from 0 to 40. The IC's are initially
assigned to pseudo-randomly chosen cells and then wander randomly within the
boundaries of the virtual world. The IC's receive requests for verification from
Level 2 CA. Once this happens, they quit pseudo-random wandering and move from
their current position to the verification place.
The major steps in the general scheme of execution for the three scenarios are
represented as pseudo-code in Tables 5.1, 5.2, 5.3, 5.4, and 5.5.
Table 5.1 shows the pseudo-code of the procedure of DA agents.
It represents a
Simple "reflex": if a fall is suspected for the corresponding EA, an alarm is triggered
towards the local CA. The alarm can be raised only when the EA is residing home.
The only moment when EAs might not be there are the cases when they had a
Procedure DA// Code of the DA agents.
// Reaction to false or true alarms.
begin
When ((this.Fired == TRUE) and (EA.NonFallingPeriod == 0) )
this.Send(CA, ALARM, this);
EndWhen
end
Table 5.1: Pseudo-code of the DA agents.
5.3 Simulation Scenarios
50
Procedure L1-CA // Code of the Level 1 CA, reaction to alarm message
begin
When (∃d ∈ DA (this.AlarmReceived(d) == TRUE))
Parallel
// In parallel, raise exceptions to Level2-CA and Level3-CA
Do exceptionEAs[] ← this.Exception(d, ALARM);
this.Send(exceptionEAs, L2-CA);
this.Send(exceptionEAs, L3-CA); EndDo; EndParallel
EndWhen
end
Procedure L2-CA // Code of the Level 2 CA, allocation of IC agents.
begin
When (∃i ∈ IC (i.getAvailable() == TRUE))
// Assign IC to visit EA for which alarm is raised
forEach d in exceptionEAs;
Do this.assign(i, d); i.setAvailable(FALSE); EndDo
EndForEach
EndWhen
end
Procedure L3-CA // Code of the Level 3 CA, allocation of MA and PC agents.
begin
When (∃p ∈ PC (p.getAvailable() == TRUE)
&& ∃m ∈ MA (m.getAvailable() == TRUE) )
// Assign MA to visit EA, and a PC in case intervention needed
forEach d in exceptionEAs;
Do this.assign(p, m);
p.setAvailable(FALSE); m.setAvailable(FALSE);EndDo
EndForEach
EndWhen
end
Table 5.2: Pseudo-code of the CA agents.
5.3 Simulation Scenarios
51
treatment earlier in hospital and are on their way back. Thus, the Non-falling
period is used.
The pseudo-code of the CA agents is presented in Table 5.2. It can be observed
that procedure L1-CA handles the alarms received from DAs. Further it redirects
them as exceptions to Level 2 and Level 3 CA. The L2-CA procedure allocates the
available ICs to perform the verification, while L3-CA allocates the MA and PC
agents based on the received "exception" messages.
The IC's wander aimlessly through the virtual world until a verification request is
received. The request is served, possibly canceling an ongoing emergency call. The
IC procedure can be seen in Table 5.3.
Procedure IC // Code of the IC agents.
// Reaction to alarm received by L2-CA.
begin
When (this.AlarmReceived(L2-CA, d) == TRUE))
Do
// The IC agent goes to the cell the alarm came from
this.GoTo(location(d));
// Once there, it verifies whether
// it was a case of FP (false positive)
If (this.Verification() == FALSE)
// If that is the case, it informs L3-CA to cancel the
// emergency call, and free the PC and MA resources,
// thus reducing the waste in social energy
this.Send(L3-CA, CANCEL_ALARM, d); EndIf
EndDo
// if no alarm is received, the IC agent just wanders pseudo-randomly
Otherwise this.Wander();
EndWhen
end
Table 5.3: Pseudo-code of the IC agents.
5.3 Simulation Scenarios
52
The MA agents wait for emergency calls. When one such call arrives, the MA agents
(ambulances) start moving towards the EA for which the alarm was raised. Reaching
that location is a time- and resource-consuming action. Said time and resources are
wasted in the face of a FP event. In the case of Scenario S3 the loss is reduced if
an IC agent reaches the location earlier than the MA and verifies the occurrence of
an FP. In such a case, the IC cancels the call, thus sparing some social energy. The
pseudo-code of MA agents can be seen in Table 5.4.
Finally the PC procedure is presented in Table 5.5. The PC's check for the arrival
of the MA carrying the EA agent. Once there they start the treatment. When the
treatment process finishes the EA's are freed, and PC's can be assigned to another
case.
Procedure MA// Code of the MA agents.
// Reaction to alarm received by the L3-CA.
begin
When (this.AlarmReceived(L3-CA, d) == TRUE)
Do
this.GoTo(location(d));
// Abort the emergency call if some IC canceled the alarm
While (this.AlarmCanceled(IC, d) == FALSE);
// Once at the location of the alarm,
// verify the situation, if needed bring EA to hospital
If (this.Verification() == FALSE)
this.Send(L3-CA, CANCEL_ALARM, d);
L3-CA.Send(L2-CA, CANCEL_ALARM, d);
Else
this.Bring(EA, location(L3-CA)); EndIf
EndWhile
EndDo
EndWhen
end
Table 5.4: Pseudo-code of the MA agents.
5.3 Simulation Scenarios
53
Each scenario is executed for 10000 simulation cycles (ticks). Every EA experiences
a "true fall" with probability 1
600, while the DA agents trigger false positive alarms
with probability 1
500, and false negatives with probability 100
500.
We now describe the results obtained in the three above-sketched scenarios.
Procedure PC // Code of the PC agents.
// Treatment of EA, once in hospital premises.
begin
When (MA.arrived(d) == TRUE))
Do
// The PC agent starts treating the EA
this.startTreatment(d);
// Once the, EA treatment finishes, it is free to go
When (d.treated() == TRUE))
// a non-falling period c is assigned to EA agent
d.setNonFallingPeriod(c);
EndWhen
EndDo
EndWhen
end
Table 5.5: Pseudo-code of the PC agents.
5.4 Results
5.4 Results
54
We start by running the S1 and S2 scenarios without any IC, then for each scenario
we run a number of experiments with various number of ICs starting from 0 to 40
(S3 scenario). As mentioned previously there are various measurement metrics used
for evaluation. The results of the S1 scenarios are shown in Table 5.6, while for S2
in Table 5.7.
We start by inspecting the FP, FN, Sensitivity, and Specificity parameters. If we
compare scenario S1 to S2 without ICs, we can observe that in S2 the number of
FPs increases for more than 100 FP units. This due to the addition of a second
DA. When there are two types of DA (sensors) per EA defined, the alarm or FP
is triggered as a result of an OR operation of the alarm of each DA. Even, if the
alarm triggered is true in only one of the sensors we will have a FP. Thus, 3 out of 4
possible combinations will be positive, resulting in a larger number of FPs. Further,
by adding the IC agents in the S3 scenarios we see that FP number increases. This
because the IC agents confirm the FP alarms in a faster pace. Thus, for the same
simulation period of 10000 "ticks" more FP requests are handled (see Figure 5.3).
For S2 with ICs the number of FPs fluctuates in the 620 range, while for S1 with
ICs around 320. The FN values in S1 are almost twice of those in S2. This because
in S2 an AND operation is performed between the FN outcome of DA1 and DA2.
As a result the probability of having a FN decreases in S2, and only when we have a
FN from both alarms the FN is reported. Comparing these two scenarios with their
corresponding S3 cases we see that the addition of ICs doesn't have any effect. This
because ICs cannot identify FNs. The graph in Figure 5.4 depicts the FP ratios of
S1, and S2 with various number of ICs. The FN ratios are visualized in Figure 5.5.
A larger number of FPs and a smaller number of FNs, provides with a more Sensitive
system. This because by triggering more alarms, more cases where the alarm is truly
positive are covered. On the other hand there is no difference observed with regard
to the Specificity parameter for each scenario. From the results in Table 5.6 and
Table 5.7 we see that for S1 with or without volunteers the average Sensitivity is
79.55%, while for S2 it increases to an average of 89.92%. The Specificity values
stay the same for all scenarios with an average of around 99%.
We proceed the evaluation with a comparison of the Social costs for S1 and S2,
5.4 Results
55
Figure 5.3: Number of alarm requests handled by the system for S1 and S2 with a
number of IC's ranging from 0 to 40.
while we continue increasing the number of IC's. Comparing S1 without any IC,
with the scenarios where the IC's are added we observe a significant decrease in the
cost of MAs. This because the ICs help verifying the condition of the EA agents,
thus reducing the cost of MAs. MAs have to intervene only when there has been
a true fall of the EA. The same applies for the S2 scenario. Figure 5.6 depicts the
In the case
relation of average MA cost with the IC number for both scenarios.
of S1, the minimum is reached for 20 IC's after which average social cost appears
to stabilize. Another metric that shows the impact of ICs in the MA cost is the
number of alarm verification's. In all scenarios where IC are present the number of
verification's performed by MA is reduced drastically.
An important metric is the average time until a triggered alarm for an EA gets
verified, being it true or false. The average waiting time reflects the reaction time
of the system for a given event. The best results are obtained with a number of 10
ICs. Additional effort beyond this value produces little improvements. With IC =
10 no significant differences are observed between S1 and S2. A graph showing the
average waiting time in report to IC number is given in Figure 5.7.
All in all, we can observe that the involvement of IC agents in the fall detection
5.4 Results
56
Figure 5.4: FP ratio for S1 and S2 with a number of IC's ranging from 0 to 40.
system using the FSO approach, helps reducing the MA social costs, while at the
same time the response time to fall events is fastened.
Figure 5.5: FN ratio for S1 and S2 with a number of IC's ranging from 0 to 40.
5.4 Results
57
Figure 5.6: Average social costs of S1 and S2 with a number of IC's ranging from 0
to 40.
Figure 5.7: Average waiting times with S1 and S2 and a number of IC's ranging
from 0 to 40.
10.47192982
11.24570447
12.09023941
14.09893993
14.62110727
17.43339254
21.44165171
31.91917293
Avg.WT118.6578947
42.28421053
42.30068729
43.35359116
42.99116608
41.43771626
44.51509769
45.2962298
48.73684211
68.25910931
Avg.MAcost
230
0
568
570
5969
5400
24102
99.79
79.86
235
0
582
582
6545
5963
24619
99.78
83.21
231
1
540
543
6565
6023
23541
99.8
81.69
222
0
566
566
7980
7414
24333
99.79
76.71
220
0
576
578
8451
7874
23951
99.79
74.91
227
6
555
563
9815
9252
25062
99.79
83.21
225
8
540
557
11943
11351
25230
99.8
81.65
211
33
472
532
16981
0
25928
99.81
77.09
193
296
0
494
58617
0
33720
99.79
77.68
MAinterventions
MAverifications
ICverifications
Reqs.Handled
CWT
CSC(volunteers)
CSC(ambulances)
Specificity
Sensivity
0.000347549
0.000294217
0.000320124
0.000405769
0.000433369
0.000275393
0.000308676
0.000367909
0.000379999
FNratio
0.5964
0.0058
0.034
166825
230
58
340
0.591
0.0048
0.0344
163097
238
48
344
0.5727
0.0052
0.0311
162385
232
52
311
0.6042
0.0068
0.0342
167515
224
68
342
0.6176
0.0074
0.0357
170681
221
74
357
0.595
0.0046
0.0335
166988
228
46
335
0.5924
0.0051
0.033
165171
227
51
330
0.6015
0.0063
0.032
171175
212
63
320
0.6052
0.0056
0.0299
147313
195
56
299
FPratio
Avg.FN/tick
Avg.FP/tick
TNnumber
TPnumber
FNnumber
FPnumber
S1-40ICs
S1-35ICs
S1-30ICs
S1-25ICs
S1-20ICs
S1-15ICs
S1-10ICs
S1-5ICs
S1
Table5.6:ResultsofS1scenarios
10.51679307
10.62693157
12.11886587
13.61702128
15.2124183
17.18848758
21.67351598
46.97374702
Avg.WT203.5503356
27.21126761
27.9205298
28.38167939
28.92721165
28.38126362
30.28103837
30.98287671
36.09665871
65.13255034
Avg.MAcost
232
0
922
923
9707
8785
25116
99.59
89.51
232
1
904
906
9628
8723
25296
99.59
89.47
239
1
913
917
11113
10199
26026
99.58
89.19
226
3
887
893
12160
11269
25832
99.6
89.51
237
2
913
918
13965
13048
26054
99.58
91.72
235
5
877
886
15229
14344
26829
99.59
89.86
228
37
824
876
18986
18114
27141
99.59
89.41
219
67
745
838
39364
33426
30249
99.58
90.73
161
420
0
596
MAinterventions
MAverifications
ICverifications
Reqs.Handled
121316
CWT
0
38819
99.59
89.89
CSC(volunteers)
CSC(ambulances)
Specificity
Sensivity
0.000185062
0.000185191
0.000193582
0.000170334
0.000145634
0.000186859
0.000184776
0.000164411
0.000192829
FNratio
0.7226
0.003
0.0667
162078
256
30
667
0.7185
0.003
0.0651
161965
255
30
651
0.7208
0.0031
0.0661
160108
256
31
661
0.7323
0.0028
0.0654
164355
239
28
654
0.7222
0.0023
0.0663
157907
255
23
663
0.7099
0.0029
0.0629
155168
257
29
629
0.7203
0.0029
0.0631
156918
245
29
631
0.7195
0.0024
0.0604
145952
235
24
603
0.7013
0.002
0.0418
103699
178
20
418
FPratio
Avg.FN/tick
Avg.FP/tick
TNnumber
TPnumber
FNnumber
FPnumber
S2-40ICs
S2-35ICs
S2-30ICs
S2-25ICs
S2-20ICs
S2-15ICs
S2-10ICs
S2-5ICs
S2
Table5.7:ResultsofS2scenarios
Conclusions
Evolution is a process that has constantly accompanied the humanity. The same
should apply for the traditional organizations. Evolving the traditional organizations
while maintaining the identity of the intended services represents a great challenge
for the mankind. With an ever increasing number of population and with scarcer
natural resources a more intelligent way of management and organization is a must.
The time to explore smarter and more efficient ways of organization is now.
In this thesis we presented two simulation models and preliminary results using the
FSO concepts as a potential solution to the given problems. It was indicated that
FSO provides us with an example of the social-energy-aware solutions we referred to
above. The provided simulation models have shown that FSO's dynamic hierarchical
organization optimally orchestrates all participating entities by the use of exceptions
mechanism, thus overcoming the stiffness of the traditional organizations. By the
use of this interconnecting structure of roles of various natures a significantly im-
proved agility is reached. The inclusion of intelligent mobile agents offers enormous
collaboration opportunities and resource sharing, thus leading to systems able to
tap into the great wells of social energy of our societies.
In the first simulation model we showed that by the use of FSO properties the in-
dividuals may benefit by receiving more qualitative healthcare services. This is due
to the increase of accuracy of service provider identification. At the same time the
service receiving times improved due to the inter-connectivity of organizations, al-
lowing for fast flow of information. By providing a service that involves entities of
various organizations a better usage of resources is archived, thus exploiting more
of the social energy. The diversity of FSO applications is shown by the number of
examples where such approach might have an application. In the second simulation
model we showed that by the usage of FSO mechanism fall detection systems can
be improved. Depending on the specificity and sensitivity of devices as well as on
60
5.4 Results
61
the willingness and availability of human beings, we showed how it is possible to
improve the social costs, make better use of the social resources, and reduce the
average time to respond to identified falls.
In the next section we describe the future work.
Future work
The subjects where FSO approach can get an application are numerous. However,
with a limited amount of time, choices for the subjects to be handled had to be
made. As the work progressed, several interesting ideas about various simulation
models came up. Some of them we did implement, but for the others a substantial
amount of effort and time was required thus they were left out.
An improvement to the current simulation models could be the addition of more
detailed characteristics to the agents, which would help mimicking the real life sce-
narios in a more accurate way. By having more information about the underlying
agents the community representatives could be improved to provide with semantic
analysis when dealing with given situations. Further the emergence of novel and pos-
sibly unexpected service modes, where two or more primary agents (elderly people)
fulfill each others requirements thus creating a self-serve coupling could be explored.
This would allow for analyzing the emergence of social self-service mechanisms and
their social impact.
As a future work the existing models could be complemented with protocols, algo-
rithms and components that allow for a practical implementation of the Service-
oriented Communities and Fractal Social Organizations. The idea is switching from
the current abstract models, to concrete software artifacts. A possible solution could
be the implementation of a middleware based on Web Services to manage intra- and
inter-SoC cooperation.
The topic is very broad and future research can take many directions.
62
Bibliography
[1] D. A. Bray, K. Croxson, W. H. Dutton, and B. Konsynski. Sermo: A community-
based, knowledge ecosystem. In: Oll distributed problem-solving networks con-
ference, 2008 (February).
[2] H. Zhuge. Cyber physical society. Pages 18 of: Semantics knowledge and grid
(skg), 2010.
[3] V. De Florio. Reflections on organization, emergence, and control in sociotech-
nical systems. Lexington Robert, MacDougall [Online]. Available: https://
arxiv.org/abs/1412.6965 (2015)
[4] Y. Kim, A. Chen, E. Keith, H. F. Yee Jr, M. Kushel. Not perfect, but better:
Primary care providers' experiences with electronic referrals in a safety net health
system. Journal of General Internal Medicine 24(5) (2009) 614-619
[5] L. Shaw, D. de Berker. Strengths and weaknesses of electronic referral: com-
parison of data content and clinical value of electronic and paper referrals in
dermatology. British Journal of General Practitioners 57 (2007) 223-224
[6] Anonymous:
Secured health information network and exchange (SHINE)
[Online]. Available:
http://www.gsma.com/connectedliving/wp-content/
uploads/2012/05/Smart-mHealth.pdf (2012)
[7] Anonymous: SHINE OS+ [Online]. Available: http://www.shine.ph (2015)
[8] V. De Florio, M. Bakhouya, A. Coronato, and G. Di Marzo Serugendo, Mod-
els and Concepts for Socio-technical Complex Systems: Towards Fractal Social
Organizations, Systems Research and Behavioral Science, vol. 30, no. 6, 2013.
63
64
[9] V. De Florio, and C. Blondia Service-oriented communities: Visions and con-
tributions towards social organizations. Lecture Notes in Computer Science, vol.
6428. Springer Berlin / Heidelberg. 10.1007/978-3-642-16961-8 51, 2010.
[10] V. De Florio, H. Sun, J. Buys, and C. Blondia: On the impact of fractal or-
ganization on the performance of socio-technical systems. In: Proc. of the 2013
Int.l Workshop on Intelligent Techniques for Ubiquitous Systems (ITUS 2013),
Vietri sul Mare, Italy, IEEE (2013) 1940: International Secretariat, Institute of
Pacific Relations.
[11] H. Sun, V. De Florio, C. Blondia Implementing a role based mutual assistance
community with semantic service description and matching. In: Proc. of the Int.l
Conference on Management of Emergent Digital EcoSystems (MEDES) 2013.
[12] V. De Florio, H. Sun, and M. Bakhouya, Mutualistic relationships in service-
oriented communities and fractal social organizations, CoRR, vol. abs/1408.7016,
2014. [Online]. Available: http://arxiv.org/abs/1408.7016
[13] U. Wilensky, NetLogo [computer software], Available online: http://ccl.
northwestern.edu/netlogo/ 1999.
[14] K. Ryu. Fractal-based reference model for self-reconfigurable manufacturing sys-
tems. Ph.D. thesis, Pohang University of Science and Technology, Korea. August
2003.
[15] Spica, G.: Catania, ospedali pieni: muore neonata. La Repubblica [Online].
Available:
http://palermo.repubblica.it/cronaca/2015/02/12/news/
manca_il_posto_in_rianimazione_negli_ospedali_di_catania_neonata_
muore_in_ambulanza-107141635/?ref=HREA-1 16 February 2015
[16] Ballabio, L.: Giussano, ha un infarto in ospedale:
il pronto soc-
corso
e
chiuso
e
lui muore
cercando
aiuto.
Il Giorno.
[Online].
Available:
http://www.ilgiorno.it/monza/cronaca/2013/11/29/
989314-infarto-morto-prontosoccorso-chiuso.shtml 29 November 2013
[17] H. Warnecke and M. Huser, The fractal company: a revolution in corporate
culture. Springer, 1993.
65
[18] V. De Florio, A. Coronato, M. Bakhouya, and G. Di Marzo Serugendo, Service-
oriented communities: Models and concepts towards fractal social organizations.
In: Proceedings of the 8th International Conference on signal, image technology
and internet based systems (SITIS 2012), IEEE (2012).
[19] Q. T. Huynh, U. D. Nguyen, S. V. Tran, A. Nabili, and B. Q. Tran, Fall
detection system using combination accelerometer and gyroscope in Proc. of the
Second Int.l Conf. on Advances in Electronic Devices and Circuits (EDC 2013),
2013.
[20] N. El-Bendary, Q. Tan, F. C. Pivot, and A. Lam, Fall detection and prevention
for the elderly: a review of trends and challenges, International Journal on Smart
Sensing and Intelligent Systems, vol. 6, no. 3, 2013.
[21] H. Sun, V. De Florio, N. Gui, and C. Blondia, The missing ones: Key in-
gredients towards effective ambient assisted living systems, Journal of Ambient
Intelligence and Smart Environments, vol. 2, no. 2, April 2010.
[22] D. Cusano and T. Doris. Accelerometers, false positives/negatives and fall de-
tection, September 2014.
[23] F. Sposaro , G. Tyson iFall: an Android application for fall monitoring and
response. In Proceedings of the Annual International Conference of the IEEE
Engineering in Medicine and Biology Society. Minneapolis: Institute of Electrical
and Electronics Engineers; 2009:6119-6122.
[24] Dai J, Bai X, Yang Z, Shen Z, Xuan D. Mobile phone-based pervasive fall de-
tection. Pers Ubiquitous Comput 2010, 14:633-643.
[25] Abbate S, Avvenuti M, Bonatesta F, Cola G, Corsini P, Vecchio A. A
smartphone-based fall detection system. Pervasive Mob Comput 2012, 8:883-899.
[26] V. De Florio, H. Sun, and C. Blondia, Community resilience engineering: Re-
flections and preliminary contributions, in Software Engineering for Resilient
Systems, ser. Lecture Notes in Computer Science, I. Majzik and M. Vieira, Eds.
Springer International Publishing, 2014, vol. 8785, pp. 18. [Online]. Available:
http://dx.doi.org/10.1007/978-3-319-12241-01
Appendix A
Exemplary FSO structural organi-
zation
66
FSO-structure.txt
Emergency response members
firefighter's_coordinator 37
people's_coordinator 36
localhospital 8
localhospital 7
People's coordinator members
[taxi 160 taxidriver 154]
[taxi 164 taxidriver 157]
[taxi 165 taxidriver 152]
[taxi 170 taxidriver 151]
[taxi 171 taxidriver 159]
[taxi 172 taxidriver 160]
[taxi 173 taxidriver 158]
[taxi 159 taxidriver 155]
[individual 144]
[individual 139 car 151]
[individual 140]
[individual 142]
[individual 143 car 149]
[individual 138 car 148]
[individual 103 car 199]
[individual 131 car 101]
[individual 161 car 131]
[individual 120 car 166]
[individual 147 car 150]
[individual 146]
[house 116 fire-detector 60]
[house 133 fire-detector 56]
[house 96 fire-detector 78]
[house 104 fire-detector 44]
Firefighters's coordinator members
[ftruck 166 firefighter 172 firefighter 169]
[ftruck 167 firefighter 171]
[ftruck 168 firefighter 170 firefighter 173 ]
localhospital 8 members
medicalappliance 27
medicalappliance 25
medicalappliance 31
medicalappliance 33
medicalappliance 28
medicalappliance 26
67
L2
L1
L1
L1
L1
L1
L0
L0
L0
L0
L0
L0
L0
L0
L0
L0
L0
L0
L0
L0
L0
L0
L0
L0
L0
L0
L0
L0
L0
L0
L1
L0
L0
L0
L1
L0
L0
L0
L0
L0
L0
doctor 20
doctor 24
transportvan 16
transportvan 13
transportvan 12
transportvan 14
ambulance 10
ambulance 9
ambulance 11
localhospital 7 members
medicalappliance 34
medicalappliance 30
medicalappliance 29
doctor 22
doctor 23
transportvan 17
transportvan 19
68
L0
L0
L0
L0
L0
L0
L0
L0
L0
L1
L0
L0
L0
L0
L0
L0
L0
|
1509.00737 | 1 | 1509 | 2015-09-02T15:16:42 | A Game-theoretic Formulation of the Homogeneous Self-Reconfiguration Problem | [
"cs.MA",
"cs.GT",
"eess.SY"
] | In this paper we formulate the homogeneous two- and three-dimensional self-reconfiguration problem over discrete grids as a constrained potential game. We develop a game-theoretic learning algorithm based on the Metropolis-Hastings algorithm that solves the self-reconfiguration problem in a globally optimal fashion. Both a centralized and a fully distributed algorithm are presented and we show that the only stochastically stable state is the potential function maximizer, i.e. the desired target configuration. These algorithms compute transition probabilities in such a way that even though each agent acts in a self-interested way, the overall collective goal of self-reconfiguration is achieved. Simulation results confirm the feasibility of our approach and show convergence to desired target configurations. | cs.MA | cs | A Game-theoretic Formulation of the Homogeneous
Self-Reconfiguration Problem
Daniel Pickem1, Magnus Egerstedt2, and Jeff S. Shamma3
5
1
0
2
p
e
S
2
]
A
M
.
s
c
[
1
v
7
3
7
0
0
.
9
0
5
1
:
v
i
X
r
a
Abstract -- In this paper we formulate the homogeneous
two- and three-dimensional self-reconfiguration problem over
discrete grids as a constrained potential game. We develop a
game-theoretic learning algorithm based on the Metropolis-
Hastings algorithm that solves the self-reconfiguration problem
in a globally optimal fashion. Both a centralized and a fully
distributed algorithm are presented and we show that the only
stochastically stable state is the potential function maximizer,
i.e. the desired target configuration. These algorithms compute
transition probabilities in such a way that even though each
agent acts in a self-interested way, the overall collective goal of
self-reconfiguration is achieved. Simulation results confirm the
feasibility of our approach and show convergence to desired
target configurations.
I. INTRODUCTION
Self-reconfigurable systems are comprised of individual
agents which are able to connect to and disconnect from one
another to form larger functional structures. These individual
agents or modules can have distinct capabilities, shapes, or
sizes, in which case we call it a heterogeneous system (for
example [8]). Alternatively, modules can be identical and
interchangeable, which describes a homogeneous system (see
[11]). In this paper, we will present algorithms that reconfig-
ure homogeneous systems and treat self-reconfiguration as a
two- and three-dimensional coverage problem.
Self-reconfiguration is furthermore understood to solve the
following problem. Given an initial geometric arrangement
of cubes (called a configuration) CI and a desired target
configuration CT ,
the solution to the self-reconfiguration
problem is a sequence of primitive cube motions that re-
shapes/reconfigures the initial into the target configuration
(see Fig. 1). By configuration we mean a geometric arrange-
ment of a set of agents. The problem setup is then the
following.
• The environment E is a finite two- or three-dimensional
• N agents P = {1, 2, . . . , N} move in discrete steps
• Each agent has a restricted action set Ri which contains
discrete grid, i.e. E ⊆ Z2 or E ⊆ Z3.
through that grid.
only a subset of all its possible actions Ai.
This research was sponsored by AFOSR/MURI Project #FA9550-09-1-
0538 and ONR Project #N00014-09-1-0751.
1D. Pickem is a Ph.D. student in Robotics, Georgia Institute of Technol-
ogy, Atlanta, USA [email protected]
2M. Egerstedt is with the Faculty of Electrical and Computer Engineering,
Georgia Institute of Technology, Atlanta, USA [email protected]
3J. S. Shamma is with the School of Electrical and Computer
Technology, Atlanta, USA
and with King Abdullah University
Saudi Arabia
Engineering, Georgia
[email protected],
of
[email protected].
(KAUST), Thuwal,
and Technology
Institute
Science
of
• An agent's utility or reward Ui(a ∈ A) is inversely
proportional to the distance to the target configuration.
Many approaches to self-reconfiguration have been presented
in the literature, each with certain short-comings. There have
been centralized solutions (both in planning and execution,
e.g. [19]), distributed solutions that required a large amount
of communication (see [8]) or precomputation (see [7], [17]),
approaches that were either focused on locomotion (e.g. [5])
or functional target shape assemblies (e.g. [12]). Distributed
approaches have often relied on precomputation of rulesets
(see [17]), policies (e.g. [7]), or entire sets of paths/folding
schemata of agents (e.g. [6]).
In this paper, we present a fully decentralized approach
to homogeneous self-reconfiguration for which no central
decision maker is required. Currently, each agent needs to
know the location and shape of the target configuration to
compute the utility function of its actions and choose an
action. However, no (in the two-dimensional case) or limited
communication (in the three-dimensional case) is required to
successfully complete a reconfiguration.
The rest of this paper is organized as follows. Section
II discusses relevant related work. Section III presents the
system setup and theoretical formulation of the problem.
In Section IV we discuss the completeness of deterministic
reconfiguration, which is used in Section V to prove the
existence of a unique potential function maximizer. In Sec-
tion VI we decentralize the stochastic algorithm and present
simulation results in Section VII. Section VIII concludes the
paper.
II. RELATED WORK
In this section we want to highlight decentralized ap-
proaches in the literature that bear resemblance to methods
presented in this paper. Especially relevant to the presented
results in this paper are homogeneous self-reconfiguration
approaches such as [5], and [11], which employ cellular
automata and manually designed local rules to model the
system. Similar work in [7] shows an approach for locomo-
tion through self-reconfiguration represented as a Markov
decision process with state-action pairs computed in a dis-
tributed fashion. The presented algorithms are decentralized
but only applicable to locomotion and not the assembly of
arbitrary configurations.
Precomputed rules are also used in [17], in which graph
grammars for self-reconfiguration are automatically gener-
ated. Similarly, in [9] a decentralized approach is presented
based on graph grammatical rules, in which automatically
generated graph grammars are used to assemble arbitrary
Fig. 1: Example of self-reconfiguration sequence from a random 2D configuration (left) to another random 2D configuration
(right). Approximately every 20th time step is shown.
acyclic target configurations. Whereas these approaches are
able to assemble arbitrary target configurations, they rely on
precomputing rulesets for every target configuration.
The algorithms presented in this paper are inspired by
the coverage control literature, specifically game-theoretic
formulations such as [1], [13], and [21]. Both static sensor
coverage as well as dynamic coverage control with mobile
agents are discussed. Note, however, that agents in these
papers are limited to movement
in two dimensions and
operate with a different motion model and most importantly
different constraints.
We address these problems with a decentralized algorithm
that does not rely on precomputed rulesets, can be used for
locomotion as well as the assembly of arbitrary two- and
three-dimensional shapes, can handle changing environment
conditions as well as changing target configurations, and is
scalable to large number of modules due to its decentralized
nature.
III. PROBLEM FORMULATION
In this work, we represent agents as cubic modules that
move through a discrete lattice or environment E = Zd
in discrete steps.1 Without loss of generality these cubes
have unit dimension. Therefore, an agent's current state
or action ai (in a game theoretic sense) is an element
ai ∈ Zd. Note that an agent's action is equivalent to its
position in the lattice. Cubes can be thought of as geometric
embeddings of the agents in our system. A collection of
agents is furthermore called a configuration. Therefore, a
configuration C composed of N agents is a subset of the
representable space ZdN (see [18]). Moreover, we will deal
with homogeneous configurations, in which all agents have
the same properties and are completely interchangeable.
1Since we present
throughout this paper, the dimensionality d will be d ∈ {2, 3}.
two- and three-dimensional self-reconfiguration,
A. Motion Model
In the sliding cube model (see [4], [5], [17], [18], [19]), a
cube is able to perform two primitive motions - a sliding and
a corner motion. In general, a motion specifies a translation
along coordinate axes and is represented by an element m ∈
Zd. A sliding motion is characterized by (cid:107)ms(cid:107)L1 = 1, i.e.
ms,i = 1 for one and only one coordinate i ∈ 1, . . . d, which
translates a cube along one coordinate axis. A corner motion
on the other hand is defined by (cid:107)mc(cid:107)L1 = 2 such that mc,i =
1 for exactly two coordinates i ∈ 1, . . . d, which translates a
cube along two dimensions.
B. Game-theoretic Formulation
In this section we formulate the homogeneous self-
reconfiguration as a potential game (see [16]), which is
a game structure amenable to globally optimal solutions.
Generally, a game is specified by a set of players i ∈
P = {1, 2, . . . , N}, a set of actions Ai for each player,
and a utility function Ui(a) = Ui(ai, a−i) for every player
i. In this notation, a denotes a joint action profile a =
(a1, a2, . . . , aN ) of all N players, and a−i is used to denote
the actions of all players other than agent i.
In a constrained game, the actions of agents are constrained
through their own and other agents' actions. In other words,
given an action set Ai for agent i, only a subset Ri(a)) ⊂ Ai
is available to agent i. A constrained potential game is
furthermore defined as follows.
Definition 1: A constrained exact potential game (see
[21]) is a tuple G = (P,A, {Ui(.)}i∈P ,{Ri(.)}i∈P , Φ(A)),
where
• P = {1, . . . , N} is the set of N players
• A = A1 × ··· × AN is the product set of all agents'
• Ui : A → R are the agents' individual utility functions
• Ri : A → 2Ai is a function that maps a joint action to
action sets Ai
a restricted action set for agent i
Additionally, the agents' utility functions are aligned with a
global objective function or potential Φ : A → R if for all
agents i ∈ P, all actions ai, a(cid:48)
i ∈ Ri(a), and actions of other
agents a−i ∈(cid:81)
j(cid:54)=i Aj the following is true
i, a−i) − Ui(ai, a−i) = Φ(a
i, a−i) − Φ(ai, a−i)
(cid:48)
(cid:48)
Ui(a
The last condition of Def. 1 implies an alignment of
agents' individual incentives and the global goal. Therefore,
under unilateral change (only agent i changes its action from
ai to a(cid:48)
i) the change in utility for agent i is equivalent to the
change in the global potential Φ. This is a highly desirable
property since the maximization of all agents' individual
utilities yields a maximum global potential. We can now
formulate the self-reconfiguration problem in game theoretic
terms and show that it is indeed a constrained potential game.
Definition 2: Game theoretic self-reconfiguration can be
formulated as a constrained potential game, where the indi-
vidual components are defined as follows:
• The set of players P = {1, 2, . . . , N} is the set of all
• The action set of each agent Ai = Zd is a set of discrete
N agents in the configuration.
• The utility function of each agent
lattice positions (or a finite or infinite subset of Zd).
is Ui(a) =
dist(ai,CT )+1. Here, CT is the target configuration and
dist(ai,CT ) = minaj∈CT (cid:107)ai − aj(cid:107).
(cid:88)
• The restricted action sets Ri(a ∈ A) are computed
• The global potential Φ(a ∈ A) =
according to Section III-C.
Ui(a).
1
i∈P
Note that the utility of an agent is independent of all other
agents' actions and depends exclusively on its distance to
the target configuration. An agent's action set, however, is
constrained by its own as well as other agents' actions. The
goal of the game theoretic self-reconfiguration problem is to
maximize the potential function, i.e.
a∈A Φ(a) = max
max
a∈A
Ui(a)
(cid:88)
This can be interpreted as a coverage problem where the
goal of all agents is to cover all positions in the target
configuration. Therefore maximizing the potential is equiv-
alent to maximizing the number of agents that cover target
positions ai ∈ CT . The following propositions shows that
this formulation indeed yields a potential game.
Proposition 1: The self-reconfiguration problem in Def.
2 constitutes a constrained potential game with Φ(a) =
Ui(a) and Ui(a) =
1
dist(ai,CT )+1.
i , a−i), where a0
i∈P
Proof: Let the agents' utility functions Ui(ai, a−i) =
Φ(ai, a−i) − Φ(a0
i denotes the null action
of agent i, which is equivalent to removing agent i from
the environment. Then an agent's utility is its marginal
contribution to coverage (Wonderful Life Utility, see [1]), or
in other words, the grid cells covered exclusively by agent i.
But since each agent covers exactly the grid cell it currently
(cid:88)
i∈P
occupies, the following holds.
Ui(ai, a−i) = Φ(ai, a−i) − Φ(a0
i , a−i)
(cid:88)
j∈P
Uj(a) − (cid:88)
j∈P\{i}
=
Therefore,
Uj(a) = Ui(a)
i, a−i) − Φ(ai, a−i)
i, a−i) − Ui(ai, a−i) = Φ(a
(cid:48)
(cid:48)
Ui(a
As we will see in Section VI, this potential game structure
allows us to derive a decentralized version of the presented
learning algorithm.
C. Action Set Computation
a) 2D reconfiguration:
A core component of constrained potential games is the
computation of restricted action sets. Unlike previous work
(see for example [14] and [21]), agents in our setup are
constrained not just by their own actions, but also those of
others. In this section we present methods for computing
restricted action sets such that agents comply with motion
constraints as well as constraints imposed by other agents.
In the two-dimensional case
agents are restricted to motions on the xy-plane. Unlike
in previous work (see [17] and [18]) where we required a
configuration to remain connected at all times, in this work,
agents are allowed to disconnect from all (or a subset of)
other agents. This approach enables agents to separate from
and merge with other agents at a later time. To formalize
this idea, we first review some graph theoretic concepts.
Definition 3: Let G = (V, E) be the graph composed of
N nodes with V = {v1, v2, . . . , vN}, where node vi repre-
sents agent or location i. Then G is called the connectivity
graph of configuration C if E = V × V with eij ∈ E if
(cid:107)ai − aj(cid:107) = 1.
This definition implies that two nodes vi, vj in the connectiv-
ity graph are adjacent, if agent or location i and j are located
in neighboring grid cells. Note that a connectivity graph can
be computed for any set of grid positions, whether these
positions are occupied by agents or not. We furthermore use
the notions of paths on graphs and graph connectivity in the
usual graph theoretic sense. Note that G is not necessarily
connected as (groups of) agents can split off. Therefore, G
generally consists of connected components Ci such that
G = {C1, C2, . . . , Cm}. Since the edge set E of G is time-
varying, the number m of connected components changes
with time as well. Based on the connectivity graph G and
the current joint action, we now define the function Ri :
A → 2Ai, which maps from the full joint action set to a
restricted action set for agent i and is based on the following
two definitions of sets of primitive actions.
i ∈ Zd \ a−i : (cid:107)ms(cid:107)L1 = 1(cid:9), where
motions is Ms = (cid:8)a(cid:48)
(cid:8)a(cid:48)
i ∈ Zd \ a−i : (cid:107)mc(cid:107)L1 = 2 ∧ mc,j ∈ {0, 1}(cid:9),
Definition 4: The set of all currently possible sliding
Definition 5: The
corner
possible
j ∈ [1, . . . , d] and mc = a(cid:48)
set
motions
i − ai.
currently
=
where
is Mc
ms = a(cid:48)
i − ai.
all
of
i
Note that Ms and Mc in Def. 4 and Def. 5 are equally
applicable to 2D and 3D. These definitions encode the
motion model outlined in Section III-A and allow us to define
the restricted action set in two dimensions as follows.
Definition 6: The two-dimensional restricted action set is
(a) = Ms ∪ Mc.
given by R2D
This definition ensures that agent i can only move to unoccu-
pied neighboring grid positions a(cid:48)
i through sliding or corner
motions (or stay at its current position ai - see Algorithm
1 and Algorithm 2). All other agents replay their current
actions a−i.
b) 3D reconfiguration: Whereas in the 2D case agents
were allowed to move to all unoccupied neighboring grid
cell regardless of connectivity constraints,
in the three-
dimensional case we introduce the requirement of ground-
edness. An agent is immobile, if executing an action would
remove groundedness from any of its neighbors. Grounded-
ness requires a notion of ground plane, which is defined as
follows.
Definition 7 (Ground Plane): The ground plane is the set
SGP = {s ∈ E : sz = 0} where E ⊆ Z3 and the
corresponding connectivity graph is GGP = (VGP , EGP )
with eij ∈ EGP if (cid:107)si − sj(cid:107) = 1.
Note that the ground plane is defined as the xy-plane and
its connectivity graph GGP is, by definition, connected.
Positions s ∈ SGP are not allowed to be occupied by
agents, therefore ai ∈ Ai \ SGP ∀i ∈ P. Using the graph
GGP , we define G(cid:48) = (V (cid:48), E(cid:48)) as V (cid:48) = V ∪ VGP and
E(cid:48) = V (cid:48) × V (cid:48) such that eij ∈ E(cid:48) if for vi, vj ∈ V (cid:48) we
have (cid:107)ai − aj(cid:107)L1
= 1. Note that G(cid:48) represents the current
configuration including the ground plane, and ai represents
an action of an agent or an unoccupied position in the ground
plane.
Definition 8 (Groundedness): An agent i is grounded if
there exists a path on G(cid:48) from vi ∈ V ⊂ V (cid:48) to some vk ∈
VGP ⊂ V (cid:48), where vi represents agent i in the connectivity
graph G (see Def. 3). A configuration C is grounded if every
agent i ∈ P is grounded.
The idea behind groundedness hints at an embedding of
a self-reconfigurable system in the physical world, where
agents cannot choose arbitrary positions in the environment
(e.g. float
in free space). More importantly, we use the
notion of groundednes to prove completeness of determin-
istic reconfiguration in Section IV and irreducibility of the
underlying Markov chain in Section V.
An agent can verify groundedness in a computationally cheap
way through a depth-first search, which is complete and
guaranteed to terminate in time proportional to O(N ) in a
finite space. The notion of groundedness also informs the
restricted action set computation. If all neighbors Ni =
{vj ∈ V : eij ∈ E} (adjacency according to G in Def.
3) of agent i can compute an alternate path to ground (other
than through agent i) then agent i is allowed to move. To
formalize this idea, let G−i = (V−i, E−i) with V−i =
V ∪ VGP \{vi} and E−i = V−i × V−i such that eij ∈ E−i if
for vi, vj ∈ V−i we have (cid:107)ai − aj(cid:107)L1
= 1. G−i is therefore
the connectivity graph of the current configuration including
C
c1
c2
C
c2
c1
c3
SGP
(a) A movement of agent c1 would
remove groundedness of the agent
c2.
SGP
(b) Agenet c1 can move with-
out breaking the groundedness con-
straint for the agents c2 and c3.
Fig. 2: Examples of grounded configurations and feasible
motions of cubes.
the ground plane without agent i. Subsequently, R3D
defined as follows.
i
(a) is
i
i
(a) = {ai}.
Definition 9: The three-dimensional restricted action set
(a) = Ms ∪ Mc if all agents vj ∈ Ni are grounded on
R3D
G−i. Otherwise, R3D
This definition encodes the same criteria as the two-
dimensional action set with the additional constraint of
maintaining groundedness (see Fig. 2). If agent i executing
an action would leave any of its neighbors ungrounded, agent
i is not allowed to move.
IV. DETERMINISTIC COMPLETENESS
Theorem 1 (Completeness of 2D reconfiguration):
In this section we establish completeness of deterministic
reconfiguration in two and three dimensions. We will show
that for any two configurations CI and CT there exists a
deterministically determined sequence of individual agent
actions such that configuration CI will be reconfigured into
CT . These results are required to show irreducibility of the
Markov chain induced by the learning algorithm outlined in
Section V. Irreducibility guarantees the existence of a unique
stationary distribution and furthermore a unique potential
function maximizer. We first show completeness of 2D
reconfiguration.
Any given two-dimensional configuration CI
can be
reconfigured into any other two-dimensional configuration
CT ,
there exists a finite sequence of configurations
{CI = C0,C1, . . . ,CM = CT} such that two consecutive
configurations differ only in one individual agent motion.
Proof: Without loss of generality, assume that CI and
CT do not overlap, i.e. for no ci ∈ CI is it true that also
ci ∈ CT . Additionally, assume that CI and CI are separated
along one dimension k ∈ {ex, ey, ez} (with ex, ey, ez being
the basis vectors of the lattice), i.e. ∀ci,k ∈ CI we have
that ci,k < cj,k, ∀cj ∈ CT . Then at each time step t,
select the agent i whose current position ci ∈ C is closest
to an unoccupied position cj ∈ CT . Plan a deterministic
i.e.
i → c1
i →
path of primitive agent motions pi = {ci = c0
··· → cm
i = cti} using a complete path planner such as A*.
Note that such a path always exists since we don't require
agents to remain connected to any other agents. Therefore,
the path planning problem is reduced to single agent path
planning on a discrete finite grid, which is complete because
A* is complete. This greedy selection process of the agent-
target pairs together with a complete path planning approach
suffices to reconfigure any two-dimensional configuration
into any other two-dimensional configuration (similar to
flood-fill algorithms).
The result in Theorem 1 holds for any configuration, even
configurations that consist of multiple connected compo-
nents. Before we can show a similar result for the 3D case
we need to introduce a graph theoretic result.
Lemma 1: According to Lemma 6 in [19], any finite graph
with at least two vertices contains at least two vertices which
are not articulation points.2
a
finite
of
exists
grounded
i , . . . , am
i , s(cid:107)L1
Proof: Without
3D configuration
loss of generality, assume that
i } such that for some s ∈ SGP (cid:107)am
reconfigured into a 2D configuration C2D
Int,
Theorem 2 (Completeness of 3D to 2D reconfiguration):
CG,3D can
Any finite
be
i.e.
sequence
there
configurations
Int} such that two consecutive
{CG,3D = C0,C1, . . . ,CM = C2D
configurations differ only in one individual agent motion.
the
connectivity graph of CG,3D consists of one connected
component. In any finite grounded 3D configuration, there
always exists an agent i ∈ P with a non-empty restricted
action set Ri(a) > 0.. Agent i is therefore mobile and there
exists a finite path of individual agent motions pi = {ai =
= 1,
a0
i , a1
i.e. the agent's final action is a position on the ground plane
SGP .
Let the subset of agents Pz>1 ⊂ P contain those agents
whose positions are not on the ground plane and Gz>1 =
(Vz>1, Ez>1) the corresponding connectivity graph. Further-
more, let G(cid:48)(cid:48) = (V (cid:48)(cid:48), E(cid:48)(cid:48)) be such that V (cid:48)(cid:48) = Vz>1 ∪{vGP},
where vGP is a single node representing all
the agents
on the ground plane and E(cid:48)(cid:48) such that eij ∈ E(cid:48)(cid:48)
if for
vi, vj ∈ V (cid:48)(cid:48) we have (cid:107)ai − aj(cid:107)L1
= 1. According to Def. 9,
an agent i is mobile if it is not an articulation point in the
connectivity graph G(cid:48)(cid:48) (see Fig. 3). In G(cid:48)(cid:48), vGP may or may
not be a non-articulation points, but according to Lemma
1, in every connected graph there always exist at least two
non-articulation points. Therefore, there exists at least one
agent i that has a non-empty restricted action set. For that
agent, one can compute a deterministic action sequence that
moves agent i to the ground plane. In other words, at each
iteration t we transfer one vertex from Vz>1 to vGP such
z>1 − 1 until Vz>1 = 0 and all agents
that V t
have been moved to vGP . This process terminates in a finite
number of time steps because the initial configuration CG,3D
is finite. The result is a 2D configuration C2D
Int representing
G(cid:48)(cid:48).
z>1 = V t−1
C G
Gz>1
G
G(cid:48)(cid:48)
SGP
Fig. 3: Example of a grounded configuration CG, the ground
plane SGP , associated connectivity graph G. Gz>1 repre-
sents all agents not on the ground plane, while all agents on
the ground plane are represented by a single node in G(cid:48)(cid:48)
I
.
Proof:
Corollary 1: Any finite grounded 3D configuration CG,3D
can be reconfigured into any other finite grounded 3D
configuration CG,3D
T
Since, according to Theorem 2, any finite
grounded 3D configuration CG,3D
can be reduced to an in-
termediate 2D configuration C2D
Int in a finite number of steps,
the reverse is also true - any finite grounded 3D configuration
CG,3D
Int in
T
a finite number of steps. According to Theorem 1, any 2D
configuration C2D
Int can be reconfigured into any other 2D
configuration C2D(cid:48)
Int . Therefore, there exists a deterministic
finite action sequence from CG,3D
can be assembled from some 2D configuration C2D(cid:48)
to CG,3D
.
I
I
T
V. STOCHASTIC RECONFIGURATION
In this and the following section we present a stochastic
reconfiguration algorithm that is fully distributed, does not
require any precomputation of paths or actions, and can
adapt to changing environment conditions. Unlike log-linear
learning ([2]), which cannot handle restricted action sets,
and variants such as binary log-linear learning ([1], [13],
[14]), which can only handle action sets constrained by
an agent's own previous action,
the presented algorithm
guarantees convergence to the potential function maximizer
even if action sets are constrained by all agents' actions.
Our algorithm is based on the Metropolis-Hastings al-
gorithm ([15],[10]), which allows the design of transition
probabilities such that the stationary distribution of the un-
derlying Markov chain is a desired target distribution, which
we choose to be the Gibbs distribution. This choice enables a
distributed implementation of the learning rule in Theorem
3 through the potential game formalism (see Corollary 2).
The Metropolis-Hastings algorithm guarantees two results:
existence and uniqueness of a stationary distribution. We
will use these properties to show that the only stochastically
stable state is x*, the potential function maximizer.
Theorem 3: Given any two states xi and xj representing
global configurations, the transition probabilities
2An articulation point is a vertex in a graph whose removal would
disconnect the graph.
pij =
1
τ (Φ(xj )−Φ(xi))
if e
1
τ (Φ(xj )−Φ(xi)) qji
qij
≤ 1
o.w.
qjie
qij
(cid:40)
e
e
1
τ
1
τ
1
τ
1
τ
Φ(x)
Φ(x)
(cid:80)
(cid:80)
x(cid:48)∈X e
x(cid:48)∈X e
Φ(x(cid:48)) .
guarantee that the unique stationary distribution of the un-
derlying Markov chain is a Gibbs distribution of the form
P r[X = x] =
Proof: Let X be a finite state space containing all
possible states of configurations composed of N agents.3
On that state space, let the desired target distribution be
Φ(x(cid:48)) with Φ defined in
π(x) = P r[X = x] =
Def. 2. By applying the Metropolis-Hastings algorithm, we
can compute transition probabilities P = {pij} such that π
is the stationary distribution of P , i.e. π = πP .
In the Metropolis-Hastings algorithm, a transition proba-
bility is represented as pij = g(xi → xj)α(xi → xj), where
g(xi → xj) is the proposal distribution and α(xi → xj) is
the acceptance distribution. Both are conditional probabilities
of proposing/accepting a state xj given that the current state
is xi.
Let agent k achieve the transition from state xi to xj
through action ak ∈ Rk(a). Then one possible choice for
the proposal distribution is g(xi → xj) = qij = 1Rk , ∀j ∈
{1, . . . ,Rk},
i.e. a random choice among all available
actions of agent k. According to Hastings ([10]), a popular
choice for the acceptance distribution is the Metropolis
choice αij = min
. Note that unlike in the original
formulation ([15]), we don't assume that qij = qji (see Fig.
4 for an illustration of qij and qji). These choices result in
the following transition probabilities:
1, πj qji
πiqij
(cid:110)
(cid:111)
(cid:40)
pij =
πj
πi
qji
qij
if πj qji
πiqij
o.w.
≤ 1
1
τ
1
τ
Φ(xi)
(cid:80)
e
x(cid:48)∈X e
It is easily verified that these pij satisfy the detailed bal-
ance equation πipij = πjpji and thus guarantee the existence
of a stationary distribution (see [15] and [10]). The resulting
pij follow from the definition of πi =
Φ(x(cid:48)) and
similarly πj.
Uniqueness of the stationary distribution follows from the
irreducibility of the Markov chain induced by P = {pij},
which is the case for our choice of proposal and acceptance
distribution because they assign a nonzero probability to
every action in any restricted action set. By Theorem 2 and
Corollary 1 we know that any state xj can be reached from
any other state xi and vice versa. Thus any action path has
nonzero probability and irreducibility follows.
Theorem 3 applies equally for 2D and 3D configuration.
However, for 3D reconfiguration, the proof relies implicitly
on the notion of groundedness to show irreducibility of the
underlying Markov chain (through the computation of R3D
).
The following theorem requires the definition of stochastic
stability.
Definition 10 (Stochastic Stability [20]): A state xi ∈ X
is stochastically stable relative to a Markov process P
if the following holds for the stationary distribution π
lim→0 π
xi > 0.
i
3Such a space is finite if we assume translation and rotation invariance
of the configuration as well as a finite environment.
State xi
State xj
State xj(cid:48)
a1
a2
a1
a2
a1
a3
Rk = 2
Rk(cid:48) = 1
Rk(cid:48)(cid:48) = 3
qij = 1Rk = 1
2
qji = 1Rk(cid:48) = 1
qji(cid:48) = 1Rk(cid:48)(cid:48) = 1
3
Fig. 4: Example of forward and reverse actions with their
associated proposal probabilities qij, qji, and q(cid:48)
ji. Note that
xi, xj, x(cid:48)
j are states of the entire configuration, and agent k
is the currently active agent.
Note that the Markov process is defined through the transi-
tion probabilities in Theorem 3 and the stationary distribution
is a Gibbs distribution. Furthermore is equivalent to the
learning rate τ in the following proof.
Theorem 4: Consider the self-reconfiguration problem in
Def. 2. If all players adhere to the learning rule in Theorem
3 then the unique stochastically stable state x∗ is the state
that maximizes the global potential function.
x(cid:48)∈X e
Proof: Note that
this result holds by definition of
the desired target distribution, which is a Gibbs distribution
centered at the state of maximum global potential and defines
the probability of being in a state x as P r[X = x] =
(cid:80)
Φ(x(cid:48) ) . The learning rate or temperature τ represents
the willingness of an agent to make a suboptimal choice (i.e.
explore the state space). As τ → 0, P r[X = x] → 0 for all
states x (cid:54)= x∗ which are not potential function maximizers
(see [2] and [14]).
Note that the maximum global potential is achieved when
all agents are at a target position ai ∈ CT . Algorithm 1
shows an implementation of Theorem 3. In Algorithm 1,
similarly to the Metropolis-Hastings algorithm in [10], pii =
Φ(x)
1
τ
1
τ
e
1 −(cid:80)
j(cid:54)=i pij.
VI. A DECENTRALIZED ALGORITHM
One shortcoming of Algorithm 1 is its centralized nature
that requires the computation of a global potential function
Φ(xi) and depends on the entire current configuration xi.
A decentralized algorithm is desirable to execute the global
learning rule on a team of agents. The formulation of the
self-reconfiguration problem as a potential game allows us to
rewrite the transition probabilities in a decentralized fashion
as follows.
Corollary 2: The global learning rule of Theorem 3 can
be decentralized such that each agent can execute it with
local information only.
xi as (a(cid:48)
Proof: Note that for agent k, we can express xj and
k, a−k) and (ak, a−k) respectively. According to
input : Target configuration CT
Start clock (see [3])
while True do
if Clock ticks then
(cid:110)
Compute current restricted action set Rk
Select a(cid:48) ∈ Rk with probability q = 1Rk
Compute α = min
if α = 1 then
xt+1 = a(cid:48)
τ (U (a(cid:48))−U (a))(cid:111)
Rk
Rk(cid:48) e
1,
1
a(cid:48) with probability α
a with probability 1 − α
(cid:40)
else
xt+1 =
end
end
input : Current and target configuration C and CT
while True do
(cid:110)
Randomly pick an agent k in state xi
Compute restricted action set Rk
Select ai→j,k ∈ Rk with probability qij = 1Rk
Compute αij = min
if αij = 1 then
xt+1 = xj
else
τ (Φ(xj )−Φ(xi))(cid:111)
1, qji
qij
e
1
(cid:40)
xj with probability αij
xi with probability 1 − αij
xt+1 =
end
end
Algorithm 1: Global game-theoretic learning algorithm.
Note that state xj is the result of agent k applying
action ai→j,k and xi and xj refer to states of the entire
configuration. Also note that qii /∈ Rk but pii (cid:54)= 0.
end
Algorithm 2: Self-reconfiguration using game-theoretic
learning local version that each agent executes. Note that
xt, xt+1 refer to consecutive states of the active agent.
Proposition 1, we can then rewrite Φ(xj)−Φ(xi) as follows.
k) − Uk(ak) = Uk(a
k, a−k) − Uk(ak, a−k)
(cid:48)
(cid:48)
Uk(a
k, a−k) − Φ(ak, a−k)
(cid:48)
= Φ(a
= Φ(xj) − Φ(xi)
(cid:40)
Therefore, we can rewrite the transition probabilities as
follows.
pij =
1
τ (Uk(a(cid:48)
k)−Uk(ak))
if e
1
τ (Uk(a(cid:48)
k)−U (ak)) qji
qij
o.w.
qjie
qij
≤ 1
Since qij, qji, Uk(a(cid:48)
k), as well as Uk(ak) can be computed
with local information, so too can the transition probabilities.
The stationary distribution of the process described by pij is
the same Gibbs distribution as in Theorem 3.
Note that
local can mean multiple hops, because the
computation of restricted action sets requires to maintain
groundedness of all neighboring agents. Verifying ground-
edness requires a DFS search to the ground plane, which in
the worst case can take N − 1 hops.
Algorithm 2 shows a decentralized implementation of
Algorithm 1 and Corollary 2. Note that a transition from
configuration xi to xj is accomplished by agent k executing
action a(cid:48) ∈ Rk starting at its current location a. Therefore,
we can interpret qij as a transition probability for a forward
action and qji as a reverse action (see Fig. 4).
VII. IMPLEMENTATION
The global version of the algorithm was implemented
and evaluated in Matlab. For the simulations shown in Fig.
5, we used a τ = 0.001 that struck a balance between
greedy maximization of agent utilities and exploration of the
state space through suboptimal actions. Agents' actions are
restricted according to the action set computation outlined
in Section III-C and the motion model in Section III-A.
Restricted action sets depend on the agents joint action and
the environment - in our simulations only the ground plane.
Agents' positions are initialized above the ground plane such
that their z-coordinate z ≥ 1. In a straightforward extension
to this algorithm, obstacles can be added to restrict
the
environment even further.
Fig. 5 shows convergence results of Algorithm 1 of
configurations containing 10, 20, and 30 agents. Four types
of reconfigurations have been performed: 2D to 2D, 2D to
3D, 3D to 2D, and 3D to 3D. The vertical lines in Fig.
5 represent
the average time to convergence of all four
types of reconfigurations of a certain size (e.g. the leftmost
line represents average convergence of a configuration of 10
agents). Convergence is achieved, if the configuration reaches
a global potential of Φ = N, i.e. every agent has a utility
of Ui = 1. Note that in the scenarios of Fig. 5, the target
configuration was offset from the initial configuration by a
translation of 10 units along the x-axis. One can observe that
at the beginning of each reconfiguration the global potential
ramps up very fast (within a few hundred time steps), but the
asymptotic convergence to the global optimum can be slow
(see the case 3D to 2D for 30 agents). An example of a 2D
to 2D reconfiguration sequence is shown in Fig. 1.
VIII. CONCLUSION
In this paper, we have applied the potential game for-
malism to the self-reconfiguration problem and developed a
stochastic algorithm that converges to the global potential
function maximizer. Under the assumptions of grounded-
ness, we have introduced a decentralized approach to self-
reconfiguration that requires little communication, does not
rely on a centralized decision maker or precomputation,
and converges to the global optimum. Our simulation re-
sults suggest that this formulation of the self-reconfiguration
problem is indeed a feasible approach and can solve self-
reconfiguration in a decentralized fashion.
Fig. 5: Convergence times for different types of configurations and sizes ranging from 10 to 30 agents.
[13] Yusun Lee Lim. Potential game based cooperative control in dynamic
environments. Master's thesis, Georgia Institute of Technology, 2011.
[14] Jason R. Marden and Jeff S. Shamma. Revisiting log-linear learning:
Asynchrony, completeness and payoff-based implementation. Games
and Economic Behavior, 75(2):788 -- 808, 2012.
[15] Nicholas Metropolis, Arianna W. Rosenbluth, Marshall N. Rosenbluth,
Augusta H. Teller, and Edward Teller. Equation of state calculations
by fast computing machines. Journal of Chemical Physics, 21:1087 --
1092, 1953.
[16] Dov Monderer and Lloyd S Shapley. Potential games. Games and
Economic Behavior, 14(1):124 -- 143, 1996.
[17] Daniel Pickem and Magnus Egerstedt. Self-reconfiguration using
In Analysis and Design
graph grammars for modular robotics.
of Hybrid Systems (ADHS), 4th IFAC Conference on, Eindhoven,
Netherlands, June 2012.
[18] Daniel Pickem, Magnus Egerstedt, and Jeff S Shamma. Complete
heterogeneous self-reconfiguration: Deadlock avoidance using hole-
free assemblies. In Distributed Estimation and Control in Networked
Systems (NecSys'13), 4th IFAC Workshop on, volume 4, pages 404 --
410, September 2013.
[19] Daniela Rus and Marsette Vona.
Crystalline robots: Self-
reconfiguration with compressible unit modules. Autonomous Robots,
10(1):107 -- 124, Jan. 2001.
[20] Peyton H. Young. The evolution of conventions. Econometrica,
January 1993.
[21] Minghui Zhu and Sonia Mart´ınez. Distributed coverage games for
energy-aware mobile sensor networks. SIAM Journal on Control and
Optimization, 51(1):1 -- 27, 2013.
REFERENCES
[1] Gurdal Arslan, Jason R Marden, and Jeff S Shamma. Autonomous
vehicle-target assignment: A game-theoretical formulation. Journal
of Dynamic Systems, Measurement, and Control, 129(5):584 -- 596,
September 2007.
[2] Lawrence E. Blume. The statistical mechanics of strategic interaction.
Games and economic behavior, 5(3):387 -- 424, 1993.
[3] Stephen P. Boyd, Arpita Ghosh, Balaji Prabhakar, and Devavrat Shah.
IEEE Transactions on Information
Randomized gossip algorithms.
Theory, 52(6):2508 -- 2530, 2006.
[4] Zack Butler, Keith Kotay, Daniela Rus, and Kohji Tomita. Cellular
In
automata for decentralized control of self-reconfigurable robots.
Proc. of the ICRA 2001 workshop on modular robots, pages 21 -- 26,
2001.
[5] Zack Butler, Keith Kotay, Daniela Rus, and Kohji Tomita. Generic
decentralized control for lattice-based self-reconfigurable robots. The
International Journal of Robotics Research, 23(9):919 -- 937, 2004.
[6] Kenneth C. Cheung, Erik D. Demaine, Jonathan Bachrach, and Saul
Griffith. Programmable assembly with universally foldable strings
(moteins). IEEE Transactions on Robotics, 27(4):718 -- 729, 2011.
[7] Robert Fitch and Zack Butler. Million module march: Scalable
The International
locomotion for large self-reconfiguring robots.
Journal of Robotics Research, 27(3-4):331 -- 343, 2008.
[8] Robert Fitch, Zack Butler, and Daniela Rus. Reconfiguration planning
for heterogeneous self-reconfiguring robots. In Intelligent Robots and
Systems, 2003.(IROS 2003). Proceedings. 2003 IEEE/RSJ Interna-
tional Conference on, volume 3, pages 2460 -- 2467, October 2003.
[9] Michael J. Fox. Distributed Learning in Large Populations. PhD
thesis, Georgia Institute of Technology, August 2012.
[10] W Keith Hastings. Monte carlo sampling methods using markov chains
and their applications. Biometrika, 57(1):97 -- 109, 1970.
[11] Keith Kotay and Daniela Rus.
locomotion for a self-
reconfiguring robot. In Robotics and Automation, 2005. ICRA 2005.
Proceedings of the 2005 IEEE International Conference on, pages
2963 -- 2969, 2005.
Efficient
[12] Haruhisa Kurokawa, Kohji Tomita, Akiya Kamimura, Shigeru Kokaji,
Takashi Hasuo, and Satoshi Murata. Distributed self-reconfiguration
of M-TRAN III modular robotic system. The International Journal of
Robotics Research, 27(3-4):373 -- 386, 2008.
010002000300040005000600070008000900010000051015202530Timetoconvergenceusingτ=0.001Time stepsGlobal Potential Size 10: 2D to 2DSize 10: 2D to 3DSize 10: 3D to 2DSize 10: 3D to 3DSize 20: 2D to 2DSize 20: 2D to 3DSize 20: 3D to 2DSize 20: 3D to 3DSize 30: 2D to 2DSize 30: 2D to 3DSize 30: 3D to 2DSize 30: 3D to 3D |
1801.06740 | 1 | 1801 | 2018-01-20T23:31:14 | Knowledge Representation for High-Level Norms and Violation Inference in Logic Programming | [
"cs.MA",
"cs.AI"
] | Most of the knowledge Representation formalisms developed for representing prescriptive norms can be categorized as either suitable for representing either low level or high level norms.We argue that low level norm representations do not advance the cause of autonomy in agents in the sense that it is not the agent itself that determines the normative position it should be at a particular time, on the account of a more general rule. In other words an agent on some external system for a nitty gritty prescriptions of its obligations and prohibitions. On the other hand, high level norms which have an explicit description of a norm's precondition and have some form of implication, do not as they exist in the literature do not support generalized inferences about violation like low level norm representations do. This paper presents a logical formalism for the representation of high level norms in open societies that enable violation inferences that detail the situation in which the norm violation took place and the identity of the norm violation. Norms are formalized as logic programs whose heads specify what an agent is obliged or permitted to do when a situation arises and within what time constraint of the situation.Each norm is also assigned an identity using some reification scheme. The body of each logic program describes the nature of the situation in which the agent is expected to act or desist from acting. This kind of violation is novel in the literature. | cs.MA | cs | Knowledge Representation for High-Level Norms and Violation Inference in Logic
Programming
B.O. AKINKUNMI1 and Moyin F. BABALOLA2
1Dept of Computer Science,
University of Ibadan, Ibadan, Nigeria.
2Dept of Computer Studies,
The Polytechnic, Ibadan, Nigeria.
ABSTRACT
Most of the Knowledge Representation formalisms developed for representing prescriptive
norms in multi-agent normative systems can be categorized as either suitable for representing
high-level or low level norms. We argue that low-level norm representation do not advance
the cause of autonomy in agents in the sense that it is not the agent itself determining the
normative position it should be in at a particular time, on the account of a more general rule.
In other words the agent depends on some external system for a nitty-gritty prescription of its
obligations and prohibitions. On the other hand, high-level norms which have an explicit
description of a norm's precondition and have some form of implication, do not, as they exist
in the literature, support generalized inferences about violation like low level norm
representation formalisms do.
This paper presents a logical formalism for representation of high level norms in open
societies that enable violation inferences that detail the situation in which the norm violation
took place and the identity of the norm violated.
Norms are formalized as logic programs, whose heads each specify what an agent is obliged
or permitted to do when some situation arises and within what time constraint of the situation.
Each norm is also assigned an identity, using a reification scheme. The body of each logic
programs usually describes the nature of the situation in which the agent is expected to act or
desist from acting. This kind of violation inference is novel in the literature.
Keywords: Multi-Agent Systems, Norms, Logic programs, Knowledge Representation
1. INTRODUCTION
Norms are used in MAS to cope with autonomy, different beliefs, interests and desires of the
agents that cohabit in the system. Based on the normative descriptions and the actual (past
and present) actions of the agents, the system should detect the deviating behavior of any
agent in the system.
According to Marin and Sartor(1999), there are four clear properties that can be ascribed to a
norm of conduct. These are: applicability, (pre-)condition, effect and validity. The effect of a
norm is what an agent must do: the obligation to carry out an action or a prohibition from
carrying out an action. The condition is a situation that arises warranting the effect of the
norm. The applicability of a norm is the time that a condition must hold in order for the
effect to hold, while the validity of a norm is determined by its inclusion in the current body
1
of code of conduct at that time.
We classify most of the norms of conduct that have appeared in the literature into two
classes. Low level norms are those that specify a normative position or effect of a norm and
the time when (or by which) an agent is expected to conform to it. Examples of works that
formalize only low level norms include Sadri(2006), Stratulat et al(2001) and King et
al(2017). We call this kind of norm representation as such because they instruct the agent on
what to do and when to do it, rather than have the agent decide on when to act and for what
reason. As it were, the condition for a norm's effect to take place is defined by a clock alarm
signaling the arrival of the specified time. The violation of such a norm takes place when that
time interval expires without the agent effecting the appropriate reaction stipulated by the
norm's effect (i.e. either carry out a specific action or desist from doing so).
On the other hand there are high-level norms that specify an explicit description of both the
effect of the norm and the condition warranting it as well as the relationship between the time
of the effect and the time of the warranting condition. Examples of work from the literature
that formalized only high level norms include the work of Governatori, Rotolo and
Sartor(2005) as well as Artikis and Sergot(2010).
Our argument in this paper is that high-level norms are more appropriate for modeling real
life norms of conduct than are low level norms. This is because low-level formalisms cannot
capture many real life norms that require a detailed description of a warranting situation than
simply the striking of the clock. In addition to this, real life norms of conduct also carry time
constraint between the time the agents should effect his obligation or prohibition and the time
of the warranting condition.
The violation of a high level norm is the failure of an agent to carry out the effect of the norm
within the time constraint of the warranting situation. Furthermore, it is pertinent to
determine the validity of the violated norm(s) as at the time the violation took place, because
an invalid norm cannot be violated. A norm is said to be valid at a point in time if it is part
(member) of the system of norms in consideration at that point in time. The interval, during
which the norm is valid, is called the external time of that norm (Marin and Sartor, 1999).
A particular instance of low level norm representation is the formalism of King et al. (2017)
which treats a normative fluent as a relationship between an event that must hold by a certain
deadline, so that an obligation for an action a to be taken by a deadline d is the fluent obl(a,
d). Such an obligation is "discharged" if such an action takes place before the deadline or
"violated" otherwise.
This paper presents a logic programming based knowledge representation formalism for
norms that captures a norm's condition as a situation, its effect as an the obligation or
prohibition of an action and the temporal constraint between them as a reified entity that
captures qualitative and quantitative constraint. Section 2 discuses related works from the
literature. Section 3 discusses the language of the formalism. Particularly, section 3.2.3
2
discusses the temporal constraint structures used to represent the reified temporal constraints
expected between an agent's action and situation. Section 3.4 discusses how these temporal
constraints can be checked using constraint satisfaction rules expressed as Logic programs.
Section 3.5 shows how to use all these to make inferences about norm violation. Section 3.6
compares our formalism with some existing ones and points out parallel concepts from other
papers.
2. NORM REPRESENTATION IN THE LITERATURE
According to Sergot(1990), there are two kinds of norms in legal reasoning. These are
qualification norms and norms of conduct. Qualification norms define normative or legal
properties and relationships of agents, while norms of conduct define how an ideal agent is
expected to behave under certain circumstances. Consequently, unlike qualification norms,
norms of conduct (or prescriptive norms) take cognizance of the fact that there is a difference
between how an agent is expected to behave and how it might choose to behave in the real
world. The departure between how an agent is expected to behave and how it eventually
behaves is a violation of that expectation or norm.
Much work has been carried out on the logical representation of such norms of conduct.
Notable papers in this regard include the works of Stratulat et al (2001), Marin and
Sator(1999), Sadri et al (2006) and Panagiotidis et al (2009). As Artikis(2003) observed on
the work of Marin and Sator, the paper focused on three major issues namely: norm
applicability, norm effect and norm validity. Norm applicability describes the time interval
during which a norm's (pre-) condition must hold in order for its effect to hold. The effect of
a norm is the action an agent is expected to take or avoid taking when the norm's
precondition takes place. Norm validity at a time describes the recognition of that norm as
part of the body of legislation at a time. Marin and Sartor went on to identify the limitations
of Kowalski and Sergot' s Event Calculus in solving these problems in the process of
formalizing norms and presented an extension of Event Calculus for handling these problems.
In Stratulat et al (2001) the norms are represented by what seem like a reified ternary
predicate. For example an obligation is a triple O(Agent, Action-type, Time-Interval) that
carries the information that an agent is obliged to carry out an action of the type Action-type
during the time interval. For example in Stratulat's language the statement
holds(j, O(ag, a, k)) ………Axiom ST1
states that an obligation for an agent to carry out an action a at the time interval k holds
during time interval interval j. The interval k is the internal time of the norm in the language
of Marin and Sator while the interval j is the external time during which the norm is in effect.
Presumably k should be a subinterval of j. A violation of such a norm is inferred when the
agent is found at a future time to have failed to carry out such an expected action within the
prescribed time interval.
3
Similarly, Sadri et al(2006)'s representation of an obligation is the atom:
obliged(act(Act, Actor, Parameters), T, TC) or
prohibited(act(Act, Actor, Parameters), T, TC)
Thus an assertion that the actor Actor carries out (or is prohibited from carrying out) the
action Act at time T which must satisfy the temporal constraint TC. Sadri et al's temporal
constraints show the time points that bound by the time e g 10 > T > 17.
In addition, for most of the norms represented by Sadri et al(2006), the norm's condition for
an agent to be obliged to act or refrain from acting is set by time itself. Stratulat et al(2001)'s
paper also shared this limitation. For example: you can't park your car here between 10am
and 5 pm. Rather this kind of representation is inadequate for representing a norm like: you
can't park your car here from the moment it starts raining until it's 15 minutes after the rain.
While norms of the earlier type can be regarded as low level norms in the sense that they can
only be applied within a specific time frame, those of the latter kind can be regarded as high
level norms, in the sense that they apply anytime it rains. In that case it's up to the agent to
decide whether the norm is applicable in a particular situation and at what particular time an
agent finds itself in a deontic position.
A particular kind of low level norm is the normative fluent used by King et al(2017). Their
normative fluent is written as ob(a, d), denoting an obligation to carry out an action of type a
before a deadline d. The problem with this kind of deadline norms is that such norms can be
satisfied by actions of similar type undertaken before this norm becomes active. The problem
with this representation is that unless the record of an action that discharged a similar fluent
in the past is removed from the knowledge base as soon as it is discharged, it can
inadvertently discharge future obligations.
This first gap is bridged in this paper by representing the time interval constraints using time
point images (TPI), so that indefinite times and constraints can be represented. The second
gap is also bridged here by using situations to model a norm's condition. A situation can be
described by the propositional fluents (e.g. a raining fluent) that characterize it. Similarly a
situation can be associated with a certain time in which it holds as done by Pinto (1994). This
will make it possible to describe the conditions under which an agent cannot park his/her car
for each of the two norm examples given above.
There are two major examples of norm representation formalisms that are indeed high level
norms in the literature. The first is the temporalized formalization of legal norms by
Governatori, Rotolo and Sartor(2005). In this formalization, a norm's condition has an
implication relationship with the norm's effect (for example, the fact that an action is
obligatory), with each side of the implication associated with relative times. A format for
such rules looks like the following:
4
condition : t effect : t k
This rule reads like: if the condition holds at time t, then the effect (such as an action
becoming obligatory) holds at time t k. The first problem with this kind of formalization is
that it leaves no room for reasoning about violations of the norm (as pointed out by the
authors themselves), particularly because there is no way of identifying the norm being
violated. The best that can be done is to identify the violation of the effect of the norm such
as an obligation to carry out an action at some time relative to the time the condition arose.
The second problem with it is that temporal relations between conditions and effects can be
more complex than can be represented by constraints involving two time points. Firstly when
conditions arise, they usually have a starting point and a termination point. Therefore an
agent may have an obligation to act at some point relative to (i.e. before or after) the start or
finish or the time interval the condition lasted for. For example a robo-sweeper may be
obliged to start sweeping no later than 5 minutes after snowing stops. Another example is
when an agent is obliged to carry out an action 10 minutes before the scheduled end of an
event.
Another example of a formalism we consider appropriate for high level norms in the
literature is one based on the Event Calculus and implemented in PROLOG by Aritkis and
Sergot(2010). An example of a norm that can be represented in Artikis and Sergot's
formalism is: A faculty is empowered to supervise three years after earning a doctorate. It is
rendered thus:
happens(earnedDoctorate(F) = true, T – 1096),
holdsAt(enrolled(X) = true, T).
holdsAt( pow(F, supervise(F, X)) = true, T)
The representation of the robosweeper example (i.e. Robosweeper is obliged to start
sweeping no later than 5 minutes after snowing stops) however, reveals some problems with
EC representations such as this one. It can be rendered thus in Artikis and Sergot's EC
representation thus:
holdsAt(obl(Robosweeper, startweep) = true, T)
holdsAt(stop(snowing), T1),
T1 T,
T1 +5 > T.
The problem with EC representations of norms stems from the fact that actions in EC are
instantaneous. As such, when confronted with actions that have a duration such as sweeping,
one can only capture the commencement and/or termination of such actions when necessary.
A good representation of this norm however, should not only capture the commencement of
the sweeping action, but the action in its entirety. The only way we can capture the sweeping
action in an EC representation is to use the start and stop functions and treat sweep as an
5
event like snowing. However, from an agent's point of view it is critical to distinguish
between an event like snowing and an action like sweeping.
Nonetheless, Both Governatori et al as well as Artikis and Sergot(2010) in their
representations captured the essence of a high-level norm which are a norm's condition and
the essence of a temporal relationship between them. However, having a norm's condition
and effect appear on either sides of an implication as done by both Governatori et al(2005)
and Artikis and Sergot(2010), makes it impossible to give an identity to a particular high
level norm.
In general many real life prescriptive norms are high-level norms. Besides, truly autonomous
agents must be able to work with high level norms. Take for instance a real-life scenario. In
an electronic institution where there is a norm that obliges an agent to supply an order within
forty eight (48) hours after receiving the acknowledgement of payment for the order. The
condition required for the agent to carry out the supply of the order (norm's effect) is
receiving the acknowledgment of payment for the order (norm's condition).
Although this kind of norm can easily be formalized in the logic of Governatori et al, as:
Pay-ack(o) : t Obl(supply(o)) : t + 48
We can only talk about the violation of the specific instances of the effect of this norm which
is an obligation to supply an order at some given time (a low-level norm), and not the
violation of the norm itself. Inferring which high level norm has been violated is critical to
helping a sincere agent improve on its ability to be law-abiding. Communicating such norm
violations also requires that each norm be identified so that the identity of the norm can be
communicated to the erring agent.
Finally, inferring a norm violation requires that one determines whether or not the norm in
question is active or not as only an active norm can be violated. This requires that we be able
to have assertions about a norm's enactment and (if applicable) the repeal dates. This is only
possible if each norm has an identity that can be used to refer to it. Such identities can even
be quantified over in order to form general rules about norms.
Thus the representation of the norm used in this paper carries the following information:
The identity of the agent involved,
A normative fluent such as obl(a) or pro(a) that indicates that an obligation to
carry out an action a or a prohibition from carrying it out. This is the norm's
effect.
A situation whose description will capture the nature of the condition
warranting the effect of the norm,
6
The reified time constraint between the action and situation and
The norm's identity.
A normative token is treated as the relation bringing the other five elements together. This
formalization eliminates the need for a normative implication of the sort championed by
Governatori et al.
3. REPRESENTATION OF HIGH LEVEL NORMS
A norm is basically a rule. Each of these normative rules help in making inferences about
what an agent is expected to do or desist from doing within a certain time frame. The
inferences made from these normative rules are referred to as normative tokens.
A normative token is when an agent finds it is expected to effect a normative fluent, within
some time constraint, and because of, the arising of some named situation in conforming to a
named normative rule. A normative token relation is represented by a predicate NormPos
thus:
NormPos : Agent NormFluent Situation TC Norm-Id Boolean
(where the normative fluent is derived from an application of the function obl to an action
type)
Norm-id is an identifier for the norm rule that produced the actual normative token which is
an obligation. Every obligation that is produced by the norm bears the same norm-id. As such
every rule that helps to infer obligations, prohibitions and permissions has a unique norm-id
that it carries. This kind of rule naming is referred to by the term rule reification which is
similar in spirit to the notion of Davidson's reification (Galton 1991), This is illustrated with
Norm 3.1 and 3.2 as examples of rules generating this kind of normative tokens.
In sections 3.1 – 3.3, the language employed is a many sorted standard first order predicate
logic with equality and with standard semantics for operators or (), and (), negation ()
existential quantifier (), universal quantifier () implication( ) and equivalence( ). This
is needed to express the properties of relations such as "partially describe" or "fully
describe". In section 3.4 and 3.5, we resort to expressing norms with a language that is close
to standard logic programs with equality and typical non-classical implication represented by
if as well as, non-classical negation represented by .
Time is viewed as a linear and discrete model in which we recognize both time intervals and
instants to be known as the sort Interval or Instants. The relations among two time points are
represented by the infix predicates: <, >, , with the signatures:
<, >, , : Instant Instant Boolean
7
The beginning and ending of Intervals represented by the functions begin and end
respectively; of Intervals are Instants as the signature below shows:
begin : Interval Instants
end : Interval Instants
In addition, we will use all of Allen(1984)'s binary interval relations represented by
predicates: Meets, Before, Starts, Ends, During, Overlaps and their inverse relations. In
addition, we will use other binary relations built on these such as Within (interpreted as Starts
or During or Ends) and (improper) Subinterval (interpreted Within or Equals) by
Koomen(1989).
3.1 Normative Fluents and Action Types and Tokens
The basic sorts introduced in this subsection are normative fluents and Action types as well
as Action Tokens. A normative fluent is either the obligation on the part of an agent to carry
out an action of a certain type or the prohibition on the part of an agent from carrying out an
action of a certain type. The permission on the part of an agent to carry out an agent can be
taken as the negation of the prohibition to carry out the same action. Because normative
fluents are reified, the notion of obligation and prohibitions will be treated as the functions
obl and pro respectively. These are both reckoned to have the following signature:
obl, pro: ActionType NormativeFluent
In other words, the obl and pro functions each take an action type as argument and returns a
normative fluent. Apart from these there is a notion of negation for normative fluents which
is the function with the signature:
: NormativeFluent NormativeFluent
The meaning of obl(a), where a is an action type a should be read as "permission not to
carry out an action of type a", while the meaning of pro(a) should be taken to be
"permission to carry out an action of type a". Norms that carry this kind of normative fluents
cannot be violated.
Action types themselves carry a functional structure, so that obl and pro can be regarded as
higher order functions. An action type is usually a function denoted by a verb that describes
the generic type of the action, while its argument will be the object of the action. For example
an action type repair the car12 is the functional token repair(Car12). Thus the obligation to
repair the car12 is the normative fluent: obl(repair(Car12)).
So far we have been talking about an action type. However, there are instances when a
8
norm's condition needs to be described by the occurring of an instance of an event type. In
that case we define the time when an actual event takes place using a function timeA which
given an action returns a time interval, with the signature:
timeA : Action Interval
Finally, assertions that make an actual event belong to a particular event type, are represented
by the predicate Type-of-Action with the signature:
Type-of-Action : Action ActionType Boolean
3.2 Situations, Events, Processes
The basic sorts introduced here are Fluents, Situations, Events Processes and Time Intervals.
In this paper, the conditions of a norm are modeled by situations. Our situation are similar to
that described by Schubert(2000). A situation represents a complete state of the world with a
time frame. Each fluent describes a specific aspect of a situation. In Schubert's FOL**
language there are two kinds of relations that may exist between a fluent f and a situation s.
In one relation a fluent completely describes the situation written as f **s, while in the other
the fluent partially describes the situation f *s. In FOL**, the relation between a situation and
a fluent that holds in it, is in general, an entailment relation i.e. s ╞ f. Unlike FOL** however,
our fluents which we will treat as functional tokens in our language are atomic propositions
that do not require the use of quantifiers eg. Car17 is red, John loves Mary, etc. Speaking of
functions, there is a time function for situations in this formalism which given a situation
returns the time interval over which the situation persists. This function is timeS with the
following signature:
timeS: Situation Interval.
In the reified situation calculus of Pinto(1994), the Holds predicate is used to represent the
relation between a fluent and the situation in which it holds. Holds in Pinto's reified situation
calculus does not in any way, suggest that a fluent completely describes a situation. As such
we will thus use Holds(f, s) to connote the relation f partially describes s.
Schubert(2000) has argued the need for having situations that are completely described by
specific fluents so that accurate causation relations can be expression between situations. The
problem with only allowing situations to be partially described is that often causation
relations are between certain aspects of situations. Other aspects of those situations are
dormant in that relationship. This underscores the need for a completely describes relation
between fluents and situation. Schubert renders this relation in FOL** as **. In order to
respect the tradition from which this relation came from, we will use Holds** as relation
between a fluent and the situation it completely describes so that Holds**(f, s) means f
9
completely describes s. There are two specific relations between Holds and Holds**
described below:
Axiom 3.2.1
The relation "completely describes" is a specialization of "partially describes".
f, s. Holds**(f, s) Holds(f, s)
Axiom 3.2.2
If f partially describes s, there exists another situation of the same time as s, which f
completely describes.
f, s. Holds(f, s) s1. Holds**(f, s1) timeS(s) = timeS(s1)
We will define an implication relationship among fluents as the predicate ImplyF thus:
Axiom 3.2.3
An implication relation exists among between a fluent and another, if the fact that it holds in
any situation implies that the other holds in the same situation.
f, f1. ImplyF(f, f1) s. Holds(f, s) Holds(f1, s)
A simple instance of the implication relationship between fluents will exist between a raining
fluent and a wet fluent. The following axiom further clarifies the difference between the
relations denoted by predicates Holds** and Holds.
Axiom 3.2.4
If f completely describes a situation, then no other fluent other than those implied by f can
hold in that situation.
f, s. Holds**(f, s) (f1. f f1 ( ImplyF(f, f1) Holds(f1, s) ))
Two special instances of fluents are the occurring of an event or the progression of a process.
The fluents are represented by the functional structures: occurring(e) and prog(p)
respectively, where occurring and prog are functions are applied on event token e and
process p respectively giving rise to fluents with signatures:
occurring: Event Fluent
prog : Process Fluent
Each of these can partially or fully describe a situation. Just like situations both events and
processes, have are eventualities with have an inherent time property. These are represented
by time functions timeE and timeP for events and processes respectively, with the following
signatures:
10
timeE : Event Interval
timeP : Process Interval
When an event or a process describes a situation, the time of that situation is the same as that
of the event or process.
Axiom 3.2.5
When the occurring of an event or the progression of a process describes a situation, the time
of the situation is the same as the time of the event or that of the process as the case may be.
(a) Holds(occurring(e), s) timeE(e) = timeS(s)
(b) Holds(prog(p), s) timeP(p) = timeS(s)
It is particularly important to be able to have situations completely described by these kinds
of fluents, because such fluents actually give rise to the presence of other fluents. When the
fact of an event occurring is a fluent that describes a situation, then the fact that certain agents
play a role in that event is also a fluent that partially describes the situation. For the purpose
of describing the relations between an actual event and an event type, as is needed in domain
Axioms 3.2.6 and 3.2.7 below, we resort to using a predicate EventType thus:
e, s. Holds**(occurring(e), s) EventType(e, Class)
!a. Holds(role(a, Teacher), s)
Axiom 3.2.6
If a classroom event occurs within a situation, then there must be a particular agent that
plays the role of a teacher in that situation.
Axiom 3.2.7
If a classroom event occurs within a situation, then there must be at least one agent that plays
the role of a student in that situation.
Finally it is important to distinguish between a process and events has been done in the
literature and summarized in Galton(2016). Our definition of processes is close to that of
Sowa(2000) as cited by Galton. A process can be discrete or continuous. Discrete processes
each involves a finite sequence of either event occurrences or states (described by fluents).
Each step can either be an event (or action), a state of affairs (like in a natural process like a
fermentation or decay) or another process which is a process by itself. A continuous process
can be treated as constituted by a single event. Herein lies the difference between our view of
e, s. Holds**(occurring(e), s) EventType(e, Class)
a. Holds(role(a, Student), s)
11
processes and Sowa's who breaks each continuous process into initiation, continuation and
termination phases.
Definition 3.2.8
A situation s is fully characterized by a process if Either that situation is fully characterized
by either the occurring of an event Or there are two smaller situations whose times cover s
and the first situation is fully characterized either by the occurrence of an event or a fluent
and the second is also a process.
p, s. Holds**(prog(p), s)
(e Holds**(occurring(e), s))
s1.(e Holds**(occurring(e), s1) f Holds**(f, s1))
s2, p1. Holds(prog(p1), s2) Cover(timeS(s1), timeS(s2), timeS(s))
(where j, k, m. Cover(j, k, m) Starts(j, m) Finishes(k, m) Meets(j, k)
see (Koomen 1989) )
Either way, Axiom 3.2.7 above captures the definition of a process.
3.3 Temporal Constraints
The basic sorts introduced here are time point images (TPI) and Time Constraints (TC). A
TPI is a relative point with an anticipated time interval. It can be the beginning (B), End (E)
or any relative time point within the anticipated time interval. Therefore a TPI may be either
of the constants {B, E} or an application of the time displacement function tdisp to either B
or E and an integer. B and E signify the beginning and end of a time integer. The signatures
are given below:
Our approach to composing constraints here is therefore is to let each basic constraint relate
some time point image (i.e. its beginning, end, or some point in between) of the time interval
of the effect of a norm which is the time of the action of the type specified, with some time
point image of the effect of the norm. A basic temporal constraint is composed by the
application one of the functions such as eq (equal), ge (greater than or equal to), le (less than
or equal to), gt greater than) and lt (less than) to an ordered pair of TPI, the first relating to
the action (or norm's effect) while the second is related to the situation (norm's condition)
with the signatures:
tdisp: TPI Integer TPI
eq, ge, gt, le, lt : TPI TPI TC
The functions and, or and not introduced here are used to make temporal constraints with
natural Boolean meanings and the following signatures:
12
not : TC TC
and, or : TC TC TC
For example:
eq(B, E) means the first interval ends exactly when the second interval begins.
eq(tdisp(B, 3), E) means the second interval ends 3 units into the beginning of the first
interval.
Other temporal constraints can be composed from other temporal constraints by the functions
and, or as well as neg. For example, and(eq(B, B), eq(E, E)) describes two intervals that are
equal.
Each of Allen(1984)'s qualitative relations can be represented by our TCS. The following are
the equivalences between Allen's interval relations and our TCS.
Before is equivalent to
Overlaps is equivalent to
Contains is equivalent to
Starts is equivalent to
Finishes is equivalent to
Meets is equivalent to
lt(E, B)
and(lt(B, B), lt(E,E))
and(lt(B, B), gt(E, E))
and(eq(B, B), lt(E, E))
and(gt(B, B), eq(E, E))
eq(E, B)
A major advantage of the TCS representation is that it can represent constraints that combine
both qualitative and quantitative relationships. Examples of such relationships are:
Starts not later than 4 units of time into is equivalent to le(B, tdisp(B, 4))
Ends 10 units of time into
is equivalent to eq(E, tdisp(B, 10)
These are the kinds of constraints that many real-life norms may contain as holding between
norm conditions and their effects.
Finally we must state that in using the context of normative positions, each basic constraint's
argument is pair of the action-type's time interval and the situation's time interval. For
example the following norm, identified by Norm001, means the agent Robosweeper has an
obligation to begin sweeping snow not later than 4 time units after a situation in which it
snowed.
NormPos(Robosweeper, obl(Sweep_Snow), Snowing, and(gt(B, E), le(B, disp(E,4))),
Norm001)
3.4 Normative Rules and Rule Reification
13
Description of the situation that appears in NT
Normative-Token (NT) if
In our formalism, norms or normative rules are represented as Logic programs in which the
heads are normative tokens and the bodies contain the description of norm's conditions which
are represented by situations. i.e.
Each normative token is an assertion that an agent is to conform to a normative fluent, in
some named situation (which is later described in the body of the clause), within some
temporal constraint.
This representation eliminates the need for a normative implication in the sense used by
Governatori et al(2005) and Artikis and Sergot(2010) because unlike these previous
formalisms in which a norm's condition and its effect are antecedent and consequent in an
implication. This is achieved by making the norm's condition, some situation s and the
norm's effect, some normative fluent, terms for the 5-tuple normative token(reification). Thus
when a situation arises whose description matches what appears in the body of the normative
rule, a normative token is inferred which is derived from the head of the normative rule.
This reification of both the condition and effect of norms is the main difference between this
formalism and that of Governatori et al. and Artikis and Sergot. For these both of these
formalisms, it is virtually impossible to reify a norm's conditions without resorting to
situations as we have done.
The last term of a normative token is an identifier for the normative rule that produced it.
This value assigned to this term is the identification for the normative rule from which the
normative token was inferred. Although the identifier only appears in the head of the
normative rule, it is in fact an attribute of the normative rule and it is the identifier for the
rule. Indeed every normative token derived from the same normative rule bears that same
identity. This is a special kind of reification for rules we shall call rule reification.
As we will see from the examples in the next section, it is often necessary to describe other
situations that have some qualitative relations with the situation being described.
3.5 Real life Norms
In this section we present our formalism's representation of some real life norms. It is a rather
trivial exercise to show that the formalism is able to represent all low-level norms used to test
a formalism such as that Stratulat et al (2001). We will return to that question later. At this
point our focus is on representing high level norms.
Norm 3.1
A teacher assigned to teach a class must arrive either on time or not later than 10 minutes
14
into the time of a class.
a, v, s,
NormPos(a, obl(arrive-at(v)), s, and(le(E, tplus(B,10)), ge(E, B)), OB101) if
Ǝ e.
Holds**(occurring(e), s)
EventType(e, Class)
Holds(venue(e, v), s)
Holds(role(a, Teach), s)).
Norm 3.2
Student must register for his/her courses in a semester within one month of the
commencement of the semester.
a, o, s.
NormPos(a, obl(register-for(a,sem))), s, and(and(ge(E, B), le(E,B, 30)), ge(B,B)), OB102) if
Ǝs1, s2.Holds**(studentship(a),s1)
ProcessType(sem, Semester)
Holds**(prog(sem), s)
Within(timeS(s), timeS(s1))
Holds(on-suspension(a, sem), s).
A prohibition is a norm that disallows an agent from carrying out an action of a certain type
within some time interval that has a temporal relation with the warranting situation
(condition) of the prohibition. The structure of a prohibition is the same as that of a normative
position except that the normative fluent is derived from the application of the pro function to
an action type.
The norm 3.3 and norm 3.4 illustrate examples of rules that infer such normative tokens.
Norm 3.3
Student must not be allowed to come in for an examination thirty (30) minutes after the
commencement of the examination.
a, s, e.
NormPos(a, pro(arrive(v)), s, gt(E, tplus(30)}, PR0103), if
Holds**(occuring(e), s)
EventType(e, Examination))
Holds(venue(e,v), s)
Holds(role(a, Candidate), s).
Norm 3.4
It is prohibited for members of university community to release confidential document of the
university to public domain without authorization.
15
a, doc, s,
Prohibition(a, pro(release(doc)), s, or(and(lt(B, E), ge(B, B)), and(le(E, E), gt(E, B))),
PRO014) if
Ǝs1,s2, u.
Holds**(alive(doc), s1)
Holds**(statusdoc(doc, Confidential),s)
Holds**(employ(u, a), s2)
University(u)
Owns(doc, u)
Subinterval(timeS(s), timeS(s1))
Subinterval(timeS(s), timeS(s2))
A permission is a norm that allows an action by an agent as a result of a certain situation
arising. In this formalization, we will treat permissions as the fluent negation of prohibitions
denoted by the function .
Examples of this is given in norm 3.5 and norm 3.6.
Norm 3.5
Members of the university community are permitted to put on their official identity card while
on duty.
a, s.
NormPos(a, pro( put_id-on(a)), s, and(ge(B, B), le(E, E)), PER010) if
Ǝu, s1
Holds**(onDuty(a), s)
Holds**(employ(a, u) s1)
University(u)
Within(timeS(s), timeS(s1)
Norm 3.6
Lecturer is permitted to give reading books on his assigned course to the student at the
beginning of lecture in a semester.
a, b, s.
NormPos(a, pro(give(b)), s, le(E, B), PER012) if
Ǝco.
Holds**(prog(co), s)
ProcessType(co, Course)
Holds(role(a, Teacher), s)
Holds(role(b, ReadingBook), s)
Having represented norms, it is important to discuss the representation of the validity of those
norms. Norm validity is determined by the date of enactment and . Let us take as an example
16
the constitutive norm from the formalization of the British Nationality Act 1981 (Segot et al.,
1986).
The norm any person born in the UK becomes a British citizen is a norm that was only valid
until 1981. A representation of that norm in the proposed language is presented thus:
x, s
NormPos(HMG, obl(grant-citizenship(x)), s, eq(E, B), NBB-1) if
Holds**(born-in(x, UK), s)
However, any agent interpreting that norm on behalf of Her Majesty's Government (HMG)
must be aware that the validity of the norm is from 1950 and 1981 i.e.
Enact(NBB-l, 1950)
Repeal(NBB-1, 1981)
As such it is only if the norm situation s happened within that interval of validity that the
norm NBB-1 is valid. Validity is an important condition for deciding norm violation as we
shall demonstrate.
3.5 Satisfying Temporal Constraints
Our attention now turns to determining when two time intervals satisfy a certain temporal
constraints and for this purpose, we will define constraint satisfaction rules (CSR) that will
determine whether an ordered pair of intervals satisfies a temporal constraint.
Intuitively, it is easy to see how the satisfaction of any of our basic constraints can translate
into logical relations that involve two time points. Similarly the satisfaction of a compound
constraint can be broken down into the satisfaction of constituent constraints.
CSRs for compound temporal constraints are recursive in the sense that they are composed
from other CSRs as illustrated by the following axiom:
Axiom 3.5.1
tc1, tc2, j, k.
Satisfy-Cons( j, k, and(tc1, tc2)) if
Two similar rules exist for the or function. That is embodied in axiom 5.2(a) and (b) below:
Axiom 3.5.2 (a)
j, k, tc1, tc2.
Satisfy-Cons( j, k, tc1)
Satisfy-Cons(j, k, tc2).
Satisfy-Cons( j, k, or(tc1, tc2)) if
Satisfy-Cons(j, k, tc1)
Axiom 3.5.2 (b)
j, k, tc1, tc2.
17
Satisfy-Cons(j, k, or(tc1, tc2)) if
Satisfy-Cons( j, k, tc2)
The other non-recursive rules handle basic temporal constraints. These rules represent a
simple translation of each of the temporal constraint functions into the equivalent relation.
The following axioms 5.3 to 5.6 are all examples of the lt constraint.
Axiom 3.5.3
j, k, t1, t2.
Satisfy-Cons(j, k, lt(tdisp(B, t1), disp(B, t2)) ) if
begin(j) + t1 < begin(k) +t2
Axiom 3.5.4
j, k.
Satisfy-Cons(j, k, lt(B, E)) if
begin( j) < end(k)
Axiom 3.5.5
j, k.
Satisfy-Cons(j, k, lt(E, B)) if
end(j) < begin( k)
Axiom 3.5.6
j, k.
Satisfy-Cons(j, k, lt(E, E)) if
end(j) < end(k)
The next section discusses norm how constraint satisfaction rules is used to infer norm
violations.
3.6 NORM CONFORMANCE AND VIOLATIONS
In order to make inferences about norm violation we need to know the existence of three
fundamental conditions. The first condition will be the existence of a normative token such as
an agent's obligation or prohibition to carry out or desist from carrying out an action. The
second condition will be the failure to conform to the requirement of the normative token.
The third condition is the validity of the normative rule at the time the condition held.
The condition for a norm to be valid with respect to a situation is for the situation to take
place while the norm's enactment remains in force. This is formalized as:
Axiom 3.6.0
norm-id, s.
Validwrt(norm-id, s) if
Enact-at(norm-id, t)
t <= begin(timeS(s))
t1. (t t1 end(timeS(s)) Repeal(norm-id, t1))
18
The conformance of an agent to a norm requiring an agent's obligation requires the existence
of an action of the expected type to be carried by the agent within the required time limit.
This is formalized by the following clause:
Axiom 3.6.1
a, norm-id, s.
Conform(a, norm-id, s) if
act-type, tc, act.
NormPos( a, obl( act-type), s, tc, norm-id)
Type-of-Action(act, act-type)
Actor(a, act)
Validwrt(norm-id, s)
Satisfy-Cons(timeA(act), timeS(s), tc).
The violation of an obligation takes place when in the occurrence of the situation within the
validity period of the rule that generated the normative token, the agent implicated is unable
to carry out the needed action within the required time constraint. That is formalized as the
following clause:
Axiom 3.6.2
a. norm-id, s.
Violate(a, norm-id, s) if
act-type, tc.
NormPos(a, obl(act-type), s, tc, norm-id)
Validwrt(norm-id, s)
act (Type-of-Action (act, a-type)
Actor(a, act)
Satisfy-Cons(timeA(act), timeS(s), tc) )
In the case of a prohibition, a violation takes place when in the case of the occurrence of the
situation, the implicated agent carries out the forbidden action during a time interval that
satisfies the constraint with the time of the situation. Such a violation is formalized thus:
Axiom 3.6.3
p, norm-id, s.
Violate(a, norm-id, s) if
act-type, tc, act.
NormPos( p, pro(act-type), s, tc, norm-id)
Type-of-Action(act, act-type)
Actor(a, act)
Validwrt(norm-id, s)
Satisfy-Cons(timeA(a), timeS(s), tc).
Similarly conformance to a norm that is a prohibition is the absence of the prescribed action
19
within the prescribed time constraint. That is contained in the following axiom:
Axiom 3.6.4
a. norm-id, s.
Conform(a, norm-id, s) if
act-type, tc.
NormPos(a, pro(act-type), s, tc, norm-id)
Validwrt(norm-id, s)
act (Type-of-Action (act, act-type)
Actor(a, act)
Satisfy-Cons(timeA(act), timeS(s), tc) )
act-type, tc. NormPos(a, pro(act-type), s, tc, norm-id)
However, an agent needs not do anything else to conform to a permission to either carry out
or avoid an action. That idea is formalized in Axiom 3.6.5.
Axiom 3.6.5
a, norm-id, s.
Conform(a, norm-id, s) if
Axiom 3.6.6
a, norm-id, s.
Conform(a, norm-id, s) if
This approach contrasts with timed violations that was implemented by Stratulat et al[21]. In
their work, a violation of an obligation is said to have taken place at a time t, if an agent has
an obligation to carry out an action during the time interval (t 1, t2) and as at time t which is
later than t2 the action has not yet been taken. We believe that this approach of theirs is
flawed because a violation is best understood as occurring under some particular
circumstances rather than as occurring at some particular time. For example it is more
meaningful to infer that:
act-type, tc.
NormPos(a, obl(act-type), s, tc, norm-id)
Mr X violated the of promptness obligation with regard to the CSC777 class of 1
April 2016
than to infer that:
Mr X is reckoned to have violated an obligation to report at the Faculty Lecture
theatre between 10 and 10:10 on 1 April 2016.
4. COMPARISON WITH EXISTING FORMALISMS
The norm representation formalism that is closest to that developed in the paper is the one
offered by Panagiotidi, Nieves and Vazquez-Salceda(2009). In their representation, a norm is
a 6-ary relation which consists of:
20
The actor
The (deontic) modality, which may either be an obligation or a permission.
The activating condition for the norm
The maintenance condition for the norm
Deontic Statement and,
The deactivating condition
The activating condition is the equivalent to the norm's precondition. The deontic statement
is a description of the state change that the agent under obligation is expected to effect. The
deactivating condition is a sign that the state change has been effected. A norm becomes
activated when the activating condition becomes true and remains activated until the
deactivating condition becomes true. The deactivating condition is satisfied when the agent
has successfully effected the requirement of the norm. The maintenance condition captures
the deadline for an active norm to become deactivated. Therefore a violation occurs when an
active norm remains active when its maintenance condition has become untrue (i.e. the
deadline has been passed while the deactivating condition is yet unsatisfied by the agent).
However there are significant differences between the approach presented in this paper and
their approach. Firstly, the representation in this paper does not only capture activating
conditions; rather, it captures named instances of their occurrences as situations. So that it is
possible to have named instances of an event or process type as a situation. That is not the
case with the Panagiotidi et al's representation. Again their inference of violation is based on
the observing changes in condition and not necessarily on the occurrence or non-occurence of
actions.
The norm in Panagiotidi et al about the obligation of a repair company rc to repair a car
within 4 days of taking the car to the garage will be rendered thus:
NormPos(rc, obl(repair(car17)), s, and(ge(B, B), le(E, disp(E, 4))), OBRC1) if
Holds(arrive(car17, Garage), s)
We wish to note that our representation allows us to state the car repair that will satisfy the
new obligation cannot precede the arrival of the car at the garage. This way we can avoid
mistaking a previous repair done on car17, with the repair required for a new visit to the
garage. This is an advantage that our formalism has over formalisms such as King et al
(2017) and Panagiotidi et al (2009) that depend on deadlines.
Hashmi, Governatori and Moe(2016) present a taxonomy of obligations that expands on a
simple categorization of obligations due to Governatori (2010). A maintenance obligation is
one in which a norm's effect must continue throughout the time of the obligation (or some
specified situation). The norm represented by example 2 in this paper is one such norm.
It is also the case that 4.1 is an example of Governatori's achievement obligation.
21
An achievement obligation is one in which an actor is expected to carry out the action at least
once within the time limit. An example of this which can be represented in the language of
this paper is:
The Prime Minister must pay the Queen a visit during the parliamentary break.
The representation for this in the representation language presented in this paper would treat
the parliamentary break as an event whose occurring constitutes the warranting situation and
the agent whose visitation action to the Queen must fall within that situation is the Prime
Minister.
Finally in this section, in order to demonstrate that our formalism is versatile enough to
represent low level norms, we present a representation for a norm from Stratulat et al (2001)
that obliges a taxpayer to pay up within the first 31 days of the year, thus:
NormPos(a, obl(pay-tax), s, or(eq(E, B), le(E, disp(B, 31)), OBLTAX1) if
y( begin(timeS(s)) = (January, 1 y)
end(times(s)) = (December, 31, y))
Holds(taxpayer(a), s).
The good side of our representation is that any violation can report on the year for which a
violation took place and the identifier for the particular tax code violated, which in
representation is OBLTAX1.
5. CONCLUSION
This paper has identified two broad categorizations for prescriptive norms in the literature.
High level norm representations capture the norm's condition and effect as well as the
temporal constraints between them. The norm's condition is treated as a situation warranting
the need for an agent to either carry out or refrain from carrying out an action of a certain
type. The effect of the norm is the action that the agent is obliged or permitted to take or
prohibited from taking.
This contrasts with other approaches, which accounts a norm as the obligation or permission
to take an action or the prohibition from taking an action within a particular time interval.
The key disadvantage of low-level norms is that an agent's autonomy is curtailed if s/he
needs an external prescription in order to know what actions s/he is expected or allowed to
take at specific times. On the other hand, an agent with a high level norm representation of
norms can determine from that representation, at what times an actions they have an
obligation to act or prohibited from acting. The difference between the two approaches is
somewhat like that between low-level programming and high-level programming.
22
The major disadvantage of high level norms as they appear in the existing literature is that
generalized violation inference is practically impossible. The formalism for high-level norm
representation presented in this paper fixes that problem by relaxing the strict normative
implication relationship between a norm's condition and its effect as done by Governatori et
al(2005) and Artikis and Sergot(2010). The formalism also makes it possible for norms to be
identified through rule reification.
Another key advantage of low level norms it easily enables an agent to detect when there are
contradictory norms as shown by Artikis(2003). A contradiction occurs when there two
different norms, one of which obliges an agent to carry out an action of a certain type, and the
other prohibits actions of the same type at around the same time. In order to detect
contradictory norms, there is a need for a logical mechanism to convert high level norms into
low level norms on an as needed basis.
REFERENCES
International Joint Conference on Artificial Intelligence, pp 1177-1182, Morgan
6
Allen, J F(1984) A General Model of Action and Time. Artificial Intelligence 23(2) : 123-
154 , July 1984.
Artikis, A (2003) Executable Specification of Open Norm-Governed Societies, PhD thesis,
Dept of Electrical Engineering, Imperial College, University of London.
Artikis A and Sergot M J (2010) Executable Specification of Open Multi-agent Systems
Logic Journal of the IGPL 18(1): 31-65
Galton, A.(1991). Reified Temporal Theories and How to Unreify them. In Proceedings of
the 12th
Kaufmann 1991.
Galton A.(2016) The Ontology of Time and Processes. Presentation at the Third
International School on Applied Ontology, Bozen-Bolzano, Italy, June 27 –July 1, 2016.
Governatori, G. (2010) Law, Logic and Business Processes. In Proceedings of the Third
International Workshop on Requirement Engineering in Law, (RELaw 2010), pp 1 -10
Sydney Australia
Governatori, G., Rotolo A. and Sartor G.(2005) Temporalised Normative Positions in
Defeasible Logic In Sartor, G.(ed.) The Tenth International Conference on AI and Law,
Proceedings of the Conference, pp. 25-34, June 6-11, 2005, Bologna , Italy.
Governatori, G. (2010) Law, Logic and Business Processes. In Proceedings of the Third
International Workshop on Requirement Engineering in Law, (RELaw 2010), pp 1 -10
Sydney Australia.
Hashmi M., Governatori G. and Moe, T. W. (2016), Normative Requirements for Regulatory
23
Compliance: An Abstract Formal Framework. Information Systems Frontiers, 18(3): 429-
455, 2016.
R. Marín and G. Sartor(1999) Time and Norms: A Formalisation In The Event Calculus. In
Proceedings of Conference on Artificial Intelligence and Law (ICAIL), pages 90–100. ACM
Press, 1999.
King T.C., De Vos M., Dignum V., Jonker C.M., Li, T. and Riemsdijk,B.(2017) Automated
Multi-level Governance Compliance Checking. Autonomous Agents and Multi-Agent Systems
31(6): 1283-1343, 2017.
Koomen, J. (1989), Reasoning about Recurrence, PhD thesis, Dept of Computer Science,
University of Rochester, Rochester, New York.
Panagiotidi S, Nieves, J.C. and Vazquez-Salceda, J. (2009). A framework to model norm
dynamics in Answer Set Programming. Proceedings of the Second Multi-Agent Logics,
Languages, and Organisations Federated Workshops, Turin, Italy, September 7-10, 2009.
http://ceur-ws.org/Vol-494/famaspaper8.pdf
Pinto J. A. (2004) Temporal Reasoning in the Situation Calculus, PhD Dissertation,
University of Toronto, Ont., Canada.
Sadri, F, Stathis, K. and F. Toni (2006) Normative KGP Agents Computational &
Mathematical Organization Theory 12(2-3): 101-126
L.K. Schubert(2000). The Situations We Talk About. In Jack Minker (ed) Logic-Based
Artificial Intelligence, Volume 597, The Springer International Series in Engineering and
Computer Science pp 407-439
M. Sergot(1990) The representation of law in computer programs: a survey and comparison.
In T. Bench-Capon,(Ed), Knowledge Based Systems and Legal Applications. Academic Press,
1990.
24
|
1910.13852 | 1 | 1910 | 2019-10-30T13:51:47 | Linear Speedup in Saddle-Point Escape for Decentralized Non-Convex Optimization | [
"cs.MA",
"cs.LG",
"math.OC",
"stat.ML"
] | Under appropriate cooperation protocols and parameter choices, fully decentralized solutions for stochastic optimization have been shown to match the performance of centralized solutions and result in linear speedup (in the number of agents) relative to non-cooperative approaches in the strongly-convex setting. More recently, these results have been extended to the pursuit of first-order stationary points in non-convex environments. In this work, we examine in detail the dependence of second-order convergence guarantees on the spectral properties of the combination policy for non-convex multi agent optimization. We establish linear speedup in saddle-point escape time in the number of agents for symmetric combination policies and study the potential for further improvement by employing asymmetric combination weights. The results imply that a linear speedup can be expected in the pursuit of second-order stationary points, which exclude local maxima as well as strict saddle-points and correspond to local or even global minima in many important learning settings. | cs.MA | cs | LINEAR SPEEDUP IN SADDLE-POINT ESCAPE FOR DECENTRALIZED NON-CONVEX
OPTIMIZATION
Stefan Vlaski and Ali H. Sayed
School of Engineering, ´Ecole Polytechnique F´ed´erale de Lausanne
ABSTRACT
Under appropriate cooperation protocols and parameter choices,
fully decentralized solutions for stochastic optimization have been
shown to match the performance of centralized solutions and re-
sult in linear speedup (in the number of agents) relative to non-
cooperative approaches in the strongly-convex setting. More re-
cently, these results have been extended to the pursuit of first-order
stationary points in non-convex environments.
In this work, we
examine in detail the dependence of second-order convergence
guarantees on the spectral properties of the combination policy for
non-convex multi agent optimization. We establish linear speedup
in saddle-point escape time in the number of agents for symmetric
combination policies and study the potential for further improve-
ment by employing asymmetric combination weights. The results
imply that a linear speedup can be expected in the pursuit of second-
order stationary points, which exclude local maxima as well as
strict saddle-points and correspond to local or even global minima
in many important learning settings.
Index Terms -- Non-convex optimization, saddle-point, second-
order stationarity, minima, decentralized algorithm, centralized al-
gorithm, diffusion strategy.
1. INTRODUCTION AND RELATED WORK
We consider a collection of K agents, where each agent k is
equipped with a local stochastic cost function:
d∇J
which is obtained by employing a weighted combination of instanta-
neous approximations using all K realizations available at time i−1.
This construction requires the evaluation of K (stochastic) gradients
per iteration. If computational constraints limit the number of gradi-
ent evaluations per iteration to one, we can instead randomly sample
an agent location k from the available data and let:
c,1
(wcent
i−1 ) = ∇Qk(wcent
i−1 ; xk,i−1), with prob. pk,
(5)
The evident drawback of such a simplified centralized strategy is that
only one sample is processed and a large number of samples is dis-
carded at every iteration. We can hence expect the construction (4)
to result in better performance relative to the simplified choice (5).
When communication constraints limit the exchange of information
among agents, we can instead appeal to decentralized strategies. For
the purpose of this work, we shall focus on the standard diffusion
strategy, which takes the form:
φk,i = wk,i−1 −µ∇Qk(wk,i−1; xk,i−1)
(6a)
(6b)
where aℓk denote convex combination coefficients satisfying:
aℓk = 1,
aℓk = 0 if ℓ /∈ Nk
(7)
aℓkφℓ,i
wk,i =
NXℓ=1
aℓk ≥ 0, Xℓ∈Nk
Jk(w) , E Qk(w; xk)
(1)
where w ∈ RM denotes a parameter vector and xk denotes the
random data at agent k. We construct the global cost function:
The symbol Nk denotes the set of neighbors of agent k. When the
graph is strongly-connected, it follows from the Perron-Frobenius
theorem that the combination matrix A has a spectral radius of one
and a single eigenvalue at one with corresponding eigenvector [2]:
J(w) ,
pkJk(w)
(2)
Ap = p, 1
Tp = 1,
pk > 0
(8)
KXk=1
9
1
0
2
t
c
O
0
3
]
A
M
.
s
c
[
1
v
2
5
8
3
1
.
0
1
9
1
:
v
i
X
r
a
one, i.e.PK
where the pk ≥ 0 denote convex combination weights that add up to
k=1 pk = 1. When data realizations for xk can be aggre-
gated at a central location, descent along the negative gradient of (2)
can be approximated by means of a centralized stochastic gradient
algorithm of the form [1, 2]:
Comparing the diffusion strategy (6a) -- (6b) to the centralized con-
structions (4) or (5), we observe that the adaptation step (6a) carries
the same complexity per agent as the simplified construction (5).
However, since these computations are performed at K agents in
parallel, and the information is diffused over the network through the
combination step (6b), we expect the diffusion strategy (6a) -- (6b) to
outperform the simplified centralized strategy (5) and more closely
match the full construction (4). In fact, the spectral properties (8) of
the combination weights (7) allow us to establish the following rela-
wcent
i = wi−1 −µd∇J (wcent
i−1 )
(3)
where d∇J(·) denotes a stochastic gradient approximation con-
structed at time i − 1. One possible construction is to let:
tion for the weighted network mean wc,i ,PK
k=1 pk wk,i [2, 3]:
c,K
(wcent
i−1 ) ,
pk∇Qk(wcent
i−1 ; xk,i−1)
(4)
wc,i = wc,i−1 −µ
pk∇Qk(wk,i−1; xk,i−1)
(9)
KXk=1
d∇J
KXk=1
This work was supported in part by NSF grant CCF-1524250.
Emails:{stefan.vlaski, ali.sayed}@epfl.ch.
which almost corresponds to the centralized recursion (3) -- (4) with
the full gradient approximation (4) with the only difference being
that the stochastic gradients are evaluated at the individual iterates
wk,i−1 instead of the weighted network centroid wc,i−1. So long
as the iterates wk,i−1 cluster around the network centroid, and under
appropriate smoothness conditions on the (stochastic) gradients, it is
hence to be expected that the network centroid (9) will match the
performance of the full gradient approximation (4). This intuition
has been studied in great detail and formalized for strongly convex
cost functions, establishing that all iterates wk,i in (6a) -- (6b) will
actually match the centralized full gradient approximation (4) both
in terms of convergence rate [3] and steady-state error [4], which
implies a linear improvement over the simplified construction (5)
in terms of the number of agents [2] when employing a symmetric
combination policy for which pk = 1
K .
More recently, these results have been extended to the pursuit
of first-order stationary points in non-convex environments [5, 6] for
consensus and the exact diffusion algorithm [7]. First-order station-
ary points can include saddle-points and even local maxima and can
generate a bottleneck for many optimization algorithms and problem
formulations [8]. Hence, the purpose of this work is is to establish
that linear speedup can also be expected in the escape from saddle-
points and pursuit of second-order stationary points for non-convex
optimization problems. To this end, we refine and exploit recent re-
sults in [9, 10].
1.1. Related Works
Strategies for decentralized optimization include incremental strate-
gies [11], and decentralized gradient descent (or consensus) [12], as
well as the diffusion algorithm [2, 3, 13]. A second class of strate-
gies is based on primal-dual arguments [7, 14 -- 18]. While most of
these algorithms are applicable to non-convex optimization prob-
lems, most performance guarantees in non-convex environments are
limited to establishing convergence to first-order stationary points,
i.e., points where the gradient is equal to zero [5, 6, 19 -- 21].
Landscape analysis of commonly employed loss surfaces has
uncovered that in many important settings such as tensor decomposi-
tion [22], matrix completion [23], low-rank recovery [24], as well as
certain deep learning architectures [25], all local minima correspond
to global minima and all other first-order stationary points have a
strict-saddle property, which states that the Hessian matrix has at
least one negative eigenvalue. These results have two implications.
First, while first-order stationarity is a useful result in the sense that it
ensures stability of the algorithm, even in non-convex environments,
it is not sufficient to guarantee satisfactory performance, since first-
order stationary points include strict saddle-points, which need not
be globally or even locally optimal. On the other hand, establishing
the escape from strict saddle-points, is sufficient to establish conver-
gence to global optimality in all of these problems.
These observations have sparked a number of works examin-
ing second-order guarantees of local descent algorithms. Strategies
for the escape from saddle-points can generally be divided into one
of two classes. First, since the Hessian at every strict-saddle point,
by definition, contains at least one negative eigenvalue, the descent
direction can be identified by directly employing the Hessian ma-
trix [26] or through an intermediate search for the negative curva-
ture direction [27, 28]. The second class of strategies leverages the
fact that perturbations in the initialization [29] or the update direc-
tion [22, 30 -- 32] cause iterates of first-order algorithms to not get
"stuck" in strict saddle-points, which can be shown to be unstable.
Recently these results have been extended to decentralized optimiza-
tion with deterministic gradients and random initialization [33] as
well as stochastic gradients with diminishing step-size and decay-
ing additive noise [34] as well as constant step-sizes [9, 10]. We
establish in this work, that the saddle-point escape time of the dif-
fusion strategy (6a) -- (6b) decays linearly with the number of agents
in the network when symmetric combination policies are employed
and show how asymmetric combination policies can result in fur-
ther improvement when agents have access to estimates of varying
quality.
2. MODELING CONDITIONS
We shall be employing the following common modeling condi-
tions [2, 22, 31, 34]. See [9, 10] for a discussion.
Assumption 1 (Smoothness). For each k, the gradient ∇Jk(·) is
Lipschitz, namely, for any x, y ∈ RM :
k∇Jk(x) − ∇Jk(y)k ≤ δkx − yk
(10)
Furthermore, Jk(·) is twice-differentiable with Lipschitz Hessian:
k∇2Jk(x) − ∇2Jk(y)k ≤ ρkx − yk
(11)
For each pair of agents k and ℓ, the gradient disagreement is
bounded, namely, for any x ∈ RM :
k∇Jk(x) − ∇Jℓ(x)k ≤ G
(12)
Assumption 2 (Gradient noise process). For each k, the gradient
noise process is defined as
sk,i(wk,i−1) =d∇J k(wk,i−1) − ∇Jk(wk,i−1)
and satisfies
(13)
(14a)
(14b)
E {sk,i(wk,i−1)F i−1} = 0
E(cid:8)k sk,i(wk,i−1)k4F i−1(cid:9) ≤ σ4
k
where we denote by F i the filtration generated by the random pro-
cesses wk,j for all k and j ≤ i and for some non-negative constants
σ4
k. We also assume that the gradient noise processes are pairwise
uncorrelated over the space conditioned on F i−1.
Assumption 3 (Lipschitz covariances). The gradient noise process
has a Lipschitz covariance matrix, i.e.,
Rs,k(wk,i−1) , Ensk,i(wk,i−1)sk,i(wk,i−1)TF i−1o (15)
satisfies
kRs,k(x) − Rs,k(y)k ≤ βRkx − ykγ
(16)
for some βR and 0 < γ ≤ 4.
We shall also make the simplifying assumption.
Assumption 4 (Gradient noise lower bound). The gradient noise
covariance Rs,k(x) at every agent is bounded from below:
Rs,k(x) ≥ σℓ,kI
(17)
This condition can be loosened significantly by requiring a gradient
noise component to be present only in the vicinity of strict saddle-
points and only in the local descent direction, see e.g. [10, 31]. Nev-
ertheless, the simplified condition can always be ensured for exam-
ple by adding a small amount of isotropic noise, similar to [22, 30]
and will be sufficient for the purpose this work.
3. CONVERGENCE ANALYSIS
3.1. Noise Variance Relations
The performance guarantees established in [9, 10] depend on the sta-
tistical properties of the weighted gradient noise term:
si ,
KXk=1
pk sk,i(wk,i−1)
(18)
Under assumptions 1 -- 4, we can refine the bounds from [9]:
Lemma 1 (Variance Bounds). Under assumptions 1 -- 4 we have:
p2
kσ2
k
E(cid:8)ksik2F i−1(cid:9) ≤
KXk=1
KXk=1
k,ℓ! I ≤ E si s
p2
kσ2
T
i ≤ KXk=1
k! I
p2
kσ2
(19)
(20)
and will focus on the dependence on the combination policy further
below. Adjusting the theorems in [9, 10] to account for the variance
bounds (19) -- (20), we obtain:
Theorem 1 (Network disagreement (4th order)). Under assump-
tions 1 2, the network disagreement is bounded after sufficient itera-
tions i ≥ io by:
4
4
(1 − kJ T
ǫ k)4 kV T
Rk
E(cid:13)(cid:13)(cid:13)Wi −(cid:16)1pT ⊗ I(cid:17) Wi(cid:13)(cid:13)(cid:13)
≤ µ4 kVLk4(cid:13)(cid:13)J T
ǫ(cid:13)(cid:13)4
k(cid:17) + o(µ4)
where(cid:13)(cid:13)J T
ǫ(cid:13)(cid:13) = λ2(A) + ǫ ≈ λ2(A) denotes the mixing rate of the
L(cid:9), io = log(cid:0)o(µ4)(cid:1)/log(cid:0)(cid:13)(cid:13)J T
ǫ(cid:13)(cid:13)(cid:1) and o(µ4)
ǫ = col(cid:8)1T, V T
adjacency matrix, A = VǫJ V −1
V −1
denotes a term that is higher in order than µ4.
K 2(cid:16)G4 + max
ǫ with Vǫ = row {p ⊗ I, VR} and
(24)
σ4
k
Proof. The argument is an adjustment of [9, Theorem 1].
Proof. Relations (19) and (20) follow from the pairwise uncorrelat-
edness condition in assumption 2 after cross-multiplying.
From (19) we observe that the average noise term (18) driv-
ing the network centroid experiences a variance reduction. Specif-
ically, in the case when pk = 1/K and σk = σ we would obtain
E(cid:8)ksik2F i−1(cid:9) ≤ σ2/K. This K-fold reduction in gradient noise
variance is at the heart of the improved performance established for
strongly-convex costs [2] and in the pursuit of first-order stationary
points [5]. We shall establish in the sequel that this improvement also
holds in the time required to escape from undesired saddle-points.
3.2. Space Decomposition
This result ensures that the entire network clusters around the
network centroid wc,i after sufficient iterations, allowing us to lever-
age it as a proxy for all agents.
Theorem 2 (Descent relation). Beginning at wc,i−1 in the large
gradient regime G, we can bound:
E {J(wc,i) wc,i−1 ∈ G}
≤ E {J(wc,i−1) wc,i−1 ∈ G} − µ2 c2
π
+
O(µ3)
πG
i−1
(25)
as long as πG
stants are listed in definition 1.
i−1 = Pr {wc,i−1 ∈ G} 6= 0 where the relevant con-
Definition 1 (Sets). The parameter space RM is decomposed into:
Proof. The argument is an adjustment of [9, Theorem 2].
1
c2
c1(cid:18)1 +
G ,(cid:26)w : k∇J(w)k2 ≥ µ
π(cid:19)(cid:27)
H ,nw : w ∈ GC , λmin(cid:0)∇2J(w)(cid:1) ≤ −τo
M ,nw : w ∈ GC , λmin(cid:0)∇2J(w)(cid:1) > −τo
k(cid:17) = O(cid:16)PK
where τ is a small positive parameter, 0 < π < 1 is a pa-
rameter to be chosen, c1 = 1
2 (1 − 2µδ) = O(1) and c2 =
δ
kσ2
k=1 p2
We also define the probabilities πG
i
Pr {wc,i ∈ H} and πM
have πG
k(cid:17). Note that GC = H ∪ M.
,
, Pr {wc,i ∈ M}. Then for all i, we
2(cid:16)PK
, Pr {wc,i ∈ G}, πH
i
(21)
(22)
(23)
k=1 p2
i + πM
i = 1.
i + πH
kσ2
i
Points in the complement of G have small gradient norm and hence
correspond to approximately first-order stationary points. These
points are further classified into strict-saddle points H, where the
Hessian has a significant negative eigenvalue, and second-order sta-
tionary points M. Pursuit of second-order stationary points requires
descent for points in G as well as H.
3.3. Performance Guarantees
Due to space limitations, we forego a detailed discussion on the
derivation of the second-order guarantees of the diffusion algo-
rithm (6a) -- (6b) and refer the reader to [9, 10]. We instead briefly
list the guarantees resulting from the variance bounds (19) -- (20)
Theorem 3 (Descent through strict saddle-points). Suppose
πH
i⋆ 6= 0, i.e., wc,i⋆ is approximately stationary with significant
negative eigenvalue. Then, iterating for is iterations after i⋆ with
log(cid:18)2M
is =
k)
k σ2
k,ℓ(cid:17)
σ2
(PK
(cid:16)PK
k=1 p2
k=1 p2
O(µτ )
k
+ 1(cid:19)
(26)
guarantees
E {J(wc,i⋆+is ) wc,i⋆ ∈ H}
≤ E {J(wc,i⋆ ) wc,i⋆ ∈ H} −
µ
2
M KXk=1
k! +
p2
kσ2
o(µ)
πH
i⋆
(27)
Proof. The argument is an adjustment of [10, Theorem 1].
Theorem 2 ensures descent in one iteration as long as the gra-
dient norm is sufficiently large, while 3 ensures descent even for
first-order stationary points, as long as the Hessian has a negative
eigenvalue in a number of iterations is that can be bounded. This
ensures efficient escape from strict saddle-points. We conclude:
Theorem 4. For sufficiently small step-sizes µ, we have with prob-
ability 1 − π, that wc,io ∈ M, i.e.,
k∇J(wc,io )k2 ≤ O µ KXk=1
k!!
p2
kσ2
(28)
and λmin(cid:0)∇2J(wc,io )(cid:1) ≥ −τ in at most io iterations, where
2 (J(wc,0) − J o)
io ≤
µ2δ(cid:16)PK
k=1 p2
kσ2
is
k(cid:17) π
Proof. The argument is an adjustment of [10, Theorem 2].
4. COMPARATIVE ANALYSIS
4.1. Step-Size Normalization
Note that in Theorem 4, both the limiting accuracy (28) and conver-
gence rate (29) depend on the combination policy and network size
k. To facilitate comparison, we shall normalize
kσ2
the step-size in (6a):
throughPK
k=1 p2
µ′ ,
µ
k=1 p2
kσ2
k
PK
Under this setting, Theorem 4 ensures a point io satisfying
k∇J(wc,io )k2 ≤ O (µ)
io ≤
2 (J(wc,0) − J o)
and λmin(cid:0)∇2J(wc,io )(cid:1) ≥ −τ in at most:
KXk=1
+ 1(cid:19)
log(cid:18)2M
(PK
(cid:16)PK
iterations with
k)
kσ2
k,ℓ(cid:17)
σ2
µ2δπ
is =
k=1 p2
k=1 p2
O(µτ )
k
k! is
p2
kσ2
KXk=1
k!
p2
kσ2
(30)
(31)
(32)
(33)
(29)
the derivation, we assume that the gradient noise is approximately
isotropic, i.e., σ2
k,ℓ so that (33) can be simplified to:
k ≈ σ2
is ≈ O PK
k=1 p2
kσ2
k
µτ
!
(35)
Then, we can formulate the following optimization problem to mini-
mize the escape time is over the space of valid combination policies:
min
A
KXk=1
p2
kσ2
k s.t. aℓk ≥ 0, Xℓ∈Nk
aℓk = 1, aℓk = 0 if ℓ /∈ Nk,
Ap = p, 1
Tp = 1,
pk > 0.
(36)
This precise optimization problem has appeared before in the pursuit
of asymmetric combination policies that minimize the steady-state
error of the diffusion strategy (6a) -- (6b) in strongly-convex environ-
ments [2]. Its solution is available in closed form and can even be
pursued in a decentralized manner, requiring only exchanges among
neighbors [2].
Theorem 6 (Metropolis-Hastings Combination Policy [2]). Un-
der the step-size normalization (30), the asymmetric Metropolis-
Hastings combination policy minimizes the approximate saddle-
point escape time (35). It takes the form:
ℓk =(
ao
ℓ } ,
σ2
k
max{nkσ2
k,nℓσ2
1 −Pm∈Nk\{k} ao
mk,
ℓ ∈ Nk,
ℓ = k.
(37)
where nk = Nk denotes the size of the neighborhood of agent k.
5. SIMULATIONS
We construct a sample landscape to verify the linear speedup in the
size of the network indicated by the analysis in this work. The loss
function is constructed from a single-layer neural network with a
linear hidden layer and a logistic activation function for the output
layer. Penalizing this architecture with the cross-entropy loss gives:
J(w1, W2) = E log(cid:16)1 + e−γwT
1 W2 h(cid:17) +
ρ
2
kw1k2 +
ρ
2
kW2k2
F
(38)
where w1 and W2 denote the weights of the individual layers, h ∈
RM denotes the feature vector, and γ ∈ {±1} is the class vari-
able. It can be verified that this loss has a single strict saddle-point at
w1 = W2 = 0 and global minima in the positive and negative quad-
rant, respectively [10]. We show the evolution of the function value
at the network centroid under the step-size normalization rule (30)
and observe a linear speedup in K, consistent with (34) while not-
ing no significant differences in steady-state performance, which is
consistent with (31).
Fig. 1: Linear speedup in saddle-point escape time.
Note that the normalization of the step-size causes (31) to become in-
dependent of(cid:16)PK
k=1 p2
kσ2
k(cid:17), allowing for the fair evaluation of (32)
and (33) as a function of the number of agents.
4.2. Linear Speedup Using Symmetric Combination Weights
When the combination matrix A is symmetric, i.e., A = AT, it fol-
lows that pk = 1
K [2]. For simplicity, in this section, we shall also
assume a uniform data profile for all agents, i.e., that σk = σ and
σℓ,k = σℓ for all k. We obtain:
Theorem 5 (Linear Speedup for Symmetric Policies). Under the
step-size normalization (30), and for symmetric combination poli-
cies A = AT with the uniform data profile σ2
ℓ,k = σ2
ℓ
for all k, the escape time simplifies to:
k = σ2 and σ2
log(cid:16)2M σ2
σ2
ℓ
O(µτ )
+ 1(cid:17)
σ2
K
is =
= O(cid:18) 1
µτ K(cid:19)
(34)
Proof. The result follows immediately after cancellations.
4.3. Benefit of Employing Asymmetric Combination Weights
In this subsection, we show how employing asymmetric combina-
tion weights can be beneficial in terms of the time required to escape
saddle-points when the data profile across agents is no longer uni-
form. In particular, we will no longer require the upper and lower
bounds σ2
ℓ,k to be common for all agents, and no longer re-
quire the combination policy to be symmetric. Instead, to simplify
k and σ2
6. REFERENCES
[1] B. T. Polyak, Introduction to Optimization, Optimization Soft-
ware, 1997.
[2] A. H. Sayed, "Adaptation, learning, and optimization over net-
works," Foundations and Trends in Machine Learning, vol. 7,
no. 4-5, pp. 311 -- 801, July 2014.
[3] J. Chen and A. H. Sayed, "On the learning behavior of adaptive
networks - Part I: Transient analysis," IEEE Transactions on
Information Theory, vol. 61, no. 6, pp. 3487 -- 3517, June 2015.
[4] J. Chen and A. H. Sayed, "On the learning behavior of adaptive
networks -- Part II: Performance analysis," IEEE Transactions
on Information Theory, vol. 61, no. 6, pp. 3518 -- 3548, June
2015.
[5] X. Lian, C. Zhang, H. Zhang, C.-J. Hsieh, W. Zhang, and
J. Liu, "Can decentralized algorithms outperform centralized
algorithms? A case study for decentralized parallel stochastic
gradient descent," in Advances in Neural Information Process-
ing Systems 30, pp. 5330 -- 5340. 2017.
[6] H. Tang, X. Lian, M. Yan, C. Zhang, and J. Liu, "d2: Decen-
tralized training over decentralized data," in Proceedings of
the 35th International Conference on Machine Learning, 2018,
vol. 80, pp. 4848 -- 4856.
[7] K. Yuan, B. Ying, X. Zhao, and A. H. Sayed, "Exact diffusion
for distributed optimization and learningPart I: Algorithm de-
velopment," IEEE Transactions on Signal Processing, vol. 67,
no. 3, pp. 708 -- 723, Feb 2019.
[8] S. S. Du, C. Jin, J. D. Lee, M. I. Jordan, B. P´oczos, and
A. Singh, "Gradient descent can take exponential time to es-
cape saddle points," in Proceedings of the 31st International
Conference on Neural Information Processing Systems, 2017,
pp. 1067 -- 1077.
[9] S. Vlaski and A. H. Sayed, "Distributed learning in non-convex
environments -- Part I: Agreement at a Linear rate," submitted
for publication, available as arXiv:1907.01848, July 2019.
[10] S. Vlaski and A. H. Sayed, "Distributed learning in non-convex
environments -- Part II: Polynomial escape from saddle-points,"
submitted for publication, available as arXiv:1907.01849, July
2019.
[11] D. P. Bertsekas, "A new class of incremental gradient methods
for least squares problems," SIAM J. Optim., vol. 7, no. 4, pp.
913 -- 926, April 1997.
[12] S. SundharRam, A. Nedic, and V. V. Veeravalli, "Distributed
stochastic subgradient projection algorithms forconvex opti-
mization," Journal of Optimization Theory and Applications,
vol. 147, no. 3, pp. 516 -- 545, Dec 2010.
[13] S. Vlaski, L. Vandenberghe, and A. H. Sayed, "Regularized
diffusion adaptation via conjugate smoothing," available as
arXiv:1909.09417, September 2019.
[14] D. Jakovetic, J. Xavier, and J. M. F. Moura,
"Coopera-
tive convex optimization in networked systems: Augmented
lagrangian algorithms with directed gossip communication,"
IEEE Transactions on Signal Processing, vol. 59, no. 8, pp.
3889 -- 3902, Aug 2011.
[15] J. C. Duchi, A. Agarwal, and M. J. Wainwright, "Dual aver-
aging for distributed optimization: Convergence analysis and
network scaling," IEEE Transactions on Automatic Control,
vol. 57, no. 3, pp. 592 -- 606, March 2012.
[16] M. Jaggi, V. Smith, M. Tak´ac, J. Terhorst, S. Krishnan, T. Hof-
mann, and M. I. Jordan, "Communication-efficient distributed
dual coordinate ascent,"
in Proc. International Conference
on Neural Information Processing Systems, Montreal, Canada,
2014, pp. 3068 -- 3076.
[17] K. I. Tsianos and M. G. Rabbat, "Distributed dual averag-
ing for convex optimization under communication delays," in
Proc. American Control Conference (ACC), Montreal, Canada,
June 2012, pp. 1067 -- 1072.
[18] W. Shi, Q. Ling, G. Wu, and W. Yin,
"EXTRA: An ex-
act first-order algorithm for decentralized consensus optimiza-
tion," SIAM Journal on Optimization, vol. 25, no. 2, pp. 944 --
966, 2015.
[19] P. Di Lorenzo and G. Scutari, "NEXT: in-network nonconvex
optimization," IEEE Transactions on Signal and Information
Processing over Networks, vol. 2, no. 2, pp. 120 -- 136, June
2016.
[20] T. Tatarenko and B. Touri, "Non-convex distributed optimiza-
tion," IEEE Transactions on Automatic Control, vol. 62, no. 8,
pp. 3744 -- 3757, Aug. 2017.
[21] Y. Wang, W. Yin, and J. Zeng, "Global convergence of ADMM
in nonconvex nonsmooth optimization," Journal of Scientific
Computing, vol. 78, no. 1, pp. 29 -- 63, Jan. 2019.
[22] R. Ge, F. Huang, C. Jin, and Y. Yuan, "Escaping from saddle
pointsonline stochastic gradient for tensor decomposition," in
Proc. of Conference on Learning Theory, Paris, France, 2015,
pp. 797 -- 842.
[23] R. Ge, J. D. Lee, and T. Ma, "Matrix completion has no spuri-
ous local minimum," in Advances in Neural Information Pro-
cessing Systems, 2016, pp. 2973 -- 2981.
[24] R. Ge, C. Jin, and Y. Zheng, "No spurious local minima in non-
convex low rank problems: A unified geometric analysis," in
Proceedings of the 34th International Conference on Machine
Learning, 2017, pp. 1233 -- 1242.
[25] K. Kawaguchi, "Deep learning without poor local minima," in
Advances in Neural Information Processing Systems, pp. 586 --
594. 2016.
[26] Y. Nesterov and B.T. Polyak, "Cubic regularization of newton
method and its global performance," Mathematical Program-
ming, vol. 108, no. 1, pp. 177 -- 205, Aug 2006.
[27] C. Fang, C. J. Li, Z. Lin, and T. Zhang,
"SPIDER: Near-
optimal non-convex optimization via stochastic path-integrated
differential estimator," in Proc. of NIPS, pp. 689 -- 699. Mon-
treal, Canada, 2018.
[28] Z. Allen-Zhu and Y. Li, "NEON2: Finding local minima via
first-order oracles," in Proc. of NIPS, pp. 3716 -- 3726. Mon-
treal, Canada, Dec. 2018.
[29] J. D. Lee, M. Simchowitz, M. I. Jordan, and B. Recht, "Gra-
dient descent only converges to minimizers," in 29th Annual
Conference on Learning Theory, New York, 2016, pp. 1246 --
1257.
[30] C. Jin, P. Netrapalli, R. Ge, S. M. Kakade and M. I. Jordan,
"Stochastic gradient descent escapes saddle points efficiently,"
available as arXiv:1902.04811, Feb. 2019.
[31] H. Daneshmand, J. Kohler, A. Lucchi and T. Hofmann,
available as
"Escaping saddles with stochastic gradients,"
arXiv:1803.05999, March 2018.
[32] S. Vlaski and A. H. Sayed,
"Second-order guarantees of
stochastic gradient descent in non-convex optimization," sub-
mitted for publication, available as arXiv:1908.07023, August
2019.
[33] A. Daneshmand, G. Scutari and V. Kungurtsev, "Second-order
guarantees of distributed gradient algorithms," available as
arXiv:1809.08694, Sep. 2018.
[34] B. Swenson, S. Kar, H. V. Poor and J. M. F. Moura, "An-
available as
nealing for distributed global optimization,"
arXiv:1903.07258, March 2019.
|
1802.03858 | 1 | 1802 | 2018-02-12T01:31:18 | Machine Learning-based Variability Handling in IoT Agents | [
"cs.MA",
"cs.LG"
] | Agent-based IoT applications have recently been proposed in several domains, such as health care, smart cities and agriculture. Deploying these applications in specific settings has been very challenging for many reasons including the complex static and dynamic variability of the physical devices such as sensors and actuators, the software application behavior and the environment in which the application is embedded. In this paper, we propose a self-configurable IoT agent approach based on feedback-evaluative machine-learning. The approach involves: i) a variability model of IoT agents; ii) generation of sets of customized agents; iii) feedback evaluative machine learning; iv) modeling and composition of a group of IoT agents; and v) a feature-selection method based on manual and automatic feedback. | cs.MA | cs | Machine Learning-based Variability Handling in IoT Agents
Nathalia Nascimento12, Paulo Alencar2, Carlos Lucena12 and Donald Cowan2
1 Laboratory of Software Engineering.
Pontifical Catholic University of Rio de Janeiro. Rio de Janeiro, Brazil.
2 David R. Cheriton School of Computer Science.
University of Waterloo. Waterloo, ON, Canada.
nnascimento,[email protected], palencar,[email protected]
8
1
0
2
b
e
F
2
1
]
A
M
.
s
c
[
1
v
8
5
8
3
0
.
2
0
8
1
:
v
i
X
r
a
Abstract
Agent-based IoT applications have recently been
proposed in several domains, such as health care,
smart cities and agriculture. Deploying these ap-
plications in specific settings has been very chal-
lenging for many reasons including the complex
static and dynamic variability of the physical de-
vices such as sensors and actuators, the software
application behavior and the environment in which
the application is embedded. In this paper, we pro-
pose a self-configurable IoT agent approach based
on feedback-evaluative machine-learning. The ap-
proach involves:
i) a variability model of IoT
agents; ii) generation of sets of customized agents;
iii) feedback evaluative machine learning; iv) mod-
eling and composition of a group of IoT agents; and
v) a feature-selection method based on manual and
automatic feedback.
1 Introduction
Based on the Google Trends tool [Google, 2018], the Internet
of Things (IoT) [Atzori et al., 2012] is emerging as a topic
that is highly related to robotics and machine learning.
In
fact, the use of learning agents has been proposed as an ap-
propriate approach to modeling IoT applications [do Nasci-
mento and de Lucena, 2017b]. These types of applications
address the problems of distributed control of devices that
must work together to accomplish tasks [Atzori et al., 2012].
This has caused agent-based IoT applications to be consid-
ered for several domains, such as health care, smart cities,
and agriculture. For example, in a smart city, software agents
can autonomously operate traffic lights [do Nascimento and
de Lucena, 2017b; Santos et al., 2017], driverless vehicles
[Herrero-Perez and Martinez-Barbera, 2008] and street lights
[do Nascimento and de Lucena, 2017a].
Agents that can interact with other agents or the envi-
ronment in which the applications are embedded are called
embodied agents [Brooks, 1995; Marocco and Nolfi, 2007;
Nolfi et al., 2016; do Nascimento and de Lucena, 2017a].
The first step in creating an embodied agent is to design its
interaction with an application's sensors and actuators, that
is, the signals that the agent will send and receive [Nolfi et al.,
2016]. As a second step, the software engineer provides this
agent with a behavior specification compatible with its body
and with the task to be accomplished. However, to specify
completely the behaviors of a physical system at design-time
and to identify and foster characteristics that lead to benefi-
cial collective behavior is difficult [Mendonc¸a et al., 2017].
To mitigate these problems, many approaches [Marocco and
Nolfi, 2007; Oliveira and Loula, 2014; Nolfi et al., 2016;
do Nascimento and de Lucena, 2017a] have proposed the use
of evolving neural networks [Nolfi and Parisi, 1996] to enable
an embodied agent to learn to adapt their behavior based on
the dynamics of the environment [Nolfi and Parisi, 1996].
The ability of a software system to be configured for differ-
ent contexts and scenarios is called variability [Galster et al.,
2014]. According to [Galster et al., 2014], achieving variabil-
ity in software systems requires software engineers to adopt
suitable methods and tools for representing, managing and
reasoning about change.
However, the number and complexity of variation points
[Pohl et al., 2005] that must be considered while model-
ing agents for IoT-based systems is quite high [Ayala et al.,
2015]. Thus, "current and traditional agent development pro-
cesses lack the necessary mechanisms to tackle specific man-
agement of components between different applications of the
IoT, bearing in mind the inherent variability of these systems"
[Ayala et al., 2015].
In this paper, we propose a self-configurable IoT agent ap-
proach based on feedback-evaluative machine-learning. The
approach involves:
(i) a variability model for IoT agents;
(ii) generation of sets of customized agents; (iii) feedback-
evaluative machine-learning; (iv) modeling and composition
of a group of IoT agents; and (v) a feature-selection method
based on both manual and automatic feedback.
1.1 Motivation: Variability in IoT Agents
In an Internet of Things application suite, there are sev-
eral options for physical components and software behaviors
for the design of a physical agent [del Campo et al., 2017;
Ayala et al., 2015]. According to existing experiments [Vega
and Fuks, 2016; Soni and Kandasamy, 2017] and our ex-
perience with the IoT domain [do Nascimento et al., 2015;
Briot et al., 2016; Do Nascimento et al., 2016; do Nasci-
mento and de Lucena, 2017b; do Nascimento and de Lucena,
2017a], we introduce possible variants of an IoT embodied
agent in Table 1. For example, the physical devices may vary
Table 1: IoT Agents Variability.
Behavior Variability
Analysis Architecture
(Neural Network Variability)
Behavior/
Constraint
Variability
Number and type of
communication signals
Notification types
(e.g. alerts)
Thresholds to activate
notifications
Number layers
Number neurons
per layer
Activation
Function (e.g.
linear, sigmoid)
Properties (e.g.
WTA, feedback)
Body Variability
Number of sensors
Type of sensors (e.g. temperature,
humidity, motion, lighting, gases)
Calibration of sensors
(e.g. temperature detector
range, range of
presence detection,
reaction time, range
of colors detection)
Energy Consumption
Sensors
Battery life
Communication device
Range of communication
devices (e.g. short range,
long range)
Number and type of motors
Number and type of
actuators (e.g. alarm)
IoT Application Logic -
connection between the
inputs and outputs (e.g. if the
lighting sensor value is zero,
then turn on the light, if the
temperature sensor is below
zero, then turn on the heater)
Architecture (e.g.
full connected, output layer
connected to all of the hidden
units)
in terms of the types of sensors, such as temperature and hu-
midity, and in terms of actuators. Each sensor can also vary
in terms of brands, changing such parameters as energy con-
sumption and battery life. The three main variation points we
have identified as shown in Table 1 illustrate the complexity
of IoT agent-based applications.
Thus, the complexity of the behavior of the agent will vary
based on the physical components that are operated by the
agent. For example, if an agent is able to activate an alarm,
which kinds of alerts can this agent generate? If this agent is
able to communicate, how many words is this agent able to
communicate? If this agent is able to control the temperature
of a room, what are the threshold values set to change the
room's temperature?
In addition, we also need to deal with variants in agent ar-
chitecture that the agent uses to sense the environment and
behave accordingly. For example, this architecture can be
a decision tree, a state machine or a neural network. Many
approaches [Marocco and Nolfi, 2007; Nolfi et al., 2016;
do Nascimento and de Lucena, 2017a] use neuroevolution,
which is "a learning algorithm which uses genetic algorithms
to train neural networks" [Whiteson et al., 2005a]). This type
of network determines the behavior of an agent automatically
based on its physical characteristics and the environment be-
ing monitored. A neural network is a well-known approach to
provide responses dynamically and automatically, and create
a mapping of input-output relations [Haykin, 1994], which
may compactly represent a set of "if..then" conditions [do
Nascimento and de Lucena, 2017a], such as: "if the temper-
ature is below 10◦C, then turn on the heat." However, finding
an appropriate neural network architecture based on the phys-
ical features and constraint behavior that were selected for an
agent, is not easy. To model the neural network, we also need
to account for its architectural variability, such as the acti-
vation function, the number of layers and neurons and prop-
erties such as the use of winner-take-all (WTA) as a neural
selection mechanisms [Fukai and Tanaka, 1997] and the in-
clusion of recurrent connections [Marocco and Nolfi, 2007].
With respect to variabilities, [Marocco and Nolfi, 2007],
performed two experiments with the same embodied agents,
varying only the neural network architectures and neural ac-
tivation functions. In the first experiment, they used a neural
network without internal neurons, while in the second exper-
iment, they used a neural network with internal neurons and
recurrent connections. In addition, they also used different
functions to compute the neurons' outputs. Based only on the
neural network characteristics, they classified the robots from
the first experiment as reactive robots (i.e. "motor actions can
only be determined on the basis of the current sensory state"),
and non-reactive robots (i.e. "motor actions are also influ-
[Marocco
enced by previous sensory and internal states").
and Nolfi, 2007] analyzed whether the type of neural archi-
tecture influenced the performance of a team of robots. They
showed that the differences in performance between reactive
and non-reactive robots vary according to the environmental
conditions and how the robots have been evaluated.
[Oliveira and Loula, 2014] investigated symbol represen-
tations in communication based on the neural architecture
topology that is used to control an embodied agent. They
found that the communication system varies according to how
the hidden layers connect the visual inputs to the auditory in-
puts.
These findings have helped us to conclude that to support
the design of IoT embodied agents, we need to account for
the variability of the physical body, the behavior constraints,
and the architecture that analyses the inputs.
2 Approach
We aim to support the development of IoT embodied agents
by designing a platform to support i) handling variability in
IoT embodied agents, ii) selecting the physical components
that will compose each agent, and iii) finding their appropri-
ate behavior according to their bodies and the scenario where
they will be applied. Figure 1 depicts the high-level model of
our proposed approach to self-configurable agents.
Figure 1: High-level model of the self-configurable agent approach
to generate embodied agents.
Basically, this platform or agent factory contains five mod-
ules: i) a manual control that allows an IoT expert to select
the first set of features manually; ii) a reconfigurable sys-
tem that contains the features that can be used to compose
the set of agents incorporating feature-oriented domain anal-
ysis (FODA) [Pohl et al., 2005] to model the software's vari-
ability; iii) the creation of a set of agents containing the se-
lected features that are also able to use a neural network to
learn about the environment; iv) a module for evaluating feed-
back tasks, by investigating the performance of the group of
agents in the application scenario after the learning execu-
tion (depending on the evaluation result, the control module
can trigger the machine learning algorithm to reconfigure the
set of features); and v) a machine-learning module to select
autonomously a new set of physical, behavior and neural net-
work features.
2.1 Current Implementation
The current implementation of our architecture consists of
two main parts. First (subsection 2.1.1), a human-in-the-loop
selects the set of physical, behavior and neural network fea-
tures for the group of IoT agents. Second (subsection 2.1.2),
based on the features that were selected by the human, a
neuroevolution-based algorithm is used to remove the irrel-
evant physical features and discover the agent's behavior.
During the second step, the neuroevolution-based algo-
rithm considers a specific environment to discover the ap-
propriate behaviors that enable a set of agents to achieve a
collective task on that environment. After finding an appro-
priate behavior (i.e. the weights and topology of the neural
network), the initial phase of the learning process is complete.
However, an unexpected change in environment may force
this process to be re-executed as all variation points can be
affected. If this environmental change makes it necessary to
add a new sensor to the agents' body, the way that the agents
perceive the environment may also be reconfigured, and the
learning process in the second step will also need to be re-
executed. In addition, if the environment changes dynami-
cally, there is a need to identify which variation points will be
affected and how to handle the associated variability.
2.1.1 Changing / Adding Features - Changing the search
space for the neuroevolution-based algorithm
According to the FODA notation, features can be classified
as mandatory, optional and alternative. Alternative features
are not to be used in the same instance, such as the range of
communication devices, the number of words to be communi-
cated or the maximum number of hidden layers. For example,
in the beginning of the experiment, if we select a neural net-
work as the decision architecture, we must choose one of the
features that defines the maximum number of hidden layers
that this neural network can have, such as "two" or "three."
So, if "two" is selected, the search space for learning will be
limited to the use of two hidden layers. If the communication
system of the agents is limited to one word, the learning algo-
rithm will not be able to test other solutions that could involve
the communication of more than one word.
Thus, the current search space to be used by the learning
algorithm has been limited by the set of features that were se-
lected to compose the embodied agents. However, there are
three situations for which this search space may need to be
changed or expanded: i) the learning algorithm does not find
a good solution using this set of features, making it necessary
to select alternative choices for some features (i.e. selecting
a different activation function for the neural network) to re-
configure the set of agents; ii) the user changes some require-
ments of the agent-based system, making it necessary to add
new unpredicted features to the feature model, as described in
[Sharifloo et al., 2016]; and iii) the learning algorithm found
an appropriate solution for the agents in the environment (i.e.
the collection of agents are achieving their tasks in the appli-
cation environment), but the environment changed dynami-
cally, unexpectedly decreasing the performance of the agents.
In this step, there is a need to control the search space that
will be used by the neuroevolution-based algorithm for the
next step (described in subsection 2.1.2). This control con-
sists of selecting the set of features to compose the system.
For instance, a human-in-the-loop has performed this selec-
tion and reconfiguration. But our goal (and we designed our
architecture for this purpose) is to enable an automatic recon-
figuration of the system. In such a case, if the agents face
an unexpected environmental change, a learning algorithm
can be used to select a new set of features to compose the
group of agents and execute the neuroevolution-based algo-
rithm again. In this situation, we proposed the use of a learn-
ing algorithm to reconfigure a neural network (i.e. selecting
another activation function), which can be seen as an auto-
Reconfigurable System for Agent CustomizationGenerates embodied agentsTo live in a scenarioSimulated or real scenarioControllerSensors, actuators and behaviorsMachine LearningReconfigure knowledge(Autonomous Features Selection) EvaluationResultsFeedback LoopAgent ID: xxx1Set with n agentsAgent FactoryManualControlBody featuresBehavior featuresManual Features Selection23514Neural Network featuresSmart Fruit MonitoringInputSensorOutputTemperatureGasMethaneHydrogenHumidityLightingPredictionTime to spoil Neural network#Hidden layers132WinnerTakes All(WTA)AtivationfunctionLinearSigmoidThreshold#neuronsFeedbackDecisionIn this scenario, we consider a set of street lights distributed
in a neighborhood. These street lights need to learn to save
energy while maintaining the maximum visual comfort in the
illuminated areas. For more details concerning this applica-
tion scenario, see [do Nascimento and de Lucena, 2017a].
3.1 Feature-Oriented Domain Analysis (FODA)
Figure 3 illustrates the use of FODA to express IoT agent
variability in a public lighting application.
matic machine-learning approach (Auto-ML) [Muneesawang
and Guan, 2002].
2.1.2 Using neuroevolution to discard irrelevant features
and discover the agent's current behavior
As described previously, each agent contains a neural net-
work to make decisions. The weights, the topology, the in-
put and output features of this neural network are determined
based on an evolutionary algorithm. This algorithm makes
changes based on the performance evaluation of the agents in
the application.
We implemented this neuroevolution algorithm based
on the Feature Deselective NeuroEvolution of Augmenting
Topologies (FD-NEAT) proposed by [Tan et al., 2009]. But
instead of starting with a minimal architecture with inputs di-
rectly connected to the output layers, without a hidden layer
as proposed by the traditional NEAT and FD-NEAT meth-
ods, we started with a three-layer neural network with all con-
nections. In addition, we decided that a connection removal
means a zeroed weight between two neurons, as illustrated in
2.
Figure 2: Removing input features and other neuronal connections.
If the weight is zero, in our implementation, the neural net-
work's output will not influence the activation function of the
next neuron. In this case, the hidden layer will always exist,
which can make the search more complicated. To mitigate
this complexity, we established positive and negative thresh-
olds for the weight setting in order to stimulate the connection
removals. So, only the connections with higher contributions
will remain during the evolutionary process. For example, in
a weight range of [-2;+2], connections with "0.2" or "-0.1"
weights are examples of connections that will be removed. In
such a case, if all connections between a sensor input and the
hidden layer are removed, this input feature will be discarded.
3 Illustrative Example: Smart Street Lights
To illustrate the variability dimensions of an IoT agent-based
application, we selected and implemented one of the simplest
examples from the IoT domain: a smart street light appli-
cation. Even in a simple experiment of lighting control, we
found many different prototypes in the literature [Carrillo et
al., 2013; De Paz et al., 2016; do Nascimento and de Lu-
cena, 2017a]. For example, [Carrillo et al., 2013] provided
lights with cameras for image processing, while [De Paz et
al., 2016] provided them with ambient light sensors, and [do
Nascimento and de Lucena, 2017a] provided lights with am-
bient light and motion-detection sensors.
Figure 3: Feature model of a smart light agent.
As shown in this figure, even in a simple IoT agent, you
may need to consider many variation points to create an IoT
agent. According to the model, the input, decision and out-
put are mandatory features. But the selection of sensors to
compose the body of the agent is optional. If you decide to
use sensors, you must select at least one of the sensors, such
as the light sensor. In addition, if you select the light sensor
feature, you must select which brand will be used. Depend-
ing on the selected light sensor brand, your agent will be able
to sense very small changes in light or detect a full range of
colors [Intorobotics, 2018].
3.2 Selecting Physical and Neural Network
Features
An IoT expert selected three physical inputs and two phys-
ical outputs to measure and operate each one of the street
lights. The expert also added one behavior output: namely,
the agents could ignore messages received from neighboring
street lights. In addition, the engineer selected a neural net-
work with one hidden layer with five units as the initial net-
work for each agent with the sigmoid function as the activa-
tion function of this neural network.
Figure 4 depicts the three-layer neural network that was
generated based on the selected features. The input layer in-
cludes four units that encode the activation level of the sen-
sors and the previous output value of the listening decision
output. The output layer contains three output units: (i) lis-
teningDecision, that enables the smart lamp to receive signals
from neighboring street lights in the next cycle; (ii) wire-
lessTransmitter, a signal value to be transmitted to neigh-
boring street lights; and (iii) lightDecision, that switches the
light's OFF/DIM/ON functions.
OutputsHiddenNodesInputs0.00.00.00.01.5-1.3Smart LightInputOutputCommunicationReceiverNeural Network#Hidden layers132WinnerTakes All(WTA)AtivationfunctionLinearSigmoidBinary#neuronsFeedbackCommunicationTransmitter tostreet lightsDistance500 m1 KmSensorMotionLightBroken LampDetectorActivate Lamp#levelsof light intensity#signals2323NegativeweightsbiasReLuR1. lightSensor=0 → lamp = 1…unkown rulesComposition rulesCameraMaximum weightDecisionState MachineDecision treeTSL235RColorPALVCNL4000Figure 4: Neural network resulted from the first feature-selection
interaction.
3.3 Learning about the environment
During the training process, the algorithm evaluates the op-
tions for weights of the network based on energy consump-
tion, the number of people that finished their routes before the
simulation ends, and the total time spent by people moving
during their trip. Therefore, each weight-set trial is evaluated
after the simulation ends based on the following equations:
pP eople =
(completedP eople × 100)
totalP eople
(totalEnergy × 100)
(1)
(2)
(3)
)
pEnergy =
( 11×(timeSimulation×totalSmartLights)
10
(totalT imeT rip × 100)
pT rip =
(( 3×timeSimulation
) × totalP eople)
(2)
f itness = (1.0×pP eople)−(0.6×pT rip)−(0.4×pEnergy)
(4)
in which pP eople is the percentage of people that com-
pleted their routes by the end of the simulation out of the total
number of people participating in the simulation; pEnergy is
the percentage of energy that was consumed by street lights
out of the maximum energy value that could be consumed
during the simulation. We also considered the use of the wire-
less transmitter to calculate energy consumption; pT rip is the
percentage of the total duration time of people's trips out of
the maximum time value that their trip could consume; and
f itness is the fitness of each representation candidate that
encodes the neural network.
Environmental Setting
As illustrated in Figure 5, in this first step, the scenario was
bright during the entire period that the agents were learn-
ing about the environment. After some learning interactions,
the agents developed an appropriate behavior to achieve their
tasks in this version of the application. As a result, the
neuroevolution-based algorithm discarded all the neuronal
connections between the light sensor and the hidden units.
As the environment was always sunny, an obvious behav-
ior for the agent is to turn off the light, whether a person was
present or not. As expected, the agents produced this behav-
ior. We were also expecting that the number of hidden neu-
rons would be considerably decreased because of the simplic-
ity of the task. But only one hidden neuron and one feature
input were removed. This behavior occurred because the IoT
expert selected a sigmoid function as an activation function.
Figure 5: Learning the environment.
As known, the output of the sigmoid function is not zero
when its input is zero (i.e.
if the sigmoid input is zero, the
LED will be turned on). Thus, the learning algorithm found a
configuration to assure that the LED remains turned off.
3.4 Reconfiguring the set of features
The learning algorithm did not find an appropriate
solution
The IoT expert was expecting a fitness performance higher
than 75% and a simpler architecture to use in the real devices.
But after several interactions of the learning algorithm with
the environment, the highest fitness performance achieved by
the learning algorithm was 72%.
As the human-in-the-loop was not satisfied with this result,
he/she reconfigured the first set of features that was used to
compose the IoT agents. For instance, an alternative choice
of the activation function of the neural network was selected:
namely, the binary activation function with threshold. As a
result, the performance result quickly increased by more than
5% and the human-in-the-loop obtained a simpler architec-
ture.
The environment unexpectedly changed
Figure 6: Reconfiguring the set of features.
After a time, a change in the environment occurred. Now,
these agents are operating in an environment in which some-
times the background light can be bright and at other times
dark. As a result, the performance of the set of agents con-
Motion sensorLight sensorWireless receptorWireless transmitterLED (3 levels)Turn on WirelessReceiverPrevious decision (turn onwireless)Input layerHidden layerOutput layerThe performance of each neural network configurationis evaluated40455055606570751471013161922252831343740434649525558616467707376798285PERFORMANCE AVERAGEBEST PERFORMANCEConfigurationassigned toagentsMotion sensorLight sensorWireless receptorWireless transmitterLED (3 levels)Turn on WirelessReceiverPrevious decision (turn onwireless)Input layerHidden layerOutput layer203040506070809016111621263136414651566166717681869196101106111116121126131PERFORMANCE AVERAGEBEST PERFORMANCENeuroevolutionThe neuralNetwork is reconfiguredEnvironmental change decreases agents performanceAgents mustLearn againMotion sensorLight sensorWireless receptorWireless transmitterLED (3 levels)Turn on WirelessReceiverPrevious decision (turn onwireless)Input layerHidden layerOutput layerEnvironmentchangedsiderably decreased, as shown in Figure 6. The learning algo-
rithm continued its training from its last state, but the current
analysis architecture was not a viable option for this new sit-
uation.
The human-in-the-loop evaluated this decreased perfor-
mance, and then reconfigured the system. For instance, the
expert could have selected a new sensor, but he/she main-
tained the number of sensor inputs, but selected different
variants for the neural network, such as "two" as the max-
imum number of neurons in the hidden layer and the sig-
moid activation function. Then, the learning algorithm was
re-executed and the agents learned to cope with this environ-
mental change.
4 Related Work
[Whiteson et al., 2005b; Tan et al., 2009; Diuk et al., 2009;
Nguyen et al., 2013; Ure et al., 2014; del Campo et al., 2017]
are some of the examples that apply feature selection to han-
dle variability in learning agent-based systems. For example,
[Diuk et al., 2009] propose an approach that uses reinforce-
ment learning algorithms for structure discovery and feature
selection while actively exploring an unknown environment.
To exemplify the use of the proposed algorithm, the authors
present the problem of a unique robot that has to decide which
of multiple sensory inputs such as camera readings of surface
color and texture, and IR sensor reading are relevant for cap-
turing an environment's transition dynamics.
However, most of these approaches do not address the
problem of environmental- or user-based reconfiguration, in
which a new set of features may be selected based on envi-
ronmental changes, expanding or changing the search space
of the group of learning agents. In addition, as most of these
approaches load all features into the agent, they do not ad-
dress the problem of dealing with mandatory, optional and
alternative features.
[Sharifloo et al., 2016] provides one of the few solutions
that propose an approach for feature selection and feature set
reconfiguration. They presented a theoretical approach that
proposes the use of reinforcement learning for feature selec-
tion, and a reconfiguration guided by system evolution where
the user creates new features to deal with changes in system
requirements. They do not consider the changes that can hap-
pen dynamically in the environment, which can be handled
by an automatic module by testing alternative choices of fea-
tures.
In addition, most of these approaches do not characterize
In fact, [Galster et
variability in their application domain.
al., 2014] observed that most approaches for variability han-
dling are not oriented to specific domains. These approaches
are potentially widely applicable. However, [Galster et al.,
2014] consider that for a variability approach to cover com-
plex domains, it is necessary to create domain-specific solu-
tions. Therefore, [Galster et al., 2014] consider the extension
of variability approaches for specific domains as a promising
direction for future work.
5 Contributions and Ongoing Work
We provided an approach through which a software en-
gineer with expertise in IoT agents co-worked with a
neuroevolutionary-based algorithm that can discard features.
First, the software engineer provided the initial configuration
of the agent-based system, using personal expertise to select
a set of features. Then, a neuroevolutionary-based algorithm
was executed to remove those features that were selected by
the developer, but shown to be irrelevant to the application
during the simulation.
However, after an unexpected environmental change that
was not considered by the software engineer during the ini-
tial design time, the previous solution found by the neuroevo-
lutionary algorithm stopped to work. Then, after evaluating
the environmental changes, the software engineer had three
options: i) to add a new feature to the feature model; ii) to se-
lect alternative choices of some features, including a different
neural network architecture and properties, then starting the
learning process again; and iii) to maintain the set of features
and just reactivate the learning algorithm to continue from its
last state.
In addition, to handling variability in learning for IoT
agents, we identified the main variation points of these kinds
of applications, including the variants that can be involved in
a neural network design. We also provided a feature-oriented
variability model, which is an established software engineer-
ing module.
The proposed approach is an example of a human-in-
the-loop approach in which a machine-learning automated-
procedure assists a software developer in completing his/her
task. Our next step is to enable the use of a learning tech-
nique to reconfigure the set of features based on environmen-
tal changes automatically. As we proposed a hybrid architec-
ture, we can use this learning technique only to reconfigure
the variants related to one of the variation points, such as the
neural network properties. In such an instance, we can have
a human-in-the-loop responsible for handling the body and
behavior variability of the IoT agents.
Acknowledgments
This work has been supported by CAPES scholarship/Pro-
gram 194/Process: 88881.134630/2016-01 and the Labora-
tory of Software Engineering (LES) at PUC-Rio. It has been
developed in cooperation with the University of Waterloo,
Canada. Our thanks to CNPq, CAPES, FAPERJ and PUC-
Rio for their support through scholarships and fellowships.
References
[Atzori et al., 2012] Luigi Atzori, Antonio Iera, Giacomo
Morabito, and Michele Nitti. The social internet of things
(siot)–when social networks meet the internet of things:
Concept, architecture and network characterization. Com-
puter networks, 56(16):3594–3608, 2012.
[Ayala et al., 2015] Inmaculada Ayala, Mercedes Amor,
Lidia Fuentes, and Jos´e M Troya. A software prod-
uct line process to develop agents for the iot. Sensors,
15(7):15640–15660, 2015.
[Briot et al., 2016] Jean-Pierre Briot, Nathalia Moraes
de Nascimento, and Carlos Jos´e Pereira de Lucena. A
multi-agent architecture for quantified fruits: Design and
experience. In 28th International Conference on Software
Engineering & Knowledge Engineering (SEKE'2016),
pages 369–374. SEKE/Knowledge Systems Institute, PA,
USA, 2016.
[Brooks, 1995] Rodney A Brooks. Intelligence without rea-
The artificial life route to artificial intelligence:
son.
Building embodied, situated agents, pages 25–81, 1995.
[Carrillo et al., 2013] C Carrillo, E Diaz-Dorado, J Cidr´as,
A Bouza-Pregal, P Falc´on, A Fern´andez, and A ´Alvarez-
S´anchez. Lighting control system based on digital camera
for energy saving in shop windows. Energy and Buildings,
59:143–151, 2013.
[De Paz et al., 2016] Juan F De Paz, Javier Bajo, Sara
Rodr´ıguez, Gabriel Villarrubia, and Juan M Corchado. In-
telligent system for lighting control in smart cities. Infor-
mation Sciences, 372:241–255, 2016.
[del Campo et al., 2017] In´es del Campo, Victoria Mart´ınez,
Flavia Orosa, Javier Echanobe, Estibalitz Asua, and Koldo
Basterretxea. Piecewise multi-linear fuzzy extreme learn-
ing machine for the implementation of intelligent agents.
In Neural Networks (IJCNN), 2017 International Joint
Conference on, pages 3363–3370. IEEE, 2017.
[Diuk et al., 2009] Carlos Diuk, Lihong Li, and Bethany R
Leffler. The adaptive k-meteorologists problem and its ap-
plication to structure learning and feature selection in rein-
forcement learning. In Proceedings of the 26th Annual In-
ternational Conference on Machine Learning, pages 249–
256. ACM, 2009.
[do Nascimento and de Lucena, 2017a] Nathalia
Moraes
do Nascimento and Carlos Jos´e Pereira de Lucena.
Engineering cooperative smart things based on embodied
In Adaptive Hardware and Systems (AHS),
cognition.
2017 NASA/ESA Conference on, pages 109–116. IEEE,
2017.
[do Nascimento and de Lucena, 2017b] Nathalia Moraes
do Nascimento and Carlos Jos´e Pereira de Lucena. Fiot:
An agent-based framework for self-adaptive and self-
organizing applications based on the internet of things.
Information Sciences, 378:161–176, 2017.
[do Nascimento et al., 2015] Nathalia Moraes do Nasci-
mento, Carlos Jos´e Pereira de Lucena, and Hugo Fuks.
Modeling quantified things using a multi-agent system. In
Web Intelligence and Intelligent Agent Technology (WI-
IAT), 2015 IEEE/WIC/ACM International Conference on,
volume 1, pages 26–32. IEEE, 2015.
[Do Nascimento et al., 2016] Nathalia Moraes Do Nasci-
mento, Marx Leles Viana, and Carlos Jos´e Pereira de Lu-
cena. An iot-based tool for human gas monitoring. 2016.
Shigeru
Tanaka. A simple neural network exhibiting selective
activation of neuronal ensembles: from winner-take-all to
winners-share-all. Neural computation, 9(1):77–97, 1997.
[Fukai and Tanaka, 1997] Tomoki
Fukai
and
[Galster et al., 2014] Matthias Galster, Danny Weyns, Dan
Tofan, Bartosz Michalik, and Paris Avgeriou. Variabil-
ity in software systems-a systematic literature review.
IEEE Transactions on Software Engineering, 40(3):282–
306, 2014.
[Google, 2018] Google.
https://trends.google.com/, January 2018.
Google
trends.
[Haykin, 1994] Simon Haykin. Neural networks: a compre-
hensive foundation. Prentice Hall PTR, 1994.
[Herrero-Perez and Martinez-Barbera, 2008] D
Herrero-
Perez and H Martinez-Barbera. Decentralized coordi-
nation of automated guided vehicles (short paper).
In
AAMAS 2008, 2008.
[Intorobotics, 2018] Intorobotics.
budgeted
com-
mon
sensors.
https://www.intorobotics.com/common-budgeted-arduino-
light-sensors/, January 2018.
Most
light
and most
arduino
[Marocco and Nolfi, 2007] Davide Marocco and Stefano
Nolfi. Emergence of communication in embodied agents
evolved for the ability to solve a collective navigation
problem. Connection Science, 19(1):53–74, 2007.
[Mendonc¸a et al., 2017] M´arcio Mendonc¸a, Ivan R Chrun,
Fl´avio Neves, and Lucia VR Arruda. A cooperative ar-
chitecture for swarm robotic based on dynamic fuzzy cog-
nitive maps. Engineering Applications of Artificial Intelli-
gence, 59:122–132, 2017.
[Muneesawang and Guan, 2002] Paisarn Muneesawang and
Ling Guan. Automatic machine interactions for content-
based image retrieval using a self-organizing tree map
IEEE transactions on neural networks,
architecture.
13(4):821–834, 2002.
[Nguyen et al., 2013] Trung Nguyen, Zhuoru Li, Tomi Si-
lander, and Tze Yun Leong. Online feature selection
for model-based reinforcement learning. In International
Conference on Machine Learning, pages 498–506, 2013.
[Nolfi and Parisi, 1996] Stefano Nolfi and Domenico Parisi.
Learning to adapt to changing environments in evolving
neural networks. Adaptive behavior, 5(1):75–98, 1996.
[Nolfi et al., 2016] Stefano Nolfi, Josh Bongard, Phil Hus-
bands, and Dario Floreano. Evolutionary Robotics, chap-
ter 76, pages 2035–2068. Springer International Publish-
ing, Cham, 2016.
[Oliveira and Loula, 2014] Emerson Oliveira and Angelo
Loula. Symbol interpretation in neural networks: an in-
vestigation on representations in communication. In Pro-
ceedings of the Annual Meeting of the Cognitive Science
Society, volume 36, 2014.
[Pohl et al., 2005] Klaus Pohl, Gunter Bockle, and Frank J
van Der Linden. Software product line engineering: foun-
dations, principles and techniques. Springer Science &
Business Media, 2005.
[Santos et al., 2017] Fernando Santos, Ingrid Nunes, and
Ana LC Bazzan. Model-driven engineering in agent-based
modeling and simulation: a case study in the traffic signal
control domain. In Proceedings of the 16th Conference on
Autonomous Agents and MultiAgent Systems, pages 1725–
1727. International Foundation for Autonomous Agents
and Multiagent Systems, 2017.
[Sharifloo et al., 2016] Amir Molzam Sharifloo, Andreas
Metzger, Cl´ement Quinton, Luciano Baresi, and Klaus
Pohl. Learning and evolution in dynamic software prod-
uct lines. In Software Engineering for Adaptive and Self-
Managing Systems (SEAMS), 2016 IEEE/ACM 11th Inter-
national Symposium on, pages 158–164. IEEE, 2016.
[Soni and Kandasamy, 2017] Gulshan Soni and Selvaradjou
Kandasamy. Smart garbage bin systems–a comprehensive
survey. In International Conference on Intelligent Infor-
mation Technologies, pages 194–206. Springer, 2017.
[Tan et al., 2009] Maxine Tan, Michael Hartley, Michel Bis-
ter, and Rudi Deklerck. Automated feature selection in
neuroevolution. Evolutionary Intelligence, 1(4):271–292,
2009.
[Ure et al., 2014] N Kemal Ure, Girish Chowdhary, Yu Fan
Chen, Jonathan P How, and John Vian. Distributed learn-
ing for planning under uncertainty problems with hetero-
geneous teams. Journal of Intelligent & Robotic Systems,
74(1-2):529, 2014.
[Vega and Fuks, 2016] Katia Vega and Hugo Fuks. Beauty
Technology: Designing Seamless Interfaces for Wearable
Computing. Springer, 2016.
[Whiteson et al., 2005a] Shimon Whiteson, Nate Kohl, Risto
Miikkulainen, and Peter Stone. Evolving soccer keepaway
players through task decomposition. Machine Learning,
59(1-2):5–30, 2005.
[Whiteson et al., 2005b] Shimon Whiteson, Peter Stone,
Kenneth O Stanley, Risto Miikkulainen, and Nate Kohl.
Automatic feature selection in neuroevolution. In Proceed-
ings of the 7th annual conference on Genetic and evolu-
tionary computation, pages 1225–1232. ACM, 2005.
|
1806.09757 | 1 | 1806 | 2018-06-26T01:59:14 | Adaptive guaranteed-performance consensus design for high-order multiagent systems | [
"cs.MA"
] | The current paper addresses the distributed guaranteed-performance consensus design problems for general high-order linear multiagent systems with leaderless and leader-follower structures, respectively. The information about the Laplacian matrix of the interaction topology or its minimum nonzero eigenvalue is usually required in existing works on the guaranteed-performance consensus, which means that their conclusions are not completely distributed. A new translation-adaptive strategy is proposed to realize the completely distributed guaranteed-performance consensus control by using the structure feature of a complete graph in the current paper. For the leaderless case, an adaptive guaranteed-performance consensualization criterion is given in terms of Riccati inequalities and a regulation approach of the consensus control gain is presented by linear matrix inequalities. Extensions to the leader-follower cases are further investigated. Especially, the guaranteed-performance costs for leaderless and leader-follower cases are determined, respectively, which are associated with the intrinsic structure characteristic of the interaction topologies. Finally, two numerical examples are provided to demonstrate theoretical results. | cs.MA | cs |
Adaptive guaranteed-performance consensus design for
high-order multiagent systems✩
Jianxiang Xia, Jie Yanga, Hao Liub,∗, Tang Zhenga
aHigh-Tech Institute of Xi'an, Xi'an, 710025, P.R. China
bSchool of Astronautics, Beihang University, Beijing, 100191, P.R. China
Abstract
The current paper addresses the distributed guaranteed-performance consensus design
problems for general high-order linear multiagent systems with leaderless and leader-
follower structures, respectively. The information about the Laplacian matrix of the inter-
action topology or its minimum nonzero eigenvalue is usually required in existing works
on the guaranteed-performance consensus, which means that their conclusions are not
completely distributed. A new translation-adaptive strategy is proposed to realize the
completely distributed guaranteed-performance consensus control by using the structure
feature of a complete graph in the current paper. For the leaderless case, an adaptive
guaranteed-performance consensualization criterion is given in terms of Riccati inequali-
ties and a regulation approach of the consensus control gain is presented by linear matrix
inequalities. Extensions to the leader-follower cases are further investigated. Especially,
the guaranteed-performance costs for leaderless and leader-follower cases are determined,
respectively, which are associated with the intrinsic structure characteristic of the interac-
tion topologies. Finally, two numerical examples are provided to demonstrate theoretical
results.
Keywords: Multiagent systems, adaptive consensus, guaranteed-performance control,
gain regulation.
1. Introduction
In the last two decades, the distributed cooperative control of multiagent systems has
received great attention by researchers from different fields, such as formation control,
✩This work was supported by the National Natural Science Foundation of China under Grants 61374054,
61503012, 61703411, 61503009, 61333011 and 61421063 and Innovation Foundation of High-Tech Institute
of Xi'an (2015ZZDJJ03), also supported by Innovation Zone Project (17-163-11-ZT-004-017-01).
∗Corresponding author. Tel.: +86 10 62790793.
Email address: [email protected] (Hao Liu)
Preprint submitted to Information Sciences
June 27, 2018
multiple mobile robot systems, distributed computation and distributed sensor networks
[1]-[18], et al. Consensus is a fundamental problem in cooperative control, which re-
quires that all agents achieve an agreement on certain variables of interest by designing
distributed consensus protocols. Generally speaking, according to the structures of inter-
action topologies, consensus can be categorized into the leaderless one and the leader-
follower one. When leader-follower consensus is achieved, the states of all followers track
the state trajectories of the leader. However, for the leaderless case, all agents jointly deter-
mine the agreement state via interacting with each other, which is also called the consensus
function. Some very interesting and significant works were finished in [19]-[33], where
the consensus regulation performance was not considered.
For many practical multiagent systems, it is not only required that they can achieve
consensus, but also satisfy certain consensus performance. Hu et al. [34] showed a typi-
cal example; that is, when multiple mobile autonomous vehicles perform a specific patrol
task, the distance performance is critically important due to limited resource or utility max-
imization. The consensus performance can be modeled as certain cost functions, which can
be usually divided into two types: the individual cost function and the global cost function.
For the individual cost function shown in [35] and [36], each agent has a local objective
function and some global goals can be achieved by optimizing the objective function of
each agent. For the global cost function, some whole performance index is minimized in a
distributed manner. For first-order multiagent systems, Cao and Ren [37] proposed a linear
quadratic global cost function to achieve optimal consensus. For second-order multiagent
systems, a global cost function was constructed by state errors among neighboring agents
in [38]. For high-order multiagent systems, guaranteed-cost consensus criteria were pre-
sented in [39–42], which intrinsically realize suboptimal consensus control. It should be
pointed out that the above consensus results with certain cost functions are not completely
distributed since they are associated with the Laplacian matrix of the interaction topol-
ogy or its nonzero eigenvalues, which are global information of a multiagent system as a
whole.
For high-order multiagent systems without consensus performance constraints, Li et
al. [43] proposed a very interesting dilation-adaptive strategy to eliminate the impacts of
the nonzero eigenvalue of the Laplacian matrix and showed that the interaction strengths
among agents may be monotonically increasing and converge to some finite steady-state
value, but the quantitative value cannot be determined. Since the dilation factor is inversely
proportional to the minimum nonzero eigenvalue, it may be very large when the algebraic
connectivity is small and cannot be precisely determined. However, the precise value of the
dilation factor is required to optimize the global cost function. Hence, the dilation-adaptive
strategy is no longer valid to deal with guaranteed-performance consensus. To the best
of our knowledge, the following three challenging problems on guaranteed-performance
2
consensus are still open: (i) How to realize guaranteed-performance consensus control
in a completely distributed manner; (ii) How to regulate the consensus control gain and
consensus performance between any two agents; (iii) How to determine the guaranteed-
performance cost when the interaction strengths among agents adaptively change and may
be moronically increasing.
In the current paper, we intend to propose a distributed guaranteed-performance con-
sensus scheme without using the Laplacian matrix and its minimum nonzero eigenvalue.
Firstly, the new adaptive guaranteed-performance consensus protocols for leaderless cases
and leader-follower cases are constructed, respectively, where interaction weights among
neighboring agents are adaptively regulated by the state error between each agent and its
neighbors for the leaderless case, but interaction weights between the leader and followers
are time-varying and interaction weights among followers are fixed for the leader-follower
case. Then, for leaderless and leader-follower cases, adaptive guaranteed-performance
consensualization criteria are given, respectively, and the upper bounds of the guaranteed-
performance costs are determined, respectively, which are independent of the adaptively
regulated interaction weights. Finally, by combining with the linear matrix inequality
(LMI) techniques, the regulation approaches of the consensus control gain are respectively
given for leaderless and leader-follower multiagent systems by adjusting the translation
factors.
Compared with closely related literatures on guaranteed-performance consensus for
high-order linear multiagent systems, the current paper has three unique features. Firstly,
the current paper proposes a novel translation-adaptive strategy to realize completely dis-
tributed guaranteed-performance consensus. However, the guaranteed-performance con-
sensus criteria in [39–42] require the global information and the dilation-adaptive strategy
in [43] cannot be used to deal with guaranteed-performance constraints. Secondly, by
the intrinsic structure property of the interaction topology, the regulation approach of the
consensus control gain is proposed and the guaranteed-performance cost is determined in
the current paper, while the consensus control gain cannot be regulated in [39–42], where
the approaches to determine the guaranteed-performance cost are no longer valid when
interaction weights are adaptively regulated. Thirdly, the consensus protocol in the current
paper regulates the consensus performance between any two agents except the leader, but
the consensus protocol in [39–42] can only ensure the consensus performance between
neighboring agents.
The remainder of the current paper is organized as follows. Section 2 presents leaderless
adaptive guaranteed-performance consensualization criteria, determines the guaranteed-
performance cost, and gives a consensus control gain regulation approach. In Section 3,
leader-follower adaptive guaranteed-performance consensus problems are investigated and
the associated consensualization criteria are proposed. Two numerical examples are given
3
to demonstrate theoretical results in Section 4 and some concluding remarks are presented
in Section 5.
Notations: Rd denotes the real column vector space of dimension d and Rd×d stands for
the set of d× d dimensional real matrices. IN represents the identity matrix of dimension N
and 1N is an N-dimensional column vector with all entries equal to 1. 0 stands for the zero
column vector with a compatible dimension. QT denotes the transpose of Q. RT = R > 0
and RT = R < 0 mean that the symmetric matrix R is positive definite and negative
definite, respectively. RT = R ≥ 0 and RT = R ≤ 0 mean that the symmetric matrix R
is positive semidefinite and negative semidefinite, respectively. The notation ⊗ stands for
the Kronecker product. The symmetric elements of a symmetric matrix are denoted by the
symbol *.
2. Leaderless adaptive guaranteed-performance consensualization
This section first presents the problem description for leaderless adaptive guaranteed-
performance consensus design. Then, the associated consensualization criteria are given
in terms of Ricatti inequalities, the guaranteed-performance cost is determined and an
approach to regulate the consensus control gain is shown in terms of LMIs.
2.1. Problem description for leaderless cases
A connected undirected graph G is used to describe the interaction topology of a multi-
agent system, where each agent is denoted by a node, the interaction channel between any
two nodes is represented by an edge and the interaction strength is denoted the edge weight
likwik(t), where lii = 0, lik = 1 if agent k is a neighbor of agent i and lik ≡ 0 otherwise, and
wik(t) > 0 with wik(0) > 0 is a nondecreasing function designed later. The Laplacian matrix
of G is defined as Lw(t) = D(t)−W(t), where W(t) = [likwik(t)]N×N denotes the weight matrix
of G and D(t) = diag{d1(t), d2(t), · · · , dN(t)} with di(t) = PN
k=1,k,i likwik(t) (i = 1, 2, · · · , N)
represents the in-degree matrix of G. Since G is connected, zero is its single eigenvalue
and the other eigenvalues are positive as shown in [44].
The dynamics of each agent is described by the following general high-order linear
model:
xi(t) = Axi(t) + Bui(t) (i ∈ {1, 2, · · · , N}) ,
where A ∈ Rd×d, B ∈ Rd×p, N is a positive integer standing for the number of agents, and
xi(t) and ui(t) are the state and the control input of agent i, respectively.
A leaderless adaptive guaranteed-performance consensus protocol is proposed as fol-
(1)
lows
4
wik(t) (xk(t) − xi(t)),
ui(t) = Ku Pk∈Ni
wik(t) = (xk(t) − xi(t))T Kw (xk(t) − xi(t)) ,
Jr = 1
N
N
(xk(t) − xi(t))T Q (xk(t) − xi(t)) dt,
N
Pk=1R +∞
0
Pi=1
(2)
where Ku ∈ Rp×d and Kw ∈ Rd×d are gain matrices with KT
w = Kw ≥ 0, Ni denotes the
neighbor set of agent i and QT = Q > 0. Here, it is assumed that there exists an upper
bound γik of wik(t) (i, k ∈ {1, 2, · · · , N}), which can be determined by (2) and is related to the
state error between two neighboring agents and the unknown gain matrix Kw. Protocol (2)
has two new features. The first one is that wik(t) with wik(0) > 0 is adaptively regulated and
is nondecreasing since Kw is symmetric and positive semidefinite. If agent k is a neighbor
of agent i, then wik(t) is a practical interaction weight from agent k to agent i. Otherwise,
wik(t) can be regarded as a virtual interaction weight from agent k to agent i. The second
one is that the consensus performance of all agents instead of neighboring agents can be
regulated.
The definition of the leaderless adaptive guaranteed-performance consensualization is
given as follows.
Definition 1. Multiagent system (1) is said to be leaderless adaptively guaranteed-perfor-
mance consensualizable by protocol (2) if there exist Ku and Kw such that limt→+∞(xi(t)−
xk(t)) = 0 (i, k = 1, 2, · · · , N) and Jr ≤ J∗r for any bounded initial states xi(0) (i = 1, 2, · · · , N),
where J∗r is said to be the guaranteed-performance cost.
Remark 1. In protocol (2), Jr(t) denotes the consensus performance regulation term,
which can be realized by choosing a proper matrix Q. The jth diagonal element of Q
stands for the optimization weight of the jth component of the state error between agents
k and i and the other elements of Q represent the coupling relationships among the corre-
sponding components of the state error. Especially, for practical multiagent systems, the
matrix Q is usually chosen as a diagonal matrix. In this case, a bigger optimization weight
can guarantee the smaller squared sum of the associated component of the state error by
the controller design approaches, which are often based on the Riccati inequality. More
detailed explanations and theoretical analysis about the impacts of the parameters to the
control performance for isolated systems and multiagent systems can be found in [37] and
[46], respectively.
In the following, we design gain matrices Ku and Kw such that multiagent system
(1) achieves leaderless adaptive guaranteed-performance consensus, and determine the
guaranteed-performance cost J∗r . Furthermore, an approach to regulate the consensus con-
trol gain is proposed and the consensus motion is determined.
5
2.2. Adaptive guaranteed-performance consensus design for leaderless cases
N(t)iT
1 (t), xT
2 (t), · · · , xT
protocol (2) can be written in a compact form as
, then the dynamics of multiagent system (1) with
where Lw(t) is the Laplacian matrix of the interaction topology. Since the interaction topol-
Let x(t) = hxT
x(t) = (cid:0)IN ⊗ A − Lw(t) ⊗ BKu(cid:1) x(t),
ogy is connected, there exists an orthonormal matrix U = h1N. √N, ¯Ui such that
U T Lw(0)U = " 0
where ∆w(0) = ¯U T Lw(0) ¯U = diag{λ2, λ3, · · · , λN} with λ2 ≤ λ3 ≤ · · · ≤ λN being nonzero
eigenvalues of Lw(0). Let ¯x(t) = (cid:16)U T ⊗ Id(cid:17) x(t) = h ¯xT
3 (t), · · · ,
N(t)]T , then multiagent system (3) can be transformed into
¯xT
1 (t), ηT (t)iT
0T
0 ∆w(0) # ,
(3)
(4)
with η(t) = [ ¯xT
2 (t), ¯xT
¯x1(t) = A ¯x1(t),
(5)
η(t) = (cid:16)IN−1 ⊗ A − ¯U T Lw(t) ¯U ⊗ BKu(cid:17) η(t).
Let ei (i = 1, 2, · · · , N) denote N -dimensional column vectors with the ith element 1 and
0 elsewhere, then we define
(6)
x¯c(t)
∆
=
N
Xi=2
Uei ⊗ ¯xi(t),
xc(t)
∆
= Ue1 ⊗ ¯x1(t) =
1
√N
1N ⊗ ¯x1(t).
Due to
N
Xi=2
ei ⊗ ¯xi(t) = h0T , ηT (t)iT
,
it can be shown by (7) that
x¯c(t) = (U ⊗ Id)h0T , ηT (t)iT
From (8), one can see that
.
xc(t) = (U ⊗ Id)h ¯xT
1 (t), 0TiT
.
6
(7)
(8)
(9)
(10)
Because U⊗ Id is nonsingular, x¯c(t) and xc(t) are linearly independent by (9) and (10). Due
to (cid:16)U T ⊗ Id(cid:17) x(t) = h ¯xT
, one can obtain that x(t) = x¯c(t) + xc(t). By the structure
of xc(t) in (8), multiagent system (1) achieves consensus if and only if limt→+∞η(t) = 0;
that is, subsystems (5) and (6) describe the consensus motion and relative state motion of
multiagent system (1), respectively.
1 (t), ηT (t)iT
The following theorem presents a sufficient condition for leaderless adaptive guaranteed-
performance consensualization, which can realize completely distributed guaranteed-per-
formance consensus design; that is, the design approach of gain matrices in protocol (2) is
independent of the time-varying interaction topology and its eigenvalues.
Theorem 1. For any given translation factor γ > 0, multiagent system (1) is adaptively
guaranteed-performance consensualizable by protocol (2) if there exists a matrix PT =
P > 0 such that PA + AT P − γPBBT P + 2Q ≤ 0. In this case, Ku = BT P, Kw = PBBT P
and the guaranteed-performance cost satisfies that
1
N
1N1T
N! ⊗ P! x(0) + γZ +∞
0
J∗r = xT (0) IN −
Proof. First of all, we design Ku and Kw such that limt→+∞η(t) = 0. Construct the follow-
ing new Lyapunov function candidate
N! ⊗ PBBT P! x(t)dt.
xT (t) IN −
1N1T
1
N
V(t) = ηT (t) (IN−1 ⊗ P) η(t) +
N
Xi=1 Xk∈Ni
(wik(t) − wik(0))2
2
+
γ
2N
N
N
Xi=1
Xk=1,k,i
(γik − wik(t)).
Due to PT = P > 0 and γik ≥ wik(t), one has V(t) ≥ 0. Since it is assumed that the
interaction topology is undirected, one has Lw(t) = LT
w(t) . Let Ku = BT P, then the time
derivative of V(t) along the solution of subsystem (6) is
V(t) = ηT (t)(cid:16)IN−1 ⊗(cid:16)PA + AT P(cid:17) − 2 ¯U T Lw(t) ¯U ⊗ PBBT P(cid:17) η(t)
N
N
N
+
Xi=1 Xk∈Ni
(wik(t) − wik(0)) wik(t) −
γ
2N
Xi=1
Xk=1,k,i
wik(t).
(11)
Due to UU T = IN, one can show that ¯U ¯U T = LN, where LN is the Laplacian matrix of a
complete graph with the weights of all the edges 1/N. Thus, it can be obtained by (2) and
(4) that
N
Xi=1 Xk∈Ni
(wik(t) − wik(0)) wik(t) −
γ
2N
N
N
Xi=1
Xk=1,k,i
wik(t)
7
= xT (t)(cid:0)(cid:0)2Lw(t) − 2Lw(0) − γLN(cid:1) ⊗ Kw(cid:1) x(t)
= ηT (t)(cid:16)(cid:16)2 ¯U T Lw(t) ¯U − 2∆w(0) − γIN−1(cid:17) ⊗ Kw(cid:17) η(t).
Let Kw = PBBT P, then one can derive from (11) and (12) that
V(t) ≤
N
Xi=2
¯xT
i (t)(cid:16)PA + AT P − (2λi + γ) PBBT P(cid:17) ¯xi(t).
(12)
Due to γ > 0 and λi > 0 (i = 2, 3, · · · , N), one can obtain that if PA + AT P − γPBBT P < 0,
then
V(t) ≤ −ε
N
Xi=2
i (t) ¯xi(t) = −εkη(t)k2
¯xT
for some positive real constant ε. Therefore, η(t) converges to 0 asymptotically, which
means that multiagent system (1) achieves leaderless adaptive consensus.
In the following, we determine the guaranteed-performance cost. It can be shown that
N
N
Xk=1
(xk(t) − xi(t))T Q (xk(t) − xi(t)) = xT (t) (2NLN ⊗ Q) x(t).
Xi=1
Due to xT (t) (LN ⊗ I) x(t) = ηT (t)η(t), it can be derived that
xT (t) (LN ⊗ Q) x(t) ≤
N
Xi=2
¯xT
i (t)Q ¯xi(t).
Let h > 0, then one can obtain by (13) and (14) that
N
Xi=2 Z h
0
∆
=
Jh
r
1
N
N
Xi=1
N
Xk=1 Z h
0
(xk(t) − xi(t))T Q (xk(t) − xi(t)) dt ≤
Moreover, one can show that
0
V(t)dt − V(h) + V(0) = 0.
Z h
Due to limt→+∞ (wik(t) − γik) = 0, one has
N
N
Xi=1
Xk=1,k,i
lim
h→+∞
(γik − wik(h)) = 0.
8
(13)
(14)
2 ¯xT
i (t)Q ¯xi(t)dt.
(15)
(16)
(17)
If PA + AT P − γPBBT P + 2Q ≤ 0, then one can obtain from (15) to (17) that
lim
h→+∞
r ≤ ηT (0) (IN−1 ⊗ P) η(0) +
Jh
γ
2N
N
N
Xi=1
Xk=1,k,i
(γik − wik(0)).
Since η(t) = (cid:2)0(N−1)d×d, I(N−1)d(cid:3)(cid:16)U T ⊗ Id(cid:17) x(t) and ¯U ¯U T = LN, one has
ηT (0) (IN−1 ⊗ P) η(0) = xT (0) IN −
Due to limt→+∞ (wik(t) − γik) = 0, one can show that
Xi=1
wik(t)dt = 2NZ +∞
N! ⊗ P! x(0).
(γik − wik(0)) =
N
Xk=1,k,iZ +∞
0
Xk=1,k,i
1N1T
N
Xi=1
1
N
N
N
xT (t) (LN ⊗ Kw) x(t)dt.
0
(18)
(19)
(20)
From (18) to (20), the conclusion of Theorem 1 can be obtained.(cid:3)
In [46], it was shown that the Riccati equation PA+AT P−γPBBT P+2Q = 0 has a unique
and positive definite solution P for any given γ > 0 if (A, B) is stabilizable. Moreover, from
the proof of Theorem 1, we eliminate the impacts of the nonzero eigenvalues of Lw(0) by
introducing a positive constant γ to construct the term (2λi + γ) PBBT P (i = 2, 3, · · · , N).
Thus, γ can be regarded as the rightward translated quantity of the nonzero eigenvalues of
2Lw(0) and can be given previously.
Furthermore, a large γ may regulate the consensus control gain by Theorem 1, so we
can choose some proper γ and P to regulate the consensus control gain. We introduce a
gain factor δ > 0 such that P ≤ δI, where δ can also be regarded as an upper bound of the
eigenvalue of P. Thus, one can show that PBBT P ≤ δ2BBT if the maximum eigenvalue of
BBT is not larger than 1. Based on LMI techniques, by Schur complement lemma in [45],
an adaptive guaranteed-performance consensualization criterion with a given gain factor
is proposed as follows.
Corollary 1. For any given gain factor δ > 0, multiagent system (1) is leaderless adap-
tively guaranteed-performance consensualizable by protocol (2) if λmax(cid:16)BBT(cid:17) ≤ 1 and
there exist γ > 0 and PT = P ≥ δ−1I such that
Ξ = " A P + PAT − γBBT 2 PQ
−2Q # < 0.
In this case, Ku = BT P−1, Kw = P−1BBT P−1 and the guaranteed-performance cost satisfies
that
J∗r =
N
Xi=2
δk ¯xi(0)k2 + γδ2Z +∞
0
dt!.
(cid:13)(cid:13)(cid:13)
2
BT ¯xi(t)(cid:13)(cid:13)(cid:13)
9
In the following, we give an approach to determine the consensus motion. Due to
1 U T = 1T
eT
N. √N, one has
1 ⊗ Id(cid:17)(cid:16)U T ⊗ Id(cid:17) x(0) =
¯x1(0) = (cid:16)eT
1
√N
N
Xi=1
xi(0).
Because subsystem (5) describes the consensus motion of multiagent system (1), the fol-
lowing corollary can be obtained by (8).
Corollary 2. If multiagent system (1) achieves leaderless adaptive guaranteed-performance
consensus, then
lim
t→+∞
xi(t) − eAt
1
N
N
Xi=1
xi(0)
= 0 (i = 1, 2, · · · , N) .
Remark 2. In [39–42], guaranteed-performance consensus criteria are associated with
the Laplacian matrix of the interaction topology or its minimum and maximum nonzero
eigenvalues, which means that global information of the whole system is required es-
sentially and their approaches are not completely distributed. A novel dilation adaptive
consensus strategy was proposed to realize completely distributed consensus control in
[43] , where guaranteed-performance constraints were not considered and the dilation
factor is inversely proportional to the minimum nonzero eigenvalue. When guaranteed-
performance constraints are considered, the precise value of the dilation factor is required.
However, to obtain the precise value of the dilation factor, it is necessary to determine the
minimum nonzero eigenvalue. In Theorem 1, the translation-adaptive strategy is proposed
to deal with guaranteed-performance constraints without using information of the Lapla-
cian matrix. Actually, we realize the eigenvalue translation by the special property of the
Laplacian matrix of a complete graph; that is, all its eigenvalues are identical.
3. Leader-follower adaptive guaranteed-performance consensualization
This section focuses on leader-follower adaptive guaranteed-performance consensus,
where multiagent systems consist of a leader and N − 1 followers. Sufficient conditions
for leader-follower adaptive guaranteed-performance consensualization are presented on
the basis of the Ricatti inequality and LMIs, respectively, and the guaranteed-performance
cost is determined.
3.1. Problem description for leader-follower cases
Without loss of generality, we set that agent 1 is the leader and the other N − 1 agents
are followers. Thus, the dynamics of multiagent systems with the leader-follower structure
can be described by
10
xi(t) = Axi(t) + Bui(t),
( x1(t) = Ax1(t),
where i = 2, 3, · · · , N, A ∈ Rd×d, B ∈ Rd×p, x1(t) is the state of the leader, and xi(t) and ui(t)
are the state and the control input of the ith follower, respectively. The leader does not
receive any information from followers and there at least exists an undirected path from
the leader to each follower. Furthermore, it is assumed that the subgraph among followers
is undirected but can be unconnected.
(21)
A new consensus protocol is proposed to realize adaptive guaranteed-performance track-
ing as follows
ui(t) = li1wi1(t)Ku (x1(t) − xi(t)) + Ku Pk∈Ni,k,1
wi1(t) = (x1(t) − xi(t))T Kw (x1(t) − xi(t)) ,
Jl = J f l + J f f ,
(xk(t) − xi(t)),
(22)
where i = 2, 3, · · · , N, Ku ∈ Rp×d and Kw ∈ Rd×d are gain matrices with KT
w = Kw ≥ 0, Ni
denotes the neighbor set of agent i, l11 = 0, li1 = 1 if agent i can receive the information
of the leader and li1 ≡ 0 otherwise, li1wi1(t) with wi1(0) = 1 is the adaptively regulated
interaction strength from the leader to the ith follower, it is supposed that the upper bound
of wi1(t) is γi1, and for QT = Q > 0,
N
0
J f l =
J f f =
Xi=2 Z +∞
Xi=2
N − 1
1
N
li1(x1(t) − xi(t))T Q (x1(t) − xi(t)) dt,
Xk=2 Z +∞
(xk(t) − xi(t))T Q (xk(t) − xi(t)) dt.
N
0
From protocol (22), interaction strengths from the leader to followers are adaptively time-
varying, but interaction strengths among followers are time-invariant and are equal to 1.
Now, we give the definition of the leader-follower adaptive guaranteed-performance con-
sensualization as follows.
Definition 2. Multiagent system (21) is said to be leader-follower adaptively guaranteed-
performance consensualizable by protocol (22) if there exist Ku and Kw such that limt→+∞
(xi(t) − x1(t)) = 0 (i = 2, 3, · · · , N) and Jl ≤ J∗l for any bounded initial states xi(0)(i = 1, 2,
· · · , N), where J∗l is said to be the guaranteed-performance cost.
In the following, an approach is given to design gain matrices Ku and Kw such that
multiagent system (21) with protocol (22) achieves leader-follower adaptive guaranteed-
performance consensus and the guaranteed-performance cost J∗l is determined. Further-
more, it is revealed that the consensus control gain can be regulated by introducing a gain
factor.
11
3.2. Adaptive guaranteed-performance consensus design for leader-follower cases
2 (t), ξT
, then one can
N(t)iT
3 (t), · · · , ξT
obtain by (21) and (22) that
Let ξi(t) = xi(t)− x1(t) (i = 2, 3, · · · , N) and ξ(t) = hξT
ξ(t) = (cid:16)IN−1 ⊗ A −(cid:16)L f f + Λw(t), f l(cid:17) ⊗ BKu(cid:17) ξ(t),
where L f f is the Laplacian matrix of the interaction topology among followers and Λw(t), f l =
diag{l21w21(t), l31w31(t), · · · , lN1wN1(t)} denotes the interaction from the leader to followers.
If limt→+∞ξ(t) = 0, then multiagent (21) with protocol (22) achieves leader-follower con-
sensus. Let x(t) = hxT
, then the following theorem presents a leader-
follower adaptive guaranteed-performance consensualization criterion and determines the
guaranteed-performance cost.
2 (t), · · · , xT
N(t)iT
1 (t), xT
(23)
Theorem 2. For any given translation factor γl > 0, multiagent system (21) is leader-
follower adaptively guaranteed-performance consensualizable by protocol (22) if there
exists a matrix RT = R > 0 such that RA + AT R − γlRBBT R + 3Q ≤ 0. In this case,
Ku = BT R, Kw = RBBT R and the guaranteed-performance cost satisfies that
J∗l = xT (0) " N − 1 −1T
N−1
IN−1
−1N−1
#⊗R! x(0)+γlZ +∞
0
xT (t) " N − 1 −1T
N−1
IN−1
−1N−1
#⊗RBBT R! x(t)dt.
Proof. Construct a new Lyapunov function candidate as follows
V(t) = ξT (t) (IN−1 ⊗ R) ξ(t) +
N
Xi=2
li1(wi1(t) − wik(0))2 + γl
N
Xi=2
(γi1 − wi1(t)).
Due to RT = R > 0 and γi1 ≥ wi1(t)(i = 2, 3, · · · , N), one can obtain that V(t) ≥ 0. Let
Ku = BT R and Kw = RBBT R, then the derivative of V(t) with respect to time t can be given
by (23) as follows
V(t) = ξT (t)(cid:16)IN−1 ⊗(cid:16)RA + AT R(cid:17) − 2(cid:16)L f f + Λw(t), f l(cid:17) ⊗ RBBT R(cid:17) ξ(t)
N
N
+
Xi=2
2li1 (wi1(t) − wi1(0)) wi1(t) − γl
wi1(t).
Xi=2
By (22), then one can show that
N
Xi=2
wi1(t) = ξT (t)(cid:16)IN−1 ⊗ RBBT R(cid:17) ξ(t),
12
(24)
(25)
N
li1 (wi1(t) − wi1(0)) wi1(t) = ξT (t)(cid:16)Λw(t), f l − Λw(0), f l(cid:17) ξ(t).
Xi=2
Let ξ(t) = (cid:16) U ⊗ IN−1(cid:17) ξ(t), where U T (cid:16)L f f + Λw(0), f l(cid:17) U = diagn λ2, λ3, · · · λNo, then it can
be found from (24) to (26) that
(26)
V(t) ≤
N
Xi=2
ξT
i (t)(cid:16)RA + AT R − (2 λi + γl)RBBT R(cid:17) ξi(t).
Due to L f f + Λw(0), f l are positive, one has λi > 0 (i = 2, 3, · · · , N). Hence, if RA + AT R −
γlRBBT R < 0, then
N
V(t) ≤ −κ
Xi=2 (cid:13)(cid:13)(cid:13)
ξi(t)(cid:13)(cid:13)(cid:13)
2
= −κkξ(t)k2
for some κ > 0. Hence, ξ(t) converges to 0 asymptotically; that is, multiagent system (21)
with protocol (22) achieves leader-follower adaptive consensus.
In the following, the guaranteed-performance cost is determined. Since the interaction
topology among followers is undirected, it can be derived for h > 0 that
N
Xi=2
N
Xk=2 Z h
0
(xk(t) − xi(t))T Q (xk(t) − xi(t)) dt
Jh
f f
∆
=
1
N − 1
= Z h
0
ξT (t) (2LN−1 ⊗ Q) ξ(t)dt.
Furthermore, due to wi1(0) = 1, one can show that
li1(x1(t) − xi(t))T Q (x1(t) − xi(t)) dt
Jh
f l
N
0
∆
=
Xi=2 Z h
= Z h
0
ξT (t)(cid:16)Λw(0), f l ⊗ Q(cid:17) ξ(t)dt.
(27)
(28)
Since all the eigenvalues of the Laplacian matrix LN−1 of the completed graph with weights
N − 1 are 1, all the eigenvalues of 2LN−1 + Λw(0), f l are positive and less than 3, so it can be
derived by (27) and (28) that
Jh
l
∆
= Jh
f f + Jh
f l ≤ Z h
0
ξT (t) (3IN−1 ⊗ Q) ξ(t)dt.
13
(29)
Moreover, it can be shown that
V(t)dt − V(h) + V(0) = 0.
Z h
Due to limt→+∞ (wi1(t) − γi1) = 0 (i = 2, 3, · · · , N), one can show that
0
N
Xi=2
(γi1 − wi1(h)) = 0.
lim
h→+∞
If RA + AT R − γlRBBT R + 3Q ≤ 0, then it can be derived from (29) to (31) that
N
lim
h→+∞
Jh
l ≤ ξT (0) (IN−1 ⊗ R) ξ(0) + γl
Xi=2
(γi1 − wi1(0)).
It can be shown that
ξT (0) (IN−1 ⊗ R) ξ(0) = xT (0) " N − 1 −1T
N−1
−1N−1
IN−1
wi1(t)dt = Z +∞
xT (t) " N − 1 −1T
N−1
IN−1
From (32) to (34), the conclusion of Theorem 2 can be obtained.(cid:3)
# ⊗ R! x(0),
Xi=2 Z +∞
(γi1 − wi1(0)) =
−1N−1
N
N
Xi=2
0
0
# ⊗ Kw! x(t)dt.
(30)
(31)
(32)
(33)
(34)
If (A, B) is stabilizable, then RA + AT R − γlRBBT R + 3Q = 0 has a unique and positive
definite solution. Hence, it is not difficult to find that a necessary and sufficient condition
for leader-follower adaptive guaranteed-performance consensualizability is that (A, B) is
stabilizable. Furthermore, γl can be regarded as the rightward translated quantity of the
nonzero eigenvalues of 2(L f f + Λw(0), f l). Moreover, similar to the analysis of Corollary
1, the following corollary gives an approach to regulate the consensus control gain by
introducing a gain factor δl > 0 such that R ≤ δlI.
Corollary 3. For any given gain factor δl > 0, multiagent system (21) is leader-follower
adaptively guaranteed-performance consensualizable by protocol (22) if λmax(cid:16)BBT(cid:17) ≤ 1
and there exist γl > 0 and RT = R ≥ δ−1
Θ = " A R + RAT − γlBBT 3 RQ
−3Q # < 0.
l I such that
In this case, Ku = BT R−1, Kw = R−1BBT R−1 and the guaranteed-performance cost satisfies
that
J∗l =
N
Xi=2
δlkξi(0)k2 + γlδ2
l Z +∞
0
dt!.
(cid:13)(cid:13)(cid:13)
2
BT ξi(t)(cid:13)(cid:13)(cid:13)
14
In the above main results, the Riccati inequality method and the variable changing ap-
proach are used to determine gain matrices of consensus protocols. The variable changing
approach does not introduce any conservatism because it is an equivalent transformation.
However, the Riccati inequality method may bring in some conservatism due to the scala-
bility of the Lyapunov function. It was shown that the Riccati inequality method is exten-
sively used in optimization control and usually has less conservatism in [46]. Moreover,
there are two critical difficulties in obtaining Theorems 1 and 2. The first one is to design
a proper Lyapunov function which can translate the nonzero eigenvalues of the Laplacian
matrix of the interaction topology rightward. The second one is to construct the relation-
ship between the linear quadratic index and the Laplacian matrix of the interaction topol-
ogy, as shown in (13) and (14) for leaderless cases and (27) and (28) for leader-follower
cases.
Remark 3. According to the leader-follower structure feature, it is designed that interac-
tion strengths from the leader to followers are adaptively adjusted in protocol (22), but
interaction strengths among followers are fixed. For leaderless cases, it is required that in-
teraction strengths among all neighboring agents are adaptively time-varying as shown in
protocol (2). It can be found that fixed interaction weights among followers can simplify
the analysis and design of the whole system. Furthermore, it should be pointed that con-
sensus performance among no neighboring agents for both leaderless and leader-follower
cases can be adjusted by gain matrices given in Theorems 1 and 2, which reveals that mul-
tiagent systems can regulate global performance by local and indirect interactions. More-
over, compared with the guaranteed-performance cost in [39–42], both J∗r and J∗l involve
integral terms, which are introduced by adaptively time-varying interaction weights.
Remark 4. Both the guaranteed-performance cost J∗r and J∗l are associated with the initial
states of all agents, and the key differences between them are the structures of coupling ma-
trices. It can be found that the coupling matrix IN − N−11N1T
N in J∗r is the Laplacian matrix
of a complete graph with edge weights N−1, which means that the guaranteed-performance
cost J∗r is jointly determined by state errors of all agents. However, the coupling matrix
# in J∗l is the Laplacian matrix of a star graph with edge weights 1, where
" N − 1 −1T
N−1
−1N−1
IN−1
the leader is the central node and there do not exist interactions among followers. In this
case, the guaranteed-performance cost J∗l is decided by state errors between the leader and
all followers, but it is independent of state errors among followers. Actually, the two cou-
pling matrices intrinsically reflect the impacts of topology structures of multiagent systems
on the guaranteed-performance cost.
15
4. Numerical simulations
This section presents two numerical simulation examples to demonstrate theoretical re-
sults for both leaderless multiagent systems and leader-follower multiagent systems.
4.1. Numerical simulation for leaderless cases
6
5
1
4
2
3
Fig. 1: Interaction topology of the leaderless multiagent supporting system.
Ma et al.
[47] proposed the model of the multiagent supporting system which has
potential applications in earthquake damage-preventing buildings, water-floating plants
and large-diameter parabolic antennae, and gave a centralized control approach. Xi et
et al. [48] presented a distributed approach to control the multiagent supporting system,
where the dynamics of each agent with the self feedback matrix [−88.6792, 4.7642] can
be modeled as (1) with
A = "
1
0
1 # ,
−100 0 # , B = " 0
and the interaction topology of this leaderless multiagent supporting system is shown in
Fig. 1 with all edge weights equal to 1. Let
0 2 # ,
Q = " 1 0
then one can obtain from Theorem 1 that
2.1307 # ,
P = " 223.5978 3.9324
3.9324
Ku = [3.9324, 2.1307] ,
16
4.5399 # ,
Kw = " 15.4638 8.3788
8.3788
and the guaranteed-performance cost is J∗r = 1694.6.
)
t
(
1
x
2
1.5
1
0.5
0
−0.5
−1
−1.5
−2
0
10
5
0
−5
)
t
(
2
x
0.5
1
1.5
t / s
2
2.5
3
−10
0
0.5
1
2
2.5
3
1.5
t / s
Fig. 2: State trajectories of the leaderless multiagent supporting system.
250
200
150
100
50
0
0
0
0.5
0.5
1
1
J∗r
Jr
1.5
1.5
t / s
2500
2000
1500
1000
500
2
2
2.5
2.5
0
3
3
Fig. 3: Performance function of the leaderless multiagent supporting system.
Fig. 2 depicts the state trajectories of the leaderless multiagent supporting system, where
the trajectories marked by circles are the curves of the consensus function given in Corol-
lary 2 and the trajectories of states of six agents are represented by full curves. The tra-
jectory of the performance function Jh
r with h = 3 is shown in Fig. 3. One can see that
state trajectories of all agents converge to the ones marked by circles and the performance
function Jh
r < J∗r ; that is, this multiagent supporting
r converges to a finite value with Jh
17
system achieves leaderless adaptive guaranteed-performance consensus without using the
global information of the interaction topology. However, the distributed approach in [48]
required the precise value of the minimum eigenvalue of the interaction topology; that is,
the completely distributed control cannot be realized.
4.2. Numerical simulation for leader-follower cases
6
5
1
4
2
3
Fig. 4: Interaction topology of the leader-follower multiagent system.
Consider a leader-follower multiagent system with one leader and five followers, where
the interaction topology is shown in Fig. 4 with all edge weights equal to 1 and the dy-
namics of each agent is modeled by (21) with
1
1
−30 −12.5
0.5
0
16
0
0
0
30
0
0
1
−16 0
0.30 0.30 0.20 0.10
0.30 0.50 0.10 0.10
0.20 0.10 0.50 0.15
0.10 0.10 0.15 0.10
1
19
0
0
.
, B =
,
Let
A =
Q =
R =
then one can obtain by Theorem 2 that
7.7420 −0.1280 −6.0953 0.6304
0.0148
−0.1280
−6.0953
0.1259
0.7516
0.6304
0.1680
7.0299
0.1259
0.0404
0.1680
0.0148
,
18
Ku = [5.3100, 0.6396, − 2.9033, 0.9116] ,
28.1961
3.3963 −15.4165
−1.8570
3.3963
0.4091
8.4292
−15.4165 −1.8570
0.5831
4.8406
−2.6466
Kw =
and the guaranteed-performance cost is J∗l = 872.5.
4.8406
0.5831
−2.6466
0.8310
,
)
t
(
1
x
)
t
(
3
x
4
3
2
1
0
−1
−2
−3
−4
0
4
3
2
1
0
−1
−2
−3
−4
0
)
t
(
2
x
)
t
(
4
x
30
20
10
0
−10
−20
0
10
5
0
−5
−10
−15
0
0.5
1
1.5
t / s
2
2.5
3
0.5
1
1.5
t / s
2
2.5
3
0.5
1
1.5
t / s
2
2.5
3
0.5
1
1.5
t / s
2
2.5
3
Fig. 5: State trajectories of the leader-follower multiagent system.
The state trajectories of the leader-follower multiagent system are shown in Fig. 5,
where the trajectories marked by circles denote the states of the leader and the trajectories
of states of five followers are represented by full curves. In Fig. 6, the trajectory of the
performance function Jh
l with h = 3 is shown. It can be found that state trajectories of all
followers converge to the ones of the leader and the performance function Jh
l converges
to a finite value with Jh
l < J∗l , which means that this multiagent system achieves leader-
follower adaptive guaranteed-performance consensus without using the global information
19
1200
900
600
300
0
0
0.5
1
J∗l
Jl
1.5
t / s
2
2.5
3
Fig. 6: Performance function of the leader-follower multiagent system.
of the interaction topology. Moreover, it should be pointed out that the computational
complexity does not increase as the number of agents increases since the main results of
the current paper are completely distributed.
5. Conclusions
A new adaptive consensus scheme with a quadratic cost function was proposed to re-
alize the completely distributed guaranteed-performance consensus control. The adap-
tive guaranteed-performance consensualization criterion for the leaderless case was given
by regulating the interaction weights among all neighboring agents, and the adaptive
guaranteed-performance consensualization criterion for the leader-follower case was pre-
sented by regulating the interaction weights from the leader to its followers. Furthermore,
for leaderless and leader-follower multiagent systems, the regulation approaches of the
consensus control gain were proposed, respectively, which adjust control gains by choos-
ing the different translation factors. Moreover, explicit expressions of the guaranteed-
performance costs were given, where the coupling matrix associated with the leaderless
case is the Laplacian matrix of a complete graph and the coupling matrix associated with
the leader-follower case is the Laplacian matrix of a star graph with the leader being the
central node.
Furthermore, the future research directions can focus on two aspects. The first one is to
study the practical applications of multiagent systems combining main results in the cur-
rent paper with structure characteristics of practical multiagent systems, such as network
congestion control systems and single-link manipulator systems with a flexible joint, et al.
The other one is to investigate the impacts of directed topologies, time-varying delays and
given cost budgets on adaptive guaranteed-performance consensus of multiagent systems.
20
References
[1] Y. Ma & J. Zhao (2018). Distributed integral-based event-triggered scheme for co-
operative output regulation of switched multi-agent systems. Information Sciences,
doi: 10.1016/j.ins.2018.02.021.
[2] S. Zuo, Y. Song, F. L. Lewis, & A. Davoudi (2017). Output containment control
of linear heterogeneous multi-agent systems using internal model principle. IEEE
Transactions on Cybernetics, 47(8), 2099-2109.
[3] Z. Ji, & H. Yu (2017). A new perspective to graphical characterization of multi-agent
controllability. IEEE Transactions on Cybernetics, 47(6), 1471-1483.
[4] H. Du, G. Wen, Y. Cheng, Y. He, & R. Jia (2017). Distributed finite-time cooperative
control of multiple high-order nonholonomic mobile robots. IEEE Transactions on
Neural Networks and Learning Systems, 28(12), 2998-3006.
[5] X. Liu & Z. Ji (2017). Controllability of multi-agent systems based on path and cycle
graphs. International Journal of Robust and Nonlinear Control, 28(1), 296-309.
[6] H. Du & S. Li (2016). Attitude synchronization for flexible spacecraft with commu-
nication delays. IEEE Transactions on Automatic Control, 61(11), 3625-3630.
[7] Z. Zhang, G. Duan, & M. Hou (2018). An improved adaptive dynamic surface control
approach for uncertain nonlinear systems. International Journal of Adaptive Control
and Signal Processing, DOI: 10.1002/acs.2870.
[8] N. Cai, M. He, Q. Wu, & M. J. Khan (2018). On almost controllability of dynamical
complex networks with noises. Journal of Systems Science and Complexity, DOI:
10.1007/s11424-017-6273-7.
[9] H. Paggi, J.Soriano, & J. A. Lara (2018). A multi-agent system for minimizing infor-
mation indeterminacy within information fusion scenarios in peer-to-peer networks
with limited resources. Information Sciences, doi: 10.1016/j.ins.2018.04.019.
[10] D. Wang, Z. Wang, M. Chen, & W. Wang (2018). Distributed optimization for multi-
agent systems with constraints set and communication time-delay over a directed
graph. Information Sciences, 438, 1-14.
[11] C. Chen, Z. Liu, Y. Zhang, C. L. P. Chen, & S. Xie (2016). Saturated nussbaum
nunction based approach for robotic systems with unknown actuator dynamics. Au-
tomatica, 46(10), 2311-2322.
[12] X. Wu, K. Zhang, & M. Cheng (2017). Computational method for optimal control
of switched systems with input and state constraints. Nonlinear Analysis: Hybrid
Systems, 26, 1-18.
[13] S. Zuo, A. Davoudi, Y. Song, & F. L. Lewis (2016). Distributed finite-time voltage
and frequency restoration in islanded AC microgrids. IEEE Transactions on Indus-
trial Electronics, 63(10), 5988-5997.
21
[14] D. Wang, D. Wang, W. Wang, Y. Liu, & F. E. Alsaadi (2018). A modified dis-
tributed optimization method for both continuous-time and discrete-time multi-agent
systems. Neurocomputing, 275, 725-732.
[15] J. Xi, C. Wang, H. Liu, & Z. Wang (2018). Dynamic output feedback guaranteed-
cost synchronization for multiagent networks with given cost budgets. IEEE Access,
DOI: 10.1109/ACCESS.2018.2819989.
[16] B. Xu & F. Sun (2018). Composite intelligent learning control of strict-feedback
systems with disturbance. IEEE Transactions on Cybernetics, 48(2), 730-741.
[17] B. Xu, D. Wang, Y. Zhang, & Z. Shi (2017). DOB based neural control of flexible
hypersonic flight vehicle considering wind effects. IEEE Transactions on Industrial
Electronics, 64(11), 8676-8685.
[18] N. Cai, C. Diao, & M. J. Khan (2017). A new clustering method based on quasi-
consensus motions of dynamical multi-agent systems. Complexity, 4978613.
[19] R. Olfati-Saber, & R. M. Murray (2004). Consensus problems in networks of agents
with switching topology and time-delays. IEEE Transactions on Automatic Control,
49(9), 1520-1533.
[20] J. Xi, M. He, H. Liu, & J. Zheng (2016). Admissible output consensualization control
for singular multi-agent systems with time delays. Journal of the Franklin Institute,
353(16), 4074-4090.
[21] J. Lian & J. Wang (2015). Passivity of switched recurrent neural networks with time-
varying delays. IEEE Transactions on Neural Networks and Learning Systems, 26(2),
357-366.
[22] Y. Zheng, J. Ma, & L. Wang (2017). Consensus of hybrid multi-agent systems. IEEE
Transactions on Neural Networks and Learning Systems, DOI: 10.1109/TNNL-
S.2017.2651402.
[23] X. Lin & Y. Zheng (2017). Finite-time consensus of switched multiagent systems.
IEEE Transactions on Systems, Man, and Cybernetics: Systems, 47(7), 1535-1545.
[24] J. Xi, Z. Shi, & Y. Zhong (2012). Output consensus analysis and design for high-
order linear swarm systems: Partial stability method. Automatica, 48(9), 2335-2343.
[25] Z. Wu, Y. Xu, R. Lu, Y. Wu, & T. Huang (2018). Event-triggered control for consen-
sus of multi-agent systems with fixed/switching topologies. IEEE Transactions on
Systems, Man and Cybernetics: Systems, DOI: 10.1109/TSMC.2017.2744671.
[26] C. Chen, C. Wen, Z. Liu, K. Xie, Y. Zhang, & C. L. P. Chen (2017). Adaptive con-
sensus of nonlinear multi-agent systems with non-identical partially unknown control
directions and bounded modelling errors. IEEE Transactions on Automatic Control,
62(9), 4654-4659.
[27] Z. Wu, Y. Xu, Y. Pan, P. Shi, & Q. Wang (2018). Event-triggered pinning control for
consensus of multi-agent systems with quantized information. IEEE Transactions on
Systems, Man and Cybernetics: Systems, DOI: 10.1109/TSMC.2017.2773634.
22
[28] C. Chen, C. Wen, Z. Liu, K. Xie, Y. Zhang, & C. L. P. Chen (2017). Adaptive asymp-
totic control of multivariable systems based on a one-parameter estimation approach.
Automatica, 83, 124-132.
[29] Z. Wu, Y. Xu, Y. Pan, H. Su, & Y. Tang (2018). Event-triggered control for consen-
sus problem in multi-agent systems with quantized relative state measurement and
external disturbance. IEEE Transactions on Circuit and Systems I: Regular paper,
DOI: 10.1109/TCSI.2017.2777504.
[30] Z. Liu, X. Yu, Z. Guan, B. Hu, & C. Li (2017). Pulse-modulated intermittent con-
trol in consensus of multi-agent systems. IEEE on Systems, Man, and Cybernetics:
Systems, 47(5), 783-793.
[31] Z. Liu, Z. Guan, X. Shen, & G. Feng (2012). Consensus of multi-agent networks
with aperiodic sampled communication via impulsive algorithm using position-only
measurements. IEEE Transactions on Automatic Control, 57(10), 2639-2643.
[32] J. Xi, C. Wang, H. Liu, & L. Wang (2018). Completely distributed guaranteed-
performance consensualization for high-order multiagent systems with switching
topologies. IEEE Transactions on Systems, Man, and Cybernetics: Systems, In press.
[33] W. Liu & J. Huang (2017). Adaptive leader-following consensus for a class of higher-
order nonlinear multi-agent systems with directed switching networks. Automatica,
79, 84-92.
[34] B. Hu, Z. H. Guan, X. W. Jiang, M. Chi, & L. Yu (2016). On consensus perfor-
mance of nonlinear multi-agent systems with hybrid control. Journal of the Franklin
Institute, 353(13), 3133-3150.
[35] E. Semsar-Kazerooni & K. Khorasani (2009). An optimal cooperation in a team of
agents subject to partial information. International Journal of Control, 82(3), 571-
583.
[36] K. G. Vamvoudakis, F. L. Lewis, & G. R. Hudas (2012). Multi-agent differential
graphical games: Online adaptive learning solution for synchronization with opti-
mality. Automatica, 48(8), 1598-1611.
[37] Y. C. Cao & W. Ren (2010). Optimal linear-consensus algorithms: An LQR per-
spective. IEEE Transactions on Systems, Man, and Cybernetics-Part B: Cybernetics,
40(3), 819-829.
[38] Z. H. Guan, B. Hu, M. Chi, D. X. He, & X. M. Cheng (2014). Guaranteed perfor-
mance consensus in second-order multi-agent systems with hybrid impulsive control.
Automatica, 50(9), 2415-2418.
[39] J. Xi, Z. Fan, H. Liu, & T. Zheng (2018). Guaranteed-cost consensus for multiagent
networks with Lipschitz nonlinear dynamics and switching topologies. International
Journal of Robust and Nonlinear Control, 28(7), 2841-2852.
[40] X. Zhou, P. Shi, C. Lim, C. Yang, & W. Gui (2015). Event based guaranteed-cost con-
sensus for distributed multi-agent systems. Journal of the Franklin Institute, 352(9),
23
3546-3563.
[41] Y. Zhao & W. Zhang (2017). Guaranteed cost consensus protocol design for linear
multi-agent systems with sampled-data information: An input delay approach. ISA
Transactions, 67, 87-97.
[42] J. Xu, G. Zhang, J. Zeng, J. Xi, & B. Du (2017). Robust guaranteed cost consensus
for high-order discrete-time multi-agent systems with parameter uncertainties and
time-varying delays. IET Control Theory & Applications, 11(5), 647-667.
[43] Z. Li, G. Wen, Z. Duan, & W. Ren (2015). Designing fully distributed consensus
protocols for linear multi-agent systems with directed graphs. IEEE Transactions on
Automatic Control, 60(4), 1152-1157.
[44] C. Godsil & G. Royal (2001). Algebraic Graph Theory, New York: Springer-Verlag.
[45] S. Boyd, L. E. Ghaoui, E. Feron, & V. Balakrishnan (1994). Linear Matrix Inequali-
ties in System and Control Theory, SIAM, Philadelphia, PA.
[46] B. D. O. Anderson & J. B. Moore (1989). Optimal Control: Linear Quadratic Meth-
ods, Prentice-Hall International, Inc.
[47] S. Ma, S. Hackwood, & G. Beni (1994). Multi-agent supporting systems (MASS):
control with centralized estimator of disturbance. in Proceeding IEEE/RSJ Interna-
tional Conference Intelligent Robots and Systems, 679-686.
[48] J. Xi, N. Cai, & Y. Zhong (2010). Consensus problems for high-order linear time-
invariant swarm systems. Physica A: Statistical Mechanics and its Applications,
389(24): 5619-5627.
24
|
1709.09569 | 1 | 1709 | 2017-09-27T15:03:48 | Traffic Optimization For a Mixture of Self-interested and Compliant Agents | [
"cs.MA",
"cs.AI"
] | This paper focuses on two commonly used path assignment policies for agents traversing a congested network: self-interested routing, and system-optimum routing. In the self-interested routing policy each agent selects a path that optimizes its own utility, while the system-optimum routing agents are assigned paths with the goal of maximizing system performance. This paper considers a scenario where a centralized network manager wishes to optimize utilities over all agents, i.e., implement a system-optimum routing policy. In many real-life scenarios, however, the system manager is unable to influence the route assignment of all agents due to limited influence on route choice decisions. Motivated by such scenarios, a computationally tractable method is presented that computes the minimal amount of agents that the system manager needs to influence (compliant agents) in order to achieve system optimal performance. Moreover, this methodology can also determine whether a given set of compliant agents is sufficient to achieve system optimum and compute the optimal route assignment for the compliant agents to do so. Experimental results are presented showing that in several large-scale, realistic traffic networks optimal flow can be achieved with as low as 13% of the agent being compliant and up to 54%. | cs.MA | cs | Traffic Optimization For a Mixture of Self-interested and Compliant Agents
Guni Sharon1∗, Michael Albert2∗, Tarun Rambha3∗, Stephen Boyles1, Peter Stone1
1University of Texas at Austin
2Duke University
3Cornell University
[email protected], [email protected], [email protected], [email protected], [email protected]
7
1
0
2
p
e
S
7
2
]
A
M
.
s
c
[
1
v
9
6
5
9
0
.
9
0
7
1
:
v
i
X
r
a
Abstract
This paper focuses on two commonly used path assign-
ment policies for agents traversing a congested network: self-
interested routing, and system-optimum routing. In the self-
interested routing policy each agent selects a path that op-
timizes its own utility, while the system-optimum routing
agents are assigned paths with the goal of maximizing system
performance. This paper considers a scenario where a cen-
tralized network manager wishes to optimize utilities over all
agents, i.e., implement a system-optimum routing policy. In
many real-life scenarios, however, the system manager is un-
able to influence the route assignment of all agents due to lim-
ited influence on route choice decisions. Motivated by such
scenarios, a computationally tractable method is presented
that computes the minimal amount of agents that the sys-
tem manager needs to influence (compliant agents) in order to
achieve system optimal performance. Moreover, this method-
ology can also determine whether a given set of compliant
agents is sufficient to achieve system optimum and compute
the optimal route assignment for the compliant agents to do
so. Experimental results are presented showing that in sev-
eral large-scale, realistic traffic networks optimal flow can be
achieved with as low as 13% of the agent being compliant
and up to 54%.
Introduction
In multiagent systems, there are generally two paradigms of
interaction. Centralized control paradigms assume that a sin-
gle decision making entity is able to dictate the actions of all
the agents, thus leading them to a coordinated social opti-
mum. Decentralized control paradigms, on the other hand,
assume that each agent selects its own actions, and while it
is in principle possible for them to act altruistically, they are
generally assumed to be self-interested.
In this paper, we consider a routing scenario in which a
subset of agents are controlled centrally (compliant agents),
while the remaining are self-interested agents. We model
the system as a Stackelberg routing game (Yang, Zhang,
and Meng 2007) in which the decision maker for the cen-
trally controlled agents is the leader, and the self-interested
agents are the followers. In this paper, we provide a compu-
tationally tractable methodology for 1) determining whether
a given subset of centrally controlled agents are sufficient
∗These authors contributed equally.
to achieve system optimum (SO), 2) determining the maxi-
mum number of agent that may be self-interested such that
the centrally controlled agents can be deployed in order to
induce SO, and 3) computing the actions the leader should
prescribe to a sufficient set of compliant agents in order to
achieve SO.
It has been known for nearly a century in routing games
that agents seeking to minimize their private latency need
not minimize the total system's latency (Pigou 1920; Rough-
garden and Tardos 2002). That is, self-interested agents may
reach a user equilibrium (UE) that is not optimal from
a system perspective. However, if all agents are assigned
paths with minimum system marginal cost then the system
will achieve optimal performance (Pigou 1920; Beckmann,
McGuire, and Winsten 1956; Dietrich 1969).
Therefore, from a system manager perspective, it is de-
sirable that all agents traversing a network would strictly
utilize minimal marginal cost paths, even if the path is
not a minimum latency path for an individual agent. How-
ever, in many important scenarios, it will not be possible
to enforce path assignment on all agents, but it may be
possible to affect the behavior of a subset (the compliant
agents). As a motivating example, consider an opt-in tolling
system where drivers are given positive incentives to en-
roll but, in exchange, they will be subject to tolls that af-
fect their route choice (Sharon et al. 2017). Another rele-
vant example is virtual private network (VPN) path allo-
cation. While each packet within the VPN might be self-
interested, a pro-social network manager might allocate vir-
tual paths that are different from those preferred by the
self-interested packets (Fingerhut, Suri, and Turner 1997;
Duffield et al. 1999).
However, we show that, in the general case, computing the
optimal assignment of compliant agents is NP-hard. There-
fore, we focus on the specific scenario where the portion
of compliant agents is sufficiently large to achieve SO. We
present a novel linear program (LP ) representation for com-
puting the maximal portion of self-interested agents that al-
low the system to achieve SO and to determine whether a
given set of compliant agents is sufficient to achieve SO.
Furthermore, we provide a method to tractably compute the
flow assignment for the compliant agents such that SO per-
formance is guaranteed.
We demonstrate, using a standard traffic simulator over a
(cid:80)
fp = R(s, t).
paths of which e is a part. Define the system flow vector as
f = vect{fp}. f is said to be feasible if for all s, t ∈ V ,
p∈Ps,t
Each link e ∈ E has a latency function le(fe) which,
given a flow volume (fe), returns the latency (travel time)
on e. Following Roughgarden and Tardos (2002) we make
the following assumption:
Assumption 1. The latency function le(fe) is non-negative,
differentiable, and non-decreasing for each link e ∈ E.
defined as lp(f ) = (cid:80)
d
e∈p c(cid:48)
p(f ) = (cid:80)
The latency of a simple path p for a given flow f, is
e∈p le(fe). A feasible flow f is de-
fined as a user equilibrium (UE) if for every s, t ∈ V and
pa, pb ∈ Ps,t with fpa > 0 it holds that lpa (f ) ≤ lpb (f ) (see
Lemma 2.2 in (Roughgarden and Tardos 2002)). In other
words, at UE, no amount of flow can be rerouted to a path
with lower latency when the rest of the flow is fixed.
le(fe)fe, the cost of a path p as cp(f ) = (cid:80)
the cost of a flow f as c(f ) =(cid:80)
Define the system cost associated with link e as ce(fe) =
e∈p ce(fe) and
e∈E ce(fe). Define c(cid:48)
e(x) =
dx ce(x) and c(cid:48)
e(fe). A feasible flow f is
defined as a system optimum (SO) flow if for every s, t ∈ V
and pa, pb ∈ Ps,t with fpa > 0 it holds that c(cid:48)
pa (f ) ≤
c(cid:48)
(f ) (see Lemma 2.5 in (Roughgarden and Tardos 2002)).
pb
In other words, at SO, the benefit from reducing the flow
along any path is always less than or equal to the cost of
by adding the same amount of flow to a parallel, alternative
path. We follow Roughgarden and Tardos (2002), and make
the following assumption:
Assumption 2. The cost function ce(fe) is convex for each
link e ∈ E.
objective is to minimize c(f ) =(cid:80)
Assumptions 1 and 2 imply that the set of SO flows corre-
spond to the set of solutions of a convex program where the
e∈E ce(fe) (see Rough-
wide range of road networks, that the number of compliant
agents necessary to achieve system optimum is a relatively
small percentage of total flow (between 13% and 53%).
Motivation
Recent advances in GPS based tolling technology (Numrich,
Ruja, and Voss 2012) open the possibility of implementing
micro-tolling systems in which specific tolls are charged for
the use of every link within a road network. Setting tolls
appropriately can influence self-interested drivers to prefer
paths with minimum system marginal cost and thus, lead to
improved system performance (Sharon et al. 2017).
Unfortunately, political factors deter public officials from
allowing such a micro-tolling scheme to be realized. Road
pricing is known to cause a great deal of public unrest and is
thus opposed by governmental institutions (Schaller 2010).
To tackle this issue and avoid public unrest, it would be ben-
eficial to have an opt-in micro-tolling system where, given
some initial monetary sign-up incentive, drivers choose to
opt-in to the system and be charged for each journey they
take based on their chosen route. The vehicles belonging to
such drivers would need to be equipped with a GPS device as
well as a computerized navigation system. Given the toll val-
ues and driver's value of time, the navigation system would
suggest a minimal cost route where the cost is a function of
the travel time and tolls.
While addressing the issue of political acceptance, an
opt-in system would result in traffic that is composed of
a mixture of self-interested and compliant agents (compli-
ant in the sense that the system manager can influence their
route choice). Such a scenario raises some practical ques-
tions which are the focus of this paper, namely, what portion
of self-interested agents can the system tolerate while still
reaching optimum performance? The answer to this ques-
tion can help practitioners to determine both the level and
the targeting of incentives in an opt-in system.
garden and Tardos (2002) Corollary 2.7).
Problem definition and terminology
The terminology in this paper follows that of Roughgarden
and Tardos (2002). We review the relevant concepts and no-
tation in this section.
The flow model
The flow model in this work is composed of a directed graph
G(V, E), and a demand function R(s, t) → R+ mapping
a pair of vertices s, t ∈ V to a non-negative real number
representing the required amount of flow between source, s,
and target, t.1 An instance of the flow model is a {G, R}
pair.Ps,t denotes the set of acyclic paths from s to t. Define P
as the collection of all Ps,t (i.e., ∪s,t∈V Ps,t). The variable
fp represents the flow volume assigned to path p. Similarly,
fe is the flow volume assigned to link e. By definition, the
flow on each link (fe) equals the summation of flows on all
Problem Definition
The focus of this paper is a scenario where the demand is
partitioned into self-interested and compliant agents. We de-
fine two types of controllers that assign paths to all of the
agents. These controllers are viewed as players in a Stackel-
berg game (Yang, Zhang, and Meng 2007).
• SO-controller - Stackelberg leader, the SO-controller as-
pires to assign paths to the compliant subset of agents that,
taking into account the self-interested agents' reaction,
optimizes the systems performance (i.e. minimizes total
latency). SO-controller assigned flow will be referred to
as compliant flow.
• UE-controller - Stackelberg follower, considering the
compliant agents' path assignment as fixed, the UE-
controller assigns paths to the self-interested agents, the
UE flow, such that a state of user equilibrium (as defined
above) is achieved.2
1The demand between any source and target, R(s, t), can be
viewed as an infinitely divisible set of agents (also known as a non-
atomic flow (Rosenthal 1973)).
2The UE enforced by the UE-controller applies only for the
self-interested subset of agents. That is, no self-interested agent
can benefit from unilaterally deviating from its assigned path.
The problems addressed in this paper are:
1. Given an instance of the flow model {G, R}, what is the
maximum amount of self-interested agents that can be as-
signed to the UE controller and still permit the SO con-
troller to achieve system optimum?
2. Given a set of compliant agents and an instance of the
flow model {G, R}, can the SO controller assign paths to
them in such a way that the system achieves SO?
3. If SO is achievable, how should the SO-controller as-
sign the compliant flow? Equivalently, what is the optimal
Stackelberg equilibrium?
To the best of our knowledge, this work is the first to answer
these questions in a general setting.
Related Work
Previous work examined mixed equilibrium scenarios where
traffic is composed of: UE and Cournot-Nash (CN) con-
trollers. A CN-controller assigns flows to a given subset of
the demand with the aim of minimizing the total travel time
only for that subset. For instance, a logistic company with
many trucks can be viewed as a CN-controller.
It was shown that the equilibrium for a mixed UE, CN
scenario is unique and can be computed using a convex pro-
gram (Haurie and Marcotte 1985; Yang and Zhang 2008).
On the other hand, no tractable algorithm is known for com-
puting the optimal Stackelberg equilibrium for scenarios that
also include a SO-controller.
Korilis et. al. (1997) examined mixed equilibrium scenar-
ios that do include a SO-controller. In their work, a tech-
nique for computing the a solution for the above questions
#1 and #3 (see problem definition) was suggested for spe-
cific types of flow models. Their technique was proven to
work for networks with a common source and a common
target with any number of parallel links. Moreover, the la-
tency functions were assumed to be of a very specific form
(linear function with a capacity bound). As a result, their so-
lution is not applicable when general networks with arbitrary
latency functions are considered.
Other work (Roughgarden 2004; Immorlica et al. 2009)
studied a variant of the scheduling problem where infinites-
imal jobs must be assigned to a set of shared machines
each of which is affiliated with a non-negative, differen-
tiable, and non-decreasing latency function that, given the
machine load, specify the amount of time needed to com-
plete a job. When considering a scenario where part of the
jobs are assigned to machines by a UE-controller while the
rest are assigned by a SO-controller, they show it is NP-hard
to compute the optimal Stackelberg equilibrium (Roughgar-
den 2004). Their problem can be viewed as a special case of
our problem, specifically a network with a single source and
target with multiple parallel links between them. Given that
in this more restrictive setting computing the optimal Stack-
elberg equilibrium is intractable, the general question in our
setting will also be computationally intractable.
Computing the Maximal UE Flow
We define r∗
Given that finding the optimal Stackelberg equilibrium is
NP-hard for an arbitrary number of compliant agents, this
work focuses on scenarios where the number of compliant
agents is sufficient to achieve SO. As we will show, finding
the optimal Stackelberg equilibrium can be done in polyno-
mial time for such cases. In this section, we will present a
computationally tractable method to compute the maximal
UE flow given an instance of a flow model {G, R}, and we
will provide a method to check, for a given level of compli-
ant flow, whether SO is achievable.
s,t r∗
s,t.
UE as the maximal amount of demand com-
prised of self-interested agents that the system can toler-
ate and still achieve SO. Additionally, we define r∗
s,t as the
amount of demand from source s to target t that is assigned
to the UE-controller. That is, computing r∗
UE is equivalent
to maximizing(cid:80)
We can cast the problem of maximizing(cid:80)
s,t as an
optimization problem, specifically a linear program (LP ).
Assigning values to all variables of type r∗
s,t must follow
some constraints. Specifically, the flow from each origin
to each destination must be both a subflow of some SO
flow, and it must be an acceptable path for all self-interested
agents in the flow, given the compliant flow.
Definition 1 (Subflow of flow f). For a directed graph
G(V, E) and demand function R, a flow f∗ is a subflow of
flow f if for all links e ∈ E, 0 ≤ f∗
e ≤ fe and for each pair
of nodes s, t ∈ V , there exists 0 ≤ rs,t ≤ R(s, t) such that
s,t r∗
(cid:88)
(cid:88)
e∈out(s)
f∗
e − (cid:88)
e − (cid:88)
e∈in(s)
e∈out(t)
f∗
e∈in(t)
(cid:88)
(cid:88)
t
s
f∗
e =
rs,t
f∗
e =
rs,t.
and
A path will only be acceptable for a self-interested agent if
it is the lowest latency path from the origin to the destination
given the compliant flow, and in order for the path to be part
of a valid SO flow, it must be a minimum marginal cost path.
Therefore, a path p, leading from vertex s to vertex t, will
be said to be zero reduced cost if there is no other path, p(cid:48),
leading from s to t with lower latency or lower marginal
cost.
Definition 2 (Zero reduced cost path). For a flow model
{G, R}, a zero reduced cost path with regard to flow assign-
ment f is a path p ∈ Ps,t such that ∀ p(cid:48) ∈ Ps,t : lp(f ) ≤
lp(cid:48)(f ) and c(cid:48)
p(cid:48)(f ). A link, e, is defined as a zero
reduced cost link with respect to source s if it is part of any
zero reduced cost path originating from s and terminating
at t for some origin-destination pair (s, t) ∈ V 2. We denote
the set of zero reduced cost links with respect to source s as
Es
RC
We require that the UE flow (flow routed by the UE-
controller) is routed solely via zero reduced cost links/paths.
This is because the UE controller can only assign flow
to minimal latency paths (otherwise self-interested agents
would deviate). However, the need to constrain UE flow to
p(f ) ≤ c(cid:48)
links/paths with minimal marginal cost (c(cid:48)) is less intuitive;
this constraint will be justified later on. Note that it is suf-
ficient to only consider whether or not a link e is part of a
reduced cost path from the origin s to some destination t (not
a specific t) because either link e is along a reduced cost path
from (s, t), or there is no path only along links in Es
RC that
includes e. Moreover, we can efficiently compute the set of
zero reduced cost links for any origin destination pair (s, t)
by applying uniform cost search from s to t and marking all
links that are part of optimal paths, once with regard to mini-
mal total latency (arg minp∈Ps,t (lp(f SO)), and second with
regard to minimal marginal cost (arg minp∈Ps,t (c(cid:48)
p(f SO)).
Let the constant f SO denote the flow vector at a SO so-
lution.3 The SO flow is not unique when latency functions
are non-decreasing, and the maximal amount of UE flow
permitted may, in general, depend on the specific SO flow.
Therefore, we must efficiently search over the space of SO
flows. This is possible due to the following lemmas.
Lemma 1. For any two flows that achieve SO, f SO and
f SO, le(f SO
) = le( f SO
).
e
e
e
(cid:54)= f SO
Proof. Given Assumption 2, a SO flow is the solution to a
convex program (Roughgarden and Tardos 2002). The so-
lutions to a convex program form a convex set. Suppose
that there are two flows that both achieve SO, but for which
. Then ce(fe) = le(fe)fe must be a linear func-
f SO
e
(to see this, note that any con-
tion between f SO
vex combination of f SO and f SO is also an SO solution,
but if ce(fe) is not linear, then the total system travel time
would be strictly less, a contradiction). Since le(fe) is a non-
decreasing function, the only way for ce(fe) to be linear is
for le(fe) to be constant between f SO
and f SO
and f SO
.
e
e
e
e
Lemma 2. The set of zero reduced cost paths is identical for
all SO solutions.
Proof. By Lemma 1, all SO flows have the same latency on
each link, so the SO solutions can differ by at most flows
along a set of links with constant latency over the range of
which the two flows differ on those links. Since we assume
that the latency functions are differentiable, the derivatives
of the latency function are zero over the range at which they
are constant. Therefore, c(cid:48)
e(fe) is con-
stant over the range as well. This implies that any path that
is reduced cost in one flow is also reduced cost in the other
flow, since the latency functions and c(cid:48)
e(fe) are constant for
every link e.
e(fe) = le(fe) + fel(cid:48)
e
Define the constant ¯f SO
e = sup{f : le(f ) = le(f SO
)},
i.e. ¯f SO
is the largest flow value such that the latency on link
e is equal to the latency at an SO solution. Note that if le is
strictly increasing at f SO
. However, if le
is constant at f SO
, then ¯f SO
e > f SO
e = f SO
e
Given that the zero reduced cost paths are the same for
all SO flows (Lemma 2), and any SO flow has the same
, then ¯f SO
.
e
e
e
e
3A SO flow can be efficiently computed as a solution to a con-
vex program (Roughgarden and Tardos 2002; Dial 2006).
e
For each vertex, s, and link, e, define variable xs
latency on all links (Lemma 1), it will be sufficient to only
on each link e ∈ E.
search over flows that are less than ¯f SO
e denoting
the amount of UE flow originating from source s that is as-
signed to link e. Let in(v) denote the set of links for which
v is the tail vertex and out(v) the set of links for which v is
the head vertex.
Definition 3. For a given flow model {G, R}, the UE linear
program is:
(cid:88)
s,t∈V
r∗
s,t
∀ s, t ∈ V
∀ s ∈ V
e = r∗
xs
s,v ∀ s, t ∈ V
max
r∗
s,t,xs
e
r∗
s,t
t∈V
e∈out(s)
(cid:88)
e − (cid:88)
subject to
(cid:88)
s,t ≤ R(s, t)
r∗
(cid:88)
xs
e =
(cid:88)
s
e ≥ 0, r∗
xs
xs
e = 0
e ≤ ¯f SO
xs
s,t ≥ 0
e∈in(t)
xs
e
e∈out(t)
e = (cid:80)
(1)
(2)
(3)
(4)
(5)
(6)
∀ e ∈ E, s ∈ V
∀ s, t ∈ V, e ∈ E
∀ s ∈ V, e ∈ E \ Es
RC
(7)
v xv
The flow f UE
e defined by a feasible solution to
the UE linear program (given constraints (2)-(7)) is a UE
subflow. The flow defined by an optimal solution to the UE
linear program is an optimal UE subflow.
Note that the number of variables is {∀s ∈ V, ∀t ∈
e} = O(V 2 +V E), and the number
V, ∀e ∈ E : r∗
of constraints is also O(V 2 +V E). Therefore, since the
number of variables and constraints are polynomial in the
flow model, the optimal solution to the UE linear program
can be computed in polynomial time (Karmarkar 1984).
s,t, xs
Revisiting the definition of a zero reduced cost path/link
(Definition 2), the need to constrain UE flow to minimal
marginal cost paths (in addition to minimal latency paths)
is explained by the fact that, at SO, the UE flow must be a
subflow of f SO. Consider the problem instance depicted in
Figure 1. The latency function, flow at SO, travel time at SO,
and marginal cost at SO are all listed above each link. The
double line links have zero travel time regardless of the vol-
ume, their only purpose is to limit the possible path assign-
ment between vertices 2 and 4. Notice that, for flow traveling
from vertex 2 to 4, the dotted path is of minimal latency but
not minimal marginal cost. Running the above LP on this
instance would result in r∗
rect value. However, if the dotted path is considered to be of
zero reduced cost with respect to source 2 (despite having
a non minimal marginal cost) then running the LP would
result in r∗
Theorem 1. A UE subflow, f UE, defined by a feasible solu-
tion to the UE linear program is a subflow of a SO flow.
UE = 2 ·(cid:112)2/3 which is the cor-
UE = 1 + 2 ·(cid:112)2/3.
constructed an SO flow, f, for which for all links e ∈ E,
e ≤ fe, a contradiction.
f UE
Lemma 3. For a network {G, R}, let f∗ be a subflow of a
feasible flow f. Then the flow f(cid:48) such that f(cid:48)
e is
also a subflow of f.
Proof. First, 0 ≤ f(cid:48)
flow. Now set r(cid:48)
e∈out(s) f(cid:48)
e ≤ fe, by the definition of a sub-
s,t. Then for all s, t ∈
e∈in(s) f(cid:48)
s,t) =
V , (cid:80)
(cid:80)
s,t, and similarly for(cid:80)
t r(cid:48)
s,t = R(s, t) − r∗
e∈in(t) f(cid:48)
e = (cid:80)
e −(cid:80)
t(R(s, t) − r∗
e∈out(t) f(cid:48)
e −(cid:80)
e = fe − f∗
e
Theorem 2. The optimal value of the UE linear program
for a network instance {G, R} is the maximum amount of
UE agents that the network can support and achieve SO.
Proof. First, by Theorem 1, there exists an SO flow such
that the optimal UE subflow, f UE, is a subflow of the SO
flow, and by Lemma 3, there exists a subflow of compliant
agents that can achieve the SO solution. Moreover, by the
definition of the UE linear program and Lemma 2, the UE
flow is only along zero reduced cost paths. By the definition
of zero reduced cost paths, all UE agents are willing to take
the assigned paths. Therefore, the SO solution is achievable
with the UE flow, and there is some volume of UE flow that
is equal to the objective of the UE linear program.
Now, suppose that there was another UE flow assignment,
f(cid:48), for which compliant flow could be assigned in such a
way that the SO total system travel time was achieved and
the total UE flow volume was larger than the value returned
by the UE linear program. Note that this flow assignment
(f(cid:48)) must be a subflow of some SO flow, f. Moreover, by
the definition of UE flow and the fact that all paths in a SO
solution are minimum marginal cost paths, all paths assigned
with a UE flow greater than zero must be a zero reduced
cost path. Therefore, the flow f(cid:48) satisfies the equations (2)-
(6), and since the UE linear program returns the optimal UE
flow assignment, this is a contradiction.
While we've demonstrated that we can compute the maxi-
mal UE flow that permits an SO solution given the appropri-
ate assignment of the compliant flow, it is likely that a more
common problem would be to determine, for a given set of
compliant agents, whether or not it is possible to achieve SO
with that set. Our methodology also provides an answer to
this question, as the following Corollary demonstrates.
Corollary 1. For a given network instance {G, R} and
given a set of compliant demand, rC
s,t, from each origin des-
tination pair s, t ∈ V , there exists a compliant flow f C such
that the network achieves SO if and only if there exists an
e for all s ∈ V and e ∈ E such that rUE
s,t = R(s, t) − rC
xs
s,t
and xs
e are a solution to the UE linear program.
Proof. By Theorem 1, any solution to the UE linear pro-
gram defines a subflow of an SO flow. Therefore, if rU E
s,t
and xs
e is a solution, there exists an assignment of the com-
pliant flow that achieves SO.
Moreover, if there exists an assignment of the com-
plaint flow, f C, such that a UE subflow with demands rU E
s,t
achieves system optimum, then the UE flow is only along
Figure 1: A problem instance where the minimal marginal
cost condition is required. R(1, 3) = R(3, 5) = 1 +
(cid:112)2/3, R(2, 4) = 1. Above each link are listed (in top to
down order): v, the flow at SO (in green), t, the travel time
at SO (in blue), c(cid:48), the marginal cost at SO (in red), and
l(x), the latency function (in a bounding box).
e
Proof. First, note that by equations (2)–(4), the subflow UE
subflow, f UE
, satisfies flow conservation constraints. Equa-
tion (2) states that the flow along all reduced cost paths from
origin s to destination t must be less then total demand for
(s, t). Then equations (3) and (4) state that the flow out of
node v must either be due to the demand generated by node
v or the flow into it, minus the flow that reaches v as a desti-
nation. Therefore, f UE
is a subflow of a feasible flow.
e
e > f SO
e
e ≤ f SO
What must be shown is that there must exist a SO flow,
for all e. If e is such that le
f SO, such that f UE
is strictly increasing at an SO solution, and therefore will
be strictly increasing at all SO solutions by Lemma 1, then
and constraint (5) guarantees the claim. Let E(cid:48)
e = ¯f SO
f SO
be the set of links such that the latency function is constant
at a SO flow. Therefore, it only needs to be shown that there
e ≤ f SO
exists a SO solution, f, such that for e ∈ E(cid:48), f UE
.
Suppose that there existed a set of links e ∈ E(cid:48) such
. Let f SO be an
that for all SO flows f SO, f UE
SO flow. Then there must exist an origin destination pair
(s, t) such that there are two sets of paths P>,P< ⊂ Ps,t
for which for all p ∈ P>, f UE
, and for all
p(cid:48) ∈ P<, f UE
and all paths only differ by links
in E(cid:48). This is because the total flow between any origin-
destination is larger in the SO flow by equation (2). More-
) since
the flow along non-constant latency links constrains the total
) units of flow from paths in
set P> to paths in set P< in the SO flow f SO. Denote the
new flow by f(cid:48). The total travel time for f(cid:48) cannot increase
because the flow has only increased on constant latency
links, and the new flow does not exceed ¯f SO
on any link.
The total travel time also cannot have decreased because
f SO was an SO flow, so f(cid:48) is also an SO flow. Continue
this procedure until there does not exist a link e ∈ E(cid:48) for
which f UE
exceeds the transformed SO flow. Then we have
over,(cid:80)
flow. Move(cid:80)
) ≤(cid:80)
p − f SO
(f UE
p − f UE
( f SO
p − f SO
(f UE
p(cid:48) < f SO
p(cid:48)
> f SO
p
p
p∈P>
p
p
p∈P>
p
p(cid:48)∈P<
e
e
e
e
e
Figure 2: Three representative network topologies: I - Sioux Falls, SD, II - Eastern Massachusetts (Ellipsoids represent different
zones), III - Anaheim, CA.
zero reduced cost paths by definition of UE flow and SO,
and the UE subflow is feasible. Therefore, the decomposed
UE flow satisfies the constraints of the linear program.
Flow Assignment for Compliant Agents
Given that we can now determine both the maximal amount
of UE flow that a system can tolerate and achieve system
optimum and, for a given set of compliant agents, whether
or not a system can achieve optimum, we are only left with
assigning the compliant flow to paths. This section tackles
the question of how to assign paths to a, sufficiently large,
set of compliant agents such that SO is achieved.
The methodology from the previous section immediately
suggests a solution. Given a network instance {G, R}, sup-
s,t for all
pose that we have compliant demand equal to rC
s, t ∈ V . Then we must find a SO flow, f SO, such that rC
s,t
s,t permit subflows of the SO solution.
and rUE
Such a SO flow must exist by Theorem 1 and Corollary 1.
The first step is to compute the UE subflow, f UE, given
UE demand. From the previous section: this exists and is
computationally tractable. Any feasible subflow, f C, with
s,t such that the total flow along link e satisfies
demand rC
e ≤ ¯fe
SO has latency equal to the SO solution,
f C
e + f UE
and the flow f C
, by Lemma 1, is an SO solution.
We can compute f C with the following linear program:
s,t = R(s, t)−rC
e + f UE
e
subject to(cid:88)
(cid:88)
e∈out(v)
f C
e − (cid:88)
e − (cid:88)
f C
e∈in(v)
e∈in(v)
0 ≤ f C
e∈out(v)
e − f UE
e
e ≤ ¯f SO
max
f C
e
f C
e =
1
(cid:88)
(cid:88)
t
s
(rC
v,t)
f C
e =
(rC
s,v)
∀ v ∈ V
∀ v ∈ V
∀ e ∈ E
We know that a solution to the above linear program exists
and it can be computed tractably.
The final step is to decompose the compliant flow, f C,
into a per path assignment for each origin-destination pair
(s, t) in order to assign individual agents to a path. This can
be done in time O(V E) using standard flow decomposi-
tion algorithms (see Section 3.5 of Ahuja, Magnanti, et. al.
(1993) for a discussion).
Experimental Results
We are interested in the viability of opt-in micro-tolling
schemes to more efficiently utilize road networks. As such,
we haven undertaken an empirical study to investigate the
minimal amount of compliant flow required for SO (r∗
UE) in
six realistic traffic scenarios over actual road networks.
Scenarios
Each traffic scenario is defined by the following attributes:
1. The road network, G(V, E), specifying the set of vertices
and links where each link is affiliated with a length, ca-
pacity and speed limit. Networks are, following standard
practice, partitioned into traffic analysis zones (TAZs) and
each zone contains a node belonging to V called the cen-
troid. All traffic originating and terminating within the
zone is assumed to enter and leave the network at cen-
troids.
2. A trip table which specifies the traffic demand between
pairs of centroids. The demand function R between nodes
other than centroids is set to zero.
The following benchmark scenarios were chosen both
for their diversity of topology and traffic volume and
their widespread use within the traffic literature: Sioux
Falls, Eastern Massachusetts, Anaheim, Chicago Sketch,
Philadelphia, and Chicago-regional. All traffic scenarios
are available at: https://github.com/bstabler/
Scenario
Sioux Falls
Eastern MA
Anaheim
Chicago S
Philadelphia
Chicago R
Vertices
24
74
416
933
13389
12982
Links
76
258
914
2950
40003
39018
Zones
24
74
38
387
1525
1790
Total Flow
360,600
65,576
104,694
1,260,907
18,503,872
1,360,427
UE TTT
7,480,225
28,181
1,419,913
18,377,329
335,647,106
33,656,964
SO TTT
7,194,256
27,323
1,395,015
17,953,267
324,268,465
31,942,956
% Improve
3.82
3.04
1.75
2.31
3.39
5.09
Threshold % compliant
13.04
6.19E-11
19.73
3.04E-13
19.76
8.05E-11
27.29
9.14E-10
49.59
4.20E-09
53.34
4.14E-07
Table 1: Required fraction of compliant agents given as "% compliant" for different scenarios along with network specifications
for each scenario: number of vertices, links and zones followed by the Total Travel Time (TTT) at UE (0% compliant agents)
and SO (100% compliant agents). The percentage of improvement of the SO TTT over the UE TTT is given as "% improve".
TransportationNetworks. Figure 2 depicts three
representative network topologies (the three smallest net-
works).
The Traffic Model
A macroscopic model was used in order to evaluate traffic
formation. Macroscopic models calculate the UE in a given
scenario using algorithm B (Dial 2006). For all scenarios,
the model assumed that travel times follow the Bureau of
Public Roads (BPR) function (Moses and Mtoi 2017) with
the commonly used parameters β = 4, α = 0.15. The SO
solution is computed by replacing the latency functions with
c(cid:48)
e(x) and using algorithm B to obtain the equilibrium solu-
tion (Dial 1999). Since solving for the UE and SO solutions
requires solving a convex program (Dial 2006), we only
solve them to a certain precision. To measure convergence,
given an assignment of agents to paths, we define the av-
erage excess cost (AEC) as the average difference between
the travel times on paths taken by the agents and their short-
est alternative path. The algorithm terminates when the AEC
is less than 1E-12 minutes (except for Chicago-regional for
which 1E-10 was used due to the size of the network). There-
fore, a minimum marginal cost path is only a minimum up
to a threshold.
A link e is defined to be zero reduced cost with respect to
s if it carries flow originating at s in the SO solution (i.e.,
the link belongs to a minimum marginal cost path) and if the
difference between the least latency path that include e and
the least latency unrestricted path, both leading from s to the
head vertex of e, is less than a threshold T .
The threshold T is defined as follows. for each origin s
and link e we calculate the least marginal cost path (c(cid:48)) lead-
ing from s to the head vertex of e at the SO solution. We
do this once while restricting the path to include e and once
without such restriction. The difference between these two
values is stored and T is set to be the maximum of these
difference across all the links and origins in the network.
Results
Table 1 presents the percentage of flow that must be com-
pliant in order to guarantee an SO solution for six different
traffic scenarios. Each scenario is affiliated with the number
of vertices, links, and zones comprising the affiliated road
network as well as the number of trips that make up the af-
filiated demand.
The columns "UE TTT" and "SO TTT" represent the to-
tal travel time (in minutes) over all agents for the case where
100% of the agents are controlled by the UE controller (UE
solution) and when 100% of the agents are controlled by the
SO controller (SO solution) respectively. The percentage of
improvement in total travel time between UE TTT and SO
TTT is also shown under "% improve".
The percentage of required compliant flow (formally
r∗
s,t R(s, t)) as computed by the UE
linear program (Definition 3) is presented for each scenario
under "% compliant".4
UE/R where R =(cid:80)
The results suggest that as the size of the network (i.e.,
the number of nodes and vertices) increases, a greater frac-
tion of compliant travelers are needed to ensure the network
achieves system optimum. This appears to be due to an in-
creasing number of used paths at the SO solution as the net-
work size increases. As the number of paths grow, the set of
zero reduced cost paths grows more slowly, and, therefore, a
higher percentage of compliant agents is required.
Summary
This paper discussed a scenario where a set of agents tra-
verse a congested network, and a centralized network man-
ager optimizes the flow (minimizes total latency) using a
set of compliant agents. A methodology was presented for
computing the minimal volume of traffic flow that needs
to be compliant in order to reach a state of optimal traffic
flow. Moreover, the methodology extends to inferring which
agents should be compliant and how exactly the compli-
ant agents should be assigned to paths. Experimental results
demonstrate that the required percentage of agents that are
compliant is relatively small (between 13% and 53%) for
several realistic road networks.
Going forward, it would be worthwhile to explore the pos-
sibility of approximation algorithms for assigning compliant
flow when the UE demand is too large to achieve system
optimum. Given that the optimal solution to this problem is
known to be NP-hard, an efficient approximation algorithm
would be a useful tool as opt-in network routing systems are
implemented. Further, in order to limit the necessary opt-in
incentives, there is work needed to develop systems that tar-
get particularly influential users to opt-in to these systems.
Acknowledgements
The authors would like to thank Josiah Hanna and Michael
Levin for contributing useful comments and discussions in
4Statistical analysis for Table 1 is not presented, as the macro-
scopic model is deterministic.
[Moses and Mtoi 2017] Moses, R., and Mtoi, E. T. 2017.
Calibration and evaluation of link congestion functions.
Journal of Transportation Technologies 4(2).
[Numrich, Ruja, and Voss 2012] Numrich, J.; Ruja, S.; and
Voss, S. 2012. Global navigation satellite system based
tolling: state-of-the-art. NETNOMICS: Economic Research
and Electronic Networking 13(2):93.
[Pigou 1920] Pigou, A. C. 1920. The Economics of Welfare.
Palgrave Macmillan.
[Rosenthal 1973] Rosenthal, R. W. 1973. A class of games
International
possessing pure-strategy Nash equilibria.
Journal of Game Theory 2(1):65–67.
[Roughgarden and Tardos 2002] Roughgarden, T., and Tar-
dos, ´E. 2002. How bad is selfish routing? Journal of the
ACM (JACM) 49(2):236–259.
[Roughgarden 2004] Roughgarden, T.
Stackel-
berg scheduling strategies. SIAM Journal on Computing
33(2):332–350.
[Schaller 2010] Schaller, B. 2010. New York Citys conges-
tion pricing experience and implications for road pricing ac-
ceptance in the United States. Transport Policy 17(4):266–
273.
[Sharon et al. 2017] Sharon, G.; Hanna, J. P.; Levin, M. W.;
Rambha, T.; Albert, M.; Boyles, S. D.; and Stone, P. 2017.
Real-time adaptive tolling scheme for optimized social wel-
In Proceedings of the 16th Inter-
fare in traffic networks.
national Conference on Autonomous Agents and Multiagent
Systems (AAMAS-17).
[Yang and Zhang 2008] Yang, H., and Zhang, X. 2008. Ex-
istence of anonymous link tolls for system optimum on net-
works with mixed equilibrium behaviors. Transportation
Research Part B: Methodological 42(2):99–112.
[Yang, Zhang, and Meng 2007] Yang, H.; Zhang, X.; and
Meng, Q. 2007. Stackelberg games and multiple equilib-
rium behaviors on networks. Transportation Research Part
B: Methodological 41(8):841–861.
2004.
the course of this research.
A portion of this work has taken place in the Learn-
ing Agents Research Group (LARG) at the Artificial In-
telligence Laboratory, The University of Texas at Austin.
LARG research is supported in part by grants from the
National Science Foundation (CNS-1305287, IIS-1637736,
IIS-1651089,
IIS-1724157), The Texas Department of
Transporation, Intel, Raytheon, and Lockheed Martin. Peter
Stone serves on the Board of Directors of Cogitai, Inc. The
terms of this arrangement have been reviewed and approved
by the University of Texas at Austin in accordance with its
policy on objectivity in research.
The authors would also like to acknowledge the support of
the Data-Supported Transportation Operations & Planning
Center and the National Science Foundation under Grant
No. 1254921.
References
[Ahuja, Magnanti, and Orlin 1993] Ahuja, R. K.; Magnanti,
T. L.; and Orlin, J. B. 1993. Network Flows: Theory, Algo-
rithms, and Applications. Prentice Hall, 1 edition.
[Beckmann, McGuire, and Winsten 1956] Beckmann, M.;
McGuire, C. B.; and Winsten, C. B. 1956. Studies in the
Economics of Transportation. Yale University Press.
[Dial 1999] Dial, R. B. 1999. Network-optimized road pric-
ing: Part i: a parable and a model. Informs 47.
[Dial 2006] Dial, R. B. 2006. A path-based user-equilibrium
traffic assignment algorithm that obviates path storage and
enumeration. Transportation Research Part B: Methodolog-
ical 40(10):917–936.
Uber ein Paradoxon aus
[Dietrich 1969] Dietrich, B. 1969.
der Verkehrsplanung. Unternehmensforschung 12:258–268.
[Duffield et al. 1999] Duffield, N. G.; Goyal, P.; Greenberg,
A.; Mishra, P.; Ramakrishnan, K. K.; and van der Merive,
J. E. 1999. A flexible model for resource management
in virtual private networks. In ACM SIGCOMM Computer
Communication Review, volume 29, 95–108. ACM.
[Fingerhut, Suri, and Turner 1997] Fingerhut, J. A.; Suri, S.;
and Turner, J. S. 1997. Designing least-cost nonblocking
broadband networks. Journal of Algorithms 24(2):287–309.
[Haurie and Marcotte 1985] Haurie, A., and Marcotte, P.
1985. On the relationship between Nash-Cournot and
Wardrop equilibria. Networks 15(3):295–308.
[Immorlica et al. 2009] Immorlica, N.; Li, L. E.; Mirrokni,
V. S.; and Schulz, A. S.
2009. Coordination mecha-
nisms for selfish scheduling. Theoretical Computer Science
410(17):1589–1598.
[Karmarkar 1984] Karmarkar, N. 1984. A new polynomial-
time algorithm for linear programming. In Proceedings of
the Sixteenth Annual ACM Symposium on Theory of Com-
puting, STOC '84, 302–311. New York, NY, USA: ACM.
[Korilis, Lazar, and Orda 1997] Korilis, Y. A.; Lazar, A. A.;
and Orda, A. 1997. Achieving network optima using stack-
elberg routing strategies. IEEE/ACM Transactions on Net-
working (TON) 5(1):161–173.
|
1211.2476 | 1 | 1211 | 2012-11-11T23:09:02 | Random Utility Theory for Social Choice | [
"cs.MA",
"cs.LG",
"stat.ML"
] | Random utility theory models an agent's preferences on alternatives by drawing a real-valued score on each alternative (typically independently) from a parameterized distribution, and then ranking the alternatives according to scores. A special case that has received significant attention is the Plackett-Luce model, for which fast inference methods for maximum likelihood estimators are available. This paper develops conditions on general random utility models that enable fast inference within a Bayesian framework through MC-EM, providing concave loglikelihood functions and bounded sets of global maxima solutions. Results on both real-world and simulated data provide support for the scalability of the approach and capability for model selection among general random utility models including Plackett-Luce. | cs.MA | cs |
Random Utility Theory for Social Choice
Hossein Azari Soufiani
SEAS, Harvard University
[email protected]
David C. Parkes
SEAS, Harvard University
[email protected]
Abstract
Lirong Xia
SEAS, Harvard University
[email protected]
Random utility theory models an agent's preferences on alternatives by drawing
a real-valued score on each alternative (typically independently) from a param-
eterized distribution, and then ranking the alternatives according to scores. A
special case that has received significant attention is the Plackett-Luce model, for
which fast inference methods for maximum likelihood estimators are available.
This paper develops conditions on general random utility models that enable fast
inference within a Bayesian framework through MC-EM, providing concave log-
likelihood functions and bounded sets of global maxima solutions. Results on
both real-world and simulated data provide support for the scalability of the ap-
proach and capability for model selection among general random utility models
including Plackett-Luce.
1
Introduction
Problems of learning with rank-based error metrics [16] and the adoption of learning for the purpose
of rank aggregation in social choice [7, 8, 23, 25, 29, 30] are gaining in prominence in recent years.
In part, this is due to the explosion of socio-economic platforms, where opinions of users need to be
aggregated; e.g., judges in crowd-sourcing contests, ranking of movies or user-generated content.
In the problem of social choice, users submit ordinal preferences consisting of partial or total ranks
on the alternatives and a single rank order must be selected to be representative of the reports.
Since Condorcet [6], one approach to this problem is to formulate social choice as the problem
of estimating a true underlying world state (e.g., a true quality ranking of alternatives), where the
individual reports are viewed as noisy data in regard to the true state. In this way, social choice can
be framed as a problem of inference.
In particular, Condorcet assumed the existence of a true ranking over alternatives, with a voter's pref-
erence between any pair of alternatives a, b generated to agree with the true ranking with probability
p > 1/2 and disagree otherwise. Condorcet proposed to choose as the outcome of social choice the
ranking that maximizes the likelihood of observing the voters' preferences. Later, Kemeny's rule
was shown to provide the maximum likelihood estimator (MLE) for this model [32].
But Condorcet's probabilistic model assumes identical and independent distributions on pairwise
comparisons. This ignores the strength in agents' preferences (the same probability p is adopted
for all pairwise comparisons), and allows for cyclic preferences. In addition, computing the winner
through the Kemeny rule is ΘP
To overcome the first criticism, a more recent literature adopts the random utility model (RUM)
from economics [26]. Consider C = {c1, .., cm} alternatives.
In RUM, there is a ground truth
utility (or score) associated with each alternative. These are real-valued parameters, denoted by
(cid:126)θ = (θ1, . . . , θm). Given this, an agent independently samples a random utility (Xj) for each
alternative cj with conditional distribution µj(·θj).
2 -complete [13].
1
Usually θj is the mean of µj(·θj).1 Let π denote a permutation of {1, . . . , m}, which naturally
corresponds to a linear order: [cπ(1) (cid:31) cπ(2) (cid:31) ··· (cid:31) cπ(m)]. Slightly abusing notation, we also use
π to denote this linear order. Random utility (X1, . . . , Xm) generates a distribution on preference
orders, as
Pr(π (cid:126)θ) = Pr(Xπ(1) > Xπ(2) > . . . > Xπ(m))
(1)
The generative process is illustrated in Figure 1.
Figure 1: The generative process for RUMs.
Adopting RUMs rules out cyclic preferences, because each agent's outcome corresponds to an order
on real numbers, and it also captures the strength of preference, and thus overcomes the second
criticism, by assigning a different parameter (θj) to each alternative.
A popular RUM is Plackett-Luce (P-L) [18, 21], where the random utility terms are generated ac-
cording to Gumbel distributions with fixed shape parameter [2,31]. For P-L, the likelihood function
has a simple analytical solution, making MLE inference tractable. P-L has been extensively applied
in econometrics [1, 19], and more recently in machine learning and information retrieval (see [16]
for an overview). Efficient methods of EM inference [5, 14], and more recently expectation propa-
gation [12], have been developed for P-L and its variants.
In application to social choice, the P-L model has been used to analyze political elections [10]. EM
algorithm has also been used to learn the Mallows model, which is closely related to the Condorcet's
probabilistic model [17].
Although P-L overcomes the two difficulties of the Condorcet-Kemeny approach, it is still quite
restricted, by assuming that the random utility terms are distributed as Gumbel, with each alternative
is characterized by one parameter, which is the mean of its corresponding distribution. In fact, little
is known about inference in RUMs beyond P-L. Specifically, we are not aware of either an analytical
solution or an efficient algorithm for MLE inference for one of the most natural models proposed by
Thurstone [26], where each Xj is normally distributed.
1.1 Our Contributions
In this paper we focus on RUMs in which the random utilities are independently generated with
respect to distributions in the exponential family (EF) [20]. This extends the P-L model, since
the Gumbel distribution with fixed shape parameters belonging to the EF. Our main theoretical
contributions are Theorem 1 and Theorem 2, which propose conditions such that the log-likelihood
function is concave and the set of global maxima solutions is bounded for the location family, which
are RUMs where the shape of each distribution µj is fixed and the only latent variables are the
locations, i.e., the means of µj's. These results hold for existing special cases, such as the P-L
model, and many other RUMs, for example the ones where each µj is chosen from Normal, Gumbel,
Laplace and Cauchy.
1µj(·θj) might be parameterized by other parameters, for example variance.
2
We also propose a novel application of MC-EM. We treat the random utilities ( (cid:126)X) as latent variables,
and adopt the Expectation Maximization (EM) method to estimate parameters (cid:126)θ. The E-step for
this problem is not analytically tractable, and for this we adopt a Monte Carlo approximation. We
establish through experiments that the Monte-Carlo error in the E-step is controllable and does not
affect inference, as long as numerical parameterizations are chosen carefully. In addition, for the E-
step we suggest a parallelization over the agents and alternatives and a Rao-Blackwellized method,
which further increases the scalability of our method.
We generally assume that the data provides total orders on alternatives from voters, but comment on
how to extend the method and theory to the case where the input preferences are partial orders.
We evaluate our approach on synthetic data as well as two real-world datasets, a public election
dataset and one involving rank preferences on sushi. The experimental results suggest that the
approach is scalable despite providing significantly improved modeling flexibility over existing ap-
proaches.
For the two real-world datasets we have studied, we compare RUMs with normal distributions and
P-L in terms of four criteria: log-likelihood, predictive log-likelihood, Akaike information criterion
(AIC), and Bayesian information criterion (BIC). We observe that when the amount of data is not
too small, RUMs with normal distributions fit better than P-L. Specifically, for the log-likelihood,
predictive log-likelihood, and AIC criteria, RUMs with normal distributions outperform P-L with
95% confidence in both datasets.
2 RUMs and Exponential Families
In social choice, each agent i ∈ {1, . . . , n} has a strict preference order on alternatives. This
provides the data for an inferential approach to social choice. In particular. let L(C) denote the set
of all linear orders on C. Then, a preference-profile, D, is a set of n preference orders, one from
each agent, so that D ∈ L(C)n.
A voting rule r is a mapping that assigns to each preference-profile a set of winning rankings,
r : L(C)n (cid:55)→ (2L(C) \ ∅). In particular, in the case of ties the set of winning rankings may include
more than a singleton ranking. In the maximum likelihood (MLE) approach to social choice, the
preference profile is viewed as data, D = {π1, . . . , πn}.
Given this, the probability (likelihood) of the data given ground truth (cid:126)θ (and for a particular (cid:126)µ) is
µπ(n)(xπ(n))..µπ(1)(xπ(1))dxπ(1)dxπ(2)..dxπ(n) (2)
xπ(1)=xπ(2)
The MLE approach to social choice selects as the winning ranking that which corresponds to the (cid:126)θ
that maximizes Pr(D (cid:126)θ). In the case of multiple parameters that maximize the likelihood then the
MLE approach returns a set of rankings, one ranking corresponding to each parameterization.
In this paper, we focus on probabilistic models where each µj belongs to the exponential family
(EF). The density function for each µ in EF has the following format:
Pr(X = x) = µ(x) = eη(θ)T (x)−A(θ)+B(x),
(3)
where η(·) and A(·) are functions of θ, B(·) is a function of x, and T (x) denotes the sufficient
statistics for x, which could be multidimensional.
Example 1 (Plackett-Luce as an RUM [2]) In the RUM, let µj's be Gumbel distributions. That
is, for alternative j ∈ {1, . . . , m} we have µj(xjθj) = e−(xj−θj )e−e
−(xj−θj ). Then, we have:
, where η(θj) = λj = eθj ,
Pr(π (cid:126)λ) = Pr(xπ(1) > xπ(2) > .. > xπ(m)) = (cid:81)m
(cid:80)m
T (xj) = −e−xj , B(xj) = −xj and A(θj) = −θj.This gives us the Plackett-Luce model.
j=1
λπ(j)
j(cid:48)=j λπ(j(cid:48) )
3 Global Optimality and Log-Concavity
In this section, we provide a condition on distributions that guarantees that the likelihood function (2)
is log-concave in parameters (cid:126)θ. We also provide a condition under which the set of MLE solutions
3
Pr(D (cid:126)θ) =(cid:81)n
(cid:90) ∞
P (π(cid:126)θ) =
(cid:90) ∞
i=1 Pr(πi (cid:126)θ), where,
(cid:90) ∞
xπ(n)=−∞
..
xπ(n−1)=xπ(n)
is bounded when any one latent parameter is fixed. Together, this guarantees the convergence of our
MC-EM approach to a global mode with an accurate enough E-step. We focus on the location family,
which is a subset of RUMs where the shapes of all µj's are fixed, and the only parameters are the
means of the distributions. For the location family, we can write Xj = θj +ζj, where Xj ∼ µj(·θj)
and ζj = Xj − θj is a random variable whose mean is 0 and models an agent's subjective noise.
The random variables ζj's do not need to be identically distributed for all alternatives j; e.g., they
can be normal with different fixed variances.
We focus on computing solutions ((cid:126)θ) to maximize the log-likelihood function,
n(cid:88)
l((cid:126)θ; D) =
log Pr(πi (cid:126)θ)
(4)
i=1
Theorem 1 For the location family, if for every j ≤ m the probability density function for ζj is
log-concave, then l((cid:126)θ; D) is concave.
Proof sketch: The theorem is proved by applying the following lemma, which is Theorem 9 in [22].
Lemma 1 Suppose g1((cid:126)θ, (cid:126)ζ), ..., gR((cid:126)θ, (cid:126)ζ) are concave functions in R2m where (cid:126)θ is the vector of m
parameters and (cid:126)ζ is a vector of m real numbers that are generated according to a distribution whose
pdf is logarithmic concave in Rm. Then the following function is log-concave in Rm.
Li((cid:126)θ, G) = Pr(g1((cid:126)θ, (cid:126)ζ) ≥ 0, ..., gR((cid:126)θ, (cid:126)ζ) ≥ 0), (cid:126)θ ∈ Rm
(5)
r((cid:126)θ, (cid:126)ζ) = θπi(r) + ζ i
πi(r) − θπi(r+1) − ζ i
πi(r+1)
Li((cid:126)θ, πi) = Li((cid:126)θ, Gi) = Pr(gi
R((cid:126)θ, (cid:126)ζ) ≥ 0), (cid:126)θ ∈ Rm
To apply Lemma 1, we define a set Gi of function gi's that is equivalent to an order πi in the sense of
inequalities implied by RUM for πi and Gi (the joint probability in (5) for Gi to be the same as the
probity of πi in RUM with parameters (cid:126)θ). Suppose gi
for r = 1, .., m − 1.
Then considering that the length of order πi is R + 1, we have:
1((cid:126)θ, (cid:126)ζ) ≥ 0, ..., gi
(6)
r((cid:126)θ, (cid:126)ζ) ≥ 0 is equivalent to that in πi alternative πi(r) is preferred to alternative
πi(r+1) for r = 1, .., mi − 1 and gi
πi(r) − θπi(r+1) − ζ i
πi(r+1) for r = mi, .., m − 1. Considering that gi
This is because gi
πi(r + 1) in the RUM sense.
To see how this extends to the case where preferences are specified as partial orders, we consider
in particular an interpretation where an agent's report for the ranking of mi alternatives implies that
r((cid:126)θ, (cid:126)ζ) =
all other alternatives are worse for the agent, in some undefined order. Given this, define gi
πi(mi) −
r((cid:126)θ, (cid:126)ζ) = θπi(mi) + ζ i
θπi(r) + ζ i
r(·)s are linear (hence, concave) and
θπi(r+1) − ζ i
using log concavity of the distributions of (cid:126)ζ i = (ζ i
m)'s, we can apply Lemma 1 and prove
(cid:3)
log-concavity of the likelihood function.
It is not hard to verify that pdfs for normal and Gumbel are log-concave under reasonable conditions
for their parameters, made explicit in the following corollary.
Corollary 1 For the location family where each ζj is a normal distribution with mean zero and
with fixed variance, or Gumbel distribution with mean zeros and fixed shape parameter, l((cid:126)θ; D) is
concave. Specifically, the log-likelihood function for P-L is concave.
1, ζ i
2, .., ζ i
The concavity of log-likelihood of P-L has been proved [9] using a different technique. Using Fact
3.5. in [24], the set of global maxima solutions to the likelihood function, denoted by SD, is convex
since the likelihood function is log-concave. However, we also need that SD is bounded, and would
further like that it provides one unique order as the estimation for the ground truth.
For P-L, Ford, Jr. [9] proposed the following necessary and sufficient condition for the set of global
maxima solutions to be bounded (more precisely, unique) when(cid:80)m
Condition 1 Given the data D, in every partition of the alternatives C into two nonempty subsets
C1 ∪C2, there exists c1 ∈ C1 and c2 ∈ C2 such that there is at least one ranking in D where c1 (cid:31) c2.
j=1 eθj = 1.
4
We next show that Condition 1 is also a necessary and sufficient condition for the set of global
maxima solutions SD to be bounded in location families, when we set one of the values θj to be 0
(w.l.o.g., let θ1 = 0). If we do not bound any parameter, then SD is unbounded, because for any (cid:126)θ,
any D, and any number s ∈ R, l((cid:126)θ; D) = l((cid:126)θ + s; D).
Theorem 2 Suppose we fix θ1 = 0. Then, the set SD of global maxima solutions to l(θ; D) is
bounded if and only if the data D satisfies Condition 1.
Proof sketch:
If Condition 1 does not hold, then SD is unbounded because the parameters for all alternatives in
C1 can be increased simultaneously to improve the log-likelihood. For sufficiency, we first present
the following lemma.
Lemma 2 If alternative j is preferred to alternative j(cid:48) in at least in one ranking then the difference
of their mean parameters θj(cid:48) − θj is bounded from above (∃Q where θj(cid:48) − θj < Q) for all the (cid:126)θ
that maximize the likelihood function.
Proof: Suppose that j (cid:31) j(cid:48) in rank i, then for any (cid:126)θ ∈ Rm:
Li((cid:126)θ, πi) = Li((cid:126)θ, Gi) = Pr(g1((cid:126)θ, (cid:126)ζ) ≥ 0, ..., gR((cid:126)θ, (cid:126)ζ) ≥ 0)
≤ Pr(gπi(r)((cid:126)θ, (cid:126)ζ) ≥ 0, gπi(r+1)((cid:126)θ, (cid:126)ζ) ≥ 0, . . . , gπi(r(cid:48))((cid:126)θ, (cid:126)ζ) ≥ 0) ≤ Pr(ζj − ζj(cid:48) ≥ θj(cid:48) − θj), (7)
where j = πi(r) and j(cid:48) = πi(r(cid:48)).
Let K = l((cid:126)0; D). Since the log-likelihood is always smaller than 0, it follows that for any (cid:126)θ ∈ SD
and any i ≤ n, Li((cid:126)θ; πi) ≥ K.
Hence, Pr(ζj − ζj(cid:48) ≥ θj(cid:48) − θj) ≥ K.
Therefore, there exists K(cid:48) such that θj(cid:48) − θj < K(cid:48), where K(cid:48) depends on the fixed ζj(cid:48) and ζj. (cid:3)
Now consider a directed graph GD, where the nodes are the alternatives, and there is an edge be-
tween cj to cj(cid:48) if in at least one ranking cj (cid:31) cj(cid:48). By Condition 1, for any pair j (cid:54)= j(cid:48), there is a path
from cj to cj(cid:48) (and conversely, a path from cj(cid:48) to cj). To see this, consider building a path between
j and j(cid:48) by starting from a partition with C1 = {j} and following an edge from j to j1 in the graph
where j1 is an alternatives in C2 for which there must be such an edge, by Condition 1. Consider the
partition with C1 = {j, j1}, and repeat until an edge can be followed to vertex j(cid:48) ∈ C2. It follows
from Lemma 2 that for any (cid:126)θ ∈ SD we have θj − θj(cid:48) < Qm, using the telescopic sum of bounded
values of the difference of mean parameters along the edges of the path, since the length of the path
is no more than m (and tracing the path from j to j(cid:48) and j(cid:48) to j), meaning that SD is bounded. (cid:3)
Now that we have the log concavity and bounded property, we need to declare conditions under
which the bounded convex space of estimated parameters corresponds to a unique order. The next
theorem provides a necessary and sufficient condition for all global maxima to correspond to the
same order on alternatives. Suppose that we order the alternatives based on estimated θ's (meaning
that cj is ranked higher than cj(cid:48) iff θj > θj(cid:48)).
Theorem 3 The order over parameters is strict and is the same across all (cid:126)θ ∈ SD if, for all (cid:126)θ ∈ SD
and all alternatives j (cid:54)= j(cid:48), θj (cid:54)= θj(cid:48).
Proof: Suppose for the sake of contradiction there exist two maxima, (cid:126)θ, (cid:126)θ∗ ∈ SD and a pair of
alternatives j (cid:54)= j(cid:48) such that θj > θj(cid:48) and θ∗
j . Then, there exists an α < 1 such that the jth
and j(cid:48)th components of α(cid:126)θ + (1 − α)(cid:126)θ∗ are equal, which contradicts the assumption.
(cid:3)
Hence, if there is never a tie in the scores in any (cid:126)θ ∈ SD, then any vector in SD will reveal the
unique order.
j(cid:48) > θ∗
4 Monte Carlo EM for Parameter Estimation
In this section, we propose an MC-EM algorithm for MLE inference for RUMs where every µj
belongs to the EF.2
2Our algorithm can be naturally extended to compute a maximum a posteriori probability (MAP) estimate,
when we have a prior over the parameters (cid:126)θ. Still, it seems hard to motivate the imposition of a prior on
parameters in many social choice domains.
5
E-Step : Q((cid:126)θ, (cid:126)θt) = E (cid:126)X
M-step : (cid:126)θt+1 ∈ arg max
(cid:126)θ
4.1 Monte Carlo E-step by Gibbs sampler
The E-step can be simplified using (3) as follows:
n(cid:89)
i=1
E (cid:126)X{log
m(cid:88)
EX i
j
n(cid:88)
=
Pr((cid:126)xi, πi (cid:126)θ) D, (cid:126)θt} = E (cid:126)X{log
m(cid:88)
n(cid:88)
jθj) πi, (cid:126)θt} =
{log µj(xi
n(cid:89)
i=1
Pr((cid:126)xi (cid:126)θ) Pr(πi(cid:126)xi) D, (cid:126)θt}
The EM algorithm determines the MLE parameters (cid:126)θ iteratively, and proceeds as follows. In each
iteration t + 1, given parameters (cid:126)θt from the previous iteration, the algorithm is composed of an
E-step and an M-step. For the E-step, for any given (cid:126)θ = (θ1, . . . , θm), we compute the conditional
expectation of the complete-data log-likelihood (latent variables (cid:126)x and data D), where the latent
variables (cid:126)x are distributed according to data D and parameters (cid:126)θt from the last iteration.
For the M-step, we optimize (cid:126)θ to maximize the expected log-likelihood computed in the E-step, and
use it as the input (cid:126)θt+1 for the next iteration:
(cid:41)
Pr((cid:126)xi, πi (cid:126)θ) D, (cid:126)θt
(cid:40)
n(cid:89)
log
i=1
Q((cid:126)θ, (cid:126)θt)
(η(θj)EX i
j
{T (xi
j) πi, (cid:126)θt} − A(θj) + W,
i=1
j=1
i=1
j=1
j
j
{T (xi
{B(xi
j) πi, (cid:126)θt} where T (xi
j) πi, (cid:126)θt} only depends on (cid:126)θt and D (not on (cid:126)θ), which means that it can
where W = EX i
be treated as a constant in the M-step. Hence, in the E-step we only need to compute Si,t+1
=
j) is the sufficient statistic for the parameter θj in the model. We
EX i
j) πi, (cid:126)θt}. However, we can use a Monte
are not aware of an analytical solution for EX i
Carlo approximation, which involves sampling (cid:126)xi from the distribution Pr((cid:126)xi πi, (cid:126)θt) using a Gibbs
sampler, and then approximates Si,t+1
j ) where N is the number of samples in
the Gibbs sampler.
In each step of our Gibbs sampler for voter i, we randomly choose a position j in πi and
πi(j) according to a TruncatedEF distribution Pr(· xπi(−j), (cid:126)θt, πi), where xπi(−j) =
sample xi
( xπi(1), . . . , xπi(j−1), xπi(j+1), . . . , xπi(m)). The TruncatedEF is obtained by truncating the tails
of µπi(j)(·θt
πi(j)) at xπi(j−1) and xπi(j+1), respectively. For example, a truncated normal distribu-
tion is illustrated in Figure 2.
k=1 T (xi,k
(cid:80)N
{T (xi
by 1
N
j
j
j
for xi,k
j
To further
Rao-Blackwellized:
improve the
Gibbs sampler, we use Rao-Blackwellized [4]
xi,k−j, πi, (cid:126)θt}
using E{T (xi,k
estimation
j )
, where xi,k−j is all
instead of the sample xi,k
j
Finally, we esti-
of (cid:126)xi,k except
.
j ) xi,k−j, πi, (cid:126)θt} in each step
mate E{T (xi,k
(cid:80)N
the Gibbs sampler using M samples as
of
(cid:80)M
j ) xk−j, πi, (cid:126)θt} (cid:39)
k=1 E{T (xi,k
Si,t+1
j
∼
l=1 T (xil,k
1
xi,k−j, πi, (cid:126)θ).
Rao-Blackwellization
the variance of
the estimator be-
conditioning and expectation in
j ) xi,k−j, πi, (cid:126)θt}.
NM
Pr(xil,k
reduces
cause of
E{T (xi,k
), where xil,k
(cid:80)N
(cid:39) 1
k=1
N
j
j
j
6
Figure 2: A truncated normal distribution.
4.2 M-step
imize(cid:80)n
η(θj)(cid:80)n
compute θt+1
j
i=1
In the E-step we have (approximately) computed Si,t+1
j) πi, (cid:126)θt} − A(θj) + EX i
j
{T (xi
j=1(η(θj)EX i
(cid:80)m
for each j ≤ m separately to maximize(cid:80)n
(cid:80)n
− nA(θj).
j
i=1 Si,t+1
j
For the case of the normal distribution with fixed variance, where η(θj) = 2θj and A(θj) = (θj)2,
we have θt+1
. The algorithm is illustrated in Figure 3.
j = 1
n
i=1 Si,t+1
j
. In the M-step we compute (cid:126)θt+1 to max-
j) πi, (cid:126)θt}). Equivalently, we
j) πi, (cid:126)θt}−A(θj)} =
{T (xi
{B(xi
i=1{η(θj)EX i
j
j
Figure 3: The MC-EM algorithm for normal distribution.
4.3 Convergence
In the last section we showed that if the RUM satisfies the premise in Theorem 1 and Theorem 2 the
data satisfies Condition 1, then the log-likelihood function is concave, and the set of global maxima
solutions is bounded. This guarantee the convergence of MC-EM for an exact E-step.
In general, MC-EM methods do not have the uniform convergence property of EM methods. In
order to control the error of approximation in the MC-E step we can increase the number of samples
with the iterations [28]. However, in our application, we are not concerned with the exact estimation
of (cid:126)θ, as we are only interested in their orders relative to each-other. Therefore, as long as the
approximation error remains relatively small, such that the differences of θjs are much larger than
the error, we are safe to stop.
A known problem with Gibbs sampling is that it can introduce correlation among samples. To
address this, we sub-sample the samples to reduce the correlation, and call the ratio of sub-sampling
the thinning factor (0 < F ≤ 1). A suitable thinning ratio can be set using empirical results from
the sampler.
With an approach similar to [3], we can derive a relationship between the variance of error in (cid:126)θt+1
and the Monte-Carlo error in the E-step approximation:
Var (θj
t+1) =
1
n2
Var (Si,t+1
j
) =
1
M N n2
i=1
Var (xi
j) ≤ F V
M N n
,
(8)
where N is number of samples in Gibbs sampler, M is the number of samples for Rao-
Blackwellization, n is number of agents, F is the thinning factor and V = maxj(Var x∼µj (x)),
t+1)
and samples xi
arbitrarily small by increasing M N.
j are assumed to be independent. Given, T , V and n, we can make Var (θj
5 Experimental Results
We evaluate the proposed MC-EM algorithm on synthetic data as well as two real world data sets,
namely an election data set and a dataset representing preference orders on sushi. For simulated data
7
n(cid:88)
i=1
n(cid:88)
we use the Kendall correlation [11] between two rank orders (typically between the true order and
the method's result) as a measure of performance.
5.1 Experiments for Synthetic Data
We first generate data from Normal models for the random utility terms, with means θj = j and
equal variance for all terms, for different choices of variance (Var = 2, 4). We evaluate the perfor-
mance of the method as the number of agents n varies. The results show that a limited number of
iterations in the EM algorithm (at most 3), and samples M N = 4000 (M=5, N=800) are sufficient
for inferring the order in most cases. The performance in terms of Kendall correlation for recovering
ground truth improves for larger number of agents, which corresponds to more data. See Figure 4,
which shows the asymptotic behavior of the maximum likelihood estimator in recovering the true
parameters. Figure 4 left and middle panels show that the more the size of dataset the better the
performance of the method.
Moreover, for large variances in data generation, due to increasing noise in the data, the rate that
performance gets better is slower than that for the case for smaller variances. Notice that the scales
on the y-axis are different in the left and middle panels.
Figure 4: Left and middle panel: Performance for different number of agents n on synthetic data for m = 5, 10
and Var = 2, 4, with specifications M N = 4000, EM iterations = 3. Right panel: Performance given
access to sub-samples of the data in the public election dataset, x-axis: size of sub-samples, y-axis: Kendall
Correlation with the order obtained from the full data-set. Dashed lines are the 95% confidence intervals.
5.2 Experiments for Model Robustness
We apply our method to a public election dataset collected by Nicolaus Tideman [27], where the
voters provided partial orders on candidates. A partial order includes comparisons among a subset
of alternative, and the non-mentioned alternatives in the partial order are considered to be ranked
lower than the lowest ranked alternative among mentioned alternatives.
The total number of votes are n = 280 and the number of alternatives m = 15. For the purpose of
our experiments, we adopt the order on alternatives obtained by applying our method on the entire
dataset as an assumed ground truth, since no ground truth is given as part of the data. After finding
the ground truth by using all 280 votes (and adopting a normal model), we compare the performance
of our approach as we vary the amount of data available. We evaluate the performance for sub-
samples consisting of 10, 20, . . . , 280 of samples randomly chosen from the full dataset. For each
sub-sample size, the experiment is repeated 200 times and we report the average performance and
the variance. See the right panel in Figure 4. This experiment shows the robustness of the method,
in the sense that the result of inference on a subset of the dataset shows consistent behavior with the
case that the result on the full dataset. For example, the ranking obtained by using half of the data
can still achieve a fair estimate to the results with full data, with an average Kendall correlation of
greater than 0.4.
5.3 Experiments for Model Fitness
In addition to a public election dataset, we have tested our algorithm on a sushi dataset, where 5000
users give rankings over 10 different kinds of sushi [15]. For each experiment we randomly choose
8
n ∈ {10, 20, 30, 40, 50} rankings, apply our MC-EM for RUMs with normal distributions where
variances are also parameters.
In the former experiments, both the synthetic data generation and the model for election data, the
variances were fixed to 1 and hence we had the theoretical guarantees for the convergence to global
optimal solutions by Theorem 1 and Theorem 2. When we let the variances to be part of parametriza-
tion we lose the theoretical guarantees. However, the EM algorithm can still be applied, and since
the variances are now parameters (rather than being fixed to 1), the model fits better in terms of
log-likelihood.
For this reason, we adopt RUMs with normal distributions in which the variance is a parameter that
is fit by EM along with the mean. We call this model a normal model. We compute the difference
between the normal model and P-L in terms of four criteria: log-likelihood (LL), predictive log-
likelihood (predictive LL), AIC, and BIC. For (predictive) log-likelihood, a positive value means
that normal model fits better than P-L, whereas for AIC and BIC, a negative number means that
normal model fits better than P-L. Predictive likelihood is different from likelihood in the sense
that we compute the likelihood of the estimated parameters for a part of the data that is not used for
parameter estimation.3 In particular, we compute predictive likelihood for a randomly chosen subset
of 100 votes. The results and standard deviations for n = 10, 50 are summarized in Table 1.
n = 10
n = 50
LL
Pred. LL
AIC
BIC
LL
Dataset
Sushi
22.6(6.3) 40.1(5.1) -35.2(12.6) -6.1(12.6)
Election 9.4(10.6) 91.3(103.8) -8.8(21.2) 4.2(21.2) 44.8(15.8) 87.4(30.5) -79.6(31.6) -50.5(31.6)
8.8(4.2) -56.1(89.5) -7.6(8.4) 5.4(8.4)
Pred. LL
AIC
BIC
Table 1: Model selection for the sushi dataset and election dataset. Cases where the normal model fits better
than P-L statistically with 95% confidence are in bold.
When n is small (n = 10), the variance is high and we are unable to obtain statistically significant
results in comparing fitness. When n is not too small (n = 50), RUMs with normal distributions
fit better than P-L. Specifically, for log-likelihood, predictive log-likelihood, and AIC, RUMs with
normal distributions outperform P-L with 95% confidence in both datasets.
5.4
Implementation and Run Time
The running time for our MC-EM algorithm scales linearly with number of agents on real world
data (Election Data) with slope 13.3 second per agent on an Intel i5 2.70GHz PC. This is for 100
iterations of EM algorithm with Gibbs sampling number increasing with iterations as 2000 + 300 ∗
iteration steps.
Acknowledgments
This work is supported in part by NSF Grant No. CCF- 0915016. Lirong Xia is supported by NSF
under Grant #1136996 to the Computing Research Association for the CIFellows Project. We thank
Craig Boutilier, Jonathan Huang, Tyler Lu, Nicolaus Tideman, Paolo Viappiani, and anonymous
NIPS-12 reviewers for helpful comments and suggestions, or help on the datasets.
References
[1] Steven Berry, James Levinsohn, and Ariel Pakes. Automobile prices in market equilibrium. Economet-
rica, 63(4):841 -- 890, 1995.
[2] Henry David Block and Jacob Marschak. Random orderings and stochastic theories of responses.
Contributions to Probability and Statistics, pages 97 -- 132, 1960.
In
[3] James G. Booth and James P. Hobert. Maximizing Generalized Linear Mixed Model Likelihoods with an
Automated Monte Carlo EM Algorithm. JRSS. Series B, 61(1):265 -- 285, 1999.
[4] Steve Brooks, Andrew Gelman, Galin Jones, and Xiao-Li Meng, editors. Handbook of Markov Chain
Monte Carlo. Chapman and Hall/CRC, 2011.
3The use of predictive likelihood allows us to evaluate the performance of the estimated parameters on the
rest of the data, and is similar in this sense to cross validation for supervised learning.
9
[5] Francois Caron and Arnaud Doucet. Efficient Bayesian Inference for Generalized Bradley-Terry Models.
Journal of Computational and Graphical Statistics, 21(1):174 -- 196, 2012.
[6] Marquis de Condorcet. Essai sur l'application de l'analyse `a la probabilit´e des d´ecisions rendues `a la
pluralit´e des voix. Paris: L'Imprimerie Royale, 1785.
[7] Vincent Conitzer, Matthew Rognlie, and Lirong Xia. Preference functions that score rankings and maxi-
mum likelihood estimation. In Proc. IJCAI, pages 109 -- 115, 2009.
[8] Vincent Conitzer and Tuomas Sandholm. Common voting rules as maximum likelihood estimators. In
Proc. UAI, pages 145 -- 152, 2005.
[9] Lester R. Ford, Jr. Solution of a ranking problem from binary comparisons. The American Mathematical
Monthly, 64(8):28 -- 33, 1957.
[10] Isobel Claire Gormley and Thomas Brendan Murphy. A grade of membership model for rank data.
Bayesian Analysis, 4(2):265 -- 296, 2009.
[11] Przemyslaw Grzegorzewski. Kendall's correlation coefficient for vague preferences. Soft Computing,
13(11):1055 -- 1061, 2009.
[12] John Guiver and Edward Snelson. Bayesian inference for Plackett-Luce ranking models. In Proc. ICML,
pages 377 -- 384, 2009.
[13] Edith Hemaspaandra, Holger Spakowski, and Jorg Vogel. The complexity of Kemeny elections. Theoret-
ical Computer Science, 349(3):382 -- 391, December 2005.
[14] David R. Hunter. MM algorithms for generalized Bradley-Terry models.
volume 32, pages 384 -- 406, 2004.
In The Annals of Statistics,
[15] Toshihiro Kamishima. Nantonac collaborative filtering: Recommendation based on order responses. In
Proc. KDD, pages 583 -- 588, 2003.
[16] Tie-Yan Liu. Learning to Rank for Information Retrieval. Springer, 2011.
[17] Tyler Lu and Craig Boutilier. Learning mallows models with pairwise preferences. In Proc. ICML, pages
145 -- 152, 2011.
[18] R. Duncan Luce. Individual Choice Behavior: A Theoretical Analysis. Wiley, 1959.
[19] Daniel McFadden. Conditional logit analysis of qualitative choice behavior. In Frontiers of Econometrics,
pages 105 -- 142, New York, NY, 1974. Academic Press.
[20] Carl N. Morris. Natural Exponential Families with Quadratic Variance Functions. Annals of Statistics,
10(1):65 -- 80, 1982.
[21] R. L. Plackett. The analysis of permutations. JRSS. Series C, 24(2):193 -- 202, 1975.
[22] Andr´s Pr´ekopa. Logarithmic concave measures and related topics. In Stochastic Programming, pages
63 -- 82. Academic Press, 1980.
[23] Ariel D. Procaccia, Sashank J. Reddi, and Nisarg Shah. A maximum likelihood approach for selecting
sets of alternatives. In Proc. UAI, 2012.
[24] Frank Proschan and Yung L. Tong. Chapter 29. log-concavity property of probability measures. FSU
techinical report Number M-805, pages 57 -- 68, 1989.
[25] Magnus Roos, Jorg Rothe, and Bjorn Scheuermann. How to calibrate the scores of biased reviewers by
quadratic programming. In Proc. AAAI, pages 255 -- 260, 2011.
[26] Louis Leon Thurstone. A law of comparative judgement. Psychological Review, 34(4):273 -- 286, 1927.
[27] Nicolaus Tideman. Collective Decisions and Voting: The Potential for Public Choice. Ashgate Publishing,
2006.
[28] Greg C. G. Wei and Martin A. Tanner. A Monte Carlo Implementation of the EM Algorithm and the Poor
Man's Data Augmentation Algorithms. JASA, 85(411):699 -- 704, 1990.
[29] Lirong Xia and Vincent Conitzer. A maximum likelihood approach towards aggregating partial orders. In
Proc. IJCAI, pages 446 -- 451, 2011.
[30] Lirong Xia, Vincent Conitzer, and J´erome Lang. Aggregating preferences in multi-issue domains by using
maximum likelihood estimators. In Proc. AAMAS, pages 399 -- 406, 2010.
[31] John I. Jr. Yellott. The relationship between Luce's Choice Axiom, Thurstone's Theory of Comparative
Judgment, and the double exponential distribution. J. of Mathematical Psychology, 15(2):109 -- 144, 1977.
[32] H. Peyton Young. Optimal voting rules. Journal of Economic Perspectives, 9(1):51 -- 64, 1995.
10
|
1811.05053 | 1 | 1811 | 2018-11-13T00:13:24 | Distributed Cooperative Spectrum Sharing in UAV Networks Using Multi-Agent Reinforcement Learning | [
"cs.MA"
] | In this paper, we develop a distributed mechanism for spectrum sharing among a network of unmanned aerial vehicles (UAV) and licensed terrestrial networks. This method can provide a practical solution for situations where the UAV network may need external spectrum when dealing with congested spectrum or need to change its operating frequency due to security threats. Here we study a scenario where the UAV network performs a remote sensing mission. In this model, the UAVs are categorized into two clusters of relaying and sensing UAVs. The relay UAVs provide a relaying service for a licensed network to obtain spectrum access for the rest of UAVs that perform the sensing task. We develop a distributed mechanism in which the UAVs locally decide whether they need to participate in relaying or sensing considering the fact that communications among UAVs may not be feasible or reliable. The UAVs learn the optimal task allocation using a distributed reinforcement learning algorithm. Convergence of the algorithm is discussed and simulation results are presented for different scenarios to verify the convergence. | cs.MA | cs |
Distributed Cooperative Spectrum Sharing in UAV Networks Using
Multi-Agent Reinforcement Learning
Alireza Shamsoshoaraa, Mehrdad Khaledia, Fatemeh Afghaha, Abolfazl Razia, Jonathan
Ashdownb
aSchool of Informatics, Computing and Cyber Systems, Northern Arizona University, Flagstaff, AZ, USA
bComputer Information Systems Department, SUNY Polytechnic Institute, Utica, NY, USA
Abstract
In this paper, we develop a distributed mechanism for spectrum sharing among a network of
unmanned aerial vehicles (UAV) and licensed terrestrial networks. This method can provide
a practical solution for situations where the UAV network may need external spectrum when
dealing with congested spectrum or need to change its operational frequency due to security
threats. Here we study a scenario where the UAV network performs a remote sensing mission.
In this model, the UAVs are categorized to two clusters of relaying and sensing UAVs. The
relay UAVs provide a relaying service for a licensed network to obtain spectrum access
for the rest of UAVs that perform the sensing task. We develop a distributed mechanism
in which the UAVs locally decide whether they need to participate in relaying or sensing
considering the fact that communications among UAVs may not be feasible or reliable. The
UAVs learn the optimal task allocation using a distributed reinforcement learning algorithm.
Convergence of the algorithm is discussed and simulation results are presented for different
scenarios to verify the convergence1.
Keywords: Spectrum Sharing, multi-Agent Learning, UAV Networks, reinforcement
learning.
1. Introduction
Unmanned Aerial Vehicles (UAVs) have been recently used in many civilian, commercial
and military applications [23, 22, 15, 4, 8, 2]. With recent advances in design and production
of UAVs, the global market revenue of UAVs is expected to reach $11.2 billion by 2020 [28].
Spectrum management is one of the key challenges in UAV networks, since spectrum
shortage can impede the operation of these networks. In particular, in applications involving
1This material is based upon the work supported by the National Science Foundation under Grant No.
1755984.
Accepted in IEEE Consumer Communications & Networking Conference - CCNC 2019
a low-latency video streaming, the UAVs may require additional spectrum to complete their
mission. The conventional spectrum sharing mechanism such as spectrum sensing may not
be very practical in UAV systems noting the considerable required energy for spectrum
sensing or the fact that they cannot guarantee a continuous spectrum access. The property-
right spectrum sharing techniques operate based on an agreement between the licensed and
unlicensed users where the spectrum owners lease their spectrum to the unlicensed ones in
exchange for certain services such as cooperative relaying or energy harvesting.
In this paper, we studied the problem of limited spectrum in UAV networks and consid-
ered a relay-based cooperative spectrum leasing scenario in which a group of UAVs in the
network cooperatively forward data packet for a ground primary user (PU) in exchange for
spectrum access. The rest of the UAVs in the network utilize the obtained spectrum for
transmission and completion of the remote sensing operation. Thus, the main problem is to
partition the UAV network into two task groups in a distributed way.
It is worth noting that cooperative spectrum sharing has been studied previously in the
context of cognitive radio networks [29, 1, 9, 21]. The existing models are mostly centralized
and the set of relay nodes is typically chosen by the PU. Such solutions, however, are
not applicable to UAV networks, due to their distributed infrastructure and autonomous
functionality.
To tackle this problem, we utilize multi-agent reinforcement learning [7, 13, 17, 6, 18,
16, 19], which is an effective tool for designing algorithms in distributed systems, where the
environment is unknown and a reliable communication among agents is not guaranteed. The
main problems in distributed multi-agent reinforcement learning include dealing with state
space complexity and the lack of complete information about other agents. There have been
proposals in the literature to address these issues through message passing or simplifying
assumptions. For instance, [7] assumes that the decision of an agent depends only on a
limited group of other agents, which decomposes the state space and simplifies the problem.
In another work [6], a Bayesian setting is proposed where each agent has some distributional
knowledge about other agents' decisions. Such simplifications, however, are not applicable
to the distributed UAV network environment.
In this paper, we propose a distributed multi-agent reinforcement learning algorithm for
task allocation among UAVs. Each UAV either joins a relaying group to provide relaying
service for the PU or performs data transmission to the UAV fusion center. In this approach,
each UAV maintains a local table about the respective rewards for its actions in different
states. The tables are updated locally based on a feedback from PU receiver and the UAV
fusion node. We define utilities for both the PU and the UAV network, and the objective is
to maximize the total utility of the system (sum utility of the PU and the UAV network).
2
We discuss the convergence of our learning algorithm and we present simulation results to
verify the convergence to the optimal solution.
The remainder of this paper is organized as follows. In Section 2, the system model and
the assumptions of the proposed model are described. In Section 3, we propose a distributed
multi-agent learning algorithm to solve the spectrum sharing problem.
In Section 4, we
present simulation results and discuss the performance of our distributed learning algorithm.
Finally, we make concluding remarks in Section 5.
2. System Model
We consider a licensed primary user (PU) who is willing to share a part of its spectrum
with a network of UAVs, in exchange for receiving a cooperative relaying service. The UAV
network consists of N UAVs which can be partitioned into two sets depending on the task
of the UAV. In fact, UAVs either relay for the PU or utilize the spectrum to transmit their
own packets to the fusion center. Let K be the number of nodes who perform the relaying
task and N − K denote the number of UAVs that transmit packets to their fusion center.
In this paper, we assume that both the PU's transmitter and receiver are terrestrial, while
UAVs are operating in high elevation. Also, we assume no reliable direct link exists between
the PU's transmitter and receiver. Moreover, there is zero chance for direct transmission
between the UAVs' source and fusion, due to their distances from the fusion center. Fig.
1 illustrates a sample scenario with 6 total nodes, where the nodes are partitioned into a
set of 4 relay nodes for the fusion center, and 2 other nodes relay information for the PU
receiver on the ground.
The PU's transmitter intends to send its packet to a designated receiver, which is far
away from its location. Hence, a single or a number of UAVs are required to deliver its
information to the receiver. In addition, we assume that the UAVs' spectrum is congested
or unreliable, therefore the UAVs are required to lease additional spectrum from the PU
to communicate with their fusion. By delivering the PU's packet, the UAVs gain spectrum
access to send their own packets. All the UAVs transmitters and receivers are assumed
to be equipped with a single antenna. Also, we assume that the channels between UAVs,
source, fusion, and PU transmitter and receiver are slow Rayleigh fading with a constant
coefficient over one time slot. The channel coefficients are defined as follows: i) hP T,Ui refers
to the channel parameters between the PU's transmitter and ith UAV; ii) hUi,P R denotes
the parameters between the ith UAV and the PU's receiver; iii) hS,Ui and hUi,F , respectively
denote the channel coefficients between the Source and the ith UAV, and between the ith
UAV and the fusion center. For the sake of simplicity, the instant Channel State Information
3
Figure 1: System Model: A sample Scenario with 6 UAVs, where four UAVs handle packets relaying between
the Source and Fusion Center and two UAVs relay packets for the Primary User.
Figure 2: Communication channels for a single relay
(CSI) are assumed to be available for all UAVs following similar works in [30, 32, 5, 3, 26]
The source of the noise at the receivers is considered as a symmetric normally distributed
random variable, denoted by z ∼ CN (0, σ2). Many works such as [24, 20, 26] optimized the
power consumption and nodes' lifetime in this area. On the other hand, power optimization
is not the purpose of this work, hence we assume constant powers during the transmissions.
However, the transmission power for the Source and the PU transmitter is less than those
of the UAVs. Half-duplex strategy is utilized in this work. Without loss of generality, time-
division notations are characterized in order to ensure the half-duplex operations. After
these assumptions, the channel and system model for a single relay is shown in Fig. 2. In
this model, all UAVs and terminals utilize a single antenna for transmission.
In the first half of a transmission cycle, the source transmits its packet and the relay
4
UAVs receive the information. The channel model for the first half is presented as follows:
yU [n] = hS,U xS[n] + zr[n],
(1)
where xS is the source's transmitted signal and yU is the UAV's received signal. Then, in
the second half of the transmission, the UAV sends the received packet in the previous time
slot. We can write the second half as another model for the received signal as follow:
yF [n] = hU,F xU [n] + zF [n],
(2)
where xU is the UAV's transmitted signal and yF is the destination's received signal.
In equations (1) and (2), the CSI parameters hij represent the effects of the path loss
and likewise zj represents the effect of noise and interference terms at the receiver, where
i ∈ {Source, PU-Transmitter, UAV} and j ∈ {Fusion, PU-R, UAV}. In our scenario, hij is
calculated by the proper receiver.
Based on equations (1) and (2), the throughput capacity of the non-degraded discrete mem-
oryless broadcast channel is expressed in (3) [33]:
CT hroughput = max
w→x→yd
{I(w; yd)},
(3)
where d ∈ {Fusion, PU-Receiver}, w is the message word and x is the codeword which has
been assigned to each message by the encoder. Preferably, equation (3) should be solved
for the optimal joint distribution of both w and x. However, as discussed in [25], we can
achieve the suboptimal throughput rate in (4), with the aid of assumption x = w. Also,
p(x) denotes the probability mass function (pmf) for the codeword.
RT hroughput = max
p(x)
{I(x; yd)}
(4)
In scenarios, where users can exploit the existence of UAVs, different cooperation protocols
such as Decode and Forward (DF) and Amplify and Forward (AF) can be used [12]. The
idea behind the concept of cooperative relaying is that a set of relay nodes decode, amplify
and collectively "beam-form" the signal received from the source node (potentially with
help of source node itself) towards a designated destination in order to exploit transmission
diversity and increase the overall throughput of the system [14].
Considering an AF cooperation, each UAV first amplifies the signals from the source and then
cooperates with source to send its information to the fusion center or to the PU-Receiver.
According to [11], the mutual information for i) the first set of source, UAV, fusion and ii)
the second set of PU-T, UAV, PU-R can be written as equations (5) and (6), respectively.
5
In these equations, PS denotes the transmitter power from the source of the UAV network
and i specifies the index for the UAV.
ISFAF = log2(1 + PShSF2
PShS,Ui2 PUihUi,F2
+
1 + PShS,Ui2 + PUihUi,F2 )
IP U (T R)AF = log2(1 + PP ThP T,P R2
PP ThP T,Ui2 PUihUi,P R2
1 + PP ThP T,Ui2 + PUihUi,P R2 )
+
(5)
(6)
We denote the throughput rate for both primary users and source-fusion users as (7) and
(8), respectively.
RP U = IP U (T R)AF
RSF = ISFAF
(7)
(8)
It is noteworthy that these equations are valid only for cooperation with a single Relay
or UAV. However, the objective of this paper is dealing with Multi-UAV or Multi-Agent
relays. Fig. 3 demonstrates the distribution of N UAVs into two groups including K UAVs
facilitating the air source-to-fusion communication and N − K UAVs providing relaying
service for a ground-based primary transmitter-receiver pair. Hence, the equations for multi-
UAV should be changed to (9) and (10). In (9), i defines the lower bound for the first UAV
in the source-fusion pair and i + N − K denotes the upper bound.
RSF (Multi-UAV) = log2(1 + PShSF2
i+N−K(cid:88)
PShS,Uj2 PUjhUj ,F2
1 + PShS,Uj2 + PUjhUj ,F2 )
+
j=i
(9)
Here, RSF (Multi-UAV) is the achievable rate for the fusion center. This rate is achieved
with the help of (N − K) UAVs. PS and PUi are transmission powers for the source and
the ith UAV, respectively. Also, hSF denotes the channel coefficient for the pair of source-
fusion center, hS,Uj stands for the channel between the source and jth UAV, and finally hUj ,F
denotes CSI for the jth UAV and the fusion. In (10), m and m + K define the lower and
upper bound for the first and last UAV in the source-fusion pair respectively.
RP U (Multi-UAV) = log2(1 + PP ThP T,P R2
m+K(cid:88)
PP ThP T,Ul2 PUlhUl,P R2
1 + PP ThP T,Ul2 + PUlhUl,P R2 )
+
l=m
6
(10)
Figure 3: System Model: Dividing UAVs into K and N − K groups, for cooperating in two sets of Source-
Fusion and Primary Transmitter-Receiver.
In (10), RP U (Multi-UAV) is the achievable rate for the primary transmitter-receiver pair
with the aid of K UAVs. PP T and PUl are transmission power for the primary user and
the ith UAV, respectively. Moreover, hP T,P R, denotes the channel coefficients for primary
transmitter and receiver. hP T,Ul stands for the primary transmitter and lth UAV. Finally
hUl,P R is CSI parameters for the lth UAV and the primary receiver. Based on the assumption
of long distance between the source and the fusion center and also the long distance between
the primary transmitter and receiver, we can assume that hSF and hP T,P R are negligible.
Time is slotted and at the end of each time slot, the fusion center and the primary
receiver send feedback to the UAVs informing them about the achieved accumulated rates.
This information is used by each UAV to decide on joining a task group. The goal is to find
the optimal task allocation for UAVs in a fully distributed way such that the total utility of
the system (i.e. sum utility of UAV network (9) and the PU (10)) is maximized. We assume
7
that the UAVs decide locally with no information exchange among themselves.
It is noteworthy that in some cases, the maximum throughput is achieved when all
UAVs join the same set and deliver packets only for one set, which is not consistent with
the proposed model. If all UAVs are distributed in the set of source-fusion, then the total
throughput rate is zero because there is no available spectrum for UAVs to utilize for their
transmission. Also, if all UAVs are partitioned in the primary set, then the sum throughput
rate is equal to the rate of the primary user.
In this case the proposed method handles
this issue by considering the Jain fairness index [10]. Based on the fact that we only have
two sets and based on the Jain index definition, (11) describes the fairness for the proposed
method in our system model.
× ((cid:80)
i xi)2(cid:80)
i x2
i
J(x) =
1
n
,
(11)
Here, n is equal to 2 and i ∈ {0, 1} which indicates the set of source-fusion or Primary Users.
We assume that x0 and x1 are equal to the number of UAVs in the Fusion-Source set and
the Primary Users set, respectively. Therefore, we can define the fairness as (12).
F ariness =
1
2
× (#UF + #UP )2
(#UF )2 + (#UP )2
(12)
Now, if all UAVs are distributed in one set, then the fairness will be minimum (0.5), and if
the UAVs are partitioned equally among two sets, then the fairness will be maximum (1).
Based on these definitions, we define (13), as the gain value for each time slot which
indicates the efficiency and performance for the distributed UAVs in two sets.
Gain = γ1 × ∆(RateF usion)
+ γ2 × ∆(RateP rimary) + γ3 × (F airness)
(13)
In (13), ∆(RateFusion) is the difference between the rate at time t and the average of
previous rates for the fusion center and ∆(RatePrimary) is the difference between the rate at
time t and the average of previous rates for the primary user. Also, γ1, γ2, and γ3 are defined
to control the gain value. Then, we use this gain in our proposed method as described in
section 3.
3. The Distributed Learning Algorithm for Task Allocation
The proposed method is a general form of the Q-learning algorithm [31] for a distributed
multi-agent environment.
8
t , a2
Let ai
t ,··· , aN
t denote the action chosen by UAV i at time t, and let Ai denote the set of all
possible actions for UAV i. We consider two possible actions for a UAV that correspond
to either joining the relaying task group or the fusion task partition. Therefore, the set of
possible actions are identical across UAVs. We denote the action vector of UAVs at time t
t ), and we refer to the set of all possible action vectors by U. There
by ut = (a1
is a finite set of states S, where state s ∈ S corresponds to the current task partition. A
deterministic transition rule δ governs the transition between states, i.e. δ : S × U → S.
The reward function r maps the current state and action vector to a real value, that is
r : S × U → R. At the beginning of each time step, the UAVs observe the current state
(this information is obtained by the feedback from the previous step). Then, each UAV
independently decides on its action (i.e. which task group to join) without knowing any
information about actions of the other agents. The rewards associated with the UAVs'
actions are computed by the PU receiver and the UAV fusion. The reward is basically the
gain obtained from the task partitioning, taking into account the utilities of the PU and the
UAV network. After the reward is calculated, a feedback message from the PU receiver and
the UAV fusion is broadcasted to the UAVs. This feedback message contains the reward
and the current task partitions.
The feedback information is used to update and maintain local Q-tables at each UAV. A
Q-table basically represents the quality of different actions for a given state. For instance,
qi
t(s, a) denotes the quality of action a at state s for UAV i at time t. Individual Q-tables are
updated as follows. At first, the tables are initialized with qi
0(s, a) = 0. Then, the following
equation is used to update the Q-tables:
qi
t+1(s, a) =
qi
t(s, a),
if s (cid:54)= st or a (cid:54)= ai
t,
(1 − α) qi
α ·(cid:0)rt + β · maxa(cid:48)∈Ai qi
t(s, a)+
t(δ(st, ut), a(cid:48))(cid:1),
otherwise,
(14)
where 0 ≤ α < 1 is the learning rate, rt is the reward or the gain obtained at time t, as
defined in the system model, and 0 ≤ β < 1 is the discount factor to control the weight of
future rewards in the current decisions.
The main idea is that in our distributed environment, the UAVs are unable to keep a
global Q-table, corresponding to the current action vectors, i.e. Q : S × U → R. Instead,
each UAV i keeps a local (and considerably smaller) Q-table which cares about its own
9
current action, i.e. qi : S × Ai → R. This approach significantly reduces the complexity
of the algorithm and eliminates the need for coordination (or sharing information) with
other UAVs at the time of decision making. However, we need a projection method that
compresses the information of the global Q-table into the local small tables.
The results in [13] prove that in a deterministic multi-agent Markov decision process
and for the same sequence of states and actions, if every independent learner chooses locally
optimal actions, the result would be the same as choosing the optimal action from a global
table. We utilize this result and consider an optimistic projection method that assumes each
UAV chooses the maximum quality action from its local table. This reasonable assumption
is a necessary condition for the optimality of the learning algorithm. It is worth noting that
the existence of a unique optimal solution is the sufficient condition for the optimality of
this algorithm. It means that there should be a unique task partition, which results in the
maximum total utility. If multiple task partitions yield the maximum utility, it is possible
that the UAVs act optimally and choose the optimal actions in their local Q-tables, but
the combination of their actions may not be optimal. In this case, message passing among
UAVs is needed as they need to coordinate decisions at every step.
It should also be noted that in learning algorithms we need a balance between exploring
new actions and exploiting the previously learned quality of actions. Therefore, a greedy
strategy that always exploits the Q-table and chooses the optimal action from the Q-table
may not provide enough exploration for the UAV to guarantee an optimal performance. A
very common approach is to add some randomness to the policy [27]. We use -greedy with
a decaying exploration, in which a UAV chooses a random exploratory action at state s with
probability (s) = c/n(s), where 0 < c < 1 and n(s) is the number of times the state s
has been observed so far. The UAV exploits greedily from its Q-table with probability of
1− (s). In this approach, the probability of exploration decays over time as the UAVs learn
more.
Similar to the original Q-learning for a single agent environments, the proposed learning
algorithm converges if the state-action pairs are observed infinitely many times. Also, the
time complexity of the algorithm is in the order of O(S×Ai), where S is the size of the
state space, and Ai is the size of action space for UAV i. Since there are only two possible
actions in our application, the complexity can be expressed as O(S). In terms of space
complexity, each UAV i needs to keep a table of size S × Ai.
10
Figure 4: Topology for 2 UAVs in a 100 x 100 mission area.
4. Simulation Results
In this section, we present the simulation results to evaluate the performance of the
proposed method. We simulate our system model for a ground-based primary transmitter-
receiver pair along with the pair of source and fusion for the UAV network. The location
of primary users, source and fusion are fixed during the simulation. However, the UAVs are
distributed randomly in the environment. The channels between nodes i and j are obtained
from hi,j ∼ CN (0, d−2
i,j ), where di,j is the distance between nodes i and j. The duration of
one time slot, T , is assumed to be equal to 1. The values of γ1 , γ2 and γ3 are set to 2, 2
and 0.4, respectively.
Scenario I: 2 UAVs
In the first scenario, we consider two UAVs to be partitioned into two task groups. The
network topology for this scenario is demonstrated in Fig. 4. Since in this scenario we
only have 2 nodes, the possible states for task allocation is equal to 22 = 4. Hence, the
Q-tables will be learned after a few iterations. Fig. 5 illustrates the summation of the
obtained throughput. The convergence to the optimal task allocation occurs after the 35th
iteration, since the number of states is relatively small. The matrix below shows the final
task allocation values for these UAVs.
(cid:104)
(cid:105)
0 1
11
Figure 5: Sum Rate for 2 UAVs for 100 iterations
In this notation, 0 corresponds to the set of source-fusion and 1 means the set of the primary
users. UAV1 who has a lower relative distance to the source-fusion, is allocated to the fusion
set, while UAV2 is allocated to the another set to relay for the primary network.
Scenario II: 6 UAVs
In this scenario, we consider 6 UAVs to show that the convergence of the proposed method
is achieved after more iterations compared to the case of 2 UAVs in the first scenario, since
the number of states with 6 nodes is equal to 26 = 64. This means, at least 64 iterations are
required for the algorithm to just test all the states.
Fig. 6 demonstrates the network topology with these 6 UAVs for the primary user and
the fusion. As we can see in Fig. 7, the convergence to the best task allocation occurred
after 240 iterations. This implies that the more UAVs are added to the model, the more
iterations will be taken to the convergence epoch. Moreover, Fig. 8 shows the number
task partitions) in this scenario. After the 240th
of UAVs switching their actions (i.e.
iteration, when the convergence happens, we see that no UAV changes its task partition,
and the number of switches stays at zero.
Also, task matrix shown below denotes the final task allocation for the 6 UAVs.
(cid:104)
(cid:105)
1 0 1 0 0 1
12
Figure 6: Topology for 6 UAVs in 100 x 100 simulation field
Based on this matrix, UAVi; i ∈ {2, 4, 5} are considered for the set of source-fusion and the
rest of UAVs are assigned to the relay task group for the primary network. This allocation
makes sense considering the location of UAVs and their relative distances.
5. Conclusion
In this paper, we studied the task allocation problem for spectrum management in UAV
networks. We considered a cooperative relay system in which a group of UAVs provide
relaying service for a ground-based primary user in exchange for spectrum access. The
borrowed spectrum is not necessarily used by the relay UAV, rather is used by other UAVs
to transmit their own information to a fusion center. This makes a win-win situation for
both networks. We defined utilities for both the UAV network and the ground-based primary
network based on the achieved rates. Next, we proposed a distributed learning algorithm
by which the UAVs take proper decisions by joining the relaying or fusion task groups
without the need for information exchange or knowledge about other UAV's decisions. The
algorithm converges to the optimal task partitioning that maximizes the total utility of the
system. Simulation results were presented in different scenarios to verify the convergence of
the proposed algorithm.
13
Figure 7: Sum Rate for 6 UAVs for 1000 Iterations
References
[1] Afghah, F., Costa, M., Razi, A., Abedi, A., Ephremides, A., Dec 2013. A reputation-based stackelberg
game approach for spectrum sharing with cognitive cooperation. In: Decision and Control (CDC), 2013
IEEE 52nd Annual Conference on. pp. 3287 -- 3292.
[2] Afghah, F., Razi, A., May 2014. Cooperative spectrum leasing in cognitive radio networks. In: 2014
National Wireless Research Collaboration Symposium. pp. 106 -- 111.
[3] Afghah, F., Shamsoshoara, A., Njilla, L., Kamhoua, C., 2018. A reputation-based stackelberg game
model to enhance secrecy rate in spectrum leasing to selfish iot devices. arXiv preprint arXiv:1802.05832.
[4] Afghah, F., Zaeri-Amirani, M., Razi, A., Chakareski, J., Bentley, E., June 2018. A coalition formation
approach to coordinated task allocation in heterogeneous uav networks. In: 2018 Annual American
Control Conference (ACC). pp. 5968 -- 5975.
[5] Al-Talabani, A., Deng, Y., Nallanathan, A., Nguyen, H. X., 2016. Enhancing secrecy rate in cognitive
radio networks via stackelberg game. IEEE Transactions on Communications 64 (11), 4764 -- 4775.
[6] Chalkiadakis, G., Boutilier, C., 2003. Coordination in multiagent reinforcement learning: A bayesian
approach. In: Proceedings of the Second International Joint Conference on Autonomous Agents and
Multiagent Systems. AAMAS '03. ACM, New York, NY, USA, pp. 709 -- 716.
URL http://doi.acm.org/10.1145/860575.860689
[7] Guestrin, C., Lagoudakis, M. G., Parr, R., 2002. Coordinated reinforcement learning. In: Proceedings of
the Nineteenth International Conference on Machine Learning. ICML '02. Morgan Kaufmann Publishers
Inc., San Francisco, CA, USA, pp. 227 -- 234.
[8] Khaledi, M., Rovira-Sugranes, A., Afghah, F., Razi, A., June 2018. On greedy routing in dynamic
14
Figure 8: Number of Switching UAVs for 1000 iterations
uav networks. In: 2018 IEEE International Conference on Sensing, Communication and Networking
(SECON Workshops). pp. 1 -- 5.
[9] Korenda, A., Amirani, M. Z., Afghah, F., March 2017. A hierarchical stackelberg-coalition formation
game theoretic framework for cooperative spectrum leasing. In: 51th Annual Conference on Information
Systems and Sciences (CISS'17). pp. 1 -- 6.
[10] Lan, T., Kao, D., Chiang, M., Sabharwal, A., 2010. An axiomatic theory of fairness in network resource
allocation. IEEE.
[11] Laneman, J. N., Tse, D. N., Wornell, G. W., 2004. Cooperative diversity in wireless networks: Efficient
protocols and outage behavior. IEEE Transactions on Information theory 50 (12), 3062 -- 3080.
[12] Laneman, J. N., Wornell, G. W., Tse, D. N., 2001. An efficient protocol for realizing cooperative
diversity in wireless networks. In: Information Theory, 2001. Proceedings. 2001 IEEE International
Symposium on. IEEE, p. 294.
[13] Lauer, M., Riedmiller, M. A., 2000. An algorithm for distributed reinforcement learning in cooperative
multi-agent systems. In: Proceedings of the Seventeenth International Conference on Machine Learning.
ICML '00. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, pp. 535 -- 542.
URL http://dl.acm.org/citation.cfm?id=645529.658113
[14] Levin, G., Loyka, S., 2012. Amplify-and-forward versus decode-and-forward relaying: which is better?
In: 22th International Zurich Seminar on Communications (IZS). Eidgenossische Technische Hochschule
Zurich, pp. 123 -- 126.
[15] Mousavi, S., Afghah, F., Ashdown, J. D., Turck, K., April 2018. Leader-follower based coalition forma-
tion in large-scale uav networks, a quantum evolutionary approach. In: IEEE INFOCOM 2018 - IEEE
Conference on Computer Communications Workshops (INFOCOM WKSHPS). pp. 882 -- 887.
15
[16] Mousavi, S., Schukat, M., Howley, E., Borji, A., Mozayani, N., 2016. Learning to predict where to look
in interactive environments using deep recurrent q-learning. arXiv preprint arXiv:1612.05753.
[17] Mousavi, S. S., Schukat, M., Howley, E., 2016. Deep reinforcement learning: an overview. In: Proceed-
ings of SAI Intelligent Systems Conference. Springer, pp. 426 -- 440.
[18] Mousavi, S. S., Schukat, M., Howley, E., 2017. Traffic light control using deep policy-gradient and
value-function-based reinforcement learning. IET Intelligent Transport Systems 11 (7), 417 -- 423.
[19] Mousavi, S. S., Schukat, M., Howley, E., Mannion, P., 2017. Applying q (λ)-learning in deep reinforce-
ment learning to play atari games. AAMAS Adaptive Learning Agents (ALA) Workshop.
[20] Mozaffari, M., Saad, W., Bennis, M., Debbah, M., 2016. Optimal transport theory for power-efficient
deployment of unmanned aerial vehicles. In: Communications (ICC), 2016 IEEE International Confer-
ence on. IEEE, pp. 1 -- 6.
[21] Namvar, N., Afghah, F., March 2015. Spectrum sharing in cooperative cognitive radio networks: A
matching game framework. In: 2015 49th Annual Conference on Information Sciences and Systems
(CISS). pp. 1 -- 5.
[22] Peng, H., Razi, A., Afghah, F., Ashdown, J. D., 2018. A unified framework for joint mobility prediction
and object profiling of drones in uav networks. CoRR abs/1808.00058.
[23] Razi, A., Afghah, F., Chakareski, J., Oct 2017. Optimal measurement policy for predicting uav network
topology. In: 2017 51st Asilomar Conference on Signals, Systems, and Computers. pp. 1374 -- 1378.
[24] Roberge, V., Tarbouchi, M., Labont´e, G., 2013. Comparison of parallel genetic algorithm and particle
swarm optimization for real-time uav path planning. IEEE Transactions on Industrial Informatics 9 (1),
132 -- 141.
[25] Shafiee, S., Ulukus, S., 2007. Achievable rates in gaussian miso channels with secrecy constraints. In:
Information Theory, 2007. ISIT 2007. IEEE International Symposium on. IEEE, pp. 2466 -- 2470.
[26] Shamsoshoara, A., Darmani, Y., 2015. Enhanced multi-route ad hoc on-demand distance vector routing.
In: Electrical Engineering (ICEE), 2015 23rd Iranian Conference on. IEEE, pp. 578 -- 583.
[27] Singh, S., Jaakkola, T., Littman, M. L., Szepesv´ari, C., March 2000. Convergence results for single-step
on-policy reinforcement-learning algorithms. Machine Learning. 38 (3), 287 -- 308.
[28] STAMFORD, C., Feb 2017. Gartner says almost 3 million personal and commercial drones will be
shipped in 2017.
URL http://www.gartner.com/newsroom/id/3602317
[29] Stanojev, I., Simeone, O., Bar-Ness, Y., Yu, T., May 2008. Spectrum leasing via distributed cooperation
in cognitive radio. In: 2008 IEEE International Conference on Communications. pp. 3427 -- 3431.
[30] Stanojev, I., Yener, A., 2013. Improving secrecy rate via spectrum leasing for friendly jamming. IEEE
Transactions on Wireless Communications 12 (1), 134 -- 145.
[31] Watkins, C. J., Dayan, P., 1992. Q-learning. Machine learning 8 (3-4), 279 -- 292.
[32] Wu, Y., Liu, K. R., 2011. An information secrecy game in cognitive radio networks. IEEE Transactions
on Information Forensics and Security 6 (3), 831 -- 842.
[33] Zhang, P., Yuan, J., Chen, J., Wang, J., Yang, J., April 2009. Analyzing amplify-and-forward and
decode-and-forward cooperative strategies in wyner's channel model. In: 2009 IEEE Wireless Commu-
nications and Networking Conference. pp. 1 -- 5.
16
|
1909.01239 | 1 | 1909 | 2019-09-03T15:11:00 | Threshold Greedy Based Task Allocation for Multiple Robot Operations | [
"cs.MA"
] | This paper deals with large-scale decentralised task allocation problems for multiple heterogeneous robots with monotone submodular objective functions. One of the significant challenges with the large-scale decentralised task allocation problem is the NP-hardness for computation and communication. This paper proposes a decentralised Decreasing Threshold Task Allocation (DTTA) algorithm that enables parallel allocation by leveraging a decreasing threshold to handle the NP-hardness. Then DTTA is upgraded to a more practical version Lazy Decreasing Threshold Task Allocation (LDTTA) by combining a variant of Lazy strategy. DTTA and LDTTA can release both computational and communicating burden for multiple robots in a decentralised network while providing an optimality bound of solution quality. To examine the performance of the proposed algorithms, this paper models a multi-target surveillance scenario and conducts Monte-Carlo simulations. Simulation results reveal that the proposed algorithms achieve similar function values but consume much less running time and consensus steps compared with benchmark decentralised task allocation algorithms. | cs.MA | cs | Threshold Greedy Based Task Allocation for Multiple Robot
Operations (cid:63)
Teng Li a, Hyo-Sang Shin* a, Antonios Tsourdos a
aCranfield University, Cranfield MK43 0AL, UK
9
1
0
2
p
e
S
3
]
A
M
.
s
c
[
1
v
9
3
2
1
0
.
9
0
9
1
:
v
i
X
r
a
Abstract
This paper deals with large-scale decentralised task allocation problems for multiple heterogeneous robots with monotone
submodular objective functions. One of the significant challenges with the large-scale decentralised task allocation problem
is the NP-hardness for computation and communication. This paper proposes a decentralised Decreasing Threshold Task
Allocation (DTTA) algorithm that enables parallel allocation by leveraging a decreasing threshold to handle the NP-hardness.
Then DTTA is upgraded to a more practical version Lazy Decreasing Threshold Task Allocation (LDTTA) by combining a
variant of Lazy strategy. DTTA and LDTTA can release both computational and communicating burden for multiple robots in
a decentralised network while providing an optimality bound of solution quality. To examine the performance of the proposed
algorithms, this paper models a multi-target surveillance scenario and conducts Monte-Carlo simulations. Simulation results
reveal that the proposed algorithms achieve similar function values but consume much less running time and consensus steps
compared with benchmark decentralised task allocation algorithms.
Key words: Multi-robot systems, decentralised task allocation, submodular welfare maximisation, lazy decreasing threshold.
1 Introduction
Multi-Robot Systems (MRS) have been gaining increas-
ing attention thanks to their ability to coordinate simul-
taneous or co-operate to achieve common goals. MRS
provides some fundamental strengths that could not be
achieved with single-agent systems, e.g., increased flex-
ibility, enhanced reliability and resilience, simultaneous
broad area coverage or capability to operate outside
the communication range of base stations. Specific ap-
plications under consideration include search and res-
cue [25, 38], precision agriculture [5, 28], and large area
surveillance [1, 8, 19, 27].
Efficient cooperation of MRS is a vital part for their suc-
cessful operations and effective assignment, termed as
task allocation, of the available resources is the key en-
abler of such cooperation. This is because the strength
of MRS hinges on the distributed nature of the sensing
resources available, making the successful assignment of
(cid:63)
* Corresponding author.
Email addresses: [email protected] (Teng Li),
[email protected] (Hyo-Sang Shin*),
[email protected] (Antonios Tsourdos).
these resources key to maximising its operational advan-
tages.
The main issue with the task allocation problem is that
it has been proven to be NP-hard in general [41]. This
means that task allocation problems require exponential
time to be solved optimally, thus require a careful craft of
approximation strategies. A key trade-off that must be
performed concerns the optimality of the solution versus
the computational complexity.
In terms of handling the NP-hardness of computation,
extensive approaches have been developed, e.g., the
heuristic approach and the approximation approach.
Heuristic approach involves genetic algorithm [3,22,46],
ant colony optimisation [6, 20, 35], market-based al-
gorithms [9, 15, 26, 30, 34] etc.. Heuristic algorithms
can achieve feasible solutions with certain convergence
speed. However, these algorithms cannot provide any
approximation guarantee for the solution quality. Ap-
proximation approach solves task allocation problems
efficiently while providing an optimality bound of solu-
tion quality [10,11,13,16,18,24,33,36,37,39,40,42,44,45],
if the problem meets certain conditions, e.g., submod-
ularity. Submodularity is a ubiquitous feature in the
optimisation problems where the marginal gain of one
element will diminish as more elements have already
Preprint submitted to Automatica
4 September 2019
been selected [4]. The detailed definition of submodu-
larity will be given in Section 2. It is well known that
the Sequential Greedy Algorithm (SGA) can provide
an optimality bound of 1/2 for maximising monotone
submodular objective functions subject to a partition
matroid constraint [31].
This paper focuses on task allocation algorithms that
utilise the approximation approach and can be lever-
aged for decentralised task allocation. Note that in a
centralised architecture, all the agents and environment
data is communicated to a centralised entity. This may
not be possible in some realistic scenarios because re-
lying on a central entity could remove resilience or the
bandwidth to communicate all the information may not
be available. Capability to be decentralised can relax
such issues and thus enabling decentralisation provides
an option that could be beneficial for extending MRS
operations in practice.
The decentralised approximation approach has been fre-
quently applied in the task allocation of MRS applica-
tions. The work [36] presented a distributed SGA for
a large group of earth-observing satellites to automat-
ically assign themselves locations based on their local
information and communication. Williams et al. [44] in-
vestigated the surveillance mission in an urban environ-
ment applying decentralised SGA with the consideration
of the intersection of multiple matroid constraints. Sun
et al. [42] solved the multi-agent coverage problems us-
ing distributed SGA in an environment with obstacles
and provided a tighter optimality bound by analysing
the curvature of submodularity. The decentralised ap-
proximation approach was also applied in search and lo-
calisation [13] and sensor network [10, 24] to get a task
allocation solution efficiently.
The communicating complexity is another aspect of the
NP-hardness in the decentralised task allocation prob-
lems. In decentralised networks, robots need to commu-
nicate with each other frequently and make a consensus
before they can find an effective task allocation solution.
Too many consensus steps could impact the efficiency of
the task allocation process and put a heavy burden on
the onboard communicating units.
In terms of relaxing the communicating complexity, sev-
eral works of the decentralised approximation approach
have been studied to reduce the reliance on the global in-
formation consensus. The benchmark decentralised task
allocation algorithm CBBA [9] can provide an undimin-
ished optimality bound of 1/2 and reduce communicat-
ing complexity by building task bundles. These task bun-
dles enable parallel task allocation hence reducing the
number of global information consensus steps. However,
as mentioned in [9], robots need to rebuild their bundles
continually once any constraint conflict appears. The is-
sue with the bundle rebuilding is that evaluating objec-
tive functions is usually time-consuming, which incurs
observably increased computational complexity. Ghare-
sifard et al. [16] provided lower bounds on the perfor-
mance of the distributed SGA according to the network
topology where each agent only had limited information
of other agents' selections. Grimsman et al. [18] extended
the work of Gharesifard et al. [16] and suggested the
best system topology design. Although these two works
reduced the communicating complexity of distributed
SGA, the quality of solutions without global informa-
tion consensus was also discounted. To handle this is-
sue, Qu et al. [37] proposed an assumption of admissible
task sets for a group of observing satellites. With the
help of this assumption, distributed SGA could achieve
an undiminished optimality bound even though only lo-
cal information and communication were accessible. The
assumption is reasonable for homogeneous and spatially
static agents, but difficult to be applied for general het-
erogeneous moving MRS.
Previous works indicate that the goals of reducing com-
putational complexity, reducing communicating com-
plexity, and achieving good solution quality are usually
conflicting in the large-scale task allocation problems,
unless resorting to particular assumptions [11, 37]. One
intuitive research question would be how to balance
these goals in general large-scale task allocation prob-
lems.
This paper aims to develop decentralised algorithms
that can reduce both computational and communicat-
ing complexity while retaining a good optimality bound
of the solution for general heterogeneous MRS in large-
scale task allocation problems. To this end, we propose
an efficient decentralised task allocation algorithm,
which is named as Decreasing Threshold Task Alloca-
tion (DTTA), by leveraging a decreasing threshold [2, 7]
to the decentralised SGA.
In each iteration of the original decentralised SGA, each
robot is required to evaluate all the remaining tasks
then make a consensus with other robots to find a task-
robot pair that can provide the largest marginal value.
Hence, only one task can be allocated during each con-
sensus step with SGA. The exploitation of the decreas-
ing threshold concept relaxes this limitation. Hence, our
proposition allows DTTA to consume fewer numbers of
objective function evaluations and consensus steps and
hence to reduce computational and communicating com-
plexity.
This paper also extends the proposed DTTA algorithm
to a more practical version, Lazy Decreasing Thresh-
old Task Allocation (LDTTA), by combining a vari-
ant of the Lazy Greedy [29]. In LDTTA, the remaining
tasks are sorted in descending order according to their
marginal values. During each iteration of LDTTA, we
propose each robot to reevaluate the first element from
the sorted remaining tasks and to compare it with the
current threshold instead of the second element which
2
is used in the original Lazy Greedy algorithm [29]. The
Lazy Greedy concept developed could further relax the
computational and communicating complexity.
The proposed DTTA and LDTTA algorithms enable
parallel allocation with the help of a decreasing thresh-
old instead of building task bundles [9] or making partic-
ular assumptions [11, 37]. To the best of our knowledge,
this paper is the first work that can enable parallel allo-
cation without incurring increased computational com-
plexity or resorting to additional specific assumptions.
Theoretical analysis reveals that DTTA and LDTTA
achieve an optimality bound of at least (1/2 − ) with
computational complexity of O( r
) for each robot,
where r = T is the number of tasks. Here, is a thresh-
old decreasing parameter for the trade-off of solution
quality versus computational and communicating com-
plexity. As expected, LDTTA outperforms DTTA, espe-
cially in terms of computational complexity.
ln r
The performances of DTTA and LDTTA are validated
via numerical simulations. For the simulation-based val-
idation, a scenario of multi-target surveillance mission
using multiple heterogeneous UAVs is modelled. Monte-
Carlo simulations are conducted to compare the per-
formances of DTTA and LDTTA with those of SGA
and CBBA. Simulation results demonstrate that the
proposed algorithms achieve almost the same objective
function values, but consume much less running time and
consensus steps, compared with benchmark algorithms.
The simulation results also confirm that the trade-off of
solution quality, running time, and consensus steps can
be obtained by adjusting the threshold decreasing pa-
rameter .
The rest of the paper is organised as follows. Section 2
provides basic concepts and definitions. The proposed
algorithm is described in detail and analysed in Section
3. Section 4 models a surveillance scenario and compares
the performances of DTTA and LDTTA with those of
benchmark algorithms through numerical simulations. A
summary of contributions and future research directions
are offered in Section 5.
2 Preliminaries
This section presents the necessary definitions and fun-
damental concepts that are related to the proposed de-
centralised task allocation algorithms.
Definition 1 (Task Allocation) The task allocation
problem is to allocate a set of tasks T to a set of robots
A so as to maximise the total value measured as
fa(Ta),
(1)
3
f (T ,A) =
(cid:88)
a∈A
where Ta is the subset of tasks allocated to robot a, fa :
2N → R≥0 is the objective function for robot a. The
notations introduced in this definition are also used in
the following part of this paper.
Definition 2 (Submodularity [14]) A set function f :
2N → R is submodular, if ∀ X, Y ⊆ N ,
f (X) + f (Y ) ≥ f (X ∩ Y ) + f (X ∪ Y ),
where N is a finite set. Equivalently, ∀ A ⊆ B ⊆ N and
u ∈ N\B,
f (A ∪ {u}) − f (A) ≥ f (B ∪ {u}) − f (B).
(2)
Eqn. (2) is known as the diminishing returns, which is
an important property of submodular functions. Specif-
ically, the marginal gain of a given element u will never
increase as more elements have already been selected.
Definition 3 (Marginal gain [23]) For a set function
f : 2N → R, a set S ⊆ N , and an element u ∈ N , define
the marginal gain of u given S as
∆f (uS) := f (S ∪ {u}) − f (S).
Definition 4 (Monotonicity [23]) A set function f :
2N → R is monotone, if ∀A ⊆ B ⊆ N , f (A) ≤ f (B). f
is non-monotone if it is not monotone.
This paper only considers monotone normalised (i.e.
f (∅) = 0) non-negative (i.e. f (S) ≥ 0, ∀S ⊆ N ) sub-
modular objective functions.
Definition 5 (Matroid [2]) A matroid is a pair M =
(N ,I) where N is a finite set, and I ⊆ 2N is a collection
of independent sets, satisfying:
• ∅ ∈ I
• if A ⊆ B, B ∈ I, then A ∈ I
• if A, B ∈ I,A < B, then ∃ u ∈ B\A such that A ∪
{u} ∈ I.
Specifically, matroid constraints include uniform ma-
troid constraint and partition matroid constraint. The
uniform matroid constraint is also called cardinality con-
straint which is a special case of matroid constraint
where any subset S ⊆ N satisfying S ≤ k is indepen-
dent. Partition matroid constraint means that a subset
S can contain at most a certain number of elements from
each of the disjoint partitions.
In this paper, one task can only be allocated to at most
one robot, but one robot can take more than one task.
Therefore, the task allocation problem can be solved as
submodular maximisation subject to a partition matroid
constraint, which is also known as Submodular Welfare
Maximisation (SWM) [39, 43].
3 Algorithms and Analysis
This section describes the proposed task allocation algo-
rithms and analyses their theoretical performances in de-
tails. First, the basic decentralised task allocation algo-
rithm DTTA is introduced in Algorithm 1. Then, DTTA
is extended to a more practical version (i.e., LDTTA)
as presented in Algorithm 2 by developing and combin-
ing a variant of the Lazy Greedy strategy [29]. Finally,
the theoretical performances of the proposed algorithms
are analysed through an equivalent reformed decreasing
threshold greedy algorithm for submodular maximisa-
tion subject to a partition matroid constraint in Algo-
rithm 3.
3.1 Algorithms
Let us discuss the details of the DTTA and LDTTA al-
gorithms. DTTA and LDTTA consist of two phases: ini-
tialisation phase (Algorithm 1, lines 1∼4; Algorithm 2,
lines 1∼10) and task assignment phase (Algorithm 1,
lines 5∼21; Algorithm 2, lines 11∼35). Na is the set that
contains the remaining tasks for robot a. A is an auxil-
iary set that contains the ids of robots who are assigned
tasks during each iteration. A = ∅ means that no robot
can find a qualified task under the current threshold,
which is a trigger of decreasing the threshold (Algorithm
1, line 6; Algorithm 2, line 12). A qualified task is a task
whose marginal value for robot a given the selected task
list Ta is no less than the current threshold θ. J is an
auxiliary set that contains the corresponding task ids
that are assigned to robots in A during each iteration.
Wa is an auxiliary set that contains the marginal values
of tasks from Na in Algorithm 2.
a
In the initialisation phase, robot a conducts preparatory
work. Robot a evaluates all tasks from Na and finds the
largest marginal value ωmax
(Algorithm 1, line 2; Algo-
rithm 2, lines 2∼8). After getting its ωmax
, robot a makes
a consensus with other robots through the M axCons
function to find the globally largest marginal value ωmax
(Algorithm 1, line 3; Algorithm 2, line 9). The value of
ωmax
a∗ will be set as the initial threshold value d (Algo-
rithm 1, line 4; Algorithm 2, line 10).
a∗
a
a and ω∗
In the task assignment phase, robot a searches quali-
fied tasks then negotiates with other robots to assign
tasks and solve conflicts. First, robot a tries to find one
qualified task from the remaining tasks in Na. The no-
tations j∗
a are used to store the qualified task
and its marginal value (Algorithm 1, lines 7∼9; Algo-
rithm 2, lines 14∼17). Robot a will stop searching once
it finds one qualified task which is not necessarily the
best one. There is no need to reevaluate all the remain-
ing tasks in Na. Note that, in the decentralised SGA,
each robot needs to reevaluate all the remaining tasks to
find the task that can provide the largest marginal value.
If robot a cannot find a qualified task, the values of ω∗
a
4
and j∗
a will be set as 0 and none, respectively (Algorithm
1, lines 11∼12; Algorithm 2, lines 28∼29). Then, robot
a coordinates with other robots through the M axCoor
function to assign tasks and solve conflicts (Algorithm
1, lines 14∼18; Algorithm 2, lines 18∼23, lines 30∼32).
If no robot can provide a qualified task, then the auxil-
iary set A will be empty, and all robots will reduce the
threshold to the next value θ(1 − ) and reevaluate the
remaining tasks until reaching the stop condition (Algo-
rithm 1, line 5; Algorithm 2, line 11).
fa(jaTa)
while A (cid:54)= ∅ do
r d; θ ← θ(1 − )) do
Algorithm 1 decentralised DTTA for Robot a
Input: fa : 2T → R≥0,T ,A,
Output: A set Ta ⊆ T
1: Ta ← ∅, Na ← T
a ← max
2: ωmax
ja∈Na
a∗ ← M axCons(a, ωmax
3: a∗, ωmax
, r ← T , A ← {a∗}
4: d ← ωmax
a∗
5: for (θ = d; θ ≥
6:
7:
8:
9:
10:
11:
12:
13:
14:
15:
16:
17:
18:
19:
20: end for
21: return Ta
a ← ∆fa(jaTa)
ω∗
a ← ja
j∗
else
a ← 0
ω∗
a ← none
j∗
end if
A, J ← M axCoor(a, j∗
if a ∈ A then
a}
Ta ← Ta ∪ {j∗
end if
Na ← Na\J
end while
if ∃ ja ∈ Na such that ∆fa(jaTa) ≥ θ then
)
a
a, ω∗
a)
a
The function M axCons and M axCoor in Algorithms
1 and 2 represent the communication and negotiation
among all robots. These two functions are described in
details as follows.
• M axCons is the Maximum Consensus function. Robot
a sends its locally best marginal value ωmax
together
with the corresponding robot id a to all its neighbour-
ing robots who have direct communication connections
with robot a. At the same time, robot a also receives the
same kind of information from its neighbouring robots.
After receiving the information from its neighbouring
robots, robot a sends the updated information to all its
neighbouring robots again until no information is up-
dated. In this case, robot a can pass the information for
its neighbouring robots who have no direct connection
between each other. All robots can make a consensus
and finally find the globally largest marginal value ωmax
.
It is proven that the Maximum Consensus function can
reach the convergence in finite time [12, 17, 21, 32]. Note
that this function is only utilised for one time by robot
a in the initialisation phase of the proposed algorithms.
a∗
• M axCoor is defined as the Maximum Coordination
function. Robot a sends the selected task id j∗
a and its
marginal value ω∗
a to all neighbouring robots and re-
ceives such information from its neighbouring robots.
Similar to the function M axCons, M axCoor also con-
ducts a consensus on the information of all robots. Then,
M axCoor returns the auxiliary robot set A and auxil-
iary task set J according to the following criteria: if there
is no conflict between robots (i.e., no task is selected by
more than one robot), then every robot and its qualified
task will be added into A and J, respectively; if there is
any conflict (i.e., more than one robot selects the same
task j∗
a), then the robot who has the largest marginal
value for the task j∗
a will be added into A, and the task
j∗
a will be added into J; if the input variable ω∗
a from
all robots are zeroes, then both A and J will be empty
which triggers the decrease of the threshold θ. With this
strategy, more than one task could be allocated during
one iteration, which can reduce the number of task as-
signment iterations and consensus steps.
In the original Lazy greedy [29], the updated marginal
value of the first element from the sorted remaining ele-
ment list is compared with the formerly second marginal
value. Instead, the updated first marginal value is com-
pared with the current threshold in the variant of lazy
greedy. The proposed new lazy greedy strategy is also
applicable for the general decreasing threshold greedy
algorithm [2].
Note that algorithm 2 could help robot a to find qualified
tasks in a more efficient way than Algorithm 1 in prac-
tice. In the initialisation phase of Algorithm 2, robot a
evaluates the tasks in Na and sorts them in descending
order according to their marginal values (Algorithm 2,
lines 2∼7). During the task assignment phase of Algo-
rithm 2, robot a checks whether the first marginal value
ωa1 from the sorted marginal value set Wa is no less
than the current threshold θ (Algorithm 2, line 13). If
ωa1 < θ, then there is no need for robot a to continue
searching for qualified tasks under the current thresh-
old because submodularity guarantees that the marginal
value of a task will never increase. Otherwise, robot a
reevaluates the first task ja1 from the sorted task list
Na given the current allocated task set Ta, and updates
the first marginal value ωa1 from the sorted marginal
value set Wa (Algorithm 2, line 14). If this updated ωa1
is still no less than θ, it implies that the first task ja1
from the sorted task list Na is a qualified task for robot
a. Robot a will use this task and its marginal value to
negotiate with other robots (Algorithm 2, lines 15∼23).
Otherwise, robot a re-sorts Wa and Na in decreasing or-
der (Algorithm 2, lines 24∼26). If robot a is unable to
find a qualified task, it still needs to communicate with
other robots and remove the tasks from Na that are se-
lected by other robots to prevent potential conflicts (Al-
gorithm 2, lines 28∼32).
a ← ωa1
)
a
Algorithm 2 decentralised LDTTA for Robot a
Input: fa : 2T → R≥0,T ,A,
Output: A set Ta ⊆ T
1: Ta ← ∅, Na ← T , Wa ← ∅
2: for ja ∈ Na do
ωaj ← ∆fa(jaTa)
Wa ← Wa ∪ {ωaj}
while A (cid:54)= ∅ do
while ωa1 ≥ θ do
ωa1 ← ∆fa(ja1Ta)
if ωa1 ≥ θ then
r d; θ ← θ(1 − )) do
a ← ωa1
ω∗
a ← ja1
j∗
A, J ← M axCoor(a, j∗
if a ∈ A then
a}
Ta ← Ta ∪ {j∗
3:
4:
5: end for
6: Sort Wa in descending order
7: Sort Na according to sorted Wa
8: ωmax
a∗ ← M axCons(a, ωmax
9: a∗, ωmax
10: d ← ωmax
, r ← T , A ← {a∗}
a∗
11: for (θ = d; θ ≥
12:
13:
14:
15:
16:
17:
18:
19:
20:
21:
22:
23:
24:
25:
26:
27:
28:
29:
30:
31:
32:
33:
34: end for
35: return Ta
// ωa1 is the first element of the sorted marginal value
set Wa; ja1 is the first element of the sorted task set Na;
Wa(J) is the set of marginal values that are correspond-
ing to the tasks in J
end if
end while
a ← 0
ω∗
a ← none
j∗
A, J ← M axCoor(a, j∗
Na ← Na\J
Wa ← Wa\Wa(J)
end if
Na ← Na\J
Wa ← Wa\Wa(J)
Re-sort Wa and Na
else
end while
a, ω∗
a)
a, ω∗
a)
3.2 Analysis
Algorithms 1 and 2 have the same theoretical perfor-
mance in terms of both optimality bound and compu-
tational complexity. In each iteration, both algorithms
help robot a to find a qualified task whose marginal
value is no less than the current threshold θ. There-
fore, DTTA and LDTTA achieve the same theoretical
optimality bound. In LDTTA, the remaining tasks from
Na are sorted in descending order according to their
marginal values. Robot a is more likely to find a qual-
ified task from the front positions of Na, requiring less
number of objective function evaluations. This is the rea-
son why LDTTA could be more efficient than DTTA in
practice. However, in the worst case, DTTA and LDTTA
5
if S ∪ {u} /∈ I then
r d; θ ← θ(1 − )) do
Algorithm 3 equivalent Decreasing Threshold Greedy
subject to matroid constraints
Input: f : 2N → R≥0,N ,I, r,
Output: A set S ∈ I
1: S ← ∅, R ← N , Q ← OP T
2: d ← max
u∈N f (u)
3: for (θ = d; θ ≥
for u ∈ R do
4:
5:
6:
7:
8:
9:
10:
11:
12:
13:
c ← u
Sc ← S
S ← S ∪ {c}
Q ← Q ∪ {c}
Let Kc ⊆ Q\S be the smallest set such
Q ← Q\Kc
R ← R\{c}
if ∆f (uS) <
R ← R\{u}
R ← R\{u}
if ∆f (uS) ≥ θ then
that Q\Kc ∈ I
r d then
else
else
14:
15:
16:
17:
18:
19:
20:
21:
22:
23: end for
24: return S
end if
end for
end if
end if
need to evaluate all the remaining tasks to find a quali-
fied task. Therefore, DTTA and LDTTA have the same
computational complexity in theory.
For the convenience of analysing the theoretical per-
formance, DTTA and LDTTA are transformed into an
equivalent centralised version, i.e., Algorithm 3. We con-
sider the ground set as a set of task-agent pairs (N :=
T × A) and each task-agent pair as an element of the
ground set (uj,a := j × a ∀j ∈ T , a ∈ A). Then, only one
task-agent pair can be selected from the task-agent pairs
that are corresponding to the same specific task. All the
combinations of conflict-free task-agent pairs constitute
I, which is denoted as the collection of all independent
sets. Additionally, according to the definition of Task Al-
location, the objective function of one agent has no im-
pact on the objective function of another agent as long
as their selected task sets are disjoint. Therefore, the
task allocation problem can be considered as SWM. We
adapt the analysing strategy from [14] and transform
Algorithms 1 and 2 to Algorithm 3.
In Algorithm 3, Sc, Q and Kc have no impact on the
final solution S. They appear only for analysis: Sc is a set
containing the elements that have already been selected
before the new element c is added into S; Q is a set
that starts as the optimal solution OP T and changes
over time meanwhile keeps containing S; Kc is a set that
contains the element to be removed from Q in order to
keep Q independent.
The theoretical performance of the proposed task allo-
cation algorithms DTTA and LDTTA is summarised in
Theorem 1.
Theorem 1 Both DTTA and LDTTA achieve an opti-
mality bound of at least ( 1
submodular objective functions. The computational com-
plexity for each robot is O( r
number of all tasks, is the threshold decreasing param-
eter.
2 − ) for maximising monotone
), where r = T is the
ln r
The computational complexity can be easily proven as
follows.
PROOF. Assume that there are totally x number of
iterations, then
(1 − )x =
r
.
Solving the above equation yields
x =
ln r
ln 1
1−
≤ 1
ln
r
.
(3)
(4)
For each robot, there are at most r number of tasks to
be evaluated during each iteration. Therefore, the com-
putational complexity for each robot is O( r
ln r
).
In the following, the optimality bound of DTTA and
LDTTA is analysed through Algorithm 3 since they
have precisely the same theoretical approximation per-
formance.
Lemma 1 f (S) > 1
1+ f (Q).
PROOF. At the end of each iteration in Algorithm 3,
Q is always independent and contains S, i.e. S ⊆ Q ∈
I. The property of independent systems implies that
S ∪{q} ∈ I ∀q ∈ Q\S. At the termination of Algorithm
r d ∀q ∈ Q\S and f (S) ≥ d. Clearly,
3, ∆f (qS) <
Q\S ≤ r, thus(cid:88)
∆f (qS) <
d
r
(cid:88)
q∈Q\S
≤ · Q\S
r
≤ · f (S).
f (S)
q∈Q\S
6
Let Q\S = {q1, q2,··· , qQ\S}, then
f (Q) − f (S) =
≤
Q\S(cid:88)
Q\S(cid:88)
(cid:88)
i=1
i=1
∆f (qiS)
∆f (qS)
q∈Q\S
=
< · f (S).
∆f (qiS ∪ {q1,··· , qi−1})
(submodularity)
Rearranging the above inequation yields
{Kc}c∈S and {Kc\S}c∈S are disjoint. According to the
evolution of Q, the set Q can be rewritten as
Q = (OP T\∪c∈S Kc)∪S = (S∪OP T )\∪c∈S (Kc\S).
(9)
Denote S as {c1, c2,··· , cS}. It is clear that Sci ⊆ S ⊆
(S ∪ OP T )\ ∪c∈S (Kc\S). Using Eqn. (9), we have
f (Q) = f ((S ∪ OP T )\ ∪c∈S (Kc\S))
= f (S ∪ OP T )
= f (S ∪ OP T )
− ∆f (∪c∈S(Kc\S)(S ∪ OP T )\ ∪c∈S (Kc\S))
f (S) >
1
1 +
f (Q).
−
∆f ((Kci\S)(S ∪ OP T )\ ∪1≤j≤i (Kcj\S))
S(cid:88)
S(cid:88)
i=1
≥ f (OP T )
i=1
≥ f (OP T ) −
S(cid:88)
≥ f (OP T ) −(cid:88)
> f (OP T ) −(cid:88)
c∈S
i=1
Lemma 1 indicates that, at the termination of Algorithm
3, f (S) gets a close value to f (Q) if the value of is
small enough. This implies the elements in Q\S, whose
marginal values are less than
r d, have very limited con-
tribution to f (S). Likewise, if the marginal value of a
task for a robot is less than
r d, then we consider this
task negligible for this robot. This is the reason why we
choose
r d as the terminal threshold. The task allocation
algorithm terminates when all marginal values of the re-
maining tasks are less than
Lemma 2 f (Q) > f (OP T ) − 1
r d.
1− f (S).
PROOF. According to the property of matroid, Kc
contains at most one element. Therefore,
Kc\S ≤ 1.
(5)
In the iteration where the element c is selected, it implies
that the marginal value of c is no less than the current
threshold θ, i.e.
∆f (cSc) ≥ θ.
(6)
If an element q ∈ Kc\S was not selected before this
iteration, then it implies that
∆f (qSc) < θ/(1 − ).
(7)
Combining Eqns. (6) and (7), we get
∆f (cSc) > (1 − )∆f (qSc) ∀q ∈ Kc\S.
(8)
Additionally, in the iteration when Kc (cid:54)= ∅, the element
contained in Kc in this iteration will never appear in
the Kc again in other iterations. This implies that both
7
−
∆f ((Kci\S)(S ∪ OP T )\ ∪1≤j≤i (Kcj\S))
∆f ((Kci\S)Sci)
(cid:88)
∆f (qSc)
(cid:88)
q∈Kc\S
∆f (cSc)
(submodularity)
(submodularity)
c∈S
q∈Kc\S
1
1 −
1
1 −
· f (S).
· f (S)
= f (OP T ) − Kc\S ·
≥ f (OP T ) − 1
1 −
(Eqn. (8))
(Eqn. (5))
The proof of Theorem 1 is completed by combining
Lemma 1 and Lemma 2,
f (S) >
1 −
2 − 2 · f (OP T ) > (
1
2
− )f (OP T ).
According to the analytical results, the trade-off between
the approximation ratio and computational complexity
can be obtained by adjusting the threshold decreasing
parameter .
4 Numerical Simulations
This section verifies the proposed algorithms through
Monte-Carlo simulations. The simulation scenario is
modelled as a multi-target surveillance mission using a
group of heterogeneous UAVs.
4.1 Surveillance Scenario Modelling
For validation, we develop a simple model of the surveil-
lance scenario. In the model, it is assumed that there are
a set of heterogeneous tasks (T ) that are randomly lo-
cated on a L×L 2-D space. A set of heterogeneous UAVs
(A) equipped with different sensors is sent to carry out
these tasks automatically. The task allocation mission
aims to maximise the overall objective function value
while using as less running time and consensus steps as
possible. The constraint is that one task can only be al-
located to one UAV, but one UAV can carry out multiple
tasks.
The objective function of the surveillance mission for
UAV a is modelled as:
fa(Ta) =
majvjλτ (pj
a)
d
λσ(pj
a)
n
.
(10)
Ta(cid:88)
j=1
A(cid:88)
Ta(cid:88)
The overall objective function of the task allocation for
the surveillance mission can be obtained by combining
Eqns. (1) and (10):
f (T ,A) =
majvjλτ (pj
a)
d
λσ(pj
a)
n
(11)
a=1
j=1
where Ta ⊆ T is the task list containing all the tasks
that are selected by UAV a in sequence, pa is the path of
UAV a generated according to the order that the tasks
appear in Ta, pj
a represents the part of pa from the initial
position of UAV a to the position of task j, τ (pj
a) is the
length of the path fragment pj
a) is the number
of tasks within the path fragment pj
a.
a, and σ(pj
Four factors are considered in the objective function of
the surveillance mission.
• Task importance factor vj: Different tasks have differ-
ent values that are marked with an importance factor
vj ∈ (0, 1]. UAVs tend to give priority to carrying out
the tasks that are more valuable than others.
• Task-UAV fitness factor maj: Tasks with different
properties require different sensors to be detected effec-
tively. Therefore, the fitness factor maj ∈ (0, 1] reflects
the match fitness between the task j and UAV a.
• Distance discount factor λd: The mission should be
completed as soon as possible. With the help of the dis-
tance discount factor λd ∈ (0, 1], UAVs intend to carry
out the nearest tasks to them firstly, and the lengths of
all UAVs' paths should be balanced.
• Task number discount factor λn: It is usually risky
to allocate a large number of tasks to one UAV, but
8
only a few to others. The task number discount factor
λn ∈ (0, 1] helps to balance the numbers of allocated
tasks among all UAVs.
Note that, Eqn. (11) is proven to be monotone, non-
negative, and submodular in the appendix.
4.2 Simulation Results
The performances of the proposed algorithms are com-
pared with the benchmark decentralised task allocation
algorithms SGA and CBBA. We run 100 rounds of
Monte-Carlo simulations then get the mean values of
objective function value, running time, and consensus
steps, respectively. The running time is measured as
the number of objective function evaluations, which is
independent on the computer status. The running time
for each UAV approximately equals to the total running
time divided by the number of UAVs. The performances
of these algorithms are also compared through ratios
with SGA as a baseline.
In the simulations, assume that there are totally 200
tasks to be carried out by a fleet of varying numbers of
UAVs from 10 to 50 denoted as Na, and let L = 10km.
Set the importance factor of each task as a uniformly ran-
dom number vj ∈ [0.6, 1.0], and the match fitness factor
of each task-UAV pair as a uniformly random number
maj ∈ [0.5, 1.0]. Set the distance discount factor λd =
0.95, and the task number discount factor λn = 0.98,
respectively. In algorithms DTTA and LDTTA, set the
threshold decreasing parameter as = 0.05.
The performances of DTTA and LDTTA are compared
with benchmark task allocation algorithms SGA and
CBBA in Fig. 1. The advantage of CBBA is that it can
reduce consensus steps with the help of building task
bundles while achieving the same solution quality com-
pared with SGA. Note that, the number of consensus
steps required by SGA is equal to the number of tasks,
i.e., 200 in this case. As shown in Fig. 1 (c), (e), and (f),
CBBA consumes 45.9% of consensus steps of SGA when
there are 10 UAVs. The percentage goes up to 86.5% as
the number of UAVs increases to 50. As mentioned in [9],
agents need to continually rebuild their bundles to solve
the conflict during the task allocation process. The is-
sue with the bundle rebuilding is that when there are a
large number of tasks, evaluating the objective function
is quite time-consuming. This is the reason why CBBA
performs poorly in terms of running time, as shown in
Fig. 1 (b), (e), and (f). By contrast, DTTA and LDTTA
perform much better in terms of both consensus steps
and running time while obtaining almost the same func-
tion values compared with SGA and CBBA. As shown in
Fig. 1 (f), when Na = 50, LDTTA consumes only 1.2%
of running time and 14.0% of consensus steps with SGA
as a baseline. Fig. 1 (c) indicates that as the number of
UAVs increases, unlike CBBA, the numbers of consen-
sus steps for DTTA and LDTTA decrease because more
(a) Function Value
(b) Running Time
(c) Consensus Steps
(d) Running Time
(e) Ratio Comparison Na = 10
(f) Ratio Comparison Na = 50
Fig. 1. Performance comparison of the proposed algorithms and benchmark algorithms
tasks can be allocated within one consensus step when
there are more UAVs. This is an extremely beneficial
feature in the large-scale task allocation problems where
scalability is one of the key concerns.
According to Fig. 1 (d), (e), and (f), LDTTA consumes
much less running time and slightly fewer consensus
steps with slightly higher function values compared with
DTTA under the same . In LDTTA, the remaining
tasks are sorted in descending order according to their
marginal values. On average, LDTTA is more likely
to find a qualified task with a higher marginal value,
thereby achieving better solution quality than DTTA
does. Meanwhile, since UAVs and tasks are heteroge-
neous and located at different positions, UAVs are less
likely to have a conflict with each other using LDTTA
9
(a) Function Value
(b) Running Time
(c) Consensus Steps
(d) Ratio Comparison Na = 30
Fig. 2. Trade-off of function value, running time and consensus steps
than using DTTA. Thus, LDTTA consumes fewer con-
sensus steps than DTTA. Overall, LDTTA has the best
performance among all these algorithms.
Fig. 2 demonstrates the trade-off performance of
LDTTA where the threshold decreasing parameter is
set as 0.1, 0.2, and 0.3 respectively. The results show
that as increases, the function value, running time, and
consensus steps decrease, which verifies the trade-off.
Fig. 2 (d) compares the ratio of function value, running
time, and consensus steps with = 0.1 as a baseline. It
indicates that as the value of increases from 0.1 to 0.3,
the ratios of function value and running time decrease
slowly at a similar pace, while the ratio of consensus
steps drops rapidly.
5 Conclusions
This paper proposed two efficient decentralised al-
gorithms, i.e., Decreasing Threshold Task Allocation
(DTTA) and an upgraded version Lazy Decreasing
Threshold Task Allocation (LDTTA), for Multi-Robot
Systems (MRS) in large-scale task allocation problems.
DTTA and LDTTA enabled parallel allocation with the
help of a decreasing threshold hence releasing the com-
putational and communicating burden for MRS. The
performance of the proposed algorithms was analysed
theoretically and verified through Monte-Carlo simu-
lations of a multi-target surveillance mission using a
group of heterogeneous UAVs. Simulation results indi-
cated that the proposed algorithms consumed much less
running time and consensus steps while achieving al-
most the same objective function values compared with
the benchmark task allocation algorithms. The results
of the proposed algorithms are expected instrumental
in the large-scale physical applications where MRS usu-
ally suffer from the computational and communicating
burden.
One future work would be further analysing the theo-
retical performance of the proposed algorithms by com-
bining the curvature of the submodular objective func-
tion to provide a tighter optimality bound of the solu-
tion quality. Another future work would be verifying the
performance of the proposed algorithms through physi-
cal experiments of a surveillance mission in a large area
using multiple UAVs.
10
References
[1] Gustavo SC Avellar, Guilherme AS Pereira, Luciano CA
Pimenta, and Paulo Iscold. Multi-uav routing for area
coverage and remote sensing with minimum time. Sensors,
15(11):27783 -- 27803, 2015.
[2] Ashwinkumar Badanidiyuru and Jan Vondr´ak.
Fast
In
algorithms
Proceedings
annual ACM-SIAM
symposium on Discrete algorithms, pages 1497 -- 1514. SIAM,
2014.
for maximizing submodular
twenty-fifth
functions.
of
the
[3] Xiaoshan Bai, Weisheng Yan, Shuzhi Sam Ge, and Ming Cao.
An integrated multi-population genetic algorithm for multi-
vehicle task assignment in a drift field. Information Sciences,
453:227 -- 238, 2018.
[4] Maria-Florina Balcan. Learning submodular functions with
In AAMAS, page 3,
applications to multi-agent systems.
2015.
[5] Antonio Barrientos, Julian Colorado, Jaime del Cerro,
Alexander Martinez, Claudio Rossi, David Sanz, and Joao
Valente. Aerial remote sensing in agriculture: A practical
approach to area coverage and path planning for fleets of
mini aerial robots. Journal of Field Robotics, 28(5):667 -- 689,
2011.
[6] Hamid Reza Boveiri. A novel aco-based static task scheduling
approach for multiprocessor environments.
International
Journal of Computational Intelligence Systems, 9(5):800 --
811, 2016.
[7] Niv Buchbinder, Moran Feldman, and Roy Schwartz.
Comparing
trade-off in
submodular maximization. Mathematics of Operations
Research, 42(2):308 -- 329, 2016.
and oranges: Query
apples
[8] Jes´us Capitan, Luis Merino, and An´ıbal Ollero. Cooperative
decision-making
for multi-target
surveillance with multiples uavs. Journal of Intelligent &
Robotic Systems, 84(1-4):371 -- 386, 2016.
uncertainties
under
[9] Han-Lim Choi, Luc Brunet, and Jonathan P How. Consensus-
based decentralized auctions for robust task allocation. IEEE
transactions on robotics, 25(4):912 -- 926, 2009.
[10] Micah Corah and Nathan Michael. Distributed submodular
maximization on partition matroids for planning on large
sensor networks. In 2018 IEEE Conference on Decision and
Control (CDC), pages 6792 -- 6799. IEEE, 2018.
[11] Micah Corah and Nathan Michael. Distributed matroid-
constrained submodular maximization for multi-robot
exploration: Theory and practice. Autonomous Robots,
43(2):485 -- 501, 2019.
[12] Jorge Cort´es. Distributed algorithms for reaching consensus
on general functions. Automatica, 44(3):726 -- 737, 2008.
[13] Huanyu Ding and David Castan´on. Multi-agent discrete
search with limited visibility.
In 2017 IEEE 56th Annual
Conference on Decision and Control (CDC), pages 108 -- 113.
IEEE, 2017.
[14] Moran Feldman, Christopher Harshaw, and Amin Karbasi.
Greed is good: Near-optimal submodular maximization via
greedy optimization. arXiv preprint arXiv:1704.01652, 2017.
[15] Brian P Gerkey and Maja J Mataric. Sold!: Auction methods
for multirobot coordination. IEEE transactions on robotics
and automation, 18(5):758 -- 768, 2002.
[17] Silvia Giannini, Antonio Petitti, Donato Di Paola, and
Alessandro Rizzo. Asynchronous max-consensus protocol
with time delays: Convergence results and applications. IEEE
Transactions on Circuits and Systems I: Regular Papers,
63(2):256 -- 264, 2016.
[18] David Grimsman, Mohd Shabbir Ali, Joao P Hespanha, and
Jason R Marden. The impact of information in greedy
submodular maximization. IEEE Transactions on Control
of Network Systems, 2018.
[19] Jingjing Gu, Tao Su, Qiuhong Wang, Xiaojiang Du, and
Mohsen Guizani. Multiple moving targets surveillance
based on a cooperative network for multi-uav.
IEEE
Communications Magazine, 56(4):82 -- 89, 2018.
[20] Sorin Ilie and Costin Badica. Multi-agent approach to
distributed ant colony optimization. Science of Computer
Programming, 78(6):762 -- 774, 2013.
[21] Franck Iutzeler, Philippe Ciblat, and J´er´emie Jakubowicz.
Analysis of max-consensus algorithms in wireless channels.
IEEE Transactions on Signal Processing, 60(11):6103 -- 6107,
2012.
[22] Kelin Jose and Dilip Kumar Pratihar. Task allocation
and collision-free path planning of centralized multi-robots
system for
inspection using heuristic
methods. Robotics and Autonomous Systems, 80:34 -- 42, 2016.
industrial plant
[23] Andreas Krause and Daniel Golovin. Submodular function
maximization., 2014.
[24] Rajiv Ranjan Kumar, Pradeep Varakantham, and Akshat
Kumar. Decentralized planning in stochastic environments
with submodular rewards. In AAAI, pages 3021 -- 3028, 2017.
[25] Heba Kurdi, Jonathon How, and Guillermo Bautista. Bio-
inspired algorithm for task allocation in multi-uav search and
rescue missions. In AIAA Guidance, Navigation, and Control
Conference, page 1377, 2016.
[26] Dong-Hyun Lee. Resource-based task allocation for multi-
robot systems. Robotics and Autonomous Systems, 103:151 --
161, 2018.
[27] Pei Li and Haibin Duan. A potential game approach to
multiple uav cooperative search and surveillance. Aerospace
Science and Technology, 68:403 -- 415, 2017.
[28] G´abor Milics. Application of uavs in precision agriculture.
In International Climate Protection, pages 93 -- 97. Springer,
2019.
[29] Michel Minoux.
Accelerated greedy algorithms
maximizing submodular set functions.
techniques, pages 234 -- 243. Springer, 1978.
for
In Optimization
[30] Daniel Morgan, Giri P Subramanian, Soon-Jo Chung,
and Fred Y Hadaegh. Swarm assignment and trajectory
optimization using variable-swarm, distributed auction
assignment and sequential convex programming.
The
International Journal of Robotics Research, 35(10):1261 --
1285, 2016.
[31] George L Nemhauser, Laurence A Wolsey, and Marshall L
Fisher. An analysis of approximations for maximizing
submodular set functionsi. Mathematical programming,
14(1):265 -- 294, 1978.
[32] Reza Olfati-Saber and Richard M Murray. Consensus
problems in networks of agents with switching topology
and time-delays. IEEE Transactions on automatic control,
49(9):1520 -- 1533, 2004.
[16] Bahman Gharesifard and Stephen L Smith. Distributed
submodular maximization with limited information. IEEE
transactions on control of network systems, 5(4):1635 -- 1645,
2017.
[33] Jakub Ondr´acek, Ondrej Vanek, and Michal Pechoucek.
Solving infrastructure monitoring problems with multiple
heterogeneous unmanned aerial vehicles. In Proceedings of
the 2015 International Conference on Autonomous Agents
11
and Multiagent Systems, pages 1597 -- 1605. International
Foundation for Autonomous Agents and Multiagent Systems,
2015.
[34] Michael Otte, Michael J Kuhlman, and Donald Sofge.
Auctions for multi-robot task allocation in communication
limited environments. Autonomous Robots, pages 1 -- 38, 2019.
[35] Parag C Pendharkar. An ant colony optimization heuristic
Journal of
for constrained task allocation problem.
Computational Science, 7:37 -- 47, 2015.
[36] Guannan Qu, Dave Brown, and Na Li. Distributed greedy
algorithm for satellite assignment problem with submodular
utility function. IFAC-PapersOnLine, 48(22):258 -- 263, 2015.
[37] Guannan Qu, Dave Brown, and Na Li. Distributed greedy
algorithm for multi-agent task assignment problem with
submodular utility functions. Automatica, 105:206 -- 215, 2019.
[38] Jurgen Scherer, Saeed Yahyanejad, Samira Hayat, Evsen
Yanmaz, Torsten Andre, Asif Khan, Vladimir Vukadinovic,
Christian Bettstetter, Hermann Hellwagner, and Bernhard
Rinner. An autonomous multi-uav system for search and
rescue. In Proceedings of the First Workshop on Micro Aerial
Vehicle Networks, Systems, and Applications for Civilian
Use, pages 33 -- 38. ACM, 2015.
[39] Pau Segui-Gasco, Hyo-Sang Shin, Antonios Tsourdos, and
VJ Segui.
Decentralised submodular multi-robot task
allocation. In Intelligent Robots and Systems (IROS), 2015
IEEE/RSJ International Conference on, pages 2829 -- 2834.
IEEE, 2015.
[40] Min-Guk Seo, Hyo-Sang Shin, and Antonios Tsourdos. Task
allocation in agricultural remote sensing applications using
submodular maximization algorithm. In 2018 37th Chinese
Control Conference (CCC), pages 6860 -- 6865. IEEE, 2018.
[41] Hyo-Sang Shin and Pau Segui-Gasco. Uav swarms: Decision-
making paradigms. Unmanned Aircraft Systems, page 397,
2016.
[42] Xinmiao Sun, Christos G Cassandras, and Xiangyu Meng.
Exploiting submodularity to quantify near-optimality in
multi-agent coverage problems. Automatica, 100:349 -- 359,
2019.
[43] Jan Vondr´ak. Optimal approximation for the submodular
welfare problem in the value oracle model. In Proceedings of
the fortieth annual ACM symposium on Theory of computing,
pages 67 -- 74. ACM, 2008.
[44] Ryan K Williams, Andrea Gasparri, and Giovanni Ulivi.
Decentralized matroid optimization for topology constraints
in multi-robot allocation problems.
In Robotics and
Automation (ICRA), 2017 IEEE International Conference
on, pages 293 -- 300. IEEE, 2017.
[45] Lifeng Zhou and Pratap Tokekar.
Sensor assignment
algorithms to improve observability while tracking targets.
IEEE Transactions on Robotics, 2019.
[46] WANG Zhu, LIU Li, LONG Teng, and WEN Yonglu. Multi-
uav reconnaissance task allocation for heterogeneous targets
using an opposition-based genetic algorithm with double-
chromosome encoding. Chinese Journal of Aeronautics,
31(2):339 -- 350, 2018.
A Analysis of the Objective Function
In the appendix, we prove that the objective function
Eqn. (11) is monotonically increasing, non-negative, and
submodular. We start the proof from analysing Eqn.
(10).
For a random UAV a, assume that there are two task
selection sets T1 and T2 satisfying T1 ⊆ T2 ⊆ T . A new
task j ∈ T \T2 is going to be considered by this UAV.
pj
1 represents the path from initial position of UAV a to
the task j along the task set T1 and pj
2 is defined in the
same way with T2.
Lemma 3 The objective function Eqn. (10) is non-
negative and increasing.
PROOF. By definition, if Ta = ∅, then fa(Ta) = 0 and
these four factors maj, vj, λd, λn ∈ (0, 1] are positive.
Then the marginal value of task j is always positive, i.e.
majvjλτ (pj
a)
d
λσ(pj
a)
n
> 0.
Eqn. (10) is the sum of all marginal values, hence it is
non-negative and increasing.
Lemma 4 The objective function Eqn. (10) is submod-
ular.
PROOF. Since T1 ⊆ T2, the length of the path pj
no greater than that of the path pj
tasks along the path pj
path pj
1 is
2, and the number of
1 is no greater than that of the
2, i.e.
0 < τ (pj
1) ≤ τ (pj
2),
0 < σ(pj
1) ≤ σ(pj
2).
(A.1)
The marginal value of task j given T1 is
∆fa(jT1) = majvjλτ (pj
1)
d
λσ(pj
1)
n
.
The marginal value of task j given T2 is
∆fa(jT2) = majvjλτ (pj
2)
d
λσ(pj
2)
n
.
According to Eqn. (A.1) and since λd, λn ∈ (0, 1], we
have
∆fa(jT1) ≥ ∆fa(jT2).
Therefore, Eqn. (10) is submodular.
The task sets for all UAVs are disjoint since one task can
be allocated to no more than one UAV. According to the
property of submodularity, the sum of submodular func-
tions is submodular. Therefore, the objective function
Eqn. (11) is monotonically increasing, non-negative, and
submodular.
12
|
1203.6035 | 1 | 1203 | 2012-03-27T17:31:24 | A Multi-Agent Prediction Market based on Partially Observable Stochastic Game | [
"cs.MA"
] | We present a novel, game theoretic representation of a multi-agent prediction market using a partially observable stochastic game with information (POSGI). We then describe a correlated equilibrium (CE)-based solution strategy for this game which enables each agent to dynamically calculate the prices at which it should trade a security in the prediction market. We have extended our results to risk averse traders and shown that a Pareto optimal correlated equilibrium strategy can be used to incentively truthful revelations from risk averse agents. Simulation results comparing our CE strategy with five other strategies commonly used in similar markets, with both risk neutral and risk averse agents, show that the CE strategy improves price predictions and provides higher utilities to the agents as compared to other existing strategies. | cs.MA | cs |
A Multi-Agent Prediction Market based on
Partially Observable Stochastic Game
Janyl Jumadinova (1), Prithviraj Dasgupta (1)
((1) University of Nebraska at Omaha,
Computer Science Department, Omaha NE)
July 5, 2018
We present a novel, game theoretic representation of a multi-agent prediction
market using a partially observable stochastic game with information (POSGI).
We then describe a correlated equilibrium (CE)-based solution strategy for this
game which enables each agent to dynamically calculate the prices at which it
should trade a security in the prediction market. We have extended our results
to risk averse traders and shown that a Pareto optimal correlated equilibrium
strategy can be used to incentively truthful revelations from risk averse agents.
Simulation results comparing our CE strategy with five other strategies com-
monly used in similar markets, with both risk neutral and risk averse agents,
show that the CE strategy improves price predictions and provides higher util-
ities to the agents as compared to other existing strategies.
1
Introduction
Forecasting the outcome of events that will happen in the future is a frequently
indulged and important task for humans. It is encountered in various domains
such as forecasting the outcome of geo-political events, betting on the outcome
of sports events, forecasting the prices of financial instruments such as stocks,
and casual predictions of entertainment events. Despite the ubiquity of such
forecasts, predicting the outcome of future events is a challenging task for hu-
mans or even computers - it requires extremely complex calculations involving
a reasonable amount of domain knowledge, significant amounts of information
processing and accurate reasoning. Recently, a market-based paradigm called
prediction markets has shown ample success to solve this problem by using the
aggregated 'wisdom of the crowds' to predict the outcome of future events. This
is evidenced from the successful predictions of actual events done by prediction
markets run by the Iowa Electronic Marketplace(IDEM), Tradesports, Holly-
wood Stock Exchange, the Gates-Hillman market [26], and by companies such
as Hewlett Packard [29], Google [7] and Yahoo's Yootles [34]. A prediction mar-
ket for a real-life event (e.g., "Will Obama win the 2008 Democratic Presidential
nomination?") is run for several days before the event happens. The event has
a binary outcome (yes/no or 1/0). On each day, humans, called traders, that
are interested in the outcome of the event express their belief on the possible
outcome of the event using the available information related to the event. The
1
information available to the different traders is asymmetric, meaning that dif-
ferent traders can possess bits and pieces of the whole information related to the
event. The belief values of the traders about the outcome of the event are ex-
pressed as probabilities. A special entity called the market maker aggregates the
probabilities from all the traders into a single probability value that represents
the possible outcome of the event. The main idea behind the prediction mar-
ket paradigm is that the collective, aggregated opinions of humans on a future
event represents the probability of occurrence of the event more accurately than
corresponding surveys and opinion polls. Despite their overwhelming success,
many aspects of prediction markets such as a formal representation of the mar-
ket model, the strategic behavior of the market's participants and the impact of
information from external sources on their decision making have not been ana-
lyzed extensively for a better understanding. We attempt to address this deficit
in this paper by developing a game theoretic representation of the traders' inter-
action and determining their strategic behavior using the equilibrium outcome
of the game. We have developed a correlated equilibrium (CE)-based solution
strategy for a partially observable stochastic game representation of the predic-
tion market. We have also empirically compared our CE strategy with five other
strategies commonly used in similar markets, with both risk neutral and risk
averse agents, and showed that the CE strategy improves price predictions and
provides higher utilities to the agents as compared to other existing strategies.
2 Related Work
Prediction markets were started in 1988 at the Iowa Electronic Marketplace
[19] to investigate whether betting on the outcome of gee-political events (e.g.
outcome of presidential elections, possible outcome of international political or
military crises, etc.) using real money could elicit more accurate information
about the event's outcome than regular polls. Following the success of prediction
markets in eliciting information about events' outcomes, several other predic-
tion markets have been started that trade on events using either real or virtual
money. Prediction markets have been used in various scenarios such as pre-
dicting the outcome of gee-political events such as U.S. presidential elections,
determining the outcome of sporting events, predicting the box office perfor-
mance of Hollywood movies, etc. Companies such as Google, Microsoft, Yahoo
and Best Buy have all used prediction markets internally to tap the collective in-
telligence of people within their organizations. The seminal work on prediction
market analysis [13, 32, 33] has shown that the mean belief values of individual
traders about the outcome of a future event corresponds to the event's market
price. Since then researchers have studied prediction markets from different per-
spectives. Some researchers have studied traders' behavior by modeling their
interactions within a game theoretic framework. For example, in [3, 11] the
authors have used a Shapley-Shubik game that involves behavioral assumptions
on the agents such as myopic behavior and truthful revelations and theoretically
analyzed the aggregation function and convergence in prediction markets. Chen
et. al. [4] characterized the uncertainty of market participants' private informa-
tion by incorporating aggregate uncertainty in their market model. However,
both these models consider traders that are risk-neutral, myopic and truthful.
Subsequently, in [6] the authors have relaxed some of these assumptions within
2
a Bayesian game setting and investigated the conditions under which the play-
ers reveal their beliefs truthfully. Dimitrov and Sami [9] have also studied the
effect of non-myopic revelations by trading agents in a prediction market and
concluded that myopic strategies are almost never optimal in the market with
the non-myopic traders and there is a need for discounting. Other researchers
have focused on designing rules that a market maker can use to combine the
opinions (beliefs) from different traders. Hanson [15] developed a market scor-
ing rule that is used to reward traders for making and improving a prediction
about the outcome of an event. He further showed how any proper scoring rule
can serve as an automated market maker. Das [8] studied the effect of spe-
cialized agents called market-makers which behave as intermediaries to absorb
price shocks in the market. Das empirically studied different market-making
strategies and concludes that a heuristic strategy that adds a random value to
zero-profit market-makers improves the profits in the markets.
The main contribution of our paper, while building on these previous direc-
tions, is to use a partially observable stochastic game (POSG) [14] that can be
used by each agent to reason about its actions. Within this POSG model, we
calculate the correlated equilibrium strategy for each agent using the aggregated
price from the market maker as a recommendation signal. We have also con-
sidered the risk preferences of trading agents in prediction markets and shown
that a Pareto optimal correlated equilibrium solution can incentively truthful
revelation from risk averse agents. We have compared the POSG/correlated
equilibrium based pricing strategy with five different pricing strategies used in
similar markets with pricing data obtained from real prediction prediction mar-
ket events. Our results show that the agents using the correlated equilibrium
strategy profile are able to predict prices that are closer to the actual prices that
occurred in real markets and these traders also obtain 35 − 127% higher profits.
3 Preliminaries
Prediction Market. Our prediction market consists of N traders, with each
trader being represented by a software trading agent that performs actions on
behalf of the human trader. The market also has a set of future events whose
outcome has not yet been determined. The outcome of each event is considered
as a binary variable with the outcome being 1 if the event happens and the
outcome being 0 if it does not. Each outcome has a security associated with
it. A security is a contract that yields payments based on the outcome of an
uncertain future event. Securities can be purchased or sold by trading agents
at any time during the lifetime of the security's event. A single event can have
multiple securities associated with it. Trading agents can purchase or sell one
or more of the securities for each event at a time. A security expires when the
event e associated with it happens at the end of the event's duration. At this
point the outcome of the event has just been determined and all trading agents
are notified of the event's outcome. The trading agents that had purchased the
security during the lifetime of the event then get paid $1 if the event happens
with an outcome of 1, or, they do not get paid anything and lose the money
they had spent on buying the security if the event happens with an outcome
of 0. On each day, a trading agent makes a decision of whether to buy some
securities related to ongoing events in the market, or whether to sell or hold
3
some securities it has already purchased.
Figure 1: Essential operations performed by a trading agent in a prediction
market and the portion of the prediction market where the POSG representation
is applied.
Market Maker. Trading in a prediction market is similar to the continuous
double auction (CDA) protocol. However, using the CDA directly as the trading
protocol for a prediction market leads to some problems such as the thin market
problem (traders not finding a trading partner immediately) and traders poten-
tially losing profit because of revealing their willingness to trade beforehand to
other traders. To address these problems, prediction markets use a trading in-
termediary called the market maker. The market maker aggregates the buying
and selling prices of a security reported in the trades from the trading agents
(they can be identical) and 'posts' these prices in the market. Trading agents
interact with the market maker to buy and sell securities, so that they do not
have to wait for another trading agent to arrive before they can trade. A market
maker uses a market scoring rule (MSR) to calculate the aggregated price of a
security. Recently, there has been considerable interest in analyzing the MSRs
[5, 15, 27] and an MSR called the logarithmic MSR (LMSR) has been shown to
guarantee truthful revelation of beliefs by the trading agents [15]. LMSR allows
a security's price, and payoffs to agents buying/selling the security, to be ex-
pressed in terms of its purchased or outstanding quantity. Therefore, the 'state'
of the securities in the market can be captured only using their purchased quan-
tities. The market-maker in our prediction market uses LMSR to update the
market price and to calculate the payoffs to trading agents. We briefly describe
the basic mechanism under LMSR. Let Ξ be the set of securities in a prediction
market and q = (q1, q2...qΞ) denote the vector specifying the number of units
of each security held by the different trading agents at time t. The LMSR first
calculates a cost function to reflect the total money wagered in the prediction
4
market by the trading agents as: C(q) = b·ln(PΞ
j=1 eqj /b). It then calculates the
aggregated market price π for the security ξ ∈ Ξ as: πξ = e(qξ/b)/ PΞ
j=1(e(qj /b))
[5] 1. Trading agents inform the quantity of a security they wish to buy or
sell to the market maker. If a trading agent purchases δ units of a security, the
market maker determines the payment the agent has to make as C(q +δ)−C(q).
Correspondingly, if the agent sells δ quantity of the security, it receives a payoff
of C(q) − C(q − δ) from the market maker. Figure 1 shows the operations per-
formed by a trader (trading agent) in a prediction market and the portions of
the prediction market that are affected by the POSG representation described
in the next section.
4 Partially Observable Stochastic Games for Trad-
ing Agent Interaction
For simplicity of explanation, we consider a prediction market where a single
security is being traded over a certain duration. This duration is divided into
trading periods, with each trading period corresponding to a day in a real pre-
diction market. The 'state' of the market is expressed as the quantity of the
purchased units of the security in the market. At the end of each trading period,
each trading agent receives information about the state of the market from the
market maker. With this prior information, the task of a trading agent is to
determine a suitable quantity to trade for the next trading period, so that its
utility is maximized. In this scenario, the environment of the agent is partially
observable because other agents' actions and payoffs are not known directly, but
available through their aggregated beliefs. Agents interact with each other in
stages (trading periods), and in each stage the state of the market is determined
stochastically based on the actions of the agents and the previous state. This
scenario directly corresponds to the setting of a partially observable stochastic
game [12, 14]. A POSG model offers several attractive features such as struc-
tured behavior by the agents by using best response strategies, stability of the
outcome based on equilibrium concepts, lookahead capability of the agent to plan
their actions based on future expected outcomes, ability to represent the tem-
poral characteristics of the interactions between the agents, and, enabling all
computations locally on the agents so that the system is robust and scalable.
Previous research has shown that information related parameters in a predic-
tion market such as information availability, information reliability, information
penetration, etc., have a considerable effect on the belief (price) estimation by
trading agents. Based on these findings, we posit that a component to model
the impact of information related to an event should be added to the POSG
framework. With this feature in mind, we propose an interaction model called
a partially observable stochastic game with information (POSGI) for capturing
the strategic decision making by trading agents. A POSGI is defined as:
Γ = (N, S, (Ai)i∈N , (Ri)i∈N , T, (Oi)i∈N , Ω, (Ii)i∈N ), where N is a finite set of
agents, S is a finite, non-empty set of states - each state corresponding to certain
1Parameter b (determined by the market maker) controls the monetary risk of the market
maker as well as the quantity of shares that trading agents can trade at or near the current
price without causing massive price swings. Larger values for b allows trading agents to trade
more frequently but also increases the market maker's chances to lose money.
5
quantity of the security being held (purchased) by the trading agents. Ai is a
finite non-empty action space of agent i s.t. ak = (a1,k, ..., aN ,k) is the joint ac-
tion of the agents and ai,k is the action that agent i takes in state k. In terms of
the prediction market, a trading agent's action corresponds to certain quantity
of security it buys or sells, while the joint action corresponds to changing the
purchased quantity for a security and taking the market to a new state. Ri,k is
the reward or payoff for agent i in state k which is calculated using the LMSR
market maker. T : T (s, a, s′) = P (s′s, a) is the transition probability of moving
from state s to state s′ after joint action a has been performed by the agents.
Oi is a finite non-empty set of observations for agent i that consists of the mar-
ket price and the information signal, and oi,k ∈ Oi is the observation agent i
receives in state k. Ω : Ω(sk, Ii,k, oi,k) = P (oi,ksk, Ii,k) is the observation prob-
ability for agent i of receiving observation oi,k in state sk when the information
signal is Ii,k. Finally, Ii is the information set received by agent i for an event
Ii = Sk Ii,k where Ii,k ∈ {−1, 0, +1} is the information received by agent i in
state k. The complete information arriving to the market I = Si∈N Ii is tempo-
rally distributed over the duration of the event, and, following the information
arrival patterns observed in stock markets [23], we assume that new information
arrives following a Poisson distribution. Information that improves the proba-
bility of the positive outcome of the event is considered positive(Ii,k = +1) and
vice-versa, while information that does not affect the probability is considered
to have no effect (Ii,k = 0). For example, for a security related to the event
"Obama wins 2008 presidential elections", information about Oprah Winfrey
endorsing Obama would be considered high impact positive information and
information about Obama losing the New Hampshire Primary would be consid-
ered negative information.
Based on the POSGI formulation of the prediction market, the interaction of
an agent with the environment (prediction market) and the information source
can be represented by the transition diagram shown in Figure 22. The environ-
ment (prediction market) goes through a set of states S = {s1, ..., sH } : S ∈ S,
where H is the duration of the event in the prediction market and sh represents
the state of the market during trading period h. This state of the market is not
visible to any agent. Instead, each agent i has its own internal belief state Bi,h
corresponding to its belief about the actual state sh. Bi,h gives a probability
distribution over the set of states S, where Bi,h = (b1,h, ..., bS,h). Consider
trading period h − 1 when the agents perform the joint action ah−1. Because of
this joint action of the agents the environment stochastically changes to a new
state sh, defined by the state transition function T (sh−1, ah−1, sh). There is also
an external information state, Ih, that transitions to the next state Ih+1 given
by the Poisson distribution [23] from which the information signal is sampled.
The agent i doesn't directly see the environment state, but instead receives an
observation oi,Sh = (πsh , Ii,sh ), that includes the market price πsh correspond-
ing to the state sh as informed by the market maker, and the information signal
Ii,sh . The agent i then uses a belief update function to update its beliefs. Fi-
nally, agent i selects an action using an action selection strategy and receives a
reward Ri,sh .
2We have only shown one agent i to keep the diagram legible, but the same representation
is valid for every agent in the prediction market. The dotted lines represent that the reward
and environment state is determined by the joint action of all agents.
6
the length of the bars indicate the strength of the information's impact
event
announced
high impact information
low impact information
event
ended
Hidden Environment (Prediction Market)
T(s2,a2,s3)
s2
s3
. . .
T(s1,a1,s2)
sH
s1
T(s1,a1,s2)
prediction
market's state
Ri,1
reward for
agent i
ai,1
action by
agent i
Ri,2
ai,2
Ri,3
ai,3
Ri,H
ai,H
b(b1,o1,a1)
Bi,1
belief state
oi,1
observation
of agent i
I1
information state
Bi,2
oi,2
I2
b(b2,o2,a2)
Bi,3
b(bH+1,oH+1,aH+1)
. . .
Bi,H
Agent i
oi,3
I3
oi,H
Information
. . .
IH
Transitions using Poisson distribution
Figure 2: An agent interactions with the hidden environment (prediction mar-
ket) and an external information source.
4.1 Trading agent belief update function
Recall from Section 4 that a belief state of a trading agent is a probability
vector that gives a distribution over the set of states S in the prediction market,
i.e. Bi,h = (b1,h, ..., bS,h). A trading agent uses its belief update function
b : ℜS × Ai × Oi → ℜS to update its belief state based on its past action
ai,h−1, past belief state Bi,h−1 and the observation oi,Sh . The calculation of
the belief update function for each element of the belief state, bs′,h, s′ ∈ S, is
described below:
bs′,h = P (s′ai,h−1, oi) =
P (s′, ai,h−1, oi, )
P (ai,h−1, oi)
=
P (ois′, ai,h−1) · P (s′, ai,h−1)
P (oiai,h−1)P (ai,h−1)
(1)
7
Because ai,h−1 is conditionally independent given s′ and oi is conditionally in-
dependent given ai,h−1, we can rewrite Equation 1 as:
bs′,h =
P (ois′) · P (s′, ai,h−1)
P (oi)P (ai,h−1)
=
Pι∈I P (ι)P (ois′, ι) Ps∈S P (s)P (s′s, ai,h−1)P (ai,h−1)
P (oi)P (ai,h−1)
= Pι∈I P (ι)P (ois′, ι) Ps∈S P (s)P (s′s, ai,h−1)
P (oi)
= Pι∈I P (ι)Ω(s′, ι, oi) Ps∈S T (s, ai,h−1, s′)bs,h−1
P (oi)
(2)
All the terms in the r.h.s. of the Equation 2 can be calculated by an agent:
P (ι) is the probability of receiving information signal ι and is available from
the Poisson distribution [23] for the information arrival, Ω(s′, ι, oi) is the prob-
ability of receiving observation oi in state s′ when the information signal is ι,
T (s, ai,h−1, s′) is the probability that the state s transitions to state s′ after
agent i takes action ai,h−1, bs,h−1 is the past belief of agent i about state s,
P (oi) is the probability of receiving observation oi, which is constant and can
be viewed as a normalizing constant.
...
q+4
+1,+1
+1,0
0,+1
...
q+3
+1,+1
0, 0
+1,-1
-1,+1
q+2
+1,+1
-1,-1
-1,0
0,-1
+1,0
0,+1
-1,0
0,-1
+1,0
0,+1
q+1
0,0
-1,+1
+1,-1
0, 0
+1,-1
-1,+1
q
-1,-1
+1,+1
-1,-1
q-4
...
q-2
0,0
-1,+1
+1,-1
-1,-1
+1,+1
0,+1
+1,0 -1,0
0,-1
-1,0
0,-1
0,+1
+1,0
q-1
-1,-1
0,0
-1,+1
+1,-1
q-3
...
Figure 3: Finite state automata of the environment represented by the number
of outstanding units of the security, q, in the prediction market.
4.2 Trading agent action selection strategy
The objective of a trading agent in a prediction market is to select an action
at each stage so that the expected reward that it receives is maximized. To
understand this action selection process, we consider the decision problem facing
each trading agent. Consider two agents whose available actions during each
time step are to buy (=+1) or sell(=-1) only one unit of the security or not
8
Player 2
Sell
Hold
Buy
Sell
C(q) - C(q-1),
C(q) - C(q-1)
C(q) - C(q-1),
0
C(q) - C(q-1),
C(q+1) - C(q)
Player 1
Hold
0,
C(q) - C(q-1)
0,
0
0,
C(q+1) - C(q)
Buy
C(q+1) - C(q),
C(q) - C(q-1)
C(q+1) - C(q),
0
C(q+1) - C(q),
C(q+1) - C(q)
Figure 4: Two player normal form game in a state for which the number of
outstanding shares is q.
do anything (=0) by holding the security. Let the market state be denoted by
q, the number of purchased units of the security. Based on the set of actions
available to each agent, the state can transition to one of the following states
q + 2 (both agents buy), q + 1 (only one agent buys), q (both agents hold, or, one
agent buys while the other agent sells, resulting in no transition), q + 1 (only
agent sells), and q + 2 (both agents sell), as shown in Figure 3. We can expand
this state space further by adding more states and transitions, but the number
of states remains finite because the set of states S of the POSGI is finite. Also,
since the number of units of a security is finite, the number of transitions from a
state is guaranteed to be bounded. We can construct a normal form game from
this representation to capture the decision problem for each agent. The payoff
matrix for this 2-player game at state q is shown in Figure 4. From this payoff
matrix, we can use game-theoretic analysis to determine equilibrium strategies
for each trading agent and find the actions that maximize its expected reward,
as described below.
4.3 Correlated Equilibrium (CE) calculation
In the POSGI, the aggregated price information received by a trading agent
from the market maker can be treated as a recommendation signal for selecting
the agent's strategy. This situation lends itself to a correlated equilibrium (CE)
[1] where a trusted external agent privately recommends a strategy to play to
each player. A CE is more preferred to the Nash or Bayesian Nash equilibrium
because it can lead to improved payoffs, and it can be calculated using a linear
program in time polynomial in the number of agents and number of strategies.
Each agent i has a finite set of strategy profiles, Φi defined over its ac-
tion space Ai. The joint strategy space is given by Φ = QN
i=1 Φi and let
Φ−i = Qj6=i Φj. Let φ ∈ Φ denote a strategy profile and φi denote player
i's component in φ. The utility received by each agent i corresponds to its
payoff or reward and is given by the agent i's utility function ui(φ) = Ri
(for legibility we have dropped state k, but the same calculation applies at
9
every state). A correlated equilibrium is a distribution p on Φ such that for
all agents i and all strategies φi, φ′
i if all agents follow a strategy profile φ
that recommends player i to choose strategy φi, agent i has no incentive to
play another strategy φ′
i instead. This implies that the following expression
i ∈ Φi and where
holds: Pφ−i∈Φ−i
ui(φ′
i while
all the other agents keep their strategies fixed at φ−i and p(φ) is the probability
of realizing a given strategy profile φ.
i, φ−i) is the utility that agent i gets when it changes its strategy to φ′
i, φ−i)) ≥ 0, ∀i ∈ N , ∀φi, φ′
p(φ)(ui(φ) − ui(φ′
Theorem 1. A correlated equilibrium exists in our POSGI-based prediction
market representation at each stage (trading period).
Proof. At each stage in our prediction market, we can specify the correlated
equilibrium by means of linear constraints as given below:
X
φ−i∈Φ−i
p(φ)(ui(φ) − ui(φ′
i, φ−i)) ≥ 0, ∀i ∈ N, ∀φi, φ′
i ∈ Φi
p(φ) = 1,
X
φ∈Φ
p(φ) ≥ 0
(3)
(4)
(5)
Equation 3 states that when agent i is recommended to select strategy φi, it
must get no less utility from selecting strategy φi as it would from selecting any
other strategy φ′
i. Constraints 4 and 5 guarantee that p is a valid probability
distribution. We can rewrite the linear program specification of the correlated
equilibrium above by adding an objective function to it.
max X
φ∈Φ
p(φ), or min − X
φ∈Φ
p(φ) s.t.
X
p(φ)(ui(φ) − ui(φ′
i, φ−i)) ≥ 0,
φ∈Φ,φ−i∈Φ−i
φ ≥ 0
(6)
(7)
(8)
Program 7 is either trivial with a maximum of 0 or unbounded. Hoense-
laar [16] proved that there is a correlated equilibrium if and only if Program
7 is unbounded. To prove the unboundedness we consider the dual problem of
Equation 7 given in Equation 10.
max 0, s.t.
X
p(φ)[(ui(φ) − ui(φ′
i, φ−i)]T ≤ −1
φ∈Φ,φ−i∈Φ−i
φ ≥ 0
(9)
(10)
(11)
where for every p(φ) there is p(φ) such that p(φ)[(ui(φ) − ui(φ′
i, φ−i)]p(φ) = 0.
Also in [28], the authors showed that the problem given in Equation 10
is always infeasible. From operations research we know that when the dual
problem is infeasible the primal problem is feasible and unbounded. This means
that the primal problem from Equation 7 is always unbounded. We can then
conclude that there is at least one correlated equilibrium in every trading period
of the prediction market.
10
The CE calculation algorithm used by the trading agents in our agent-based
prediction market is shown in Algorithm 1. The calculation of the matrix values
of the U matrix must be done once for each of the N agents. Using the ellipsoid
algorithm [28] the computation of the utility difference ui(φ) − ui(φi, φ−i) for
each agent i can be done in Φi2 time. Therefore, the time complexity of the
CECalc algorithm during each trading period comes to N × Φi2.
CECalc(D, Φ)
Input: D, Φ //D is the duration of the market, Φ is the set of strategies
Output: p //correlated equilibrium
foreach t ← 0 to D do
//do this in each trading period
Let U be the matrix consisting of the values of (ui(φ) − ui(φi, φ−i)),
∀i ∈ N, φ ∈ Φ, φ−i ∈ Φi
p′
t ← getDualDistribution(Φ, U );
pt ← solve for pt s.t. ptU T p′
t = 0;
return pt;
end
GetDualDistribution(Φ, U )
Input: Φ, U
Output: ∆
l = 0;
p′
l ∈ [0, 1];
∆ = {};
while U T · p′
l ≤ −1 is feasible do
∆ = ∆ + p′
l;
l+1 = pl + ǫN ; //increase all elements of p′ by some small amounts
p′
from vector ǫN
l + +;
end
return ∆;
Algorithm 1: Correlated Equilibrium Algorithm
4.4 Correlated Equilibrium with Trading Agents' Risk Pref-
erences
Incorporating the risk preferences of the trading agents is an important factor
in prediction markets. For example, the erroneous result related to the non-
correlation between the trader beliefs and market prices in a prediction market
in [24] was because the risk preferences of the traders were not accounted for,
as noted in [13]. This problem is particularly relevant for risk averse traders
because the beliefs(prices) and risk preferences of traders have been reported
to be directly correlated [10, 20]. In this section, we examine CE that provides
truthful revelation incentives in the prediction market where the agent popula-
tion has different risk preferences. The risk preference of an agent i is modeled
through a utility function called the constant relative risk aversion (CRRA).
We use CRRA utility function to model risk averse agents because it allows to
model the effect of different levels of risk aversion and it has been shown to be a
11
better model than alternative families of risk modeling utilities [31]. It has been
widely used for modeling risk aversion in various domains including economic
domain [17], psychology [21] and in the health domain [2]. The CRRA utility
function is given below:
ui(Ri) =
i
R1−θi
1 − θi
, if θi 6= 1
= ln(Ri), if θi = 1
Here, −1 < θi < 1 is called the risk preference factor of agent i and Ri is the
payoff or reward to agent i calculated using the LMSR [5]. When Ri < 0, we
may get a utility in the form of a complex number. In that case, we convert
the complex number to a real number by calling an existing function that uses
magnitude and the angle of the complex number for conversion. For a risk
neutral agent, θi = 0, which makes ui = Ri, as we have assumed for our CE
analysis of the risk neutral agent in Section 4.3. For risk averse agents, θi > 0.
This makes the CRRA utility function concave. But the concave structure of
the utility ui for a risk averse agent does not affect the existence of at least one
correlated equilibrium because the unboundedness of Equation 7 is not affected
by the concave structure of ui. However, the equilibrium obtained with the
risk averse utility function can be different from the one obtained with the risk
neutral utility function - because the best response p(φ) to p(φ−i) calculated
with the risk neutral utility function might not remain the best response when
the agents are risk averse and use the risk averse utility function. To find
a correlated equilibrium p(φ) in the market with risk averse agents, we first
characterize the set of all Pareto optimal strategy profiles. A strategy profile
φP is Pareto optimal if there does not exist another strategy profile φ′ such that
ui(φ′) ≥ ui(φP ) ∀i ∈ N with at least one inequality strict. In other words, a
Pareto optimal strategy profile is one such that no trader could be made better
off without making someone else worse off. A Pareto optimal strategy profile
can be found by maximizing weighted utilities
maxφ
N
X
i=1
λiui(φ) for some λi
(12)
Setting λi = 1 for all i ∈ N gives a utilitarian social welfare function. The max-
imization problem in Equation 12 can be solved using the Lagrangian method.
We get the following system of N equations:
N
X
i=1
λi
ui(φ)
φi
= 0 , ∀j = 1, ..., N
(13)
that must hold at φP . Each of these equations is obtained by taking a partial
derivative of the respective agent's weighted utility with respect to respective
agent's strategy profile, thus solving the maximization problem given in Equa-
tion 12. By solving the system of equations 13 we get the set of Pareto optimal
strategy profiles. To determine if p(φ) is a correlated equilibrium we simply
check whether it satisfies correlated equilibrium constraints for Pareto optimal
strategy profile given below:
p(φ)(ui(φ) − ui(φ′
Pφ−i∈Φ−i
i, φ−i)) ≥ 0, ∀i ∈ N, ∀φi, φ′
i ∈ Φi
12
Name
No. of days
Duration of 1 day
No. of agents
No. of events
Max. allowed buy/sell quantity of security
Price of security
Value
50
1sec
2
1
1
[0, 1]
Table 1: Parameters used for our simulation experiments
Proposition 1. If p is a correlated equilibrium and φP is a Pareto optimal
strategy profile calculated by p in a prediction market with risk averse agents,
then the strategy profile φP is incentive compatible, that is each agent is best off
reporting truthfully.
Proof. We prove by contradiction. Suppose that φP is not an incentive com-
patible strategy, that is, there is some other φ′ for which
ui(φ′) ≥ ui(φP )
(14)
Equation 14 violates two properties of φP . First of all, since φP is Pareto
optimal, we know that Equation 14 is not true, since ui(φP ) ≥ ui(φ′) by the
definition of Pareto optimal strategy profile. Secondly, if we rewrite Equation 14
as ui(φP ) − ui(φ′) ≤ 0 and multiply both sides by p(φP ), we get p(φP )[ui(φP ) −
ui(φ′)] ≤ 0. Since p is a correlated equilibrium this inequality can not hold,
otherwise it would violate the definition of the correlated equilibrium.
5 Experimental Results
We have conducted several simulations using our POSGI prediction market.
The main objective of our simulations is to test whether there is a benefit to the
agents to follow the correlated equilibrium strategy. We do this by analyzing
the utilities of the agents and the market price. The default values for the
statistical distributions for market related parameters such as the number of
days over which the market runs representing the duration of an event and the
information signal arrival rate were taken from data obtained from the Iowa
Electronic Marketplace(IEM) movie market for the event Monsters Inc.
[19]
and are shown in Table 1.
For all of our simulations, we assume there is one event in the market with
two outcomes (positive or negative); each outcome has one security associated
with it. We consider events that are disjoint (non-combinatorial). This allows us
to compare our proposed strategy empirically with other existing strategies while
using real data collected from the IEM, which also considers non-combinatorial
events. Since we consider disjoint events, having one event vs. multiple events
does not change the strategic behavior of the agent or the results of each agent3.
We report the market price for the security corresponding to the outcome of the
event being 1 (event occurs).
3We have verified positively that our system can scale effectively with the number of events
and agents.
13
We compare the trading agents' and market's behavior under various strate-
gies employed by the agents. We use the following five well-known strategies for
comparison [22] which are distributed uniformly over the agents in the experi-
ments.
1. ZI (Zero Intelligence) - each agent submits randomly calculated quantity
to buy or sell.
2. ZIP (Zero Intelligence Plus) - each agent selects a quantity to buy or sell
that satisfies a particular level of profit by adopting its profit margin based
on past prices.
3. CP (by Preist and Tol) - each agent adjusts its quantity to buy or sell based
on past prices and tries to choose that quantity so that it is competitive
among other agents.
4. GD (by Gjerstad and Dickhaut) - each agent maintains a history of past
transactions and chooses the quantity to buy or sell that maximizes its
expected utility.
5. DP (Dynamic Programming solution for POSG game) - each agent uses
dynamic programming solution to find the best quantity to buy or sell
that maximizes its expected utility given past prices, past utility, past
belief and the information signal [14].
6. CE (Correlated equilibrium solution) - each agent uses Algorithm 1 from
Section 4.3 to determine a correlated equilibrium strategy that gives a
recommended quantity to buy or sell.
y
g
e
t
a
r
t
s
E
C
w
o
l
l
o
f
e
m
i
t
e
h
t
f
o
e
g
a
t
n
e
c
r
e
P
100
90
80
70
60
50
40
30
20
10
0
ZI
ZI
ZIP
CP
GD
DP
CE
1
0.9
0.8
0.7
0.6
0.5
e
c
i
r
p
t
e
k
r
a
M
DP
0.4
0
10
ZIP
CP
GD
Trading Strategies
y
t
i
l
i
t
u
e
v
i
t
a
u
m
u
C
l
10
8
6
4
2
0
−2
−4
−6
−8
0
ZI
ZIP
CP
GD
DP
CE
10
40
50
20
30
40
50
Number of days
20
30
Number of days
a
b
c
Figure 5: (a) Percentage of the number of days each compared trading strategy
follows a correlated equilibrium strategy, (b) Market Prices, and, (c) Utilities of
the risk neutral agent while using different trading strategies.
5.1 Risk-neutral Agents
For our first group of experiments we assume that the agents are risk neutral.
First, we attempt to understand the correspondence between our CE strategy
and each of the other compared strategies. For comparing the CE strategy with
14
each strategy, we ran the simulations with identical settings, once with agents
using the CE strategy for making trading decisions and then with the same
agents using the compared strategy for making trading decisions. Figure 5(a)
shows the number of times(days) an action recommended to a trading agent by
the CE strategy is the same as the action recommended to a trading agent by
one of the compared strategies, expressed as a percentage. We observe that the
action recommended to a trading agent employing the ZI strategy is the same
as the action recommended to a trading agent using CE strategy only 11% of
the time, while for the trading agent using the more refined DP strategy it is the
same 68% of the time. The higher percentage of adoption of the CE strategy by
the more refined strategies indicates that the DP strategy is more sophisticated
than simpler strategies.
In our next set of experiments, we compare the market prices and utili-
ties obtained by a trading agent over time (days) while using different trading
strategies. In each simulation run, the trading agent uses one of the compared
strategies for determining its action at each time step (day). We compare the
cumulative market prices and utilities for each such simulation. We report a
scenario where the event in the prediction market happens and show the market
prices and utilities for the security corresponding to the positive outcome of the
event. In this scenario, the market price should approach $1 (event happens)
as the prediction market's duration nears end. Figure 5(b) shows the market
prices of the orders placed by the trading agents during the duration of the event
for different strategies. We observe that agents using the CE strategy perform
better since they are able to trade at prices that are closer to $1, indicating that
agents using the CE strategy are able to respond to other agents' strategies
and predict the aggregated price of the security more efficiently. This efficiency
is further supported by the graph in Figure 5(c) that shows the utility of the
agents while using different strategies. We see that the agents using the CE
strategy are finally able to obtain 38% more utility than the agents following
the next best performing strategy (DP), and 85% more utility than the agents
following the second worst performing strategy (ZIP).
1
Market price
e
c
i
r
p
t
e
k
r
a
M
0.5
Cumulative utility using CE
Cumulative utility using ZIP
Market price
cumulative utility using CE
cumulative utility using CP
20
1
e
c
i
r
p
t
e
k
r
a
M
0.5
y
t
i
l
i
t
u
e
v
i
t
a
l
u
m
u
C
0
0
5
10
15
a
25
20
Number of days
30
35
40
45
50
0
5
10
15
b
20
Number of days
25
30
20
y
t
i
l
i
t
u
e
v
l
i
t
a
u
m
u
C
0
35
40
45
50
Figure 6: Comparison of the cumulative market prices and utilities obtained by:
(a) CE and ZIP strategies, and, (b) CE and CP strategies.
For our following set of experiments, we further compare the CE strategy
15
e
c
i
r
p
t
e
k
r
a
M
1
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0
Market price
20
Cumulative utility using CE
Cumulative utility using GD
0
10
y
t
i
l
i
t
u
e
v
l
i
t
a
u
m
u
C
1
0.8
0.6
0.4
0.2
e
c
i
r
p
t
e
k
r
a
M
Market price
Cumulative utility using CE
Cumulative utility using DP
25
20
Number of days
30
5
10
15
a
35
40
45
50
5
10
15
b
20
Number of days
25
30
15
y
t
i
l
i
t
u
e
v
10
l
i
t
a
u
m
u
C
5
0
35
40
45
−5
50
Figure 7: Comparison of the cumulative market prices and utilities obtained by:
(a) CE and GD strategies, and, (b) CE and DP strategies.
with other strategies by using two agents in the same simulation run - one
agent using CE strategy and the other agent using the compared strategy. The
results are reported in Figure 6 and 7. We can see that in each scenario the CE
strategy outperforms other strategies. From Figures 6(a) and 7(b) respectively,
we observe that the trading agent using CE strategy gets 95% more utility than
the trading agent using ZIP strategy and 41% more utility than the trading
agent using DP strategy. Overall, we can say that using the POSGI model
allows the agent to avoid myopically predicting prices and use the correlated
equilibrium to calculate prices more accurately and obtain higher utilities.
5.2 Risk averse Agents
y
g
e
t
a
r
t
s
E
C
w
o
l
l
o
f
e
m
i
t
e
h
t
f
o
e
g
a
t
n
e
c
r
e
P
100
90
80
70
60
50
40
30
20
10
0
ZI
ZI
ZIP
CP
GD
DP
CE
1
0.9
0.8
0.7
0.6
0.5
0.4
e
c
i
r
p
t
e
k
r
a
M
DP
0.3
0
10
ZIP
CP
GD
Trading Strategies
20
30
Number of days
y
t
i
l
i
t
u
e
v
i
t
a
u
m
u
C
l
8
6
4
2
0
−2
−4
−6
−8
0
ZI
ZIP
CP
GD
DP
CE
10
40
50
20
30
40
50
Number of days
a
b
c
Figure 8: (a) Percentage of the number of days each compared trading strategy
follows a correlated equilibrium strategy, (b) Market Prices, and, (c) Utilities of
the risk averse agent while using different trading strategies.
Next, we conduct similar simulations for the market while using risk averse
agents that use the risk averse utility function given in Section 4.4. Since in
real world most people are risk averse, we ran several experiments with different
16
Strat. Risk Neutral Agent
Risk Averse Agent
%FCE Price Utility %FCE Price Utility
32% 132%
11%
26% 89%
26%
41%
20% 83%
16% 58%
47%
68%
10% 41%
36% 123%
25% 85%
23% 77%
19% 52%
9%
38%
11%
22%
35%
39%
60%
ZI
ZIP
CP
GD
DP
Table 2: Percentage of the number of days each compared strategy follows the
CE strategy (%F CE in cols. 2 and 5), the percentage of the difference between
each compared strategy and the CE strategy for the market price (cols. 3 and
6) and utility (cols. 4 and 7). Results are shown for both risk neutral and risk
averse trading agents.
values of the risk preference θi > 0. We report the results for θi = 0.8 (strongly
risk averse trading agent) to see a better effect of the risk averse preference of
trading agents on the market prices and their own utilities. To compare the CE
strategy with each of the other strategies we ran the simulation with identical
settings, once with risk averse agents using the CE strategy for making trading
decision and then with the same risk averse agents using the compared strategy
for making trading decisions. Figure 8(a) shows the number of times an action
recommended to a risk averse trading agent by the CE strategy is the same as
the action recommended to a risk averse trading agent by one of the compared
strategies, expressed as a percentage. We can see that the risk averse agents
employing any of the five compared strategies end up adopting the action that
it the same as the action proposed by the CE strategy only 11 − 60% of the
time. We notice that the ZI agents are not affected by the risk averse behavior
of the agents (they follow the CE strategy 11% of the time when the agents
are either risk averse or risk neutral) because they do not use their past utility
to determine future prices. However, other compared agent strategies use their
past utilities to predict future prices. The concave nature of the CRRA utility
function with θi > 0 lowers the utilities that these agents receive, and, this
results in these agents following the CE strategy less often. The effect of the
lowered utility due to the risk averse (concave) utility function is also seen in
Figures 8(b) and (c). Figures 8(b) shows the market prices for an event that
has a final outcome = 1. We again observe that the agents using CE strategy
are able to predict the aggregated price of the security more efficiently during
the duration of the event. Figure 8(c) that shows the utility of the risk averse
agents while using different strategies. We see that the agents using the CE
strategy are able to obtain 42% more utility than the agents following the next
best performing strategy (DP) and 127% more utility than the agents following
the worst performing strategy (ZI).
The summary of all of our results is given in Table 2. For each type of
agent, risk neutral or risk averse, the first column, %FCE, indicates percentage
of the number of days the actions of the trading agents using each compared
strategy are the same as the CE strategy. The second and the third column
show the percentage of the difference between each compared strategy and the
CE strategy for the market price and utility, respectively.
In summary, the
17
POSGI model and the CE strategy result in better price tracking and higher
utilities because they provide each agent with a strategic behavior while taking
into account the observations of the prediction market and the new information
of the events.
6 Conclusions
In this paper, we have described an agent-based POSGI prediction market with
an LMSR market maker and empirically compared different agent behavior
strategies in the prediction market. We proved the existence of a correlated equi-
librium in our POSGI prediction market with risk neutral agents, and showed
how correlated equilibrium can be obtained in the prediction market with risk
averse agents. We have also empirically verified that when the agents follow
a correlated equilibrium strategy suggested by the market maker they obtain
higher utilities and the market prices are more accurate.
In the future we are interested in conducting experiments in an n-player sce-
nario for the POSGI formulation given in Section 3 using richer commercially
available prediction market data sets. We also plan to analyze the performance
of the CE strategy in the scenarios where the outcome of the event does not
correspond to the predicted outcome of the event by the market price, i.e. when
prediction market fails. We also plan to investigate the dynamics evolving from
multiple prediction markets that interact with each other. Finally, we are in-
terested in exploring truthful revelation mechanisms that can be used to limit
untruthful bidding in prediction markets.
Acknowledgments
This research has been sponsored as part of the COMRADES project funded
by the Office of Naval Research, grant number N 000140911174.
References
[1] R. J. Aumann. Subjectivity and correlation in randomized strategies. Jour-
nal of Math- ematical Economics, 1(1):67-96, 1974.
[2] H. Bleichrodt, J. van Rijn, M. Johannesson. Probability weighting and
utility curvature in QALY-based decision making. Journal of Mathematical
Psychology, 43:238-260, 1999.
[3] Y. Chen. Predicting Uncertain Outcomes Using Information Markets:
Trader Behavior and Information Aggregation. New Mathematics and Nat-
ural Computation, 2(3):1-17, 2006.
[4] Y. Chen, T. Mullen, C. Chu. An In-Depth Analysis of Information Markets
with Aggregate Uncertainty. Electronic Commerce Research 2006; 6(2):201-
22.
[5] Y. Chen, D. Pennock. Utility Framework for Bounded-Loss Market Maker.
Proc. of the 23rd Conference on Uncertainty in Articifial Intelligence (UAI
2007), pages 49-56, 2007.
18
[6] Y. Chen, S. Dimitrov, R. Sami, D.M. Reeves, D.M. Pennock, R.D. Hanson,
L. Fortnow, R. Gonen. Gaming Prediction Markets: Equilibrium Strategies
with a Market Maker. Algorithmica, 2009.
[7] B. Cowgill, J. Wolfers, E. Zitzewitz. Using Prediction Markets to Track
Information Flows: Evidence from Google. Dartmouth College (2008);
http://www.bocowgill.com/GooglePredictionMarketPaper.pdf.
[8] S. Das. The Effects of Market-making on Price Dynamics. Proceedings of
AAMAS 2008; 887-894.
[9] S. Dimitrov and R. Sami. Nonmyopic Strategies in Prediction Markets.
Proc. of the 9th ACM Conference on Electronic Commerece (EC), pages
200-209, 2008.
[10] S. Dimitrov. Information Procurement and Delivery: Robustness in Predic-
tion Markets and Network Routing. PhD Thesis, University of Michigan,
2010.
[11] J. Feigenbaum, L. Fortnow, D. Pennock and R. Sami. Computation in a
Distributed Information Market. Theor. Comp. Science, 343(1-2):114-132,
2005.
[12] D. Fudenberg and J. Tirole. Game Theory. MIT Press, 1991.
[13] S. Gjerstad. Risks, Aversions and Beliefs in Predictions Markets. mimeo,
U. of Arizona, 2004.
[14] E. Hansen, D. Bernstein, S. Zilberstein. Dynamic programming for partially
observable stochastic games. In Proceedings of the 19th National Conference
on Artificial Intelligence, pages 709-715, 2004.
[15] R. Hanson. Logarithmic Market scoring rules for Modular Combinatorial
Information Aggregation. Journal of Prediction Markets, 1(1):3-15, 2007.
[16] A. Hoenselaar. Equilibria
in Multi-Player Gamesequilibria. 2007.
http://www.cs.brown.edu/courses/cs244/notes/andreas.pdf.
[17] C.A. Holt, S.K. Laury. Risk aversion and incentive effects. American Eco-
nomic Review, 92:1644-1655, 2002.
[18] K. Iyer, R. Johari, C. Moallemi. Information Aggregation in Smooth Mar-
kets. Proceedings of the 11th ACM conference on Electronic commerce
(EC'10), pages 199-206, 2010.
[19] Iowa Electronic Marketplace. URL: www.biz.uiowa.edu/iem/
[20] J.B. Kadane and R.L.Winkler. Separating probability elicitation from utili-
ties. Journal of the American Statistical Association, 83(402):357-363, 1988.
[21] R.D. Luce, C.L. Krumhansi. Measurement, scaling, and psychophysics. In
Stevens Handbook of Experimental Psychology, Wiley: New York, 1:3-74,
1988.
19
[22] H. Ma, H. Leung. Bidding Strategies in Agent-Based Continuous Dou-
ble Auctions. Whitestein Series In Software Agent Technologies And Auto-
nomic Computing, 2008.
[23] J. Maheu, T. McCurdy. New Arrival Jump Dynamics, and Volatility Com-
ponents for Individual Stock Returns. The Journal of Finance, 59(2):755-
793, 2004.
[24] C. Manski. Interpreting the Predictions of Prediction Markets. Economic
Letters, 91(3):425-429, 2006.
[25] M. Ostrovsky. Information Aggregation in Dynamic Markets with Strate-
gic Traders. Proc. of the 10th ACM conference on Electronic commerce
(EC'09), pages 253-254, 2009.
[26] A. Othman and T. Sandholm. Automated Market Making in the Large:
The Gates Hillman Prediction Market. of the 11th ACM conference on
Electronic commerce (EC'10), pages 367-376, 2010.
[27] A. Othman, T. Sandholm, D. Reeves and D. Pennock. A Practical
Liquidity-Sensitive Automated Market Maker. of the 11th ACM conference
on Electronic commerce (EC'10), pages 377-386, 2010.
[28] C. Papadimitriou, T. Roughgarden. Computing correlated equilibria in
multi-player games. Journal of ACM, 55(3):1-29, 2008.
[29] C. Plott and K. Chen. Information Aggregation Mechanisms: Concept,
Design and Implementation for a Sales Forecasting Problem. Social Science
working paper no. 1131, California Institute of Technology, 2002.
[30] A. Tversky and D. Kahneman. The framing of decisions and the psychology
of choice. Science, 211:453-458, 1981.
[31] P.P. Wakker. Explaining the Characteristics of the Power (CRRA) Utility
Family, Health Economics, 17:1329-1344, 2008.
[32] J. Wolfers and E. Zitzewitz. Prediction Markets. Journal of Economic Per-
spectives, 18(2):107-126, 2004.
[33] J. Wolfers and E. Zitzewitz. Interpreting Prediction Markets as Probabili-
ties. NBER Working Paper No. 12200, May 2006.
[34] Yootles. URL: http://www.yootles.com
20
|
1304.6360 | 1 | 1304 | 2013-04-23T17:40:18 | Assessment of Path Reservation in Distributed Real-Time Vehicle Guidance | [
"cs.MA"
] | In this paper we assess the impact of path reservation as an additional feature in our distributed real-time vehicle guidance protocol BeeJamA. Through our microscopic simulations we show that na\"{\i}ve reservation of links without any further measurements is only an improvement in case of complete market penetration, otherwise it even reduces the performance of our approach based on real-time link loads. Moreover, we modified the reservation process to incorporate current travel times and show that this improves the results in our simulations when at least 40% market penetration is possible. | cs.MA | cs | Assessment of Path Reservation
in Distributed Real-Time Vehicle Guidance
Department of Computer Science / TU Dortmund, Germany
Sebastian Senge
3
1
0
2
r
p
A
3
2
]
A
M
.
s
c
[
1
v
0
6
3
6
.
4
0
3
1
:
v
i
X
r
a
Abstract -- In this paper we assess the impact of path reser-
vation as an additional feature in our distributed real-time
vehicle guidance protocol BeeJamA. Through our microscopic
simulations we show that naıve reservation of links without any
further measurements is only an improvement in case of complete
market penetration, otherwise it even reduces the performance
of our approach based on real-time link loads. Moreover, we
modified the reservation process to incorporate current travel
times and show that this improves the results in our simulations
when at least 40% market penetration is possible.
Index Terms -- vehicle route guidance, distributed system,
swarm intelligence
I. INTRODUCTION
It is widely acknowledged that traffic congestions in urban
road networks have enormous negative impacts with respect
to economical as well as ecological aspects [1]. Hence, there
has been extensive research in the field of traffic flow opti-
mization [2] and (on-line) vehicle guidance recently. In [3]
we proposed a distributed, swarm intelligence-based vehicle
guidance approach termed BeeJamA. In contrast
to state-
of-the-art commercially available systems, based on central-
ized shortest path algorithms, distributed routing protocols
in general have potentially a higher scalability in terms of
road segment (link) load update frequency and covered area.
The BeeJamA approach borrows from the foraging behavior
of honey bees and utilizes a multi-layer hierarichal concept
to disseminate routing relevant link load information every
second but in a limited vicinity only, similar to the scout-
forager behavior of its natural counterpart.
In [4], [5] two distributed ant-based vehicle guidance ap-
proaches have been described. The latter also includes a dy-
namic path reservation approach, however, it is only evaluated
with a complete, or 100%, (market) penetration. Obviously,
this is a factious assumption as different vehicle guidance
concepts are and will be used in realistic environments. As
the contribution of this paper, we add distributed path reser-
vation to our BeeJamA approach and evaluate the resulting
protocol under varying penetration rates on a complex road
network with a microscopic traffic simulator. We will show
that a simple and naıve link reservation even decreases the
protocol's performance with respect to average travel times if
the penetration is not complete. Additionally, we combine the
strength of the BeeJamA protocol, fast link load updates, with
path reservations and show that this hybrid approach performs
better than the naıve one. In our simulations reservations
increase the performance of BeeJamA if the penetration is
at least 40%.
The remainder of this paper is structured as follows. In the
next section, the basic path reservation concept is described.
In Sec. III, the plain BeeJamA protocol is briefly explained
and the additional reservation procedure is introduced. Sec. IV
presents the simulation setup as well as the simulation results.
Finally, we conclude the findings in Sec. V.
II. PATH RESERVATION
Path reservation refers to the registration of vehicles' ex-
pected arrival times on the links of their anticipated path. In
subsequent guidance decisions these link reservations can be
incorporated to help predicting future link loads. The plain
BeeJamA protocol so far intentionally avoids incorporating
any kind of traffic load prediction, but tries to offer routing
recommendations based on up-to-date traffic information be-
fore each intersection in due time. Path reservation, however,
requires some temporal lookahead, since the link travel time
(the link weight from the perspective of routing protocols)
depends on the number of reservations. Hence, one must infer
from the number of reservations of a link the expected travel
time. The basic tools to express this relation are empirical
density / travel time diagrams or formal link performance
functions (LPF). Empirical density / travel time relationships
may be learned offline or online by means of machine learning
techniques like artificial neural networks. LPFs are equations
typically derived from empirical findings as the well known
BPR function (Bureau of Public Roads, superseded by the Fed-
eral Highway Administration of the United States Department
of Transportation, cf. [6]), given by:
(cid:32)
(cid:19)β(cid:33)
(cid:18) fe
ce
te(fe) = t0
e
1 + α
,
(1)
where te(fe) is the resulting travel time for flow fe attempting
to use link e, when the free flow travel time is t0
e and ce the
capacity (in vehicles per hour) the link has been design for.
Different values of α and β are used to adjust the function to
different road types and can be found in [6].
We derived a LPF under the assumption of equidistant
headways of the queue-based macroscopic MATSim traffic
simulator we used in our simulations from the source code and
checked it empirically in a simple test setup where a single
link is on the only path from source to destination for all
vehicles. The function is given by:
te(fe) =
(fe − 1) 3600
ce
fe < ce
else,
,
(2)
(cid:40)t0
e,
t0
e +
(cid:16)
(cid:17)
Fig. 1: Link performance function
Fig. 2: Positive effect of reservation on travel time distribution
where ce is maximum capacity of the link e, a value the
simulator computes on startup from static properties of a
link like type and number of lanes of the road. In general,
the headways must not be not equidistant, thus a pile-up in
the incoming queue of a link occurs and the second case
(fe ≥ ce) describes the travel time by its own. Fig. 1 depicts
the MATSim LPF as well as three BPR instances (with
α = 0.15, β = 4 (default), α = 0.88, β = 9.8 (highway),
α = 1, β = 5.4 (multilane), cf. [6] for more details).
Essentially, path reservation then works as follows. With
each link a reservation log is associated, which consists of
slots (in this paper with a length of 1 minute). Now suppose
a vehicle v is currently at node n0 at time t0 and a path
of nodes (n0, n1, . . . , nm) is calculated, where nm is the
vehicle's destination. First, the expected travel time t0,1of link
(n0, n1) is calculated using the link's LPF. Then, the vehicle
is registered at the link, i.e. each reservation slot for the
link in the interval [t0, t0,1] is incremented and the process
is repeated with link (n1, n2) until the last link is reached.
Thus, subsequent path calculations of other vehicles respect
the path choice of v, since the former registrations lead to
higher LPF values. If a vehicle re-calculates a path during its
travel, it has to update its previous path reservation, i.e. it
removes, advances or postpones the link reservations made so
far and/or adds reservations on other links depending on the
newly calculated path to reflect changes.
Fig. 2 may serve as a general motivation for the idea of
reserving links on a path. There, we compared a dynamic
version of centralized shortest path routing protocol with
(DynResSP) and without (DynSP) path reservation, that has
access to refreshed averaged travel times over the links of the
network every ten minutes. In contrast to the non-reserving
version, the DynResSP protocol reserves each time a new
path is calculated (in other words each 10min at earliest)
the changed path, i.e. the link is annotated such that it is
added when the reserving vehicle will arrive at the beginning
of the link and how long it will likely stay on the link.
(Detailed elucidations of the simulation setup can be found in
Sec. IV.) The average travel time dropped from about 100min
to 42min. As one can see from the boxplots of the travel
time distribution, the lower, medium and upper quartile are
considerably better with path reservation, although there are
a lot of outliers in case of the path reservation protocol and
the maximum values do not differ as desirable. Additionally,
the penetration is 100% and such perfect conditions cannot be
achieved in realistic environments. However, this simplistic
setup makes clear that path reservation may have enormous
potential to reduce travel times.
III. THE BEEJAMA PROTOCOL
The BeeJamA vehicle guidance approach is a distributed
routing protocol based on swarm intelligence and is opti-
mized to disseminate least cost path information in large road
networks as fast as possible. A comprehensive description
of the protocol and additional literature references can be
found in [3]. The following sections outline the basic ideas
of BeeJamA, which are then extended by path reservation.
A. Basic Concepts
BeeJamA is a distance vector protocol and continuously
floods bee agents from each node through the network in the
opposite direction of traffic, so-called upstream scouts, (see
Fig. 3(a)). Once a node in the network receives a scout, it
updates its routing table and floods the agent once again to
all predecessors (except the node the bee arrived from). On
their travel a scout accumulates the travel time from the links
and hence disseminates the cumulated travel time upstream
through the network until the hop limit of a scout is reached.
A scout's hop limit depends on the hierarchy level of its origin
node. An hierarchy of overlapping zones is established by
means of a leader election protocol that creates clusters of
adjacent nodes and assigns (at least one) leader node as cluster
representative per cluster. The leaders may start a new leader
election process among them and thereby create cluster on a
higher logical layer level. The highest layer (with the clusters
0500010000150002000001000020000300004000050000Vehicles / hourTravel Time (in seconds)MATSimBPR DefaultBPR HighwayBPR MultilanelllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllDynSP 10minDynResSP 10min0100200300400500Travel Time (in min)of largest extent) floods bees with infinite hop limit, lower
layers have finite and decreasing hop limits (depending on
the configuration which is a tradeoff between accuracy and
communication overhead). As a result, it is finally guaranteed
that at each node at least one routing table entry leads to at
least one cluster representative the destination node is part
of. Then, vehicles are always forwarded on the current least
cost path to cluster representative of the lowest layer of which
scouts have arrived so far at the current node. Finally, the
last cluster is the one-element cluster of the destination node
itself. The protocol
is based on a vehicle-to-infrastructure
(V2I) architecture, where so-called navigators act in lieu of the
nodes and links in their limited area of influence. These areas
are a node partition of the road network and the navigators
maintain routing tables for each of these nodes as well as
handle the outgoing and incoming bee agents.
B. Integration of Path Reservation in BeeJamA
The basic idea to implement path reservation in BeeJamA is
that the upstream scouts additionally disseminate the predicted
future travel times. Unfortunately, an upstream scout does
not know when vehicles (moving downstream) will arrive at
the node the upstream scout currently passes. Thus, it is not
known for which time in future the LPF should be evaluated.
To circumvent this problem, we introduce downstream scouts
which traverse links in the original direction of traffic flow and
work otherwise as their upstream counterparts: cumulating the
travel time and updating tables. However, these table entries
are not used to forward vehicles but to tell the upstream
scouts how long a vehicle currently would need to travel from
the downstream scout's origin to the current node. Fig. 3(b)
illustrates this concept. There, node a floods a downstream
agent and a situation of the asynchronous process is depicted,
where the scout on the left (and least cost) path to e has already
reached e (suppose that is the vehicle's destination). Therefore,
node e has learned that a vehicle starting now at a would need
8 minutes to arrive at e. The next generation of upstream scouts
starting at e can now evaluate the LPF for the correct time, i.e.
in 5min from now on at node d for link (d, e) (see Fig. 3(c)).
The next necessary difference compared to the plain Bee-
is the use of foragers, which are used to
JamA protocol
increment the number of registered vehicles on a link (see
Fig. 3(d)). This agent is called a forager, since it announces a
consumption of available resources, as a forager bee in reality
reduces the amount of available nectar. After the navigator
selected the next hop for the requesting vehicle, a forager is
emitted on the link towards the selected next hop on the least
cost path, i.e. node b in the example. After arriving there, the
same navigators computes the next hop for the forager as if
it was a vehicle and forwards the agent accordingly. Thus,
the forager agent traverses the same path immediately (only
delayed by the transmission in the communication network),
the slower vehicle would take later if the least cost path does
not change in the meantime. When the forager arrives at the
destination, the whole path is transmitted back to the vehicle.
Subsequent foragers started for this vehicle would possibly
result in different paths due to road network load changes,
which the vehicle could test for equality and de-register at
previously chosen links if the path changed.
By virtue of this approach, a completely distributed and dy-
namic path reservation protocol emerges. The main drawback
of this simple and naive approach (ResBeeJamA-N) is that link
travel time is solely derived from the reservations on a link. In
case of 100% penetration this may be and, as the simulation
results show, is beneficial in terms of average travel times. For
the common situation with incomplete penetration of a single
approach, better ways to predict the expected travel time must
be used. There exist a lot of approaches for short and long time
traffic forecasting [7] often requiring expensive computation
or long learning phases, though. Neither is advantageous in
highly dynamic traffic situations, which is why we present a
simple hybrid technique of incorporating a LPF and the current
mean travel time in the next section.
C. Hybrid Path Reservation
Our dynamic hybrid approach (ResBeeJamA-DH) evaluates
the prediction precision per link and weights the link per-
formance prediction and current load accordingly. The better
the prediction over time is, the higher is the impact of the
link performance function. The basic notion of this approach
is a simple heuristical rule of thumb: if the prediction for
a link in the past was precise, the predictions in the future
will be precise as well. To assess the past prediction accuracy
we compare the difference of past predictions and actual
observed travel time on a link. Formally, we apply a regression
analysis technique, the Pearson correlation coefficient. Thus,
a correlation of time (last hour) and the prediction error
(difference of actual and predicted travel time in the last hour)
is calculated and serves as a basis for weighting the ratio of
the LPF and the current mean travel time.
The Pearson product-moment correlation coefficient for
random variables X, Y is defined as
ρX,Y =
cov(X, Y )
σX σY
,
(3)
where cov(X, Y ) denotes the covariance of X and Y and
σX , σY the variances of X and Y , respectively. Using mea-
sures x1, . . . , xn and y1, . . . , yn the empirical version of Eq. 3
is:
,
(4)
(cid:80)n
i=1(xi − x)2(cid:112)(cid:80)n
(cid:112)(cid:80)n
i=1(xi − x)(yi − y)
i=1(yi − y)2
r =
where x, y are the sample means. During the simulation we
take every minute, at time i, an observation of the current
cur as experienced by the vehicles on each
mean travel time te,i
link e and calculate as well a prediction te,i
lpf according the
current reservations on e. The prediction error err is then
cur − te,i
simply denoted by the difference erre,i = te,i
lpf . The
sample xi expresses the time of an observation relative to
the beginning of the current observation time window (at
least one minute, {x1 = 1} and one hour at a maximum
{x1 = 1, . . . , x60 = 60}). Obviously, these samples are always
(a)
(c)
Fig. 3: BeeJamA agents' concepts
(b)
(d)
Fig. 4: Interpretation of prediction error correlation
te =
cur,
cur,
(5)
positive correlation r will be found and vice versa. In case
of an increasing error on the link, we conclude that
the
predictions are less reliable and the current travel time may
be a better estimation of future travel times (cf. Fig. 4). We
express this intuition by
rte
lpf + (1 − r)te
lpf + rte
tlpf ,
(1 − r)te
IV. SIMULATION STUDIES
r ∈ [−1, 0)
r = 0
r ∈ (0, 1]
strictly increasing, i.e. xi < xi+1. The sample yi
is then
the corresponding prediction error. If the prediction error is
increasing over time (and there is a linear dependence), a
The guidance protocols has been evaluated using the MAT-
Sim microscopic traffic simulator on a road network extracted
from Open Street Map. It is a part of the German Ruhr District
debcgfaUpstream ScoutVehicleUpstream ScoutdebcgfaDownstreamScoutDownstreamScoutVehicle+ 2min+ 3min+ 5min+ 5min+ 8min2min1min2min3min3minLink Travel TimeEst. Arrival TimeLeast Cost PathdebcgfaUpstream ScoutVehicleUpstream Scout+ 2min+ 3min+ 5minDisseminates current travel timeDisseminates current and expected travel times based on est. upstream arrival times and reservations Est. Arrival TimedebcgfaForagerVehicleReserved PathIncrement reservations during given period[+0min,+2min][+2min, +3min][+3min, +5min][+5min, +8min]Prediction error (in seconds)Last hour of simulation time Prediction gets better,weight LPF travel times higher(positive correlation) Prediction gets worse,weight current travel time higher (negative correlation) Fig. 5: Ruhr District
Fig. 7: Comparison for a 50% penetration rate
Fig. 6: BeeJamA vs. ResBeeJamA-N
(see Fig. 5) with a size of about 40 × 20km2. The road
network exhibits 5616 nodes and 10185 links. Throughout all
simulations an identical setup of the same 300.000 vehicles is
reused, where in each of the first five simulation hours 60.000
vehicles start.
We compared two routing protocols: a dynamic centralized
shortest path protocol (DynSP) and our own distributed real-
time protocol BeeJamA. The DynSP protocol is powered by a
dynamic version of the A* algorithm, i.e. the link weights are
updated regularly and the vehicle recalculates the least cost
path with the same frequency during its travel. For example
if a DynSP 30min protocol is deployed, every 30min the
link weights as estimated by the current mean travel time is
refreshed. Moreover, all vehicles guided by a DynSP 30min
protocol, requests an initial route and afterwards each 30min.
In the best case a vehicle recalculates its least cost path right
after the link weights were updated, in the worst case the
link weights are nearly 30min old and thus maybe outdated.
The reserving modifications of these protocols are denoted
as DynResSP and ResBeeJamA and a reserve slot length of
1min is used. The BeeJamA protocol floods each second a
generation of scouts, the areas are obtained by a grid partition
(with a box side length of 1500m).
In the following simulation studies we will also evaluate
Fig. 8: BeeJamA vs. ResBeeJamA-DH
the influence of the protocol's penetration, i.e. the (market)
share of a given protocol. In this paper, remaining vehicles
are guided by a DynSP 30min protocol. For example,
if
ResBeeJamA has a penetration of 30%, 90.000 vehicles are
guided by ResBeeJamA and the remaining 210.000 vehicles
by DynSP 30min.
In Sec. II, the Fig. 2 was used to motivate the concept
the boxplots
of reservation. With the above elucidations,
belong to the travel time distributions of a DynSP 10min
and DynResSP 10min, respectively. As stated in Sec. II, it
is obvious that in this example reservation is beneficial. Next,
we will evaluate if BeeJamA as a real-time protocol could gain
an improvement through reservation.
Fig. 6 depicts the average travel time with an increasing
penetration of BeeJamA and ResBeeJamA-N. Obviously, the
naıve reservation is not able to improve the performance of
BeeJamA, except for the unlikely situation of a complete
penetration, where the average travel
time dropped from
29.17min to 27.68min (see Tab. I for details). Next, in Fig. 7
the cumulative number of arrived vehicles over time under
lllllllllllPenetration Rate (in %)Avg. Travel Time (in min)501001502002500102030405060708090100lBeeJamAResBeeJamA−NSimulation time (in min)Cummulated number of arrived vehicles (in 1000 vehicles)BeeJamAResBeeJamA−NResBeeJamA−SResBeeJamA−DH050100200300400500600700050100150200250300lllllllllllPenetration Rate (in %)Avg. Travel Time (in min)501001502002500102030405060708090100lBeeJamAResBeeJamA−DHTABLE I: BeeJamA travel times (in minutes)
Penetration
BeeJamA
ResBeeJamA
DH
N
0%
10%
20%
30%
40%
50%
60%
70%
80%
90%
100%
257.74
155.32
91.02
58.44
45.00
32.78
30.00
28.02
28.96
29.18
29.17
257.74
211.91
159.10
134.29
123.15
94.44
81.77
78.78
76.95
72.23
27.68
257.74
160.46
100.49
69.03
40.91
31.65
29.04
26.91
26.12
25.92
26.53
again both protocols behave similar, however, in the case of
the lower penetration the plain BeeJamA protocol performs
better (resulting in a remarkable difference in the mean travel
time of about 8min) and vice versa in the other case (with a
difference of about 3min in favour of path reservation).
V. CONCLUSION
We presented a thorough simulative analysis of a distributed,
on-line vehicle guidance protocol with a path reservation
extension under varying penetrations. We showed that a naıve
implementation, where the reservations are the only source
to predict future travel times, does not improve the results
in terms of average travel times of our BeeJamA protocol,
except in the unlikely case of a 100% penetration. A hybrid
implementation where the current mean travel time over links
are incorporated additionally improved the results significantly,
though. In future work, will extend the proposed approach to
include marginal cost pricing strategies.
REFERENCES
[1] H. van Essen, A. Schroten, M. Otten, D. Sutter, C. Schreyer, R.
Zandonella, M. Maibach, C. Doll. (2011, Nov.). "External costs of
transport in Europe - Update study for 2008", UIC, [Online]. Avail-
able: http://www.uic.org/IMG/pdf/external costs of transport in europe-
update study for 2008-2.pdf
[2] S. K. Zegeye, B. De Schutter. J. Hellendoorn, E.A. Breunesse, and A.
Hegyi. "A Predictive Traffic Controller for Sustainable Mobility Using
Parameterized Control Policies", In: Trans. on ITS, Vol. 13/3, 2012
[3] S. Senge and H. F. Wedde, "2-Way Evaluation of the Distributed
BeeJamA Vehicle Routing Approach," in Proc. IEEE Intell. Veh. Symp.,
2012, pp. 205-210
[4] B. Tatomir, L.J.M. Rothkrantz, "H-ABC: A scalable dynamic routing
algorithm", In: Recent Advances in Artificial Life, World Scientific
Publishing, Singapore, 2005
[5] R. Claes, T. Holvoet, D. Weyns. "A Decentralized Approach for Antici-
patory Vehicle Routing Using Delegate Multiagent Systems", In: Trans.
on ITS, Vol. 12/2, 2011
[6] A. J. Horrowitz. (1991). "Delay/Volume Relations for Travel Forecasting
Based upon the 1985 Highway Capacity Manual", Federal Highway
Administration, US Department of Transportation, [Online]. Available:
https://pantherfile.uwm.edu/horowitz/www/
SpeedVolume1985HCMReport.pdf
[7] A. Hofleitner, R. Herring, P. Abbeel, and A. Bayen. "Learning the
Dynamics of Arterial Traffic From Probe Data Using a Dynamic Bayesian
Network", In: Trans. on ITS, Vol. 13/4, 2012
Fig. 9: 30% penetration: BeeJamA vs. ResBeeJamA-DH
Fig. 10: 90% penetration: BeeJamA vs. ResBeeJamA-DH
different kinds of BeeJamA for a penetration of 50% is shown.
Beside ResBeeJamA-N and -DH, we also evaluated a simple
static approach (-S), where the weight of the current and LPF
travel time is proportional to the penetration rate, i.e. for the
50% case, the link weight is 2 × tlpf . The intuitive notion of
this weighting is that under a normal distribution assumption,
the number of vehicles actually on a link is twice the registered
vehicles if the penetration is 50%.
The naıve path reservation as well as the static version per-
forms worse, it takes roughly 700min for all vehicles to arrive
compared to about 450min for the plain BeeJamA and the
ResBeeJamA-DH protocol. Interestingly, the DH reservation
is even slightly better and hence we focused in the following
simulations on this variant. Fig. 8 shows the average travel
time over time for the BeeJamA and ResBeeJamA-DH. Even
though, both curves are similar, with at least 40% penetration
the path reservation promises benefits for this certain simula-
tion setup. Fig. 9 and Fig. 10 depict the cumulative number of
arrived vehicles broken down by (Res)BeeJamA and DynSP
protocol for a penetration of 30% and 90%, respectively. Once
lllllllllllllllllllllllllllllllllllllllllllllllllllllllSimulation time (in min)Cummulated number of arrived vehicles (in 1000 vehicles)0501001502002503000100200300400500600lBeeJamA / BeeJamA guidedBeeJamA / DynSP guidedResBeeJamA−DH / ResBeeJamA−DH guidedResBeeJamA−DH / DynSP guidedllllllllllllllllllllllllllllllllllllllllSimulation time (in min)Cummulated number of arrived vehicles (in 1000 vehicles)0501001502002503000100200300400lBeeJamA / BeeJamA guidedBeeJamA / DynSP guidedResBeeJamA−DH / ResBeeJamA−DH guidedResBeeJamA−DH / DynSP guided |
1807.02870 | 2 | 1807 | 2018-09-16T02:35:47 | QDDS: A Novel Quantum Swarm Algorithm Inspired by a Double Dirac Delta Potential | [
"cs.MA"
] | In this paper a novel Quantum Double Delta Swarm (QDDS) algorithm modeled after the mechanism of convergence to the center of attractive potential field generated within a single well in a double Dirac delta well setup has been put forward and the preliminaries discussed. Theoretical foundations and experimental illustrations have been incorporated to provide a first basis for further development, specifically in refinement of solutions and applicability to problems in high dimensional spaces. Simulations are carried out over varying dimensionality on four benchmark functions, viz. Rosenbrock, Rastrigrin, Griewank and Sphere as well as the multidimensional Finite Impulse Response (FIR) Filter design problem with different population sizes. Test results illustrate the algorithm yields superior results to some related reports in the literature while reinforcing the need of substantial future work to deliver near-optimal results consistently, especially if dimensionality scales up. | cs.MA | cs | QDDS: A Novel Quantum Swarm Algorithm
Inspired by a Double Dirac Delta Potential
Saptarshi Sengupta, Sanchita Basak, Richard Alan Peters II
Department of Electrical Engineering and Computer Science
Vanderbilt University, Nashville, TN, USA
E-mail: {saptarshi.sengupta, sanchita.basak, alan.peters}@vanderbilt.edu
Abstract -- In this paper a novel Quantum Double Delta Swarm
(QDDS) algorithm modeled after the mechanism of convergence
to the center of attractive potential field generated within a single
well in a double Dirac delta well setup has been put forward and
the preliminaries discussed. Theoretical
foundations and
experimental illustrations have been incorporated to provide a
first basis for further development, specifically in refinement of
solutions and applicability to problems in high dimensional spaces.
Simulations are carried out over varying dimensionality on four
benchmark functions, viz. Rosenbrock, Rastrigrin, Griewank and
Sphere as well as the multidimensional Finite Impulse Response
(FIR) Filter design problem with different population sizes. Test
results illustrate the algorithm yields superior results to some
related reports in the literature while reinforcing the need of
substantial
to deliver near-optimal results
consistently, especially if dimensionality scales up.
future work
Keywords -- Quantum Particle Swarm; Swarm Intelligence; Double
Delta Potential Well; Quantum Mechanics; Optimization
I. INTRODUCTION
The traditional Quantum-behaved Particle Swarm Optimization
(QPSO) algorithms [1-3] (both Types I and II) extend the
classical Newtonian dynamics of agent propagation in the
canonical Particle Swarm Optimization (PSO) [4-5] [13] to a
quantum framework. The convergence of particles to promising
regions in the solution space in QPSO is driven by an attractive
potential field directed towards the center of a singular Dirac
Delta well. This is followed by the collapse of the wavefunction
indicative of the particles' states using recursive Monte Carlo.
The traditional types of QPSO are quite efficient and
inexpensive candidates suitable for highly non-linear and non-
convex optimization leveraging the quantum nature of the
particles and the corresponding wavefunctions that sample a
larger region of the solution space as compared to their classical
counterpart employing a binary strategy: a particle is either
present at a unique location or not. However, the intuitively
simple rendering of the binding force exerted by a single delta
well on a particular particle has been the subject of scrutiny and
further research as demonstrated by [6]. One line of thought
contends that the attractive coupling offered by a multi-well
attractor is stronger than that offered by a singular one therefore
facilitating a stronger stable equilibrium criterion [7]. Xie et al.
[6] have recently proposed a quantum-behaved PSO based on a
double delta model which assimilates the following three
components: a) the global best (gbest) position, b) an agent's
location with respect to the gbest position and c) an agent's
location with respect to the mean of individual agents' best
positions. The authors chose to model the personal and global
best positions as centers of two singular delta potential wells,
thereby arriving at a multi-scale representation of a double delta
potential well. Simulations on widely used test functions such
as Rosenbrock, Rastrigrin, Griewank and Sphere using varying
population sizes for problem dimensionality 10 through 30 at a
step size of 10 indicate the effective outcomes obtained using
the algorithm. Further, the authors note that using two attractors
in place of one increased the global search capability and
convergence accuracy. In our work however, we are concerned
more about finding the state equations of particles based on two
spatially co-located delta potential wells. To this effect, an
isolated system of double Dirac-delta potential wells and
convergence to its centers are considered. The resulting
iterative state updates mimic the trajectory of a bound particle
(E<0) as it moves towards the lowest energy configuration viz.
the point where the attractive potential is the least i.e. the center
of the dominant well. By identifying constraints on the motion
of the particles guided by their probabilistic nature of existence,
an iterative scheme of convergence is put forward. The
resulting algorithm (QDDS) is tested on a suite of benchmark
functions which have many local minima, are bowl-shaped or
valley-shaped as well as on the design optimization goal of a
low-pass Finite
filter. Trial
evaluations indicate the efficiency of the algorithm in finding
solutions of acceptable quality with room for improvement both
in terms of computational expense and finetuning of solutions.
The organization of the paper is as follows: Section II discusses
the physics governing the quantum mechanical model and sets
up algorithmic foundations, Section III walks through the
pseudocode with implementation details and Section IV reports
test results. Section V briefly analyzes the outcomes followed
by an analysis of the QDDS mechanism in Section VI with
concluding remarks in Section VII.
Impulse Response
(FIR)
II. SWARM PROPAGATION USING A DOUBLE-DELTA
POTENTIAL WELL
We start from the time-independent Schrodinger's wave
equation which is stated as:
[−
ћ2
2𝑚
𝛻2 + 𝑉(𝑟)]𝜓(𝑟) = 𝐸 𝜓(𝑟) (1)
ψ(r), V(r), m, E and ћ represent the wave function, the potential
function, the reduced mass, the energy of the particle and
Planck's constant respectively. Let us consider a particle in a
double delta well, whose potential can be expressed as:
𝑉(𝑟) = −𝛼{𝛿(𝑟 + 𝑎) + 𝛿(𝑟 − 𝑎)}
α expresses the strength of the well and {-a, a} are the centers
of the two wells. Considering the even solutions of the time-
independent Schrodinger's equation (Eq. 1) and assuming V= 0
at regions away from the centers of the two wells we get:
(2)
−
ћ2
2𝑚
𝑑2
𝑑𝑟2 𝜓(𝑟) = 𝐸𝜓(𝑟) (3)
The intention is to find solutions of the wave function ψ in a
double delta well setup for E<0 (bound states) in regions
ℝ1: 𝑟 ∈ (−∞, 𝑎), ℝ2: 𝑟 ∈ (−𝑎, 𝑎) 𝑎𝑛𝑑 ℝ3: 𝑟 ∈ (𝑎, ∞).
Assuming k to be equal to (√2𝑚𝐸 ћ⁄ ), the even solutions can
be expressed as [8]:
𝜓𝑒(𝑥) = {
𝐴𝑒−𝑘𝑟 𝑟 > 𝑎
𝐵𝑒−𝑘𝑟 + 𝐶𝑒𝑘𝑟 0 < 𝑟 < 𝑎
𝐵𝑒𝑘𝑟 + 𝐶𝑒−𝑘𝑟 − 𝑎 < 𝑟 < 0
𝐴𝑒𝑘𝑟 𝑟 < −𝑎
(4)
To solve for the constants described in the above equation, we
solve for the continuity of the wave function 𝜓𝑒 at 𝑟 = 𝑎 and
𝑟 = −𝑎 and for the continuity of the derivative of the wave
function at 𝑟 = 0. Hence, we arrive at the equations for 𝜓𝑒
stated below [8]:
𝜓𝑒(𝑟) = {
𝐵(1 + 𝑒2𝑘𝑎)𝑒−𝑘𝑟 𝑟 > 𝑎
𝐵(𝑒−𝑘𝑟 + 𝑒𝑘𝑟) − 𝑎 < 𝑟 < 𝑎
𝐵(1 + 𝑒2𝑘𝑎)𝑒𝑘𝑟 𝑟 < −𝑎
(5)
We are not considering the solution of the odd wave function
𝜓𝑜 here as the existence of a solution is not guaranteed [8]. It is
also interesting to note that the bound state energy in a double
delta potential well is lower than that compared to a single delta
potential well by approximately by a factor of (1.11)2 ≈ 1.2321
[7]. Next, if we consider the behavioral dynamics of a particle
to be compliant with the Schrodinger wave equation i.e. Eq. (1),
then we need to find the particle's probability density function
for its behavioral characterization, which is given by the square
of the magnitude of the wave function described in Eq. (5).
Thus, we have to find 𝜓(𝑟)2. In order to say that there is a
greater than 50% chance of finding a particle in the vicinity of
the center of any of the potential wells, the following criterion
must be satisfied [1]:
𝑟
∫ 𝜓(𝑟)2 𝑑𝑟
−𝑟
> 0.5 (6)
= 0.5𝑔 (1 < 𝑔 < 2) (7)
where −𝑟 and 𝑟 denote the two boundaries of the vicinity.
Although we are trying to confine the particle in any one of the
two potential wells, the wave function considered here is
different from that considered in the case of a single potential
well setup (as in traditional QPSO), This is due to the influence
of the other well which is taken into consideration when
deriving conditions for the confinement of a particle in a single
well. Eq. (6) can also be written as:
𝑟
∫ 𝜓(𝑟)2 𝑑𝑟
−𝑟
For ease of computation, we now consider that one of the wells
is centered at 0. Solving for conditions of confinement of the
particle in that well and computing ∫ (𝜓(𝑟)2 𝑑𝑟
for regions
ℝ20−: 𝑟′ ∈ (−𝑟, 0) by applying the second condition of Eq. (5)
and ℝ20+: 𝑟′ ∈ (0, 𝑟) by applying the first condition of Eq. (5),
we arrive at the equation below:
𝐵2 =
We replace the denominator of the R.H.S. (𝑒2𝑘𝑟 − 5𝑒−2𝑘𝑟 +
4𝑘𝑟 + 4) as δ. Thus, we get:
δ = 𝑒2𝑘𝑟 − 5𝑒−2𝑘𝑟 + 4𝑘𝑟 + 4 (9)
Equating 𝐵2 in L.H.S. of equation (8) for any two consecutive
iterations (assuming it is a constant over iterations as it not a
function of time) we get Eq. (10), Eq. (11) and Eq. (12):
𝑒2𝑘𝑟− 5𝑒−2𝑘𝑟+4𝑘𝑟+4
(8)
𝑟
−𝑟
𝑘𝑔
𝑔𝑖𝑡𝑒𝑟−1
𝑒2𝑘𝑟𝑖𝑡𝑒𝑟−1− 5𝑒−2𝑘𝑟𝑖𝑡𝑒𝑟−1+4𝑘𝑟𝑖𝑡𝑒𝑟−1+4
⇒
=
𝑔𝑖𝑡𝑒𝑟−1
δ𝑖𝑡𝑒𝑟−1
𝑔𝑖𝑡𝑒𝑟
δ𝑖𝑡𝑒𝑟
=
𝑒2𝑘𝑟𝑖𝑡𝑒𝑟− 5𝑒−2𝑘𝑟𝑖𝑡𝑒𝑟+4𝑘𝑟𝑖𝑡𝑒𝑟+4
𝑔𝑖𝑡𝑒𝑟
(10)
(11)
⁄
⇒ δ𝑖𝑡𝑒𝑟 = 𝐺. δ𝑖𝑡𝑒𝑟−1 (0.5 < 𝐺 < 2) (12)
G is the ratio (𝑔𝑖𝑡𝑒𝑟 𝑔𝑖𝑡𝑒𝑟−1
) and can vary from 0.5 to 2 since
(1<g<2). To keep a particle moving towards the center of a
potential well we find 𝛿𝑖𝑡𝑒𝑟 (0.5 𝛿𝑖𝑡𝑒𝑟−1 < 𝛿𝑖𝑡𝑒𝑟 < 2 𝛿𝑖𝑡𝑒𝑟−1).
Thus, we find 𝛿𝑖𝑡𝑒𝑟 at the current iteration based on 𝛿𝑖𝑡𝑒𝑟−1
(found in the previous iteration) by adding or subtracting the
gradient of 𝛿𝑖𝑡𝑒𝑟−1 multiplied by a learning rate. The governing
conditions of finding 𝛿𝑖𝑡𝑒𝑟 depend on the relation of 𝛿𝑖𝑡𝑒𝑟−1
with its version in the previous iteration, i.e., δ𝑖𝑡𝑒𝑟−2 as well as
the sign of the gradient of 𝛿𝑖𝑡𝑒𝑟−1 as described in Algorithm 1.
The learning rate θ is designed as:
𝜃 = (1 − є ) (
𝑚𝑎𝑥. 𝑖𝑡𝑒𝑟𝑎𝑡𝑖𝑜𝑛𝑠 − 𝑐𝑢𝑟𝑟𝑒𝑛𝑡 𝑖𝑡𝑒𝑟𝑎𝑡𝑖𝑜𝑛
𝑚𝑎𝑥. 𝑖𝑡𝑒𝑟𝑎𝑡𝑖𝑜𝑛𝑠
) + є (13)
є is a small fraction between [0,1] set by the user. The learning
rate θ decreases linearly from 1 to є with the passage of
iterations. Once we obtain 𝛿𝑖𝑡𝑒𝑟, we back-solve Eq. (9) to
retrieve 𝑟𝑖𝑡𝑒𝑟 which denotes a particle's position as well as the
potential solution for that particular iteration. We let 𝑟𝑖𝑡𝑒𝑟, i.e. a
particle's position in the current iteration maintain a component
towards the best position found so far (gbest) along with its
current solution obtained from 𝛿𝑖𝑡𝑒𝑟. Subsequently, a cost
function is computed with the solution 𝑟𝑖𝑡𝑒𝑟 and if it is better
than the best cost found thus far, the cost and the corresponding
solution are stored in memory. This process is repeated over the
total number of evaluations to find the overall best cost and best
solution for the swarm. The complete procedure is described in
Section III.
III. QUANTUM DOUBLE DELTA SWARM ALGORITHM (QDDS)
In this section, we present the pseudocode of the Quantum
Double Delta Swarm (QDDS) Algorithm.
for each dimension
Initialize positions 𝒓𝟏 and 𝒓𝟐 for iterations 1 and 2
Algorithm 1. Quantum Double Delta Swarm Algorithm
Initialization Phase
1: Initialize k
2: Initialize a small constant λ randomly
3: Initialize maximum no. of iterations as maxiter
4: Initialize bestcost
5: for each particle
6:
7:
8: end for
9: end for
10: Generate 𝜹𝟏 and 𝜹𝟐 from 𝒓𝟏 and 𝒓𝟐 according to Eq. (9)
11: Set iteration count iter=3
Optimization Phase
12: while (iter<maxiter) and
{(𝜹𝒊𝒕𝒆𝒓−𝟏 < 𝟎. 𝟓 ∗ 𝜹𝒊𝒕𝒆𝒓−𝟐) or (𝜹𝒊𝒕𝒆𝒓−𝟏 > 𝟐 ∗ 𝜹𝒊𝒕𝒆𝒓−𝟐)}
13: Find learning rate θ using eq. (13)
14: Select a particle randomly
15: for each dimension
16:
17:
18:
19:
20:
21:
22:
23:
24: end if
25: end for
26: Solve 𝒓𝒊𝒕𝒆𝒓 from 𝜹𝒊𝒕𝒆𝒓
27: Generate a random number 𝝆 between 0 and 1
28: 𝒓𝒊𝒕𝒆𝒓=𝝆 ∗ 𝒓𝒊𝒕𝒆𝒓 + (𝟏 − 𝝆) ∗ 𝒓𝒈𝒃𝒆𝒔𝒕
29: Compute cost using 𝒓𝒊𝒕𝒆𝒓
30: if 𝒄𝒐𝒔𝒕𝒊𝒕𝒆𝒓<bestcost
31:
32:
33: end if
34: iter = iter + 1
35: end while
if (𝜹𝒊𝒕𝒆𝒓−𝟏 > 𝟐 ∗ 𝜹𝒊𝒕𝒆𝒓−𝟐) and 𝜵𝜹𝒊𝒕𝒆𝒓−𝟏>0
𝜹𝒊𝒕𝒆𝒓 = 𝜹𝒊𝒕𝒆𝒓−𝟏 − 𝜽 ∗ 𝜵𝜹𝒊𝒕𝒆𝒓−𝟏 ∗ 𝝀
elseif (𝜹𝒊𝒕𝒆𝒓−𝟏 > 𝟐 ∗ 𝜹𝒊𝒕𝒆𝒓−𝟐) and 𝜵𝜹𝒊𝒕𝒆𝒓−𝟏<0
𝜹𝒊𝒕𝒆𝒓 = 𝜹𝒊𝒕𝒆𝒓−𝟏 + 𝜽 ∗ 𝜵𝜹𝒊𝒕𝒆𝒓−𝟏 ∗ 𝝀
elseif (𝜹𝒊𝒕𝒆𝒓−𝟏 < 𝟎. 𝟓 ∗ 𝜹𝒊𝒕𝒆𝒓−𝟐) and 𝜵𝜹𝒊𝒕𝒆𝒓−𝟏<0
𝜹𝒊𝒕𝒆𝒓 = 𝜹𝒊𝒕𝒆𝒓−𝟏 − 𝜽 ∗ 𝜵𝜹𝒊𝒕𝒆𝒓−𝟏 ∗ 𝝀
elseif (𝜹𝒊𝒕𝒆𝒓−𝟏 < 𝟎. 𝟓 ∗ 𝜹𝒊𝒕𝒆𝒓−𝟐) and 𝜵𝜹𝒊𝒕𝒆𝒓−𝟏>0
𝜹𝒊𝒕𝒆𝒓 = 𝜹𝒊𝒕𝒆𝒓−𝟏 + 𝜽 ∗ 𝜵𝜹𝒊𝒕𝒆𝒓−𝟏 ∗ 𝝀
bestcost = 𝒄𝒐𝒔𝒕𝒊𝒕𝒆𝒓
best_solution = 𝒓𝒊𝒕𝒆𝒓
IV. EXPERIMENTS AND RESULTS
A. Benchmark Functions
To evaluate the performance of the proposed algorithm,
benchmark functions such as Rastrigrin, Rosenbrock, Sphere
and Griewank have been considered. In addition to this, we test
the algorithm on the multidimensional low pass FIR filter
design problem using filter orders 10 and 20.
Table 1. Benchmark Functions Considered for Testing
Function
Rastrigrin
Rosenbrock
Sphere
Expression
𝑓(𝑥) = 𝐴𝑛 + ∑ [𝑥𝑖
𝑛
𝑖=1
2 − 𝐴𝑐𝑜𝑠(2𝜋𝑥𝑖)]
, A=10
𝑛−1
𝑓(𝑥) = ∑[100(𝑥𝑖+1 − 𝑥𝑖
2)2 + (1 − 𝑥𝑖)2]
𝑖=1
𝑛
2
𝑓(𝑥) = ∑ 𝑥𝑖
𝑖=1
Griewank
𝑓(𝑥) = 1 +
1
4000
𝑛
∑ 𝑥𝑖
𝑖=1
𝑛
𝑖=1
2 − ∏ cos (
𝑥𝑖
√𝑖
)
Min
0
0
0
0
B. Example Application: Design of High Dimensional
Finite Impulse Response (FIR) Filters
This subsection outlines
the design procedure of a
multidimensional low-pass Finite Impulse Response (FIR)
filter as proposed in [9-10]. The ideal filter response 𝐻𝑑(𝑒𝑗𝜔)
and system transfer function 𝐻(𝑧) governing the design of the
filter are given by Eqs. (14) and (15) respectively:
𝐻𝑑(𝑒𝑗𝜔) = 1 0 ≤ 𝜔 ≤ 𝜔𝑝
= 0 𝜔𝑠 ≤ 𝜔 ≤ 𝜋 (14)
𝐻(𝑧) = ∑
Here h(n) denotes the filter's impulse response and N is the order
of the filter having N+1 coefficients. The normalized passband
and stopband edge frequencies are 𝜔𝑝 and 𝜔𝑠 respectively and
Ep and Es are errors in pass band and stop band given by Eqs.
(16) and (17).
𝑛 = 0,1, … . 𝑁 (15)
ℎ(𝑛)𝑧−𝑛
𝑁
𝑛=0
𝐸𝑝 =
1
𝜋
𝜔𝑝
∫ (1 − 𝐻(𝜔))2𝑑𝜔
0
𝐸𝑠 =
1
𝜋
𝜋
∫ 𝐻(𝜔)2𝑑𝜔
𝜔𝑠
(16)
(17)
A cost function 𝛾 of choice used in [9] is re-used for the
minimization objective:
𝛾 = 𝜂𝐸𝑝 + (1 − 𝜂)𝐸𝑠 0 ≤ 𝜂 ≤ 1 (18)
The main focus of the optimization routine is to find a balanced
response that seeks to minimize the cost function 𝛾, thereby
minimizing the passband and stopband errors. The trade-off
between reducing 𝐸𝑝 and 𝐸𝑠 is controlled by selection of a
weight 𝜂 ∈ [0,1] as per the user's design condition.
C. Simulation Results on the Benchmark Functions
Table 2. Experimental Results for the Rosenbrock Function using 10 Independent Trials of QDDS
P
Dim
Iter
20
10
1000
20
30
1500
2000
40
10
1000
20
30
1500
2000
80
10
1000
20
30
1500
2000
PSO [3]
Mean
± St. Dev.
94.1276
±194.3648
204.337
±293.4544
313.734
±547.2635
71.0239
±174.1108
179.291
±377.4305
289.593
±478.6273
37.3747
±57.4734
83.6931
±137.2637
202.672
±289.9728
Iter
1000
1500
2000
1000
1500
2000
1000
1500
2000
QPSO [3]
Mean
± St. Dev.
51.9761
±0.4737
136.8782
±0.6417
157.4707
±0.8287
17.3177
±0.1515
54.0411
±0.4210
81.1382
±0.0319
7.5755
±0.2708
32.9970
±0.2068
53.6422
±0.2616
Iter
1000
1500
2000
1000
1500
2000
1000
1500
2000
WQPSO [3]
Mean
± St. Dev.
35.8436
±0.2843
62.7696
±0.4860
70.9525
±0.4283
16.9583
±0.1336
54.2439
±0.3752
57.0883
±0.3437
10.1650
±0.2345
47.0275
±0.3507
51.8299
±0.3103
Iter
250
375
500
250
375
500
250
375
500
QDDS
Best
Worst
8.8224
8.9700
18.9071
19.2355
29.2827
29.5926
8.7483
9.0642
18.9883
19.2278
29.1769
29.5359
8.8569
9.0454
18.8227
19.2097
29.2291
29.5685
Mean
± St. Dev
8.8912
±0.0529
19.0593
±0.0991
29.4457
±0.0883
8.9030
±0.0875
19.1421
±0.0745
29.3855
±0.1321
8.9213
±0.0670
19.0663
±0.1339
29.4015
±0.1079
Table 3. Experimental Results for the Rastrigrin Function using 10 Independent Trials of QDDS
P
Dim
Iter
20
10
1000
20
30
1500
2000
40
10
1000
20
30
1500
2000
80
10
1000
20
30
1500
2000
PSO [3]
Mean
± St. Dev.
5.5382
±3.0477
23.1544
±10.4739
47.4168
±17.1595
3.5778
±2.1384
16.4337
±5.4811
37.2796
±14.2838
2.5646
±1.5728
13.3826
±8.5137
28.6293
±10.3431
Iter
1000
1500
2000
1000
1500
2000
1000
1500
2000
QPSO [3]
Mean
± St. Dev.
4.8274
±0.0015
16.0519
±0.0414
33.7218
±0.0114
3.1794
±6.033e-04
10.8824
±0.0496
21.4530
±0.0949
2.2962
±0.0130
7.8544
±0.0011
15.9474
±0.0198
Iter
1000
1500
2000
1000
1500
2000
1000
1500
2000
WQPSO [3]
Mean
± St. Dev.
4.0567
±0.0094
12.1102
±0.0287
23.5593
±0.0713
2.8163
±0.0083
9.7992
±0.0628
17.4436
±0.0034
1.8857
±0.0118
7.2855
±0.0032
15.0255
±0.0294
Iter
250
375
500
250
375
500
250
375
500
QDDS
Best
Worst
0.0425
0.2394
0.4765
0.7564
0.7499
1.5330
0.0459
0.2628
0.3117
0.6847
0.6379
1.4135
0.0543
0.2145
0.3059
0.7633
0.9302
1.7447
Mean
± St. Dev
0.1214
±0.0592
0.5776
±0.0967
1.1709
±0.2528
0.1163
±0.0577
0.5539
±0.1300
1.1440
±0.2768
0.1397
±0.0486
0.5312
±0.1331
1.3041
±0.2578
Table 4. Experimental Results for the Sphere Function using 10 Independent Trials of QDDS
P
Dim
Iter
20
10
1000
20
30
1500
2000
40
10
1000
20
30
1500
2000
80
10
1000
20
30
1500
2000
PSO [3]
Mean
± St. Dev.
3.16e-20
±6.23e-20
5.29e-11
±1.56e-10
2.45e-06
±7.72e-06
3.12e-23
±8.01e-23
4.16e-14
±9.73e-14
2.26e-10
±5.10e-10
6.15e-28
±2.63e-27
2.68e-17
±5.24e-17
2.47e-12
±7.16e-12
QPSO [3]
WQPSO [3]
Iter
1000
1500
2000
1000
1500
2000
1000
1500
2000
Mean
± St. Dev.
1.3909e-41
±1.4049e-43
3.5103e-22
±3.5452e-24
5.3183e-14
±5.3623e-16
2.5875e-71
±2.6137e-73
3.7125e-42
±3.7500e-44
4.2369e-30
±1.7009e-33
8.5047e-102
±7.5974e-104
1.1542e-68
±1.1585e-70
2.2866e-49
±2.3070e-51
Mean
± St. Dev.
2.2922e-056
±1.5365e-58
2.9451e-40
±2.8717e-42
3.9664e-33
±3.8435e-35
5.5806e-80
±5.6370e-82
8.8186e-055
±7.1785e-57
5.4389e-44
±2.4132e-45
4.7144e-106
±4.7620e-108
2.5982e-74
±2.6243e-76
2.3070e-51
±1.9125e-62
Iter
1000
1500
2000
1000
1500
2000
1000
1500
2000
Iter Mean
QDDS
Best
Worst
250
375
500
250
375
500
250
375
500
± St. Dev
6.2437e-04
±3.0752e-04
0.0027
±6.9011e-04
0.0067
±0.0013
7.3478e-04
±2.3036e-04
0.0028
±8.3546e-04
0.0060
±8.4108e-04
5.1027e-04
±1.4758e-04
0.0026
±6.0137e-04
0.0055
±8.8175e-04
3.0163e-04
0.0014
0.0019
0.0039
0.0046
0.0085
4.9032e-04
0.0012
0.0016
0.0041
0.0048
0.0072
3.1457e-04
7.5794e-04
0.0020
0.0040
0.0043
0.0069
Table 5. Experimental Results for the Griewank Function using 10 Independent Trials of QDDS
QPSO [3]
WQPSO [3]
Iter
1000
1500
2000
1000
1500
2000
1000
1500
2000
Mean
± St. Dev.
5.5093e-04
±0.0657
1.0402e-04
±0.0211
1.2425e-04
±0.0110
1.6026e-04
±0.0496
1.7127e-04
±0.0167
3.9088e-05
±0.0085
3.3744e-04
±0.0327
4.1701e-04
±0.0168
1.3793e-05
±0.0106
Iter
1000
1500
2000
1000
1500
2000
1000
1500
2000
Mean
± St. Dev.
5.6353e-04
±5.5093e-04
2.1318e-04
±1.0402e-04
2.1286e-04
±1.2425e-04
0.0020
±1.6026e-04
1.6861e-04
±1.7127e-04
3.6762e-05
±3.9088e-05
1.5281e-04
±3.3744e-04
3.2549e-04
±4.1701e-04
4.2231e-05
±1.3793e-05
Iter
250
375
500
250
375
500
250
375
500
Mean
± St. Dev
8.0851e-05
±3.3375e-05
1.9821e-04
±6.2856e-05
2.5607e-04
±6.4991e-05
6.9932e-05
±3.3276e-05
1.9180e-04
±4.7197e-05
2.3775e-04
±5.3165e-05
7.4205e-05
±3.2774e-05
1.8714e-04
±5.6483e-05
2.8736e-04
±4.6883e-05
QDDS
Best
Worst
2.3539e-05
1.2727e-04
1.2262e-04
2.9547e-04
1.6388e-04
3.5948e-04
3.2751e-05
1.3565e-04
1.1890e-04
2.7165e-04
1.5328e-04
3.1541e-04
2.9087e-05
1.4314e-04
1.1359e-04
2.5826e-04
2.0340e-04
3.6768e-04
P
Dim
Iter
20
10
1000
20
30
1500
2000
40
10
1000
20
30
1500
2000
80
10
1000
20
30
1500
2000
PSO [3]
Mean
± St. Dev.
0.09217
±0.0833
0.03002
±0.03255
0.01811
±0.02477
0.08496
±0.0726
0.02719
±0.02517
0.01267
±0.01479
0.07484
±0.07107
0.02854
±0.0268
0.01258
±0.01396
D. Parameter Settings
We choose the constant k to be 5 and λ to be the product of a
random number drawn from a normal distribution with 𝜇 = 0
and 𝜎 = 0.5 and a factor of the order of 10−3. 𝜌 is a random
number drawn between 0 to 1. The learning rate θ decreases
linearly with iterations from 1 to 0.3. All experiments are
carried out on two Intel(R) Core(TM) i7-5500U CPU @
2.40GHz with 8GB RAM and one Intel(R) Core(TM) i7-2600U
CPU @ 3.40GHz with 16GB RAM using MATLAB R2017a.
10 trials are carried out and results reported without any use of
GPUs.
Tables 2 through 5 report performance of the QDDS algorithm
on the Rosenbrock, Rastrigrin, Sphere and Griewank functions
as well as compare and contrast with performances of PSO,
QPSO and Weighted Mean Best QPSO (WQPSO) on the same
benchmarks as reported by Xi et al. in [3]. All mean values and
standard deviations listed in Tables 2,3,4 and 5 for the
algorithms PSO, QPSO and WQPSO have been obtained from
the work of Xi et al [3]. These have been used for a comparison
of the performance of our algorithm (QDDS) on one-fourth the
number of iterations with all other conditions for population
and dimension remaining the same.
P and Dim represent the number of particles and the
dimensionality of the functions. Figures 1 through 12 plot the
convergence profiling of the above experiments on the stated
benchmarks of orders 10, 20 and 30 over 10 independent trials.
For purposes of brevity, results of simulations using only
population size 20 are reported in this section. A detailed
analysis can be found in Section V.
Figure 1: Conv. Profiling of Rastrigrin using QDDS
(dimension=10, population=20)
Figure 2: Conv. Profiling of Rastrigrin using QDDS
(dimension=20, population=20)
Figure 3: Conv. Profiling of Rastrigrin using QDDS
(dimension=30, population=20)
Figure 8: Conv. Profiling of Griewank using QDDS
(dimension=20, population=20)
Figure 9: Conv. Profiling of Griewank using QDDS
(dimension=30, population=20)
Figure 10: Conv. Profiling of Sphere using QDDS
(dimension=10, population=20)
Figure 4: Conv. Profiling of Rosenbrock using QDDS
(dimension=10, population=20)
Figure 5: Conv. Profiling of Rosenbrock using QDDS
(dimension=20, population=20)
Figure 6: Conv. Profiling of Rosenbrock using QDDS
(dimension=30, population=20)
Figure 7: Conv. Profiling of Griewank using QDDS
Figure 11: Conv. Profiling of Sphere using QDDS
(dimension=10, population=20)
(dimension=20, population=20)
Figure 12: Conv. Profiling of Sphere using QDDS
(dimension=30, population=20)
E. Simulation Results for the Finite Impulse Response
(FIR) Filter Design Problem
illustrates
following subsection
The
the design of a
multidimensional low-pass Finite Impulse Response (FIR)
filter using a population size of 1000 and an iteration count of
250 and 500 for filter orders 10 and 20 respectively. The
passband and stopband edges are set at 0.3π and 0.6π.
Table 6. Simulations for the 10-Dimensional FIR Filter
Design Problem using 10 Independent Trials of QDDS
Mean Cost
St. Dev
Best Cost Worst Cost
1.4817e-05
1.6762e-05
5.7632e-08
4.5367e-05
Δ
(dB)
-13.6466
Figure 13: Response of the 10-Dimensional FIR Filter
Table 7. Best 10-Dimensional Filter Coefficients (10 Trials)
Filter
h(1) = h(10)
Coefficients
h(2) = h(9)
h(3) = h(8)
h(4) = h(7)
h(5) = h(6)
0.070824792496751651
-0.063184376757871669
-0.038806613903081974
0.013227497402604124
0.39889122413816075
Table 8. Simulations for the 20-Dimensional FIR Filter
Design Problem using 10 Independent Trials of QDDS
Δ
(dB)
Mean Cost
St. Dev
Best Cost Worst Cost
-17.7398
7.1306e-05
9.9875e-05
1.6055e-06
3.1458e-04
Figure 14: Response of the 20-Dimensional FIR Filter
Table 9. Best 20-Dimensional Filter Coefficients (10 Trials)
Filter
Coefficients
h(1) = h(20)
h(2) = h(19)
h(3) = h(18)
h(4) = h(17)
h(5) = h(16)
h(6) = h(15)
h(7) = h(14)
h(8) = h(13)
h(9) = h(12)
h(10) = h(11)
0.011566963779404912
0.0077331878563942523
-0.0094736298940968737
-0.0068424142182682956
0.024047530227972496
0.04099248691610477
0.14983102243854188
0.0057626071427242216
-0.0038505536917844913
0.28023279944300716
Tables 6 and 8 list the maximum stopband attenuation and the
mean, standard deviation, best and worst cost values when
using QDDS for 10 trials. Tables 7 and 9 report the set of best
filter coefficients for orders 10 and 20 whereas Figures 13 and
14 plot the corresponding filter responses.
V. ANALYSIS OF EXPERIMENTAL RESULTS
the Rosenbrock
From Table 2 it is observed that the QDDS algorithm performs
significantly better on
function of
dimensionality 10, 20 and 30 as compared to PSO, QPSO and
WQPSO. In Table 3 the QDDS algorithm generates mean
values which are at least 11.521 times smaller than WQPSO or
even smaller in case of QPSO and PSO on the Rastrigrin
function of dimensionality 10, 20 and 30. However, the
standard deviation values obtained using WQPSO and QPSO
are clearly superior to those found using QDDS. The results
from Table 4 using the Sphere function indicate the sub-par
performance of QDDS with respect to the competitor
algorithms. Table 5 reports somewhat comparable results in
terms of mean cost using WQPSO, QPSO and QDDS, while it
is to be noted that QDDS has a standard deviation at least ~160
times smaller than that of QPSO. The convergence profiles in
Figures 1 through 12 point out that QDDS is fairly consistent in
its ability to converge to local optima of acceptable quality. It
is obvious that the solutions to the problems discussed in the
paper are in fact local optima, however the solution qualities
corresponding to some of these local optima obtained using
QDDS are evidently superior to some related reports in the
literature [3,6,11,12]. One way to improve the performance of
QDDS may be to not use gradient descent but a problem-
independent optima seeking mechanism in the 𝛿 update step of
the algorithm in Section III. The FIR filter responses record a
maximum stopband attenuation of -13.6466 dB and -17.7398
dB on dimensions 10 and 20 for a QDDS implementation using
gradient descent.
VI. ANALYSIS OF THE QDDS MECHANISM
The Quantum Double Delta Swarm (QDDS) Algorithm is
based on a quantum double Dirac delta potential well model
and is an extension of the conventional QPSO (Type I and Type
II) which are modeled after a singular Dirac delta potential well.
The intuitively simple iterative updates of QDDS lead the
swarm towards fitter regions of the search space in conjunction
with reaching for regions of lower energy for a particle under
the influence of a spatially co-located attractive double delta
potential. The current form of the algorithm, however is prone
to delivering suboptimal results because of the use of a gradient
descent scheme in the 𝜹 update phase. In addition to this, the
time complexity of the algorithm is markedly high due to the
computationally heavy numerical approximation of 𝑟𝑖𝑡𝑒𝑟 from
𝛿𝑖𝑡𝑒𝑟 in the transcendental Eq. (9), as also outlined in Algorithm
1. The effects of using different social/cognition attractors as
well as multi-scale particle topologies remain to be investigated
and a thorough characterization of initialization schemes versus
numerical accuracy is a logical follow-up. Overall, despite the
high computational overhead QDDS produces acceptable
solutions for some problems (Tables 2-3, 5) and not for some
others, as seen in Table 4. However, the fact that QDDS is based
on a legitimate optimization phenomenon in quantum physics
and that it produces good quality solutions on some classical
benchmarks warrants some resource expenditure in exploring
better how it works.
VII. CONCLUDING REMARKS
In this paper, a new swarming mechanism derived from the
quantum mechanics of a double delta potential well is proposed
and its inner workings explored. The mechanism (QDDS) is
formally derived and a computable form is put forward
followed by experiments to determine its accuracy in finding
global optima. This is achieved by approaching some classic
benchmark functions such as Rosenbrock, Rastrigrin, Sphere
and Griewank as well as the multidimensional FIR filter design
problem. Experimental results provide
the
performance of the proposed approach on Rosenbrock,
Rastrigrin and Griewank functions on which it appears to
perform better, while not performing as well in the Sphere
function. In addition to this, successful implementation of FIR
filters of orders 10 and 20 are observed. While the present
version of the algorithm is computationally expensive and
stagnates occasionally, there is room for improvement in both
areas. Future studies would aim at addressing these issues in
addition to performing statistical significance tests to quantify
the performance of the approach over an extensive suite of
separable and non-separable functions of much higher
dimensionality. However, QDDS captures a
relatively
unexplored approach in blending swarm intelligence and
insight
into
optimization and extends the literature on quantum-inspired
computational intelligence.
ACKNOWLEDGEMENTS
This work was made possible by the financial and computing
support by the Vanderbilt University Department of EECS. The
authors would also like to thank the anonymous reviewers for
their suggestions on improving the paper.
CONFLICT OF INTEREST
The authors declare that there is no conflict of interest regarding
the publication of this paper.
REFERENCES
[1] Sun, J., Feng, B., Xu, W.B., "Particle swarm optimization with particles
having quantum behavior.", IEEE Proceedings of Congress on
Evolutionary Computation, pp. 325 -- 331, 2004.
[2] Sun, J., Xu,W.B., Feng, B., "A global search strategy of quantum behaved
particle swarm optimization.", Cybernetics and Intelligent Systems
Proceedings of the 2004 IEEE Conference, pp. 111 -- 116, 2004.
[3] Xi, M., Sun, J., Xu, W., "An improved quantum-behaved particle swarm
optimization algorithm with weighted mean best position", Applied
Mathematics and Computation, Volume 205, Issue 2, 2008, pp. 751-759.
[4] Kennedy, J., Eberhart, R., "Particle swarm optimization.", Proc. IEEE
Int. Conf. Neural Network, 1995.
[5] Eberhart, R., Shi, Y., "Comparison between genetic algorithms and
particle swarm optimization.", Proc. 7th Ann. Conf. Evolutionary
Computation, San Diego, 2000.
[6] Xie, Z., Liu, Q., Xu, L., "A New Quantum-Behaved PSO: Based on
Double δ-Potential Wells Model", Proc. of 2016 Chinese Intelligent
Systems Conference, CISC 2016, Lecture Notes in Electrical
Engineering, vol 404. Springer, Singapore, 2016, pp 211-219.
[7] Basak, S., Lecture Notes, P303 (PE03) Quantum Mechanics I, National
India,
Institute
http://www.niser.ac.in/~sbasak/p303_2010/06.09.pdf.
Education
Science
of
and
Research,
[8] Griffiths, David J. (2005), Introduction to Quantum Mechanics, 2nd
Edition; Pearson Education - Problem 2.27.
[9] Dhabal, S. and Sengupta, S., "Efficient design of high pass FIR
filter using quantum-behaved particle swarm optimization with
weighted mean best position," Proceedings of
the 2015 Third
International Conference on Computer, Communication, Control
and Information Technology (C3IT), Hooghly, 2015, pp. 1-6.
[10] Sengupta, S. and Basak, S., "Computationally efficient low-pass
FIR filter design using Cuckoo Search with adaptive Levy step
size," 2016 International Conference on Global Trends in Signal
Computing
Processing,
Communication
(ICGTSPICC), Jalgaon, 2016, pp. 324-329.
Information
and
[11] Han,P., Yuan, S., Wang, D., "Thermal System Identification Based on
Double Qantum Particle Swarm Optimization", Intelligent Computing in
Smart Grid and Electrical Vehicles, ICSEE 2014, LSMS 2014,
Communications in Computer and Information Science, vol 463.
Springer, Berlin, Heidelberg, 2014, pp 125-137.
[12] Jia, P., Duan, S., Yan, J., "An enhanced quantum-behaved particle swarm
optimizatin based on a novel computing way of local attractor",
Information 2015, 6, 633 -- 649.
[13] Sengupta, S. et al., "Particle Swarm Optimization: A Survey of Historical
and Recent Developments with Hybridization Perspectives", ArXiv
Preprint ArXiv:1804.05319, 2018.
|
1203.5399 | 1 | 1203 | 2012-03-24T10:12:05 | Agent-time Epistemics and Coordination | [
"cs.MA",
"cs.DC",
"cs.LO"
] | A minor change to the standard epistemic logical language, replacing $K_{i}$ with $K_{\node{i,t}}$ where $t$ is a time instance, gives rise to a generalized and more expressive form of knowledge and common knowledge operators. We investigate the communication structures that are necessary for such generalized epistemic states to arise, and the inter-agent coordination tasks that require such knowledge. Previous work has established a relation between linear event ordering and nested knowledge, and between simultaneous event occurrences and common knowledge. In the new, extended, formalism, epistemic necessity is decoupled from temporal necessity. Nested knowledge and event ordering are shown to be related even when the nesting order does not match the temporal order of occurrence. The generalized form of common knowledge does {\em not} correspond to simultaneity. Rather, it corresponds to a notion of tight coordination, of which simultaneity is an instance. | cs.MA | cs |
Agent-time Epistemics and Coordination
Ido Ben-Zvi
Department of Electrical Engineering, Technion
[email protected]
Yoram Moses
Department of Electrical Engineering, Technion
[email protected]
November 4, 2018
Abstract
A minor change to the standard epistemic logical language, replac-
ing Ki with K(cid:104)i,t(cid:105) where t is a time instance, gives rise to a generalized
and more expressive form of knowledge and common knowledge oper-
ators. We investigate the communication structures that are necessary
for such generalized epistemic states to arise, and the inter-agent coor-
dination tasks that require such knowledge. Previous work has estab-
lished a relation between linear event ordering and nested knowledge,
and between simultaneous event occurrences and common knowledge.
In the new, extended, formalism, epistemic necessity is decoupled from
temporal necessity. Nested knowledge and event ordering are shown to
be related even when the nesting order does not match the temporal
order of occurrence. The generalized form of common knowledge does
not correspond to simultaneity. Rather, it corresponds to a notion of
tight coordination, of which simultaneity is an instance.
1
Introduction
We have recently embarked on an in-depth inquiry concerning the relation
between knowledge, coordination and communication in multi agent sys-
tems [5, 6, 4]. This study uncovered new structural connections between
the three in systems where agents have accurate clocks, and there are (com-
monly known) bounds on the time it may take messages to be delivered,
between any two neighboring agents. We call this the synchronous model.
In such a setting, one often reasons about what agents know at particular
1
time points in the past or future, as well as, in particular, what they know
about what other agents will know (or have known) at various other times,
etc.
The emphasis on information regarding the times at which facts are
known has lead us to consider a formalization in which epistemic operators
are indexed by a pair consisting of an agent and a time -- thus, K(cid:104)i,t(cid:105) refers
to what i knows at time t -- rather than the more traditional epistemic op-
erator Ki, in which knowledge is associated with an agent, and the formulas
are evaluated with respect to a particular time. An agent-time pair (cid:104)i, t(cid:105) is
called a node, and we distinguish the new node-based (or nb-) language from
the traditional agent-based one.
In this paper we formulate an expressive language with nb-knowledge
operators, and use it to extend and strictly strengthen the previously estab-
lished relations between knowledge, coordination and communication. Our
earlier inquiries reduced coordination tasks to states of knowledge, and then
analyzed the communication requirements required to obtain these states
of knowledge. Together these provide a crisp structural characterization
of necessary and sufficient conditions for particular coordination tasks, in
terms of the communication required.
We specify coordination tasks in terms of orchestrating a pattern of re-
sponses in reaction to a spontaneous external input initiated by the environ-
ment. Such a spontaneous event is considered as the trigger for its responses.
As shown in [5], ensuring a linearly ordered sequence of responses to such
a triggering event requires a state of deeply nested knowledge, in which the
last responder to know that the next-to-last responder knows, . . . , that the
agent performing the first response knows that the trigger event occurred.
In asynchronous systems without clocks, such nested knowledge can only
be obtained via a message chain from the trigger passing through the re-
sponders in their order in the sequence. The situation in the synchronous
setting, in the presence of timing information, is much more delicate and in-
teresting. In that case, such nested knowledge requires a particular pattern
of communication called a centipede. While nested knowledge is captured
by a centipede, common knowledge corresponds to a more restrictive and
instructive communication pattern called a broom 1). Using the connection
between common knowledge and simultaneity, brooms are shown to underly
natural forms of simultaneous coordination.
The node-based operators give rise to natural strict generalizations of
nested and common knowledge. Of particular interest is node-based com-
1A structure called centibroom in [5] has since been renamed to be a broom.
2
mon knowledge, which is represented by an epistemic operator CA, in which
A is a set of agent-time pairs (cid:104)i, t(cid:105). So C{(cid:104)i,t(cid:105),(cid:104)j,t+3(cid:105)}ϕ indicates, among other
things, that agent i at time t knows that agent j at time t + 3 will know that
i at time t knew that ϕ holds. While nb-common knowledge strictly gener-
alizes classical common knowledge, it shares most of the typical attributes
associated with common knowledge. However, whereas (traditional) com-
mon knowledge is intimately related to simultaneity, nb-common knowledge
is not! We will show that, instead, nb-common knowledge precisely captures
a form of coordination we call tightly-timed response (TTR ). Of course, si-
multaneity is a particular form of tightly-timed coordination.
In general, we follow the pattern of investigation that we established in
earlier papers: Given an epistemic state (such as nb-nested or nb-common
knowledge) we examine, on the one hand, what form of communication
among the agents is necessary for achieving such a state, and on the other
we characterize the type of coordination tasks that require such a state.
As nb-knowledge operators generalize the standard agent-based ones, the
results we obtain here generalize and extend the ones of [5, 4]. Relating
knowledge to communication, we present two "knowledge-gain" theorems
(formulated in the spirit of Chandy and Misra's result for systems without
clocks [7]). Nb-nested and nb-common knowledge are shown to require more
flexible variants of the centipede and the broom communication structures
(respectively), in order to arise.
Perhaps more instructive is the characterization of the coordinative tasks
related to these epistemic states. As mentioned above, nested knowledge
characterizes agents that are engaged in responding in a sequential order to
a triggering event. It turns out that Nb-nested knowledge is similarly neces-
sary when the ordering task predefines not only the sequence of responses,
but also a bound on the elapsed time between each response and its suc-
cessor. We define this task as the Weakly Timed Response problem (WTR).
Interestingly, minute differences in the coordinative task specification result
in dramatic changes to the required epistemic state. As for common knowl-
edge, as hinted above it will be seen that the node-based version relaxes the
typical simultaneous responses requirement into tightly-timed ones.
The main contributions of this paper are:
• Node-based epistemic operators are defined. Under a natural semantic
definition, both nb-knowledge and nb-common knowledge are S5 oper-
ators, while nb-common knowledge satisfies fixed-point and induction
properties analogous to those of standard common knowledge.
• The theory of coordination and its relation to epistemic logic are ex-
3
tended, significantly generalizing previous results. Nb-semantics helps
to decouple epistemic and temporal necessity. Namely, there are cases
in which knowledge about (the guarantee of) someone's knowledge at
a future time, typically based on known communication, is required in
order to perform an earlier action.
• The new epistemic operators are used as a formal tool for the study of
generalized forms of coordination and the communication structures
they require. On the one hand, natural coordination tasks that require
nb-nested and nb-common knowledge are identified. On the other
hand, the communication structures necessary for attaining these nb-
epistemic states are established. Combining the two types of results
yields new structural connection between communication and coordi-
nation tasks.
• The well-known strong connection between common knowledge and
simultaneity established in [12, 11, 10] is shown to be a particular in-
stance of a more general phenomenon: We prove that tightly-timed
synchronization is very closely related to node-based common knowl-
edge. The form of tight synchronization corresponding to agent-based
common knowledge is precisely simultaneous coordination.
This paper is structured as follows. In the next section we define the
syntax and semantics of two languages: One is a traditional agent-based
logic of knowledge, and the other a node-based logic. An embedding of
agent-based formulas in the nb-language is established, and basic properties
of nb-knowledge and nb-ck are discussed. Section 3 presents the synchronous
model within which we will study knowledge and coordination. In Section 4
a review of the notions underlying the earlier analysis, and its main results,
is presented. Our new analysis is presented in Sections 5 and 6. Section 5
defines "uneven" centipedes and relates them to nested nb-knowledge. It
then defines a coordination task called weakly-timed response and shows
that it is captured by nested nb-knowledge. Analogously, Section 6 defines
uneven brooms and relates them to nested nb-common knowledge. It then
defines tightly-timed response and shows that it is captured by nested nb-
ck. Finally, a short discussion and concluding remarks and presented in
Section 7. Proofs of the claims in Sections 5 and 6 are presented in the
Appendix.
4
2 Agent and Node-based Semantics
We consider both the standard, agent-based, epistemic language and its
extension into the node-based variant within the interpreted systems frame-
work of [11]. In this framework, the multi agent system is viewed as consist-
ing of a set P = {1, . . . , n} of agents, connected by a communication network
which serves as the exclusive means by which the agents interact with each
other.
We assume that, at any given point in time, each agent in the system is in
some local state. A global state is just a tuple g = (cid:104)(cid:96)e, (cid:96)1, . . . , (cid:96)n(cid:105) consisting of
local states of the agents, together with the state (cid:96)e of the environment. The
environment's state accounts for everything that is relevant to the system
that is not contained in the state of the agents. A run r is a function
from time to global states. Intuitively, a run is a complete description of
what happens over time in one possible execution of the system. We use
ri(t) to denote agent i's local state (cid:96)i at time t in run r, for i = 1, . . . , n.
For simplicity, time here is taken to range over the natural numbers rather
than the reals (so that time is viewed as discrete, rather than dense or
continuous). Round t in run r occurs between time t − 1 and t. A system
R is an exhaustive set of all possible runs, given the agents' protocol and
the context, where the latter determines underlying characteristics of the
environment as a whole.
To reason about the knowledge states of agents, a simple logical lan-
guage is introduced. Since we are focusing on coordination tasks in which
actions are triggered by spontaneous events, the only primitive propositions
we consider are ones that state that an event has occurred. The standard,
agent-based, variant of this language is L0. It uses the following grammar,
with the usual abbreviations for ∨ and ⇒, and with e, i and G used as terms
for an event, an agent and a group of agents, respectively.
ϕ
::=
occurred(e) ϕ ∧ ϕ ¬ϕ Kiϕ EGϕ CGϕ
The semantics is as follows. Propositional connectives, omitted from the
list, are given their usual semantics.
Definition 1 (L0 semantics). The truth of a formula ϕ ∈ L0 is defined with
respect to a triple (R, r, t).
• (R, r, t) (cid:15) occurred(e) iff event e has occurred in r by time t.
• (R, r, t) (cid:15) Kiϕ iff (R, r(cid:48), t) (cid:15) ϕ for all r ∈ R s.t. ri(t) = r(cid:48)i(t).
• (R, r, t) (cid:15) EGϕ iff (R, r, t) (cid:15) Kiϕ for every i ∈ G.
5
• (R, r, t) (cid:15) CGϕ iff (R, r, t) (cid:15) (EG)kϕ for every k ≥ 1.
Note that while non-epistemic formulas require only a run r and time t
in order to be evaluated, the epistemic operators also require the complete
system of runs R (which provides the analogue of the set of states, or possible
worlds in standard modal logic). The second clause, giving semantics for the
knowledge operator Ki, has built-in an assumption that time is common
knowledge, since knowledge at time t in r depends only on truth in other
runs, that are indistinguishable for agent i from r at the same time t. This
is appropriate for our intended analysis, since in our model (to be presented
in Section 3) time is assumed to be common knowledge. We used L0 to
formalize the analysis in [5].
It will be convenient to
We next define the node-based language L1.
define the set V = {(cid:104)i, t(cid:105) : i ∈ P, t is a time} of all possible nodes. In the
grammar we now use e, α and A as terms for an event, an agent-time node
and a group of such nodes, respectively.
ϕ
::=
occurredt(e) ϕ ∧ ϕ ¬ϕ Kαϕ EAϕ CAϕ
Notice that all statements in this language are "time-stamped:" they
refer to explicit times at which the stated facts hold. As a result, they
are actually time-invariant, and state facts about the run, rather than facts
whose truth depends on the time of evaluation. Therefore, semantics for
formulas of L1 are given with respect to a system R and a run r ∈ R. The
semantics is as follows (again. ommiting propositional clauses).
Definition 2 (L1 semantics). The truth of a formula ϕ ∈ L1 is defined with
respect to a pair (R, r).
• (R, r) (cid:15) occurredt(e) iff event e has occurred in r by time t
• (R, r) (cid:15) K(cid:104)i,t(cid:105)ϕ iff (R, r(cid:48)) (cid:15) ϕ for all runs r(cid:48) s.t. ri(t) = r(cid:48)i(t).
• (R, r) (cid:15) EAϕ iff (R, r) (cid:15) Kαϕ for every α ∈ A.
• (R, r) (cid:15) CAϕ iff (R, r) (cid:15) (EA)kϕ for every k ≥ 1.
In principle, the node-based semantics, as proposed here, can be seen
as a simplified version of a real-time temporal logic with an explicit clock
variable [1], and more generally of a hybrid logic [2]. We are not aware of
instances in which such logics have been combined with epistemic operators.
Nevertheless, in this paper we aim to utilize the formalism, rather than
explore it. Hence, issues of expressibility, completeness and tractability are
left unattended, to be explored at a future date.
6
We now demonstrate that, in a precise sense, the traditional language
L0 can be embedded in the language L1, in a meaning-preserving manner.
We do this by way of defining a "timestamping" operation ts transforming
a formula ϕ ∈ L0 and a time t to a formula ts(ϕ, t) = ϕt ∈ L1 that is
timestamped by t. We then prove the following lemma showing that the
timestamping is sound.
Lemma 1. There exists a function ts : L0 × T ime → L1 such that for every
ϕ ∈ L0 , time t, and ϕt = ts(ϕ, t):
(R, r, t) (cid:15) ϕ
(R, r) (cid:15) ϕt.
iff
Lemma 1 shows that L1 is at least as expressive as L0. Yet L1 is not
equivalent in expressive power to L0, since it allows for multiple temporal
reference points where epistemic operators are involved. For example, the
formula K(cid:104)i,t(cid:105)K(cid:104)j,t(cid:48)
(cid:105)ϕ cannot be translated into an equivalent L0 formula,
since L0 does not allow for the temporal reference point to be shifted when
switching from the outer knowledge operator to the inner one.
Compare a typical agent-based nested knowledge formula, such as ψ =
KiKjϕ, with a node based counterpart such as ψ(cid:48) = K(cid:104)i,t(cid:105)K(cid:104)j,t+3(cid:105)ϕ. In ψ,
gaining knowledge about the epistemic state of other agents means that
the knowledge of the referred other agent has already been gained. By
contrast, in ψ(cid:48) agent i has epistemic certainty concerning the knowledge
state of another agent j, at a particular time in the future. To sum up, the
node-based formalism allows us to differentiate between epistemic necessity,
and temporal tense. Formally trivial, this decoupling is quite elusive as we
tend to mix one with the other. The rest of this paper follows up on the
implications of this point.
It is well-known that standard agent-based common knowledge is closely
Indeed, both CGϕ ⇒ EGCGϕ and
related to simultaneity [12, 11, 10].
KiCGϕ ⇒ CGϕ are valid formulas. (Recall that a formula ψ ∈ L0 is valid
if (R, r, t) (cid:15) ψ for all choices of R, run r ∈ R and time t.) Thus, the first
instant at which CGϕ holds must involve a simultaneous change in the local
states of all members of G. In contrast, simultaneity is not an intrinsic prop-
erty of node-based common knowledge. As an example, consider the node set
A = {(cid:104)i, t(cid:105),(cid:104)j, t + 10(cid:105)}. Although we still have that both K(cid:104)i,t(cid:105)CAϕ ⇒ CAϕ
and CAϕ ⇒ K(cid:104)j,t+10(cid:105)CAϕ are valid formulas, if the current time is t and
i knows that CAϕ holds, this does not mean that j currently knows this
too. The bond with simultaneity has been broken. As we shall see in Sec-
tion 6, however, a notion of tight temporal coordination that generalizes
simultaneity is intrinsic to node-based common knowledge.
7
In the spirit of the treatment in [11], for a formula ψ ∈ L1 we write
R (cid:15) ψ and say that ψ is valid in (the system) R if (R, r) (cid:15) ψ for all r ∈ R.
Node-based common knowledge manifests many of the logical properties
shown by the standard notion of common knowledge. Proof of the following
lemma, and of all new lemmas in this paper, can be found in the Appendix.
Lemma 2.
• Both K(cid:104)i,t(cid:105) and CA are S5 modalities.
• CAϕ ⇒ EA(ϕ ∧ CAϕ) is valid.
• If R (cid:15) ϕ ⇒ EA(ϕ ∧ ψ) then R (cid:15) ϕ ⇒ CAψ
The second clause of Lemma 2 corresponds to the so-called "fixed-point"
axiom of common knowledge, while the third clause corresponds to the "in-
duction (inference) rule" [11].
3 The Synchronous Model
As mentioned, we focus on synchronous systems where the clocks of the in-
dividual agents are all synchronized, and there are commonly known bounds
on message delivery times. Generally, in order to define a system of runs
that conforms to the required setting of interest, we define the system of
runs R as a function R = R(P, γ) of the protocol P followed by the agents,
and the underlying context of use γ.
We identify a protocol for an agent i with a function from local states
of i to nonempty sets of actions. (In this paper we assume a deterministic
protocol, in which a local state is mapped to a singleton set of actions. Such
a protocol essentially maps local states to actions.) A joint protocol is just
a sequence of protocols P = (P1, . . . , Pn), one for each agent.
In this paper we will assume a specified protocol for the agents, namely
the fip, or full information protocol. In this protocol, every agent sends out
its complete history to each of its neighbors, on every round. In order to be
able to do that, the agent must be able to recall its own history. We therefore
also assume this capability, called perfect recall, for the agents. Note that
using a pre-specified protocol is not in general necessary, and is done for
deductive purposes only. Our findings can be applied to all protocols under
slight modifications.
In order for a well defined system of runs R to emerge, the context γ
needs to be rigorously defined as well. We also assume a specific context
8
γmax, within which the agents are operating. Most notably, γmax specifies
that (a) agents share a universal notion of time, (b) the communication
network has upper bounds on delivery times, and (c) all nondeterminism is
deferred to the environment agent.
A word regarding nondeterminism, that plays a crucial role in the anal-
ysis of knowledge gain. Formal analysis allows us to escape the more diffi-
cult questions associated with this concept. For us, intuitively, spontaneous
events are ones that cannot be foretold by the agents in the system. These
could stand for a power shortage, but also for some user input that is com-
municated to an agent via a console. Formally, since all of the agents are
following a deterministic protocol, nondeterminism is only introduced into
the system by the environment.
For brevity, we must omit the formal details2, and make do with describ-
ing the properties of the outcome system R = R(fip, γmax):
• Global clock and global network - The current time is always common
knowledge. The network, which can be encoded as a weighted graph, is
also common knowledge. For each (i, j) connected by a communication
channel, maxij, the weight on the corresponding network edge, denotes
the maximal transmission times for messages sent along this channel.
• Events - There are four kinds of events: message send and receive
events, internal calculations, and external inputs. Events occur at a
single agent, within a single round. All are self explanatory except for
the last type. External input events occur when a signal is received by
an agent from "outside" the system. This could be user input, fate,
and also - less dramatically - it could be used to signify the initial
values for internal variables at the beginning of a run.
• Environment protocol - The environment is responsible for the occur-
rence of two of the event types: message deliveries and external inputs.
(a) message deliveries - the protocol dictates that message deliveries
will occur only for messages that have been sent and are still en route.
Apart from that, the environment nondeterministically chooses when
to deliver sent messages, subject only to the constraint that for every
communication channel (i, j), transmission on the channel does not
take longer than maxij rounds. (b) external inputs - in each round
the environment nondeterministically chooses a (possibly empty) set
of agents at which external inputs will occur, and the kind of events
2The interested reader can find complete accounts of the context we assume in [5, 4]
9
that will occur there. The choice is entirely unconstrained by previous
or simultaneous occurrences.
4 Previous Findings
Our approach is based on the findings of Lamport [13] and of Chandy and
Misra [7]. In his seminal analysis, Lamport defines potential causality, a for-
malization of message chains. Two events are related by potential causality
when the coordinates marking their occurrences (the time and agent at
which they occur) are related by an unbroken sequence of messages. We
rephrase the relation as one holding between pairs of agent-time nodes.
Definition 3 (Potential causality [13]). Fix r ∈ R. The potential causality
relation (cid:32) over nodes of r is the smallest relation satisfying the following
three conditions:
1. If t ≤ t(cid:48) then (cid:104)i, t(cid:105) (cid:32) (cid:104)i, t(cid:48)(cid:105);
2. If some message is sent at (cid:104)i, t(cid:105) and received at (cid:104)j, t(cid:48)(cid:105) then (cid:104)i, t(cid:105) (cid:32)
3. If (cid:104)i, t(cid:105) (cid:32) (cid:104)h, t(cid:48)(cid:48)(cid:105) and (cid:104)h, t(cid:48)(cid:48)(cid:105) (cid:32) (cid:104)j, t(cid:48)(cid:105), then (cid:104)i, t(cid:105) (cid:32) (cid:104)j, t(cid:48)(cid:105).
(cid:104)j, t(cid:48)(cid:105); and
Lamport used the relation as a basis for his logical clocks mechanism that
allows distributed protocol designers in asynchronous contexts to temporally
order events despite the lack of synchronization. Chandy and Misra later
gave an epistemic analysis, showing that for agent j at time t(cid:48) to know of
an occurrence at agent i's at time t, it must be that (cid:104)i, t(cid:105) (cid:32) (cid:104)j, t(cid:48)(cid:105) holds.
In [5, 6, 4] we applied similar methodology to analyze knowledge gain and
temporal ordering of events in synchronous systems, like the one described
here. Note that temporally ordering events in a system with global clock is
quite easy if exact timing is prearranged as a part of the protocol:
Charlie will deposit the money at 3pm, you will sign the contract at 4,
and I will deliver the merchandise at 5.
Coordination becomes more challenging once the time of occurrence of
the triggering, initial, action is nondeterministic:
Charlie will deposit the money, err... whenever, then you will sign the
contract, and only then will I deliver the merchandise.
To approach the issue of event ordering we define the Ordered Response
coordination challenge. Such problems are defined based on a triggering
event es, which is an event of type external input, and a set of responses
10
α1, . . . , αk. Each response αh is a pair (cid:104)ih, ah(cid:105) indicating an action ah that
agent ih is required to carry out. When a response αh gets carried out in
a specific run, we denote with αh = (cid:104)ih, th(cid:105) the specific agent-time node at
which action ah occurs.
Definition 4 (Ordered Response [5]). Let es be an external input nondeter-
ministic event. A protocol P solves the instance OR = (cid:104)es, α1, . . . , αk(cid:105) of
the Ordered Response problem if it guarantees that
1. every response αh, for h = 1, . . . , k, occurs in a run iff the trigger
event es occurs in that run.
2. for h = 1, . . . , k − 1, response αh occurs no later than response αh+1
(i.e. th ≤ th+1).
We can show that solving the challenge for me, you and Charlie requires
that you will know that Charlie has deposited before you sign the contract,
and that I will know that you know that Charlie has made the deposit,
before I deliver the merchandise. Theorem 1 below proves this link between
coordination and knowledge. Like all of the results quoted from previous
works in this section, it is expressed using the language L0.
Theorem 1 ([4]). Let OR =(cid:104)es, α1, . . . , αk(cid:105) be an instance of OR , and
assume that OR is solved in the system R. Let r ∈ R be a run in which es
occurs, let 1 ≤ h ≤ k, and let th be the time at which ih performs action ah
in r. Then
(R, r, th) (cid:15) KihKih−1 ··· Ki1occurred(es).
Given that nested knowledge can be shown to be a necessary prerequi-
site for ordering actions, what patterns of communication will provide such
knowledge gain? One way to ensure event ordering is to insist on a message
chain, linking Charlie to you and then to me. In fact, as Chandy and Misra
show, it is the only way to ensure this, in an asynchronous system. But the
synchronous setting allows for more flexibility in ensuring event ordering.
For example, we could have:
Charlie sends messages to both you and me, alerting us of the deposit.
Given that transmission times are bounded from above, upon getting a mes-
sage from Charlie I calculate how long before the message sent to you is
guaranteed to arrive, and deliver the merchandise only then.
The extra flexibility, when compared to asynchronous systems, is based
on the availability of guarantees on message delivery times. We formalize
these guarantees in the following way:
11
Definition 5 (Bound guarantee [5]). Fix r ∈ R. The bound guarantee
relation (cid:57)(cid:57)(cid:75) over nodes of r is the smallest relation satisfying the following
three conditions:
1. If t ≤ t(cid:48) then (cid:104)i, t(cid:105) (cid:57)(cid:57)(cid:75) (cid:104)i, t(cid:48)(cid:105);
2. If the network contains a channel (i, j) with weight maxij then (cid:104)i, t(cid:105) (cid:57)(cid:57)(cid:75)
3. If (cid:104)i, t(cid:105) (cid:57)(cid:57)(cid:75) (cid:104)h, t(cid:48)(cid:48)(cid:105) and (cid:104)h, t(cid:48)(cid:48)(cid:105) (cid:57)(cid:57)(cid:75) (cid:104)j, t(cid:48)(cid:105), then (cid:104)i, t(cid:105) (cid:57)(cid:57)(cid:75) (cid:104)j, t(cid:48)(cid:105).
(cid:104)j, t + maxij(cid:105); and
With most of the building blocks in place, we are almost ready to de-
scribe the Knowledge Gain Theorem, the technical result at the core of
our [5] paper. The theorem characterizes the communication pattern that is
necessary for nested knowledge gain in synchronous systems. Intuitively, it
shows that message chains still play an important part in information flow,
but the synchronous equivalent of a message chain is much more flexible -
since here agents can also use bound guarantees in order to ensure that a
message arrives at its destination. The resultant message chain abstraction,
called the centipede, is defined below.
Figure 1: A centipede
Definition 6 (Centipede [5]). Let r ∈ R, let ih ∈ P for 0 ≤ h ≤ k and let
t ≤ t(cid:48). A centipede for (cid:104)i0, . . . , ik(cid:105) in the interval [t, t(cid:48)] in r is a sequence
(cid:104)θ0, θ1, . . . , θk(cid:105) of nodes such that θ0 = (cid:104)i0, t(cid:105), θk = (cid:104)ik, t(cid:48)(cid:105), θ0 (cid:32) θ1 (cid:32) ··· (cid:32)
θk, and θh (cid:57)(cid:57)(cid:75) (ih, t(cid:48)) holds for h = 1, . . . , k − 1.
A centipede for (cid:104)i0, . . . , ik(cid:105) is depicted in Figure 1. It shows a message
chain connecting (i0, t) and (ik, t(cid:48)), and along this chain a sequence of "route
splitting" nodes θ1, θ2, etc. such that each θh can guarantee the arrival of
a message to ih by time t(cid:48). Such a message can serve to inform ih of the
12
hi0,tihi1,t0ihi2,t0ihik,t0ihik−1,t0iθ1θ2θk−1occurrence of a trigger event at (cid:104)i0, t(cid:105), and as the set of previously made
guarantees gets shuffled on to the next splitting node, the last agent ik can
be confident that by time t(cid:48) all previous agents are already informed of the
occurrence.
Theorem 2 (Knowledge Gain Theorem [5]). Let r ∈ R. Assume that e is
an external event occurring at (cid:104)i0, t(cid:105) in r.
If (R, r, t(cid:48)) (cid:15) Kik Kik−1··· Ki0occurred(e), then there is a centipede for (cid:104)i0, . . . , ik(cid:105)
in the interval [t, t(cid:48)] in r.
Theorem 1 states that solving the ordering problem requires nested
knowledge of the occurrence of the trigger event to have been gained. Theo-
rem 2 then shows that such knowledge gain can only take place if the agents
are related by the centipede communication pattern.
Although stated in terms of our system R, where agents are assumed
to be following fip, under some further generalization both theorems can
be made to apply for all systems based on the synchronous context γmax,
regardless of the specific protocol.3
The ordering problem, nested knowledge and the centipede define a "ver-
tical stack", going from coordination, to knowledge, to communication and
centered about nested knowledge gain. We now examine another such ver-
tical stack, this time defined based on common knowledge. Common knowl-
edge has been associated with simultaneous action already in [11, 12]. We
touch upon this relation by defining the Simultaneous Response problem
and then using Theorem 3 below.
Definition 7 (Simultaneous Response [5]). Let es be an external input non-
deterministic event. A protocol P solves the instance SR = (cid:104)es, α1, . . . , αk(cid:105)
of the Simultaneous Response problem if it guarantees that
1. every response αh, for h = 1, . . . , k, occurs in a run iff the trigger
event es occurs in that run.
2. all of the responses α1, . . . , αk are performed simultaneously (i.e. t1 =
t2 = ··· = tk).
Theorem 3 ([5]). Let SR = (cid:104)es, α1, . . . , αk(cid:105), and assume that SR is solved
in R. Moreover, let G = {i1, . . . , ik} be the set of processes appearing in
the response set of SR. Finally, let r ∈ R be a run in which es occurs, and
let t be the time at which the response actions are performed in r. Then
(R, r, t) (cid:15) CGoccurred(es).
3 In order to generalize the theorems in this way we need to extend potential causality
into a relation called syncausality. See [5] for more.
13
Relating common knowledge to a necessary communication pattern is
more difficult, especially if you consider the formally-convenient classifi-
cation of common knowledge as an infinite conjunction of nested mutual
knowledge operators. Intuitively, borrowing the centipede from the nested
knowledge results quotes above, this would mean that an infinite centipede
is required in order for common knowledge to arise. However, it turns out
that the necessary communication pattern is quite finite, and more in line
with a fixed point view: In order for the group of agents G to gain common
knowledge that es has occurred, there must exist a single agent-time node θ
that is message chain related to the site of occurrence, and that can guaran-
tee that forwarded messages with information regarding es to all members of
G will arrive by t(cid:48). We call this pattern the broom. The following definition,
and Figure 2 below, should make it apparent why.
Figure 2: A broom
all
Definition 8 (Broom [5]). Let t ≤ t(cid:48) and G ⊆ P. Node θ is a broom for
(cid:104)i0, G(cid:105) in the interval [t, t(cid:48)] in r if (cid:104)i0, t(cid:105) (cid:32) θ and θ (cid:57)(cid:57)(cid:75) (cid:104)ih, t(cid:48)(cid:105) holds for
ih ∈ G.
Theorem 4 states the necessity connection between common knowledge
gain and the broom structure. As before, when we were dealing with nested
knowledge, Theorems 3 and 4 can be made to hold for all synchronous (γmax
based) systems, regardless of protocol.
Theorem 4 (Common Knowledge Gain [5]). Let G ⊆ P, and let r ∈
R. Assume that e is an external input event at (cid:104)i0, t(cid:105) in r. If (R, r, t(cid:48)) (cid:15)
CG(occurred(e)), then there is a broom θ for (cid:104)i0, G(cid:105) in interval [t, t(cid:48)] in r.
5 Nested Knowledge and Weak Bounds
We now re-approach the so-called "vertical stack" centered about nested
knowledge. This time we replace standard nested formulas such as KiKjKkϕ
14
hi0,tiθhi1,t0ihi2,t0ihi3,t0ihik,t0iwith nb-formulations such as K(cid:104)i,t(cid:105)K(cid:104)j,t−4(cid:105)K(cid:104)k,t+8(cid:105)ϕ.
What communication pattern is required in order to attain such nested
knowledge? The following generalization of the centipede echos the above
mentioned break between temporal precedence and necessity.
Definition 9 (Uneven centipede). Let r ∈ R, let A = (cid:104)α0, α1, . . . , αk(cid:105)
be a sequence of nodes. An (uneven) centipede for A in r is a sequence
(cid:104)θ0, θ1, . . . , θk(cid:105) of nodes such that θ0 = α0, θk = αk, θ0 (cid:32) θ1 (cid:32) ··· (cid:32) θk,
and θh (cid:57)(cid:57)(cid:75) αh holds for h = 1, . . . , k − 1.
Figure 3 shows such an uneven centipede. It is termed uneven because
the "legs" of the centipede end at nodes at a variety of different times,
whereas in the traditional centipede all legs ended at nodes of time tk. More
interestingly, note that the node α2 temporally precedes α1 in Fig. 3. In-
tuitively though, this does not seem to concur with the epistemic status
of the two nodes, because information about the occurrence of the trigger
event at α0 flows through θ1 and θ2 to α2, along with θ1's guarantee that
by t1 agent i1 will have received word of the occurrence as well. Thus,
Kα2Kα1occurredt0(es) is attained by information flowing from a witness for
α1 to the node α2. Thus, in a precise sense, while α1 occurs temporally later
than α2, it "epistemically precedes" α2 in this run.
Figure 3: A uneven centipede
Theorem 5 shows that indeed the uneven centipede is necessary for nb-
nested knowledge gain. Interestingly, the proof argument is identical to that
which was used to prove the original Theorem 2. These proofs, originating
in [5], can be found in the Appendix. The only thing changed is the formal
language, and the proposed communication patterns. The same goes for
Theorem 7 below, which utilizes the same proof as Theorem 4, with an
update from L0 to L1. It is a case where our understanding of what is going
on has been limited purely by the expressivity of the formal apparatus of
which we made use.
15
α0θ1θ2θk−1α1α2αk−1αkTheorem 5. Let r ∈ R. Assume that es is an external event occurring at
α0 = (cid:104)i0, t0(cid:105) in r.
If (R, r) (cid:15) Kαk Kαk−1··· Kα0occurredt0(es), then there is an uneven centipede
for (cid:104)α0, . . . , αk(cid:105) in r.
We now turn to explore the implications of nb-nested knowledge for the
coordinated Ordered Response problem. In line with our above discussion
concerning nb-semntics and the decoupling of epistemic necessity and past
tense, we expect that nb-nested knowledge will allow for greater flexibility
in the timing of performed responses, solving tasks such as the following:
Once Charlie deposits the money, you will sign the contract, and I will
deliver the merchandise no more than 5 days after you sign.
This suggests the OR variant (cid:104)deposit,(cid:104)Y ou, sign(cid:105),(cid:104)I, deliver(cid:105)(cid:105), where
the required timing is such that tdeliver ≤ tsign+5. Assume that Charlie, You
and I act at nodes αCh, αY and αI respectively. By modifying Theorem 1,
we should be able to show that KαI KαY occurredtY (deposit) holds. Once we
have shown this, Theorem 5 will show that the required communication is
as shown in Figure 4a.
(a)
(b)
Figure 4
Perhaps surprisingly, it turns out that the required epistemic state for
ensuring the correct execution of the problem as defined, is actually
KαY KαI occurredtI (deposit)! Which in turn requires the inverted centipede
shown in Figure 4b. To see why, consider that the requirement tdeliver ≤
tsign +5 again. Seemingly an upper bound constraint upon me to deliver the
merchandise no more than 5 days after contract sign, it can also be read as a
lower bound constraint upon You to sign the contract no sooner than 5 days
before delivery takes place... The point is, however, that I cannot promise
to deliver the merchandise within the set time, since word of the signing
16
αChθYαYαItI≤tY+5αChθIαIαYtY≥tI−5may arrive at my site a week after it occurs. Whereas You, no matter how
late (or how soon) you hear of my having delivered the merchandise, can
always wait a few days to ensure that the 5 days have passed.
The discussion concerning this timed coordination task points out a valu-
able insight. The knowledge that each agent must possess as it responds,
concerns those responses whose time of occurrence is already bounded from
above. These imply a lower bound for the agent's own action. In the first
proposed (informal) definition, it is actually the case that You have knowl-
edge of an upper limit upon my response. This brings about the reversal of
the required nested knowledge, in comparison to what we expected it to be
like. A task definition that exposes the implied upper bounds is in place.
We now provide a formal definition for the kind of coordination task
that is characterized by nb-nested knowledge. The definition is phrased
in accordance with the above discussion, and as Theorem 6 below shows,
solutions to the problem indeed require that the intuitively proper nested
knowledge holds. The required coordination is considered weakly timed,
reflecting the added existence of timing constraints, which only bound from
below. As we will see in the next section, the tightly timed task is similar,
but contains stronger bounds on relative timing of responses.
Definition 10 (Weakly Timed Response). Let es be an external input non-
deterministic event. A protocol P solves the instance
WTR = (cid:104)es, α1 : δ1, α2 : δ2, . . . , αk−1 : δk−1, αk(cid:105) of the Weakly Timed Re-
sponse problem if it guarantees that
1. every response αh, for h = 1, . . . , k, occurs in a run iff the trigger
event es occurs in that run.
2. in a run where response αh occurs at αh = (cid:104)ih, th(cid:105) for all h ≤ k, for
every such h we have that th+1 ≥ th + δh.
Before stating the theorem relating the WTR problem to nb-nested knowl-
edge, another nuance should be observed. The problem definition specifies
that even though agent ik may not know the exact time at which responses
are performed by other agents, it can work out an upper bound on the time
of responses carried out by agents i1 to ik−1. For example, response αk−1
gets carried out at tk−1 which no later than tk − δk−1. Response αk−2 is
then bounded with respect to αk by tk−2 ≤ tk−1 − δk−2 ≤ tk − δk−1 − δk−2,
etc. We will use
h = (cid:104)ih, tk
βk
h(cid:105)
where tk
h = tk −
17
k−1(cid:88)
j=h
δj
to denote this upper limit: the latest possible node at which response αh
gets carried out, given that response αk is performed at time tk. Note that
th ≤ tk
h is an upper bound on th. For the same reason
we also have that tk
, since
h since by definition tk
h ≤ tk+1
k−1(cid:88)
tk+1
h = tk+1 − δk −
h
j=h
δj = tk+1
k −
δj ≥ tk −
k−1(cid:88)
j=h
δj = tk
h.
k−1(cid:88)
j=h
k−1(cid:88)
j=h
βk
h = (cid:104)ih, tk −
δj(cid:105).
Theorem 6. Let WTR = (cid:104)es, α1 : δ1, α2 : δ2, . . . , αk−1 : δk−1, αk(cid:105) be an in-
stance of WTR, and assume that WTR is solved in the system R. Let r ∈ R
be a run in which es occurs. For each h ≤ k, let αh = (cid:104)ih, th(cid:105) be the node at
which response αh gets performed, and let
Then
(R, r) (cid:15) Kαk Kβk
k−1 ··· Kβk
1
occurredt1(es).
6 Common Knowledge and Tight Bounds
In this section we examine nb-common knowledge and its relation to com-
munication and coordination. Just as nb-nested knowledge requires an ex-
tension to the centipede structure, nb-common knowledge can only arise if
the uneven broom communication structure, seen in Figure 5 and defined
below, takes place in the run. ("Uneven" again comes from the broom's
uneven legs.)
Definition 11 (Uneven broom). Let A = {α1,...,αk} be a sequence of nodes
and let α0 be a node. Node θ is an (uneven) broom for (cid:104)α0, A(cid:105) in r if α0 (cid:32) θ
and θ (cid:57)(cid:57)(cid:75) αh holds for all h = 1, .., k.
Theorem 7 proves that the uneven broom characterizes the necessary
communication for nb-common knowledge to arise.
Theorem 7. Let A ⊆ V with (cid:104)ik, tk(cid:105) being the latest node (tk ≥ th for all
(cid:104)ih, th(cid:105) ∈ A) , and let r ∈ R. Assume that es is an external input event at
α0 in r. If (R, r) (cid:15) CA(occurredtk (es)), then there is a uneven broom θ for
(cid:104)α0, A(cid:105) in r.
18
Figure 5: A uneven broom
Recall the Simultaneous Response problem, that shows standard com-
mon knowledge as the necessary requirement when a group of agents need
to act simultaneously. Yet, as discussed in the introduction, node based
common knowledge does away with simultaneity while retaining other prop-
erties of common knowledge. In accordance, we expect it to serve as the
epistemic requirement for some weakened generalization of the simultane-
ity requirement. The following coordination task seems like a promising
candidate.
Definition 12 (Tightly Timed Response). Let es be an external input non-
deterministic event. A protocol P solves the instance
TTR = (cid:104)es, α1 : δ1, α2 : δ2, . . . , αk : δk(cid:105)
of the Tightly Timed Response problem if it guarantees that
1. every response αh, for h = 1, . . . , k, occurs in a run iff the trigger
event es occurs in that run.
2. For every h, g ≤ k the relative timing of the responses is exactly the
difference in the associated delta values: th − tg = δh − δg
Note how the new TTR problem definition generalizes the previous SR
definition: A simultaneous response problem SR = (cid:104)es, α1, . . . , αk(cid:105) is simply
an extremely tight TTR problem, where δ1, .., δk are all set to 0.
Intuitively, we expect that an agent i participating in a solution to a TTR
task by performing response αi at time ti will know that agent j will perform
its own response αj at precisely tj = δj − δi + ti. We also expect agent j
at tj to know that i is carrying out αi at ti. Theorem 8 below shows that
these individually specified knowledge states, and others that are derived
from the TTR definition, add up to a node based common knowledge gain
requirement.
19
α0θα1α2α3αkTheorem 8. Let TTR = TTR = (cid:104)es, α1 : δ1, α2 : δ2, . . . , αk : δk(cid:105), and as-
sume that TTR is solved in R. Let r ∈ R be a run in which es occurs, and
let A = {α1, . . . , αk} be the set of nodes at which the responses are carried
out in the run r (α1 occurs at node α1, etc.). WLOG, let αh = (cid:104)ih, th(cid:105) be
the earliest node in A. Then (R, r) (cid:15) CAoccurredth(es).
Summing up, the TTR problem requires agents to be fully informed with
respect to each other's response time - without the extra requirement for
simultaneity. Since each of the agents, as it responds, knows the response
times of all other agents - we end up with node based common knowledge,
which in turn still requires that a broom node exist that can guarantee that
all of its messages to the responding agents are delivered by the time these
agents are set to respond.
7 Conclusions
This paper explores the implications of a new formalism for epistemic state-
ments upon the notions of nested and common knowledge. It checks how
these altered concepts interact with communication on the one hand, and
coordination on the other - along the lines of [5, 4]. The new formalism
is seen to allow for a decoupling of epistemic necessity and the past tense,
in the sense that knowing that an event must occur or that an agent gains
knowledge of a fact no longer entails that the occurrence, or the knowledge
gain, have happened in the past. This, in turn, allows for a wider range
of coordination tasks to be characterized in terms of the epistemic states
that they necessitate. We define two such coordination tasks. The Weakly
Timed and the Tightly Timed Response problems, extending our previous
definitions of Ordered and Simultaneous Response [5, 4].
Our analysis of the relations between knowledge and coordination yields
two valuable insights. First, when agents must respond within interrelated
time bounds, as seen in the WTR problem, the crucial knowledge that they
must gain before applying their assigned actions concerns those responses
whose response times are bounded from above with respect to their own
response. This allows them, if necessary, to delay their own action in order
to conform with the problem requirements.
The enquiry into the node-based extension to common knowledge is even
more rewarding. Much has been written about the relation between com-
mon knowledge and simultaneity. Formal analysis of this relation is given
in [12, 11]. Other analyses implicitly rely upon simultaneity in accounting for
common knowledge gain, using such concepts as public announcements [3]
20
or the copresence heuristics [9]. The analysis presented here sheds light on
this issue by generalizing common knowledge and showing that the more
general form corresponds to a temporally tight form of coordination. The
previously established connection between common knowledge and simul-
taneity is, in fact, a particular instance of this more general connection.
Recall by Lemma 1 that there is an embedding of the standard common
knowledge CGoccurred(es) at time t into the formula CAoccurredt(es) ∈ L1
where all nodes in A are timed to t. The particular form of coordination
corresponding to the embedded formula is tight coordination with all deltas
set to 0 -- namely, simultaneity at time t.
We consider this paper as a point of departure for several lines of poten-
tial further research. First, we have only touched the surface of the required
logical analysis for node based semantics. Completeness and tractability is-
sues remain unknown, as well as possible variations on the node based theme
that will chime in with ongoing research in the temporal logic and model
checking communities. Second, although we have mainly been concerned
with temporally oriented coordination, the analysis may also be instructive
where other aspects of coordination are concerned. Chwe's [8] analysis of
the communication network required in order to bring about a revolt in a
social setting is a case in point for further research. Finally, we have yet to
study the implications of the WTR and TTR problems defined here in the
context of distributed computing tasks, where timed coordination is often
essential.
References
[1] R. Alur and T. Henzinger. Logics and models of real-time: A survey.
In Real Time: Theory in Practice, volume 600, pages 74 -- 106. Springer-
Verlag, 1992.
[2] C. Areces and B. ten Cate. Hybrid logics. In P. Blackburn, F. Wolter,
and J. van Benthem, editors, Handbook of Modal Logics. Elsevier, 2006.
[3] A. Baltag, L. S. Moss, and S. Solecki. The logic of public announce-
ments, common knowledge, and private suspicions. In Proceedings of
the 7th conference on Theoretical aspects of rationality and knowledge,
TARK '98, San Francisco, CA, USA, 1998. Morgan Kaufmann Publish-
ers Inc.
[4] I. Ben-Zvi. Causality, Knowledge and Coordination in Distributed Sys-
tems. PhD thesis, Technion, Israel, 2011.
21
[5] I. Ben-Zvi and Y. Moses. Beyond Lamport's happened-before: On the
role of time bounds in synchronous systems. In DISC 2010, pages 421 --
436, 2010.
[6] I. Ben-Zvi and Y. Moses. On interactive knowledge with bounded com-
munication (extended abstract). In LOFT 2010, 2010.
[7] K. M. Chandy and J. Misra. How processes learn. Distributed Com-
puting, 1(1):40 -- 52, 1986.
[8] M. S.-Y. Chwe. Communication and coordination in social networks.
Review of Economic Studies, 67(1), 2000.
[9] H. H. Clark and C. R. Marshall. Definite reference and mutual knowl-
In A. K. Joshi, B. L. Webber, and I. Sag, editors, Elements
edge.
of Discourse Understanding, pages 10 -- 63. Cambridge University Press,
Cambridge, 1981.
[10] R. Fagin, J. Y. Halpern, Y. Moses, and M. Y. Vardi. Common knowl-
edge revisited. In Y. Shoham, editor, Theoretical Aspects of Rationality
and Knowledge: Proc. Sixth Conference, pages 283 -- 298. Morgan Kauf-
mann, San Francisco, Calif., 1996.
[11] R. Fagin, J. Y. Halpern, Y. Moses, and M. Y. Vardi. Reasoning about
Knowledge. MIT Press, Cambridge, Mass., 2003.
[12] J. Y. Halpern and Y. Moses. Knowledge and common knowledge in a
distributed environment. Journal of the ACM, 37(3):549 -- 587, 1990. A
preliminary version appeared in Proc. 3rd ACM Symposium on Princi-
ples of Distributed Computing, 1984.
[13] L. Lamport. Time, clocks, and the ordering of events in a distributed
system. Communications of the ACM, 21(7):558 -- 565, 1978.
22
A Proofs
This appendix contains all lemmas and major proofs necessary to support
the claims of the paper. Note that the formal work leading up to Theorems 5
and 7 is non-trivial, and the interested reader would be better off reading
the more detailed account presented in [5, 6, 4].
Lemma 1. There exists a function ts : L0 × T ime → L1 such that for every
ϕ ∈ L0 , time t, and ϕt = ts(ϕ, t):
(R, r, t) (cid:15) ϕ
(R, r) (cid:15) ϕt.
iff
Proof Proof is by structural induction on ϕ. We go over the clauses. Each
clause is used to define ts, but it is also easy to see that based on the clause
definition (R, r, t) (cid:15) ϕ iff (R, r) (cid:15) ϕt.
• ts(occurred(e), t) = occurredt(e).
• ts(Kiψ, t) = K(cid:104)i,t(cid:105)ψ.
• ts(EGψ, t) = EAψ where A = {(cid:104)j, t(cid:105) : j ∈ G}.
• ts(CGψ, t) = CAψ where A = {(cid:104)j, t(cid:105) : j ∈ G}.
(cid:4)
Lemma 2.
• Both K(cid:104)i,t(cid:105) and CA are S5 modalities.
• CAϕ ⇒ EA(ϕ ∧ CAϕ) is valid.
• If R (cid:15) ϕ ⇒ EA(ϕ ∧ ψ) then R (cid:15) ϕ ⇒ CAψ
Proof
For S5 modality the K(cid:104)i,t(cid:105) case is immediate. We focus on showing for CA:
K (CAϕ ∧ CA(ϕ ⇒ ψ) ⇒ CAψ): Suppose that (R, r) (cid:15) CAϕ∧CA(ϕ ⇒
ψ) ∧ ¬CAψ for some r, ϕ, ψ and A. Then there is a sequence
α1, α2, .., αn ∈ A such that (R, r) (cid:50) KαnKαn−1 ··· Kα1ψ. From
(R, r) (cid:15) CAϕ and (R, r) (cid:15) CA(ϕ ⇒ ψ) we obtain (R, r) (cid:15)
KαnKαn−1 ··· Kα1ϕ and (R, r) (cid:15) KαnKαn−1 ··· Kα1(ϕ ⇒ ψ) re-
and trivial induction we get that (R, r) (cid:15) KαhKαh−1 ··· Kα1ψ for
all h ≤ n, and in particular for h = n. This contradicts the
assumption that (R, r) (cid:15) CAϕ ∧ CA(ϕ ⇒ ψ) ∧ ¬CAψ.
spectively, and using the K axiom for the knowledge operator
23
(R, r) (cid:50) Kαn ··· Kα1Kα(cid:48)
ϕ.
m ··· Kα(cid:48)
1
T (CAϕ ⇒ ϕ): Suppose that (R, r) (cid:15) CAϕ for some r, ϕ and A. Fix
some (cid:104)i, t(cid:105) ∈ A. From (R, r) (cid:15) CAϕ we get (R, r) (cid:15) K(cid:104)i,t(cid:105)ϕ, and
by definition of (cid:15) we conclude that (R, r(cid:48)) (cid:15) ϕ for all r(cid:48) such that
r(cid:48)i(t) = ri(t), and in particular for r(cid:48) = r. Thus (R, r) (cid:15) ϕ.
4 (CAϕ ⇒ CACAϕ): Suppose not. Then there exist r, A, ϕ such that
(R, r) (cid:15) CAϕ and a sequence α1, α2, .., αn ∈ A such that (R, r) (cid:50)
KαnKαn−1 ··· Kα1CAϕ. Once again, there must be a sequence
α(cid:48)1, α(cid:48)2, .., α(cid:48)m ∈ A such that
Yet this contradicts (R, r) (cid:15) CAϕ.
5 (¬CAϕ ⇒ CA¬CAϕ): Suppose not. Then there exist r, A, ϕ such
that (R, r) (cid:15) ¬CAϕ and a sequence α1, α2, .., αn ∈ A such that
(R, r) (cid:50) KαnKαn−1 ··· Kα1¬CAϕ. By definition of (cid:15) there exists
r(cid:48) s.t. rn
in(tn) = rin(tn) and where
(R, rn) (cid:50) Kαn−1Kαn−1 ··· Kα1¬CAϕ.
i1(t1) = r2
i1(t1), r2
we have (i) r1
Similar argumentation provides us with runs rh for all 1 ≤ h < n
such that (R, rh) (cid:50) Kαh−1Kαh−2 ··· Kα1¬CAϕ. In particular for
h = 1 we get that (R, r1) (cid:50) ¬CAϕ, and hence (R, r1) (cid:15) CAϕ,
and finally that (R, r1) (cid:15) KαnKαn−1 ··· Kα1CAϕ. Yet by build
i2(t2) = r3
i2(t2), etc., giving us
(R, r) (cid:15) CAϕ, contradicting our assumption.
N (If (cid:15) ϕ then (cid:15) CAϕ): We show by induction on h that for any h
length sequence α1, α2, .., αh ∈ A we have (cid:15) KαhKαh−1 ··· Kα1ϕ.
For h = 0 this is immediate from the assumption. Assume for h.
Fix run r. Note that for every run r(cid:48) s.t. rih(th) = r(cid:48)ih(th) we have
(R, r(cid:48)) (cid:15) Kαh−1 ··· Kα1ϕ by the inductive hypothesis. Hence we
get that (R, r) (cid:15) KαhKαh−1 ··· Kα1ϕ. As this is true for any r we
conclude that (cid:15) KαhKαh−1 ··· Kα1ϕ as required. By definition of
CAϕ we get that (cid:15) CAϕ.
CAϕ ⇒ EA(ϕ ∧ CAϕ): Fix r, ϕ, A. From (R, r) (cid:15) CAϕ we get by definition
of CA that (i) (R, r) (cid:15) Kαϕ and (ii) (R, r) (cid:15) KαCAϕ for all α ∈ A.
Hence we also get (iii) (R, r) (cid:15) EAϕ and (iv) (R, r) (cid:15) EACAϕ. Putting
(iii) and (iv) together we get (R, r) (cid:15) EA(ϕ ∧ CAϕ).
24
If R (cid:15) ϕ ⇒ EA(ϕ ∧ ψ) then R (cid:15) ϕ ⇒ CAψ: Suppose R (cid:15) ϕ ⇒ EA(ϕ ∧ ψ).
Fix a sequence α1, α2, .., αk ∈ A. We will now show by induction
on h ≤ kthat R (cid:15) ϕ ⇒ Kαk Kαk−1 ··· Kα1ψ. For h = 1 we have by
assumption that R (cid:15) ϕ ⇒ EA(ϕ ∧ ψ). We replace EA by Kα1, re-
calling that α1 ∈ A. We get R (cid:15) ϕ ⇒ Kα1ψ. Assume for h and
look at the case of h + 1. By assumption R (cid:15) ϕ ⇒ EA(ϕ ∧ ψ)
and hence R (cid:15) ϕ ⇒ Kαh+1(ϕ ∧ ψ). Fix run r.
If (R, r) (cid:50) ϕ then
(R, r) (cid:15) ϕ ⇒ Kαh+1Kαh ··· Kα1ψ and we are done. Else, we have
that (R, r) (cid:15) EA(ϕ ∧ ψ), and so (R, r) (cid:15) Kαh+1(ϕ ∧ ψ). Thus, we
get that (R, r(cid:48)) (cid:15) ϕ for every r(cid:48) such that rih+1(th+1) = r(cid:48)ih+1(th+1).
By the inductive hypothesis we get that (R, r(cid:48)) (cid:15) Kαh ··· Kα1ψ. By
definition of (cid:15) we get that (R, r) (cid:15) Kαh+1Kαh ··· Kα1ψ. We conclude
that R (cid:15) ϕ ⇒ Kαk Kαk−1 ··· Kα1ψ. As this holds for any sequence of
nodes in A we get that R (cid:15) ϕ ⇒ CAψ as required.
(cid:4)
Definition 13 (Past cone). Fix r ∈ R and θ ∈ V. The past cone of θ in r,
past(r, θ), is the set {ψ : ψ (cid:32) θ}.
Definition 14 (Agree upon). We say that two runs r and r(cid:48) agree on the
node (i, t) ∈ V if
1. ri(t) = r(cid:48)i(t),
2. the same external inputs and messages arrive at (i, t) in both runs,
and
3. the same actions are performed by i at time t.
Lemma 3. Let r ∈ R and let θ ∈ V. Then there is a run r(cid:48) ∈ R such that
1. past(r(cid:48), θ) = past(r, θ),
2. r(cid:48) and r agree on all the nodes of past(r(cid:48), θ).
3. the only nondeterministic events in r(cid:48) occur at nodes of past(r(cid:48), θ).
Lemma 4. If (cid:104)i, t(cid:105) (cid:32) (cid:104)j, t(cid:48)(cid:105) then t ≤ t(cid:48), with t = t(cid:48) holding only if i = j.
Definition 15 (Early delivery). When a message sent at (cid:104)i, t(cid:105) arrives at
(cid:104)j, t(cid:48)(cid:105) prior to the maximal allowed delay, i.e. when t(cid:48) < t + maxij, then we
say that an early delivery nondeterministic event has occurred.
25
Lemma 5. Fix a run r, and let θ (cid:32) θ(cid:48). If θ (cid:54)(cid:57)(cid:57)(cid:75) θ(cid:48) then there is a node β
such that θ (cid:32) β (cid:57)(cid:57)(cid:75) θ(cid:48) and an early delivery occurs at β in r.
Lemma 6. Let e be the delivery of an external input that occurs at the node
α0 in r ∈ R. If (R, r) (cid:15) Kα1occurredt1(e) then α0 (cid:32) α1.
Theorem 5 (Knowledge Gain). Let r ∈ R. Assume that e is an external
input event occurring at α0 in r.
If (R, r) (cid:15) Kαk Kαk−1··· Kα1occurredt1(e), then there is an uneven centipede
for (cid:104)α0, . . . , αk(cid:105) in r.
Proof First note that k ≥ 1 and (R, r) (cid:15) Kαk Kαk−1 ··· Kα1occurredt1(e)
imply by the Knowledge Axiom that (R, r) (cid:15) Kαk occurredt1(e). It follows
that α0 (cid:32) αk in r by Lemma 6. We prove the claim by induction on k ≥ 1:
k = 1 As argued above, α0 (cid:32) αk. Thus, α0 (cid:32) α1 since k = 1, and so
(cid:104)α0, αk(cid:105) is a (trivial) centipede for (cid:104)α0, αk(cid:105) in r.
k ≥ 2 Assume inductively that the claim holds for k − 1. Moreover, as-
sume that (R, r) (cid:15) Kαk Kαk−1 ··· Kα1occurredt1(e). Let r(cid:48) be the run
guaranteed by Lemma 3 to exist with respect to r, ik and tk. Re-
call from Lemma 3(1) that past(r(cid:48), αk) = past(r, αk). Thus, α0 (cid:32) αk
in r implies that α0 (cid:32) αk in r(cid:48) too. Moreover, by Lemma 3(2) we
have that r and r(cid:48) agree on the nodes of past(r, αk), so in particular
r(cid:48)ik (tk) = rik (tk). Since (R, r) (cid:15) Kαk Kαk−1 ··· Kα1occurredt1(e) and
r(cid:48)ik (tk) = rik (tk), we have that
(R, r(cid:48), t(cid:48)) (cid:15) Kαk−1 ··· Kα1occurredt1(e).
By the inductive hypothesis there exists a centipede (cid:104)α0, θ1, . . . , θk−1(cid:105)
for (cid:104)α0, . . . , αk−1(cid:105) in r(cid:48). Let c ≥ 0 be the minimal index for which
θc (cid:57)(cid:57)(cid:75) θh for all h = c + 1, . . . , k − 1. Clearly c ≤ k − 1, since θk−1 (cid:57)(cid:57)(cid:75)
θk−1.
• If c = 0 then α0 (cid:57)(cid:57)(cid:75) θh (cid:57)(cid:57)(cid:75) αh, and thus also α0 (cid:57)(cid:57)(cid:75) αh, for
h = 1, . . . , k − 1. Since α0 (cid:32) αk in r, it follows that the tuple
(cid:104)(α0)d−1, αk(cid:105) (in which α0 plays the role of the first k − 1 nodes)
is a centipede for (cid:104)α0, . . . , αk(cid:105) in r.
• Otherwise, c > 0 and θc−1 (cid:32) θc while θc−1 (cid:54)(cid:57)(cid:57)(cid:75) θc. By Lemma 5 it
follows that there exists a node β such that θc−1 (cid:32) β (cid:57)(cid:57)(cid:75) θc, and
β is the site of an early receive in the run r(cid:48). By construction of r(cid:48),
early receives can arrive only at nodes in past(r(cid:48), αk). It follows
26
that β (cid:32) αk in r(cid:48), and since past(r, αk) = past(r(cid:48), αk), we have
that β (cid:32) αk in r too and hence also that past(r, β) = past(r(cid:48), β).
It follows that in r
α0 (cid:32) θ1 (cid:32) ··· (cid:32) θc−1 (cid:32) β (cid:32) αk.
Recall that (cid:57)(cid:57)(cid:75) depends only on the weighted communication net-
work, which is the same in both r and r(cid:48). Thus, θj (cid:57)(cid:57)(cid:75) αj for all
0 < j ≤ c − 1. Moreover, β (cid:57)(cid:57)(cid:75) θh (cid:57)(cid:57)(cid:75) αh and so β (cid:57)(cid:57)(cid:75) αh for all
h = c, c + 1, . . . , k− 1. It follows that (cid:104)α0, θ1, . . . , θc−1, (β)k−c, αk(cid:105)
is a centipede for (cid:104)α0, . . . , αk(cid:105) in r.
It follows that a centipede for (cid:104)α0, . . . , αk(cid:105) in r is guaranteed to exist
in all cases, as claimed.
2T heorem 5
Theorem 6. Let WTR=(cid:104)es, α1 : δ1, . . . , αk−1 : δk−1, αk(cid:105) be an instance of
WTR, and assume that WTR is solved in the system R. Let r ∈ R be a run
in which es occurs. For each h ≤ k, let αh = (cid:104)ih, th(cid:105) be the node at which
response αh gets performed, and let
k−1(cid:88)
j=h
βk
h = (cid:104)ih, tk −
δj(cid:105).
Then
(R, r) (cid:15) Kαk Kβk
k−1 ··· Kβk
1
occurredtk
1
(es).
Proof We prove the theorem by induction on h ≤ k.
h = 1 : By definition of r, α1 gets performed at α1. Since performing
a local action is written in the agent's local state (and hence known
to the agent), and since it is always performed no sooner than the
then we are done. Else, as tk
occurredtk
triggering event es, we have (R, r) (cid:15) Kα1occurredt1(es). If h = k = 1
1 ≥ t1 and as agents have perfect recall,
we get (R, r) (cid:15) Kβk
(es).
h > 1 : Assume that (R, r) (cid:15) Kβk
sponse αh gets performed at αh in r we have (R, r) (cid:15) Kαhoccurredth
(ah).
Since WTR is solved in the system R we have that in every runr(cid:48) such
that rih(th) = r(cid:48)ih(th) response αh−1 gets performed at some th−1 such
(es). As re-
h−1 ··· Kβk
1
occurredtk
1
h
1
1
27
that th−1 ≤ th
h−1. Note that every system that solves WTR also solves
the sub problem WTR'=(cid:104)es, α1 : δ1, . . . , αh−2 : δh−2, αh−1(cid:105). Based on
the inductive hypothesis we obtain that
(R, r(cid:48)) (cid:15) Kαh−1Kβk
h−2 ··· Kβk
1
occurredtk
1
(es).
From tk
h−1 ≥ th−1, and based on perfect recall, we derive that
(R, r(cid:48)) (cid:15) Kβk
h−1
Kβk
h−2 ··· Kβk
1
occurredtk
1
(es).
By our choice of runs r(cid:48) and the definition of (cid:15) this gives us
(R, r(cid:48)) (cid:15) KαhKβk
h−1
Kβk
h−2 ··· Kβk
1
occurredtk
1
(es).
If h = k then we are done. Else, once again deploying tk
conclude that
h ≥ th we
(R, r(cid:48)) (cid:15) Kβk
h
Kβk
h−1
and we are done.
Kβk
h−2 ··· Kβk
1
occurredtk
1
(es),
2T heorem 6
Theorem 7. Let A ⊆ V with (cid:104)jk, t(cid:48)k(cid:105) being the earliest node (t(cid:48)k ≤ t(cid:48)h for
all (cid:104)jh, t(cid:48)h(cid:105) ∈ A) , and let r ∈ R. Assume that e is an external input event
at α0 in r. If (R, r) (cid:15) CA(occurredt(cid:48)
(e)), then there is a uneven broom θ for
(cid:104)α0, A(cid:105) in r.
Proof Assume the notations and conditions of the theorem. Denote A =
{α1, . . . , αk} and d = t(cid:48)k − t0, the time difference between the occurrence of
e and the latest node in A . Since (R, r) (cid:15) CA(occurredt(cid:48)
(e)) we have by
definition of common knowledge that
(R, r) (cid:15) Ek(d+1)
(e). In particular, this implies that
A
k
k
k
occurredt(cid:48)
(R, r) (cid:15) (Kαk ··· Kα1)d+1occurredt(cid:48)
k
(e),
where (Kαk ··· Kα1)d+1 stands for d + 1 consecutive copies of Kαk ··· Kα1.
By the Knowledge Gain Theorem 5, there is a corresponding centipede σ =
(cid:104)θ0, θ1, . . . , θk(d+1)(cid:105) in r. Denote θh = (ih, th) for all 0 ≤ h ≤ k·(d+1). Recall
that, by definition, θh (cid:32) θh+1 holds for all h < k· (d + 1). By Lemma 4
we obtain that if θh (cid:54)= θh+1 then th < th+1. It follows that there can be at
28
(cid:32) θ(cid:48)2
(cid:32) ··· (cid:32) θ(cid:48)(cid:96) in σ. Every θ(cid:48)h represents a
most d + 1 distinct nodes θ(cid:48)1
segment θx, . . . , θx+s of the nodes in σ. By the pigeonhole principle, one of
the θ(cid:48) nodes must represent a segment consisting of at least k of the original
θs in σ. Denoting this node by θ, we obtain that θ (cid:57)(cid:57)(cid:75) αh for every αh ∈ A.
Moreover, by definition of the centipede and transitivity of (cid:32) we have that
α0 (cid:32) θ. It follows that θ is a centibroom for (cid:104)α0, G(cid:105) in r.
2T heorem 7
Theorem 8. Let TTR = (cid:104)es, α1 : δ1, . . . , αk : δk(cid:105), and assume that TTR is
solved in R. Let r ∈ R be a run in which es occurs, and let A = {α1, . . . , αk}
be the set of nodes at which the responses are carried out in the run r (α1
occurs at node α1 = (cid:104)i1, t1(cid:105), etc.). Let α(cid:48) = (cid:104)i(cid:48), t(cid:48)(cid:105) be the earliest node in A.
Then (R, r) (cid:15) CAoccurredt(cid:48)(es).
Proof Fix h, g ∈ {1..k}. We first show that
R (cid:15) occurredth(ah) ⇒ EA(occurredth(ah) ∧ occurredt(cid:48)(es)).
Choose r(cid:48) such that (R, r(cid:48)) (cid:15) occurredth(ah). Note that since TTR is solved
in R and since th− tg = δh− δg in every triggered run by problem definition,
we get (R, r(cid:48)) (cid:15) occurredth(ah) ↔ occurredtg (ag). Since performing a local
action is written, at least for the current round, in the agent's local state
(and hence known to the agent), we obtain that (R, r(cid:48)) (cid:15) Kαg occurredtg (ag),
and hence also (R, r(cid:48)) (cid:15) Kαg occurredth(ah). Since h is arbitrarily chosen in
{1..k}, node αg knows this for all responding nodes, and in particular for the
earliest responding node α(cid:48) = (cid:104)i(cid:48), t(cid:48)(cid:105). As responses always occur no sooner
than the trigger, we get that (R, r(cid:48)) (cid:15) Kαg occurredt(cid:48)(es). Putting these re-
sults together we conclude that (R, r(cid:48)) (cid:15) Kig (occurredth(ah)∧occurredt(cid:48)(es)).
Since g is arbitrarily chosen in {1..k}, we get (R, r(cid:48)) (cid:15) EA(occurredth(ah) ∧
occurredt(cid:48)(es)), from which it follows that
(R, r(cid:48)) (cid:15) occurredth(ah) ⇒ EA(occurredth(ah) ∧ occurredt(cid:48)(es))
by our choice of r(cid:48). As false antecedents imply anything, we also get
(R, r(cid:48)(cid:48)) (cid:15) occurredth(ah) ⇒ EA(occurredth(ah) ∧ occurredt(cid:48)(es))
in runs r(cid:48)(cid:48) where response αh does not occur (non triggered runs) or where it
occurs at a later time than th. We thus conclude that R (cid:15) occurredth(ah) ⇒
EA(occurredth(ah) ∧ occurredt(cid:48)(es)).
R (cid:15) ϕ ⇒ CAψ from R (cid:15) ϕ ⇒ EA(ϕ ∧ ψ). Setting ϕ = occurredth(ah) and
Recall the Knowledge Induction Rule in Lemma 2, that provides us with
29
ψ = occurredt(cid:48)(es) we apply the rule, and based on the above result obtain
R (cid:15) occurredth(ah) ⇒ CAoccurredt(cid:48)(es). We conclude by taking notice that
(R, r) (cid:15) occurredth(ah) by assumption, and hence also (R, r) (cid:15) CAoccurredt(cid:48)(es).
2T heorem 8
30
|
1907.10384 | 2 | 1907 | 2019-07-31T09:31:16 | Towards automatic estimation of conversation floors within F-formations | [
"cs.MA",
"cs.CV",
"cs.CY"
] | The detection of free-standing conversing groups has received significant attention in recent years. In the absence of a formal definition, most studies operationalize the notion of a conversation group either through a spatial or a temporal lens. Spatially, the most commonly used representation is the F-formation, defined by social scientists as the configuration in which people arrange themselves to sustain an interaction. However, the use of this representation is often accompanied with the simplifying assumption that a single conversation occurs within an F-formation. Temporally, various categories have been used to organize conversational units; these include, among others, turn, topic, and floor. Some of these concepts are hard to define objectively by themselves. The present work constitutes an initial exploration into unifying these perspectives by primarily posing the question: can we use the observation of simultaneous speaker turns to infer whether multiple conversation floors exist within an F-formation? We motivate a metric for the existence of distinct conversation floors based on simultaneous speaker turns, and provide an analysis using this metric to characterize conversations across F-formations of varying cardinality. We contribute two key findings: firstly, at the average speaking turn duration of about two seconds for humans, there is evidence for the existence of multiple floors within an F-formation; and secondly, an increase in the cardinality of an F-formation correlates with a decrease in duration of simultaneous speaking turns. | cs.MA | cs | 2019 8th International Conference on Affective Computing and Intelligent Interaction Workshops and Demos (ACIIW)
Towards automatic estimation of conversation floors
within F-formations
Chirag Raman
Delft University of Technology
[email protected]
Hayley Hung
Delft University of Technology
[email protected]
9
1
0
2
l
u
J
1
3
]
A
M
.
s
c
[
2
v
4
8
3
0
1
.
7
0
9
1
:
v
i
X
r
a
Abstract -- The detection of free-standing conversing groups has
received significant attention in recent years. In the absence of
a formal definition, most studies operationalize the notion of
a conversation group either through a spatial or a temporal
lens. Spatially, the most commonly used representation is the
F-formation, defined by social scientists as the configuration
in which people arrange themselves to sustain an interaction.
However, the use of this representation is often accompanied
with the simplifying assumption that a single conversation occurs
within an F-formation. Temporally, various categories have been
used to organize conversational units; these include, among
others, turn, topic, and floor. Some of these concepts are hard to
define objectively by themselves. The present work constitutes an
initial exploration into unifying these perspectives by primarily
posing the question: can we use the observation of simultaneous
speaker turns to infer whether multiple conversation floors exist
within an F-formation? We motivate a metric for the existence
of distinct conversation floors based on simultaneous speaker
turns, and provide an analysis using this metric to characterize
conversations across F-formations of varying cardinality. We
contribute two key findings: firstly, at the average speaking turn
duration of about two seconds for humans, there is evidence
for the existence of multiple floors within an F-formation;
and secondly, an increase in the cardinality of an F-formation
correlates with a decrease in duration of simultaneous speaking
turns.
Index Terms -- free-standing conversational groups, conversa-
tion floors, speaking turns
I. INTRODUCTION
Imagine a social scenario like a mingling or networking
event. Interactions in such a setting involve multiple dynamic
conversations which are a medley of ever evolving topics and
partners. And yet, humans can instinctively navigate the com-
plexities of such encounters. How do we do this? We regulate
our exchanges both spatially and temporally using implicit
social norms or explicit behavioural signals [1]. Furthermore,
these cues could be either verbal or non-verbal, expressed
visually, vocally, or verbally through spoken language.
A deeper understanding of these group dynamics constitutes
a natural objective towards the realisation of machines with so-
cial skills. For instance, consider a social robot approaching a
group of people in a public space, or the use-case of evaluating
attendee experience at a conference poster session. In these
and other cases, having an understanding of the dynamics,
and where channels of social influence lie, would enable the
This research was partially funded by the Netherlands Organization for
Scientific Research (NWO) under project number 639.022.606.
978-1-7281-3891-6/19/$31.00 ©2019 IEEE
Fig. 1. Depiction of a single F-formation with multiple conversation floors.
The darker green regions within dotted lines represent distinct simultaneous
conversation floors. Most works representing a conversing group as an F-
formation make the simplifying assumption that a single conversation occurs
within an F-formation with a joint focus of attention for all members.
artificial agent to develop increasingly sophisticated policies
for interaction or inference. Conversation groups have been of
importance in the application domains of social robotics [2] --
[5], activity recognition [6], [7], social surveillance [8] -- [10],
and social signal processing [11], [12].
Fundamental to the study of such conversations is defining
the notion of a free-standing conversational group (FCG).
While it is easier to objectively conceptualize an FCG in
spatial terms in a scene of multiple interacting groups, delin-
eating the boundary of conversations poses a greater technical
challenge. We could think of separating conversations on
the basis of topics, but this is challenging if audio data is
unavailable due to privacy concerns. We could operationalize
a conversation as a set of participating members, but this
membership is challenging to infer visually for non-speaking
participants. This often leads to the simplifying assumption
in some literature that
the focus of an FCG is a single
conversation. As we illustrate in Fig. 1, and discuss in the
following sections, this may not always be the case.
In the present work, we dive beyond the geometric bounds
of an FCG to gain a deeper understanding of the conversations
occuring within it. In this initial approach, we focus specifi-
cally on speaking participants as the most decisive indicator
of the existence of a conversation. Concretely, we pose the
following broad research questions:
RQ 1. Can we use observed speaker turns to infer the con-
versation floors within an F-formation?
RQ 2. How does the cardinality of an F-formation affect the
conversation floors developed within it?
The ground truth for speaker turns in this work comes from
manual annotations of video data, mimicking use-cases where
audio data might be unavailable due to privacy concerns.
Concretely, our contributions are as follows: conceptually, we
provide an indicator of distinct conversation floors that uses
speaking turns alone, and situate this indicator in schisming
literature [13] -- [15]; analytically, we provide evidence that
multiple conversation floors exist within an F-formation, and
show that the cardinality of an F-formation correlates nega-
tively with turn duration of simultaneous speakers.
The rest of this paper is organized as follows. We describe
some of the spatial and temporal perspectives used to study
FCGs in Section II. In Section III we provide a review of
literature involving the use of these spatial or temporal notions,
motivating the need to consider both of these aspects in unison.
In Section IV, we propose an operationalization of an indicator
of distinct conversation floors, building upon the concepts of
conversation schisming. The dataset we use and the exper-
iments performed for answering the research questions are
described in Section V and Section VI respectively. Finally,
Section VII summarizes our findings and concludes the paper.
II. BACKGROUND
Spatial Factors. One of the most common proxemic notions
to describe an FCG is Adam Kendon's Facing Formation, or
F-formation, originally defined as:
An F-formation arises whenever two or more people
sustain a spatial and orientational relationship in
which the space between them is one to which they
have equal, direct, and exclusive access. [16, p. 210]
Kendon argues that activity is always located, and denotes
the space in front of a person that is used for the activity
as the person's transactional segment. When two or more
people come together to perform some activity, they are liable
to arrange themselves such that their individual transactional
segments overlap to create a joint transactional space. This
joint space between the interactants is called an o-space. As
we discuss in the next section, many computational works
involving the automatic detection of FCGs from video focus
on the detection of F-formations, often assuming that
the
transaction involves a single conversation.
Temporal Factors. The conversation of focus in an FCG,
however, is dynamic in nature. If conversations change over
time, what are the temporal units that describe their underlying
structure? Some of the terms used in early literature to orga-
nize conversational units include turn, topic, gap, and floor.
Edelsky provides an excellent review of these concepts in [17],
stating that most of these units were defined on the basis
of some technical or mechanical structure such as signals of
speakers or auditors, ignoring the intention of the participant.
Using inferred participants' meanings rather than technical
definitions, Edelsky defines turns and floors as follows:
The floor is defined as the acknowledged what's-
going-on within a psychological time/space. What's
going on can be the development of a topic or
a function (teasing, soliciting a response, etc.) or
an interaction of the two. It can be developed or
controlled by one person at a time or by several
simultaneously or in quick succession.[17, p. 405]
III. RELATED WORK
Detecting Conversational Groups. In most works, a con-
versational group is operationalized as an F-formation. Early
work on the task of detecting FCGs in video data developed
concurrently from two perspectives: those that estimate the
location of the o-space using a Hough-voting strategy [8],
[18]; or those that view an F-formation as a set with individ-
uals being assigned exclusive membership [12], [19]. There
has also been considerable work focused on incorporating
temporal
information for the same task of detecting con-
versational groups [7], [20] -- [22]. Notably, these approaches
utilise the head pose as a proxy for Visual Focus of Attention
(VFoA) [9] in addition to the body pose to model F-formation
membership, and assume a single conversation within an F-
formation. The assumption that members in a group have a
single joint focus of attention is seen in other works as well.
Hung, Jayagopi, Ba, et al. [23] model a single joint focus
of visual attention of participants to estimate dominance in
groups.Vazquez, Steinfeld, and Hudson Vazquez, Steinfeld,
and Hudson also assume a single conversation within an F-
formation while developing a policy for a robot to be aware
of a single focus of attention of the conversation.
Estimating involvement. In a conversation, the floor is typ-
ically held by a single participant at a time [13]. What then
characterizes the silent participants in a conversation group?
The following works demonstrate that the task of estimating
participant involvement is subjective in nature, and that gaze
behaviour and turn-taking patterns can be informative.
Zhang and Hung [24], [25] study the task of detecting
associates of an F-formation; members that are attached to
an F-formation but do not have full status [16]. They argue
that the labeling of conversation groups is not an objective
task. Collecting multiple annotations of perceived associates,
they demonstrate how detecting them can improve initial esti-
mates of full-members of an F-formation. Oertel, Funes Mora,
Gustafson, and Odobez [26] characterize silent particiants
into multiple categories (attentive listener, side participant,
bystander) from audiovisual cues. Oertel and Salvi [27] also
show that it is possible to estimate individual engagement and
group involvement in a multiparty corpus by analysing the
participants' eye-gaze patterns. Bohus and Horvitz [28] pro-
pose a self-supervised method for forecasting disengagement
with an interactive robot using a conservative heuristic. The
heuristic is constructed by leveraging features that capture how
close the participant is, whether a participant is stationary or
moving, and whether a participant is attending to the robot.
shown promising results in estimating the presence of voice
activity from automated gestural analysis or accelerometer
data [33] -- [35]. It therefore seems feasible that speaker turns
can be automatically estimated without audio data. Combined
with the observation that the co-existence of two turn-taking
systems is the most decisive characteristic of schisming, we
argue that it is in turn reasonable to explore the inference of
schisms without audio data through speaking turns.
it
is useful
Linking schisming to floors and F-formations. While Egbert
does explicitly use the term floor to describe the conversations
resulting from a schism,
to observe how this
relates back to Edelsky's view of floors. Edelsky defined
floors in terms of the acknowledged what's-going-on within a
psychological time space. The object of focus here could either
be a topic or some other function. To borrow Goffman's terms,
a schism effectively changes a gathering into a multifocused
one, where each object of focus can be viewed to correspond
to a floor in Edelsky's definition. However, if the participant's
lower bodies remain configured such that their transactional
segments overlap to produce a common o-space, they would
still remain in the same F-formation even if the conversation
has undergone a schism into two or more distinct floors. Fig. 1
depicts this situation conceptually.
Combining these two broad observations, we argue that it is
feasible to explore the existence of distinct conversation floors
within an F-formation without audio data, whilst capturing
speaker turns from visual observations. We propose to start
with the following metric. Given a sliding window w of speak-
ing duration d, we consider a speaker to be a participant who
speaks for the entire duration d. The number of simultaneous
speakers thus defined corresponds to the number of distinct
conversation floors at that position of w, since they correspond
to speaking turns in distinct floors.
Of course, the metric is inextricably tied to the duration d
being considered; too short a duration, and the concurrent turns
might capture either backchannels or the overlapping speech
within the same floor as described in Egbert's work. However,
a reasonably long duration would capture the speaking turns of
participants holding distinct floors. This leads to the question:
what qualifies as a reasonable choice for d to differentiate
overlaps within a floor from turns in distinct floors? In our
Some works also used turn-taking features to estimate
some notion of involvement. Pentland, Madan, and Gips [29]
measured engagement by the z-scored influence each person
has on the other's turn-taking for a pair of participants. Hung
and Gatica-Perez [30] found that the pause duration between
an individual's turns, aggregated at group level,
is highly
predictive of cohesion in small group meetings.
Schisming. In a conversation with at least four participants,
the conversation sometimes splits up into two or more conver-
sations. This transformation is referred to as a schism [13] or
schisming. One of the earliest allusions to the phenomenon of
schisming based on anecdotal evidence occurs in the work of
Goffman, who suggested that a gathering of two participants
exhausts an encounter and forms a fully-focused gathering [31,
p. 91]. With more than two participants, there may be persons
officially present in the situation who are not themselves so
engaged. These bystanders change the gathering into a partly-
focused one. If more than three persons are present, there may
be more than one encounter carried on in the same situation,
resulting in a multifocused gathering.
In subsequent work, Sacks, Schegloff, and Jefferson [13]
and Goodwin [14] both indicated that the co-existence of two
turn-taking systems is the most decisive characteristic of schis-
ming. This view was supported by Egbert, who demonstrated
that although schisming is a participation framework with
two simultaneous conversations, each with its own turn-taking
system, there is an interface between them during schisming
[15]. She also makes a systematic differentiation between
overlap and simultaneous talk during schisming. In overlap,
simultaneous speakers compete for the floor, an event usually
resolved by returning to one-speaker-at-a-time. In schisming
by contrast, simultaneous speakers orient to one of two distinct
floors, an event which if resolved successfully, results in the
establishment of two floors [15, p. 43]. Overlapping speech
is therefore expected to occur throughout the lifespan of all
conversation floors within an F-formation.
IV. METHODOLOGY
In this section we build upon the previously discussed
concepts to propose using simultaneous speakers in an F-
formation as an initial conservative indicator of the existence
of distinct conversation floors.
A common concern with observing groups of conversing
people is the potential violation of privacy. In our experience
with collecting group interaction datasets, participants often
regard having their microphone data recorded and transcribed
as being more invasive than being captured on video. In these
situations, the lack of verbal information makes it extremely
challenging to infer the topics being discussed. How can we
then investigate the existence of distinct conversations? Two
observations could prove useful:
Inferring schisms without audio data. The relationship
between body movements such as gestures and speech has
been long established in literature [32]. Some works have
Fig. 2.
Illustration of gaps, within-overlaps, and between-overlaps for two
speakers (S1 and S2) within the same floor. The scheme was originally
proposed by Heldner and Edlund[36] and adopted by Levinson and Torreira
in their analysis[37].
experiments, we set the lower bound of d at one second. Here
we provide evidence from literature to justify this choice.
Choice of speaking window duration. In a study of gaps
and overlaps in conversations, Heldner and Edlund report that
on average 40% of the speaker transitions in their corpora
involved overlaps (including any overlap of over 10 ms) [36].
These represent overlaps for competing for the floor. As for the
duration of these overlaps, their histogram makes clear that the
duration follows a mode of 50 ms in the Spoken Dutch Corpus,
with a mean of 610 ms, and median of 470 ms, all under one
second. In a follow-up detailed statistical analysis, Levinson
and Torreira differentiate between types of overlaps: between-
overlaps, that refer to overlaps where the floor was transfered
without a silent gap between speakers; and within-overlaps,
where overlapping speech occured in between a speaking
turn and did not result in a transfer of floor [37]. Fig. 2
illustrates these types of overlaps. They used the Switchboard
Corpus of English telephone conversations for their analysis,
and found that only 3.8% of the signal corresponded to
simultaneous speech of both speakers. This fits well with
Sacks and colleagues' observations that "overwhelmingly, one
party speakes at a time" [13, p. 700], for physically situated
embodied social interactions. As for the duration, between-
overlaps had a modal duration of 96 ms, a median of 205 ms, a
mean of 275 ms. On the other hand, within-overlaps exhibited
an estimated modal duration of 350 ms, a median of 389 ms,
a mean of 447 ms. Further, of all the overlaps annotated, 73%
involved a backchannel. These statistics indicate that choosing
a lower bound for d would reasonably capture simultaneous
speech that does not belong to the same floor.
As for the upper bound, a reasonable value should be at
least greater than the average turn duration of a speaker. Using
the same operationalization proposed in [36], Levinson and
Torreira report that contiguous speech delimited by a silent
interval of at least 180 ms had a mean duration of 1680 ms,
and a median of 1227 ms.
Fig. 3. Snapshots of the mingling session (Cameras 1-5) in MatchNMingle.
mingling interaction were recorded for each of the three days;
56 minutes on the first, 50 minutes on the second, and 45
minutes on the third, respectively.
Annotations. The dataset provides of annotations for both F-
formations and a variety of social actions. The F-formations
were annotated directly from a video of the interacting par-
ticipants captured from overhead cameras. The annotations
were made for every second for an interval of 10 minutes
per day. Each F-formation annotation provides the participant
IDs for its members and the start and end times delimiting
the lifetime of the F-formation. In all, 174 F-formations
were annotated across 30 minutes. Of these, we filtered out
those with cardinality less than four, and those for which a
participant was found to leave the field of view of the cameras.
This left us with 34 F-formations for our experiments.
Of the social actions annotated, we only use the Speaking
Status -- defined as whether or not a person is speaking. The
social actions were annotated for a 30 minute segment for each
day, by eight annotators hired for the task and trained by an
expert. The annotations were made at the frame level using
a tool that allowed for interpolation across frames. In all, 20
annotations per second for each social action are provided.
Further, the speaking status is estimated from video alone, by
observing lip movements or inferring from the participants'
head and body gestures.
V. DATASET
VI. EXPERIMENTS
For this study, we use the publicly available MatchNMingle
dataset [38] that records in-the-wild interactions of 92 people
during speed-dates followed by a cocktail party. Three sessions
of speed-dates and mingling were recorded in all across three
days. We specifically focus on the cocktail party recordings
that capture free standing conversations between participants.
Fig.3 shows the video recordings from five cameras on the last
day of data collection. The participants were not given a script
to follow and were free to choose the participants they wished
to interact with. This allows us to study naturally evolving
F-formations and conversation floors in an in-the-wild setting.
Dataset Statistics. The dataset consists of a total of 92 single,
heterosexual participants (46 women: 19-27 years with a mean
age of 21.6 years and standard deviation of 1.9 years; and
46 men: 18-30 years with a mean age of 22.6 years and
standard deviation of 2.6 years). Over 45 minutes of free
We perform two sets of experiments: first we identify the
number of simultaneous speakers in an F-formation using
the methodology described in Section IV, and then evaluate
whether the number of members in an F-formation (cardinal-
ity) affects the speaking duration of simultaneous speakers.
Simultaneous Speakers in an F-formation. The purpose of
this experiment is to evaluate the following -- can we infer the
existence of distinct conversation floors within an F-formation
from simultaneous speaker turns? To recap, this intuition build
upon early work on schisming indicating that the co-existence
of two turn-taking systems is the most decisive characteristic
of distinct conversation floors [13], [14]. Here we consider F-
foramtions of cardinality four and above, since the possibility
of distinct conversations occurs only for those F-formations.
We slide a window w of duration d across the lifetime of the
F-formation in steps of one second. For every position of w,
Fig. 4. Plotting the effect of varying the speaking duration threshold d on the number of simultaneous speakers per cardinality of F-formation. To aggreagate
the data from each F-formation, the maximum of the number of simultaneous speakers is considered over all the sliding window positions across the lifetime
of the F-formation. The y-axis plots the Mean (Maximum number of simultaneous speakers over window positions) over F-formations.
we count the number of participants with a positive speaking
status for the entire duration d. We plot the maximum number
of simultaneous speakers over all positions of w. Following
the formulation described in Section IV, this represents the
maximum number of distinct conversation floors that were
observed during the life-time of the F-formation. We vary d
from 1-20 seconds to guard against the possibility that the
smaller values of d might capture co-narration or overlaps
within the same floor. The upper bound of 20 seconds was
chosen as sanity check; we expected to see very few speakers
have a speaking turn that long.
The max operator was chosen to aggregate the number of
simultaneous speakers across all window positions into the
most conservative measure for what this experiment seeks to
evaluate. A value of one for the maximum number speakers
over all positions of w would indicate that only a single
conversation floor existed within the F-formation. Therefore,
observing values greater than one for the max metric would
indicate the presence of distinct floors with more certainty than
other choices of summarizing statistics.
Fig. 4 plots the mean number of distinct conversation floors
per F-formation against varying values of d, per cardinality of
F-formation. Cardinality here refers to the number of members
in an F-formation. As a sanity check, we would expect the
numbers upper-bounded by the number of people in the F-
formation; at worst, every person in the F-formation speaks
simultaneously to compete for the floor they are a part of.
On the same note, we observe that the starting mean values
all seem reasonable: about 2 for cardinalities four and five,
about 3 for cardinality six, and about 4 for cardinality seven.
Assuming that it is common for speakers to have at least one
conversing partner, we would expect about half the number
of simultaneous speakers as members in an F-formation. Our
minimum choice of d was chosen to be greater than the modal
duration of overlaps found in previous work [37], so it is less
likely that the lower turn durations capture competing overlaps
for the same floor. Moreover, at the average turn length of
about two seconds observed by Levinson and Torreira [37], we
observe that the maximum number of simultaneous speakers is
greater than one at all cardinalities considered. This suggests
that the simplifying assumption from previous research of a
single conversation within an F-formation is insufficient.
We also observe a decreasing trend for the curves in Fig. 4.
This seems intuitive, as it is much less likely that participants
would speak for the entire duration of a window as d increases.
Interestingly, there is a single example of a speaker speaking
for 20 seconds in an F-formation of cardinality seven. On
closer inspection, this turned out to be an error in speaking
status annotation, and we manually fixed this error for subse-
quent analysis.
Effect of cardinality on turn duration of simultaneous
speakers. Sacks, Schegloff, and Jefferson observed that there
is a "pressure for minimization of turn size, distinctively
operative with three or more parties" [13, p. 713]. They
note that the possibility of a schism introduced by the fourth
participant may influence the turn-taking system by 'spreading
the turns around' if there is an interest in retaining participants
in the conversation. However, they concede that this effect
is equivocal, since turn distribution can also be used for
encouraging schisming. In this experiment, we explore this
effect and pose the question as follows: for a given speaking
turn duration d, do we observe a decrease in the maximum
number of conversation floors observed over an F-formation's
lifetime with an increase in the cardinality of an F-formation?
Qualitatively, this corresponds to the steepness of fall-off
of the curves in Fig. 4. It seems that
the the curves for
cardinality six and seven falloff more steeply than those for
cardinalities four and five. To quantitatively test if cardinality
has an effect, we fit a Generalized Linear Model (GLM) to the
same data as in the previous experiment with an interaction
factor between cardinality and the speaking turn duration d.
Specifically, we assume the maximum number of simultaneous
speakers observed over the lifetime of each F-formation, yi to
GENERALIZED LINEAR MODEL REGRESSION RESULTS
TABLE I
Intercept
Turn-duration
Cardinality
Turn-duration:Cardinality
Coef (β)
0.0626
0.0057
0.1869
-0.0025
Std Err
0.339
0.002
0.072
0.001
z
0.184
2.296
2.603
-4.543
P>z
0.854
0.022
0.009
0.000006
NOMINAL P-VALUES FOR SIX POST-HOC GLM REGRESSION
TABLE II
COMPARISONS
Cardinality Pairs
4-5
4-6
4-7
5-6
5-7
6-7
Intercept (β0)
0.196
0.364
0.697
0.079
0.434
0.275
d (β1)
0.855
0.0007
0.428
0.0008
0.413
0.006
c (β2)
0.794
0.010
0.030
0.016
0.043
0.657
d:c (β3)
0.403
0.00002*
0.009
0.00016*
0.052
0.024
d = turn-duration, c = cardinality, d:c = interaction-factor. βs
denote the corresponding regression coefficients. * denotes sig-
nificance at a threshold of 0.001 after Bonferroni correction for
six tests.
be realizations of independent Poisson random variables, with
Yi ∼ P (µi) and model µi as follows:
log(µi) = β0 + β1 ∗ di + β2 ∗ ci + β3 ∗ di ∗ ci
(1)
where di refers to the duration of the speaking window,
and ci refers to the cardinality for the ith observation. The βs
refer to the regression coefficients. The GLM was fit using
the statsmodels python package. The results of the GLM
regression test are provided in Table I. We conclude that
cardinality and the two-way interaction between cardinality
and turn duration are statistically significant at a significance
level of 0.01. Turn duration is itself significant at a significance
level of 0.05.
tells us that
While the previous test
turn duration and
cardinality are significant, we still need to perform post-hoc
comparisons to ascertain the differences between the cardinali-
ties. We fit multiple GLMs to each possible pair of cardinalities
being considered and correct the corresponding p-values using
the Bonferroni correction for multipe testing. Table II provides
the corrected p-values for the post-hoc comparisons. From the
last column, we find that cardinality and its interaction with
turn-duration are significant between the cardinalities {4, 6},
and {5, 6} at a significance level of 0.001.
One potential limitation of this analysis is the imbalance
in the number of F-formations of different cardinalities. F-
formations of cardinality four were the most common in the
data, with reasonable number of samples to infer a pattern.
We believe that the intuition of cardinality and its interaction
with speaking turn duration being significant is still a sound
intuition, although the statistical significance should perhaps
be viewed within the context of the number of F-formations
we see in the data. Fig. 5 plots the number of observations
that contributed to the graphs in Fig. 4.
VII. CONCLUSION
In this study, we presented an initial exploration into
unifying the spatial and temporal perspectives of a free-
standing conversing group. Specifically, we proposed using
simultaneous speaking turns as an indicator for the existence
of distinct conversation floors. In the absence of audio data to
identify the topics being discussed, our proposed metric can
Fig. 5. Number of F-formations at different speaking turn durations.
be used to gain a deeper understanding of the conversation
dynamics within an F-formation, since speaking turns can be
inferred from visual or wearable-sensor data. Our experiments
demonstrate that at an average turn duration of two seconds for
humans [37], there is evidence of multiple conversation floors
within a single F-formation. Further, we found that an increase
in cardinality of an F-formation correlates with a decrease in
turn duration of simultaneous speakers, specifically between
F-formations of sizes {4,6}, and {5,6} in our data. A deeper
analysis would be required to identify whether the differences
in F-formations of cardinality six hold across datasets, with
preferably more examples of F-fomrations of size six and
greater. In this initial approach to the problem, our study does
not account for the behaviour of the silent participants, or the
evolution of turn taking dynamics within a floor. These remain
promising avenues to explore for future works.
ACKNOWLEDGMENT
Chirag Raman thanks Stavros Makrodimitris, Madhumita
Sushil, Giovanni Cassani, Erik B. van den Akker, and Yesh-
wanth Napolean for their time and thoughtfulness.
REFERENCES
[1] A. Vinciarelli, M. Pantic, and H. Bourlard, "Social signal processing:
Survey of an emerging domain," Image and Vision Computing, Nov. 1,
2009.
[2] H. Huettenrauch, K. S. Eklundh, A. Green, and E. A. Topp, "In-
vestigating spatial relationships in human-robot interaction," in 2006
IEEE/RSJ International Conference on Intelligent Robots and Sys-
tems, Oct. 2006.
[3] M. Vazquez, A. Steinfeld, and S. E. Hudson, "Parallel detection of
conversational groups of free-standing people and tracking of their
lower-body orientation," IEEE, Sep. 2015.
[4] -- -- , "Maintaining awareness of the focus of attention of a con-
versation: A robot-centric reinforcement learning approach," in 2016
25th IEEE International Symposium on Robot and Human Interactive
Communication (RO-MAN), IEEE, Aug. 2016.
in Proceedings of the 2015 ACM on International Conference on
Multimodal Interaction - ICMI '15, ACM Press, 2015.
[27] C. Oertel and G. Salvi, "A gaze-based method for relating group
involvement to individual engagement in multimodal multiparty dia-
logue," in Proceedings of the 15th ACM on International conference
on multimodal interaction - ICMI '13, ACM Press, 2013.
[28] D. Bohus and E. Horvitz, "Managing human-robot engagement with
forecasts and... um ... hesitations," in Proceedings of the 16th Interna-
tional Conference on Multimodal Interaction - ICMI '14, ACM Press,
2014.
[29] A. Pentland, A. Madan, and J. Gips, "Perception of social interest,"
in Proceedings of the 5th international conference on devlopment
and learning ICDL 2006, Department of Psychological and Brain
Sciences, Indiana University, 2006.
[30] H. Hung and D. Gatica-Perez, "Estimating cohesion in small groups
using audio-visual nonverbal behavior," IEEE Transactions on Multi-
media, Oct. 2010.
E. Goffman, Behavior in public places: Notes on the social organi-
zation of gatherings, 1. paperback ed., 24. printing. New York, NY:
The Free Press, 1966.
[32] D. McNeill, Language and gesture. Cambridge University Press,
[31]
2000.
[34]
[33] H. Hung and S. O. Ba, "Speech/non-speech detection in meetings
from automatically extracted low resolution visual features," in 2010
IEEE International Conference on Acoustics, Speech and Signal
Processing, IEEE, 2010.
E. Gedik and H. Hung, "Speaking status detection from body
movements using transductive parameter transfer," in Proceedings
of the 2016 ACM International Joint Conference on Pervasive and
Ubiquitous Computing: Adjunct, ACM, 2016.
[35] -- -- , "Personalised models for speech detection from body move-
ments using transductive parameter transfer," Personal and Ubiquitous
Computing, Aug. 1, 2017.
[36] M. Heldner and J. Edlund, "Pauses, gaps and overlaps in conversa-
[37]
[38]
tions," Journal of Phonetics, Oct. 1, 2010.
S. C. Levinson and F. Torreira, "Timing in turn-taking and its impli-
cations for processing models of language," Frontiers in Psychology,
Jun. 12, 2015.
L. Cabrera-Quiros, A. Demetriou, E. Gedik, L. v. d. Meij, and H.
Hung, "The MatchNMingle dataset: A novel multi-sensor resource
for the analysis of social interactions and group dynamics in-the-wild
during free-standing conversations and speed dates," IEEE Transac-
tions on Affective Computing, 2018.
[5] M. Vazquez, E. J. Carter, B. McDorman, J. Forlizzi, A. Steinfeld, and
S. E. Hudson, "Towards robot autonomy in group conversations: Un-
derstanding the effects of body orientation and gaze," in Proceedings
of the 2017 ACM/IEEE International Conference on Human-Robot
Interaction - HRI '17, ACM Press, 2017.
[6] W. Choi and S. Savarese, "A unified framework for multi-target
tracking and collective activity recognition," in European Conference
on Computer Vision, Springer Berlin Heidelberg, 2012.
[7] K. Tran, A. Gala, I. Kakadiaris, and S. Shah, "Activity analysis in
crowded environments using social cues for group discovery and
human interaction modeling," Pattern Recognition Letters, Jul. 2014.
[8] M. Cristani, L. Bazzani, G. Paggetti, A. Fossati, D. Tosato, A. D. Bue,
G. Menegaz, and V. Murino, "Social interaction discovery by statis-
tical analysis of f-formations," British Machine Vision Association,
2011.
[9] M. Farenzena, A. Tavano, L. Bazzani, D. Tosato, G. Paggetti, G.
Menegaz, V. Murino, and M. Cristani, "Social interactions by visual
focus of attention in a three-dimensional environment," Expert Sys-
tems, May 2013.
L. Bazzani, M. Zanotto, M. Cristani, and V. Murino, "Joint individual-
group modeling for tracking," IEEE Transactions on Pattern Analysis
and Machine Intelligence, Apr. 1, 2015.
[11] G. Groh, A. Lehmann, J. Reimers, M. R. Friess, and L. Schwarz,
"Detecting social situations from interaction geometry," in 2010 IEEE
Second International Conference on Social Computing, Aug. 2010.
[12] H. Hung and B. Krse, "Detecting f-formations as dominant sets,"
ACM Press, Proceedings of the 13th international conference on
multimodal interfaces, 2011.
[13] H. Sacks, E. A. Schegloff, and G. Jefferson, "A simplest systematics
for the organization of turn-taking for conversation," Studies in the
organization of conversational interaction, 1974.
[14] C. Goodwin, "Forgetfulness as an interactive resource," Social Psy-
[10]
chology Quarterly, 1987.
[15] M. M. Egbert, "Schisming: The collaborative transformation from a
single conversation to multiple conversations," Research on Language
& Social Interaction, Jan. 1997.
[16] A. Kendon, Conducting interaction: Patterns of behavior in focused
encounters. Cambridge University Press, 1990.
[22]
[21]
[19]
[17] C. Edelsky, "Who's got the floor?" Language in Society, 1981.
[18]
F. Setti, O. Lanz, R. Ferrario, V. Murino, and M. Cristani, "Multi-
scale f-formation discovery for group detection," IEEE International
Conference on Image Processing, Sep. 2013, pp. 3547 -- 3551, ISBN:
978-1-4799-2341-0.
F. Setti, C. Russell, C. Bassetti, and M. Cristani, "F-formation de-
tection: Individuating free-standing conversational groups in images,"
PLOS ONE, May 21, 2015.
[20] X. Alameda-Pineda, Y. Yan, E. Ricci, O. Lanz, and N. Sebe, "Ana-
lyzing free-standing conversational groups: A multimodal approach,"
ACM Press, Proceedings of the 23rd ACM international conference
on Multimedia, 2015.
S. Vascon, E. Z. Mequanint, M. Cristani, H. Hung, M. Pelillo, and
V. Murino, "Detecting conversational groups in images and sequences:
A robust game-theoretic approach," Computer Vision and Image
Understanding, Feb. 2016.
E. Ricci, J. Varadarajan, R. Subramanian, S. R. Bulo, N. Ahuja, and
O. Lanz, "Uncovering interactions and interactors: Joint estimation
of head, body orientation and f-formations from surveillance videos,"
in 2015 IEEE International Conference on Computer Vision (ICCV),
IEEE, Dec. 2015.
[23] H. Hung, D. B. Jayagopi, S. Ba, J.-M. Odobez, and D. Gatica-Perez,
"Investigating automatic dominance estimation in groups from visual
attention and speaking activity," ACM Press, International conference
on Multimodal interfaces, 2008.
L. Zhang and H. Hung, "Beyond f-formations: Determining social
involvement in free standing conversing groups from static images,"
IEEE Proceedings of the Conference on Computer Vision and Pattern
Recognition, Jun. 2016.
[25] -- -- , "On social involvement in mingling scenarios: Detecting asso-
ciates of f-formations in still images," IEEE Transactions on Affective
Computing, 2018.
[26] C. Oertel, K. A. Funes Mora, J. Gustafson, and J.-M. Odobez,
"Deciphering the silent participant: On the use of audio-visual cues
for the classification of listener categories in group discussions,"
[24]
|
1812.01132 | 1 | 1812 | 2018-12-03T23:20:52 | A Unified Approach to Dynamic Decision Problems with Asymmetric Information - Part II: Strategic Agents | [
"cs.MA",
"cs.GT",
"math.OC"
] | We study a general class of dynamic games with asymmetric information where agents' beliefs are strategy dependent, i.e. signaling occurs. We show that the notion of sufficient information, introduced in the companion paper team, can be used to effectively compress the agents' information in a mutually consistent manner that is sufficient for decision-making purposes. We present instances of dynamic games with asymmetric information where we can characterize a time-invariant information state for each agent. Based on the notion of sufficient information, we define a class of equilibria for dynamic games called Sufficient Information Based Perfect Bayesian Equilibrium (SIB-PBE). Utilizing the notion of SIB-PBE, we provide a sequential decomposition of dynamic games with asymmetric information over time; this decomposition leads to a dynamic program that determines SIB-PBE of dynamic games. Furthermore, we provide conditions under which we can guarantee the existence of SIB-PBE. | cs.MA | cs | A Unified Approach to Dynamic Decision
Problems with Asymmetric Information -
Part II: Strategic Agents
Hamidreza Tavafoghi, Yi Ouyang, and Demosthenis Teneketzis
Abstract
We study a general class of dynamic games with asymmetric information where agents' beliefs are
strategy dependent, i.e. signaling occurs. We show that the notion of sufficient information, introduced
in the companion paper [2], can be used to effectively compress the agents' information in a mutually
consistent manner that is sufficient for decision-making purposes. We present instances of dynamic
games with asymmetric information where we can characterize a time-invariant information state for
each agent. Based on the notion of sufficient information, we define a class of equilibria for dynamic
games called Sufficient Information Based Perfect Bayesian Equilibrium (SIB-PBE). Utilizing the notion
of SIB-PBE, we provide a sequential decomposition of dynamic games with asymmetric information
over time; this decomposition leads to a dynamic program that determines SIB-PBE of dynamic games.
Furthermore, we provide conditions under which we can guarantee the existence of SIB-PBE.
I. INTRODUCTION
We study a general class of stochastic dynamic games with asymmetric information. We
consider a setting where the underlying system has Markovian dynamics controlled by the agents'
joint actions at every time. The instantaneous utility of each agent depends on the agents' joint
8
1
0
2
c
e
D
3
]
A
M
.
s
c
[
1
v
2
3
1
1
0
.
2
1
8
1
:
v
i
X
r
a
A preliminary version of this paper will appear in the Proceeding of the 57th IEEE Conference on Decision and Control
is with the Department of Mechanical Engineering at
(CDC), Miami Beach, FL, December 2018 [1].
H. Tavafoghi
the University of California, Berkeley (e-mail:
[email protected]). Y. Ouyang is with Preferred Networks America, Inc. (e-mail: [email protected]). D.
Teneketzis is with the Department of Electrical Engineering and Computer Science at the University of Michigan, Ann Arbor
(e-mail: [email protected])
This work was supported in part by the NSF grants CNS-1238962, CCF-1111061, ARO-MURI grant W911NF-13-1-0421, and
ARO grant W911NF-17-1-0232.
November 23, 2018
DRAFT
2
actions and the system state. At every time, each agent makes a private noisy observation that
depends on the current system state and the agents' past actions. Therefore, at every time agents
have asymmetric and imperfect information about the history of the game. Furthermore, the
information that an agent possesses about the history of the game at each time instant depends
on the other agents' past actions and strategies; this phenomenon is known as signaling among the
agents. Moreover, at each time, each agent's strategy depend on his information about the current
system state and the other agents' strategies. Therefore, the agents' decisions and information
are coupled and interdependent over time.
There are three main challenges in the study of dynamic games with asymmetric information.
First, since the agents' decisions and information are interdependent and coupled over time, we
need to determine the agents' strategies simultaneously for all times. Second, the agents' strategy
domains grow over time as they acquire more information. Third, in contrast to dynamic teams
where agents coordinate their strategies, in dynamic games each agent's strategy is his private
information as he chooses it individually so as to maximize his utility. Therefore, in dynamic
games each agent needs to form a belief about other agents' strategies as well as about the game
history.
In this paper, we propose a general approach for the study of a dynamic games with asymmetric
information that addresses the stated-above challenges. We build our approach based on notion
of sufficient information, introduced in the companion paper [2], and define a class of sufficient
information based assessments, where strategic agents compress their information in a mutually
consistent manner that is sufficient for decision-making purposes. Accordingly, we propose the
notion of Sufficient Information Based Perfect Bayesian Equilibrium (SIB-PBE) for dynamic
games that characterizes a set of equilibrium outcomes. Using the notion of SIB-PBE, we provide
a sequential decomposition of the game over time, and formulate a dynamic program that enables
us to compute the set of SIB-PBEs via backward induction. We discover specific instances of
dynamic games where we can determine a set of information states for the agents that have
time-invariant domain. We determine conditions that guarantee the existence of SIB-PBEs. We
discuss the relation between the class of SIB-PBE and PBE in dynamic games, and argue that
the class of SIB-PBE provides a simpler and more robust set of equilibria than PBE that are
consistent with agents' rationality.
The notion of SIB-PBE we introduce in this paper provides a generalization/extension of
Markov Perfect Equilibrium (MPE) to dynamic games with asymmetric information. The authors
November 23, 2018
DRAFT
3
in [3] introduce the notion of Markov Perfect Equilibrium that characterizes a subset of Subgame
Perfect Equilibria (SPE) for dynamic games with symmetric information and provide a sequential
decomposition of the game over time. Moreover, our results, along with those in the companion
paper [2], provide a unified approach to the study of dynamic decision problems with asymmetric
information and strategic or nonstrategic agents.
A. Related Literature
Dynamic games with asymmetric information have been investigated extensively in literature
in the context of repeated games; see [4] -- [7] and the references therein. The key feature of
these games is the absence of a dynamic system. Moreover, the works on repeated games study
primarily their asymptotic properties when the horizon is infinite and agents are sufficiently
patient (i.e. the discount factor is close one). In repeated games, agents play a stage (static)
game repeatedly over time. As a result, the decision making problem that each agent faces is
very simple. The main objective of this strand of literature is to explore situations where agents
can form self-enforcing punishment/reward mechanisms so as to create additional equilibria that
improve upon the payoffs agents can get by simply playing an equilibrium of the stage game over
time. Recent works (see [8] -- [10]) adopt approaches similar to those used in repeated games to
study infinite horizon dynamic games with asymmetric information when there is an underlying
dynamic Markovian system. Under certain conditions on the system dynamics and information
structure, the authors of [8] -- [10] characterize a set of asymptotic equilibria when the agents are
sufficiently patient.
The problem we study in this paper is different from the ones in [4] -- [10] in two aspects. First,
we consider a class of dynamic games where the underlying system has a general Markovian
dynamics and a general information structure, and we do not restrict attention to asymptotic
behaviors when the horizon is infinite and the agents are sufficiently patient. Second, we study
situations where the decision problem that each agent faces, in the absence of strategic interac-
tions with other agents, is a Partially Observed Markov Decision Process (POMDP), which is
a complex problem to solve by itself. Therefore, reaching (and computing) a set of equilibrium
strategies, which take into account the strategic interactions among the agents, is a very chal-
lenging task. As a result, it is not very plausible for the agents to seek reaching an equilibria
that is generated by the formation of self-enforcing punishment/reward mechanisms similar to
those used in infinitely repeated games (see Section VII for more discussion). We believe that
November 23, 2018
DRAFT
4
our results provide new insight into the behavior of strategic agents in complex and dynamic
environments, and complement the existing results in the repeated games literature with simple
and (mostly) static environments.
The works in [11] -- [14] consider dynamic zero-sum games with asymmetric information. The
authors of [11], [12] study zero-sum games with Markovian dynamics and lack of information
on one side (i.e. one informed player and one uninformed player). The authors of [13], [14]
study zero-sum games with Markovian dynamics and lack of information on both sides. The
problem that we study in this paper is different from the ones in [11] -- [14] in three aspects.
First, we study a general class of dynamic games that include dynamic zero-sum games with
asymmetric information as a special case. Second, we consider a general Markovian dynamics for
the underlying system whereas the authors of [11] -- [14] consider a specific Markovian dynamics
where each agent observes perfectly a local state that evolves independently of the other local
states conditioned on the agents' observable actions. Third, we consider a general information
structure that allows us to capture scenarios with unobservable actions and imperfect observations
that are not captured in [11] -- [14].
The problems investigated in [15] -- [20] are the most closely related to our problem. The authors
of [15], [16] study a class of dynamic games where the agents' common information based belief
(defined in [15]) is independent of their strategies; that is, there is no signaling among them.
This property allows them to apply ideas from the common information approach developed
in [21], [22], and define an equivalent dynamic game with symmetric information among the
fictitious agents. Consequently, they characterize a class of equilibria for dynamic games called
Common Information based Markov Perfect Equilibrium. Our results are different from those in
[15], [16] in two aspects. First, we consider a general class of dynamic games where the agents'
CIB beliefs are strategy-dependent, thus, signaling is present. Second, the proposed approach
in [15], [16] requires the agents to keep track of all of their private information over time. We
propose an approach to effectively compress the agents' private information, and consequently,
reduce the number of variables on which the agents need to form CIB beliefs.
The authors of [17] -- [20] study a class of dynamic games with asymmetric information
where signaling occurs. When the horizon in finite, the authors of [17], [18] introduce the
notion of Common Information Based Perfect Bayesian Equilibrium, and provide a sequential
decomposition of the game over time. The authors of [19], [20] extend the results of [17], [18]
to finite horizon Linear-Quadratic-Gaussian (LQG) dynamic games and infinite horizon dynamic
November 23, 2018
DRAFT
5
games, respectively. The class of dynamic games studied in [17] -- [20] satisfies the following
assumptions: (i) agents' actions are observable (ii) each agent has a perfect observation of his
own local states/type (iii) conditioned on the agents' actions, the evolution of the local states
are independent.
We relax assumptions (i)-(iii) of [17] -- [20], and study a general class of dynamic games with
asymmetric information, hidden actions, imperfect observations, and controlled and coupled
dynamics. As a result, each agent needs to form a belief about the other agents' past actions
and private (imperfect) observations. Moreover, in contrast to [17] -- [20], an agent's, say agent
i's, belief about the system state and the other agents' private information is his own private
information and is different from the CIB belief. In this paper, we extend the methodology
developed in [17], [18] for dynamic games, and generalize the notion of CIB-PBE. Furthermore,
we propose an approach to effectively compress the agents' private information and obtain the
results of [17] -- [20] as special cases.
B. Contribution
We develop a general methodology for the study and analysis of dynamic games with asym-
metric information, where the information structure is non-classical; that is, signaling occurs.
We propose an approach to characterize a set of information states that effectively compress
the agents' private and common information in a mutually consistent manner. We characterize a
subclass of Perfect Bayesian Equilibria, called SIB-PBE, and provide a sequential decomposition
of these games over time. This decomposition provides a backward induction algorithm to
determine the set of SIB-PBEs. We discover special instances of dynamic games where we
can identify a set of information states with time-invariant domain. We provide conditions that
guarantee the existence of SIB-PBEs in dynamic games with asymmetric information. We show
that the methodology developed in this paper generalizes the existing results on dynamic games
with non-classical information structure.
C. Organization
The rest of the paper is organized as follows. In Section II, we describe our model. In Section
III, we discuss the main issues that arise in the study of dynamic games with asymmetric
information. We provide the formal definition of Perfect Bayesian Equilibrium in Section IV. In
Section V, we describe the sufficient information approach to dynamic games with asymmetric
information and introduce the notion of Sufficient Information Based (SIB) assessment and
November 23, 2018
DRAFT
6
SIB-PBE. In Section VI, we present our main results and provide a sequential decomposition of
dynamic games over time. We discuss our results in Section VII, and compare the notion of SIB-
PBE with other equilibrium concepts..In Section VIII, we determine conditions that guarantee the
existence of SIB-PBE in dynamic games with asymmetric information. We conclude in Section
IX. The proofs of all the theorems and lemmas appear in the Appendix.
Remark 1. Section I-D on notation and Section V-A on the definition of sufficient private
information are similar to the ones appearing in the companion paper [23]; moreover, the
model presented in Section II with strategic agents is similar to that of the companion paper
[23] with non-strategic agents. All these sections are included in this paper for ease of reading
and to make the paper self-contained.
D. Notation
t , . . . ,X N
(resp. functions f 1
t , . . . ,X N
t
t (·), . . . ,f N
t ) (resp. ft(·) := (f 1
Random variables are denoted by upper case letters, their realizations by the corresponding
lower case letters. In general, subscripts are used as time index while superscripts are used to
index agents. For t1≤ t2, Xt1:t2 (resp. ft1:t2(·)) is the short hand notation for the random variables
(Xt1,Xt1+1, ...,Xt2) (resp. functions (ft1(·), . . . ,ft2(·))). When we consider a sequence of random
variables (resp. functions) for all time, we drop the subscript and use X to denote X1:T (resp.
f (·) to denote f1:T (·)). For random variables X 1
t (·)),
t (·))) to denote the vector of the set
we use Xt := (X 1
of random variables (resp. functions) at t, and X−n
t ) (resp.
:= (X 1
t (·))) to denote all random variables (resp. functions)
f−n
at t except that of the agent indexed by n. P{·} and E{·} denote the probability and expectation
of an event and a random variable, respectively. For a set X , ∆(X ) denotes the set of all
beliefs/distributions on X . For random variables X, Y with realizations x,y, P{xy} := P{X =
xY = y} and E{Xy} :=E{XY = y}. For a strategy g and a belief (probability distribution) π,
π{·}) to indicate that the probability (resp. expectation) depends on the
we use Pg
choice of g and π. We use 1{X=x} to denote the indicator function for event X = x. For sets A
and B we use A\B to denote all elements in set A that are not in set B.
(·) := (f 1
t (·), . . . ,f n−1
π{·} (resp. Eg
(·),f n+1
(·), . . . ,f N
t (·), . . . ,f N
t , . . . ,X n−1
t
,X n+1
, . . . ,X N
t
t
t
t
t
1) System dynamics: There are N strategic agents who live in a dynamic Markovian world
over horizon T :={1, 2, ..., T}, T <∞. Let Xt∈Xt denote the state of the world at t∈T . At time
II. MODEL
November 23, 2018
DRAFT
7
t, each agent, indexed by i ∈ N := {1, 2, ..., N}, chooses an action ai
the set of available actions to him at t. Given the collective action profile At := (A1
state of the world evolves according to the following stochastic dynamic equation,
t ∈ Ai
t, where Ai
t denotes
t ), the
t , ..., AN
Xt+1 = ft(Xt, At, W x
t ),
(1)
1:T−1 is a sequence of independent random variables. The initial state X1 is a random
where W x
variable that has a probability distribution η ∈ ∆(X1) with full support.
At every time t ∈ T , before taking an action, agent i receives a noisy private observation
t ∈ Y i
Y i
t of the current state of the world Xt and the action profile At−1, given by
t = Oi
Y i
t(Xt, At−1, W i
t ),
(2)
1:T , i ∈ N , are sequences of independent random variables. Moreover, at every t ∈ T ,
where W i
all agents receive a common observation Zt ∈ Zt of the current state of the world Xt and the
action profile At−1, given by
Zt = Oc
t (Xt, At−1, W c
t ),
(3)
1:T , and W i
1:T , i ∈ N are mutually independent.
where W c
1:T , is a sequence of independent random variables. We note that the agents' actions
At−1 is commonly observable at t if At−1 ⊆ Zt. We assume that the random variables X1,
W x
agents' aggregate information is given by Ht :=(cid:81)
1:T−1, W c
2) Information structure: Let Ht ∈ Ht denote the aggregate information of all agents at time
1:t−1}, i.e. Ht denotes
t. Assuming that agents have perfect recall, we have Ht = {Z1:t, Y 1:N
the set of all agents' past observations and actions. The set of all possible realizations of the
τ <t Ai
τ.
At time t∈T , the aggregate information Ht is not fully known to all agents. Let Ct :={Z1:t}∈
Ct denote the agents' common information about Ht and P i
t denote
t and Ct denote the set of all possible realizations
agent i's private information about Ht, where P i
of agent i's private and common information at time t, respectively. In Section II-A, we discuss
several instances of information structures that can be captured as special cases of our model.
τ≤t Zτ ×(cid:81)
1:t−1}\Ct ∈ P i
τ ×(cid:81)
i∈N(cid:81)
i∈N(cid:81)
t := {Y i
τ≤t Y i
1:t, Ai
, A1:N
1:t
3) Strategies and Utilities: Let H i
i at t, where Hi
behavioral strategy gi
t denote the information available to agent
t denote the set of all possible realizations of agent i's information at t. Agent i's
t), t ∈ T ,
t, t ∈ T , is defined as a sequence of mappings gi
t → ∆(Ai
t : Hi
t := {Ct, P i
t} ∈ Hi
November 23, 2018
DRAFT
that determine agent i's action Ai
t for every realization hi
t ∈ Hi
t of the history at t ∈ T .
8
Agent i's instantaneous utility at t depends on the system state Xt and the collective action
1:T so as to maximize his
t(Xt,At). Agent i chooses his strategy gi
profile At, and is given by ui
total (expected) utility over horizon T , given by,
(cid:88)
t∈T
U i(X1:T , A1:T ) =
ui
t(Xt, At).
(4)
To avoid measure-theoretic technical difficulties and for clarity and convenience of exposition,
we assume that all the random variables take values in finite sets.
Assumption 1. (Finite game) The sets Xt, Zt, Y i
t, Ai
t, N , and T are finite.
Moreover, we assume that given any sequence of actions a1:t−1 up to time t−1, every possible
realization xt∈Xt of the system state at t has a strictly positive probability of realization.
Assumption 2. (Strictly positive transition matrix) For all t∈T , xt∈Xt and a1:t−1∈A1:t−1, we
have P{xta1:t−1} > 0.
Furthermore, we assume that for any sequence of actions {a1:T}, all possible realizations of
1:T } have positive probability. That is, no agent can infer perfectly another
private observations {y1:N
agent's action based only on his private observations.
Assumption 3. (Imperfect private monitoring) For all t∈T , y1:t ∈Y1:t, and a1:t−1 ∈A1:t−1, we
have P{y1:ta1:t−1} > 0.
Remark 2. We can relax Assumptions 2 and 3 under certain conditions and obtain results
similar to those appearing in this paper; for instance, when agents actions are observable we
can relax Assumptions 2 and 3. Broadly, the crucial assumption that underlies our results is
that every deviation that can be detected by agent i at any time t must be also detectable by all
agents at the same time t based only on the common information Ct. Due to space limitation
we do not include the discussion of Assumptions 2 and 3 and the extension of our results when
we relax them; we refer an interested reader to [24].
A. Special Cases
We discuss several instances of dynamic games with asymmetric information that are special
cases of the general model described above.
November 23, 2018
DRAFT
9
1) Nested information structure: Consider a two-player game with one informed player and one
uninformed player and a general Markovian dynamics. At every time t∈T , the informed player
makes a private perfect observation of the state Xt, i.e. Y 1
t = Xt. The uninformed player does
not have any observation of the state Xt. Both the informed and uninformed players observe
each others' actions, i.e. Zt = {At−1}. Therefore, we have P 1
t = ∅, and Ct =
1:t−1} for all t ∈ T . The above nested information structure corresponds to dynamic
{A1
games considered in [11], [25], [26], where in [25], [26] the state Xt is static.
t = {X1:t}, P 2
1:t−1,A2
t ,X 1
t ,X 2
t ,...,X N
2) Independent dynamics with observable actions: Consider an N-player game where the
t ) has N components. The agents' actions At are observable
state Xt := (X 0
by all agents, i.e. At−1 ⊂ Zt for all t ∈ T . At every time t ∈ T , agent i makes a perfect
observation of its local state X i
t . Moreover, at time t all agents
t ), i ∈ N .
make a common imperfect observation of state X i
t evolves independently over time as
Conditioned on the agents' collective action At, each X i
, i∈N ,
X i
t+1 = ft(X i
1:t ,A1:t−1}.
t ∈ T are mutually independent. Therefore, we have P i
The above environment includes the dynamic game considered in [17], [18] as special cases.
t ) for all i∈N and t∈T . We assume that X1, W c
t , t∈T , and W x,i
t
1:t,Z 1:N
t as well as a global state X 0
1:t} and Ct = {X 0
t given by Z i
t,At−1,W x,i
t,At−1,W c,i
t = {X i
t = Oc
t (X i
t ,X 2
t ,...,X N
t ) has N components. Agent i, i ∈ N , perfectly controls X i
3) Perfectly controlled dynamics with hidden actions: Consider a N-player game where the
t, i.e.
t, t∈T , is not observable by all other agents −i. Every agent
t ) of the system state at t∈T . Therefore,
state Xt := (X 1
t+1 = Ai
X i
i, i∈N , makes a noisy private observation Y t
we have P i
t. Agent i's actions Ai
i (Xt, W i
t :={A1:t, Y i
1:t}, Ct =∅.
III. APPRAISALS AND ASSESSMENTS
In this section we provide an overview of the notions of appraisals, assessments, and an
equilibrium solution concept for dynamic games with asymmetric information. We argue that
an equilibrium solution concept must consist of a pair of a strategy profile and a belief system
(to be defined below), and discuss the importance of off-equilibrium path beliefs in dynamic
games.2
In a dynamic game with asymmetric information agents have private information about the
evolution of the game, and they do not observe the complete history of the game given by
2We refer the interested reader to the papers by Battigalli [27], Myerson and Remy [28], and Watson [29] for more discussion.
November 23, 2018
DRAFT
10
{Ht,Xt}. Therefore, at every time t ∈ T , each agent, say agent i ∈ N, needs to form (i) an
appraisal about the current state of the system Xt and the other agents' information H−i
(appraisal
about the history), and (ii) an appraisal about how other agents will play in the future, so as
to evaluate the performance of his strategy choices (appraisal about the future). Given the other
t at t∈T , along with (i) other
agents' strategies g−i, agent i can utilize his own information H i
agents' past strategies g−i
t:T to form these appraisals
about the history and future of the game, respectively.
1:t−1 and (ii) other agents' future strategies g−i
t
In contrast to dynamic teams where agents have a common objective and coordinate their
strategies, in dynamic games each agent has his own objective and chooses his strategy gi so
as to maximize his objective. Thus, unlike dynamic teams, in dynamic games strategy gi is
agent i's private information and not known to other agents. Therefore, in dynamic games, each
agent needs to form a prediction about the other agents' strategies. We denote this prediction by
g∗1:N
1:T that is actually being played by the agents.
Following Nash's idea, we assume that agents share a common prediction g∗ about the actual
strategy g. We would like to emphasize that the prediction g∗ does not necessarily coincide
with the actual strategy g. As we point out later, one requirement of an equilibrium is that for
every agent i∈N , the prediction g∗i must be an optimal strategy for him given the other agents
prediction strategies g∗−i.
to distinguish it from the strategy profile g1:N
1:T
Since an agent's actual strategy, say agent i's strategy gi, is his own private information, it
is possible that gi is different from the prediction g∗i. Below we discuss the implication of
an agent's deviation from the prediction strategy profile g∗. For that matter, we first consider
an agent who may want to deviate from g∗, and then we consider an agent who faces such a
deviation and his response.
In dynamic games, when agent i ∈ N chooses his strategy gi, he needs to know how other
agents will play for any choice of gi which can be different from the prediction g∗i. Therefore,
the prediction g∗ has to be defined at all possible information realizations (i.e. information sets)
of every agent, those that have positive probability under g∗ as well as those that have zero
probability under g∗.3 Using the prediction g∗, any agent, say agent i, can form an appraisal
about the future of the game for any strategy choice gi, and evaluate the performance of gi.
3This is not an issue in dynamic teams since agents coordinate in advance their choice of strategy profile g, and no agent has
an incentive to (privately) deviate from it. Hence, the agents' strategy profile g is needed to be defined only on information sets
of positive probability under g.
November 23, 2018
DRAFT
11
By the same rationale, when agent i chooses gi he needs to determine his strategy for all
of his information sets, even those that have zero probability under g∗−i. This is because it is
possible that some agent j∈N may deviate from g∗j and play a strategy gj that is different from
the prediction g∗j. Agent i must foresee these possible deviations by other agents and determine
his response to these deviations.
To determine his optimal strategy gi at any information set, agent i needs to first form an
appraisal about the history of the game at t as well as an appraisal about the future of the game
using the strategy prediction g∗−i. For an information set hi
t that is compatible with the prediction
g∗−i given his strategy gi at t∈T (i.e. hi
t has positive probability of being realized under g∗),
agent i can use Bayes' rule to derive the appraisal about the history of the game at t. However, for
t that has zero probability under the prediction g∗−i given gi, agent i cannot
an information set hi
anymore rely on the prediction g∗ and use Bayes' rule to form his appraisal about the history
1:t−1 is
of the game at t. The realization of history hi
not (completely) correct, thus, he needs to revise his original prediction g∗−i
1:t−1 and to form a
revised appraisal about the history of the game at t. Therefore, agent i must determine how to
t, t∈T , that
form/revise his appraisal about the history of the game for every realization hi
has zero probability under g∗−i. We note that upon reaching an information set of measure zero,
agent i only revises his prediction g∗−i
1:t−1 about other agents' past strategies, but does not change
his prediction g∗−i
t:T about their future strategies. This is because at equilibrium, the prediction
g∗−i
t:T specifies a set of strategies for other agents that are optimal in the continuation game that
takes place after the realization of the information set hi
t tells agent i that his original prediction g∗−i
t of zero probability under g∗
t∈Hi
1:t−1.4
We describe below how one can formalize the above issues we need to consider in the study of
dynamic games with asymmetric information. Following the game theory literature [30], agents'
appraisals about the history and future of the game can be captured by an assessment that all
agents commonly hold about the game. We define an assessment as a pair of mappings (g∗,µ),
where g∗:={g∗i
t) denotes a prediction about agent i's strategy at
t, and µ := {µi
t → ∆(Xt×H−i
t ) denotes agent i's belief about the
t ,i∈N, t∈T }, g∗i
:Hi
t,i ∈ N,t ∈ T }, where µi
t → ∆(Ai
t : Hi
t
4In dynamic teams, agents only need to determine their optimal strategy g for information sets that have positive probability
under g. As a result, a collective choice of strategy g is optimal at every information set with positive probability if and only
if it maximizes the (expected) utility of the team from t = 1 up to T . However, in dynamic games agents need to determine
their strategies for all information sets irrespective of whether they have zero or positive probability under g∗. Therefore, if a
choice of strategy gi maximizes agent i's (expected) utility from t = 1 to T = 1, it does not imply that it is also optimal at
all information sets that have zero probability under {g∗−i, gi}. Consequently, a choice of agent i's strategy must be optimal
for all continuation games that follow after a realization of an information set hi
t irrespective of whether it has zero or positive
probability.
November 23, 2018
DRAFT
12
t
given his information H i
t) denotes agent i's belief about the history {Xt,H−i
t,i∈N,t∈T } is called a belief system. For every i∈N , t∈T , and hi
system state Xt and agents −i's information H−i
t. The collection of
t ∈Hi
mappings µ :={µi
t,
t:T denotes agent
µi
t(hi
i's prediction about all other agents' continuation strategy from t onward. We note that µi
t(hi
t)
determines agent i's appraisal about the history of the game when hi
t has either positive or
zero probability under g∗. Therefore, using an assessment (g∗,µ) each agent can fully construct
appraisals about the history and future of the game at any t∈T .
t } of the game, and g∗−i
t(hi
t) at information set hi
Using the definition of an assessment, we can extend the idea of Nash equilibrium to dynamic
games with asymmetric information. An equilibrium of the dynamic game is defined as a common
assessment (g∗, µ) among the agents that satisfies the following conditions under the assumption
that the agents are rational. (i) Agent i ∈ N chooses his strategy gi
1:T so as to maximize his
total expected utility (4) in all continuation games given the assessment (g∗,µ) about the game.
Therefore, the prediction g∗i
1:T that other agents hold about agent i's strategy must be a maximizer
of agent i's total expected utility under the assessment (g∗,µ). (ii) For all t∈T , agent i's, i∈N ,
t that has positive probability of realization under g∗,
belief µi
t } conditioned on the realization hi
must be equal to the probability distribution of {Xt,H−i
(determined via Bayes' rule) assuming that agents −i play according to g∗−i
t has zero
probability under the assessment g∗, the belief µi
t) cannot be determined via Bayes' rule and
must be revised. The revised belief must satisfy a certain set of "reasonable" conditions so as
to be compatible with agent i's rationality. Various sets of conditions have been proposed in
the literature (see [30], [31]) to capture the notion of "reasonable" beliefs that are compatible
with the agents' rationality. Different sets of conditions for off-equilibrium beliefs µi
t) result
in the different equilibrium concepts that are proposed for dynamic games with asymmetric
information.
1:t . When hi
t ∈ Hi
t(hi
t
t(hi
In this paper, we consider Perfect Bayesian Equilibrium (PBE) as the equilibrium solution
concept. In the next section we provide the formal definition of PBE.
IV. PERFECT BAYESIAN EQUILIBRIUM
The formal definition of Perfect Bayesian Equilibrium (PBE) for dynamic games in extensive
form can be found in [31]. In this paper we use a state space representation for dynamic games
instead of an extensive game form representation, therefore, we need to adapt the definition of
PBE to this representation. A PBE is defined as an assessment (g∗,µ) that satisfies the sequential
November 23, 2018
DRAFT
rationality and consistency conditions. The sequential rationality condition requires that for all
i ∈ N , the prediction g∗i is optimal for agent i given the assessment (g∗,µ). The consistency
condition requires that for all i∈N , t∈T , and hi
t) must be compatible
with prediction g∗. We formally define these conditions below.
t, agent i's belief µ(hi
t∈Hi
13
Let P(g∗−i
t:T ,g∗i
t:T )
µi
t
{·hi
t} denote the probability measure induced by the stochastic process that starts
t,ct}, where random variables {Xt,P −i
t } are distributed
,pi
t), assuming that agents i and −i take actions according
µ{·}
t:T , respectively. In the sequel, to save some notation, we write Pg∗
at time t with initial condition {Xt,P −i
t
according to probability distribution µi
t(hi
to strategies g∗i
instead of P(g∗−i
t:T and g∗−i
t:T ,g∗i
t:T )
µi
t
{·} whenever there is no confusion.
Definition 1 (Sequential rationality). We say that an assessment (g∗,µ) is sequentially rational
if ∀i∈N , t∈T , and hi
t, the strategy prediction g∗i
t:T is a solution to
t∈Hi
(cid:40) T(cid:88)
τ =t
E(g∗−i
t:T ,gi
µi
t
t:T )
sup
gi
t:T
t(Xt, At)hi
ui
t
(cid:41)
(5)
t
The sequential rationality condition (5) requires that, given the assessment (g∗,µ), the pre-
diction strategy gi∗
for agent i is an optimal strategy for him for all continuation games after
t ∈ H i, irrespective of whether hi
history realization hi
t has positive or zero probability under
(g∗,µ). That is, the common prediction g∗i about agent i's strategy must be an optimal strategy
choice for him since it is common knowledge that he is a rational agent. We note that the
sequential rationality condition defined above is more restrictive than the optimality condition
for Bayesian Nash Equilibrium (BNE) which only requires (5) to hold at t = 1. By the sequential
rationality condition, we require the optimality of prediction g∗ even along off-equilibrium paths,
and thus, we rule out the possibility of non-credible threats (see [30] for more discussion).
The sequential rationality condition results in a set of constraints that the strategy prediction
g∗ must satisfy given a belief system µ. As we argued in Section III, the belief system µ must
be also compatible with the strategy prediction g∗. The following consistency condition captures
such compatibility between the belief system µ and the prediction g∗.
Definition 2 (Consistency). We say that an assessment (g∗,µ) is consistent if
i) for all i ∈ N, t ∈ T \{1}, hi
thi
t such that Pg∗
t−1 ∈ Hi
t−1, and hi
t ∈ Hi
µ{hi
t−1} > 0, the belief
November 23, 2018
DRAFT
µi
t(hi
t) must satisfy Bayes' rule, i.e.
ii) for all i∈N , t∈T \{1}, hi
µ{hi
thi
t−1} = 0, we have
t)(x1:t, p−i
t ) =
t(hi
µi
t−1∈Hi
Pg∗{hi
t
hi
t−1}
t−1}
t, xt, p−i
thi
Pg∗{hi
t such that Pg∗
.
t−1, and hi
t∈Hi
t)(x1:t, p−i
µi
t(hi
t ) > 0
only if there exists an open loop strategy (A−i
1:t−1 = ai
1:t−1) such that
P(A−i
1:t−1=a−i
1:t−1,Ai
1:t−1=ai
1:t−1 = a−i
1:t−1,Ai
1:t−1){xt, p−i
t } > 0.
14
(6)
(7)
t(hi
{hi
µi
1
{hi
t} > 0, belief µi
First, consider an information set hi
t indicates that some agent has deviated from prediction g∗−i
The above consistency condition places a restriction on the belief system µ so that it is
compatible with the strategy prediction g∗. For information sets along equilibrium paths, i.e.
Pg∗
t) must be updated according to (6) via Bayes' rule since agent i's
µi
1
observations are consistent with the prediction g∗. For information sets along off-equilibrium
t} = 0, agent i needs to revise his belief about the strategy of agents −i as
paths, i.e. Pg∗
the realization of hi
1:t . As pointed
t) must be "reasonable". Definition 2 provides a set of such
out before, the revised belief µi(hi
"reasonable" conditions captured by (6) and (7) that we discuss further below.
t along an off-equilibrium path such that Pg∗
t−1} > 0.
t−1 at t−1, hi
t has a positive probability under
That is, conditioned on reaching information set hi
t−1} and Pg∗
t} = 0, we have
{hi
thi
t−1}Pg∗
{hi
the prediction strategy g∗. Since Pg∗
t−1} = 0. Therefore, hi
{hi
Pg∗
t−1 is also an information set along an off-equilibrium path, and
µi
1
t−1) is a revised belief that agent i holds at t−1. Note that if the assessment (g∗,µ) satisfies
µi(hi
the sequential rationality condition, g∗ is a best response for all agents in all continuation games
that follow the realization of every information set of positive or zero probability. Moreover,
since Pg∗
t−1 is consistent with
the strategy prediction g∗
t−1. Therefore, agent i does not have any reason to further revise his
belief about agents −i's strategy beyond the revision that results in µi
t−1). Thus, agent i
t−1) at t−1 and updating it via Bayes'
determines his belief µi
t) by utilizing his belief µi
rule assuming that agents −i' play according to g∗−i
t−1} > 0, the realization of hi
t conditioned on reaching hi
t−1 (see part (i), eq. (6)).
t} = Pg∗
t−1(hi
t−1(hi
{hi
thi
{hi
thi
t−1
µi
t−1
{hi
{hi
t(hi
µi
1
µi
t−1
µi
t−1
µi
1
µi
1
Next, consider an information set hi
t along an off-equilibrium path such that Pg∗
t−1 at t− 1, hi
t−1} = 0.
t has a zero probability of
thi
{hi
µi
t
That is, conditioned on reaching information set hi
November 23, 2018
DRAFT
15
t
t(hi
t(hi
t indicates that agents −i
realization under the prediction g∗. In this case, the realization of hi
have deviated from prediction g∗−i
1:t−1, and this deviation has not been detected by agent i before.
Therefore, agent i needs to form a new belief about agents −i's private information P −i
and the
t). Part (ii) of the consistency condition concerns such belief revisions
state Xt by revising µi
and requires that the support of agent i's revised belief µi
t) includes only the states and private
information that are feasible under the system and information dynamics (1) and (2), that is,
they are reachable under some open-loop control strategy (A−i
1:t−1). We
note that since we are using a state representation of the dynamic game, we need to impose
such a requirement, whereas in the equivalent extensive form representation of the game such a
requirement is satisfied by the construction of the game-tree.
1:t−1 = a−i
1:t−1 = ai
1:t−1,Ai
t } > 0 for all (A1:t−1 =
Remark 3. Under Assumptions 2 and 3, we have P(A1:t−1=a1:t−1)
a1:t−1). Therefore part (ii) of the consistency conditions is trivially satisfied. In the rest of the
paper, we ignore part (ii) and only consider part (i) of the definition of consistency. In [24], we
discuss the case when we relax Assumptions 2 and 3.
{x1:t,p−i
µ1
We can now provide the formal definition of PBE for the dynamic game of Section II.
Definition 3. An assessment (g∗,µ) is called a PBE if it satisfies the sequential rationality and
consistency conditions.
The definition of Perfect Bayesian equilibrium provides a general formalization of outcomes
that are rationalizable (i.e. consistent with agents' rationality) under some strategy profile and
belief system. However, as we argue further in Section VII, there are computational and philo-
sophical reasons that motivate us to define a sub class of PBEs that provide a simpler and
more tractable approach to characterizing the outcomes of dynamic games with asymmetric
information.
There are two major challenges in computing a PBE (g∗,µ). First, there is an inter-temporal
coupling between the agents' strategy prediction g∗ and belief system µ. According to the
consistency requirement, the belief system µ has to satisfy a set of conditions given a strategy
prediction g∗. On the other hand, by sequential rationality, a strategy prediction g∗ must satisfy
a set of optimality condition given belief system µ. Therefore, there is a circular dependency
between a prediction strategy g∗ and a belief system µ over time. For instance, by sequential
rationality, agent i's strategy gi∗
t:T and on
t at time t depends on the agents' future strategies g∗
November 23, 2018
DRAFT
16
1:t−1 indirectly through the consistency condition for µi
the agents' past strategies g∗
t. As a result,
one needs to determine the strategy prediction g∗ and belief system µ simultaneously for the
whole time horizon so as to satisfy the sequential rationality and consistency conditions, and
thus, cannot sequentially decompose the computation of PBE over time. Second, the agents'
t, i ∈ N , has a growing domain over time. Hence, the agents' strategies have
information hi
growing domains over time, and this feature further complicates the computation of PBEs of
dynamic games with asymmetric information.
The definition of PBE requires an agent to keep track of all observations he acquires over
time and to form beliefs about the private information of all other agents. As we show next,
agents do not need to keep track of all of their past observations to reach an equilibrium. They
can take into account fewer variables for decision making and ignore part of their information
that is not relevant to the continuation game. As we argue in Section VII, the class of simpler
strategies proposed in this paper characterize a more plausible prediction about the outcome of
the interaction among agents when the underlying system is highly dynamic and there exists
considerable information asymmetry among them.
V. THE SUFFICIENT INFORMATION APPROACH
We characterize a class of PBEs that utilize strategy choices that are simpler than general
behavioral strategies as they require agents to keep track of only a compressed version of their
information over time. We proceed as follows. In Section V-A we provide sufficient conditions for
the subset of private information an agent needs to keep track of over time for decision making
purposes. In Section V-D, we introduce the sufficient information based belief as a compressed
version of the agents' common information that is sufficient for decision-making purposes. Based
on these compressions of the agents' private and common information, we introduce the notion
of sufficient information based assessments and Sufficient Information Based-Perfect Bayesian
Equilibrium (SIB-PBE) in Sections V-D and V-E, respectively.
A. Sufficient Private Information
The key ideas for compressing an agent's private information appear in Definitions 4 below;
We refer an interested reader to the companion paper [2] for discussion on the rationale behind
Definition 4.
November 23, 2018
DRAFT
Definition 4 (Sufficient private information). We say Si
sufficient private information for the agents if,
t = ζ i
t (P i
t , Ct; g∗
1:t−1), i ∈ N , t ∈ T , is
(i) it can be updated recursively as
Si
t = φi
t(Si
t−1, H i
t\H i
t−1; g∗
1:t−1) if t ∈ T \{1},
(8)
17
(ii) for any strategy profile g∗ and for all realizations {ct, pt, pt+1, zt+1, at} ∈ Ct ×Pt ×Pt+1 ×
Zt+1 of positive probability,
Pg∗
1:t
=Pg∗
1:t
st+1,zt+1
,
(9)
(cid:110)
(cid:12)(cid:12)(cid:12)st,ct,at
(cid:111)
where s1:N
τ = ζ 1:N
τ
(p1:N
τ
,cτ ;g∗
(iii) for every strategy profile g∗ of the form g∗ := {g∗i
: S i
(cid:110)
(cid:12)(cid:12)(cid:12)pt,ct,at
(cid:111)
st+1,zt+1
1:τ−1) for τ ∈ T ;
(cid:111)
(cid:12)(cid:12)(cid:12)ct,pi
t,at
ui
t(Xt,At)
t}∈Ct×P i
t), i ∈ N,t ∈ T } and
t × Ct → ∆(Ai
(cid:111)
t
(cid:110)
(cid:12)(cid:12)(cid:12)ct,si
(10)
=E g∗
1:t−1
ui
t(Xt,At)
t,at
,
t of positive probability where s1:N
τ = ζ 1:N
τ
(p1:N
τ
,cτ ; g∗
1:τ−1)
at∈At, t∈T ;
E g∗
1:t−1
(cid:110)
for all realizations {ct,pi
for τ ∈ T ;
i∈N , and t∈T ,
for all realizations {ct,pi
for τ ∈ T .
(iv) given an arbitrary strategy profile g∗ of the form g∗ := {gi
t×Ct → ∆(Ai
t), i∈N , t∈T },
t : S i
(cid:111)
t,ct
,
(cid:12)(cid:12)(cid:12)si
(cid:110)
=Pg∗
1:t−1
s−i
t
t,ct
(cid:111)
(cid:12)(cid:12)(cid:12)pi
Pg∗
(cid:110)
t}∈Ct×P i
1:t−1
s−i
t
t of positive probability where s1:N
τ = ζ 1:N
τ
(p1:N
τ
(11)
,cτ ; g∗
1:τ−1)
We note that the conditions of Definition 4 is written in terms of strategy prediction profile g∗
for dynamic games. This is because, as we discussed before, the agents' actual strategy profile
g is their private information. Therefore, each agent i, i ∈ N , evaluates the sufficiency of a
compression of his private information using the strategy prediction he holds about other agents.
B. Sufficient Common Information
Based on the characterization of sufficient private information, we present a statistic (com-
pressed version) of the common information Ct that agents need to keep track of over time for
decision making purposes.
November 23, 2018
DRAFT
18
t, and St :=(cid:81)N
, t∈T . Define S i
t
i=1S i
Consider the sufficient private information S1:N
t to be the set of all possible
t. Let γt :Ct→ ∆(Xt×St) denote a mapping that determines
realizations of Si
a conditional probability distribution over the system state Xt and the agents' sufficient private
information St given the common information Ct at time t. We call the collection of mappings
γ := {γt,t ∈ T } a Sufficient Information Based belief system (SIB belief system). Note that
γt is only a function of the common information Ct, and thus, it is computable by all agents.
Let Πγ
t := γt(Ct) denote the (random) sufficient information based belief that agents hold under
belief system γ at t. We can interpret Πγ
t as the common belief that each agent holds about the
system state Xt and all the agents' (including himself) sufficient private information St at time
t. We call the SIB belief Πt a sufficient common information for the agents. In the rest of the
paper, we write Πt and drop the superscript γ whenever such a simplification in notation is clear.
Moreover, we use the terms sufficient common information and SIB belief interchangeably.
C. Special Cases:
We consider the special classes described in Section II and identify the sufficient information
1:T and SIB belief for each of them.
S1:N
1) Nested information structure: The uninformed agent (agent 2) has no private information,
t =∅. Thus, S2
t = Xt. Consequently, we
P 2
is the same as
can set S1
SIB belief Πt =P{XtA1
t =∅, thus, the uninformed agent's belief about P 1
1:t−1}.
t =∅. For the informed agent (agent 1) consider P 1,pr
t = Xt. Note that P 2
1:t−1,A2
2) Independent dynamics with observable actions: Consider Si
t , j ∈ N
have independent dynamics given the collective action At that is commonly observable by all
agents. Therefore, agent i's belief about Xj, j (cid:54)= i, is the same as SIB belief, Πt =Pg{X j
t Ct} =
Pg{X j
t. Note that X j
t = X i
3) Perfectly controlled dynamics with hidden actions: Since agent i, i ∈ N , perfectly controls
t over time t∈T , we set Si
X i
t } and Πt =∅.
t ={Ai
t−1, Y i
t P i
t , Ct}.
t
D. Sufficient Information based Assessment
As we discussed in Section IV, to form a prediction about the game we need to determine
an assessment about the game that is sequentially rational and consistent. We show below that
using the sufficient private information S1:N
and sufficient common information (the SIB belief)
Πt, we can form a sufficient information based assessment about the game. We prove that such
a sufficient information based assessment is rich enough to capture a subset of PBE.
t
November 23, 2018
DRAFT
19
Consider a class of strategies that utilize the information given by (Πt,Si
t) for agent i∈N at
t → ∆(Ai
t : ∆(Xt×St)×S i
t) a Sufficient Information Based (SIB)
time t. We call the mapping σi
strategy for agent i at time t. A SIB strategy σi
t determines a probability distribution for agent i's
t). A SIB strategy is a behavioral strategy where
t at time t given his information (Πt,Si
action Ai
agents only use the SIB belief Πt = γt(Ct) (instead of complete common information Ct), and
the sufficient private information Si
1:t−1) (instead of complete private information
t = ζ i
t ). A collection of SIB strategies {σ1
1:T} is called a SIB strategy profile σ. The set of
P i
SIB strategies is a subset of behavioral strategies, defined in Section II, as we can define,
t ,Ct; g∗
1:T,...,σN
t (P i
g(σ,γ),i
t
(hi
t) := σi
t(πγ
t , si
t).
In Section IV, we defined a consistency condition between strategy prediction g∗ and a
belief system µ. Below, we provide an analogous consistency condition between a SIB strategy
prediction σ∗ and a SIB belief system γ.
Definition 5. A pair (σ∗,γ) of a SIB strategy prediction profile σ∗ and belief system γ satisfies
the consistency condition if
(i) for all t∈T \{1}5, zt ∈Zt, πt−1 = γt−1(ct−1), and πt = γt({ct−1,zt}) such that Pσ∗
πt−1{zt} > 0,
t
πt must satisfy Bayes' rule, i.e.,
πt(xt, st) =
t
Pσ∗
πt−1{xt, st, zt}
Pσ∗
πt−1{zt}
t
∀xt ∈ Xt,∀st ∈ St,
,
(12)
(ii) for all t ∈ T \{1}, ct−1 ∈ Ct−1, πt−1 = γt−1(ct−1), zt ∈ Zt, and πt = γt({ct−1,zt}) such that
Pσ∗
πt−1{zt} = 0, we have
t
πt(xt, st) > 0,
∀xt ∈ Xt,∀st ∈ St,
only if there exists an open-loop strategy (A1:t−1 = a1:t−1) such that P(A1:t−1=a1:t−1)
0, and
π1
{ct−1,zt} >
P(A1:t−1=a1:t−1)
π1
{xt, st} > 0,
(13)
(iii) for all t ∈ T \{1}, ct−1 ∈ Ct−1, πt−1 = γt−1(ct−1), zt ∈ Zt, and πt = γt({ct−1,zt}) such that
5For t=1, Π1 is given by the conditional probability at t=1 as Π1(x1,s1):=
(cid:80)
P{s1x1,z1}
P{z1x1}η(x1) .
x1∈X1
November 23, 2018
DRAFT
Pσ∗
πt−1{zt} = 0, we have
t
(cid:88)
xt∈Xt
πt(xt, st) > 0,
∀st ∈ St
20
if there exists an open-loop strategy (A1:t−1 = a1:t−1) such that P(A1:t−1=a1:t−1)
and
π1
{ct−1,zt} > 0,
(cid:88)
xt∈Xt
P(A1:t−1=a1:t−1)
π1
{xt, st} > 0.
(14)
Parts (i) and (ii) of Definition 5 follow from rationales similar to their analogues in Definition
2, and require a SIB belief system to satisfy a sets of constraints with respect to a SIB strategy
profile that are similar to those for an assessment (g∗,µ). Definition 5 requires an additional
condition described by part (iii). By (14), we require a SIB belief system γ consistent with the
SIB strategy profile σ∗ to assign a positive probability to every realization st of the agents'
sufficient private information St that is "plausible" given the common information realization
ct = {ct−1,zt}; plausibility of st given ct means that there exists an open-loop strategy profile
(A1:t−1 = a1:t−1) consistent with the realization ct that leads to the realization of st with positive
probability. Therefore, part (iii) ensures that there exists no possible incompatibility between the
SIB belief Πt and the agents' sufficient private information St+1. As we show later (Section
V-E), such a compatibility condition allows each agent to refine the SIB belief Πt using his own
private sufficient information Si
t, and to form his private belief about the game.
Remark 4. Assumptions 2 and 3 imply that (13) holds for all (A1:t−1 = a1:t−1) such that
P(A1:t−1=a1:t−1) {ct} > 0. Therefore, in the rest of the paper, we ignore part (ii) of the consistency
condition for SIB belief systems. Moreover, under Assumptions 2 and 3, condition (14) is
πt(xt,pt) > 0 whenever
always satisfied. Therefore, condition (iii) is equivalent to having(cid:80)
πt−1{zt} = 0.
Pσ∗
Given a SIB strategy profile prediction σ∗, a consistent SIB belief must satisfy (12), which
determines the SIB belief Πt at t in terms of the SIB belief Πt−1 at t − 1 and the new common
information Zt at t. We define a SIB belief update rule as a mapping ψt : ∆(Xt−1×St−1)×Zt →
xt∈Xt
November 23, 2018
DRAFT
∆(Xt ×St), t∈T that determines recursively the SIB belief
Πψ
t
:= ψt(Πψ
t−1, Zt),
21
(15)
t indicates that the SIB belief Πψ
t−1 at t−1.6 The superscript
as a function of new common observation Zt at t and the SIB belief Πψ
ψ in Πψ
t is generated using the SIB update rule ψ. Let γψ denote
the common belief system that is equivalent to the SIB update rule ψ. We call a SIB belief update
rule ψ consistent with a SIB strategy profile σ∗ if the equivalent SIB belief system γψ is consistent
with σ∗ (Definition 5).
Define a SIB assessment (σ∗,γ) as a pair of SIB strategy profile σ∗ and a SIB belief system γ.
Below, we show that a consistent SIB assessment (σ∗,γ) is equivalent to a consistent assessment
(g∗,µ) as defined in Section IV (Definition 2).
Lemma 1. For any given SIB assessment (σ∗,γ), there exists an equivalent assessment (g∗,µ)
of a behavioral strategy prediction g∗ and belief system µ such that:
i) the behavioral strategy g∗ is defined by
ii) the belief system µ is consistent with g∗ and satisfies
g∗i
t (hi
t) := σ∗i
t (πγ
t , si
t);
Pg∗(cid:8)s−i
t
hi
t
(cid:9) ,
(16)
(17)
(cid:9) = P(cid:8)s−i
t
πt, si
t
for all i ∈ N , t ∈ T ,hi
t ∈ Hi
t, and s−i
t ∈ S−i
t
.
Lemma 1 shows that the set of consistent SIB assessment (σ∗,γ) is equivalent to a subset of
consistent assessments (g∗,µ). That is, using the SIB belief system γ and SIB strategy profile σ∗,
agents can form a consistent assessment about the evolution of the game. Moreover, condition
t capture all the
(17) implies that the SIB belief Πt along with agent i's sufficient information Si
information in H i
t that is relevant to agent i's belief about S−i
.
t
6Upon reaching an information set of measure zero (parts (ii) and (iii) of Definition 5), the revised SIB belief could be
a function of Ct = {Ct−1,Zt}, rather than only Πt−1(Ct−1) and Zt. Therefore, the set of SIB belief systems that can be
generated from SIB update rules is a subset of all consistent SIB belief systems given by Definition 5. However, we argue that
upon reaching an information set of measure zero, it is more plausible to revise the SIB belief only as a function of relevant
information Πt−1(Ct−1) and Zt; Ct is irrelevant given Πt−1(Ct−1) and Zt.
November 23, 2018
DRAFT
22
E. Sufficient Information based PBE
Using the result of Lemma 1, we can define a class of PBE, called Sufficient Information
based PBE (SIB-PBE), as a set of equilibria for dynamic games with asymmetric information
that can be expressed as SIB assessments.
Definition 6. A SIB assessment (σ∗,γ) is called a SIB-PBE if γ is consistent with σ∗ (Definition
5), and the equivalent consistent assessment (g∗, µ), given by Lemma 1, is a PBE.
In the sequel, we also call a consistent pair (σ∗,ψ) of a SIB strategy prediction profile σ∗ and
SIB belief update rule ψ a SIB-PBE if (σ∗,γψ) is a SIB-PBE.
Throughout Section V, we assumed that agents play according to the strategy predictions g∗
(or SIB strategy predictions σ∗). However, an agent's, say agent i ∈ N 's, actual strategy gi is
his private information and could be different from g∗ if such a deviation is profitable for him.
The proposed class of SIB assessments imposes two restrictions on agents' strategies and beliefs
compared to the general class of assessment presented in Section IV. First, it requires that each
agent i, i∈N , must play a SIB strategy σ∗i instead of a general behavioral strategy g∗i. Second,
it requires that each agent i, i∈N , must form a belief about the status of the game using only
t (instead of a general belief
the SIB belief Πt along with his sufficient private information Si
t). A strategic agent i∈N does not restrict his choice of strategy to SIB strategies, and may
µi
deviate from σ∗i to a non-SIB strategy gi if it is profitable to him. Moreover, a strategic agent
i does not limit himself to form belief about the current status of the game only based on Πt
t, and may instead use a general belief µi if it enables him to improve his expected utility.
and Si
In the next section, we address these strategic concerns, and show that no agent i∈N wants to
deviate from (Π,σ∗) and play a non-SIB strategy gi when all other agents are playing according
to SIB assessment (Π,σ∗). This result allows us to focus on the class of SIB assessments, and
develop a methodology to sequentially decompose the dynamic game over time.
VI. MAIN RESULTS
In this section, we show that the class of SIB assessments is rich enough to capture the agents'
strategic interactions.We first show that when agents −i play according to a SIB assessment
(σ∗,γ), agent i, i∈N , cannot mislead these agents by playing a strategy gi different from σ∗i,
thus, creating dual beliefs, one belief that is based on the SIB assessment (σ∗,γ) the functional
form of which is known to all agents, and another belief that is based on his private strategy
November 23, 2018
DRAFT
23
gi that is only known to him (Theorem 1). Then, we show that given that agents −i play SIB
strategy σ∗−i, agent i has a response that is a SIB strategy (Theorem 2).
The result of Theorems 1 (resp. 2) for agent i ∈ N assumes that all other agents −i are playing
according to strategy prediction g∗−i (resp. σ∗−1). The same results hold for every continuation
game that starts at any time t ∈ T along an off-equilibrium path; they can be proved by relabeling
time t as time 1, and using the SIB belief πt = γt(ct) and the corresponding belief µi
t), defined
by Lemma 1, as the initial common belief for the continuation game.
t(hi
Using the results of Theorems 1 and 2, we present a methodology to determine the set
of SIB-PBEs of stochastic dynamic games with asymmetric information (Theorem 3). The
proposed methodology leads to a sequential decomposition of stochastic dynamic games with
asymmetric information. This decomposition gives rise to a dynamic program that can be utilized
to compute SIB-PBEs via backward induction. We proceed by stating the following results from
the companion paper [2, Theorem 1].
Theorem 1 (Policy-independence belief property [2]).
(i) Consider a general strategy prediction profile g∗. If agents −i play according to strategy
predictions g∗−i, then for every strategy gi that agent i plays,
Pg∗,g−i(cid:110)
xt, p−i
t
(cid:111)
(cid:12)(cid:12)(cid:12)hi
t
= Pg∗−i(cid:110)
xt, p−i
t
(cid:111)
(cid:12)(cid:12)(cid:12)hi
t
.
(18)
(ii) Consider a SIB strategy prediction profile σ∗ along with the associated consistent update
rule ψ. If agents −i play according to SIB strategy predictions σ∗−i, then for every general
strategy gi that agent i plays,
Pσ∗−i,gi
ψ
xt, p−i
t
=Pσ∗−i
ψ
xt, p−i
t
.
(19)
(cid:110)
(cid:12)(cid:12)(cid:12)hi
(cid:111)
t
(cid:110)
(cid:12)(cid:12)(cid:12)hi
(cid:111)
t
Part (i) of Theorem 1 states that under perfect recall agent i's belief is independent of his
actual strategy gi. Therefore, agent i cannot mislead agents −i by deviating from the SIB strategy
prediction g∗i to a behavioral strategy gi so as to create dual beliefs (described above) that he
can use to his advantage. Part (ii) of Theorem 1 concerns situations where all agents except
agent i play SIB strategies σ∗−i. Given SIB update rule ψ that is consistent with σ∗, it states
that agent i's beliefs independent of his actual strategy gi. We note when agents −i play SIB
strategies the consistency condition for SIB update rule ψ depends on strategy prediction σ∗i
they have about agent i.
November 23, 2018
DRAFT
24
Using the result of Theorem 1, we show that agent i∈N does not gain by playing a non-SIB
strategy gi when all other agents −i are playing SIB strategies σ∗−i.
Theorem 2 (Closedness of SIB strategies). Consider a consistent SIB assessment (σ∗,γψ) where
ψ is a SIB update rule consistent with σ∗. If every agent j∈N , j(cid:54)= i plays the SIB strategy σ∗j,
then, there exists a SIB strategy σi for agent i that is a best response to σ∗−i.
The results of Theorems 1 and 2 address the two restrictions (discussed above) imposed in
SIB assessments on the agents' beliefs and strategies, respectively.
Based on these results, we restrict attention to SIB assessments, and provide a sequential
decomposition of dynamic games with asymmetric information. A SIB-PBE is SIB assessment
that is a fixed point under the best response map for all agents. Below, we formulate a dynamic
program that enables us to compute SIB-PBEs of dynamic games with asymmetric information.
Consider a dynamic program over time horizon T ∪{T + 1} with information state {Πt,St},
t ∈ T . Let Vt := {V i
: ∆(Xt × St) × St → R, i ∈ N} denote the value function that captures
the continuation payoffs for all agents, for all realizations of the SIB belief Πt and the agents'
T +1 = 0 for all i ∈ N . For each stage t ∈ T of
private sufficient information St, t ∈ T . Set V i
the dynamic program consider the following static game.
t
Stage game Gt(πt,Vt+1,ψt+1): Given the value function Vt+1 and SIB update rule ψt+1, we
define the stage game Gt(πt,Vt+1,ψt) as a static game of asymmetric information among agents
for every realization πt. Each agent i∈N has private information Si
t that is distributed according
to πt, which is common knowledge among the agents. Given a realization at of the agents'
collective action profile and a realization st of the agents' sufficient private information, agent
i's utility is given by
(cid:110)
(cid:12)(cid:12)(cid:12)πt,st,at
(cid:111)
t(at,st,πt,Vt+1,ψt+1) := Eπt
¯U i
ui
t(Xt,at)+V i
t+1 (ψt+1(πt,Zt+1),St+1)
.
(20)
BNE correspondence: We define the correspondence BNEt (Vt+1,ψt+1), t∈T , as the corre-
spondence mapping that characterizes the set of BNEs of the stage game Gt(πt,Vt+1,ψt+1) for
every realization of πt; this correspondence is given by
BNEt (Vt+1,ψt+1) :=(cid:8)σ∗
t :∀πt∈ ∆(Xt×St), σ(πt,·) is a BNE of Gt(πt,Vt+1,ψt+1)(cid:9).
(21)
We say σ∗(πt,·) is a BNE of the stage game Gt(πt,Vt+1,ψt) if for all agents i ∈ N , and for all
November 23, 2018
DRAFT
t∈S i
t,
si
σ∗i(πt,si
t)∈ arg max
α∈∆(Ai
t)
(cid:110)¯U i
Eπt
t((α,σ∗−i(πt,S−i
t )),St,πt,Vt+1,ψt+1)
(cid:12)(cid:12)(cid:12)πt,si
(cid:111)
t
.
25
(22)
(23)
(24)
(25)
(26)
Below, we provide a sequential decomposition of dynamic games with asymmetric information
using the stage game and the BNE correspondence defined above.
Theorem 3 (Sequential decomposition). A pair (σ∗,ψ) of a SIB strategy profile σ∗ and a SIB
update rule ψ (equivalently, a SIB assessment (σ∗,γψ)) is a SIB-PBE if (σ∗, ψ) solves the
following dynamic program:
for t = T +1:
for t ∈ T :
T +1(·) := 0
V i
∀ i ∈ N ;
t ∈ BNEt (Vt+1, ψt+1) ,
σ∗
ψt+1 is consistent with σ∗,
t (πt,st) :=Eσ∗
V i
(cid:110)¯U i
t
ψt+1
t((σ∗(πt,St)),St,πt,Vt+1,ψt+1)
, ∀i∈N.
(cid:12)(cid:12)(cid:12)πt,si
(cid:111)
t
VII. DISCUSSION
We showed that SIB assessments proposed in this chapter are rich enough to capture a set
of PBE. However, we would like to point out that the concept of SIB-PBE does not capture all
PBEs of a dynamic game in general. We elaborate on the relation between the of SIB-PBE and
PBE below. We argue that the set of SIB-PBEs are more plausible to arise as the information
asymmetry among the agents increases and the underlying system is dynamic.
We presented an approach to compress the agents' private and common information by
providing conditions sufficient to characterize the information that is relevant for decision making
purposes. Such information compression means that the agents do not incorporate into their
decision making processes their observations that are irrelevant to the continuation game. As
we show in [2], this information compression is without loss of generality for dynamic team
problems. However, this is not the case in dynamic games. In general, the set of SIB-PBEs
of a dynamic game is a subset of all PBEs of that game. This is because in a dynamic game
agents can incorporate their past irrelevant observations into their future decisions so as to create
November 23, 2018
DRAFT
26
rewards (resp. punishments) that incentivize the agents to play (resp. not play) specific actions
over time. By compressing the agents' private and common information in SIB assessments, we
do not capture such punishment/reward schemes that are based on past irrelevant observations.
Below, we present an example where there exists a PBE that cannot be captured as a SIB-PBE.
Consider a two-agent repeated game with T = 2 and a payoff matrix given in Table I. At
each stage, agent 1 chooses from {U,D}, and agent 2 chooses from {L,M,R}. We assume
that agents' actions are observable. Therefore, the agents have no private information, and the
sufficient private information and SIB belief are trivial. The stage game has two equilibria in
pure strategies given by (D,M ) and (U,R). Using the results of Theorem 3, we can characterize
four SIB-PBEs of the repeated game that correspond to the different combinations of the two
equilibria of the stage game as follows: (DD,MM ), (U U,RR), (DU,MR), and (UD,RM ).
However, there exists an another PBE of the repeated game that cannot be captured as a SIB-
PBE. Consider the following equilibrium: Play (U,L) at t = 1. If agent 2 plays L at t = 1 then
play (U,R); otherwise, play (D,M ) at t = 2. Note that agent 1's decision at t = 2 depends on
agent 2's action at t = 1, which is a payoff-irrelevant information since the two stages of the
game are independent. Nevertheless, agent 1 utilizes agent 2's action at t = 1, and punishes him
(agent 2) by playing D at t = 2 if he deviates from playing L at t = 1.
L
R
M
(0,2)
(1,2)
(2,10)
U (8,3)
D (0,1)
(0,0)
TABLE I: Payoff matrix
We would like to point out that there are instances of dynamic games with asymmetric
information, such as zero-sum dynamic games [32], where the equilibrium payoffs for the agents
are unique. In these games it is not possible to incorporate pay-off irrelevant information so as to
construct additional equilibria where the agents' payoffs are different from the ones corresponding
to SIB-PBEs; this is clearly the case for zero-sum games since the agents do not cooperate on
creating punishment/reward schemes due to the zero-sum nature of the game. In Section VIII,
we utilize this fact and prove the existence of SIB-PBEs in zero-sum games. Furthermore, we
show that SIB-PBEs are equivalent to PBEs, in terms of the agents' equilibrium payoffs, in these
games.
While it is true that in general, the set of PBEs of a dynamic game is larger than the set of
SIB-PBEs of that game, in the remainder of this section, we provide three reasons on why in
November 23, 2018
DRAFT
27
a highly dynamic environment with information asymmetry among agents, SIB-PBEs are more
plausible to arise as an outcome of a game.
First, we argue that in the face of a highly dynamic environment, an agent with partial
observations of the environment should not behave fundamentally different whether he interacts
in a strategic or cooperative environment. From the single-agent decision making point of view
(i.e. control theory), SIB strategies are the natural choice of an agent for decision making purposes
(See Thm. 2 in the companion paper [2]).7
Second, we argue that in a highly dynamic environment with information asymmetry among
the agents, the formation of punishment/reward schemes that utilize the agents' payoff-irrelevant
information requires prior complex agreements among the agents; these complex agreements are
sensitive to the parameters of the model and are not very plausible to arise in practice when
the decision making problem for each agent is itself a complex task. We note that the set of
PBEs that cannot be captured as SIB-PBEs are the ones that utilize payoff-irrelevant information
to create punishment/reward schemes in the continuation game as in the example above. How-
ever, such punishment/reward schemes require the agents to form a common agreement among
themselves on how to utilize such payoff-irrelevant information and how to implement such
punishment/reward schemes. The formation of such a common agreement among the agents
is more likely in games where the underlying system is not highly dynamic (as in repeated
games [7]) and there is no much information asymmetry among agents. However, in a highly
dynamic environment with information asymmetry among agents the formation of such common
agreement becomes less likely for the following reasons. First, in those environments each agent's
individual decision making process is described by a complex POMDP; thus, strategic agents
are less likely to form a prior common agreement (that depend on the solution of the individual
POMDPs) in addition to solving their individual POMDPs. Second, as the information asymmetry
increases among agents, punishment/reward schemes that utilize payoff-irrelevant information
require a complex agreement among the agents that is sensitive and not robust to changes in
the assumptions on the information structure of the game. For instance, consider the example
described above, but assume that agents observe imperfectly each others' actions at each stage
(Assumption 3). Let 1 − , ∈ (0,1), denote the probability that agents observe each others'
7The SIB approach proposed in this paper for dynamic games along with the SIB approach to dynamic teams proposed in the
companion paper [2] provide a unified approach to the study of agents' behavior in a dynamic environment with information
asymmetry among them.
November 23, 2018
DRAFT
28
actions perfectly, and denote the probability that their observation is different from the true
action of the other agent. Then, the described non-SIB strategy profile above remains as a PBE of
the game only if ≤ 1
5. The author of [33] provides a general result on the robustness of above-
mentioned punishment/reward schemes in repeated games; he shows that the set of equilibria
that are robust to changes in information structure that affect only payoff-irrelevant signals does
not include the set of equilibria that utilize punishment/reward schemes described above.
Third, the proposed notion of SIB-PBE can be viewed as a generalization of Markov Perfect
Equilibrium [3] to dynamic games with asymmetric information. Therefore, a similar set of
rationales that support the notion of MPE also applies to the notion of SIB-PBE as follows. First,
the set of SIB assessments describe the simplest form of strategies capturing the agents' behavior
that is consistent with the agents' rationality. Second, the class of SIB assessments captures the
notion that "bygones are bygones", which also underlies the requirement of subgame perfection
in equilibrium concepts for dynamic games. That is, the agents' strategies in two continuation
games that only differ in the agents' information about payoff-irrelevant events must be identical.
Third, the class of SIB assessments embodies the principle that "minor changes in the past should
have minor effects". This implies that if there exists a small perturbation in the specifications of
the game or the agents' past strategies that are irrelevant to the continuation game, the outcome
of the continuation game should not change drastically. The two-step example above presents
one such situation, where one equilibrium that is not SIB-PBE disappears suddenly as → 1
5.
VIII. EXISTENCE OF EQUILIBRIA
As we discussed in Section VII, there exist PBEs that cannot be described as SIB-PBEs in
general. Therefore, the standard results that guarantee the existence of a PBE for dynamic games
with asymmetric information [31, Proposition. 249.1] cannot be used to guarantee the existence
of a SIB-PBE in these games. In this Section, we discuss the existence of SIB-PBEs for dynamic
games with asymmetric information. We provide conditions that are sufficient to guarantee the
existence of SIB-PBEs (Lemmas 2 and 3). Using the result of Lemma 2, we prove the existence
of SIB-PBEs for zero-sum dynamic games with asymmetric information (Theorem 4). Using
the result of Lemma 3, we identify instances of non-zero-sum dynamic games with asymmetric
information where we can guarantee the existence of SIB-PBEs.
Lemma 2. The dynamic program given by (24)-(26) has at least one solution at stage t if the
value function Vt+1 is continuous in πt+1.
November 23, 2018
DRAFT
29
We note that the condition of Lemma 2 is always satisfied for t = T by definition of VT +1; see
(20) and (23). However, for t < T , it is not straightforward, in general, to prove the continuity
of the value function Vt in πt. Given Vt+1 is continuous in πt+1, the result of [34, Theorem 2]
implies that the set of equilibrium payoffs for the state game at t is upper-hemicontinuous in
πt. Therefore, if the stage game Gt(πt,Vt+1,ψt+1) has a unique equilibrium payoff for every πt,
we can show that Vt is continuous in πt for t < T . Using this approach, we prove the existence
of SIB-PBEs for zero-sum games below.
Theorem 4. For every dynamic zero-sum game with asymmetric information there exists a SIB-
PBE that is a solution to the dynamic program given by (24)-(26).
For dynamic non-zero-sum games, it is harder to establish that Vt is continuous in πt for t < T
since the set of equilibrium payoffs is not a singleton in general. However, we conjecture that
for every dynamic game with asymmetric information described in Section II, at every stage of
the corresponding dynamic program, it is possible to select a BNE for every realization of πt
so that the resulting Vt is continuous in πt.
In addition to the results of Lemma 2 and Theorem 4, we provide another condition below
that guarantees the existence of SIB-PBEs in some instances of dynamic games with asymmetric
information.
Lemma 3. A dynamic game with asymmetric information described in Section II has at least
such that the SIB update rule ψ1:T is
one SIB-PBE if there exits sufficient information S1:N
1:t
independent of σ∗.
The independence of SIB update rule from σ∗ is a condition that is not satisfied for all dynamic
games with asymmetric information. Nevertheless, we present below special instances where this
condition is satisfied.
1) Nested information structure with one controller [11]: Consider the nested information
structure case described in Section II. Assume that the evolution of the system is controlled only
by the uniformed player and is given by Xt+1 = ft(Xt,A2
t = 0, it is
easy to check that Pσ∗{πt+1πt,at} =P{πt+1πt,at} for all t∈T .
t = Xt and S2
t,Wt). For S1
2) Independent dynamics with observable actions and no private valuation [18]: Consider
the model with independent dynamics and observable actions described in Section II. Assume
that agent i's, i∈N , instantaneous utility is given by ui
t ) (no private valuation); that is,
t(At,X−i
November 23, 2018
DRAFT
agent i's utility at t does not depend on X i
information for agent i. Hence, the condition of Lemma 3 is trivially satisfied.
t. It is easy to verify that Si
t = ∅ is sufficient private
30
3) Delayed sharing information structure with d = 1 [35], [36]: Consider a delayed sharing
information structure where agents' actions and observations are revealed publicly with d time
step delay. When delay d = 1, we have P i
t . Then, it is easy to verify
that the condition of Lemma 3 is satisfied.
t}. Let Si
t ={Y i
t = Y i
t = P i
4) Uncontrolled state process with hidden actions: Consider an N-player game with
uncontrolled dynamics given by Xt+1 = ft(Xt, Wt), t ∈ T . At every time t ∈ T , agent i,
i ∈ N , receives a noisy observation Y i
t). The agents' actions are hidden. Thus,
1:t−1} and Ct = ∅. Hence, the condition of Lemma 3 is trivially satisfied. We note
t ={Y i
P i
that in the case where a subset of the agents' observations is revealed to all agents' with some
delay, i.e. Ct⊆{Y1:t}, the condition of Lemma 3 is also satisfied.
t = Oi
1:t, Ai
t(X i
t , Z i
IX. CONCLUSION
We proposed a general approach to study dynamic games with asymmetric information. We
presented a set of conditions sufficient to characterize an information state for each agent that
effectively compresses his common and private information in a mutually consistent manner.
Along with the results in the companion paper [2], we showed that the characterized information
state provides a sufficient statistic for decision making purposes in strategic and non-strategic
settings. We introduced the notion of Sufficient Information based Perfect Bayesian Equilibrium
that characterizes a set of outcomes in a dynamic game. We provided a sequential decomposition
of the dynamic game over time, which leads to a dynamic program for the computation of the
set of SIB-PBEs of the dynamic game. We determined conditions that guarantee the existence of
SIB-PBEs. Using these conditions, we proved the existence of SIB-PBE for dynamic zero-sum
games and for special instances of dynamic non-zero-sum games.
REFERENCES
[1] H. Tavafoghi, Y. Ouyang, and D. Teneketzis, "A sufficient information approach to decentralized decision making," in 57th
IEEE Conference on Decision and Control (CDC), 2018.
[2] H. Tavafoghi, Y. Ouyang, and D. Teneketzis, "A unified approach to dynamic multi-agent decision problems with
asymmetric information - part i: Non-strategic agents," working paper, 2018.
[3] E. Maskin and J. Tirole, "Markov perfect equilibrium: I. observable actions," Journal of Econonomic Theory, vol. 100,
no. 2, pp. 191 -- 219, 2001.
[4] S. Zamir, "Repeated games of incomplete information: Zero-sum," Handbook of Game Theory, vol. 1, pp. 109 -- 154, 1992.
November 23, 2018
DRAFT
31
[5] F. Forges, "Repeated games of incomplete information: non-zero-sum," Handbook of Game Theory, vol. 1, pp. 109 -- 154,
1992.
[6] R. Aumann, M. Maschler, and R. Stearns, Repeated games with incomplete information. MIT press, 1995.
[7] G. Mailath and L. Samuelson, Repeated Games and Reputations. Oxford university press Oxford, 2006.
[8] J. Horner, T. Sugaya, S. Takahashi, and N. Vieille, "Recursive methods in discounted stochastic games: An algorithm for
δ → 1 and a folk theorem," Econometrica, vol. 79, no. 4, pp. 1277 -- 1318, 2011.
[9] J. Escobar and J. Toikka, "Efficiency in games with Markovian private information," Econometrica, vol. 81, no. 5, pp. 1887 --
1934, 2013.
[10] T. Sugaya, "Efficiency in Markov games with incomplete and private information," working paper, 2012.
[11] J. Renault, "The value of Markov chain games with lack of information on one side," Math. Oper. Res., vol. 31, no. 3,
pp. 490 -- 512, 2006.
[12] P. Cardaliaguet, C. Rainer, D. Rosenberg, and N. Vieille, "Markov games with frequent actions and incomplete information-
the limit case," Mathematics of Operations Research, 2015.
[13] F. Gensbittel and J. Renault, "The value of Markov chain games with incomplete information on both sides," Mathematics
of Operations Research, vol. 40, no. 4, pp. 820 -- 841, 2015.
[14] L. Li, C. Langbort, and J. Shamma, "Solving two-player zero-sum repeated Bayesian games," arXiv preprint
arXiv:1703.01957, 2017.
[15] A. Nayyar, A. Gupta, C. Langbort, and T. Bas¸ar, "Common information based Markov perfect equilibria for stochastic
games with asymmetric information: Finite games," IEEE Transactions on Automatic Control, vol. 59, pp. 555 -- 570, March
2014.
[16] A. Gupta, A. Nayyar, C. Langbort, and T. Bas¸ar, "Common information based Markov perfect equilibria for linear-Gaussian
games with asymmetric information," SIAM J. Control Optim., vol. 52, no. 5, pp. 3228 -- 3260, 2014.
[17] Y. Ouyang, H. Tavafoghi, and D. Teneketzis, "Dynamic oligopoly games with private Markovian dynamics," in 54th IEEE
Conference on Decision and Control (CDC), 2015.
[18] Y. Ouyang, H. Tavafoghi, and D. Teneketzis, "Dynamic games with asymmetric information: Common information based
perfect Bayesian equilibria and sequential decomposition," IEEE Transactions on Automatic Control, 2017.
[19] D. Vasal and A. Anastasopoulos, "Signaling equilibria for dynamic LQG games with asymmetric information," in 55th
IEEE Conference on Decision and Control (CDC), pp. 6901 -- 6908, 2016.
[20] A. Sinha and A. Anastasopoulos, "Structured perfect Bayesian equilibrium in infinite horizon dynamic games with
asymmetric information," American Control Conference, 2016.
[21] A. Nayyar, A. Mahajan, and D. Teneketzis, "Optimal control strategies in delayed sharing information structures," IEEE
Transactions on Automatic Control, vol. 56, no. 7, pp. 1606 -- 1620, 2011.
[22] A. Nayyar, A. Mahajan, and D. Teneketzis, "Decentralized stochastic control with partial history sharing: A common
information approach," IEEE Transactions on Automatic Control, vol. 58, no. 7, pp. 1644 -- 1658, 2013.
[23] H. Tavafoghi and D. Teneketzis, "Dynamic market mechanisms for wind energy," arXiv:1608.04143, 2016.
[24] H. Tavafoghi, On Design and Analysis of Cyber-Physical Systems with Strategic Agents. PhD thesis, University of Michigan,
2017.
[25] J. Renault, "The value of repeated games with an informed controller," Mathematics of Operations Research, vol. 37,
no. 1, pp. 154 -- 179, 2012.
[26] L. Li and J. Shamma, "Efficient strategy computation in zero-sum asymmetric repeated games," arXiv preprint
arXiv:1703.01952, 2017.
November 23, 2018
DRAFT
32
[27] P. Battigalli, "Strategic independence and perfect Bayesian equilibria," Journal of Economic Theory, vol. 70, no. 1, pp. 201 --
234, 1996.
[28] R. Myerson and P. Reny, "Open sequential equilibria of multi-stage games with infinite sets of types and actions," working
paper, 2015.
[29] J. Watson, "Perfect Bayesian equilibrium: general definitions and illustrations," working paper, 2016.
[30] D. Fudenberg and J. Tirole, Game theory. 1991. Cambridge, Massachusetts, 1991.
[31] M. J. Osborne and A. Rubinstein, A Course in Game Theory. MIT press, 1994.
[32] S. Sorin, A First Course on Zero-sum Repeated Games, vol. 37. Springer Science & Business Media, 2002.
[33] D. Miller, "Robust collusion with private information," The Review of Economic Studies, vol. 79, no. 2, pp. 778 -- 811, 2012.
[34] P. Milgrom and R. Weber, "Distributional strategies for games with incomplete information," Mathematics of Operations
Research, vol. 10, no. 4, pp. 619 -- 632, 1985.
[35] T. Bas¸ar, "Two-criteria LQG decision problems with one-step delay observation sharing pattern," Information and Control,
vol. 38, no. 1, pp. 21 -- 50, 1978.
[36] T. Bas¸ar, "Decentralized multicriteria optimization of linear stochastic systems," IEEE Transactions on Automatic Control,
vol. 23, no. 2, pp. 233 -- 243, 1978.
[37] E. Hendon, H. Jacobsen, and B. Sloth, "The one-shot-deviation principle for sequential rationality," Games and Economic
Behavior, vol. 12, no. 2, pp. 274 -- 282, 1996.
[38] A. Nedich, "Optimization i," Lecture Notes, 2008.
[39] E. Ok, Real Analysis with Economic Applications, vol. 10. Princeton University Press, 2007.
[40] K. Border, Fixed point theorems with applications to economics and game theory. Cambridge university press, 1989.
[41] E. Einy, O. Haimanko, and B. Tumendemberel, "Continuity of the value and optimal strategies when common priors
change.," International Journal of Game Theory, vol. 41, no. 4, 2012.
APPENDIX
Proof of Lemma 1. For any given consistent SIB assessment (σ∗,γ), let g∗ denote the behavioral
strategy profile constructed according to (16). In the following, we construct recursively a belief
system µ that is consistent with g∗ and satisfies (17).
For t = 1, we have P i
1 = Y i
1 and C1 = Z1. Define
µi
t(hi
1)(x1, p−i
1 ) :=
.
(27)
(cid:80)
P{y1, z1x1}η(x1)
x1∈X1
1, z1x1}η(x1)
P{yi
For t > 1, if Pg∗
µi
t−1
{hi
thi
t−1} > 0 (i.e. no deviation from g∗
t−1 at t−1), define µi
t recursively by
Bayes' rule,
µi
t(hi
t)(xt, p−i
t ) :=
{hi
Pg∗
µi
t−1
Pg∗
µi
t−1
t, xt, p−i
{hi
thi
hi
t−1}
t−1}
t
.
(28)
November 23, 2018
DRAFT
For t > 1, if Pg∗
µi
t−1
{hi
thi
t−1} = 0 (i.e. there is a deviation from g∗
t−1 at t−1), define µi
t as,
µi
t(hi
t)(xt, p−i
t ) :=
Pt
St
(cid:80)
33
(29)
γt(ct)(xt, st)
γ(ct)(xt, s−i
t
,
, si
t)
s−i
t ∈S−i
t
where sj
t = ζ j
t (pj
t , ct; g∗
1:t−1) for all j ∈ N .
At t = 1, (17) holds by construction from (27). For t > 1,
Pg∗{S−i
Pg∗{si
t, ct} = Pg∗{S−i
pi
t} = Pg∗{S−i
hi
t, ct} =
si
Pg∗{S−i
t
t
t
t
tct}
, si
tct} =
(cid:80)
πt(S−i
s−i
t ∈S−i
t
t
, si
t)
πt(s−i
t
, si
t)
= P{S−i
t
t, πt}
si
where the second equality follows from (11). Therefore, (17) holds for all t ∈ T .
Lemma 4. [2, Lemma 2] Given a SIB strategy profile σ∗ and update rule ψ consistent with σ∗,
ψ {St+1,Πt+1pt, ct, at} =Pσ∗
Pσ∗
ψ {St+1,Πt+1st, πt, at}.
(30)
for all st, πt, at.
Proof of Theorem 2. Consider a "super dynamic system" as the collection of the original dy-
namic system along with agents −i who play according to SIB assessment (σ∗, γψ). This
superdynamic system captures the system agent i "sees". We establish the claim of Theorem 2
in two steps: (i) we show that from agent i's viewpoint the super dynamic system is a POMDP,
t} is an information state for agent i when he faces the super
and (ii) we show that {Πt, Si
1:T (·,·). Therefore, without loss of optimality, agent
dynamic system with the original utility ui
i can choose his optimal decision strategy (best response) from the class of strategies that are
functions of the information state {Πt, Si
t}, i.e. the class of SIB strategies.
To establish step (i), consider X :={Xt,Πt,St, Πt−1,St−1} as the system state at t for the super
t ,Zt}. To show that the
dynamic system. Agent i's observation at time t is given by Y i
super dynamic system is a POMDP, we need to show that it satisfies the following properties:
(a) it has a controlled Markovian dynamics, that is,
t := {Y i
ψ {xt+1x1:t, ai
Pσ∗
1:t} = Pσ∗−i
ψ
{xt+1xt, ai
t}, ∀t ∈ T ,
(31)
1:t, yi
(b) agent i's observation Y i
t is a function of system state Xt along with the previous action Ai
t−1,
November 23, 2018
DRAFT
that is,
ψ {yi
Pσ∗
tx1:t,ai
1:t−1, yi
1:t−1} = Pσ∗−i{yi
txt,ai
t−1}, ∀t ∈ T ,
34
(32)
(c) agent i's instantaneous utility at t ∈ T can be written as a function ut(xt,ai
Xt along with his action Ai
t) of system state
(cid:8)ui
t, that is,
t(Xt,At)x1:t,ai
Eσ∗
ψ
1:t, yi
1:t
(cid:9) = ut(xt,ai
t), ∀t ∈ T .
(33)
Property (a) is true because,
ψ {xt+1x1:t, ai
Pσ∗
(cid:88)
(cid:104)Pσ∗
(cid:88)
a−i
t ,zt+1,yt+1
a−i
t ,zt+1,yt+1
(cid:88)
(cid:104)P
1:t} = Pσ∗
ψ {xt+1,πt+1,st+1,πt,stx1:t,π1:t,s1:t,yi
1:t, yi
1:t,z1:t,ai
1:t}
=
ψ {xt+1,πt+1,st+1,a−i
Pσ∗
t ,zt+1,yt+1x1:t,π1:t,s1:t,yi
1:t}
1:t,z1:t,ai
by system dynamics (1) and (2)
=
ψ {πt+1,st+1x1:t,π1:t,s1:t,yi
1:t,z1:t,ai
1:t,a−i
P{zt+1,yt+1xt+1,at}P{xt+1xt,at}σ∗−i
Define Z := {zt+1 : πt+1 = ψt+1(πt, zt+1)} &
t+1, zt+1, aj
Y(zt+1) := {yt+1 : sj
t,{yj
t
t}),∀j}
t+1 = φj
t+1(sj
=
t ,xt+1,zt+1,yt+1}
(cid:105)
(πt,s−i
t )(a−i
t )
(cid:105)
ψ{πt+1,st+1st,πt,yt+1,xt+1,zt+1,at}P{yt+1,zt+1xt+1,at}P{xt+1xt,at}σ∗−i
t
(πt,s−i
t )(a−i
t )
a−i
t , zt+1 ∈ Z,
yt+1 ∈ Y(zt+1)
=
ψ {xt+1,πt+1,st+1xt,πt,st,ai
Pσ∗−i
t} = Pσ∗−i
ψ {xt+1xt,ai
t}.
November 23, 2018
DRAFT
Property (b) is true because
35
ψ {yi
Pσ∗
1:t−1, yi
1:t−1} = Pσ∗
ψ {yi
t,ztx1:t,π1:t,s1:t,yi
1:t−1,z1:t−1,ai
1:t−1}
tx1:t,ai
(cid:88)
a−i
t−1
(cid:104)Pσ∗
(cid:88)
ψ {yi
a−i
t−1
=
ψ {yi
Pσ∗
t,zt,a−i
t−1x1:t,π1:t,s1:t,yi
1:t−1,z1:t−1,ai
1:t−1}
=
1:t−1,z1:t−1,ai
1:t−1,a−i
t−1}σ∗−i
t
(πt−1,st−1)(a−i
t−1)
(cid:105)
t,ztx1:t,π1:t,s1:t,yi
(cid:88)
P{yi
t,ztxt,ai
a−i
t−1
by system dynamics (2)
=
t−1}σ∗−i
t−1,a−i
t
(πt−1,st−1)(a−i
t−1)
Property (c) is true because
ψ {yi
txt,ai
t−1}.
=
t,ztxt,πt−1,st−1,ai
t−1} = Pσ∗
(cid:9)
t(Xt,At)x1:t,ai
1:t,yi
1:t
1:t,yi
1:t
t(Xt,At)xt,πt,st,x1:t−1,ai
t(Xt,(ai
t,σ∗−i(πt,s−i
t,σ∗−i(πt,s−i
t ))) := ut(xt,ai
t)
Pσ∗−i{yi
ψ
(cid:8)ui
(cid:8)ui
(cid:8)ui
Eσ∗
=Eσ∗
=Eσ∗−i
ψ
ψ
= ui
t(xt,(ai
(cid:9)
t )))xt,πt,st,x1:t−1,ai
1:t,yi
1:t
(cid:9)
To establish step (ii), that is, to show that {Πt,Si
t} is an information state for agent i when
he interacts with the superdynamic system defined above based on SIB assessment (σ∗, γψ), we
need to prove: (1) it can be updated recursively at t, i.e. it can be determined using {Πt−1,Si
t−1}
and {Y i
t} ={Y i
t} is
t ,Zt,Ai
t,Ai
independent of H i
t and his actual strategy gi; and (3) it is sufficient to evaluate the agent i's
instantaneous utility at t for every action ai
t}; (2) agent i's belief about {Πt+1,Si
t+1} conditioned on {Πt,Si
t, for all t∈T .
t∈Ai
t ,Ai
Condition (1) is satisfied since Πt = ψt(Πt−1,Zt) and Si
t = φt(Si
t−1,{Y i
t ,Zt,Ai
t}) for t ∈ T \{1};
see part (i) of Definition 4 and (15).
November 23, 2018
DRAFT
To prove condition (2), let
t (ct)),
for all j ∈ N and t ∈ T . Then condition (2) is satisfied since
t ) = σ
∗j
t (hj
g
∗j
t (l(hj
t ), γψ
(cid:88)
t,ai
t} =
h−i
t ,a−i
t
ψ{si
Pσ∗
t+1,πt+1,h−i
t ,a−i
t hi
t}
t,ai
by Theorem 1 and (34)
=
t+1,πt+1ht,at}Pg∗−i{h−i
t hi
t}g∗−i
t
(h−i
t )(a−i
t )
ψ {si
t+1,πt+1hi
Pσ∗
(cid:88)
(cid:88)
ψ{si
Pσ∗
h−i
t ,a−i
t
ψ{si
Pσ∗
t ,s−i
t+1
h−i
t ,a−i
h−i
t ,a−i
(cid:88)
(cid:88)
(cid:88)
s−i
t ,a−i
=
t+1,πt+1,s−i
t+1ht,at}Pg∗−i{h−i
t hi
t}g∗−i
t
(h−i
t )(a−i
t )
by Lemma 4 and s−i
t = ζ−i
; g∗
1:t−1) (see Definition 4)
t (h−i
=
t
ψ{st+1,πt+1st,πt,at}Pg∗−i{s−i
Pσ∗
t ,s−i
t+1
t hi
t}g∗−i
t
(h−i
t )(a−i
t )
by part (ii) of Lemma 1
=
ψ{st+1,πt+1st,πt,at}P{s−i
t si
Pσ∗
t ,s−i
t+1
t,πt}g∗−i
t
(h−i
t )(a−i
t )
by (34)
=
ψ{si
Pσ∗
t ,s−i
t+1
h−i
t ,a−i
t+1,πt+1,s−i
t+1ht,at}P{s−i
t si
t,πt}σ∗−i
t
(πt,s−i
t )(a−i
t )
=
ψ{si
Pσ∗
t+1,πt+1si
t}.
t,πt,ai
.
To prove condition (3), we need to show that for all ai
Eg∗−i{ut
i(Xt,A−i
t ,ai
t)hi
t} =Eg∗−i{ut
t},
t)πt,si
t ∈ Ai
t,
i(Xt,A−i
t ,ai
for all hi
t, πt, si
t, t ∈ T .
November 23, 2018
36
(34)
(35)
DRAFT
By Lemma 1,
Pg∗−i{s−i
t
t} = P{s−i
hi
t
t}.
πt, si
Setting πt = γψ(ct), and A−i
ψ {ui
Eσ∗
t
ψ
t ,ai
t)hi
t = σ∗−i(πt, S−i
t ),
t} =Eσ∗
ψ {ui
t(Xt,σ∗−i
t(Xt,σ∗−i
t(Xt,σ∗−i
t(Xt,σ∗−i
(πt,S−i
(cid:110)Eσ∗−i{ui
(cid:110)Eσ∗−i{ui
(cid:110)Eσ∗−i{ui
(cid:110)Eσ∗−i{ui
t(Xt,A−i
= Eσ∗
= Eσ∗
= Eσ∗−i
= Eσ∗−i
= Eσ∗−i
t(Xt,σ∗−i
ψ {ui
ψ
ψ
ψ
t
t
t
t
t
t}(cid:12)(cid:12)(cid:12)hi
(cid:111)
t,ct}(cid:12)(cid:12)(cid:12)hi
(cid:111)
t,ct}(cid:12)(cid:12)(cid:12)hi
(cid:111)
t}(cid:12)(cid:12)(cid:12)hi
(cid:111)
t
t
t
t ),ai
t)hi
t}
i,hi
t ,πt,st
t
t(Xt,σ∗−i
(πt,S−i
t)S−i
(πt,S−i
t ),ai
t)S−i
(πt,S−i
t ),ai
t ,πt,si
t)S−i
(πt,S−i
t)S−i
(πt,S−i
t ),ai
t)πt,si
t}.
(πt,S−i
t = σ∗−i
t ),ai
t ),ai
t ,πt,si
t ,πt,si
37
(36)
(37)
The first equality above is by substituting A−i
t ). The second equality follows
from the smoothing property of conditional expectation. The third equality holds by condition
(iii) of Definition 4. The fourth equality follows from Theorem 1 since S−i
is a function of H−i
.
The fifth equality holds since for every xt, st, πt, ct,
t
t
t
P{xtst,πt,ct} =
P{xt,stπt,ct}
P{st,πt,ct} =
πt(xt,st)
πt(xt,st)
xt
= P{xtst,πt}.
(cid:80)
The last equality is true by (36). By (37) we prove condition (3) for {Πt,Si
state, and thus establish the result of Theorem 2.
t} to be an information
Proof of Theorem 3. Let (σ∗,ψ) denote a solution of the dynamic program. We note that the SIB
update rule ψ is consistent with σ∗ by requirement (25). Therefore, we only need to show that
the SIB assessment (σ∗,ψ) is sequentially rational. To prove it, we use the one-shot deviation
principle for dynamic games with asymmetric information [37]. To state the one-shot deviation,
we need the following definitions.
Definition 7 (One-shot deviation). We say gi is a one-shot deviation from g∗i if there exists a
unique hi
Definition 8 (Profitable one-shot deviation). Consider an assessment (g∗,µ). We say gi is a
profitable one-shot deviation for agent i if gi is a one-shot deviation from g∗i at hi
t such that
t∈ Hi such that gi
τ) for all hi
τ)(cid:54)= g∗i
τ ∈ Hi.
t)(cid:54)= g∗i
t), and gi
τ (cid:54)= hi
t, hi
t (hi
τ (hi
τ(hi
t(hi
November 23, 2018
DRAFT
t)(cid:54)= g∗i
gi
t(hi
t (hi
t), and
(cid:41)
(cid:12)(cid:12)(cid:12)hi
t
ui
τ(Xτ,Aτ)
(cid:40) T(cid:88)
>E(g∗−i,g∗i)
µ
τ =t
38
(cid:41)
(cid:12)(cid:12)(cid:12)hi
t
ui
τ(Xτ,Aτ)
(cid:40) T(cid:88)
τ =t
E(g∗−i,gi)
µ
One-shot deviation principle [37]: A consistent assessment (g∗,µ) is a PBE if and only if
there exists no agent that has a profitable one-shot deviation.
Below, we show that the consistent SIB assessment (σ∗,ψ) satisfies the sequential rationality
condition using the one-shot deviation principle.
Consider an arbitrary agent i∈ N , time t∈ T , and history realization hi
t. Agent i has a
profitable one-shot deviation at hi
t only if
σ∗i
t (πt,si
t) /∈ arg max
Eσ∗
t)∈∆(Ai
t)
gi
t(hi
π
t((σ∗(πt,St)),St,πt,Vt+1,ψt+1)
Given (πt,Vt+1,ψt+1,σ∗
t ), the expected value of the function ¯U i
t, agent i's belief about S−i
given hi
function of si
about S−i
maximization problem above can be written as a function of πt and si
t(πt,si
σi
t is only a function of si
t conditioned on hi
t is only a
t). Agent i's belief
t and πt (see (17)). Therefore, any solution to the
t, that is, it is a SIB strategy
t) for agent i. Consequently, agent i has a profitable one-shot deviation only if
, as well as agent i's strategy gi
t(hi
t
t
σ∗i
t (πt,si
t) /∈ arg max
Eσ∗
t)∈∆(Ai
t)
σi
t(πt,si
π
t((σ∗(πt,St)),St,πt,Vt+1,ψt+1)
By (24), σ∗
t is BNE of the stage game Gt(πt, Vt+1, ψt+1) at t (see also (21)), i.e.
σ∗i
t (πt,si
t)∈ arg max
Eσ∗
t)∈∆(Ai
t)
σi
t(πt,si
π
t((σ∗(πt,St)),St,πt,Vt+1,ψt+1)
t (πt,si
t) at hi
Consequently, there exists no profitable deviation from σ∗i
t. Therefore, there exists
no agent that has a profitable one-shot deviation. Hence, by one-shot deviation principle, the
consistent SIB assessment (σ∗,ψ) is sequentially rational, and thus, it is a SIB-PBE.
Proof of Lemma 2. We prove below that if Vt+1(·,st+1) is continuous in πt+1, then the dynamic
program has a solution at stage t, t ∈ T ; that is, there exists at least one σ∗
t ∈
BNEt(Vt+1,ψt+1), where ψt+1 is consistent with σ∗
t .
For every πt, define a perturbation of the stage game Gt(πt,Vt+1,ψt+1) by restricting the set of
strategies of each agent to mixed strategies that assign probability of at least > 0 to every action
t ∈ Ai
t of agent i ∈ N ; for every agent i ∈ N we denote this class of -restricted strategies by
ai
t such that σ∗
November 23, 2018
DRAFT
(cid:110)¯U i
(cid:110)¯U i
(cid:110)¯U i
t∈ Hi
(cid:12)(cid:12)(cid:12)hi
(cid:111)
.
t
t
(cid:12)(cid:12)(cid:12)πt,si
(cid:111)
(cid:12)(cid:12)(cid:12)πt,si
(cid:111)
t
.
.
update rule ψ
t ∈ Σ
∗,
σ
(see (12))
(cid:40)
t := Σ1,
t and Σ
Σi,
perturbed stage game has an equilibrium σ
t ×. . .×ΣN,
t
. In the following we prove that, for every > 0, the corresponding
∗,
t
along with a consistent update rule ψ
t+1.
39
We note that when the agents' equilibrium strategies are perfectly mixed strategies, then the
t+1 is completely determined via Bayes' rule. Therefore, for every strategy profile
t+1 := βt+1(σ∗,), where βt+1(σ∗,) is Bayes' rule where σ∗, is utilized
t we can write ψ
For every agent i ∈ N , define a best response correspondence BRi,
: Σ
t
t
⇒ Σi,
BRi,
t (σ
∗,
t ) :=
t ∈ Σi,
σi
t : σi
t(πt,si
Eσ
∗−i,
t
,σi,
t{¯U i
t(At,St,πt,Vt+1,βt+1(σ
t ))si
∗,
t)∈ arg max
t ∈Σi,
σi,
t
t as
(cid:41)
t,πt},∀πt,si
t
, (38)
which determines the set of all agent i's best responses within the class of -restricted strategies
assuming that agents −i are playing σ
and the update rule ψ
t+1 = βt+1(σ
∗−i,
t
∗,
t ).
For every i∈N and σ∗,∈ Σ
t, we prove below that BRi,
t (σ
∗,
t ) is non-empty, convex, closed,
and upper hemicontinuous.
We note that
t(At,St,πt,Vt+1,βt+1(σ
∗,
t ,σi,
t {¯U i
Eσ
∗−i,
t
,Ai
t=ai
t{¯U i
t ))si
∗,
t,πt}
t ))si
∗,
t(At,St,πt,Vt+1,βt+1(σ
t,πt}σi,
t (πt,si
t)(ai
t)
Eσ
(cid:88)
(cid:88)
ai
t
=
=
U
∗,
πt,si
t
(ai
t)σi,
t (πt,si
t)(ai
t),
ai
t
where
Therefore, for every πt,si
t, we have
U σ∗,
πt,si
t
t) :=Eσ
(ai
∗−i,
t
,Ai
t=ai
t{¯U i
t(At,St,πt,Vt+1,βt+1(σ
t ))si
∗,
t,πt}.
(cid:88)
ai
t
U σ∗,
πt,si
t
(ai
t)α(ai
t).
σi,
t (πt,si
arg max
α∈∆(Ai
t):α(ai
t)≥,∀ai
t
t) ∈
(cid:80)
U σ∗,
πt,si
t
t
ai
t
t):α(ai
t)α(ai
t)≥,∀ai
We note that maxα∈∆(Ai
(ai
of [38], the set of agent i's best responses BRi,
in πt+1 then Vt+1 is continuous in agent i's strategy σi
is continuous in agent i's strategy σi
strategy σi
t) is a linear program, thus, by Theorem 16
∗,
t ) is closed and convex. If Vt+1 is continuous
t. Moreover, the instantaneous utility ui
t , given by (20), is continuous in agent i'
t. Therefore, by the maximum theorem [39] the set of i's best responses in upper
t. Therefore, ¯U i
t (σ
t
November 23, 2018
DRAFT
∗,
hemicontinuous in σ
t
and non-empty.
Consequently, we establish that for every i ∈ N , BRi,
40
∗,
t ) is closed, convex, upper hemi-
t :=×i∈N BRi,
t where× denotes
t (σ
t. Define BR
t(σ
t (σ
t ∈ Σ
∗,
continuous, and non-empty for every σ
the Cartesian product. The correspondence BR
t since BRi,
and non-empty for every σ
and non-empty for every σ
[40, Corollary 15.3], the correspondence BR
game has an equilibrium σ
t ∈ Σ
∗,
t ∈ Σi,
∗i,
t
∗,
t
∗,
t ) is closed, convex, upper hemicontinuous,
∗,
t ) is closed, convex, upper hemicontinuous,
for all i∈N . Therefore, by Kakutani's fixed-point theorem
t has a fixed point. Therefore, every perturbed stage
along with a consistent update rule ψt+1 = βt+1(σ
∗,
t ).
Now consider the sequence of these perturbed games when → 0. Since the set of agents'
strategies is compact, there exists a subsequence of these perturbed games whose equilibrium
∗,
strategies converge, say to σ∗
t ). We
∗,
note that ψ∗
. We
t
show below that for every agent i ∈ N , σ∗i
t+1 when he
chooses his strategy from the unconstrained class of SIB strategies.
t(σ∗
t+1 denote the convergence point of βt+1(σ
∗,
t ) (i.e. Bayes' rule) is continuous in σ
As we proved above, the set of agent i's best responses BRi
is a best response for him given Vt+1,ψ∗
t+1 is consistent with σ∗
t . Similarly let ψ∗
t since βt+1(σ
t
t ) is upper hemicontinuous
t (πt,·) is also a best response for agent i in the stage game
t ∈ BNEt(Vt+1, ψ∗
t+1 is consistent with σ∗
t .
t+1) where ψ∗
and closed given ψ∗
Gt(πt,Vt+1,ψ∗
t+1. Therefore, σ∗
t+1). Consequently, σ∗
Proof of Theorem 4. We have a Bayesian zero-sum game with finite state and action spaces.
By [41, Theorem 1] the equilibrium payoff is a continuous function of the agents' common
prior/belief. Using this result, we prove, by backward induction, that every stage of the dynamic
program described by (24)-(26), has a solution and Vt is continuous in πt for all t.
For t = T +1 the dynamic program has a solution trivially since the agents have utility for
time less than or equal to T . Moreover, VT +1(.,.) = 0 is trivially continuous in πT +1.
For t≤ T , assume that Vt+1 is continuous in πt+1. Then, by Lemma 2 the dynamic program
has a solution at t. We note that the continuation game from t to T is a dynamic zero-sum
game with finite state and actions spaces. Therefore, as we argued above, by [41, Theorem 1]
the agents' equilibrium payoff at t (i.e. Vt) is unique and is continuous in the agents' common
prior given by πt.
Therefore, by induction we establish the assertion of Theorem 4.
Proof of Lemma 3. Assume that ψ1:T is independent of σ. Then, the evolution of Πt is in-
dependent of σ∗ and known a priori. As a result, we can ignore the consistency condition
November 23, 2018
DRAFT
41
(25) in the dynamic program. Given ψt+1, the stage game Gt(πt,Vt+1,ψt+1) is a static game of
incomplete information with finite actions (given by A1:N
) for
every πt. Therefore, by the standard existence results for finite games [30, Theorem 1.1], there
exists an equilibrium for the stage game BNEt(Vt+1,ψt+1). Consequently, the correspondence
BNEt(Vt+1,ψt+1) is non-empty for every t ∈ T , thus, the dynamic programming given by (24-
26) has a solution.
) and finite types (given by S 1:N
t
t
November 23, 2018
DRAFT
|
1011.5914 | 1 | 1011 | 2010-11-26T21:17:31 | Static and Expanding Grid Coverage with Ant Robots : Complexity Results | [
"cs.MA"
] | In this paper we study the strengths and limitations of collaborative teams of simple agents. In particular, we discuss the efficient use of "ant robots" for covering a connected region on the Z^{2} grid, whose area is unknown in advance, and which expands at a given rate, where $n$ is the initial size of the connected region.
We show that regardless of the algorithm used, and the robots' hardware and software specifications, the minimal number of robots required in order for such coverage to be possible is \Omega({\sqrt{n}}).
In addition, we show that when the region expands at a sufficiently slow rate, a team of \Theta(\sqrt{n}) robots could cover it in at most O(n^{2} \ln n) time.
This completion time can even be achieved by myopic robots, with no ability to directly communicate with each other, and where each robot is equipped with a memory of size O(1) bits w.r.t the size of the region (therefore, the robots cannot maintain maps of the terrain, nor plan complete paths).
Regarding the coverage of non-expanding regions in the grid, we improve the current best known result of O(n^{2}) by demonstrating an algorithm that guarantees such a coverage with completion time of O(\frac{1}{k} n^{1.5} + n) in the worst case, and faster for shapes of perimeter length which is shorter than O(n). | cs.MA | cs |
Static and Expanding Grid Coverage with Ant Robots :
Complexity Results
Yaniv Altshulera,b,∗, Alfred M. Brucksteina
aTechnion -- Israel Institute of Technology, Technion City, Haifa 32000, Israel
bDeutsche Telekom Laboratories, Ben Gurion University of the Negev, POB 653, Beer
Sheva 84105, Israel
Abstract
In this paper we study the strengths and limitations of collaborative teams
of simple agents. In particular, we discuss the efficient use of "ant robots"
for covering a connected region on the Z2 grid, whose area is unknown in
advance, and which expands at a given rate, where n is the initial size of the
connected region. We show that regardless of the algorithm used, and the
robots' hardware and software specifications, the minimal number of robots
required in order for such coverage to be possible is Ω(√n).
we show that when the region expands at a sufficiently slow rate, a team
of Θ(√n) robots could cover it in at most O(n2 ln n) time. This completion
time can even be achieved by myopic robots, with no ability to directly
In addition,
communicate with each other, and where each robot is equipped with a
memory of size O(1) bits w.r.t the size of the region (therefore, the robots
cannot maintain maps of the terrain, nor plan complete paths). Regarding
∗Corresponding Author (Tel : +972.544.950093 Fax : +972.153.544.950093)
Email addresses: [email protected] (Yaniv Altshuler),
[email protected] (Alfred M. Bruckstein)
URL: www.cs.technion.ac.il/~yanival (Yaniv Altshuler),
www.cs.technion.ac.il/~freddy (Alfred M. Bruckstein)
Preprint submitted to Theory of Computer Science
September 27, 2018
the coverage of non-expanding regions in the grid, we improve the current
best known result of O(n2) by demonstrating an algorithm that guarantees
such a coverage with completion time of O( 1
k n1.5 + n) in the worst case, and
faster for shapes of perimeter length which is shorter than O(n).
Keywords: Collaborative Cleaning, Collaborative Search, Decentralized
Systems, Grid Search, Expanding Domains
1. Introduction
Motivation. In nature, ants, bees or birds often cooperate to achieve com-
mon goals and exhibit amazing feats of swarming behavior and collaborative
problem solving. It seems that these animals are "programmed" to interact
locally in such a way that the desired global behavior will emerge even if
some individuals of the colony die or fail to carry out their task for some
other reasons. It is suggested to consider a similar approach to coordinate
a group of robots without a central supervisor, by using only local interac-
tions between the robots. When this decentralized approach is used much of
the communication overhead (characteristic to centralized systems) is saved,
the hardware of the robots can be fairly simple, and better modularity is
achieved. A properly designed system should be readily scalable, achieving
reliability and robustness through redundancy.
Multi-Agent Robotics and Swarm Robotics. Significant research effort
has been invested during the last few years in design and simulation of multi-
agent robotics and intelligent swarm systems, e.g. (1 -- 3).
Swarm based robotic systems can generally be defined as highly decentral-
ized collectives, i.e. groups of extremely simple robotic agents, with limited
2
communication, computation and sensing abilities, designed to be deployed
together in order to accomplish various tasks.
Tasks that have been of particular interest to researchers in recent years
include synergetic mission planning (4, 5), patrolling (6, 7), fault-tolerant
cooperation (8, 9), network security (10), swarm control (11, 12), design of
mission plans (13, 14), role assignment (15 -- 17), multi-robot path planning
(7, 18, 19), traffic control (20, 21), formation generation (22 -- 24), formation
keeping (25, 26), exploration and mapping (27 -- 29), target tracking (30, 31)
and distributed search, intruder detection and surveillance (32, 33).
Unfortunately, the mathematical / geometrical theory of such multi agent
systems is far from being satisfactory, as pointed out in (34 -- 37) and many
other papers.
Multi Robotics in Dynamic Environments. The vast majority of the
works mentioned above discuss challenges involving a multi agent system
operating on static domains. Such models, however, are often too limited
to capture "real world" problems which, in many cases, involve external ele-
ment, which may influence their environment, activities and goals. Designing
robotic agents that can operate in such environments presents a variety of
mathematical challenges.
The main difference between algorithms designed for static environments
and algorithms designed to work in dynamic environments is the fact that the
agents' knowledge base (either central or decentralized) becomes unreliable,
due to the changes that take place in the environment. Task allocation,
cellular decomposition, domain learning and other approaches often used by
multi agents systems -- all become impractical, at least to some extent.
3
Hence, the agents' behavior must ensure that the agents generate a desired
effect, regardless the changing environment.
One example is the use of multi agents for distributed search. While many
works discuss search after "idle targets", recent works considered dynamic
targets, meaning targets which while being searched for by the searching
robots, respond by performing various evasive maneuvers intended to pre-
vent their interception. This problem, dating back to World War II opera-
tions research (see e.g. (38, 39)), requires the robotic agents to cope with
a search area that expands while scanned. The first documented example
for search in dynamic domains discussed a planar search problem, consider-
ing the scanning of a corridor between parallel borders. This problem was
solved in (40) in order to determine optimal strategies for aircraft searching
for moving ships in a channel.
A similar problem was presented in (41), where a system consisting of a
swarm of UAVs (Unmanned Air Vehicles) was designed to search for one or
more "smart targets" (representing for example enemy units, or alternatively
a lost friendly unit which should be found and rescued). In this problem the
objective of the UAVs is to find the targets in the shortest time possible.
While the swarm comprises relatively simple UAVs, lacking prior knowledge
of the initial positions of the targets, the targets are assumed to be adversar-
ial and equipped with strong sensors, capable of telling the locations of the
UAVs from very long distances. The search strategy suggested in (41) defines
flying patterns for the UAVs to follow, designed for scanning the (rectangu-
lar) area in such a way that the targets cannot re-enter areas which were
already scanned by the swarm without being detected. This problem was
4
further discussed in (42), where an improved decentralized search strategy
was discussed, demonstrating nearly optimal completion time, compared to
the theoretical optimum achievable by any search algorithm.
Collaborative Coverage of Expanding Domains. In this paper we shall
examine a problem in which a group of ant-like robotic agents must cover an
unknown region in the grid, that possibly expands over time. This problem
is also strongly related to the problem of distributed search after mobile
and evading target(s) (42 -- 44) or the problems discussed under the names of
"Cops and Robbers" or "Lions and Men" pursuits (45 -- 48).
We analyze such issues using the results presented in (49 -- 51), concerning
the Cooperative Cleaners problem, a problem that assumes a regular grid
of connected 'pixels' / 'tiles' / 'squares' / 'rooms', part of which are 'dirty',
the 'dirty' pixels forming a connected region of the grid. On this dirty grid
region several agents move, each having the ability to 'clean' the place (the
'room', 'tile', 'pixel' or 'square') it is located in.
In the dynamic variant
of this problem a deterministic evolution of the environment in assumed,
simulating a spreading contamination (or spreading fire). In the spirit of (52)
we consider simple robots with only a bounded amount of memory (i.e. finite-
state-machines).
First, we discuss the collaborative coverage of static grids. We demon-
strate that the best completion time known to date (O(n2), achievable for
example using the LRTA* search algorithm (53)) can be improved to guar-
antee grid coverage in O( 1
k n1.5 + n).
Later, we discuss the problem of covering an expanding domain, namely --
a region in which "covered" tiles that are adjacent to "uncovered" tiles be-
5
come "uncovered" every once in a while. Note that the grid is infinite, namely
although initial size of the region is n, it can become much greater over time.
We show that using any conceivable algorithm, and using as sophisticated
and potent robotic agents as possible, the minimal number of robots below
which covering such a region is impossible equals Ω(√n). We then show
that when the region expands sufficiently slow, specifically -- every O( c0
)
γ1
time steps (where c0 is the circumference of the region and where γ1 is a
geometric property of the region, which ranges between O(1) and O(ln n)),
a group of Θ(√n) robots can successfully cover the region. Furthermore, we
demonstrate that in this case a cover time of O(n2 ln n) can be guaranteed.
These results are the first analytic results ever concerning the complexity
of the number of robots required to cover an expanding grid, as well as for
the time such a coverage requires.
2. Related Work
In general, most of the techniques used for the task of a distributed cov-
erage use some sort of cellular decomposition. For example, in (54) the area
to be covered is divided between the agents based on their relative locations.
In (55) a different decomposition method is being used, which is analytically
shown to guarantee a complete coverage of the area. Another interesting
work is presented in (56), discussing two methods for cooperative coverage
(one probabilistic and the other based on an exact cellular decomposition).
All of the works mentioned above, however, rely on the assumption that
the cellular decomposition of the area is possible. This in turn, requires the
use of memory resources, used for storing the dynamic map generated, the
6
boundaries of the cells, etc'. As the initial size and geometric features of the
area are generally not assumed to be known in advance, agents equipped with
merely a constant amount of memory will not be able to use such algorithms.
Surprisingly, while some existing works concerning distributed (and de-
centralized) coverage present analytic proofs for the ability of the system
to guarantee the completion of the task (for example, in (55 -- 57)), most of
them lack analytic bounds for the coverage time (although in many cases an
extensive amount of empirical results of this nature are made available by
extensive simulations).
An interesting work discussing a decentralized coverage of terrains is pre-
sented in (58). This work examines domains with non-uniform traversability.
Completion times are given for the proposed algorithm, which is a general-
ization of the forest search algorithm (59). In this work, though, the region
to be searched is assumed to be known in advance -- a crucial assumption
for the search algorithm, which relies on a cell-decomposition procedure.
A search for analytic results concerning the completion time of ant-robots
covering an area in the grid revealed only a handful of works. The main result
in this regard is that of (60, 61), where a swarm of ant-like robots is used
for repeatedly covering an unknown area, using a real time search method
called node counting. By using this method, the robots are shown to be able
to efficiently perform such a coverage mission (using integer markers that are
placed on the graph's nodes), and analytic bounds for the coverage time are
discussed. Based on a more general result for strongly connected undirected
graphs shown in (62, 63), the cover time of teams of ant robots (of a given
size) that use node counting is shown to be tk(n) = O(n√n), when tk(n) the
7
cover time of a region of size n using k robots. It should be mentioned though,
that in (60) the authors clearly state that it is their belief that the coverage
time for robots using node counting in grids is much smaller. This evaluation
is also demonstrated experimentally. However, no analytic evidence for this
was available thus far.
Another algorithm to be mentioned in this scope is the LRTA* search
algorithm. This algorithm was first introduced in (53) and its multi-robotics
variant is shown in (62) to guarantee cover time of undirected connected
graphs in polynomial time. Specifically, on grids this algorithm is shown to
guarantee coverage in O(n2) time (again, using integer markers).
Vertex-Ant-Walk, a variant of the node counting algorithm is presented in
(64), is shown to achieve a coverage time of O(nδG), where δG is the graph's
diameter. Specifically, the cover time of regions in the grid is expected to be
O(n2) (however for various "round" regions, a cover time of approximately
O(n1.5) can be achieved). This work is based on a previous work in which a
cover time of O(n2δG) was demonstrated (65).
Another work called Exploration as Graph Construction, provides a cov-
erage of degree bounded graphs in O(n2) time, can be found in (66). Here a
group of limited ant robots explore an unknown graph using special "mark-
ers".
Interestingly, a similar performance can be obtained by using the simplest
algorithm for multi robots navigation, namely -- random walk. Although in
general undirected graphs a group of k random walking robots may require
up to O(n3) time, in degree bounded undirected graphs such robots would
achieve a much faster covering, and more precisely, O(cid:16)E2log3n
k2
(cid:17) (67). For
8
regular graphs or degree bounded planar graphs a coverage time of O(n2)
can be achieved (68), although in such case there is also a lower bound for
the coverage time, which equals Ω(n(log n)2) (69).
We next show that the problem of collaborative coverage in static grid do-
mains can be completed in O( 1
k n1.5 + n) time and that collaborative coverage
of dynamic grid domains can be achieved in O(n2 ln n).
3. The Dynamic Cooperative Cleaners Problem
Following is a short summary of the Cooperative Cleaners problem, as
appears in (49) (static variant) and (50, 51) (dynamic variant).
We shall assume that the time is discrete. Let the undirected graph
G(V, E) denote a two dimensional integer grid Z2, whose vertices (or "tiles")
have a binary property called 'contamination'. Let contt(v) state the con-
tamination state of the tile v at time t, taking either the value "on" or
"off ". Let Ft be the contaminated sub-graph of G at time t, i.e. : Ft =
{v ∈ G contt(v) = on}. We assume that F0 is a single connected compo-
nent. Our algorithm will preserve this property along its evolution.
Let a group of k robots that can move on the grid G (moving from a
tile to its neighbor in one time step) be placed at time t0 on F0, at point
p0 ∈ Ft. Each robot is equipped with a sensor capable of telling the con-
tamination status of all tiles in the digital sphere of diameter 7, surrounding
the robot (namely, in all the tiles that their Manhattan distance from the
robot is equal or smaller than 3. See an illustration in Figure 1). A robot
is also aware of other robots which are located in these tiles, and all the
robots agree on a common direction. Each tile may contain any number of
9
robots simultaneously. Each robot is equipped with a memory of size O(1)
bits1. When a robot moves to a tile v, it has the possibility of cleaning this
tile (i.e. causing cont(v) to become off. The robots do not have any prior
knowledge of the shape or size of the sub-graph F0 except that it is a single
and simply connected component.
X
Figure 1: An illustration of a digital sphere of diameter 7, placed around a robot.
The contaminated region Ft is assumed to be surrounded at its bound-
ary by a rubber-like elastic barrier, dynamically reshaping itself to fit the
evolution of the contaminated region over time. This barrier is intended to
guarantee the preservation of the simple connectivity of Ft, crucial for the
operation of the robots, due to their limited memory. When a robot cleans
a contaminated tile, the barrier retreats, in order to fit the void previously
occupied by the cleaned tile. Every d time steps, the contamination spreads.
That is, if t = nd for some positive integer n, then :
∀v ∈ Ft ∀u ∈ 4 − N eighbors(v) , contt+1(u) = on
1For counting purposes the agents must be equipped with counters that can store the
number of agents in their immediate vicinity. This can of course be implemented using
O(log k) memory. However, throughout the proof of Lemma 5 in (49) it is shown that the
maximal number of agents that may simultaneously reside in the same tile at any given
moment is upper bounded by O(1). Therefore, counting the agents in the immediate
vicinity can be done using counters of O(1) bits.
10
Here, the term 4 − N eighbors(v) simply means the four tiles adjacent to
tile v (namely, the tiles whose Manhattan distance from v equals 1). While
the contamination spreads, the elastic barrier stretches while preserving the
simple-connectivity of the region, as demonstrated in Figure 2. For the robots
who travel along the tiles of F , the barrier signals the boundary of the con-
taminated region.
Figure 2: A demonstration of the barrier expansion process as a result of a contamination
spread.
The robots' goal is to clean G by eliminating the contamination entirely.
It is important to note that no central control is allowed, and that the
system is fully decentralized (i.e. all robots are identical and no explicit com-
munication between the robots is allowed). An important advantage of this
approach, in addition to the simplicity of the robots, is fault-tolerance -- even
if almost all the robots die and evaporate before completion, the remaining
ones will eventually complete the mission, if possible.
A Survey of Previous Results. The cooperative cleaners problem was
previously studied in (49) (static version) and (50, 51) (dynamic version). A
cleaning algorithm called SWEEP was proposed (used by a decentralized
group of simple mobile robots, for exploring and cleaning an unknown "con-
11
taminated" sub-grid F , expanding every d time steps) and its performance
analyzed.
The SWEEP algorithm is based in a constant traversal of the contami-
nated region, preserving the connectivity of the region while cleaning all non
critical points -- points which when cleaned disconnect the contaminated
region. Using this algorithm the agents are guaranteed to stop only upon
completing their mission. The algorithm can be implemented using only local
knowledge, and local interactions by immediately adjacent agents. At each
time step, each agent cleans its current location (assuming it is not a critical
point), and moves according to a local movement rule, creating the effect
of a clockwise "sweeping" traversal along the boundary of the contaminated
region. As a result, the agents "peel" layers from the region, while preserving
its connectivity, until the region is cleaned entirely. An illustration of two
agents working according to the protocol can be seen in Figure 3.
s
✻
✻
❅❅ ❅❅
❅❅❅❅❅❅❅❅
Figure 3: An example of two agents using the SWEEP protocol, at time step 40 (with
contamination spreading speed d > 40). All the tiles presented were contaminated at time
0. The black dot denotes the starting point of the agents. The X's mark the critical points
which are not cleaned. The black tiles are the tiles cleaned by the first agent. The second
layer of marked tiles represent the tiles cleaned by the second agent.
12
In order to formally describe the SWEEP algorithm, we should first
define several additional terms. Let τ (t) =(cid:0)τ1(t), τ2(t), . . . , τk(t)(cid:1) denote the
locations of the k agents at time t. In addition, let τi(t) denote the "previous
location" of agent i. Namely, the last tile that agent i had been at, which is
different than τi(t). This is formally defined as :
τi(t) , τi(x) s.t. x = max{j ∈ N j < t and τi(j) 6= τi(t)}
The term ∂F denotes the boundary of F , defined via :
∂F = {v v ∈ F ∧ 8 − N eighbors(v) ∩ (G \ F ) 6= ∅}
The term 'rightmost' can now be defined as follows :
• If t = 0 then select the tile as instructed in Figure 4.
• If τi(t) ∈ ∂Ft then starting from τi(t) (namely, the previous boundary
tile that the agent had been in) scan the four neighbors of τi(t) in a
clockwise order until a boundary tile (excluding τi(t)) is found.
• If not τi(t) ∈ ∂Ft then starting from τi(t) scan the four neighbors of
τi(t) in a clockwise order until the second boundary tile is found.
A schematic flowchart of the protocol, describing its major components
and procedures is presented in Figure 5. The complete pseudo-code of the
protocol and its sub-routines appears in Figures 6 and 7. Upon initialization
of the system, the System Initialization procedure is called (defined in Fig-
ure 6). This procedure sets various initial values of the agents, and calls the
protocol's main procedure -- SWEEP (defined in Figure 7). This procedure
in turn, uses various sub-routines and functions, all defined in Figure 6. The
13
s ❝
s ❝
s ❝
❝
s
❝
s
❝
s
❝
s
❝
s
❝
s
s
❝
❝
s
❝
s
❝
s
❝
s
s❝
❝
s
❝
s
❝
s
❝
s
❝
s
❝
s
❝
s
❝
s
s
❝
❝
s
❝
s
s ❝
s ❝
s ❝
❝
s
❝
s
s ❝
Figure 4: When t = 0 the first movement of an agent located in (x, y) should be decided
according to initial contamination status of the neighbors of (x, y), as appears in these
charts -- the agent's initial location is marked with a filled circle while the destination is
marked with an empty one. All configurations which do not appear in these charts can be
obtained by using rotations. This definition is needed in order to initialize the traversal
behavior of the agents in the correct direction.
SWEEP procedure is comprised of a loop which is executed continuously,
until detecting one of two possible break conditions. The first, implemented
in the Check Completion of Mission procedure, is in charge of detecting
cases where all the contaminated tiles have been cleaned. The second con-
dition, implemented in the Check Near Completion of Mission procedure, is
in charge of detecting scenarios in which every contaminated tile contains
at least a single agent. In this case, the next operation would be a simul-
taneous cleaning of the entire contaminated tiles. Until these conditions are
met, each agent goes through the following sequence of commands. First
each agent calculates its desired destination at the current turn. Then, each
agent calculated whether it should give a priority to another agent located
at the same tile, and wishes to move to the same destination. When two or
14
more agents are located at the same tile, and wish to move towards the same
direction, the agent who had entered the tile first gets to leave the tile, while
the other agents wait. In case several agents had entered the tile at the same
time, the priority is determined using the Priority function. Before actually
moving, each agent who had obtained a permission to move, must now locally
synchronize its movement with its neighbors, in order to avoid simultaneous
movements which may damage the connectivity of the region. This is done
using the waiting dependencies mechanism, which is implemented by each
agent via an internal positioning of itself in a local ordering of his neighbor-
ing agents. When an agent is not delayed by any other agent, it executes its
desired movement. It is important to notice that at any given time, waiting
or resting agents may become active again, if the conditions which made
them become inactive in the first place, had changed.
Following are several results that we will later use. While using these
results, we note that completely cleaning a region is at least as strong as cov-
ering it, as the number of "uncovered" tiles at any given time can be modeled
by the number of "contaminated" tiles, since the number of uncovered tiles
in the original region to be explored is clearly upper bounded at all times by
the number of remaining contaminated tiles that belong to this region.
Result 1. (Cleaning a Non-Expanding Contamination) The time it
takes for a group of K robots using the SWEEP algorithm to clean a region
F of the grid is at most:
tstatic , 8(∂F0 − 1) · (W (F0) + k)
k
+ 2k
Here W (F ) denotes the depth of the region F (the shortest path from
some internal point in F to its boundary, for the internal point whose shortest
15
Figure 5: A schematic flow chart of the SWEEP protocol. The smooth lines represent
the basic flow of the protocol while the dashed lines represent cases in which the flow is
interrupted. Such interruptions occur when an agent calculates that it must not move
until other agents do so (either as a result of waiting or resting dependencies -- see lines 6
and 14 of SWEEP for more details).
16
Arbitrarily choose a pivot point p0 in ∂F0, and mark it as critical point
Place all the agents on p0
For (i = 1; i ≤ k; i + +) do
Call Agent Reset for agent i
1: System Initialization
2:
3:
4:
5:
6:
7:
8:
9: End procedure
End for
Call SWEEP for agent i
Wait two time steps
10: Agent Reset
11:
resting ← false
12:
dest ← null /* destination */
13:
near completion ← false
14:
saturated perimeter ← false
15:
waiting ← ∅
16: End procedure
17: Priority
18:
19:
20: End procedure
/* Assuming the agent moved from (x0, y0) to (x1, y1) */
priority ← 2(x1 − x0) + (y1 − y0)
If ((x, y) = p0) and (x, y) has no contaminated neighbors then
21: Check Completion of Mission
22:
23:
24:
25:
26: End procedure
Clean (x, y)
STOP
If (x, y) is contaminated then
/* Cases where every tile in Ft contains at least a single agent */
near completion ← false
If each of the contaminated neighbors of (x,y) contains at least one agent then
If each of the contaminated neighbors of (x,y) satisfies near completion then
27: Check "Near Completion" of Mission
28:
29:
30:
31:
32:
33:
34:
35:
36:
near completion ← true
Clean (x, y) and STOP
/* Cases where every non-critical tile in ∂Ft contains at least 2 agents */
saturated perimeter ← false
If ((x, y) ∈ ∂Ft) and both (x, y) and all of its non-critical neighbors
in ∂Ft contain at least two agents then
17
37:
38:
saturated perimeter ← true
If ((x, y) ∈ ∂Ft) and both (x, y) and all of its neighbors in ∂Ft has
saturated perimeter = true then
39:
40: End procedure
Ignore resting commands for this time step
Check Completion of Mission
Check "Near Completion" of Mission
dest ← rightmost neighbor of (x,y) /* Calculate destination */
destination signal bits ← dest /* Signaling the desired destination */
/* Calculate resting dependencies (solves agents' clustering problem) */
1: SWEEP Protocol /* Controls agent i after Agent Reset */
2:
3:
4:
5:
6:
7:
8:
9:
K2 : Agents signaling towards dest which entered (x,y) with agent i,
From all agents in (x,y) except agent i we define be the following groups:
K1 : Agents signaling towards dest which entered (x,y) before agent i
10:
11:
12:
13:
14:
15:
16:
17:
18:
19:
20:
21:
22:
23:
24:
25:
and with higher priority than this of agent i
resting ← false
If (K1 6= ∅) or (K2 6= ∅) then
resting ← true
If (current time-step T did not end yet) then jump to 4 Else jump to 30
waiting ← ∅ /* Waiting dependencies (agents synchronization) */
Let active agent denote a non-resting agent which didn't move in T yet
If (x-1,y) ∈ Ft contains an active agent then waiting ← waiting ∪ {left}
If (x,y-1) ∈ Ft contains an active agent then waiting ← waiting ∪ {down}
If (x-1,y-1) ∈ Ft contains an active agent then waiting ← waiting ∪ {l-d}
If (x+1,y-1) ∈ Ft contains an active agent then waiting ← waiting ∪ {r-d}
If dest = right and (x+1,y) contains an active agent j, and dest j 6= left, and
there are no other agents delayed by agent i (i.e. (x-1,y) does not contain
active agent l with dest l =right and no active agents in (x,y+1),(x+1,y+1),
(x-1,y+1), and (x+1,y) does not contain active agent n with dest n = left),
then (waiting ← waiting ∪ {right}) and (cid:0)waitingj ← waitingj \ {left}(cid:1)
If dest = up and (x,y+1) contains an active agent j, and dest j 6= down, and
there are no other agents delayed by agent i (i.e. (x,y-1) does not contain
active agent l with dest l =up and no active agents in (x+1,y),(x+1,y+1),
(x-1,y+1), and (x,y+1) does not contain active agent n with dest n = down),
then (waiting ← waiting ∪ {up}) and (cid:0)waitingj ← waitingj \ {down}(cid:1)
If (waiting 6= ∅) then
If (T has not ended yet) then jump to 4 Else jump to 30
/* Decide whether or not (x,y) should be cleaned */
If ¬ ((x,y) ∈ ∂Ft) or ((x,y) ≡ p0) or (x,y) has 2 contaminated tiles in its
4N eighbors which are not connected via a path of contaminated tiles from its
8N eighbors then
(x,y) is an internal point or a critical point and should not be cleaned
Clean (x,y) if and only if it does not still contain other agents
Else
26:
27:
28:
29: Move to dest
30: Wait until T ends.
31:
Return to 2
18
Figure 7: The SWEEP cleaning protocol.
path is the longest) and as defined above, ∂F denotes the boundary of F ,
defined via :
∂F = {v v ∈ F ∧ 8 − N eighbors(v) ∩ (G \ F ) 6= ∅}
The term 8 − N eighbors(v) is used to denote the eight tiles that tile v is
immediately surrounded by.
Result 2. (Universal Lower Bound on Contaminated Area) Using
any cleaning algorithm, the area at time t of a contaminated region that
expands every d time steps can be recursively lower bounded, as follows :
St+d ≥ St − d · k +j2p2 · (St − d · k) − 1k
Here St denotes the area of the contaminated region at time t (such that
S0 = n).
Result 3. (Upper Bound on Cleaning Time for SWEEP on Ex-
panding Domains) For a group of k robot using the SWEEP algorithm
to clean a region F on the grid, that expands every d time steps, the time it
takes the robots to clean F is at most d multiplied by the minimal positive
value of the following two numbers :
(A4 − A1A3) ±p(A1A3 − A4)2 − 4A3(A2 − A1 − A1A4)
2A3
where :
, A3 =
,
, A2 =
c0 + 2 + γ2
8 · γ2
d · k
, γ1 = ψ (1 + A2) − ψ (1 + A1)
c0 + 2 − γ2
γ2 · γ
d
γ2 =p(c0 + 2)2 − 8S0 + 8
d − 2k
∂F0 − 1
8(k + W (F0))
4
−
A1 =
4
A4 = γ1 −
γ =
k
19
Here c0 is the circumference of the initial region F0, and where ψ(x) is
the Digamma function (studied in (70)) -- the logarithmic derivative of the
Gamma function, defined as :
ψ(x) =
d
dx
ln Γ(x) =
Γ′(x)
Γ(x)
or as :
ψ(x) =Z ∞
0 (cid:18) e−t
t −
e−xt
1 − e−t(cid:19) dt
Note that although c0 = O(∂F) the actual length of the perimeter of the
region can be greater than its cardinality, as several tiles may be traversed
more than once. In fact, in (49) it is shown that c0 ≤ 2 · ∂F − 2.
4. Grid Coverage -- Analysis
We note again that when discussing the coverage of regions on the grid,
either static or expanding, it is enough to show that the region can be cleaned
by the team of robots, as clearly the cleaned sites are always a subset of the
visited ones. We first present the cover time of a group of robots operating
in non-expanding domains, using the SWEEP algorithm.
Theorem 1. Given a connected region of S0 = n grid tiles and perimeter c0,
that should be covered by a team of k ant-like robots, the robots can cover it
k S1.5
using O(cid:0) 1
Proof. Since ∂F0 = Θ(c0), and W (F0) = O(√S0), recalling Result 1 we can
0 + S0(cid:1) time.
see that :
tk(n) = tstatic(k) = O(cid:18) 1
kpS0 · c0 + c0 + k(cid:19)
20
As c0 = O(S0) and as for practical reasons we assume that k < n this
would equal in the worse case to :
tk(n) = tstatic(k) = O(cid:18) 1
k
S1.5
0 + S0(cid:19)
We now examine the problem of covering expanding domains. The lower
bound for the number of robots required for completing is as follows.
Theorem 2. Given a region of size S0 ≥ 3 tiles, expanding every d time
robots cannot clean the region, regardless
steps, then a team of less than
√S0
d
of the algorithm used.
Proof. Recalling Result 2 we can see that :
St+d − St ≥j2p2 · (St − d · k) − 1k − d · k
√S0
d we can see that :
By assigning k =
∆St = St+d − St ≥(cid:22)2q2 · (St −pS0) − 1(cid:23) −pS0
For any S0 ≥ 3, we see that ∆S0 > 0. In addition, for every S0 ≥ 3 we
dt > 0 for every t ≥ 0. Therefore, for every S0 ≥ 3 the size of
can see that dSt
the region will be forever growing.
Corollary 1. Given a region of size S0 tiles, expanding every d time steps,
where d = O(1) w.r.t S0, then a team of less than Ω(√S0) robots cannot
clean the region, regardless of the algorithm used.
21
Theorem 3. Given a region F of size S0 tiles, expanding every d time steps,
where R(F ) is the perimeter of the bounding rectangle of the region F , then
a team of k robots that at t = 0 are located at the same tile cannot clean the
region, regardless of the algorithm used, as long as d2k < Ω(R(F )).
Proof. For every v ∈ F let l(v) denote the maximal distance between v and
any of the tiles of F , namely :
l(v) = max{d(v, u)u ∈ F}
Let C(F ) = l(vc) such that vc ∈ F is the tile with minimal value of l(v).
Let vs denote the tile the agents are located in at t = 0. Let vd ∈ F
denote some contaminated tile such that d(vs, vd) = l(vs). Regardless of the
algorithm used by the agents, until some agent reaches vd there will pass at
least l(vs) time steps. Let us assume w.l.o.g that vd is located to the right
(or of the same horizontal coordinate) and to the top (or of the same vertical
coordinate) of vs. Then by the time some agent is able to reach vd there
exists an upper-right quarter of a digital sphere of radius j l(vs)
d k + 1, whose
center is vd.
The number of tiles in such a quarter of digital sphere equals :
1
d (cid:23)2
2(cid:22) l(vs)
+
3
2(cid:22) l(vs)
d (cid:23) + 1 = Θ(cid:18) l(vs)2
d2 (cid:19)
It is obvious that the region cannot be cleaned until vd is cleaned. Let
td denote the time at which the first agent reaches vd. It is easy to see that
td ≥ l(vs). Therefore, regardless of activities of the agents until time step
td, there are now k agents that has to clean a region of at least Θ(cid:16) l(vs)2
d2 (cid:17)
tiles, spreading every d time steps. Using Theorem 2 we know that k agents
22
cannot clean an expanding region of k =
√S0
d
tiles. Namely, at time td k
agents could not clean the contaminated tiles if :
d2k < Ω (l(vs))
As l(vs) ≥ C(F ) we know that k agents could not clean an expanding
contaminated region where : d2k < Ω (C(F )). It is easy to see that for every
region F , if R(F ) is the length of the perimeter of the bounding rectangle of
F then C(F ) = Θ(R(F )).
Lemma 1. For every connected region of size S0 ≥ 3 and perimeter of length
c0 :
1
2
c0 < γ2 < c0
S0 is achieved when the region is arranged in the form of an 8-connected
Proof. let us assume by contradiction that (c0 + 2)2 ≤ (8S0 + 8). This means
c0 ≤ √8S0 + 8 − 2. However, the minimal circumference of a region of size
digital sphere, in which case c0 ≥ 4√S0 − 4, contradicting the assumption
that c0 ≤ √8S0 + 8 − 2 for every S0 > 5. Therefore, γ2 ∈ R.
2 c0. Therefore :
Let us assume by contradiction that γ2 < 1
(c0 + 2)2 − 8S0 + 8 <
1
4
c2
0
which implies :
c0 < −
16
6
+r10
2
3
S0 − 8
8
9
< 3.266pS0 − 2
However, we know that c0 ≥ 4√S0 − 4, which contradicts the assumption
that γ2 < 1
2 c0 for every S0 ≥ 3.
23
Let us assume by contradiction that γ2 > c0. Therefore :
which implies :
(c0 + 2)2 − 8S0 + 8 > c2
0
c0 > 4S0 − 6
However, we know that c0 ≤ 2S0 − 2 (as c0 is maximized when the tiles are
arranged in the form of a straight line), contradicting the assumption that
γ2 > c0 for every S0 ≥ 3.
Lemma 2. For every connected region of size S0 ≥ 3 and perimeter of length
c0 :
Ω(1) < γ1 < O(ln n)
Proof. Let us observe γ1 :
4
c0 + 2 + γ2
γ1 , ψ(cid:18)1 +
(cid:19) − ψ(cid:18)1 +
From Lemma 1 we can see that 1 < (cid:0)1 + c0+2−γ2
−γ where γ is the Euler-Mascheroni constant, defined as :
k! − log(n)# =Z ∞
1
(cid:1) < 1
1 (cid:18) 1
1
n→∞" n
Xk=1
γ = lim
⌊x⌋ −
x(cid:19) dx
c0 + 2 − γ2
4
(cid:19)
4
4 c0. Note that ψ(1) =
which equals approximately 0.57721. In addition, ψ(x) is monotonically in-
creasing for every x > 0. As we also know that ψ(x) is upper bounded by
O(ln x) for large values of x, we see that :
−0.58 < ψ(cid:18)1 +
c0 + 2 − γ2
4
(cid:19) < O(ln n)
(4.1)
24
From Lemma 1 we also see that 1 <(cid:0)1 + c0+2+γ2
(cid:19) = Θ(ln n)
ψ(cid:18)1 +
c0 + 2 + γ2
4
4
(cid:1) < 1.5
Combining equations 4.1 and 4.2 we see that :
Ω(1) < γ1 < O(ln n)
4 c0 meaning that :
(4.2)
(4.3)
Theorem 4. Result 3 returns a positive real number for the covering time
), and where γ1 shifts from O(1) to O(ln S0)
of a region of S0 tiles that expands every d time steps, when the number of
robots is Θ(√S0) and d = Ω( c0
as c0 grows from O(√S0) to O(S0), defined as :
(cid:19) − ψ(cid:18)1 +
γ2 =p(c0 + 2)2 − 8S0 + 8
γ1 = ψ(cid:18)1 +
Proof. Following are the requirements that must hold in order for Result 3
c0 + 2 − γ2
c0 + 2 + γ2
(cid:19)
4
γ1
4
to yield a real number :
• d · k 6= 0
• ∂F > 1
• A3 6= 0
• (c0 + 2)2 > 8S0 − 8
• (A1A3 − A4)2 ≥ 4A3(A2 − A1 − A1A4)
25
The first and second requirements hold for every non trivial scenario. The
third requirement is implied by the fourth. The fourth assumption is a direct
result of Lemma 1.
As for the last requirement, we ask that :
A2
1A2
3 + A2
4 ≥ 4A2A3 − 4A1A3 − 2A1A3A4
which subsequently means that we must have :
2
γ 2
d2k2 (c2
+γ2
0 + γ2
2 γ 2
2 − c0γ2)
d − γγ1γ2
d
1 + γ 2
γ2
dk
≥ 4
c0
γ2γ
4γ2 − c0γ1+
d − 2γ1 + 2 γ2γ
d +
γ1γ2 − γ 2
2 γ
d
Using Lemma 1 and Lemma 2 we should make sure that :
γ2
2
dk2
c2
0 + γ2
1 d + γ2
2 γ2 − γγ1γ2 ≥ O(cid:18) c0γ2γ1
k
+
c0γ2
2 γ
dk (cid:19)
Using W (F ) = O(√S0) and Ω(√S0) = ∂F = O(S0) and dividing by γ2
2
(which we know to be larger than zero), we can write the above as follows :
k ln S0
c2
0
dk2 +
k2 + d ln2 S0
c2
0
ln S0
+ 1 ≥
c0√S0
dk2 +
c2
0
dk2 . In addition, 1 ≥ 1
+
+
k
c0
dk
+
1
d(cid:19)
dk2 ≥ c0√S0
0
d and also 1 ≥ ln S0
(as Eq. 4.6 shows that k ≥ ln S0). In order to have also 1 ≥ c0
c0
and
dk we
O(cid:18)ln S0
As c0 ≥ √S0 then c2
c0
+
1 ≥ ln S0
must have :
k
d · k = Ω(c0)
26
(4.4)
In addition, we should also require that the result µ would be positive (as
it denotes the coverage time). Namely, that :
A4 +p(A1A3 − A4)2 − 4A3(A2 − A1 − A1A4) > A1A3
For this to hold we shall merely require that:
A2 − A1 − A1A4 ≤ 0
(as A3 is known to be positive). Assigning the values of A1, A2, A4, this
translates to :
c0 + c2
0
γ
d ≤ O(c0γ1)
Dividing by c0 we can write :
1 +
1 + c0
√S0
k − d
c0
d
+ k
c0
≤ O(γ1)
Namely :
c0√S0
k
c0 +
+ k ≤ dO(γ1)
As c0 is the dominant element of the left side of the inequation, we see
that :
Assigning this lower bound for d we can now see that :
d = Ω(cid:18) c0
γ1(cid:19)
Ω(pS0) ≤ k ≤ O(c0)
Therefore, we shall select the value of k such that :
(4.5)
(4.6)
This also satisfies Equation 4.4.
k = Θ(pS0)
27
Theorem 5. The time it takes a group of k = Θ(√S0) robots using the
SWEEP algorithm to cover a connected region of size S0 tiles, that expands
every d = Ω( c0
γ1
) time steps, is upper bounded as follows :
where γ1 shifts from O(1) to O(ln S0) as c0 grows from O(√S0) to O(S0),
tSU CCESS = O(cid:0)S2
0 ln S0(cid:1)
defined as :
γ1 = ψ(cid:18)1 +
4
c0 + 2 + γ2
(cid:19) − ψ(cid:18)1 +
γ2 =p(c0 + 2)2 − 8S0 + 8
Proof. Recalling Result 1 we know that if :
c0 + 2 − γ2
4
(cid:19)
8(∂F0 − 1) · (W (F0) + k)
k
+ 2k < d
then the robots could clean the region before it expands even once. In this
case, the cleaning time would be O( 1
k√S0·c0+c0) as was shown in Theorem 1.
Therefore, we shall assume that :
8(∂F0 − 1) · (W (F0) + k)
k
+ 2k ≥ d
(4.7)
Observing Result 3 we see that :
tSU CCESS =
A3
d · O A1 + A4
d · O A1 + A4
A3
A3
+sA2
1 + A1A4 + A1 + A2
√A3pA1A4 + A1 + A2
A3
+
+
A2
4
A2
3! ≤
A3 ! ≤
+ A4
28
A3
d · O A1 + A4
d · O
√k
√A3
+ pA1A4 + √A1 + √A2
! =
√c0 + γ2
+q kd
+ kγ+
c0 + γ2 + dk γ1
γ2
√γ2
γ2
√c0+γ2√dγ1+γ2·γ
Using the fact that γ2 = Θ(c0) (Lemma 1) we can rewrite this expression
as :
d · O(cid:18)c0 + dk
γ1
c0
+ kγ + √kpdγ1 + c0γ + √kd(cid:19)
Recalling Equation 4.7, and as W (F0) = O(√S0), we can see that :
(4.8)
d = O(cid:18)√S0 · c0
γ = O(cid:18)√S0
Therefore, γ can now be written as :
+pS0 +
k
k
+ c0 + k(cid:19)
k
√S0
+ 1(cid:19)
In addition, remembering that O(√S0) ≤ c0 ≤ O(S0) we can rewrite the
expression of Equation 4.8 as follows :
Using Lemma 2 we see that :
c0
+
γ1 +
+
√k
c0 + dk γ1
c0
+ k√S0 + k2
c0 + dk γ1
√S0
c0
k + √S0 + k√S0
√S0
+ k√S0 + k2
√S0
k + 4√S0 +
d · O
+ √kd
=
√kc0q d
d · O
4√S0(cid:17) + √kd
√kc0(cid:16)√γ1 + 4√S0p γ1
pc0 ln S0√S0 +pc0k√S0 + k 4√S0 + √kd
d · O
=
d · O
c0 + k√S0 ln S0 + k2
√S0
pc0 ln S0√S0 +pc0k√S0
+ k√S0 + k2
√S0
c0 + dk ln S0
c0
+
+
29
(4.9)
Assuming that k > O(ln S0) and as c0 = O(S0) we can now write :
0
S 2.5
k + S2
k3
√S0
O
Using Equation 4.6 we can see that this translates to :
0 ln S0 + S1.5
+ S 2.25
0√k
0 k ln S0 + k2√S0 ln S0+
0 √k + S0.75
+ S1.75
0 k1.5
O(cid:0)S1.5
0 k ln S0(cid:1)
(4.10)
(4.11)
5. Conclusions
In this paper we have discussed the problem of cleaning or covering a
connected region on the grid using a collaborate team of simple, finite-state-
automata robotic agents. We have shown that when the regions are static,
this can be done in O( 1
k n1.5 + n) time
in the worst case, thus improving the previous results for this problem. In
k√n· c0 + c0 + k) time which equals O( 1
addition, we have shown that when the region is expanding in a constant rate
(which is "slow enough"), a team of Θ(√n) robots can still be guaranteed to
clean or cover it, in O(n2 ln n) time.
In addition, we have shown that teams of less than Ω(√n) robots can
never cover a region that expands every O(1) time steps, regardless of their
sensing capabilities, communications and memory resources employed, or
the algorithm used. As to regions that expand slower than every O(1) time
steps, we have shown the following impossibility results. First, a region of
n tiles that expands every d time steps cannot be covered by a group of k
agents if dk ≤ O(√n). Using Theorem 4 we can guarantee a coverage when
30
dk = Ω( n1.5
ln n ), or even for dk = Ω(n)) (when the region's perimeter c0 equals
O(n)).
Second, a spreading region cannot be covered when d2k is smaller than
the order of the perimeter of the bounding rectangle of the region (which
equals O(n) in the worse case and O(√n) for shapes with small perimeters).
Using Theorem 4 we can guarantee a coverage when d2k = Ω( n2.5
ln2 n ), or for
d2k = Ω(n1.5) (when the region's perimeter c0 equals O(n)).
We believe that these results can be easily applied to various other prob-
lems in which a team of agents are required to operate in an expanding grid
domain. For example, this result can show that a team of Θ(√n) cops can
always catch a robber (or for that matter -- a group of robbers), moving
(slowly) in an unbounded grid. Alternatively, robbers can be guaranteed to
escape a team of less than O(√n) cops, if the area they are located in is
unbounded.
6. Vitae
References
[1] S. Mastellone, D. Stipanovi, C. Graunke, K. Intlekofer, M. Spong, For-
mation control and collision avoidance for multi-agent non-holonomic
systems: Theory and experiments, The International Journal of
Robotics Research 27 (1) (2008) 107 -- 126.
[2] S. DeLoach, M. Kumar, Intelligence Integration in Distributed Knowl-
edge Management, Idea Group Inc (IGI), 2008, Ch. Multi-Agent Sys-
tems Engineering: An Overview and Case Study, pp. 207 -- 224.
31
Dr. Altshuler received his PhD in Computer Science
from the Technion -- Israel Institute of Technology
(2009), and is now a post-doc researcher at the Deutsche
Telekom Research Lab in Ben Gurion University.
Prof. Bruckstein is a professor at the Computer Science
department at the Technion -- Israel Institute of Tech-
nology, received his PhD in Electrical Engineering from
Stanford University (1984).
32
[3] I. Wagner, A. Bruckstein, From ants to a(ge)nts: A special issue on ant --
robotics, Annals of Mathematics and Artificial Intelligence, Special Issue
on Ant Robotics 31 (1 -- 4) (2001) 1 -- 6.
[4] U. V. et. al, RoboCup 2007: Robot Soccer World Cup XI, Vol. 5001 of
Lecture Notes in Computer Science, Springer Berlin, 2008.
[5] R. Alami, S. Fleury, M. Herrb, F. Ingrand, F. Robert, Multi-robot coop-
eration in the martha project, IEEE Robotics and Automation Magazine
5 (1) (1998) 36 -- 47.
[6] N. Agmon, S. Kraus, G. Kaminka, Multi-robot perimeter patrol in ad-
versarial settings, in: IEEE International Conference on Robotics and
Automation (ICRA 2008), 2008, pp. 2339 -- 2345.
[7] N. Agmon, V. Sadov, G. Kaminka, S. Kraus, The impact of adver-
sarial knowledge on adversarial planning in perimeter patrol, in: AA-
MAS '08: Proceedings of the 7th international joint conference on Au-
tonomous agents and multiagent systems, International Foundation for
Autonomous Agents and Multiagent Systems, Richland, SC, 2008, pp.
55 -- 62.
[8] S. Kraus, O. Shehory, G. Taase, Coalition formation with uncertain
heterogeneous information, in: Proceedings of the second international
joint conference on Autonomous agents and multiagent systems, 2003,
pp. 1 -- 8.
[9] H. Work, E. Chown, T. Hermans, J. Butterfield, Robust team-play in
highly uncertain environments, in: AAMAS '08: Proceedings of the 7th
33
international joint conference on Autonomous agents and multiagent
systems, International Foundation for Autonomous Agents and Multia-
gent Systems, Richland, SC, 2008, pp. 1199 -- 1202.
[10] M. Rehak, M. Pechoucek, P. Celeda, V. Krmicek, M. Grill, K. Bar-
tos, Multi-agent approach to network intrusion detection,
in: AA-
MAS '08: Proceedings of the 7th international joint conference on Au-
tonomous agents and multiagent systems, International Foundation for
Autonomous Agents and Multiagent Systems, Richland, SC, 2008, pp.
1695 -- 1696.
[11] R. Connaughton, P. Schermerhorn, M. Scheutz, Physical parameter
optimization in swarms of ultra-low complexity agents, in: AAMAS
'08: Proceedings of the 7th international
joint conference on Au-
tonomous agents and multiagent systems, International Foundation for
Autonomous Agents and Multiagent Systems, Richland, SC, 2008, pp.
1631 -- 1634.
[12] M. Mataric, Interaction and intelligent behavior, Ph.D. thesis, Mas-
sachusetts Institute of Technology (1994).
[13] E. Manisterski, R. Lin, S. Kraus, Understanding how people design trad-
ing agents over time, in: AAMAS '08: Proceedings of the 7th interna-
tional joint conference on Autonomous agents and multiagent systems,
International Foundation for Autonomous Agents and Multiagent Sys-
tems, Richland, SC, 2008, pp. 1593 -- 1596.
34
[14] D. MacKenzie, R. Arkin, J. Cameron, Multiagent mission specification
and execution, Autonomous Robots 4 (1) (1997) 29 -- 52.
[15] G. Chalkiadakis, C. Boutilier, Sequential decision making in repeated
coalition formation under uncertainty, in: Proceedings of the 7th in-
ternational joint conference on Autonomous agents and multiagent sys-
tems, 2008, pp. 347 -- 354.
[16] X. Zheng, S. Koenig, Reaction functions for task allocation to coopera-
tive agents, in: Proceedings of the 7th international joint conference on
Autonomous agents and multiagent systems, 2008, pp. 559 -- 566.
[17] C. Candea, H. Hu, L. Iocchi, D. Nardi, M. Piaggio, Coordinating in
multi-agent robocup teams, Robotics and Autonomous Systems 36 (2 --
3) (2001) 67 -- 86.
[18] R. Sawhney, K. Krishna, K. Srinathan, M. Mohan, On reduced time
fault tolerant paths for multiple uavs covering a hostile terrain, in: AA-
MAS '08: Proceedings of the 7th international joint conference on Au-
tonomous agents and multiagent systems, International Foundation for
Autonomous Agents and Multiagent Systems, Richland, SC, 2008, pp.
1171 -- 1174.
[19] A. Yamashita, M. Fukuchi, J. Ota, T. Arai, H. Asama, Motion plan-
ning for cooperative transportation of a large object by multiple mobile
robots in a 3d environment, in: In Proceedings of IEEE International
Conference on Robotics and Automation, 2000, pp. 3144 -- 3151.
35
[20] A. Agogino, K. Tumer, Regulating air traffic flow with coupled agents,
in: AAMAS '08: Proceedings of the 7th international joint conference on
Autonomous agents and multiagent systems, International Foundation
for Autonomous Agents and Multiagent Systems, Richland, SC, 2008,
pp. 535 -- 542.
[21] S. Premvuti, S. Yuta, Consideration on the cooperation of multiple au-
tonomous mobile robots,
in: Proceedings of the IEEE International
Workshop of Intelligent Robots and Systems, 1990, pp. 59 -- 63.
[22] R. Bhatt, C. Tang, V. Krovi, Formation optimization for a fleet of
wheeled mobile robots a geometric approach, Robotics and Autonomous
Systems 57 (1) (2009) 102 -- 120.
[23] J. Fredslund, M. Mataric, Robot formations using only local sensing
and control, in: Proceedings of the International Symposium on Com-
putational Intelligence in Robotics and Automation (IEEE CIRA 2001),
2001, pp. 308 -- 313.
[24] N. Gordon, I. Wagner, A. Bruckstein, Discrete bee dance algorithms
for pattern formation on a grid, in: IEEE International Conference on
Intelligent Agent Technology (IAT03), 2003, pp. 545 -- 549.
[25] K. Bendjilali, F. Belkhouche, B. Belkhouche, Robot formation modelling
and control based on the relative kinematics equations, The Interna-
tional Journal of Robotics and Automation 24 (1) (2009) 3220 -- .
[26] T. Balch, R. Arkin, Behavior-based formation control for multi-robot
36
teams, IEEE Transactions on Robotics and Automation 14 (6) (1998)
926 -- 939.
[27] S. Sariel, T. Balch, Real time auction based allocation of tasks for multi-
robot exploration problem in dynamic environments, in: In Proceed-
ings of the AAAI-05 Workshop on Integrating Planning into Scheduling,
2005, pp. 27 -- 33.
[28] M. Pfingsthorn, B. Slamet, A. Visser, RoboCup 2007: Robot Soccer
World Cup XI, Vol. 5001 of Lecture Notes in Computer Science, Springer
Berlin, 2008, Ch. A Scalable Hybrid Multi-robot SLAM Method for
Highly Detailed Maps, pp. 457 -- 464.
[29] I. Rekleitis, G. Dudek, E. Milios, Experiments in free-space triangu-
lation using cooperative localization, in: IEEE/RSJ/GI International
Conference on Intelligent Robots and Systems (IROS), 2003.
[30] I. Harmatia, K. Skrzypczykb, Robot team coordination for target track-
ing using fuzzy logic controller in game theoretic framework, Robotics
and Autonomous Systems 57 (1) (2009) 75 -- 86.
[31] L. Parker, C. Touzet, Multi-robot learning in a cooperative observation
task, Distributed Autonomous Robotic Systems 4 (2000) 391 -- 401.
[32] G. Hollinger, S. Singh, J. Djugash, A. Kehagias, Efficient multi-robot
search for a moving target, The International Journal of Robotics Re-
search 28 (2) (2009) 201 -- 219.
[33] S. LaValle, D. Lin, L. Guibas, J. Latombe, R. Motwani, Finding an
unpredictable target in a workspace with obstacles, in: Proceedings of
37
the 1997 IEEE International Conference on Robotics and Automation
(ICRA-97), 1997, pp. 737 -- 742.
[34] A. Efraim, D.Peleg, Distributed algorithms for partitioning a swarm of
autonomous mobile robots, Structural Information and Communication
Complexity, Lecture Notes in Computer Science 4474 (2007) 180 -- 194.
[35] R. Olfati-Saber, Flocking for multi-agent dynamic systems: Algorithms
and theory, IEEE Transactions on Automatic Control 51 (3) (2006) 401 --
420.
[36] E. Bonabeau, M. Dorigo, G. Theraulaz, Swarm Intelligence: From Nat-
ural to Artificial Systems, Oxford University Press, US, 1999.
[37] G. Beni, J. Wang, Theoretical problems for the realization of distributed
robotic systems, in: IEEE Internal Conference on Robotics and Automa-
tion, 1991, pp. 1914 -- 1920.
[38] A. Thorndike, Summary of antisubmarine warfare operations in world
war ii, Summary report, NDRC Summary Report (1946).
[39] P. Morse, G. Kimball, Methods of operations research, MIT Press and
New York: Wiley, 1951.
[40] B. Koopman, Search and Screening: General Principles with Historical
Applications, Pergamon Press, 1980.
[41] P. Vincent, I. Rubin, A framework and analysis for cooperative search
using uav swarms, in: ACM Simposium on applied computing, 2004.
38
[42] Y. Altshuler, V. Yanovsky, A. Bruckstein, I. Wagner, Efficient cooper-
ative search of smart targets using uav swarms, ROBOTICA 26 (2008)
551 -- 557.
[43] S. Koenig, M. Likhachev, X. Sun, Speeding up moving-target search,
in: AAMAS '07: Proceedings of the 6th international joint conference
on Autonomous agents and multiagent systems, ACM, New York, NY,
USA, 2007, pp. 1 -- 8.
[44] R. Borie, C. Tovey, S. Koenig, Algorithms and complexity results for
pursuit-evasion problems, In Proceedings of the International Joint Con-
ference on Artificial Intelligence (IJCAI) (2009) 59 -- 66.
[45] R. Isaacs, Differential Games: A Mathematical Theory with Applica-
tions to Warfare and Pursuit, Control and Optimization, John Wiley
and Sons, Reprinted by Dover Publications 1999, 1965.
[46] V. Isler, S. Kannan, S. Khanna, Randomized pursuit-evasion with local
visibility, SIAM Journal of Discrete Mathematics 20 (2006) 26 -- 41.
[47] A. Goldstein, E. Reingold, The complexity of pursuit on a graph, The-
oretical Computer Science 143 (1995) 93 -- 112.
[48] J. Flynn, Lion and man: the general case, SIAM Journal of Control 12
(1974) 581 -- 597.
[49] I. Wagner, Y. Altshuler, V. Yanovski, A. Bruckstein, Cooperative clean-
ers: A study in ant robotics, The International Journal of Robotics
Research (IJRR) 27 (1) (2008) 127 -- 151.
39
[50] Y. Altshuler, A. Bruckstein, I. Wagner, Swarm robotics for a dynamic
cleaning problem, in: IEEE Swarm Intelligence Symposium, 2005, pp.
209 -- 216.
[51] Y. Altshuler, I. Wagner, A. Bruckstein, Swarm ant robotics for a dy-
namic cleaning problem -- upper bounds, The 4th International confer-
ence on Autonomous Robots and Agents (ICARA-2009) (2009) 227 -- 232.
[52] V. Braitenberg, Vehicles, MIT Press, 1984.
[53] R. Korf, Real-time heuristic search, Artificial Intelligence 42 (1990) 189 --
211.
[54] I. Rekleitis, V. Lee-Shuey, A. P. Newz, H. Choset, Limited communica-
tion, multi-robot team based coverage, in: IEEE International Confer-
ence on Robotics and Automation, 2004.
[55] Z. Butler, A. Rizzi, R. Hollis, Distributed coverage of rectilinear environ-
ments, in: Proceedings of the Workshop on the Algorithmic Foundations
of Robotics, 2001.
[56] E. Acar, Y. Zhang, H. Choset, M. Schervish, A. Costa, R. Melamud,
D. Lean, A. Gravelin, Path planning for robotic demining and devel-
opment of a test platform, in: International Conference on Field and
Service Robotics, 2001, pp. 161 -- 168.
[57] M. Batalin, G. Sukhatme, Spreading out: A local approach to multi-
robot coverage, in: 6th International Symposium on Distributed Au-
tonomous Robotics Systems, 2002.
40
[58] X. Zheng, S. Koenig, Robot coverage of terrain with non-uniform
traversability, in: In Proceedings of the IEEE International Conference
on Intelligent Robots and Systems (IROS), 2007, pp. 3757 -- 3764.
[59] X. Zheng, S. Jain, S. Koenig, D. Kempe, Multi-robot forest coverage,
in: In Proc. IROS, press, 2005, pp. 3852 -- 3857.
[60] J. Svennebring, S. Koenig, Building terrain-covering ant robots: A fea-
sibility study, Autonomous Robots 16 (3) (2004) 313 -- 332.
[61] S. Koenig, Y. Liu, Terrain coverage with ant robots: A simulation study,
in: AGENTS'01, 2001.
[62] S. Koenig, B. Szymanski, Y. Liu, Efficient and inefficient ant coverage
methods, Annals of Mathematics and Artificial Intelligence 31 (2001)
41 -- 76.
[63] B. Szymanski, S. Koenig, The complexity of node counting on undirected
graphs, Technical Report, Computer Science Department, Rensselaer
Polytechnic Institute, Troy, NY.
[64] I. Wagner, M. Lindenbaum, A. Bruckstein, Efficiently searching a graph
by a smell-oriented vertex process, Annals of Mathematics and Artificial
Intelligence 24 (1998) 211 -- 223.
[65] S. B. Thrun., Efficient exploration in reinforcement learning -- techni-
cal report cmu-cs-92-102, Technical report, Carnegie Mellon University
(1992).
41
[66] G. Dudek, M. Jenkin, E. Milios, D. Wilkes, Robotic exploration as graph
construction, IEEE Transactions on Robotics and Automation 7 (1991)
859 -- 865.
[67] A. Broder, A. Karlin, P. Raghavan, E. Upfal, Trading space for time
in undirected s − t connectivity, in: ACM Symposium on Theory of
Computing (STOC), 1989, pp. 543 -- 549.
[68] L. Lovasz, Random walks on graphs: A survey, Combinatorics, Paul
Erdos is Eighty 2 (1996) 353 -- 398.
[69] J. Jonasson, O. Schramm, On the cover time of planar graphs, Electron.
Comm. Probab. 5 (2000) 85 -- 90 (electronic).
[70] M. Abramowitz, I. Stegun, Handbook of Mathematical Functions, Ap-
plied Mathematics Series, National Bureau of Standards, 1964, p. 55.
42
|
1905.09177 | 1 | 1905 | 2019-05-22T14:53:39 | Asynchronous Scattering | [
"cs.MA",
"cs.DC"
] | In this paper, we consider the problem of scattering a swarm of mobile oblivious robots in a continuous space. We consider the fully asynchronous setting where robots may base their computation on past observations, or may be observed by other robots while moving.
It turns out that asynchronous scattering is solvable in the most general case when both vision (the ability to see others robots positions) and weak local multiplicity detection are available. In the case of a bidimensional Euclidean space, ASYNC scattering is also solvable with blind robots if moves are rigid. Our approach is constructive and modular, as we present a proof technique for probabilistic robot protocols that is of independent interest and can be reused for other purposes.
On the negative side, we show that when robots are both blind and have no multiplicity detection, the problem is unsolvable, and when only one of those is available, the problem remains unsolvable on the line. | cs.MA | cs | Asynchronous Scattering
Ulysse L´echine1,2, S´ebastien Tixeuil2
1) ´Ecole Normale Sup´erieure de Lyon, Lyon, France
ulysse.lechine [at] ens-lyon.fr
2) Sorbonne Universit´e, CNRS, LIP6, FR-75005, Paris, France
[email protected]
Abstract
In this paper, we consider the problem of scattering a swarm of mobile oblivious robots in a continuous
space. We consider the fully asynchronous setting where robots may base their computation on past
observations, or may be observed by other robots while moving.
It turns out that asynchronous scattering is solvable in the most general case when both vision (the
ability to see others robots positions) and weak local multiplicity detection are available. In the case
of a bidimensional Euclidean space, ASYNC scattering is also solvable with blind robots if moves are
rigid. Our approach is constructive and modular, as we present a proof technique for probabilistic robot
protocols that is of independent interest and can be reused for other purposes.
On the negative side, we show that when robots are both blind and have no multiplicity detection,
the problem is unsolvable, and when only one of those is available, the problem remains unsolvable on
the line.
9
1
0
2
y
a
M
2
2
]
A
M
.
s
c
[
1
v
7
7
1
9
0
.
5
0
9
1
:
v
i
X
r
a
1
1 Introduction
We consider mobile oblivious robots that evolve in a bidimensional Euclidean space [8, 4]. Those robots are
modeled as dimensionless points and repeatedly execute cycles that consist of Look-Compute-Move phases:
they first obtain a snapshot of their environment using visual sensors (Look), then compute their next tenta-
tive location (Compute), and finally move toward their computed destination (Move). After a Look-Compute-
Move cycle is complete, the local memory of a robot r is erased before r starts a new cycle (the robot is said
oblivious). In the semi-synchronous model (SSYNC in the current terminology [8, 4]), a non-empty subset
of robots is chosen by the scheduler (considered as an adversary) to simultaneously and atomically execute a
Look-Compute-Move cycle. An even more restricted model is the fully synchronous model (FSYNC [8, 4]),
where the subset of scheduled robots is the full set of robots. While SSYNC and FSYNC model make it
easier to write and prove robot protocols, they do not represent well the asynchronous behavior of actual
robotic entities. For that purpose, the asynchronous model (ASYNC [5, 4]) has been introduced:
in that
model, each phase of the Look-Compute-Move cycle of a robot may occur at any time. In particular, the
following events may occur: When a robot executes a Look phase, the other robots are not necessarily still;
also, a robot follows a straight path to reach its destination, but not necessarily at a constant speed (though
it cannot move back).
The visual sensors of a robot r output information about the r's environment in an ego-centered coordinate
system (which we denote in the sequel as frame). It is generally assumed that robots' coordinate systems do
not share a common direction (same "North-South axis"), a common orientation (same "North"), a common
chirality (same handedness), or even a common unit distance. In this ego-centered coordinate system, the
output of the visual sensors consists in (possibly partial) information about the positions of the other robots
(the current robot always being at the origin of the coordinate system). A first criterium to classify vision
sensors is its range [5]: how far can it see other robots positions? In this paper we consider two kinds of
robots: perceptive robots can see every location occupied by at least one robot, while blind robots cannot
see any other location than the origin of the coordinate system. A second criterium for vision sensors is its
ability to detect multiple robots placed at the exact same location [7]: strong multiplicity detection returns
the exact number of robots placed on a given location, weak multiplicity detection returns true if a location
hosts at least two robots, and false if it contains exactly one robot, while no multiplicity detection returns
no information about a position other than whether it contains at least one robot. Multiplicity detection is
local if it can only be used on the observing robot's location, and is global if it can be used on every occupied
location within the range of the vision sensor (and this range is greater than 0).
During the move phase, the move of the robot is either rigid or flexible [6]. If robot moves are considered
rigid, a robot always reaches its computed destination (possibly after some unbounded time in the ASYNC
model). If robot moves are flexible, then the scheduler can interrupt a robot r before it reaches its destination.
Then r starts a new Look-Compute-Move cycle. In the classical model [8], the scheduler may not stop r
before it moves at least some distance δ > 0 (unknown to r) unless r target destination is closer than δ (in
that case, r reaches its destination). In this paper, we instead consider a more extreme case where robot
moves can be infinitesimal : each robot r can be interrupted after it moves some distance > 0, for any such
.
The problem we consider is that of scattering: from any initial situation where robots may occupy the
same locations, any execution of a scattering protocol ends up in a situation where all robots occupy distinct
positions. Termination (that is, reaching a fixed global state where all robots remain still) is not required, as
long as robots remain at distinct locations. A deterministic scattering protocol for oblivious mobile robots is
feasible if and only if there does not exists clone robots [8]: two robots are clones if they start at the same
position, are given the same coordinate system, and are always activated simultaneously by the scheduler.
Two deterministic clone robots never separate. By contrast, a robot with no clone can simply move "North"
by one distance unit when activated by the scheduler to separate from another robot initially located at the
same position. As clone robots cannot be avoided in general, most subsequent work studied probabilistic
protocols. The first probabilistic scattering for the SSYNC model is due to Dieudonn´e and Petit [3]: anytime
a robot is activated, it tosses a coin, if the coin is 0, the robot stays in place, otherwise it moves arbitrarily
within its Voronoı cell. Then, Cl´ement et al. [2] proposed an expected constant time scattering protocol
for the SSYNC model: assuming knowledge of n, the number of robots, anytime a robot is activated, it
chooses a destination randomly among n2 ones, still within its Voronoı cell. Recently, Bramas and Tixeuil [1]
considered the random bit complexity of mobile robot scattering in the SSYNC model: anytime a robot
is activated, it chooses randomly among f destinations (f depends on the observed configuration, so no
knowledge of n is assumed) within its Voronoı cell. Bramas and Tixeuil [1] show that their solution is the
best possible in SSYNC (both in terms of coin tossing and round complexity) when n is not known. Overall,
it turns out that the scattering problem for oblivious mobile robots was only investigated in the SSYNC
2
model. The reason is that for all aforementioned protocols, the core proof argument relies on the fact that
once two robots separate, they never occupy the same position ever again, hence the number of robots on a
given multiplicity point always decreases. In the ASYNC model, this property is no longer guaranteed using
previous approaches. For example, consider the protocol of Dieudonn´e and Petit [3], and two stacks of 2 and
3 robots, respectively. First the stack of two robots is activated: one robot chooses to move to destination
d and the other chooses to stay, but the moving robot, called r1, is put on hold. Then the stack of 3 robots
is activated, 2 of those 3 robots, say r2 and r3 decide to move, and the other one decides to stay. Now r2 is
activated again, but its observation of other positions is updated (and so is its Voronoı cell). So, it may turn
out that r2 chooses d as its destination. Now, both r1 and r2 move to d, creating a new multiplicity point.
So, solving the problem in ASYNC requires a fresh approach, at least with respect to the proof techniques.
We investigate the possibility of asynchronous scattering in various settings. In particular, we consider
both perceptive and blind robots, both weak local multiplicity detection and no multiplicity detection, and
both rigid and flexible moves. It turns out that ASYNC scattering is solvable in the most general case when
both vision and weak local multiplicity detection are available.
In the case of a bidimensional Euclidean
space, ASYNC scattering is also solvable with blind robots if moves are rigid. Our approach is constructive
and modular, as we present a proof technique for probabilistic robot protocols that is of independent interest
and can be reused for other purposes. On the negative side, we show that when robots are both blind and
have no multiplicity detection, the problem is unsolvable, and when only one of those is available, the problem
remains unsolvable on the line. Unlike previous approaches [3, 2, 1], we consider the fully realistic ASYNC
model, and unlike Clement et al. [2], we do not consider that robots are aware of n. Our positive result do
not assume that robots share the same chirality, while impossibility results remain valid if robots share a
common chirality.
The remaining of the paper is structured as follows. Section 2 details the mathematical framework we
work with. Section 3 features a general result, which we believe is of independent interest, that is later used
to prove our results about scattering in Section 4 and 5. Section 6 presents preliminary complexity results,
while Section 7 takes a computability perspective. Finally, Section 8 provides some concluding remarks.
2 Framework
2.1 Notations
R denotes the set of real numbers, Q the set of rational numbers, and N the set of natural numbers. The set of
natural numbers except 0 is denoted by N(cid:63). Let f be a function, we can also denote it as f (•). (cid:107)•(cid:107) : R2 (cid:44)→ R
denotes the standard euclidean norm over R2, and (cid:104)•,•(cid:105) denotes the standard scalar product over R2 × R2.
Let E be a set, then E∗ denotes the set of all finite sequences of elements of E, EN denotes the set of all
sequences over E, and the set of infinite sequences E∞ = EN ∪ E∗. Let e ∈ E1 × E2 let p and q be the two
elements such that e = (p, q), then e(1) = p and e(2) = q, we generalize this notation to the case where e is
composed of more than two elements.
2.2 Execution Model
We consider the oblivious Look-Compute-Move model (a.k.a.
setting.
the OBLOT S model) in an asynchronous
The current state of a robot is modelled as a 6-tuple (l, d, r, s, a, c) ∈ S such that:
1. l ∈ R2 is the current location of the robot,
2. d ∈ R2 is the destination of the robot,
3. r ∈ {0; 1} is 1 if the robot is activated and 0 otherwise,
4. s ∈ R, s > 0 is the scale of the referential of the robot (the size of the unit distance),
5. a ∈ [0; π[ is the angle of the referential of the robot (where is the north),
6. c ∈ {0; 1} is 1 if the robot is right-handed and 0 otherwise.
We define the set of configurations C as the set of combinations of the local states of the robots where
at most one robot is activated in each configuration: C = {(s1, . . . , sn) ∈ S n∃i ∈(cid:74)1; n(cid:75)(si(3) = 1 ⇒ ∀j ∈
(cid:74)1; n(cid:75), j (cid:54)= i ⇒ sj(3) = 0)}. We say that the k-th robot is activated if and only if C(k)(3) = 1, otherwise it's
inactivated. Having a single robot activated at any time does not weaken the ASYNC model as it still allows
to simulate simultaneous executions, yet it permits to simplify notations in the sequel.
3
Let APART be the set of configurations such that there is no location occupied by two or more robots,
and every robot is immobile (its destination and its location are equal): APART = {(s1, . . . , sn) ∈ C --
∀i, j ∈(cid:74)0; 1(cid:75)2, si(1) = si(2) ∧ si(1) (cid:54)= sj(1)}.
Let A be the algorithm all robots execute. We consider two settings for visual sensors:
• If vision is assumed A receives as inputs the set of points where there is at least one robot. Said
differently given a point in R2 robots know if there is at least one robot there but not how many. If
vision is not assumed the robot is said to be blind
• If local weak multiplicity is assumed, A receives as input a bit indicating if there is another robot on
the same position as the robot running A .
An execution is an element of C ∞ = C1 → C2 → C3 . . . such that every transition Ci → Ci+1 is valid.
Now, C → D is a valid transition for A if and only if there exists a unique k ∈ N such that C(k) (cid:54)= D(k)
(i.e. only one robot did something) and all of the following properties are satisfied:
• At least one of the following conditions is true:
-- choice of frame C(k) = (p, p, 0, r, θ, b) and D(k) = (p, p, 1, r(cid:48), θ(cid:48), b(cid:48)): the scheduler assigns a frame
to robot k,
-- computation C(k) = (p, p, 1, r, θ, b) and D(k) = (p, q, 0, r, θ, b): the robot k computes its desti-
nation q using A ,
-- ready to move C(k) = (p, q, 0, r, θ, b) where p (cid:54)= q and D(k) = (p, q, 1, r, θ, b): robot k is about
to move,
-- move C(k) = (p, q, 1, r, θ) where p (cid:54)= q and D(k) = (q(cid:48), q, 0, r, θ) where q(cid:48) ∈]p; q]: robot k moves
towards its destination,
-- move and interrupt C(k) = (p, q, 1, r, θ) where p (cid:54)= q and D(k) = (q(cid:48), q(cid:48), 0, r, θ) where q(cid:48) ∈]p; q]:
robot k moves towards its destination, but may be interrupted prematurely by the scheduler.
• If more than one condition is true, then computation, move, and move and interrupt transitions have
priority over the other two.
Notice that transitions are of two types, the ones that inactivate robot k (computation, move, move and
interrupt), and the ones that activate it (choice of frame, ready to move). Due to the higher priority of the
former set of transitions, the property that at most one robot is activated in any configuration is preserved
throughout the execution. Starting from configuration Ci, if A is deterministic, then there is at most one
reachable configuration. If A is a probabilistic algorithm, then there can be more than one reachable con-
figurations. An execution E is fair if all robots perform the computation transition infinitely many times.
Given an algorithm A , we denote by EA the set of executions conforming to A .
Let us now define schedulers. Intuitively the scheduler chooses when robots are activated, by how much
they move when the movement is not rigid, etc. Let A be an algorithm, let σ : C ∗ (cid:44)→ C be a function. If
∀C1, . . . , Ck, Ck → σ(C1, . . . , Ck) is a valid transition for A , then σ is said to be a scheduler for A . This
ensures that all executions conform to A .
σ (i) = σ(EC
σ (0), . . . , EC
Given an initial configuration C, we define execution EC
σ (i − 1)). If A is probabilistic, then EC
σ as the execution starting from C according
to scheduler σ, and Eσ is the set of all possible executions. If A is deterministic, then EC
σ (0) = C, and
∀i ∈ N(cid:63), EC
σ (i) is a random variable defined
the same way as in the deterministic case, and σ is a probabilistic function, that is to say it returns its output
according to a certain distribution law given by the algorithm A for the transitions of the kind computation.
In the deterministic setting, σ is a fair scheduler if σ is a scheduler and Eσ is fair. In the probabilistic
setting, σ is fair if P(Eσ is fair) = 1. Given Algorithm A , the set of all possible schedulers conforming to
A is noted ΣA . If the algorithm is implied, we simply write Σ. If a scheduler never chooses a move and
interrupt transition, the movements are called rigid.
The fine grained approach we used for transitions permits to simulate an arbitrary number of robots
running simultaneously (even when other are moving). Two concurrent robots A and B could first sequentially
execute choice of frame and computation, and at a later time execute (again sequentially) ready to move and
move. A robot A can be seen while moving by robot B interleaving move by A, computation by B, and
ready to move by A. However, our modeling with at most one robot activated in any configuration permits
to simplify proof notations.
4
3 Theorem of Choice
Definition 1 (Safe Zone). Let A be an algorithm, let F ⊂ C , F is called a safe zone for A if valid transistions
only lead to configurations of F . Formally:
Lemma 1. Let F ⊂ C and A be an algorithm. If there exists a positive probability p such that, starting from
any configuration and for any scheduler, every execution reaches a configuration in F , then configurations
in F are reached with probability 1. Formally: ∃p ∈]0; 1],∀(C, σ) ∈ C × ΣA , P(∃i ∈ N, EC
σ (i) ∈ F ) ≥ p ⇒
∀(C, σ) ∈ C × ΣA , P(∃i ∈ N, EC
Proof. Let p be a positive real number. For all (C, σ) ∈ C × Σ, we have that:
∀(σ, C) ∈ ΣA × F,∀i ∈ N, EC
σ (i) ∈ F ⇒ EC
σ (i) ∈ F ) = 1.
σ (i + 1) ∈ F .
from C, following σ, F is reached exactly at the i-th transition
i∈N
P (from C, following σ, F is reached exactly at the i-th transition) ≥ p
(cid:33)
P(∃i ∈ N, EC
σ (i) ∈ F ) = . . .
(cid:32)(cid:91)
(cid:88)
= P
=
i∈N
N(cid:88)
i=0
This implies that for all (C, σ) ∈ C × Σ:
∃N ∈ N,
P (from C, following σ, F is reached exactly at the i-th transition) ≥ p
2
⇒ ∃N ∈ N, P (from C, following σ, F is reached before N -th transition) ≥ p
2
We now prove the lemma. Let C be a configuration and σ a scheduler. With execution EC
P(from C, following σ, F is reached before the N -th transition) ≥ p
2 .
For each configuration C and scheduler σ, we can thus define N (C, σ) as the smallest integer N such that:
σ and i ∈ N,
σ (i) in the sequel.
σ be a random execution starting from C. We define (ni)i∈N and (σi)i∈N as n0 = 0, σ0 = σ, and
σ , ni+1). Now, from C ∈ C , following σ, we run n1
2 . If we did reach F we stop. Otherwise, from Cni, following
2 . If we did reach F , we stop. Otherwise we
we define shif t(σ, EC
∀i ∈ N(cid:63), ni+1 = ni + N (Cni, σi), and σi+1 = shif t(σ, EC
transitions so that F is reached with probability p
σ, we run n2 transitions so that F is reached with probability p
repeat the process. Overall the probability that F is never reached is:
σ (i),•). To simplify notations, Ci denotes EC
σ , i) as σ(EC
σ (0), . . . , EC
Let EC
P(from C, following σ, we never reach F ) = P(∀i, EC
σ (i) /∈ F )
∀j ∈(cid:74)ni, ni+1(cid:74), EC
∀j ∈(cid:74)ni, ni+1(cid:74), E
σ (j) /∈ F )
σi (j) /∈ F )
Cni
= P(
(cid:92)
(cid:92)
≤(cid:89)
= P(
i∈N
i∈N
i∈N
1 − p
2
= 0
The following theorem is a direct corollary of Lemma 1 using the closure property of a safe zone.
Theorem 1 (Choice). Let A be an algorithm, let F ⊂ C be a safe zone for A , if ∃p ∈]0; 1],∀(C, σ) ∈
C × ΣA , P(∃i ∈ N, EC
σ (i) ∈ F ) ≥ p, then ∀(C, σ) ∈ C × ΣA , P(∃N ∈ N,∀i ∈ N, i ≥ N ⇒ EC
σ (i) ∈ F ) = 1
So, if F be a safe zone, if there is a positive probability p, such that for any scheduler σ and any reachable
configuration C, any execution from C that follows σ reaches a configuration in F with probability p, then
F is reached with probability 1. A reachable configuration is a configuration with a positive probability of
occurring in the execution. Note that the converse is also true: If F is reached with probability 1, then
starting from any reachable configuration and following any scheduler, F is reached with probability 1 > 0.
While Theorem 1 is very general, we mostly use it for the purpose of scattering robots: our safe zone F is
a set of configurations where robots remain separated whatever the subsequent execution, and we want that
5
starting from any initial configuration C (possibly with already moving robots) and following any scheduler
σ, algorithm A reaches F with probability 1. Then, using Theorem 1, it becomes sufficient to exhibit a
pattern of random bits used by A so that the robots reach F with probability p > 0, and prove that p is
independent of C and σ.
6
4 Blind Rigid ASYNC Scattering in R2
In this section, we consider the rigid setting when all robots are blind but are endowed with weak local
multiplicity detection.
4.1 Algorithm
Algorithm 1 Blind Rigid ASYNC Scattering in R2
1: if there is no other robot at my position then
2:
3: else
4:
5:
6:
Do nothing
i ← 0
r ← rbit()
while r = 0 do
7:
8:
9:
10:
11: end if
i ← i + 1
r ← rbit()
end while
move to u(i)
The pseudo-code for our algorithm is presented as Algorithm 1. Lines 5 and 8 use the rbit() function that
returns a 1 or a 0 with equal probability. The while loop is used to select a random natural number such
that value n is obtained with probability 2−n. The keyword move to takes as input an element of R2 and
updates the destination of the robot. Finally, u(n) is a computable sequence of points in Q2 such that there
exists a circle containing all u(n), and ∀i, j u(i) (cid:54)= u(j) (such a sequence does exist).
Figure 1: Five positions robot A can go to
4.2 Proof of correctness
Lemma 2. APART is a safe zone for Algorithm 1.
Proof. Starting from a configuration in APART, a robot does nothing when there is no other robot at its
position (Line 2).
Lemma 3. With F = APART, and A =Algorithm 1, the conditions of Lemma 1 are satisfied.
7
Proof. Let σ, C ∈ Σ, C . Step by step, we construct a sequence of positions that reach APART with
probability p > 0, independently of σ and C. We denote by (p1, . . . , pn)t the positions occupied by the
robots at step t, and (q1, . . . , qn)t the positions the robots want to go to at step t. Initially, we define:
• (p1, . . . , pn)0 = (C(1)(1), . . . , C(n)(1))
• (q1, . . . , qn)0 = (C(1)(2), . . . , C(n)(2))
Suppose at step t, the current configuration is D, when the scheduler selects a computation transition from
D to D(cid:48) for a robot k on a multiplicity point, the robot chooses its destination for step t + 1, and we define:
• (p1, . . . , pn)t+1 = (D(1)(1), . . . , D(n)(1)), (= (D(cid:48)(1)(1), . . . , D(cid:48)(n)(1)))
• (q1, . . . , qn)t+1 = (D(cid:48)(1)(2), . . . , D(cid:48)(n)(2))
There is a probability ρ > 0 that ∀i ∈(cid:74)0; n(cid:75), i (cid:54)= k ⇒ q /∈ [pi, qi] ∧ qi /∈ [p, q]. We call this event the (∗) event.
This events means that the robot chose a destination that is not on another robot's path (q /∈ [pi, qi]), and
that does not make the robot cross another robot's destination (qi /∈ [p, q]). As there are at most 2n points
that can be selected by k and do not satisfy these two properties (see Figure 2), there is a probability at least
2−2n of choosing a point that does satisfy those two conditions.
Figure 2: Possible destinations for A so that (∗) occurs.
Assume that at each step (∗) happens then we claim that we do at most n steps. Indeed if we do n+1 steps
then it means that a robot computed twice whilst not alone (from now on we only consider the computation
the robot did "whilst not alone"), let us say it is the k-th robot who is the first robot to compute twice. If the
robot computes twice then it means that at the time of its second computation it is not alone on its position,
the h-th robot is also there. Let us call q the current position of the two robots (notice that q was also the
result of the first computation of k), p the position where k was when it did its first computation, p' the
position where h was when k did its first computation. Let q(cid:48) be the destination of h when k does its second
computation. There are two possibilities : either the robot h had q(cid:48) in mind before the first computation of
k or it had it after.
• if h had it before: then when k did its first computation, it got q ∈ [p(cid:48); q(cid:48)], which is impossible by
assumption (by the condition q /∈ [ph, qh]),
• if h had it after: then h did a computation while at position e and chose q(cid:48) as a destination, with
q ∈ [e, q(cid:48)], which is impossible by assumption (by the condition qk /∈ [e; q(cid:48)]).
8
Since (∗) has probability at least 2−2n of occurring, it has probability at least 2−2n2
of occurring n times
in a row (notice that this probability is independent of σ and C). Now, if it occurs n times in a row, then
APART is reached. Therefore APART has a probability at least 2−2n2
of being reached from C, following
σ.
Theorem 2. Algorithm 1 solves the asynchronous rigid scattering problem in R2.
Proof. The proof is a direct application of theorem of choice to the result of Lemma 3
One remaining interesting question is a necessary and sufficient condition about {u(i)}i∈N such that
Algorithm 1 solves the ASYNC blind rigid scattering problem (see Figure 3). One may think that the
following property is true: "Algorithm 1 solves ASYNC blind rigid scattering if and only if {u(i)}i∈N spans
R2". While it is necessary (Algorithm 1 does not solve scattering when all u(i) are on the same line), it is
not sufficient. Indeed, if ∀n, n = 0[2] ⇒ u(0) = (1, 0) ∧ n = 1[2] ⇒ u(1) = (0, 1), Algorithm 1 does not solve
scattering (see Figure 4), yet {u(i)}i∈N is a base of R2. Instead, we propose the following conjecture:
Conjecture 1. The u(i) permit Algorithm 1 to solve ASYNC blind rigid scattering if and only if there exists
no finite set C ⊂ R2 of points such that from any points of C there is a way for the scheduler to choose a
frame that makes every u(i) coincide with points of C.
Figure 3: For which positions of the countably many crosses (that represent the possible destinations) does
the algorithm solve ASYNC scattering?
9
Figure 4: When E moves, a symmetric situation occur, hence we have cyclic set of configurations.
10
5 Flexible Scattering in ASYNC
In this section, we consider the more difficult case of flexible (a.k.a. non rigid) moves, where the scheduler
may stop the robot before it reaches its destination (but not before the robot moves by some distance δ > 0).
The previous blind solution (Algorithm 1) may no longer be valid as the condition for not ending up in
the same location now requires that robot trajectories do not cross. So, the constant probability (from
any configuration) of not reaching another robot's location is not guaranteed, and so neither is scattering.
As a result, we devise new algorithms for this setting that are not blind, first in the unidimensional case
(Section 5.1), and then in the bidimensional case (Section 5.2).
5.1 Flexible ASYNC scattering in R
Do nothing
Algorithm 2 Flexible ASYNC Scattering in R
1: if there is no other robot at my position then
2:
3: else
4:
5:
6:
if there is only one occupied location then
else
7:
8:
9:
10:
11:
12: end if
r ← rbit()
move by a unit distance to the right if r = 0, to the left otherwise
u ← smallest distance between myself and a robot not on my position
r ← rbit()
move by a distance of u
3 to the right if r = 0, to the left otherwise
end if
The pseudocode for our solution is presented as Algorithm 2. The term "unit distance" found in Line 6
refers to the one given by the scheduler. Figure 5 presents the two possible locations a robot located in A
may chose as a target destination when occupied locations are only A, B, and C.
Figure 5: A(cid:48) and A(cid:48)(cid:48) are the two positions a robot located in A can go to (assuming it's not alone on its
position)
Lemma 4. APART is a safe zone for algorithm 2.
Proof. Starting from a configuration in APART, a robot does nothing when there is no other robot at its
position (Line 2).
Theorem 3. Algorithm 2 solves the ASYNC flexible scattering problem in R.
Proof. Our strategy is to increase by at least one the number of isolated (and hence immobile) robots at each
step of the proof. We first fix a left-right orientation (unknown to the robots), and number the robots from 1
to n. Let σ be a scheduler and C a configuration. For the first step, we devise a strategy to put one robot to
the right of every other robot (and it remains so forever): if a robot located at the rightmost position (called
"rightmost robot") is requested to make a choice, then if no other rightmost robot already goes to the right,
go to the right; otherwise, go to the left. We refer to this event as (∗). We now assume that event (∗) always
happens when it can, i.e. our strategy occurs.
1. This strategy occurs with probability at least 2−2n. Indeed, if a rightmost robot decides to go left once,
it is never considered again as it cannot become a rightmost robot again. In more details, Algorithm 2
requires that for a robot A to cross a robot B to the right, B should go to the left. With our strategy,
at least one rightmost robot goes right or stays still. It follows that the number of times we need to
repeat the strategy is at most 2n, as at most n rightmost robots may be requested to go to the left
(and if a rightmost robot goes to the left it must be that a rightmost robot has chosen to go to the
right). Then, we need each robot on the rightmost position stack to make the right choice between left
11
and right, each one has a probability 1
probability at least 2−2n.
2 of making this right choice. So, the strategy is followed with
2. There is a time after which no robot wants to go further to the right of or at the same position as the
rightmost robot, and the rightmost robot does not want to move to the left. Said differently there is
a time after which the rightmost robot remains the rightmost robot forever (we call this property P ).
This is entailed by two facts: (i), (∗) can occur at most 2n times (see above) and if (∗) occurs finitely
many times, then property P is satisfied. It is easy to be convinced of this claim if one notices that a
non-rightmost robot cannot become a rightmost robot via a computation (unless the rightmost robots
all move left). Next, because we follow the strategy, the rightmost robots cannot go left (except maybe
at the beginning).
We now give the technical proof : Assuming the robots follow our strategy, there is a time after which
no one wants to go further to the right of or at the same position as the rightmost robot and the
rightmost robot does not want to move to the left, as a result the rightmost robot will remain the
rightmost robot forever (we call this property P).
We will prove it by induction on the number of robots who may become the rightmost robot at least
once.
Firstly it is easy to be convinced there is a time tright after which the position of the rightmost robot
can only increase.
Secondly if at a time t > tright a robot is still (its position and its destination is the same) and is not
one of the rightmost robots, it can never become one of the rightmost robot. We call this property S.
Let us now prove property P : by contradiction, let us assume that "who the rightmost robot" is changes
an infinite amount of time, let us place ourselves after (∗) does not happen anymore. Since we assume
(∗) happens whenever it can happen then it means that there is no situation, after some time t > tright,
where one of the rightmost robot is asked to compute.
We say that a robot is in the race for rightmost status if there is a scheduler such that following this
scheduler and our strategy there is a non-zero probability that this robot becomes, at least for some
time, the rightmost robot. In other words a robot is in the race for rightmost status if there is a way
for this robot to become one of the rightmost robots at some point.
We place ourselves at time t, we number from 1 to r the robots in the race for rightmost status. There
is a time t' where the rightmost robot is crossed by the robot k (by assumption). There is a time t"
at which k stops (either because the scheduler interrupted him or because k reached its destination) at
this point k's position and k's destination are the same. If k never moves again it is removed from the
race. If k moves once again then it means there is a time t3 where another robot q which goes on top
of it and k performs a computation. If at time t3 k is not the rightmost robot then it is removed from
the race (by property S). But k is not the rightmost robot at time t3 because t3 > t, and by definition
of t the rightmost robot cannot compute after t. Therefore k is removed from the race. By induction
this proves claim P (P is equivalent to having only one robot in the race for rightmost status).
3. After long enough the rightmost robot does not want to move : by the last point there is a time at
which there the rightmost robot does not move or moves to the right by fairness of the scheduler it
will eventually reach its destination or be interrupted and never be reached by another robot (by the
previous point)
The set of configurations F1 were a single rightmost robot does not want to move, and every other robot
does not want to cross it is safe (by points 2 and 3 above). Moreover from any starting configuration C and
for any scheduler σ, there is a probability at least 2−2n to reach this set. By theorem of choice, F1 is thus
reached with probability 1.
For the next step of the strategy, we assume that there exists some integer k ≥ 1 such that the following
property holds: "the set of configuration Fk where the k rightmost robots are lonely and do not want to
move, and every other robot does not want to cross the leftmost of those k rightmost robots is safe". If a
configuration is in Fk, We call Rk the set of robots minus the k single rightmost robots. Then, we use a
strategy similar to the base case of the induction: if you are a rightmost robot of Rk and you are required to
make a choice, if no other robots at your current location is already going to the right, then go to the right,
otherwise, go to the left. By a similar set of arguments as for the base case, after long enough, a configuration
in Fk+1 is reached, and this configuration is safe.
Step by step, we conclude that we eventually reach a configuration in Fn, and this configuration is safe.
Obviously, Fn satisfies APART.
12
5.2 Flexible ASYNC Scattering in R2
is also known as the convex hull. Cardinal directions (Line 7) are given by the scheduler, while the vector −→ex
The pseudo-code for algorithm scattering is given as Algorithm 3. The smallest enclosing polygon (line 10)
(Line 14) denotes the first axis of the frame given by the scheduler to the robot.
When we write "move alongside θ", where θ is an angle, we mean that the robot should move in the
direction given by the vector −→v , of size one and where angle(−→ex,−→v ) = θ. An illustration of the algorithm is
given in Figure 6.
Algorithm 3 Flexible ASYNC Scattering in R2 for robot i
1: if there is no other robot on my position then
2:
3: else
4:
5:
if there is only one occupied location then
Do nothing
the South if r1 = 1 and r2 = 1, to the West otherwise.
else
r1 ← rbit(), r2 ← rbit()
move by a unit distance to the East if r1 = 0 and r2 = 0, to the North if r1 = 0 and r2 = 1, to
6:
7:
8:
9:
10:
11:
12:
13:
14:
15:
center G
end if
16:
17: end if
Let A be my current position
Let P be the smallest enclosing polygon of all robots
Let G be the barycenter of P
For every robot (including myself) r, compute Hr, the homothety of P that passes through r with
u ← smallest distance between Hi and another polygon or G
θ ← angle(−→ex,
r1 ← rbit(), r2 ← rbit()
Move by distance u, alongside θ + π
10 if r1 = 0 and r2 = 0, alongside θ − π
−→
GA), u ← u/3
10 if r1 = 0 and r2 = 1,
alongside −θ + π
10 if r1 = 1 and r2 = 0, alongside −θ − π
10 if r1 = 1 and r2 = 1.
Lemma 5. APART is a safe zone for Algorithm 3.
Proof. Starting from a configuration in APART, a robot does nothing when there is no other robot at its
position (Line 2).
Theorem 4. Algorithm 3 solves the flexible ASYNC scattering problem in R2.
Proof. The proof for the R2 case follows the same pattern as the one for R. However, it is now more ambiguous
to talk about "farthest" robots. We use the smallest enclosing polygon to define the set of farthest robots,
but instead of two directions (left and right) in the case of R, we now have multiple angles to distinguish
between farthest robots. In more details,let us denote by −→ex the first coordinate vector of R2, let C be a finite
set of points in R2, let θ be a number in [0; π[, c ∈ C is one of the θ-furthest points if (cid:104)c, eiθ(cid:105) = max
(cid:104)c(cid:48), eiθ(cid:105)
c(cid:48)∈C
where eiθ is the vector of length 1 and such that (cid:104)−→ex, eiθ(cid:105) = θ (see figure 7)
We number robots from 1 to n. Let σ be a scheduler and C a configuration.
For the first step, we choose an angle θ arbitrarily, and we devise a strategy to put a robot the farthest
along θ (called θ-farthest). The strategy to follow is:
if a robot r is one of the θ-furthest robots and is
required to make a choice, if no other robot on the same location is already going θ-further, r pick a direction
that makes it go θ-further, otherwise r picks a direction that does the opposite (that is, makes r go θ-closer).
This event is called (∗). Note that it is always possible to comply with the instructions because among the
4 directions robot r can go to, at least one is making r go θ-further.
• this strategy happens with a probability at least 1
. Indeed, if at some point r decides to go θ-closer,
r never applies the strategy again because r cannot become a θ-farthest robot again (by construction
of the algorithm and the strategy). Therefore the event (∗) happens at most 2n times, since there are
4 equally likely destinations and that at least one goes θ-farther, we get 1
4
−2n
• After long enough, no robot wants to go θ-further or equally θ-far as the θ-furthest robots (there can
eventually be multiple θ farthest robots) : the proof is similar to the uni-dimensional case. Assuming
.
−2n
4
13
Figure 6: After observing the current configuration, robot F (assumed not to be alone) computes the smallest
enclosing polygon and its homotheties, and selects the four possible destinations F 1, F 2, F 3, and F 4.
Figure 7: The displayed robots are the θ-farthest robot for each θ that falls in a section of their color. E is
the 0◦-farthest robot as well the 1◦-farthest robot, D is the −45◦-farthest robot, etc.
14
the robots follow our strategy there is a time after which the set of θ-farthest robots never change
anymore. We call this property P.
Firstly is it easy to be convinced that there is a time tθ after which the value of the projection of the
position of the θ-farthest robots over the vector eiθ only increases.
Secondly if at a time t > tθ a robot is still (its position and its destination is the same) and is not
one of the θ-farthest robots, it can never become one of the θ-farthest robots. This is because, in
the algorithm, the robot can move a distance which is strictly inferior to the distance to the closest
enclosing polygon. We call this property S.
Let us now prove property P : by contradiction, let us assume that the set of θ-farthest robots changes
an infinite amount of time, let us place ourselves after (∗) does not happen anymore. Since we assume
(∗) happens whenever it can happen then it means that there is no situation, after some time t ¿ tθ,
where one of the θ-farthest robot is asked to compute. We say that a robot is in the race for θ-farthest
status if there is a scheduler such that following this scheduler and our strategy there is a non-zero
probability that this robot becomes, at least for some time, the θ-farthest robot.
We place ourselves at time t, we number from 1 to r the robots in the race for θ-farthest status. Since
the set of θ-farthest robot always change by assumption, there is a time t' where robot k becomes a
θ-farthest robot (and it was not just before that). There is a time t" at which k stops (either because
the scheduler interrupted him or because k reached its destination) at this point k's position and k's
destination are the same. If k never moves again there are two possibilities
-- there is a point after which it is not a part of the set θ-farthest robots and it is removed from the
race (since it will never move)
-- or it will always be a part of the set of θ-farthest robots.
If k moves once again then it means there is a time t3 where another robot q which goes on top of it and
k performs a computation. If at time t3 k is not the θ-farthest robot then it is removed from the race
(by property S). But k cannot be θ-farthest robot at time t3 because t3 > t (and no robot θ-farthest
robot can compute after time t). Therefore robot k is removed from the race. By induction this proves
claim P because each time we either discard a robot from ever being in the set of θ-farthest robots or
we put a robot in this set forever, at some point the set of θ-farthest robot will never change anymore
(which is property P).
• After long enough, the θ-furthest robots do not want to move anymore. Once the situation described
in the previous bullet case is reached, we just wait for the θ furthest robots to reach their destination
(or be stopped by the scheduler, for what matters).
After events listed in the above point have happened, the set of θ-farthest robots remains the same forever.
Next steps of the strategy :
A polygon (or shell) is said stable if all robots on the border of the polygon are standing still and no one
inside this polygon wants to go outside or on the border of the polygon. We successively apply the strategy
we used for a specific θ to all θ(cid:48) ∈ [0; π[. For a given θ it can be we are already at a point where the set of
θ-farthest robots will always stay the same and we have nothing to do. The cases where we do have something
to do occur at most n times. Once the strategy has been applied for all θ(cid:48) ∈ [0; π[ the outer shell (or convex
hull) of the robots is stable. Just like in the uni-dimensional case we then apply the same strategy to the
robots strictly inside the stable shell. We simply change in the reasoning "θ-furthest" by "θ-furthest among
the robots that are not part of a stable shell".
At the end, by application of the theorem of choice we reach APART.
Observe that Algorithm 3 very easily extends to higher dimension.
15
6 Complexity
The notion of complexity can be studied in two variants: the expected number of coin tosses until scattering,
and the expected number of rounds until scattering. A round is a smallest fragment of an execution during
which all robots execute each at least one Look-Compute-Move cycle.
Theorem 5. Algorithm 1 achieves scattering of n robots in expected O(22n2
Proof. Let E be the expected number of rounds it takes to scatter the robots. There is a 2−2n2
that APART is reached in one round (see the proof of Lemma 3). Therefore, E ≤ 1 + (1 − 2−2n2
E ≤ O(22n2
Theorem 6. Algorithm 1 uses expected O(2n ∗ 2n2
) coin tosses.
) rounds.
)
probability
) ∗ E ⇒
Proof. The proof is similar to the last theorem.
By tweaking the algorithm 3, we can get a better bound of E ≤ ( 4π2
probability of picking the i-th direction to ∼ 6
π2i2 instead of 2−i.
6 )n ∗ n2n. For this change, the
We know that in the SSYNC setting, scattering can be achieved in Θ(n log n) coin throws on average. In
the ASYNC setting, assuming a robot throws a coin anytime it chooses a new destination, it turns out that
Ω(n2) coin tosses are needed for flexible scattering in R.
Theorem 7. Assuming robots are not blind and have weak local multiplicity detection, any algorithm that
solves flexible ASYNC scattering in R and makes a robot throw at least one coin anytime it chooses a new
destination requires Ω(n2) coin tosses.
Figure 8: Steps of the proof
Proof. At step 1, suppose every robot is at the same position (at the origin of the coordinate system). At
step 2, every robot computes. There is thus a point p (denoted by a red cross on Figure 8) on the left or on
the right such that at least n/2 robots wish to cross p. Out of these n/2 robots, we disseminate n/4 along the
path to p by prematurely stopping them. The n/4 other robots are put on hold. At step 3, we choose one of
the n/4 robots that were put on hold at step 2, and call it q. We now make q move toward p in an multi-stop
fashion: anytime q crosses one of the disseminated n/4 robots, say q(cid:63), q's movement is suspended, and q(cid:63)
computes a new destination (since q(cid:63) and q occupy the same location at this moment). When q reaches p,
the scheduler stops it.
Each of the n/4 has made a computation transition (and hence a coin toss). The scheduler now moves
and interrupts each of those in such a way that they remain between the origin and p. The process is then
repeated with every remaining n/4−1 robots that were put on hold. As a result, each of the n/4 disseminated
robots computes n/4 times, yielding a Ω(n2) number of coin tosses.
Our assumption that a robot tosses a coin anytime it chooses a new destination is justified by the following
observation:
in our schedule, the scheduler only selects for computation robots that are on a multiplicity
point; now if a robot on a multiplicity point does not perform a coin toss, its behavior may be identical to
that of other robots on the same multiplicity point, delaying scattering.
16
Vision Weak Local
Multiplicity
Yes
Yes
No
No
Yes
No
Yes
No
1D rigid
2D rigid
1D flexible
2D flexible
OK (Th. 2)
OK (Th. 2)
OK (Th.3)
KO (Th. 8)
KO (Th. 9)
KO (Th. 10) KO (Th. 10) KO (Th. 10) KO (Th. 10)
OK (Th. 3)
KO (Th. 8)
KO (Th. 9)
OK (Th. 4)
?
?
?
Table 1: Summary of possibility and impossibility results
7 Necessary and Sufficient conditions for ASYNC scattering
In this section, we consider necessary and sufficient conditions for the solvability of ASYNC scattering de-
pending on system hypotheses: rigidity of moves, dimensionality of the locations space, vision, and availability
of weak local multiplicity detection. The summary of our results is presented in Table 1.
Theorem 8. Rigid ASYNC scattering in R is impossible if the robots are blind, even with weak local multi-
plicity detection.
Proof. Consider three robots A, B, and C that are still and A is on the left of B, while C shares B's position.
Let d ∈ R be a positive distance. Then, for any p ∈]0, 1[, the scheduler can force a robot that computes a
new destination to compute a distance at least d with probability p (indeed, the scheduler can change the
scale of the coordinate system at every Look-Compute-Move cycle). We now construct a schedule such that
there is a positive probability that the robots never reach APART. We define routine(i) as "Assume there
are exactly two robots p and q sharing the same location and at least one of them, p, is still, while the third
robot is called h. We also assume that q is not going toward h. If at least one of the assumptions is false,
the routine aborts, otherwise, the scheduler does the following:
• If q is still, the scheduler makes p compute and ensures it chooses a destination that is farther than
dist(p, h) with probability 1 − 1
. If p chooses to go towards h, the scheduler makes it move to
the exact location of h, from which we execute routine(i+1). Otherwise, the scheduler simply executes
routine(i+1).
(i+1)
2
• If q is not still, the scheduler makes p compute and ensures it chooses a destination that is farther than
max(dist(h, p), dist(dest(q), p) with probability 1 − 1
. If p goes towards h, the scheduler makes
it move to the exact location of h and executes routine(i+1). If p goes farther than q, the scheduler
makes q go to its destination, then makes p move to the location of q, and finally execute routine(i+1).
If q goes further than p, the scheduler makes p go to its destination, then makes q move to the location
of p and execute routine(i+1)."
(i+1)
2
aborts, and the robots never reach APART. The probability that this execution occurs is(cid:81)+∞
Now, with the initial configuration we considered, let the scheduler execute routine(0). As we request the
scheduler to ensure a certain moving distance with a certain probability, for any integer i, the routine(i) never
) ≥
(i+1)
i=1 (1− 1
2
1/2.
Theorem 9. Rigid ASYNC scattering in R is impossible if robots have no multiplicity detection, even with
full vision.
Proof. Let us first consider a network of three robots A, B, and C such that A is on the left, and B and
C occupy the same location on the right. All robots are still. Now, when B is activated, there must be a
positive probability that B computes a new position. Suppose B only selects one direction: opposite to A.
Then, the same holds for C, as the algorithm is uniform for all robots. The scheduler then uses the following
schedule: (i) activate B until B decides to move to the right by some distance dB > 0, then (ii) activate
C until C decides to move to the right by some distance dC > 0, then (iii.a) if dB < dC, move B until
it reaches its destination, move C until it reaches B, activate B until it decides to go right again by some
B > dC − dB, or (iii.b) if dB > dC, move C until it reaches its
distance d(cid:48)
destination, move B until it reaches C, activate C until it decides to go right again by some distance d(cid:48)
C > 0,
C > dB − dC. This schedule yields an execution such that robots B and C
then repeat the process until d(cid:48)
occupy the same position infinitely often, hence scattering is never achieved. This implies that robots B and
C must run an algorithm such that there exists a positive probability to move to the left (that is, toward A).
Now, consider a network of two robots A and B initially separated and still (hence satisfying APART),
where A is on the right. Since B has exactly the same vision as in the previous situation (it has no multiplicity
B > 0, then repeat the process until d(cid:48)
17
detection), there is a positive probability that B goes to the left (toward A). By symmetry, there is also a
positive probability that A goes to the right (that is, toward B). Now, the distance can be oblivious of the
distance between A and B (that is, an absolute value based on the unit distance given by the scheduler) or a
function of the distance between A and B (since the scale is given by the scheduler, the perceived distance can
be always one unit, so this equates to a fraction of the distance). In the case of absolute value, the scheduler
simply chooses the distance between A and B, so that they occupy the same position again, invalidating
APART safety. In the case of a fraction, say 1/3 (see Figure 9, the same number is chosen by both A and
B with probability p > 0 since they have the same view. Then A computes a right target with probability
p but does not move, then B computes and move four times in a row, hence, with probability p5, A and B
occupy the same position again, hence APART is not safe. If the fraction is 1/k, for some integer k, the
overall probability of a meeting of A and B becomes dependent of k, but remains positive.
Figure 9: Case where f = 1/3
One may wonder if it is possible to scatter robots that are blind and have no weak local multiplicity
detection (even in R2). The following theorem show that it is not the case.
Theorem 10. Rigid ASYNC scattering in R2 is impossible if robots are blind and have no weak local mul-
tiplicity detection.
Proof. Since the robots do not have weak local multiplicity detection and are blind, there exists probability
p > 0 that the robots move, otherwise they would never separate if placed on the same location. Let d ∈ R2
be a position, since the robots are blind by adjusting the scale and orientation of their referential the scheduler
can take the robot to position d with probability p > 0. Let us suppose we have n > 1 robots in R2 that
execute a scattering algorithm. Let us also suppose those robots are in a configuration that satisfies APART.
We now show that it is possible that two robots meet with positive probability. Let d be the position of robot
number 1, the scheduler activates robot number 2 such that robot 2 has a probability p of choosing d as a
destination. If robot 2 chooses d then we have reached a configuration not in APART with probability p. If
robot 2 does not choose d, the scheduler makes robot 2 move to its destination and once arrived, activates it
again so that it chooses d with probability p. By doing this repeatedly, we eventually reach a conifguration
not in APART.
Admittedly, a fairness issue may arise, if robot 1 is not activated fairly. However, the arguments remains
the same if robot 1 is activated and moves every k (for some integer k > 0) activations of robot 2, as the
probability p is independent of the position of robot 1.
The first unresolved case in this table is whether it is possible to scatter blind robots in R2 with flexible
moves. We conjecture the answer is yes and that Algorithm 1 is a solution. However, the proof argument is
expected to be more involved than the one we provided. The second unresolved case is whether it is possible
to scatter robots without weak local multiplicity detection in R2 (be it rigid or flexible moves). We also
conjecture the answer to this question is yes, but different algorithmic techniques from the ones we provided
are expected to be necessary.
8 Concluding Remarks
We presented the first solutions to the oblivious mobile robots asynchronous scattering problem. Contrary
to previous work, we do not assume that the configuration observed by the robots is always up to date or
does not features moving robots. It turns out that the problem can be solved in the most general case when
robots are able to see other occupied location, and can determine whether more than one robot occupies
their current location. Our positive results are constructive, and a byproduct of our approach is a new
proof technique that could reveal useful for other oblivious mobile robot problems requiring randomization.
Perhaps surprisingly, it remains possible to solve the problem when robots are blind (they cannot see other
occupied locations) in a bidimensional Euclidean space. Releasing both assumptions (vision and weak local
18
multiplicity detection) yields immediate impossibility, while removing one of them yields impossibility in the
case of line. Some cases remain open and most likely require new proof arguments.
While our approach was mostly driven by a computability perspective, our positive result command a
thorough complexity analysis of the problem. Preliminary results we obtained show that, under a reasonable
assumption, a lower bound of Ω(n2) coin tosses is necessary to scatter n robots in ASYNC. This contrasts
with the weaker SSYNC model where Θ(n log n) coin tosses are tight. We leave this path of research as a
future work.
References
[1] Quentin Bramas and S´ebastien Tixeuil. The random bit complexity of mobile robots scattering. Int. J.
Found. Comput. Sci., 28(2):111 -- 134, 2017.
[2] Julien Cl´ement, Xavier D´efago, Maria Gradinariu Potop-Butucaru, Taisuke Izumi, and St´ephane Messika.
The cost of probabilistic agreement in oblivious robot networks. Inf. Process. Lett., 110(11):431 -- 438, 2010.
[3] Yoann Dieudonn´e and Franck Petit. Scatter of robots. Parallel Processing Letters, 19(1):175 -- 184, 2009.
[4] Paola Flocchini, Giuseppe Prencipe, and Nicola Santoro, editors. Distributed Computing by Mobile Enti-
ties, Current Research in Moving and Computing, volume 11340 of Lecture Notes in Computer Science.
Springer, 2019.
[5] Paola Flocchini, Giuseppe Prencipe, Nicola Santoro, and Peter Widmayer. Gathering of asynchronous
robots with limited visibility. Theor. Comput. Sci., 337(1-3):147 -- 168, 2005.
[6] Paola Flocchini, Nicola Santoro, Giovanni Viglietta, and Masafumi Yamashita. Rendezvous with constant
memory. Theor. Comput. Sci., 621:57 -- 72, 2016.
[7] Taisuke Izumi, Tomoko Izumi, Sayaka Kamei, and Fukuhito Ooshita. Feasibility of polynomial-time
randomized gathering for oblivious mobile robots. IEEE Trans. Parallel Distrib. Syst., 24(4):716 -- 723,
2013.
[8] Ichiro Suzuki and Masafumi Yamashita. Distributed anonymous mobile robots: Formation of geometric
patterns. SIAM J. Comput., 28(4):1347 -- 1363, 1999.
19
|
1909.05377 | 1 | 1909 | 2019-09-11T21:13:49 | Multi-Agent Control Using Coverage Over Time-Varying Domains | [
"cs.MA",
"eess.SY",
"eess.SY"
] | Multi-agent coverage control is used as a mechanism to influence the behavior of a group of robots by introducing time-varying domain. The coverage optimization problem is modified to adopt time-varying domains, and the proposed control law possesses an exponential convergence characteristic. Cumbrous control for many robots is simplified by deploying distribution and behavior of the robot team as a whole. In the proposed approach, the inputs to the multi-agent system, i.e., time-varying density and time-varying domain, are agnostic to the size of the system. Analytic expressions of surface and line integrals present in the control law are obtained under uniform density. The scalability of the proposed control strategy is explained and verified via numerical simulation. Experiments on real robots are used to test the proposed control law. | cs.MA | cs |
Multi-Agent Control Using Coverage Over
Time-Varying Domains
Xiaotian Xu∗ and Yancy Diaz-Mercado
Abstract
Multi-agent coverage control is used as a mechanism to influence the behavior of a group of robots by
introducing time-varying domain. The coverage optimization problem is modified to adopt time-varying
domains, and the proposed control law possesses an exponential convergence characteristic. Cumbrous
control for many robots is simplified by deploying distribution and behavior of the robot team as a
whole. In the proposed approach, the inputs to the multi-agent system, i.e., time-varying density and
time-varying domain, are agnostic to the size of the system. Analytic expressions of surface and line
integrals present in the control law are obtained under uniform density. The scalability of the proposed
control strategy is explained and verified via numerical simulation. Experiments on real robots are used
to test the proposed control law.
1 Introduction
Coverage control of multi-agent system has been drawing attention for a long time due to its wide appli-
cations, such as surveillance or exploration of an interested region. However, most of works consider these
regions are static. We investigate the case that the interested areas are dynamic in this paper and extend
the potential applications of coverage control of multi-agent systems. Typically, coverage control employs a
group of robots to optimally cover an interested area. A classical solution to coverage problems is proposed
by involving proper partitions of the domain[1, 2]. Coverage control based schemes have been previously de-
veloped for multi-agent systems, e.g., broadcast control (BC) scheme [3] and pivot-based collective coverage
algorithm [4]. In [5, 6] the authors introduce a mechanism to influence the collaborative behavior between
robots in coverage control by associating time-varying densities to the domain. An approach to perform
coverage control on moving regions is discussed in [7]. However, the robot team is not able to maintain the
centroidal Voronoi tessellation (CVT) configuration of the moving region, which will be one of the topics
considered in this paper.
In this paper, the coverage control algorithm [5] is taken as a mechanism to affect the behavior of a big
multi-robot team by involving time-varying domains. We define a time-varying subdomain in the workspace,
and command the robots to optimally distribute in the time-varying subdomain. Under this strategy, when
the subdomain moves and the shape or the scale of the subdomain changes, the robot team will act in
a coordinating manner. The proposed control strategy allows the multi-objective control of multi-agent
systems to be simplified into manipulating the subdomain directly, e.g., patrolling along the trajectory, and
changing the size of robot group. Nevertheless, the formation of the robot team can be controlled by adopting
time-varying densities within the subdomain as suggested in [6, 8].
The outline of this study is as follows. In Section 2, we state the coverage problem and recall pertinent
prior work. The coverage control over time-varying domains strategy is proposed in Section 3. Analytic
solutions are presented in Section 4 under the uniform density. The scalability of the proposed algorithm
is presented and validated in Section 5. A robotic implementation of the proposed control scheme together
with results of experiments are illustrated in Section 6. Finally, conclusions are summarized in Section 7.
∗Authors are with the Department of Mechanical Engineering, 2181 Glenn L. Martin Hall, Building 088, University of
Maryland, College Park, MD 20742, USA. Email: [email protected], [email protected].
1
2 Preliminaries
Coverage control will be used as a mechanism to influence the behavior of the multi-robot team, to coordinate
their inter-robot motion, and manipulate their motion in the workspace. In this section, we provide some
preliminary descriptions of the coverage control problem that is addressed with the modifications needed to
account for time-varying domains.
2.1 The Coverage Problem
Let pi ∈ D ⊆ Rd be the position of the ith robot, i ∈ {1, . . . , n}, in the domain of interest D, i.e., the robot
workspace. Further define a convex time-varying subdomain S(t) ⊂ D, such that robot i is said to lie in the
subdomain at time t if pi(t) ∈ S(t). Let ∂S(t) denote the boundary of the subdomain at time t, and let q(t)
be differentiable for almost every q ∈ ∂S.
We will use the locational cost [9] as a metric of the coverage performance in the subdomain S(t) at time
H(p(t), t) =
(cid:107)pi(t) − q(cid:107)2 φ(q, t) dq
(1)
t:
where p(t) = (cid:2)pT
n (t)(cid:3)T
(cid:90)
n(cid:88)
i=1
Vi(p(t),t)
1 (t), . . . , pT
is the configuration of the multi-robot team and φ : S(t) × [0,∞) →
(0,∞) is a density function that captures the relative importance of the points in the subdomain at time t,
differentiable in both arguments. The subdomain is partitioned into regions of dominance, and these form a
proper partition of the subdomain. We utilize a Voronoi tessellation of the domain, given by
Vi(p, t) = {q ∈ S(t) (cid:107)pi − q(cid:107) ≤ (cid:107)pj − q(cid:107) ∀j}
where for ease of notation we have dropped the explicit time dependency on the configuration of the multi-
robot system.
2.2 Centroidal Voronoi Tessellations
A necessary condition for the minimization of the locational cost in (1) is known to be that the agents form
a centroidal Voronoi tessellation (CVT) of the domain [9], i.e.,
∀i
pi(t) = ci(p, t)
where we define ci(t) ∈ Vi(p, t) to be the center of mass of Voronoi cell i at time t, given by
ci(p, t) =
Vi(p,t) qφ(q, t) dq
mi(p, t)
where mi(p, t) is the mass of the corresponding cell,
2.3 Coverage Control Law
Vi(p,t)
mi(p, t) =
φ(q, t) dq.
(cid:82)
(cid:90)
2
(2)
(3)
(4)
In [5], a control law was proposed which was later shown in [6] to achieve exponential converge to a CVT in
the case of time-varying densities. This control law was called TVD-C for time-varying densities, centralized
case, given by
where the tuning parameter κ > 0 controls the exponential convergence rate, and
p =
(cid:19)
I − ∂c
∂p
(cid:19)−1(cid:18)
(cid:18)
c(p, t) =(cid:2)c1(p, t)T , . . . , cn(p, t)T(cid:3)T
κ(c(p, t) − p) +
∂c
∂t
.
When many agents are used, the control law called TVD-D1, which stands for time varying densities,
decentralized case with 1-hop adjacency information, bypasses difficulties with computing the matrix inverse
in (4) by approximating it with the truncated Neumann series,
(cid:18)
(cid:19)(cid:18)
p =
I +
∂c
∂p
κ(c(p, t) − p) +
(cid:19)
∂c
∂t
.
(5)
The matrix ∂c
∂p in (4) and (5) is a block matrix that possess the sparsity structure of the Delaunay graph
associated with the Voronoi tessellation [6]. The ijth block is given by
(cid:21)
(cid:20) ∂c
(cid:20) ∂c
(cid:21)
∂p
∂p
∂ci
∂pj
=
ij
∂ci
∂pi
=
=
ii
= −
(cid:82)
(cid:88)
j∈NVi
mi(p, t)(cid:107)pi − pj(cid:107)
∂Vij (p,t)(q − ci)(q − pj)T φ(q, t) dq
(cid:82)
∂Vij (p,t)(q − ci)(q − pi)T φ(q, t) dq
mi(p, t)(cid:107)pi − pj(cid:107)
(6)
(7)
when i (cid:54)= j, and
where ∂Vij = Vi ∩ Vj, and NVi is the Delaunay graph neighbor set of agent i. These are (d−1)-dimensional
integrals (e.g., line integrals if D ⊆ R2), and are zero if ∂Vij = ∅ (i.e., two cells are not adjacent), or if the
T(cid:105)T
shared boundary has zero (d−1)-dimensional measure (e.g., points in 2D).
T
∂t in (4) is given by ∂c
∂t =
, . . . , ∂cn
∂t
,
(cid:104) ∂c1
∂t
(cid:82)
Assuming that the domain of interest is static, the partial ∂c
Vi(p,t)(q − ci) ∂φ
∂t dq
where
∂ci
∂t
=
mi(p, t)
.
(8)
Although the control law in (4) was derived with consideration to time-varying densities over static
domains, the proof of exponential convergence in [6] is still valid when the domain of interest is time-varying
with almost everywhere differentiable boundary, as long as pi(t0) ∈ S(t0) ∀i. However, additional terms
are needed in (8) to capture the evolution of the subdomain. In the following sections, we will derive the
needed terms such that (4) is able to provide exponential convergence to a CVT configuration, even when
the subdomain of interest is time-varying.
3 Time-Varying Domains
In order to retain the exponential convergence to a CVT property of control law (4), we will need to add
additional terms in (8) to capture the evolution of the time-varying domain. For the subsequent analysis, it
is assumed that dq
dt exists and is known for almost every q ∈ ∂S(t).
Note that the center of mass integrals in (2) are time dependent in both the integral kernel and the
Lemma 1 (Leibniz Integral Rule[10]). Let Ω(p, t) be a region that depends smoothly on t and that has a
domain of integration. Thus, Leibniz integral rule is needed.
well-defined boundary ∂Ω(p, t). If F (p, t) =(cid:82)
(cid:90)
(cid:90)
where n(q) is the unit outward normal for q ∈ ∂Ω(p, t).
Application of Lemma 1 to (2) yields the following result.
Ω(p,t) f (p, t, q) dq for differentiable f , then
∂F
∂t
=
∂f
∂t
dq +
Ω(p,t)
∂Ω(p,t)
f (p, t, q)
T
∂q
∂t
n(q) dq
Proposition 1 (Time-Varying Domains). Let S(t) be the convex subdomain to be covered with boundary
dt exists and is known for almost every q ∈ ∂S(t). Let ∂Si(p, t) = ∂S(t)∩ Vi(p, t). Then
∂S(t). Assume that dq
the partial derivative ∂ci
∂t , which captures the time evolution of the center of mass of the ith Voronoi cell due
to the motion of the subdomain and the change in density function, is given by
∂ci
∂t
=
1
mi(p, t)
Vi(p,t)
(q − ci)
∂φ
∂t
dq +
1
(q − ci)φ(q, t)
T
dq
dt
n dq.
(9)
(cid:90)
(cid:90)
mi(p, t)
∂Si(p,t)
3
Proof. By the product rule, we find
∂
∂t
∂ci
∂t
=
(cid:16)(cid:82)
(cid:17)
Vi(p,t) qφ(q, t) dq
mi(p, t)
− ci(p, t)
mi(p, t)
∂mi
∂t
.
Both terms now contain derivatives of integrals with time-varying integral kernels and domains. Applying
Leibniz integral rule to the first term yields
(cid:32)(cid:90)
∂
∂t
(cid:32)(cid:90)
∂
∂t
(cid:33)
(cid:33)
(cid:90)
(cid:90)
(cid:90)
(cid:90)
qφ(q, t) dq
=
Vi(p,t)
Vi(p,t)
∂Vi(p,t)
q
∂φ
∂t
dq +
qφ(q, t)
T
∂q
∂t
n dq
Then the latter integral can be split into two terms: for q ∈ ∂Si(p, t), and for q ∈ ∂Vi(p, t)\∂Si(p, t). Note
that only the points on the boundary of the subdomain change explicitly with time, i.e., since ∂q
∂t = 0 for
almost every point q /∈ ∂Si(p, t) we get
qφ(q, t) dq
=
Vi(p,t)
Vi(p,t)
q
∂φ
∂t
dq +
qφ(q, t)
T
dq
dt
n dq.
∂Si(p,t)
Similarly, for ∂mi
∂t we find
Collecting like terms, we get
∂ci
∂t
=
as was to be shown.
(cid:90)
Vi(p,t)
∂mi
∂t
=
∂φ
∂t
dq +
(cid:90)
∂Si(p,t)
φ(q, t)
T
dq
dt
n dq.
(cid:82)
Vi(p,t)(q − ci) ∂φ
∂t dq
mi(p, t)
(cid:82)
+
∂Si(p,t)(q − ci)φ(q, t) dq
dt
T
n dq
mi(p, t)
(cid:4)
Corollary 1 (Exponential Convergence). The control law in (4) with updated partial derivative as in Propo-
sition 1 yields exponential convergence to a CVT with exponential decay rate controlled by κ > 0 over smoothly
time-varying domains and densities, as long as pi(t0) ∈ S(t0) ∀i.
Proof. Same as in [6].
(cid:4)
Proposition 1 introduces a new term in the computation of ∂ci
∂t when compared to (8), which allows us to
explicitly take into account the evolution of the subdomain. This additional term can serve as an exogenous
input to the multi-robot team to control their collective position and scale, while the density function can
be chosen to provide the desired shape in multi-robot team formations, as suggested in [11]. These choices
of inputs possess the advantages of being flexible with respect to the size of the system, and as well as being
identity-agnostic, so that the input may be chosen without the need of performing assignments of roles, such
as is needed in leader-follower schemes.
In the next section, we explore the coverage problem over uniform densities in convex 2-polytope subdo-
mains, and analytical expressions are found for the terms in (4) and (5).
4 Coverage over Convex 2D-Polytopes with Uniform Density
We now focus on the class of coverage problems where the subdomain is a convex polytope in R2 with N
vertices using uniform density, i.e., with φ(q, t) = 1 for all q ∈ S(t) and t ≥ 0. As an immediate consequence
of this, the first term in expression provided in Proposition 1 becomes zero. For this class of problems, we
will further see that we can find analytical expressions in terms of time, neighboring agent positions and
boundary conditions in that agent's Voronoi cell. The control law can be computed solely on local neighbor
information and broadcasted domain information. We begin by considering the vertices of a Voronoi cell.
4
4.1 Vertices of the Voronoi Cell
Assuming that agent i has h(cid:48) neighbors, the ith Voronoi cell will be a convex 2-polytope with at least h(cid:48)−1
vertices. To account for vertices due to the intersection of the Voronoi cell with the the subdomain boundary,
we will assume the Voronoi cell consists of M ≥ h(cid:48)−1 vertices. We will denote the vertex due to neighbors
j and k (which can be determined by employing a Delaunay triangulation [12]) as Vijk. The vertex location
Vijk is given by the circumcenter of the triangle formed by connecting the position of these three agents pi,
pj and pk, and can be found analytically in terms of these [13, 14]. We present the equation below for the
sake of completion,
where the agents are assumed to be oriented in a counterclockwise order, where pab = pb − pa, and where
Vijk =
1
2
αipi + αjpj + αkpk
pij2pjk2 − (pT
ijpjk)2
αi = (cid:107)pjk(cid:107)2pT
ijpik, αj = (cid:107)pik(cid:107)2pT
ijpkj, αk = (cid:107)pij(cid:107)2pT
ikpjk.
Denote ViS(cid:96) to be the (cid:96)th vertex of the ith Voronoi cell that is on the subdomain boundary, where without
loss of generality these are assumed to be ordered counterclockwise. These may be domain polytope vertices,
or may be vertices due to the intersection of the Voronoi cell with the subdomain. As the former vertices
are assumed to be known, we provide an analytical expression for the latter.
Any point q on a face of the subdomain may be expressed using the vertices that define the face via the
parameterization q = L(cid:96)(τ ) = ∂S (cid:96) + (∂S ((cid:96)+1) − ∂S (cid:96))τ for certain τ ∈ [0, 1], where without loss of generality
the vertices of the subdomain ∂S (cid:96) are assumed to be ordered counterclockwise, and where ∂S N +1 = ∂S 1.
Let any point q ∈ ∂Vij, the interior Voronoi face due to two agents i and j that intersects polytope edge L(cid:96),
be given by q = Rij(s) = 1
skew symmetric rotation matrix. The sough after vertex ViSj is given by
2 (pi + pj) + tijs for certain s ∈ R, where tij = S(pj − pi) with S =(cid:2) 0 −1
(cid:3) being a
1 0
(cid:16)
∂S ((cid:96)+1) − ∂S (cid:96)(cid:17)
τ∗
ViSj = ∂S (cid:96) +
which exists if
τ∗ =
2 (pi + pj) − ∂S (cid:96))
( 1
(cid:0)∂S ((cid:96)+1) − ∂S (cid:96)(cid:1)T
(pj − pi)
∈ [0, 1]
found from solving for τ in L(cid:96)(τ ) = Rij(s).
The mass and center of mass can now be computed analytically in terms of the vertices of the Voronoi
cell.
4.2 Mass and Center of Mass of a Voronoi Cell
For convenience, denote the vertices of the ith Voronoi cell as Vij(p, t), j ∈ {1, . . . , M}, which are assumed
without loss of generality to be ordered counterclockwise. Then the mass and center of mass may be computed
as [14]
mi(p, t) =
V T
i(j+1)SVij
1
2
M−1(cid:88)
(cid:0)Vi(j+1) + Vij
j=1
(cid:1)(cid:16)
N−1(cid:88)
(cid:17)
.
V T
i(j+1)SVij
ci(p, t) =
1
6mi(p, t)
j=1
4.3 Partial Derivatives of a Centroid
For a convex 2-polytope subdomain, every Voronoi cell is also a convex 2-polytope, and the boundary
integrals in (6), (7), and (9) may be solved along each face analytically by using the parametric line integral
as in the following lemma.
5
Lemma 2 (Parametric Line Integral). Let the line integral of f (q) along L be denoted by (cid:82)
L f (q)dq where
the point q = [q1, q2]T can be parameterized such that if q1 = h(τ ) and q2 = g(τ ) for some τ ∈ [t0, t1], then
(cid:90)
(cid:90) t1
f (q)dq =
L
t0
f ([h(τ ), g(τ )]T )q(cid:48)(τ )dt
(cid:113)
where q(cid:48)(τ ) =
dτ )2.
dτ )2 + ( dg
( dh
Let that ∂Si(p, t) = ∂S(t) ∩ Vi(p, t) = (cid:83)
j ∂S j
(cid:88)
subdomain boundary. Each of the ∂S j
By linearity of the integral, the partial derivative (9) may be computed as
i
is a straight line, connected by two Voronoi cell vertices vj
is the jth Voronoi cell face shared with the
1 and vj
2.
i , where ∂S j
i
(cid:90)
∂ci
∂t
=
νj(t)
mi
j
∂Sj
i
(q − ci) dq
where νj(t) is the velocity of the points in the boundary ∂Sj
projected in the unit outward direction (i.e., νj(t) = ± dq
S vj
(cid:107)vj
of the vertices).
dt
T
i , assumed to be the same for every point,
2−vj
i depending on the orientation
2−vj
1(cid:107)∀q ∈ ∂Sj
1
Lemma 3 (Analytic Partial Derivatives).
Under uniform density and a convex 2-polytope subdomain with ∂S j
(cid:16)(cid:16)
(cid:17)
(cid:16)
(cid:17)(cid:17)(cid:107)vj
i = vj
1vj
2, (9) can be expressed as
2 − vj
1(cid:107)
∂ci
∂t
=
νj(t)
2mi
2 − ci
vj
+
1 − ci
vj
(cid:88)
j
and for ∂Vij = vj
= − (cid:107)vj
1vj
2, (6) may be expressed as
2 − vj
1(cid:107)
mi(cid:107)pi − pj(cid:107)
1 − pj
vj
1 − ci
vj
(cid:17)(cid:16)
(cid:104)(cid:16)
∂ci
∂pj
(cid:17)T
(cid:16)
+
1
2
1 − ci)(vj
(vj
2 − vj
1)T + (vj
1 − pj)T(cid:17)
(cid:17)(cid:16)
2 − vj
vj
1
2 − vj
vj
1
1)(vj
2 − vj
(cid:16)
1
3
+
(cid:17)T(cid:105)
.
Proof. Assume the following parameterization of the points q ∈ ∂Sj
i = vj
1vj
2 ,
It follows that q(cid:48) = (vj
in (9),
2 − vj
1) for all τ , and consequently dq = (cid:107)vj
2 − vj
1(cid:107)dτ . Applying Lemma 2 to the integral
q(τ ) = vj
1(1 − τ ) + vj
(cid:90) 1
(cid:16)
(cid:88)
j
2τ, τ ∈ [0, 1].
(cid:17)(cid:107)vj
∂ci
∂t
=
νj(t)
mi
0
1(1 − τ ) + vj
vj
2τ − ci
2 − vj
1(cid:107) dτ.
The result follows from expanding and integrating the terms. A similar process can be applied to (6) by
(cid:4)
instead using the vertices that make up the boundary for ∂Vij in the parameterization.
5 Scalability of the Algorithm
In this section, we will argue that the proposed algorithm is scalable for a large group of robots (e.g., robot
swarms). As a well-known fact in the field of computational geometry, the number of edges meeting at a
vertex in the Voronoi diagram is not less than three, and each edge connects two vertices; it follows Euler's
relation that the average number of edges of a Voronoi cell equals six[15, 16]. This fact is the key for our
algorithm's significantly reduced computational cost.
6
Table 1: Number of agents (out of 100) categorized by their neighbor sets Ni (i.e., number of neighbors).
Size of Ni
Simulation
2
3
4
5
6
Number of Agents
Trial 1
Trial 2
Trial 3
Trial 4
Trial 5
4
1
2
3
3
Average
2.6
1
4
3
4
3
3
31
29
28
28
27
28.6
10
9
9
8
9
9
47
50
52
51
52
7
7
7
6
6
6
50.4
6.4
5.1 Complexity Analysis of the Algorithm
Here we analyze the time complexity of the proposed algorithm for a single agent pi.
1. There are many well-studied algorithms to construct Voronoi diagrams, such as the Incremental Inser-
tion Method and the Divide and Conquer Method[15]. The quaternary incremental algorithm builds
the Voronoi diagram for n seeds with average complexity O(n) despite its worst-case complexity O(n2),
and the Divide and Conquer Method has an average and worst-case complexity O(n log n)[16]. In our
algorithm, agents only require the density and boundary information within their own Voronoi cells
(which can be computed in a distributed way [14]) and their Delaunay neighbor positions to compute
the quantities in (4). As described in [5], the matrix inverse in TVD-C can be approximated using
the truncated Neumann series expansion so that an agent only use as much information about the
multi-robot team as it has access to. For one agent in our algorithm, only a partial Voronoi diagram,
which is generated by the agent itself, its neighbors (Ni = 6 on average), and its neighbors' neighbors
(to enclose the Voronoi cells of Ni, a total of 12 on average) is needed instead of the overall Voronoi
, which is on average constant time,
diagram. Thus, the time complexity becomes O
by using the quaternary incremental algorithm.
(cid:16)(cid:12)(cid:12)(cid:12)(cid:83)
(cid:12)(cid:12)(cid:12)(cid:17)
Nj ∪ Ni
j∈Ni
2. We can obtain necessary information for ∂c
∂p in the control law (i.e., masses mi and mj, centroids ci and
cj of Voronoi cell Vi and Vj ∈ Ni) in constant time thanks to analytic expressions derived in previous
section. The complexity becomes O(1) on average in light of the fact of average number of neighbors
is independent of the size of the robot team.
3. The complexity of computing ∂ci
∂t
is determined by the number of edges of its Voronoi cell (O(M )).
Similarly to the previous cases, as the number of edges depends on the number of neighbors, the
complexity is constant time on average.
4. Given the above terms, the control law for agent pi can be calculated with time complexity O(1).
5.2 Validation of Scalability
We show the asymptotic nature of the average number of neighbors and the efficiency of the control law for
a large group of robots via numerical simulations. The simulation of the proposed control strategy was run
for five trials using 100 robots with random initial configurations, and the outcomes are collected in Table
1. Around fifty percent of agents have 6 neighbors in the simulations. The majority of the remaining agents
actually had less, with only about 7% having no more than seven neighbors.This percentage increased with
the size of the swarm.
Moreover, simulations of the proposed control law with and without term ∂c
∂t are conducted. The simula-
tion is shown in Fig. 1i, where a team of 100 robots is performing coverage of a subdomain which is tracking
a circular trajectory. The instantaneous aggregated CVT error ea(t) = (cid:107)p(t)−c(p, t)(cid:107) of the proposed control
strategy with and without the term ∂c
∂t is shown in Fig. 1ii. As we can tell from the results, the steady state
7
(i)
(ii)
Figure 1: Simulation of a group of 100 single-integrator robots (i); the center of subdomain (asterisk) moves
along the circular trajectory (dash line) in counterclockwise fashion. Results of the simulation of the control
law with and without the additional feedforward term ∂c
∂t (ii).
mean values of the simulation with and without ∂c
∂t are 0.0562 m and 0.1248 m respectively. The aggregated
CVT error 0.0562 m for 100 robots (i.e., 0.000562 m on average for each robot) suggests that the proposed
control law converges to a CVT. The ∂c
∂t term improves the error performance by 54.97% in this scenario
with a large group of agents. The error is not exactly zero because the distributed form of the control law (5)
was used, which does not perform feedforward on every agent in the team. Thus, the agents on the boundary
can immediately follow the motion of subdomain as they have direct access to the boundary conditions (i.e.,
whose Voronoi cell boundaries have overlapped edges with subdomain's boundaries), but the agents on the
interior must wait for the boundary conditions to propagate through feedback.
6 Multi-Robot Implementation
(i)
(ii)
Figure 2: Multi-robot implementation of control law with (i) and without (ii) term ∂c
∂t . 10 robots travel from
left end of workspace (blue box) towards the right end (green box) while avoiding the obstacles (red boxes).
The subdomain translates and scales over time. An overhead projector is used to visualize the subdomain,
goal location and obstacles in real time.
In section 4, the coverage control laws (4) and (5) are modified to account for time-variations in the
subdomain and the terms needed for the equations are provided analytically in the case of uniform coverage
on a convex 2-polytope domain. The results were simulated on a large team of robots in Section 5. In this
section, we implement the proposed control strategy on a group of real mobile robots. The experiments are
carried out on a workstation with Intel(R) Xeon(R) W-2125 processor, and the algorithms are implemented
in MATLAB. The multi-robot team consists of 10 Khepera IV differential-drive mobile robots. A motion
capture system consisting of 8 Vicon Vantage V8 cameras are used to provide real-time position information
8
Figure 3: Results of experiments. Profiles of aggregated error from optimal configuration with and without
term ∂c
∂t are indicated by blue solid line and red dot line
of the multi-robot team, and an overhead projector is used to visualize a virtual environment and Voronoi
tessellation. The robot workspace is defined to be a 5.182 m × 3.658 m (17 feet × 12 feet) rectangular area.
6.1 Experiment Description
An experiment is carried out to validate the proposed control strategy with a rectangular subdomain ∂S(t) =
[xmin(t), xmax(t)] × [ymin(t), ymax(t)] with uniform density. In the experiment, we synthesize control laws
for the different agents by driving the coverage domain for a group of robots to achieve a motion plan. The
experiment is shown in Fig. 2. To achieve the task, the subdomain simultaneously translates and scales to
go through the narrower passage and avoid the obstacles. The velocities for the subdomain boundaries are
defined as piece-wise constants to achieve the desired scaling and translation. The metric used to determine
performance of the proposed control strategy on the real robots is same as that in simulation. The control
law (5) and analytic expressions presented in Section 4 are used for the experiment with a control gain κ = 2.
As mentioned in Corollary 1, the aggregated error ea is expected to decay exponentially to zero under
control law TVD-C (almost exponential convergence under control law TVD-D1), up to the error introduced
by the mapping of the control law to the differential-drive motion of the robots, wheel saturations, and delays.
For comparison, the experiment is executed with and without the term ∂c
∂t , to evaluate the contribution by
the inclusion of the term.
6.2 Experimental Results
From Fig. 2, we can tell the difference between performances with and without ∂c
∂t . The robots form and
maintain an almost symmetric configuration with ∂c
∂t (Fig. 2i) while the robots lag behind the motion of
subdomain (Fig. 2ii) and could fail to catch up if the subdomain moves faster. Moreover, the profiles of
(cid:107)p(t) − c(p, t)(cid:107) are plotted in Fig. 3 for the experiments of implementing the control law with the inclusion
of the ∂c
∂t term and the absence of it, and they are shown as blue solid line and red dot line respectively. The
aggregated error ea greatly decreases at first, as expected due to the exponential convergence. As the agents
approach their CVT configuration, delays, saturations, and errors in mapping velocities to differential-drive
introduce small disturbances that result in variations along a small constant value. The mean of the steady-
state values of the metric are 0.0323 m (i.e., 0.0032 m per robot -- well within the footprint of the robots
which are 0.14 m in diameter) and 0.057 m for with and without the inclusion of ∂c
∂t . There is a noticeable
improvement in ea of nearly 43.3% due to the presence of the feedforward term.
9
7 Conclusion
An innovative control scheme is developed of synthesizing multi-agent controllers via coverage control on
time-varying domains. The approach offers a capability of controlling the behavior of multi-agent systems
by simply manipulating the domain to be covered, and it has the advantage of being agnostic to the size of
the system. Analytic solutions for the uniform density case is obtained, and scalability of the approach is
demonstrated. The feasibility of proposed control strategy is validated in simulation for a large number of
agents and experimentally on a team of real differential-drive wheeled robots.
References
[1] Stuart Lloyd. Least squares quantization in pcm. IEEE transactions on information theory, 28(2):129 --
137, 1982.
[2] Jorge Cortes, Sonia Martinez, and Francesco Bullo. Spatially-distributed coverage optimization and
control with limited-range interactions. ESAIM: Control, Optimisation and Calculus of Variations,
11(4):691 -- 719, 2005.
[3] Shalini Darmaraju, Md Abdus Samad Kamal, Madhavan Shanmugavel, and Chee Pin Tan. Coverage
control of a mobile multi-agent serving system in dynamical environment. In 2018 Joint 7th International
Conference on Informatics, Electronics & Vision (ICIEV) and 2018 2nd International Conference on
Imaging, Vision & Pattern Recognition (icIVPR), pages 508 -- 513. IEEE, 2018.
[4] Shaocheng Luo, Jun Han Bae, and Byung Cheol Min. Pivot-based collective coverage control with
a multi-robot team. In 2018 IEEE International Conference on Robotics and Biomimetics (ROBIO),
pages 2367 -- 2372. IEEE, 2018.
[5] S. G. Lee, Y. Diaz-Mercado, and M. Egerstedt. Multirobot control using time-varying density functions.
IEEE Transactions on Robotics, 31(2):489 -- 493, April 2015.
[6] Y. Diaz-Mercado, S. G. Lee, and M. Egerstedt. Human-swarm interactions via coverage of time-varying
densities. In Trends in Control and Decision-Making for Human -- Robot Collaboration Systems, chap-
ter 15, pages 357 -- 385. Springer, Cham, Switzerland, 2017.
[7] Sora Nishigaki, Kenta Hoshino, and Jun Yoneyama. Coverage control in moving regions with unmanned
aerial vehicles. In 2019 IEEE/SICE International Symposium on System Integration (SII), pages 301 --
306. IEEE, 2019.
[8] Xiaotian Xu and Yancy Diaz-Mercado. Multi-robot control using coverage over time-varying domains
In The 2nd International Symposium on Multi-Robot and Multi-Agent Systems
extended abstract.
(MRS2019). IEEE, In Press.
[9] J. Cortes, S. Martinez, T. Karatas, and F. Bullo. Coverage control for mobile sensing networks: varia-
tions on a theme. In Mediterranean Conference on Control and Automation, 2002.
[10] Qiang Du, Vance Faber, and Max Gunzburger. Centroidal voronoi tessellations: Applications and
algorithms. SIAM review, 41(4):637 -- 676, 1999.
[11] Y. Diaz-Mercado, S. G. Lee, and M. Egerstedt. Distributed dynamic density coverage for human-swarm
interactions. In 2015 American Control Conference (ACC), pages 353 -- 358, July 2015.
[12] Der Tsai Lee and Bruce J Schachter. Two algorithms for constructing a delaunay triangulation. Inter-
national Journal of Computer & Information Sciences, 9(3):219 -- 242, 1980.
[13] Dan Pedoe. Circles: a mathematical view. Cambridge University Press, 1995.
[14] J. Cortes, S. Martinez, T. Karatas, and F. Bullo. Coverage control for mobile sensing networks. IEEE
Transactions on Robotics and Automation, 20(2):243 -- 255, April 2004.
10
[15] Franz Aurenhammer. Voronoi diagrams -- a survey of a fundamental geometric data structure. ACM
Computing Surveys (CSUR), 23(3):345 -- 405, 1991.
[16] Takao Ohya, Masao Iri, and Kazuo Murota. Improvements of the incremental method for the voronoi
diagram with computational comparison of various algorithms. Journal of the Operations Research
Society of Japan, 27(4):306 -- 337, 1984.
11
|
0910.3883 | 1 | 0910 | 2009-10-20T16:05:58 | Variance Analysis of Randomized Consensus in Switching Directed Networks | [
"cs.MA",
"cs.DC",
"cs.NI"
] | In this paper, we study the asymptotic properties of distributed consensus algorithms over switching directed random networks. More specifically, we focus on consensus algorithms over independent and identically distributed, directed Erdos-Renyi random graphs, where each agent can communicate with any other agent with some exogenously specified probability $p$. While it is well-known that consensus algorithms over Erdos-Renyi random networks result in an asymptotic agreement over the network, an analytical characterization of the distribution of the asymptotic consensus value is still an open question. In this paper, we provide closed-form expressions for the mean and variance of the asymptotic random consensus value, in terms of the size of the network and the probability of communication $p$. We also provide numerical simulations that illustrate our results. | cs.MA | cs | Variance Analysis of Randomized Consensus in
Switching Directed Networks
Victor M. Preciado, Alireza Tahbaz-Salehi, and Ali Jadbabaie
1
9
0
0
2
t
c
O
0
2
]
A
M
.
s
c
[
1
v
3
8
8
3
.
0
1
9
0
:
v
i
X
r
a
Abstract -- In this paper, we study the asymptotic properties of
distributed consensus algorithms over switching directed random
networks. More specifically, we focus on consensus algorithms
over independent and identically distributed, directed Erdos-
R´enyi random graphs, where each agent can communicate with
any other agent with some exogenously specified probability p.
While it is well-known that consensus algorithms over Erdos-
R´enyi random networks result in an asymptotic agreement over
the network, an analytical characterization of the distribution
of the asymptotic consensus value is still an open question. In
this paper, we provide closed-form expressions for the mean and
variance of the asymptotic random consensus value, in terms of
the size of the network and the probability of communication p.
We also provide numerical simulations that illustrate our results.
I. INTRODUCTION
Due to their wide range of applications, distributed con-
sensus algorithms have attracted a significant amount of at-
tention in the past few years. Besides their applications in
distributed and parallel computation [1], distributed control
[2], and robotics [3], they have also been used as models
of opinion dynamics and belief formation in social networks
[4], [5]. The central focus in this vast body of literature is
to study whether a group of agents in a network, with local
communication capabilities can reach a global agreement,
using simple, deterministic information exchange protocols.1
More recently, there has also been some interest in under-
standing the behavior of consensus algorithms in random set-
tings [7] -- [12]. The randomness can be either due to the choice
of a randomized network communication protocol or simply
caused by the potential unpredictability of the environment
in which the distributed consensus algorithm is implemented
[13]. It is recently shown that consensus algorithms over i.i.d.
random networks lead to a global agreement on a possibly ran-
dom value, as long as the network is connected in expectation
[10].
While different aspects of consensus algorithms over ran-
dom switching networks, such as conditions for convergence
This research is supported in parts by the following grants: DARPA/DSO
SToMP, NSF ECS-0347285, ONR MURI N000140810747, and AFOSR:
Complex Networks Program.
Victor Preciado is with Department of Electrical and Systems Engineer-
ing, University of Pennsylvania, Philadelphia, PA 19104 (e-mail: preci-
[email protected])
Alireza Tahbaz-Salehi is with Department of Economics and Department of
Electrical and Systems Engineering, University of Pennsylvania, Philadelphia,
PA 19104 (e-mail: [email protected]).
Ali Jadbabaie is with the General Robotics, Automation, Sensing and
Perception (GRASP) Laboratory, Department of Electrical and Systems
Engineering, University of Pennsylvania, Philadelphia, PA 19104 (e-mail:
[email protected]).
1For a survey on the most recent works in this area see [6].
[7] -- [10] and the speed of convergence [13], have been widely
studied, a characterization of the distribution of the asymptotic
consensus value has attracted little attention. Two notable
exceptions are Boyd et al. [14], who study the asymptotic
behavior of the random consensus value in the special case of
symmetric networks, and Tahbaz-Salehi and Jadbabaie [15],
who compute the mean and variance of the consensus value
for general i.i.d. graph processes. Nevertheless, a complete
characterization of the distribution of the asymptotic value for
general asymmetric random consensus algorithms remains an
open problem.
In this paper, we study asymptotic properties of consensus
algorithms over a general class of switching, directed random
graphs. More specifically, we derive closed-form expressions
for the mean and variance of the asymptotic consensus value,
when the underlying network evolves according to an i.i.d.
directed Erdos-R´enyi random graph process. In our model,
at each time period, a directed communication link is estab-
lished between two agents with some exogenously specified
probability p. It is well-known that due to the connectivity of
the expected graph, consensus algorithms over Erdos-R´enyi
random graphs result
in asymptotic agreement. However,
due to the potential asymmetry in pairwise communications
between different agents, the asymptotic value of consensus
is not guaranteed to be the average of the initial conditions.
Instead, agents will asymptotically agree on some random
value in the convex hull of the initial conditions. Our closed-
form characterization of the variance provides a quantitative
measure of how dispersed the random agreement point is
around the average of the initial conditions in terms of the
fundamentals of the model, namely, the size of the network
and the exogenous probability of communication p.
The rest of the paper is organized as follows. In the
next section, we describe our model of random consensus
algorithms. In Section III, we derive an explicit expression
for the variance of the limiting consensus value over switching
directed Erdos-R´enyi random graphs in terms of the size of the
network n and the communication probability p. Section IV
contains simulations of our results and Section V concludes
the paper.
II. CONSENSUS OVER SWITCHING RANDOM GRAPHS
Consider the discrete-time linear dynamical system
x (k) = Wk x (k − 1) ,
(1)
where k ∈ {1, 2, . . . } is the discrete time index, x(k) ∈ Rn
is the state vector at time k, and {Wk}∞
k=1 is a sequence of
stochastic matrices. We interpret (1) as a distributed scheme
where a collection of agents, labeled 1 through n, update their
state values as a convex combination of the state values of their
neighbors at the previous time step. Given this interpretation,
xi(k) corresponds to the state value of agent i at time k,
and Wk captures the neighborhood relation between different
agents at time k: the ij element of Wk is positive only if agent
i has access to the state of agent j. For the remainder of the
paper, we assume that the weight matrices Wk are randomly
generated by an independent and identically distributed matrix
process.
We say dynamical system (1) reaches consensus asymptot-
ically on some path {Wk}∞
k=1, if along that path, there exists
x∗ ∈ R such that xi(k) → x∗ for all i as k → ∞. We refer
to x∗ as the consensus value. It is well-known that for i.i.d.
random networks dynamical system (1) reaches consensus on
almost all paths if and only if the graph corresponding to the
communications between agents is connected in expectation.
More precisely, Tahbaz-Salehi and Jadbabaie [10] show that
Wk . . . W2W1 −→ 1dT almost surely − where d is some
random vector − if and only if the second largest eigenvalue
modulus of EWk is subunit. Clearly, under such conditions,
dynamical system (1) reaches consensus with probability one
where the consensus value is a random variable equal to
x∗ = dT x(0), where x(0) is the vector of initial conditions.
A complete characterization of the random consensus value
x∗ is an open problem. However, it is possible to compute its
mean and variance in terms of the first two moments of the
i.i.d. weight matrix process. In [15], the authors prove that the
conditional mean of the random consensus value is given by
the random consensus value are given by
Ex∗ = x(0)T v1(EWk),
and its conditional variance is equal to
var(x∗) = [x(0) ⊗ x(0)]T vec(cov(d))
(2)
v1(E [Wk ⊗ Wk]) − [x(0)T v1(EWk)]2
= [x(0) ⊗ x(0)]T
where v1 (·) denotes the normalized left eigenvector corre-
sponding to the unit eigenvalue, and ⊗ denotes the Kronecker
product. In the following, we shall use (2) to derive an explicit
expression for the mean and variance of the consensus value
over a class of switching, directed random graphs..
III. VARIANCE ANALYSIS FOR FINITE ERD OS-R ´ENYI
RANDOM GRAPHS
A. Directed Erdos-R´enyi Random Graphs
We consider directed graphs G = (V, E) with a fixed set of
vertices V = {1, ..., n} and directed edges. A directed edge
from vertex i to vertex j is representes as an ordered pair
(i, j), with i, j ∈ V . In a directed Erdos-R´enyi (ER) graph
G (n, p), the existence of a directed edge (i, j) , with i 6= j, is
determined randomly and independently of other edges with
a fixed probability p ∈ [0, 1]. The adjacency matrix A = [aij]
associated to G (n, p) is a random matrix with all zeros in the
diagonal, and off-diagonal elements aij = 1 with probability
p, and 0 with probability 1 − p, for i 6= j. Similarly, the out-
degree matrix can be defined from the adjacency matrix as
D =diag{di}, where di =Pj aij.
2
In what follows, we associate a sequence of stochastic
k=1 to a sequence of i.i.d random realizations
k=1. To each random graph
matrices {Wk}∞
of directed ER graphs {Gk (n, p)}∞
realization, we associate the following stochastic matrix:
Wk = (Dk + In)−1 (Ak + In) ,
(3)
where Ak and Dk are the adjacency and out-degree matrices
of the graph realization. Notice that adding the identity matrix
to the adjacency in (3) is equivalent to introduce a self-loops
(an edge that starts and ends at the same vertex) over every
single vertex in V . These self-loops serve to avoid singularities
associated with the presence of isolated nodes in Gk (n, p) (for
which di = 0, and Dk is not invertible).
B. Variance of Consensus Value
In this section, we derive an explicit expression for the
variance of the limiting consensus value for a switching
directed random graph. We base our analysis in studying the
terms in (2), i.e., v1 (EWk) and v1 (E [Wk ⊗ Wk]). In order
to compute v1 (EWk), we first compute the expectation of
each entry in Wk. The expectation of the diagonal entries of
Wk are equal to E [1/ (di + 1)], where di is a random variable
representing the degree of the i-th node. In a random ER graph
with probability of link p (and complement q , 1 − p), the
probability density of di is a Bernoulli distribution with n − 1
trials and parameter p, i.e., f (di) ∼ Ber (n − 1, p). Hence,
Ewii = E(cid:20)
1
di + 1(cid:21) =
n−1
Xk=0
1
k + 1(cid:18)n − 1
k (cid:19)pkqn−k−1
, f1 (p, n) ,
(4)
=
1 − qn
np
where we have defined f1 for future convenience. Furthermore,
the off-diagonal elements of EWk are equal to
Ewij = E(cid:20) aij
di + 1(cid:21) = E(cid:20)
aij = 1(cid:21) P (aij = 1) ,
where we have applied the law of total expectation in the last
equality. Moreover, it is straightforward to show that f (di −
1aij = 1) ∼ Ber(n − 2, p); thus,
1
di + 1(cid:12)(cid:12)(cid:12)(cid:12)
Ewij = p
n−2
Xk=0
1
k + 2(cid:18)n − 2
k (cid:19)pkqn−k−2
=
qn + np − 1
np (n − 1)
=
1 − f1 (p, n)
n − 1
.
(5)
Taking (4) and (5) into account, we can write EWk as follows:
EWk = Ewij 1n1T
n + (Ewii − Ewij ) In
=
1 − f1 (p, n)
n − 1
1n1T
n −
1 − n f1 (p, n)
n − 1
In.
It is easy to verify that EWk is irreducible. Therefore, as
discussed in the previous section, consensus algorithms over
i.i.d. directed Erdos-R´enyi random graph process converge to
consensus with probability one. Moreover, it is straightfor-
ward to show that vector 1n satisfies the eigenvalue equation
1T
n
EWk = 1T
n ; thus,
v1 (EWk) =
1
n
1n.
(6)
3
Therefore, as expected, the mean of the random consensus
value is equal to the average of x (0), i.e.,
Ex∗ =
1
n
n
Xi=1
xi (0) , ¯x (0) .
(7)
The other term in the expression of variance that we need to
compute is v1(E [Wk ⊗ Wk]). In order to compute this vector,
we first compute the entries of matrix E [Wk ⊗ Wk], which are
of the form E(wij wrs), with i, j, r and s ranging from 1 to n.
The entries can be classified into six different cases depending
on the relations between the indices. Below, we present the
expressions for each case. Some of the expressions are in terms
of the hypergeometric function 3F2(1, 1, 1−n; 2, 2; p/(p−1)),
which for convenience we denote by H(p, n), defined as the
power series
H(p, n) =
n−1
Xk=0
1
(k + 1)2(cid:18)n − 1
k (cid:19)(cid:18) p
1 − p(cid:19)k
.
Fig. 1. The pattern of E[Wk ⊗ Wk] for n = 3. The numbers in parentheses
represent the value of each entry in terms of expressions Q1 to Q6 defined
in (8). The entries that are different from the corresponding entries of K ⊗ K
are marked with bold lines.
In the following expressions we assume that all four indices
i, j, r and s are distinct. Detailed computations are provided
in the Appendix.
Lemma 1: The left eigenvector of E [Wk ⊗ Wk] corre-
sponding to its unit eigenvalue is given by
Q1 = E(w2
Q2 = E(wiiwjj ) = f 2
Q3 = E(wiiwis) = E(wij wii) = E(w2
ii) = qn−1H(p, n),
1 (p, n),
ij )
=
f1(p, n) − qn−1H(p, n)
n − 1
,
Q4 = E(wiiwri) = E(wiiwrs) = f1(p, n)
1 − f1(p, n)
Q5 = E(wij wis) =
(n − 1)(n − 2)
n − 1
1 + 2qn−1H(p, n) − 3f1(p, n)
,
Q6 = E(wij wji) = E(wij wjs) = E(wij wri)
n − 1 (cid:19)2
= E(wij wrj) = E(wij wrs) =(cid:18) 1 − f1(p, n)
.
As stated earlier, every entry of E[Wk ⊗ Wk] is equal to
one of the expressions provided in (8). The key observation
is the pattern that such classification of entries induces in the
matrix. In order to clarify this point, we illustrate this pattern
for n = 3, where the numbers in parenthesis correspond to
one of the six cases identified above. As the figure suggests,
the entries of E[Wk ⊗Wk] are identical to the entries of K ⊗K
except for those at the rows 1 + r(n + 1) for r = 0, ..., n − 1,
where matrix K ∈ Rn×n is defined as
K =
1 − f1(p, n)
n − 1
1n1T
n +
nf1(p, n) − 1
n − 1
In,
with f1(p, n) as its diagonal, and [1 − f1(p, n)]/(n − 1) as its
off-diagonal entries. In Fig. 1, the entries of E[Wk ⊗ Wk] that
are different from the entries of K ⊗ K are marked with bold
lines.
We now exploit the identified pattern to explicitly compute
the left eigenvector v1(E[Wk ⊗ Wk]).
(8)
v1(E[Wk ⊗ Wk]) =
1
δ "ρ(1n⊗1n) + (1 − ρ)
n
Xi=1
(ei ⊗ ei)#
(9)
where ρ and δ depend on p and n as follows:
ρ(p, n) ,
p(n − 1)
p(n − 2) + 1 − (1 − p)n ,
δ(p, n) , n + n(n − 1)ρ(p, n).
(10)
(11)
Proof: First of all, notice that E[Wk ⊗Wk] is a stochastic
matrix whose entries are all strictly positive for p > 0.
Therefore, it has a unique left eigenvector corresponding to its
unit eigenvalue, which means that v1(E[Wk ⊗ Wk]) is well-
defined. We now show that the pattern of this left eigenvector
is of the form
v = α(1n⊗1n) + (β − α)
(ei ⊗ ei),
(12)
n
Xi=1
for some positive numbers α and β. Notice that all entries
of this vector are equal to α, except for the ones indexed
1 + r(n + 1) for r = 0, ..., n − 1, which are equal to β. To
show that the eigenvector we are looking for is indeed of the
given pattern, we premultiply E[Wk ⊗ Wk] by v, and verify
that
vT E[Wk ⊗Wk] = α′(1 ⊗ 1)T +(β ′ −α′)
(ei ⊗ei)T . (13)
n
Xi=1
where α′ and β ′ are positive numbers, given by
(cid:20)α′
β ′(cid:21) =(cid:20)A B
C D(cid:21)(cid:20)α
β(cid:21)
(14)
with coefficients A, B, C, and D defined as
and therefore,
A = 1 + [nf1(p, n) + n − 2]
1 − f1(p, n)
(n − 1)2
B =
1 − f1(p, n)
n − 1
C = [nf1(p, n) + n − 2]
D = f1(p, n)
1 − f1(p, n)
n − 1
Equation (13) suggests that the pattern of v1 is preserved when
it is multiplied by E[Wk ⊗ Wk]. Therefore, the vector defined
in (12) is the unique left eigenvector of the matrix if there are
positive numbers α = α′ and β = β ′ that satisfy (14).
Due to the fact BC = (1−A)(1−D), the matrix in (14) has
an eigenvalue equal to one, with eigenvector (cid:2)B 1 − A(cid:3)T ,
implying that such (α, β, α′, β ′) exist. Thus, the proposed
vector in (12) is an eigenvector of E[Wk ⊗ Wk] as long as
α = βB/(1 − A) = ρ(p, n)β, which means that
v1(E[Wk ⊗ Wk]) =
1
δ "ρ(1n⊗1n) + (1 − ρ)
(ei ⊗ ei)# .
n
Xi=1
Note that δ(p, n), defined in (11), is a normalizing factor
guaranteeing that the elements of the vector sum up to one.
Now that we have derived explicit expressions for the
eigenvectors (6) and (9), we can compute a closed-form
expression for the variance of the limiting consensus value
in terms of p and n.
Theorem 2: The variance of the asymptotic consensus value
x∗ of the distributed update defined in (1) over switching
Erdos-R´enyi random graphs with parameter p is given by
var(x∗) =
1 − ρ
δ
n
Xi=1
[xi(0) − ¯x(0)]2 ,
(15)
where ρ(p, n) and δ(p, n) are defined in (10) and (11),
respectively.
Proof: First, from (6), we have that
(cid:2)x(0)T v1(EWk)(cid:3)2
= 1
n
n
Xi=1
xi(0)!2
= ¯x(0)2.
On the other hand, from (9), we have that
[x(0) ⊗ x(0)]T
v1 (E[Wk ⊗ Wk]) =
[x(0) ⊗ x(0)]T "ρ(1n⊗1n) + (1 − ρ)
[x(0)T 1n] ⊗ [x(0)T 1n]
(ei ⊗ ei)#
n
Xi=1
=
=
1
δ
ρ
δ
n
+
1 − ρ
δ
Xi=1(cid:0)[x(0)T ei] ⊗ [x(0)T ei](cid:1) ,
where we have used the fact that (A⊗B)(C⊗D) = AC⊗BD.
Since the Kronecker terms in the last expression are scalars,
we have
[x(0)⊗x(0)]T v1(E[Wk⊗Wk]) =
ρ
δ
n2 ¯x(0)2+
1 − ρ
δ
n
Xi=1
x2
i (0)
4
[xi(0)]2.
var(x∗) =(cid:16) ρ
δ
n2 − 1(cid:17) [¯x(0)]2 +
1 − ρ
δ
n
Xi=1
By adding and subtracting n 1−ρ
the variance can be rewritten as
δ [¯x (0)]2, the expression for
var x∗ =
n(n − 1)ρ + n − δ
[¯x(0)]2
+
1 − ρ
δ
δ
n
Xi=1
(xi(0) − ¯x(0))2 .
Since δ = n + n(n − 1)ρ, as defined in (11), the first term in
the right-hand-side of the above expression is equal to zero.
This proves the theorem.
Expression (15) shows that, given the parameters of the
random graph process p and n, the variance of the limiting
consensus value, x∗, is equal to the empirical variance of the
initial conditions multiplied by the factor n(1 − ρ)/δ, which
only depends on parameters p and n.
IV. NUMERICAL SIMULATIONS
In this subsection, we present several simulations that il-
lustrate the result in Theorem 2. In our first simulation, we
compare the analytical expression for the variance in (15)
with the empirical variance obtained from 100 realizations of
the random consensus algorithm for n in a certain range. In
our simulations, we compute the (analytical and empirical)
variances for a range of network sizes while keeping the
expected out-degree of the random graphs fixed to a constant
value c (i.e., the probability communication in the random
graphs is then p = c/n, for all n). In Fig. 1, we plot both the
analytical and empirical variances when the network sizes n
goes from 5 to 50 nodes and the expected degree is fixed to
be c = 5, for all n. The initial conditions for each network
size is given by xi (0) = i/n, for i = 1, ..., n.
Several comments are in order about
the behavior of
var (x∗) in Fig. 1. First, for n = c = 5, we have that
p = c/n = 1 (every link exist); hence, the random graph
is not random, but a complete graph Kn, and the distributed
consensus algorithm converges to the average of the initial
conditions with zero variance (as one can check in Fig. 1).
Second, when n is slightly over c, the variance increases quite
abruptly with n until it reaches a maximum value. For c = 5,
this maximum is achieved for a network size of 9 nodes. The
location of this interesting point, that we denote by n (c), can
be easily computed using Theorem 2. Furthermore, for n >
n(c) the variance slowly decreases with the network size. One
can prove that this variance tends asymptotically to zero as
n → ∞ at a rate 1/n.
Furthermore, according to (15), given a vector of x (0)
initial condition, the variance of the asymptotic consensus
value is equal to the empirical variance of the entries of x (0)
rescaled by the factor n (1 − ρ) /δ (where ρ and δ depend on
the random graph parameters p and n). In Fig. 2, we plot the
5
While different aspects of consensus algorithms over random
switching networks, such as conditions for convergence and
the speed of convergence, have been widely studied, a charac-
terization of the distribution of the asymptotic consensus for
general asymmetric random consensus algorithms remains an
open problem.
In this paper, we have derived closed-form expressions for
the expectation and variance of the asymptotic consensus value
as functions of the number of nodes n and the probability of
existence of a communication link, p. While the expectation
of the distribution of the consensus value is simply the mean
of the initial conditions over the nodes of the network, the
variance presents an interesting structure. In particular, the
variance of this limiting distribution of the consensus value is
equal to the empirical variance of the set of initial conditions
multiplied by a factor that depends on p and n. We have
derived an explicit expression for this factor and check its
validity with numerical simulations.
APPENDIX
KRONECKER MATRIX ENTRIES
The Appendix contains the detailed computation of the
entries of matrices EWk and E[Wk ⊗ Wk]. We start by
computing the elements of EWk. The diagonal entries of EWk
are given by:
Fig. 2.
variance for n in the interval [5:50] and p = 5/n for all n.
Comparison between the empirical variance and the analytical
Fig. 3. Several analytical variance for c ∈ {5, 6, 7, 8, 9, 10}.
=
n−1
1
1
1 + di(cid:21) =
Ewii = E(cid:20)
Xk=0
k + 1(cid:18)n − 1
k (cid:19)pk(1 − p)n−k−1
Xk=0
P(di = k)
k + 1
n−1
=
1
1 − qn
np
, f1(p, n)
values of the factor n (1 − ρ) /δ for a set of expected degrees
c ∈ {5, 6, 7, 8, 9, 10} while the network size n varies from 5
to 70. We observe that the behavior of the factor n (1 − ρ) /δ
is similar for any given c. Again, for n = c the variances are
zero and the variances grow abruptly until a maximum, n (c),
is reached. For large values of n, the variance slowly decays
towards zero at a rate 1/n for all c.
On the other hand, the non-diagonal entries of EWk result in:
Ewij =
1
n − 1
[1 − Ewii] =
np − 1 + qn
np(n − 1)
=
1 − f1(p, n)
n − 1
We now turn to the computation of the elements of E[Wk ⊗
Wk], which are of the form E(wij wrs). In what follows we
assume that the indices i, j, r, and s are distinct. We first start
with elements with in the diagonal subblocks of E[Wk ⊗ Wk]:
V. CONCLUSIONS AND FUTURE WORK
We have studied the asymptotic properties of the consensus
value in distributed consensus algorithms over switching, di-
rected random graphs. Due to the connectivity of the expected
graph, consensus algorithms over Erdos-R´enyi random graphs
result in asymptotic agreement. However, the asymptotic value
of consensus is not guaranteed to be the average of the initial
conditions. Instead, agents will asymptotically agree on some
random value in the convex hull of the initial conditions.
Ew2
ii = E(cid:20)
Xk=0
n−1
=
1
(di + 1)2(cid:21)
(k + 1)2(cid:18)n − 1
1
= qn−1H(p, n)
k (cid:19)pkqn−k−1
For the rest of entries in the diagonal blocks, it is useful to
note that Ewii = f1(p, n) and Ewij = 1−f1(p,n)
, as proved
n−1
6
[7] Y. Hatano and M. Mesbahi, "Agreement over random networks," IEEE
Transactions on Automatic Control, vol. 50, no. 11, pp. 1867-1872, 2005.
[8] C. W. Wu, "Synchronization and convergence of linear dynamics in
random directed networks," IEEE Transactions on Automatic Control,
vol. 51, no. 7, pp. 1207-1210, Jul. 2006.
[9] M. Porfiri and D. J. Stilwell, "Consensus seeking over random weighted
directed graphs," IEEE Transactions on Automatic Control, vol. 52, no.
9, pp. 1767-1773, sep 2007.
[10] A. Tahbaz-Salehi and A. Jadbabaie, "A necessary and sufficient con-
dition for consensus over random networks," IEEE Transactions on
Automatic Control, vol. 53, no. 3, pp. 791-795, Apr 2008.
[11] G. Picci and T. Taylor, "Almost sure convergence of random gossip
algorithms," in Proceedings of the 46th IEEE Conference on Decision
and Control, New Orleans, LA, dec 2007, pp. 282-287.
[12] D. Acemoglu, A. Ozdaglar, and A. ParandehGheibi, "Spread of
(mis)information in social networks," Massachusetts Institute of Tech-
nology, LIDS Report 2812, May 2009, submitted for Publication.
[13] F. Fagnani and S. Zampieri, "Randomized consensus algorithms over
large scale networks," IEEE Journal on Selected Areas in Communica-
tions, vol. 26, no. 4, pp. 634-649, May 2008.
[14] S. Boyd, A. Gosh, B. Prabhakar, and D. Shah, "Randomized gossip
algorithms," Special issue of IEEE Transactions on Information Theory
and IEEE/ACM Transactions on Networking, vol. 52, no. 6, pp. 2508-
2530, Jun. 2006.
[15] A. Tahbaz-Salehi and A. Jadbabaie, "Consensus over ergodic station-
ary graph processes," IEEE Transactions on Automatic Control, 2009,
Accepted for Publication.
in Subsection III-B:
E(wiiwrr) = Ewii Ewrr = f 2
1 (p, n)
E(wiiwri) = Ewii Ewri = f1(p, n)
E(wiiwrs) = Ewii Ewrs = f1(p, n)
1 − f1(p, n)
n − 1
1 − f1(p, n)
n − 1
E(wiiwis) =
Ewii − Ew2
ii
n − 1
=
f1(p, n) − qn−1H(p, n)
n − 1
Similarly, we have the following results for the off-diagonal
subblocks:
n − 1 (cid:19)2
E(wij wji) = Ewij Ewji =(cid:18) 1 − f1(p, n)
n − 1 (cid:19)2
E(wij wjs) = Ewij Ewjs =(cid:18) 1 − f1(p, n)
n − 1 (cid:19)2
E(wij wri) = Ewij Ewri =(cid:18) 1 − f1(p, n)
n − 1 (cid:19)2
E(wij wrj) = Ewij Ewrj =(cid:18) 1 − f1(p, n)
n − 1 (cid:19)2
E(wij wrs) = Ewij Ewrs =(cid:18) 1 − f1(p, n)
E(wij wii) = E(wiiwis) =
f1(p, n) − qn−1H(p, n)
n − 1
E(w2
ij ) = E"
a2
ij
(di + 1)2# = E(cid:20)
aij
(di + 1)2(cid:21)
n − 1
= E(wiiwij ) =
f1(p, n) − qn−1H(p, n)
E(wij wis) =
=
Ewij − Ew2
ij − E(wij wii)
n − 2
1 + 2qn−1H(p, n) − 3f1(p, n)
(n − 1)(n − 2)
REFERENCES
[1] J. N. Tsitsiklis, Problems in decentralized decision making and com-
putation, Ph.D. dissertation, Massachusetts Institute of Technology,
Cambridge, MA, 1984.
[2] A. Jadbabaie, J. Lin, and A. S. Morse, "Coordination of groups of mobile
autonomous agents using nearest neighbor rules," IEEE Transactions on
Automatic Control, vol. 48, no. 6, pp. 988-1001, 2003.
[3] J. Cortes, S. Martinez, and F. Bullo, "Analysis and design tools for dis-
tributed motion coordination," in Proceedings of the American Control
Conference, Portland, OR, Jun. 2005, pp. 1680-1685.
[4] M. H. DeGroot, "Reaching a Consensus," Journal of American Statisti-
cal Association, vol. 69, no. 345, pp. 118-121, Mar. 1974.
[5] B. Golub and M. O. Jackson, "Naive learning in social networks:
Convergence, influence, and the wisdom of crowds," 2007, unpublished
Manuscript.
[6] R. Olfati-Saber, J. A. Fax, and R. M. Murray, "Consensus and cooper-
ation in networked multi-agent systems," Proceedings of the IEEE, vol.
95, no. 1, Jan. 2007.
|
1511.00053 | 1 | 1511 | 2015-10-31T01:00:35 | CarPed -- A Hybrid and Macroscopic Traffic and Pedestrian Simulator | [
"cs.MA"
] | Dense human flow has been a concern for the safety of public events for a long time. Macroscopic pedestrian models, which are mainly based on fluid dynamics, are often used to simulate huge crowds due to their low computational costs (Columbo & Rosini 2005). Similar approaches are used in the field of traffic simulations (Lighthill & Whitham 1955). A combined macroscopic simulation of vehicles and pedestrians is extremely helpful for all-encompassing traffic control. Therefore, we developed a hybrid model that contains networks for vehicular traffic and human flow. This comprehensive model supports concurrent multi-modal simulations of traffic and pedestrians. | cs.MA | cs | 1
CarPed – A hybrid and macroscopic traffic and pe-
destrian simulator
Daniel H. Biedermann1 und Peter M. Kielar1 und Quirin Aumann1 und Carlos M. Osorio1
und Celeste T. W. Lai1
1Lehrstuhl für Computergestützte Modellierung und Simulation · Technische Universität München ·
Arcisstrasse 21 · 80333 München
[email protected]
Zusammenfassung
Dichte Personenströme sind ein bekanntes Gefährdungsrisiko für öffentliche Grossveran-
staltungen. Makroskopische Personenstrommodelle, die häufig auf fluid-dynamischen Be-
rechnungen basieren, können mit geringem Rechenaufwand simuliert werden. Aus diesem
Grund werden sie oft für die Simulation grosser Menschenmengen verwendet (COLUMBO &
ROSINI 2005). Ähnliche Ansätze existieren im Forschungsbereich der Verkehrssimulation
(LIGHTHILL & WHITHAM 1955). Eine gekoppelte makroskopische Simulation von Fahrzeu-
gen und Fussgängern ist für eine allumfassende Verkehrsüberwachung und Planung sehr
hilfreich. Aus diesem Grund haben wir ein Hybridmodell entwickelt, das Netzwerke für
Fahrzeuge und Fussgänger bereitstellt. Dieses gekoppelte Modell unterstützt die gleichzeiti-
ge Simulation von Fahrzeug- und Personenverkehr.
Abstract
Dense human flow has been a concern for the safety of public events for a long time. Mac-
roscopic pedestrian models, which are mainly based on fluid dynamics, are often used to
simulate huge crowds due to their low computational costs (COLUMBO & ROSINI 2005).
Similar approaches are used in the field of traffic simulations (LIGHTHILL & WHITHAM
1955). A combined macroscopic simulation of vehicles and pedestrians is extremely helpful
for all-encompassing traffic control. Therefore, we developed a hybrid model that contains
networks for vehicular traffic and human flow. This comprehensive model supports concur-
rent multi-modal simulations of traffic and pedestrians.
1
Introduction
1.1 Motivation
Every year, about 2000 people die due to the movement of large human crowds (HUGHES
2003). The growing eventisation of social and public life in the 21st century (HITZLER
2010) increases the probability and frequency of organized events attended by thousands or
millions of people. In the past, fatal accidents have occurred repeatedly at such large events.
Examples include the catastrophe in the Heysel stadium in 1985 (LEWIS 1989) with 39
fatalities or the Loveparade disaster in 2010 with 21 deaths (HITZLER ET AL. 2011). Profes-
sional crowd control increases the safety of public events and lowers the probability of fatal
2
Daniel H. Biedermann, Peter M. Kielar, Quirin Aumann, Carlos M. Osorio, Celeste T.W. Lai
accidents in the context of large human flows. Pedestrian dynamics simulations support
successful crowd management by helping organizers of public events to foresee and pre-
vent dangerous situations. Macroscopic pedestrian dynamic models like the Hartmann-
Sivers model (HARTMANN & SIVERS 2013) are most suitable for simulating large numbers
of people (BIEDERMANN ET AL. 2014A). The same macroscopic model can be applied to
simulate the motion of cars. By combining human and vehicular flow into one model, we
can achieve an all-embracing simulation model, which covers crowd and traffic control at
the same time. Due to the macroscopic nature of these simulation models, we can simulate
very large and dense scenarios faster than real time.
1.2 Current Hybrid Modeling
Two different kinds of hybrid modeling exist in the field of traffic and crowd control. The
first type combines traffic or pedestrian dynamcis models at different scales in order to
reduce the overall computational effort. This means that simulations in the hazardous areas
of the scenario (places with high densities or small bottlenecks) are calculated with very
detailed but computationally costly models. At the same time, less hazardous areas of the
scenario can be simulated by less detailed but more cost-effective models. This provides us
precious results in the interesting parts of the scenario with a reduced total computational
cost. TOLBA ET AL. (2005) as well as MCCRE & MOUTARI (2010) developed such hybrid
models in the field of vehicular flow. Similar models were developed for pedestrian dynam-
ics. A wide range of hybrid modeling exists; from the coupling of very specific pedestrian
simulation models (e.g. NGUYEN ET AL. 2012)
to generic coupling frameworks
(BIEDERMANN ET AL. 2014B). An overview of the current state of the art can be found by
IJAZ ET AL. (2015).
The second type of hybrid modeling does not combine different scales, but different kinds
of simulations. GALEA ET AL. (2008) describe the coupling of pedestrian dynamics and fire
simulations and GÖTTLICH ET AL. (2011) combine an evacuation simulation with the spread
of hazardous gases. Our approach is the connection of vehicular traffic with human flow.
Some studies have already been carried out in this field. PRETTO ET AL. (2011) coupled
agent-based representations of pedestrians and cars. A macroscopic approach was devel-
oped by BORSCHE ET AL. (2014). They used the classic Lighthill-Whitham-Richards model
(LIGHTHILL & WHITHAM 1955; RICHARDS 1956) for the vehicular flow and the model from
HUGHES (2002) for the macroscopic simulation of pedestrians. Their work is important
progress in the field of hybrid macroscopic modeling. However, they considered vehicles
and humans as two interacting, but separate flows. In reality, cars and pedestrians are not
completely separate: drivers exit their cars after finishing driving and become pedestrians
and pedestrians may enter their vehicles to become drivers. Our approach is a hybrid mod-
el, which is capable of converting humans and vehicles into each other to create a realistic
simulation model.
2 The hybrid simulation model CarPed
2.1 The Hybrid approach
It is important to use a single network that combines pedestrian and traffic simulations to
enhance the safety of traveling to public events. Therefore, we introduce an interface which
CarPed – A hybrid and macroscopic traffic and pedestrian simulator
3
links human and vehicular flow. The movement behavior of cars and pedestrians is based
on the macroscopic Hartmann and Sivers model (HARTMANN & SIVERS 2013) and is calcu-
lated on a discrete network. Roads for cars and walking paths for pedestrians are represent-
ed by the edges of this network. Its nodes represent the links between the different edges
and can be considered crossings. Specifically, the nodes have different flow rates. There are
special nodes, which represent parking lots, and serve as a connection between roads and
walkways. Visitors of the event enter and leave their cars there. To put it another way, the
simulated subjects get transformed from vehicles into pedestrians and vice versa. Therefore,
the parking lots serve as a connection of the traffic and pedestrian networks.
In Figure 1, an exemplary network is shown. The darker nodes and edges represent streets
and their respective intersections, whereas the pedestrians’ walkways and intersections are
represented in a lighter gray. The transformation of cars and pedestrians is carried out at
special parking lot nodes. Green numbered entry nodes represent sources, which are the
starting points of the visitors (e.g. their hometown). The red marked exit node is the final
destination of the visitors (e.g. a large public event), where they are deleted from the net-
work.
Figure 1: An exemplary network consisting of nodes and edges
We implemented the Hartmann and Sivers model for pedestrian simulation and extended it
to traffic simulation by using different model parameters. The extension was done by ap-
plying different maximum capacities to the edges and nodes, using different free flow ve-
locities and other model constants for the simulated subjects. We used data obtained from
WEIDMANN (1993) for the pedestrians and data from WACHS ET AL. (2000) for the vehicle
simulation. Additionally, we conducted a large field study to receive sufficient data for the
transformation process (see Section 3).
2.2 The Hartmann-and-Sivers Model
The Hartmann and Sivers model adopts a structured continuum model on a macroscopic
level. The approach basically relies on fundamental diagrams – the relation between fluxes
and local densities – as well as the explicit consideration of individual velocities; thus
showing better agreement with microscopic pedestrian models (HARTMANN AND SIVERS
2013). The free flow velocity vff is an individual property of each pedestrian / vehicle, i.e. a
macroscopic, time independent state variable attached to each individual. The free flow
velocity describes the highest velocity an individual can reach under optimal circumstances.
4
Daniel H. Biedermann, Peter M. Kielar, Quirin Aumann, Carlos M. Osorio, Celeste T.W. Lai
This property is distributed normally among pedestrians or cars. Thus for modelling human
or vehicular flow, the following equation holds
;
tx
),
(
∂
ρ
v
ff
t
∂
(
vv
(
+
∂
x
∂
;
ρ
tx
,(
))
(
ρ
v
;
tx
),
ff
ff
)
=
vf
(
ff
;
tx
),
The total density of subjects is given by the sum of densities for all free flow velocities.
ρ
tx
),(
max
ffv
∫=
0
;(
νρ
dtx
),
ν
The fundamental relation between velocity and density can be adopted according to:
(1)
(2)
(3)
;
ff
)))
1(
−
−
/1
)
ρ
vv
(
v
= ff
exp(
/1(
maxρργ
The maximum density 𝜌𝑚𝑚𝑚 and the factor 𝛾 are unique parameters for cars and pedestri-
ans. The solvation of the differential equations for pedestrians and cars was done by an
upwind-downwind finite volume scheme (HARTMANN & SIVERS 2013).
2.3 Routing Behavior of Pedestrian and Cars
In their original paper, Hartmann and Sivers used fixed probability values to distribute the
pedestrians at each intersection. These values were obtained by comparing the capacities of
the adjacent edges and did not take the current density of those edges into account. It is
possible that the majority of a flow gets directed into an edge which is already relatively
full, and the required time for the flow to pass the system could increase in an unrealistic
way. Therefore, we extend this approach and introduce a routing algorithm which deter-
mines the possible edges the pedestrians or cars will be allocated at.
To find the fastest path through the system, we use the classical Dijkstra’s algorithm
(DIJKSTRA 1959). This algorithm weighs all edges of the graph to compute the shortest way
through the system. We used the Dijkstra’s algorithm to calculate the route with the shortest
factors:
weight =
length
( ρffvv
)
;
travel time. Therefore, we used the length and the current velocity 𝑣(𝑣𝑓𝑓;𝜌) as weighting
With increasing density the velocity 𝑣(𝑣𝑓𝑓;𝜌) decreases according to Equation (2). If the
density of an edge reaches the maximum density 𝜌𝑚𝑚𝑚, the edge is considered as closed.
Closed edges are ignored for the calculation of the routing algorithm.
2.4 Transformation between the two simulation models
Cars get transformed into pedestrians and vice versa in the parking lot nodes. Typically, for
ordinary cars, one to five people get out of each vehicle, with a prescribed random distribu-
tion. The distribution for the transformation was gathered from field data (see Section 3). It
is also possible to transform incoming pedestrians into cars, using the inverse process. The
transformed pedestrians and cars receive their individual parameters, like their free flow
(4)
CarPed – A hybrid and macroscopic traffic and pedestrian simulator
5
velocity or their maximum density, according to WEIDMANN (1993) respectively WACHS ET
AL. (2000).
3 Visitor distribution of incoming cars
Figure 2: The distribution according to the total number of cars counted and the distribu-
tion according to the total number of passengers.
Pedestrians get transformed into cars and vice versa on special parking nodes in the graph
based scenario. To model a realistic transformation of pedestrians and cars, it is necessary
to know the distribution of passengers per car. This means, that we have to know how many
visitors are normally transported by one car. Therefore, we conducted an extensive field
study to obtain the lacking data. We studied a large music festival in Munich over three
consecutive days and counted the amount of visitors per car. We surveyed a total number of
1960 cars (for details see Table 1), which carried an average of 2.21 persons. Over 70% of
the vehicles were occupied by one or two passengers. A negligible amount of cars trans-
ported more than five people, and the maximum observed was eight passengers per car. The
observed distributions from all three days can be seen in Figure 2. This data was used as a
configuration for the transformation process of the hybrid model.
Date
Visitors
29.05.2015
30.05.2015
31.05.2015
1
144
98
210
2
190
263
526
3
53
62
158
4
33
54
98
5
11
15
36
62
Table 1: Number of visitors per car on the music festival “Rockavaria”
otal
979
452
273
185
>5
4
3
2
9
Total
435
495
1030
1960
4 The CarPed-Toolbox
4.1 Structure and usability
6
Daniel H. Biedermann, Peter M. Kielar, Quirin Aumann, Carlos M. Osorio, Celeste T.W. Lai
In cooperation with professional and experienced event managers, the software toolbox
CarPed was developed as a proof of concept. Great attention was payed towards usability.
Therefore, we implemented an intuitive and easy to use graphical user interface (GUI).
The GUI is divided into three major parts, namely the network input, the model and solving
options and the result window. The network, consisting of nodes and edges, can be easily
entered through the network input. All network depending properties, like the length or the
capacity of an edge, can be determined immediately after the input procedure. By using the
model and solving options window, the user can determine which computational method
should be used and how the data should be processed. Finally, the computed results can be
accessed and visualized in the viewer. As all computed data is stored, the density distribu-
tion for each time-step can be looked at by the user. Different coloring of the edges shows
the current densities. Alternatively, the user can click on an edge or node to get more de-
tailed information about this object like the amount of pedestrians or cars on it. An exem-
plary screenshot of the GUI can be seen in Figure 3.
Figure 3: Representation of an exemplary simulation scenario in CarPed
4.2 Workflow
The network can be entered by clicking on the designated area in the GUI. Special nodes,
like entry and exit nodes or parking lots, can be defined by the user. Additionally, the nodes
can be linked to incoming or outgoing edges. If the input to the system is finished, a check-
ing routine searches for errors and discrepancies. For each algorithm, the user can individu-
ally modify the settings. After everything is set up, the solver begins its calculations.
At the beginning of the simulation, the network model reads the information of nodes and
edges from the database previously created. It constructs a network from the infrastructure
and passes the entire network to the numerical solver. Together with the received input
data, the numerical solver starts generating vehicles and pedestrians in the associated entry
nodes. It determines the initial density for each edge that is connected to the entry node and
computes the density distribution. For each time-step, the results are passed from the nu-
merical solver and stored in the network model. If a subject enters a node, it gets removed
CarPed – A hybrid and macroscopic traffic and pedestrian simulator
7
from this incoming edge and is put into an outgoing edge according to the route calculated
by the Dijkstra algorithm. Additionally, the subject gets transformed if the visited node is a
parking lot. The computations are repeated until all pedestrians and cars have reached an
exit node and are dismissed from the system.
During the result analysis, the GUI displays two visions: a parameter set and an animation
of density distributions. All statistical information is provided by the toolbox and can be
easily accessed.
5 Conclusion and Outlook
This paper describes the dedicated hybrid and macroscopic simulation approach CarPed.
This approach uses the macroscopic Hartmann and Sivers model on a network of nodes and
edges. It is able to simulate human and vehicular flow in one hybrid model. The transfor-
mation between pedestrians and cars is carried out at special nodes, which represent park-
ing lots.
The tool is thought to play a fundamental rule in the planning phase of massive public
events. Organizers can use it to identify pathways and roads, which have a higher risk of
congestions. Therefore, the organizers can develop strategies to avoid dangerous situations.
In future studies, the current approach will be extended to a hybrid model for all-
encompassing traffic control. This extended hybrid model will include more traffic sub-
jects, like trains or ships to receive a global and universal traffic simulator.
Additionally, the CarPed simulator needs to be validated by field data. Therefore, we ob-
served a public music festival over two consecutive years (BIEDERMANN ET AL. 2015). The
first results are promising, but need further investigations.
Acknowledgements
We would like to thank Isabella von Sivers for her support and long conversations accord-
ing to this topic. Additionally, we would like to thank Andrea Mayer, Andreas Riedl and
our other student assistants for their help to collect sufficient data.
This work is supported by the Federal Ministry for Education and Research (Bundesminis-
terium für Bildung und Forschung, BMBF), project MultikOSi, under grant FKZ 3N12823.
References
BIEDERMANN, D. H., KIELAR, P. M., HANDEL, O. (2014A) Betrachtung der Modellierung
und Simulation von Fussgängern im Kontext verschiedener Skalen. In: Proc. of the 26th
Forum Bauinformatik, 171-179
BIEDERMANN, D. H., KIELAR, P. M., HANDEL, O., BORRMANN, A. (2014B) Towards Transi-
TUM: A Generic Framework for Multiscale Coupling of Pedestrian Simulation Models
based on Transition Zones. In: Transportation Research Procedia 2, 495-500
8
Daniel H. Biedermann, Peter M. Kielar, Quirin Aumann, Carlos M. Osorio, Celeste T.W. Lai
BIEDERMANN, D. H., DIETRICH, F., HANDEL, O., KIELAR, P. M., SEITZ, M. (2015) Using
Raspberry Pi for scientific video observation of pedestrians during a music festival.
Technische Universität München
BORSCHE, R., KLAR, A., KÜHN, S., MEURER, A. (2014). Coupling traffic flow networks to
pedestrian motion. In: Mathematical Models and Methods in Applied Sciences 24(02),
359-380
COLOMBO, R. & ROSINI, M. (2005) Pedestrian flows and non-classical shocks. In: Mathe-
matical Methods in the Applied Sciences, 28(13), 1–17
DIJKSTRA, E. W. (1959), A note on two problems in connexion with graphs. In: Numerische
mathematik, 1(1), 269-271.
GALEA, E. R., WANG, Z., VEERASWAMY, A., JIA, F., LAWRENCE P. J., EWER, J. (2008) Cou-
pled Fire/Evacuation Analysis of the Station Nightclub Fire. In: Fire Safety Science 9,
465-476
GÖTTLICH, S., KÜHN, S., OHST, J. P., RUZKA S., THIEMANN M. (2011) Evacuation dynamics
influenced by spreading hazardous material. In: Networks and heterogeneous media,
443-464
HARTMANN, D. & VON SIVERS, I. (2013) Structured first order conservation models for
pedestrian dynamics. In: Networks and Heterogeneous Media 8 (4), 985–1007.
HITZLER, R. (2010), Eventisierung: drei Fallstudien zum marketingstrategischen Massen-
spass. Springer-Verlag
261–277. In: Springer.
HITZLER, R., KIRCHNER, B., BETZ, G. (2011) Das Beispiel Loveparade. Urbane Events,
HUGHES, R. L. (2002) A continuum theory for the flow of pedestrians. In: Transportational
Research Part B: Methodological 36 (2002), 507-535
HUGHES, R. L. (2003) The flow of human crowds. In: Annual review of fluid mechanics 35
(1), 169–182.
Psychology
IJAZ, K., SOHAIL, S., HASHISH, S. (2015) A Survey of Latest Approaches for Crowd Simula-
tion and Modeling using Hybrid Techniques
LEWIS, J. (1989), A value-added analysis of the heysel stadium soccer riot. In: Current
LIGHTHILL, M. J. & WHITHAM, G. B. (1955) On Kinematic Waves. II. A Theory of Traffic
Flow on Long Crowded Roads. In: Proceedings of the Royal Society A: Mathematical,
Physical and Engineering Sciences 229 (1178), 317–345.
MCCREA, J. & MOUTARI, S. (2010), A hybrid macroscopic-based model for traffic flow in
road networks. In: European Journal of Operational Research, 676-684
NGUYEN, T. N. A., ZUCKER, J. D., NGUYEN H. D., ALEXIS D., VO D. A. (2012) Hybrid equa-
tion-based and agent-based modeling of crowd evacuation on road network. In. Proc. of
the 8th ICCS conference, 558-570
PRETTO, C. O., CYBIS, H. B. B., JACOBSEN, A. (2011) A Multi-layer Simulation Model For
Vehicle And Pedestrian Interaction. In: Transportation Research Board 90th Annual
Meeting. 2011.
RICHARDS, P. (1956) Shock waves on the highway. In: Operations research 4 (1), 42–51.
TOLBA, C., LEFEBVRE, D., THOMAS, P., EL MOUDNI, A. (2005), Continuous and timed Petri
nets for the macroscopic and microscopic traffic flow modelling. In: Simulation Model-
ing Practice and Theory 13, 407-436
WACHS, M. ET AL. (2000) Highway capacity manual. In: Transportation Research Board
WEIDMANN, U. (1993), Transporttechnik der Fussgänger. In: Schriftenreihe des IVT Nr. 90
|
1902.03185 | 4 | 1902 | 2019-11-28T14:59:18 | Partner Selection for the Emergence of Cooperation in Multi-Agent Systems Using Reinforcement Learning | [
"cs.MA",
"cs.AI"
] | Social dilemmas have been widely studied to explain how humans are able to cooperate in society. Considerable effort has been invested in designing artificial agents for social dilemmas that incorporate explicit agent motivations that are chosen to favor coordinated or cooperative responses. The prevalence of this general approach points towards the importance of achieving an understanding of both an agent's internal design and external environment dynamics that facilitate cooperative behavior. In this paper, we investigate how partner selection can promote cooperative behavior between agents who are trained to maximize a purely selfish objective function. Our experiments reveal that agents trained with this dynamic learn a strategy that retaliates against defectors while promoting cooperation with other agents resulting in a prosocial society. | cs.MA | cs | Partner Selection for the Emergence of Cooperation in Multi-Agent Systems
Using Reinforcement Learning
Nicolas Anastassacos,12 Stephen Hailes,2 Mirco Musolesi123
1The Alan Turing Institute 2University College London
3University of Bologna
9
1
0
2
v
o
N
8
2
]
A
M
.
s
c
[
4
v
5
8
1
3
0
.
2
0
9
1
:
v
i
X
r
a
Abstract
Social dilemmas have been widely studied to explain how hu-
mans are able to cooperate in society. Considerable effort has
been invested in designing artificial agents for social dilem-
mas that incorporate explicit agent motivations that are cho-
sen to favor coordinated or cooperative responses. The preva-
lence of this general approach points towards the importance
of achieving an understanding of both an agent's internal de-
sign and external environment dynamics that facilitate coop-
erative behavior. In this paper, we investigate how partner
selection can promote cooperative behavior between agents
who are trained to maximize a purely selfish objective func-
tion. Our experiments reveal that agents trained with this dy-
namic learn a strategy that retaliates against defectors while
promoting cooperation with other agents resulting in a proso-
cial society.
Introduction
Human history provides many examples of people be-
having more cooperatively than is typically assumed
in behavior models featuring assumptions of rationality
and self-interest. Examples include behaving environmen-
tally responsibly (littering, recycling, etc.) (Cialdini 2003;
Thøgersen 2006) or citizens honestly paying their taxes
when there are financial incentives to do otherwise (Posner
2000). These types of situations are known as social dilem-
mas and are characterized by a trade-off between an individ-
ual's short-term rewards and the collective long-term inter-
ests of the group, community or society as a whole (Dawes
1980). Understanding the mechanisms for the emergence of
cooperation is still an open problem in several disciplines
ranging from evolutionary biology and economics to au-
tonomous systems.
Recently, Reinforcement Learning (RL) has been ap-
plied to the study of general-sum multi-agent games like
social dilemmas (Hughes et al. 2018; Jaques et al. 2019;
Leibo et al. 2017; Perolat et al. 2017), however, it is known
that it is difficult to obtain optimal results due to the non-
stationarity caused by agents learning simultaneously (Bu-
soniu, Babuska, and De Schutter 2008). Solutions to these
problems can involve introducing techniques like modeling
Accepted for Publication in the Proceedings of the Thirty-Fourth
AAAI Conference on Artificial Intelligence (AAAI 2020). Re-
search Track. New York, New York, USA.
opponents or using joint-action distributions over the pop-
ulation (Lowe et al. 2017) though these techniques tend to
be affected by scalability issues. The traditional RL objec-
tive describes a selfish agent that looks to maximize its own
reward. In decentralized settings, it may not be possible to
impose any cooperative reward function on all the agents.
In these cases, it is important for the environment to be
designed in a way that allows even selfish agents to learn
behaviors which do not severely hinder other agents and,
preferably, are beneficial for the society as a whole. We ar-
gue that an answer to training RL agents in decentralized
multi-agent scenarios potentially lies in understanding the
societal dynamics that produces norm-inducing behaviors
and their effects on how and what agents learn.
We investigate a key characteristic of social interaction:
partner selection. The capability for an individual to freely
choose who they want to interact with has been thought
to have a prominent role in determining the structure of a
population and the competitive and collaborative relation-
ships that form between members of society (Santos, Santos,
and Pacheco 2008). In turn, these relationships can cause
a change in the strategies that agents learn that may go on
to impact partner selection in the future. The development
is dynamic and cyclical and has been hypothesized to be
a driving factor in the emergence of cooperative societies
and, potentially, a catalyst for altruistic behavior (Barclay
and Willer 2006; Cuesta et al. 2015).
Reputation and signaling are directly tied to the notion
of partner selection. Individuals prefer cooperative partners
and are inclined to avoid partnerships with known selfish
individuals (Albert et al. 2007; Milinski, Semmann, and
Krambeck 2002). This tendency towards preferring to inter-
act with reputable individuals suggests that the freedom to
choose may lead agents to develop strategies that maximize
the reward, while also improving reputation or signaling in
order to attract the attention of others. Signaling a desire to
coordinate or cooperate, however, may come at the cost of
becoming a target for exploitation by others. The interplay of
these dynamics has made partner selection a key component
of group formation and group inequality (Bolton and Ocken-
fels 2000; Mohtashemi and Mui 2003). Fu et al. developed a
reputation-based partner switching model that predicts a co-
operative response using agents (Fu et al. 2008) and the re-
peated Prisoner's Dilemma; using result from evolutionary
game theory they derive rules to facilitate partner switching
in order to penalize agents with a low reputation and a net-
work framework that determines the amount of information
that is available to each agent. Motivated by these findings,
we propose a model of partner selection that is character-
ized by two components: (1) N-agents are fairly presented
with only the previous interactions of their opponents and
use this information to select a partner, and then (2) each pair
of agents engages in a Dilemma game and learns from ex-
perience. Using this framework and RL agents trained with
Q-learning (Watkins and Dayan 1992), we are able to sim-
ulate the emergence of cooperation in a decentralized soci-
ety using partner selection and agents that learn according
to a selfish objective function. When we contrast our results
with the outcomes of scenarios in which agents are randomly
paired, the impact of partner selection can be clearly seen on
both the overall societal outcome and on the evolution of the
strategies that are played throughout the simulation.
We show that when selfish agents have the option to
choose a partner they are able to learn to cooperate with
"good" individuals and punish "bad" ones, a strategy of
equivalent retaliation known as Tit-for-Tat (TFT) (Axelrod
and Hamilton 1981). In our results, we can see how TFT
agents act to sustain cooperation in a society by playing a
strategy that encourages other agents to play the same strat-
egy akin to a social norm. Q-agents are capable of learn-
ing this strategy in the presence of partner selection and
maintain cooperation in the society, whereas agents trained
with random matching learn to always defect. The contri-
butions of this work are two-fold. Firstly, we demonstrate
the importance of building environments with societal dy-
namics like partner selection, such that agents can learn
norm-inducing behaviors in decentralized multi-agent set-
tings. Secondly, we provide novel insight into how cooper-
ation can emerge between selfish agents that can be con-
trasted with outcomes seen in evolutionary biology and be-
havioral economics as we use familiar framework in the
repeated Prisoner's Dilemma and a bottom-up approach to
partner selection that results in a well-known strategy, TFT.
For this reason, we believe that the results of this work have
implications not only for the design of cooperative artificial
agents but also for our understanding behavior in animal and
human societies.
Social dilemmas provide a powerful platform to study the
emergence of behavior and the development of coopera-
tive solutions using agents (Izquierdo, Izquierdo, and Gotts
2008; Macy and Flache 2002; Sen and Airiau 2007).
They have featured heavily in behavioral economics, psy-
chology and evolutionary biology (Axelrod and Hamilton
1981; Mohtashemi and Mui 2003; Fehr and Fischbacher
2004; Fu et al. 2008; Santos, Santos, and Pacheco 2008).
Since then, other research has looked to explain cooperative
outcomes in more complex environments termed sequential
social dilemmas and investigate innate human-inspired char-
acteristics such as a preference for fairness, pro-sociality,
or social influence while leveraging the capabilities of RL
agents to learn (Hughes et al. 2018; Jaques et al. 2019;
Social Dilemmas
by
SD
C
D
C
D
R, R S, T
T, S
P, P
rPD
C
D
C
3, 3
4, 0
D
0, 4
1, 1
Table 1: Payoff Matrix for Social Dilemmas and repeated
Prisoner's Dilemma. The motivation to defect comes from
fear of an opponent defecting or acting greedily to gain the
maximum reward when one anticipates the opponent might
cooperate. The game is modeled so that T > R > P > S
and 2R > T + S. From a game theoretic perspective, the
optimal strategy in a finite game is to defect. This is undesir-
able as the agents could both achieve greater reward if they
agreed to cooperate.
Leibo et al. 2017; Perolat et al. 2017; Peysakhovich and
Lerer 2018).
We consider a classic repeated Prisoner's Dilemma (PD)
approach, where each iteration of the game can be character-
ized by a payoff matrix. Agents play multiple rounds of the
Prisoner's Dilemma and there is continuity between games
as an agent's previous actions are used to inform the part-
ner selection of the other agents. The resulting dilemma is
straightforward: agents must decide whether they should (1)
maximize their immediate reward by defecting while broad-
casting information to other agents that may deter them from
future interactions or (2) cooperate, forgoing the immediate
reward and risk being exploited, but potentially attract the
attention of other agents to increase future returns. For clar-
ity, we will name the outcomes in Table 1 as follows: (C,
C) is mutual cooperation, (D, C) is exploitation, (C, D) is
deception, and (D, D) is mutual defection.
Q-Learning
RL algorithms learn a policy from experience balancing ex-
ploration of the environment and exploitation.
We train our agents with Q-learning (Watkins and Dayan
1992). We train agents independently using this algorithm in
a multi-agent setting. In Q-learning, the policy of agent i is
represented through a state-action value function Qi(s, a).
The i-th agent stores a function Qi : Si × Ai → R often
parameterized by a neural network when dealing with a high
dimensional state space.
The policy of agent i is an -greedy policy and is defined
(cid:26)arg maxa∈Ai Qi(s, a) with probability 1 −
πi(s) =
U(Ai)
with probability
(1)
where U(Ai) denotes a sample from the uniform distribu-
tion over the action space. Each agent stores a set of trajec-
tories {(s, a, ri, s(cid:48))t : t = 1, ..., T} by interacting with the
environment and then updates its policy according to
Qi(s, a) ← Qi(s, a) + α[ri + γ max
a(cid:48)∈Ai
Qi(s(cid:48), a(cid:48))− Qi(s, a)]
(2)
where s is the current state, a is the current action, ri is the
reward obtained by agent i and s(cid:48) is the next state. As agents
are treated independently, the learning makes the environ-
ment appear non-stationary from any agent's perspective.
Other works have attempted to address the non-stationarity
problem in multi-agent RL using a combination of joint-
action learning and importance sampling methods (Foerster
et al. 2017). However, for large populations of agents this
significantly increases the amount of required computation
and becomes infeasible for large states and action spaces.
In order to ensure that information stored in each agent's
memory buffer is relevant to the current transition dynam-
ics of the environment, the buffers are refreshed after every
episode and the agent only trains only on the most recent
experiences.
Reinforcement Learning In Multi-Agent Social
Dilemmas
RL is a useful tool for understanding social dilemmas. In
contrast with game theoretic models, deep RL does not as-
sume knowledge of the environment dynamics and it is able
to deal with continuous state and action spaces. It can there-
fore be used with more complex environmental dynamics
that are more representative of the real-world such as inves-
tigating resource appropriation in the presence of scarce re-
sources (Perolat et al. 2017) or cooperative hunting to maxi-
mize efficiency (Leibo et al. 2017). Furthermore, it has also
been used to analyze the outcome of agents trained with
to be inequity averse with social dilemmas (Hughes et al.
2018), and of societies that feature agents with prosocial be-
havior (Peysakhovich and Lerer 2018) building on works in
behavioral economics.
The main difficulties in applying RL to multi-agent social
dilemmas are credit-assignment, non-stationarity and incen-
tive misalignment. The actual return of an agent's action is
not contained just in the reward but is reflected in what the
other agents learn. If an agent defects, the consequences of
an action must be present in the trajectory in order for an
agent to assign an appropriate value. It is difficult to capture
this information in a trajectory without knowing when and
how other agents are learning. To help account for this, the
notion of intrinsic rewards or agent preferences is often uti-
lized during training (Eccles et al. 2019). This drives agents
to learn coordinated behavior that emphasizes cooperation.
In (Hughes et al. 2018) agents are required to balance the
external rewards they receive with their internal preference
for more equal outcomes. In (Jaques et al. 2019), the reward
that agents receive is also split into rewards that are received
from the game environment but also rewards agents for tak-
ing actions that are measured to be "highly influential" based
on the change it causes in other agents' behaviors. Other
work has involved trying to predict changes in opponent's
future behavior in response to current events (Foerster et al.
2018). In contrast, in this work agents do not receive any re-
wards during training other than those received directly from
playing the Dilemma.
Modeling Methodology
N agents play rounds of a Dilemma game (Table 1). In our
setup, agents are able to select a partner at the beginning of
every round to play the Dilemma and the goal of the game
is to achieve the highest possible individual reward after T
rounds. This also means that each agent takes at least T ac-
tions. The best collective outcome for society is for all the
agents to cooperate unconditionally as this would guaran-
tee maximum reward for every interaction. However, such
an outcome is unlikely because the immediate rewards as-
sociated with defecting in a highly cooperative society are
also significantly higher. By introducing partner selection,
agents have to balance the rewards of greedy defecting be-
havior with the future cost of being excluded.
An episode of the game is split into two phases: in the
first phase, each agent has a chance to select another agent
to play the Dilemma. During this phase, actions as ∈ Rn−1
involve selecting one of the other n − 1 agents in the envi-
ronment. Agents cannot select themselves and, if selected,
they cannot refuse to play. There are no other restrictions on
which agents can be selected nor how many times any agent
can be selected. In the second phase, the selecting agent, i,
and chosen agent, j, play one round of the Dilemma, taking
d) where ad ∈ [C, D] and receive reward rd.
actions (ai
Actions and rewards are according to the payoff in Table 1.
Agents receive no reward from selecting a partner and only
receive rewards when playing the Dilemma. Their rewards
from playing must therefore inform their selection.
d, aj
During selection, every agents' most recent h actions are
visible to all other agents. Each action is represented as a
one-hot encoding and concatenated together such that for
the playing phase agents see states sd ∈ R2×h and in the
selection phase ss ∈ R2×h×(n−1). We choose to set h = 1
for interpretability. This limits the number of strategies that
can be learned to just four strategies that are recognized in
other literature (see Results).
In order to assess the emergent behavior associated with
the dynamics of partner selection, it is important to be able
to vary characteristics like the number of parameters and the
agents' exploration rates for playing the Dilemma and se-
lection. To give us this flexibility, each agent consists of two
models: the selection model learns a policy πs to take action
as given ss while the dilemma model learns a policy πd to
take action ad given sd. During each episode, a trajectory
τ = {ss, as, rs, sd, ad, rd, ...} was sampled from πs and πd
and then each model was trained on the states and actions
sampled from their respective policies.
We parameterize each model using a neural network with
one hidden layer. We test various network sizes between 32
and 256. We display the results for the case of a network
size equal to 256 which were the most consistent and infor-
mative for understanding the development of strategy. Each
agent employs an -greedy policy with a fixed d = 0.05
when playing the Dilemma and s = 0.1 when selecting a
partner. A discussion on is present in the Results section.
Both models use the standard a discount rate γ = 0.99.
Results and Discussion
In this section, we present results that indicate there is a sig-
nificant impact on the development and emergence of co-
operation as a result of partner selection. Alongside partner
(a) Matching determined by partner selection
(b) Random matching
Figure 1: The mean and standard deviation of the number of times an outcome occurs between two agents as a percentage over
14 runs of the simulation. In our simulation, the dynamic of partner selection is essential for cooperation to emerge as a viable
action which leads to a significantly higher global reward. With partner selection we observe distinct phases where certain
strategies dominate. The start of each phase is marked with a dashed line. Eventually agents learn to predominantly cooperate
after approximately 15,000 episodes. When pairing is random, agents quickly learn to defect and do not learn any cooperative
strategy throughout the simulation.
selection, we look at the roles of exploration and the types
of learned strategies that promote a cooperative outcome.
Emergence of Cooperation through Partner
Selection
Training Q-agents in the two-player repeated Prisoner's
Dilemma without partner selection results in both agents
learning to defect every time. With random selection in a
multi-agent population, agents converge to the same solu-
tion that is seen in the two-player case shown in Fig 1(b).
When agents are given the ability to choose a partner within
a population cooperation begins to emerge and the returns
for the society steadily improve.
(Rise in mutual defection).
We observe four distinct phases characterized by different
strategies of the agents. In particular, we identify four phases
which we mark in Fig 1(a). We plot the number of agents
that have selected a partner who has previously cooperated
versus a partner who has previously defected in Fig 3. In line
with our expectations, at convergence, the partner of choice
is a partner that has previously cooperated. Each of these
four phases also coincides with a development in the strategy
of the agents in the society which are as follows:
• Phase 1: Agents learn to defect without partner selection
• Phase 2: Agents learn to pick a partner who has demon-
strated cooperative behavior and defect against them (Rise
in exploitation). Agents pick a partner who has demon-
strated cooperative behavior and cooperates with them
(Rise in mutual cooperation).
• Phase 3: Agents learn to retaliate (defect) against exploita-
tive partners (Fall in exploitation). Agents learn to coop-
erate when selected by other cooperative agents (Rise in
mutual cooperation).
• Phase 4: We observe the emergence of a stable coopera-
tive society with the majority of agents adopting a behav-
ior that resembles equivalent retaliation, i.e., adoption of
the Tit-for-Tat strategy.
When limiting the information an agent has of its oppo-
nent to just the action taken at the previous timestep we limit
the space of strategies agents can learn to four strategies: (1)
where agents always cooperate (ALL C), (2) where agents
always defect (ALL D), (3) Tit-for-Tat (TFT) where agents
copy the last action of their opponent, and (4) reverse Tit-for-
Tat (revTFT), where agents play the opposite of their oppo-
nent's last action. To best understand the development of the
agent strategies throughout the simulation, we capture both
the outcomes of the agent encounters at every episode (Fig
1), the improvement in selection accuracy in (Fig 3), and a
box-plot of the strategies being used (4).
In the first phase, all agents quickly learn a defecting pol-
icy that causes a decrease in the society's cumulative reward.
We can explain this outcome by observing that the agents
have not yet learned how to select a partner efficiently. If the
partner selection is uninformed, then each interaction can be
treated independently and thus there are no future rewards
associated with cooperating. Consequently, defecting is the
preferred strategy for almost all agents. The partner selec-
tion accuracy of agents steadily improves, which facilitates
the transition to the second phase.
The second phase begins at approximately 2,500 episodes
into the simulation and is characterized by an increase in ex-
ploitation and a steep decrease in mutual defection. Agents
have improved their capability to select cooperative part-
ners, which increases the rewards associated with defecting.
Although the outcome of the society is significantly differ-
ent as a result of partner selection, the strategies used in the
Dilemma are the same: agents primarily defect. What facil-
itates the transition to the next stage is the following: (1)
agents who cooperate are selected to play more frequently
than defecting agents (and, therefore, are given the oppor-
tunity to potentially receive rewards); and (2) with enough
(a) epsilon=0.1
(b) epsilon=0.01
Figure 2: Higher exploration results in the society going through the different phases quicker but agents demonstrate less overall
cooperation. Lower exploration inhibits the transition to a cooperative phase.
in mutual cooperation and the society has mostly stabilized.
This is also where the society achieves its highest cumulative
reward. It is expected that at this point, where the number of
TFT agents is at its highest, is where the number of ALL D
agents is at its lowest. The number of ALL C agents stays
relatively consistent from phase 2 throughout to phase 4, al-
though it increases when the ALL D strategy is no longer
popular.
The impact of TFT agents here can be clearly seen as they
significantly limit the effectiveness of the defecting strategy.
As long as agents use ALL D, the best response strategy is
to employ TFT. Furthermore, when more agents use TFT,
the more rewards TFT agents will receive during an episode
which further pushes agents to employ it as a strategy. We
can see that once agents are able to select cooperative part-
ners, the TFT strategy acts as a norm by inducing other
agents to play the same strategy which produces the most
stable iteration of the society.
Analyzing Examples From Simulation
Tracking the returns of each agent alone is insufficient to
capture the state of the society and the group's behavior.
For a more granular understanding, we further plot exam-
ples from the phases from a simulation to show the number
of times each agent is selected and the strategies they use
(Fig 5), the individual reward they receive (Fig 6), and the
interactions represented as a network (Fig 7). We specifi-
cally consider examples of interactions between the phase
transitions described in the previous section.
In episode 2,500, rewards are evenly spread across agents,
however, selections are heavily skewed in favor of coop-
erative agents. Nevertheless, they receive very similar re-
wards to other agents using TFT or ALL D strategies. ALL
D agents that are picked more often do not receive signif-
icantly more rewards as they are most often being selected
by agents who are also defecting meaning little reward is
gained from those encounters. In episode 7,500, we observe
more agents using a TFT strategy. However, the two most
successful strategies in this phase are ALL D (agent 16) and
ALL C (agent 7) both of whom benefit from more effective
Figure 3: Percentage of agents selected who have cooperated
in their last interaction.
exploration, cooperation can be sufficiently rewarded and
agents can start to learn to punish agents who would try to
exploit them.
This happens at approximately 5,000 episodes where
there is a steep decline in exploitation. This leads to the
third phase where there is a sufficient amount of cooperators
such that they can be easily selected and exploiters begin to
be punished. In episode 7,500 there is a steady increase in
the number of encounters resulting in mutual cooperation.
Tracking the agent strategies (Fig 4) reveals that this can be
attributed to the rise in TFT. With an increase in the num-
ber of TFT agents, defecting agents exploit others less suc-
cessfully as an agent who has previously cooperated is more
likely to be a TFT agent than an ALL C agent resulting in en-
counters leading to mutual defection. At the 10,000 episode
mark, mutual cooperation overtakes exploitation as the most
common outcome of two agents interacting that is observed
in the society. Looking at Fig 3, this also coincides with the
convergence of partner selection as 90% of agents who are
selected to play the Dilemma have cooperated in their last in-
teraction. After 15,000 training episodes, the society enters
a phase of where a significant majority of interactions result
Figure 4: Box plots representing the number of agents that use each strategy during phase transitions. The rise in ALL C and
TFT agents coincides with an improvement in partner selection. Once partner selection converges, the number of TFT agents
rapidly increases which results in a more stable, cooperative society.
partner selection.
In phase 3, surprisingly, we observe the largest amount
of inequality. Due to the growing number of TFT agents,
agents using ALL C strategy receive significantly more re-
ward while agents that use ALL D and receive the smaller
rewards on average. The amount of reward the defecting
agents receive is lower due to a combination of not being
selected by other agents, the number of TFT agents in the
population (making it difficult for them to find cooperative
agents to exploit), as well as cooperative agents being able
to reliably cooperate with one another. With only a single
available history, the ALL D agents cannot distinguish be-
tween an ALL C agent and a TFT agent that has recently co-
operated. Interestingly, when a TFT agent punishes an ALL
D agent (or faces a TFT or ALL C agent who has recently
explored defection), the TFT agent suffers a cost in the next
round as their chance of getting selected is reduced despite
having behaved in a cooperative way by punishing a defec-
tor. This explains why ALL C receives the highest overall
reward. As ALL C always cooperates, it does not face this
penalty but still benefits from the regulatory behavior pro-
vided by other TFT agents. Nevertheless, we can see that
the strategy that is adopted by most agents is surprisingly
not the strategy that necessarily generates the highest reward
in each episode.
The Role Of Exploration
In RL, it is necessary to give agents the opportunity to ex-
plore the environment to find an optimal strategy. In multi-
agent systems when the agents are continuously developing
new strategies, there is a need to explore constantly in or-
der to react to the shift in environment dynamics. However,
agents exploring can impact the learning of other agents. Too
much exploration at the wrong time can inhibit the conver-
gence to certain behaviors. As an example, if a single agent
has a cooperative strategy when all the other agents have a
defecting strategy, then exploration benefits the cooperative
strategy. On the other hand, when all agents behave cooper-
atively, exploration instead becomes costly for cooperators.
In our work we have suggested that, in order to achieve a co-
operative outcome, the agent strategy undergoes four stages.
We can see that increasing the base exploration rate affects
the rate at which these strategies are learned, however, it also
significantly affects the overall society's return. In Fig 2(a)
a higher exploration rate results in an overall less coopera-
tive outcome and, therefore, less cumulative reward. Simi-
larly, in Fig 2(b), if the exploration rate is too low, it makes
it difficult for agents to adjust their strategies and, despite
doubling the number of episodes, the agents are not able to
reach a cooperative solution.
Although more exploration facilitates a quicker transition
between phases, it also jeopardizes the stability and gains of
the final outcome. We should therefore be mindful in how we
determine the exploration strategy that our agents employ in
the presence of other learners.
Inclusion and Exclusion to Promote
Norm-Inducing Behavior
The impact of partner selection happens in two steps that
can be viewed as inclusive acts and exclusive acts. Firstly,
agents need to be able to distinguish between different types
of agents. Cooperators need to be included to allow cooper-
ation to compete with defecting strategies for reward. Sec-
ondly, agents need to be able to learn or adapt their playing
strategy given a selection strategy that leads to the exclusion
of and retaliation against defectors. We view this behavior as
norm-inducing as it forces agents to conform to an existing
strategy that has been adopted by the majority of the agents.
In order for the norm to persist, the TFT agents need to inter-
act with a mix of both ALL C and ALL D agents and, while
it regulates the behavior of the other agents, the emergence
and presence of TFT behavior itself is not sustained by it.
Although agents that use an ALL C strategy tend to receive
the highest rewards, without other agents employing a TFT
strategy, the stability of a cooperative society is threatened.
Our experiments suggest that the emergence of cooperation
is contingent on having a sufficient number of agents learn-
ing to exclude bad behavior even if they share some of the
associated cost.
In Fig 7, we display centrality plots from network analy-
sis to visualize partner selection with nodes positioned ac-
cording to Fruchterman-Reingold force-directed algorithm
(Fruchterman and Reingold 1991). In these plots, two nodes
are close if there are more interactions between them. As
partner selection becomes more effective in terms of reward
with more training episodes, the network gets tighter with
Figure 5: With every agent searching for a partner that indicates that they will cooperate, the agent that is most commonly
selected are ones that use ALL C. Early on in the training, ALL D is quickly adopted by most agents while reverse TFT is
phased out. As agents learn TFT, the distribution of selections flattens. As more agents play TFT, less agents play ALL D.
Figure 6: In the early stages of the simulation and very few cooperative agents, the spread of rewards per episode is fairly even.
Despite being selected the vast majority of the time, ALL C agents receive similar rewards per episode. As other agents learn
TFT, the amount of reward that ALL C agents receive significantly increases, while it decreases for ALL D agents. Eventually,
when the majority of agents play TFT, the average rewards per agent increases.
Figure 7: Degree centrality plots of 20 agents in a society during training. Each node represents an agent, while each directed
edge represents an interaction between two agents. Agents with more interactions between each other have shorter edges. Axes
simply represent a normalized node position centered on the origin.
ALL C nodes having a higher degree centrality and influ-
ence. In the examples above, ALL D agents are prominent
outside the core of the network while agents who cooper-
ate have higher degree centrality. As training progresses,
the connections are distributed more evenly as more agents
adopt equivalent-retaliation (TFT) strategy and become vi-
able partners for cooperation. With more TFT agents, it is
harder for ALL D agents to find ALL C agents to exploit
which decreases the amount of connections between those
two node types. This causes a change in the network struc-
ture where there is less likely to be just one or two highly
influential nodes. Finally, as mutual cooperation overtakes
exploitation and the society stabilizes, the network connec-
tions become more evenly spread with nodes having similar
degree centrality.
Conclusions
We have presented an analysis of the effect of partner se-
lection on the emergence of cooperation. We have shown
that agents can learn to cooperate in the repeated Prisoner's
Dilemma using multi-agent reinforcement learning. We have
outlined four key phases that begin with defection but, as
partner selection improves, the agents achieve a cooperative
outcome. Although subject to certain environment variables,
such as reward and the amount of information available to
each agent, partner selection allows for a cooperative strat-
egy to be sustained early on in the simulation when the ma-
jority of agents defect. This facilitates a development of a
strategy that learns to interact efficiently with both coop-
erative and defective agents akin to Tit-for-Tat. The stabil-
ity of a cooperative outcome is dependent on how success-
fully agents are able to use information about another agent's
history to inform partner selection and their strategy in the
Dilemma. Although TFT agents tend to receive less reward
than fully cooperative agents at certain stages, the presence
of this strategy is required for cooperation to emerge at all
as it regulates the exploitative behavior of defecting agents.
The results of this work demonstrate the importance of un-
derstanding how agents can learn to interact with each other
in an environment beyond internal agent or reward function
design that can help produce optimal cooperative outcomes
and provides insight into the emergence of cooperation in
social dilemmas.
References
1981. The evolution of cooperation.
[Albert et al. 2007] Albert, M.; Guth, W.; Kirchler, E.; and
Maciejovsky, B. 2007. Are we nice(r) to nice(r) people? -- an
experimental analysis. Experimental Economics 10(1):53 --
69.
[Axelrod and Hamilton 1981] Axelrod, R., and Hamilton,
Science
W. D.
211(4489):1390 -- 1396.
[Barclay and Willer 2006] Barclay, P., and Willer, R. 2006.
Partner choice creates competitive altruism in humans.
Proceedings of the Royal Society B: Biological Sciences
274(1610):749 -- 753.
[Bolton and Ockenfels 2000] Bolton, G. E., and Ockenfels,
A. 2000. Erc: A theory of equity, reciprocity, and competi-
tion. American Economic Review 90(1):166 -- 193.
[Busoniu, Babuska, and De Schutter 2008] Busoniu,
L.;
Babuska, R.; and De Schutter, B. 2008. A comprehen-
IEEE
sive survey of multiagent reinforcement learning.
Transactions on Systems, Man, And Cybernetics-Part C:
Applications and Reviews, 38 (2), 2008.
[Cialdini 2003] Cialdini, R. B. 2003. Crafting normative
messages to protect the environment. Current Directions in
Psychological Science 12(4):105 -- 109.
[Cuesta et al. 2015] Cuesta, J. A.; Gracia-L´azaro, C.; Fer-
rer, A.; Moreno, Y.; and S´anchez, A. 2015. Reputation
drives cooperative behaviour and network formation in hu-
man groups. Scientific Reports 5:7843.
[Dawes 1980] Dawes, R. M. 1980. Social dilemmas. Annual
Review of Psychology 31(1):169 -- 193.
[Eccles et al. 2019] Eccles, T.; Hughes, E.; Kram´ar, J.;
Wheelwright, S.; and Leibo, J. Z. 2019. Learning reciprocity
arXiv preprint
in complex sequential social dilemmas.
arXiv:1903.08082.
[Fehr and Fischbacher 2004] Fehr, E., and Fischbacher, U.
2004. Social norms and human cooperation. Trends in Cog-
nitive Sciences 8(4):185 -- 190.
[Foerster et al. 2017] Foerster, J.; Nardelli, N.; Farquhar, G.;
Afouras, T.; Torr, P. H.; Kohli, P.; and Whiteson, S. 2017.
Stabilising experience replay for deep multi-agent reinforce-
ment learning. In Proceedings of the 34th International Con-
ference on Machine Learning, 1146 -- 1155.
[Foerster et al. 2018] Foerster, J.; Chen, R. Y.; Al-Shedivat,
M.; Whiteson, S.; Abbeel, P.; and Mordatch, I. 2018. Learn-
ing with opponent-learning awareness. In Proceedings of the
17th International Conference on Autonomous Agents and
MultiAgent Systems, 122 -- 130. International Foundation for
Autonomous Agents and Multiagent Systems.
[Fruchterman and Reingold 1991] Fruchterman, T. M., and
1991.
Reingold, E. M.
Graph drawing by force-
Software: Practice and Experience
directed placement.
21(11):1129 -- 1164.
[Fu et al. 2008] Fu, F.; Hauert, C.; Nowak, M. A.; and Wang,
L. 2008. Reputation-based partner choice promotes cooper-
ation in social networks. Physical Review E 78(2):026117.
[Hughes et al. 2018] Hughes, E.; Leibo, J. Z.; Philips, M. G.;
Tuyls, K.; Du´enez-Guzm´an, E. A.; Castaneda, A. G.; Dun-
ning, I.; Zhu, T.; McKee, K. R.; Koster, R.; et al. 2018. In-
equity aversion resolves intertemporal social dilemmas. In
Proceedings of the 35th International Conference on Ma-
chine Learning.
[Izquierdo, Izquierdo, and Gotts 2008] Izquierdo,
S.;
Izquierdo, L.; and Gotts, N. 2008. Reinforcement learning
dynamics in social dilemmas. Journal of Artificial Societies
and Social Simulation 11(2):1.
[Jaques et al. 2019] Jaques, N.; Lazaridou, A.; Hughes, E.;
Gulcehre, C.; Ortega, P.; Strouse, D.; Leibo, J. Z.; and
De Freitas, N. 2019. Social influence as intrinsic motiva-
tion for multi-agent deep reinforcement learning. In Inter-
national Conference on Machine Learning, 3040 -- 3049.
[Leibo et al. 2017] Leibo, J.; Zambaldi, V.; Lanctot, M.;
Marecki, J.; and Graepel, T. 2017. Multi-agent reinforce-
ment learning in sequential social dilemmas. In Proceedings
of the 16th Conference on Autonomous Agents and MultiA-
gent Systems, 464 -- 473.
International Foundation for Au-
tonomous Agents and Multiagent Systems.
[Lowe et al. 2017] Lowe, R.; Wu, Y.; Tamar, A.; Harb, J.;
2017. Multi-agent actor-
Abbeel, P.; and Mordatch, I.
critic for mixed cooperative-competitive environments.
In
Advances in Neural Information Processing Systems, 6379 --
6390.
[Macy and Flache 2002] Macy, M., and Flache, A. 2002.
Learning dynamics in social dilemmas. Proceedings of the
National Academy of Sciences 99(3):7229 -- 7236.
[Milinski, Semmann, and Krambeck 2002] Milinski, M.;
Semmann, D.; and Krambeck, H. 2002. Donors to charity
gain in both indirect reciprocity and political reputation.
Proceedings of the Royal Society of London. Series B:
Biological Sciences 269(1494):881 -- 883.
[Mohtashemi and Mui 2003] Mohtashemi, M., and Mui, L.
2003. Evolution of indirect reciprocity by social informa-
tion: the role of trust and reputation in evolution of altruism.
Journal of Theoretical Biology 223(4):523 -- 531.
[Perolat et al. 2017] Perolat, J.; Leibo, J.; Zambaldi, V.;
Beattie, C.; Tuyls, K.; and Graepel, T. 2017. A multi-agent
reinforcement learning model of common-pool resource ap-
propriation. In Advances in Neural Information Processing
Systems, 3643 -- 3652.
[Peysakhovich and Lerer 2018] Peysakhovich, A., and Lerer,
A. 2018. Prosocial learning agents solve generalized stag
In Proceedings of the 17th
hunts better than selfish ones.
International Conference on Autonomous Agents and Mul-
tiAgent Systems, 2043 -- 2044.
International Foundation for
Autonomous Agents and Multiagent Systems.
[Posner 2000] Posner, E. A. 2000. Law and social norms:
The case of tax compliance. Virginia Law Review 86:1781.
[Santos, Santos, and Pacheco 2008] Santos, F. C.; Santos,
M. D.; and Pacheco, J. M. 2008. Social diversity promotes
the emergence of cooperation in public goods games. Nature
454(7201):213.
[Sen and Airiau 2007] Sen, S., and Airiau, S. 2007. Emer-
In International
gence of norms through social learning.
Joint Conferences on Artificial Intelligence, 1507 -- 1512.
[Thøgersen 2006] Thøgersen, J.
2006. Norms for envi-
ronmentally responsible behaviour: An extended taxonomy.
Journal of Environmental Psychology 26(4):247 -- 261.
[Watkins and Dayan 1992] Watkins, C. J., and Dayan, P.
1992. Q-learning. Machine Learning 8(3-4):279 -- 292.
|
1905.08036 | 1 | 1905 | 2019-05-14T03:44:56 | A Reputation System for Multi-Agent Marketplaces | [
"cs.MA",
"cs.SI"
] | We present an exploration of a reputation system based on explicit ratings weighted by the values of corresponding financial transactions from the perspective of its ability to grant "security" to market participants by protecting them from scam and "equity" in terms of having real qualities of the participants correctly assessed. We present a simulation modeling approach based on the selected reputation system and discuss the results of the simulation. | cs.MA | cs | A Reputation System for Multi-Agent Marketplaces
Anton Kolonin, Ben Goertzel, Cassio Pennachin, Deborah Duong, Matt Iklé ,
Nejc Znidar, Marco Argentieri
SingularityNET Foundation, Amsterdam, Netherlands
{anton, ben, cassio}@singularitynet.io
Abstract
transactions from
We present an exploration of a reputation system
based on explicit ratings weighted by the values of
corresponding financial
the
perspective of its ability to grant "security" to
market participants by protecting them from scam
and "equity" in terms of having real qualities of the
participants correctly assessed. We present a
simulation modeling approach based on the selected
reputation system and discuss the results of the
simulation.
1 Introduction
The latest developments in e-Commerce and the emergence
of global commercial online ecosystems with world-wide
connectivity based on the Internet makes it critical to assess
the reliability of the vendors and suppliers in these
ecosystems in reliable way [Zheng and Jin, 2009]. Multiple
design solutions for reputation systems serving the purpose
exist, such as discussed by other authors: [Swamynathan et
al., 2010], [Sänger and Pernul, 2018]. The most critical part
of any system intended for this purpose appears to be the
ability to handle a high degree of anonymity [Androulaki et
al., 2008] of market participants, as it is characteristic of
modern distributed [Gupta et al., 2003] ecosystems,
including ones that are based on public networks [Blömer et
al., 2015] such as blockchains.
In particular, in this work, we rely on a reputation system
design based on the "weighted liquid rank" concept [Kolonin
et al., 2018] and an implementation of the concept [Kolonin
et al., 2019] applied to generic multi-agent marketplaces.
Given the existing implementation of the system itself and
the simplistic simulation described in the latter publication,
in scope of this work we provide a more advanced simulation
modeling of the same system and investigate market
conditions which make it possible for honest market
participants to be granted "security", protecting them from
scam, and "equity", ensuring that their qualities are assessed
fairly in the market.
2 Reputation System Implementation
Most of the "weighted liquid rank" design of the reputation
system per [Kolonin et al., 2018] and its implementation
according to [Kolonin et al., 2019] are used in this work, and
we here we expand upon these earlier findings, that the
reputation system based on explicit ratings weighted by
financial values provides the best combination of "security"
and "equity". In this work we focus primarily on use of only
explicit ratings weighted by financial values. It should be
noted that, as in the latter work, it has been found that a ratio
of 10% suppliers and 90% consumers with no overlap is
typical in generic online marketplaces, and because of this
the reputation of consumers as raters cannot be assessed
accordingly, thus the "liquid" part of the algorithm is not
effectively applicable in such a case and only the "weighted"
is employed.
Algorithm 1 Weighted Liquid Rank (simplified version)
Inputs:
1) Volume of rated transactions each with financial
value of the purchased product or service and rating
value evaluating quality of the product/service,
covering specified period of time;
2) Reputation ranks for every participant at the end of
the previous time period.
Parameters: List of parmeters, affecting computations
- default value, logarithmic ratings, conservatism,
decayed value, etc.
Outputs: Reputation ranks for every participant at the
end of the previous time period.
1: foreach of transactions do
2:
3:
4:
5:
6: end foreach
let rater_value be rank of the rater at the end of
previous period of default value
let rating_value be rating supplied by
trasaction rater (consumer) to ratee (supplier)
let rating_weight be financial value of the
transaction of its logarithm, if logarithmic ratings
parameter is set to true
sum rater_value*rating_value*rating_weight for
every ratee
previous peiod with differential_ranks based on
parameter of conservatism, so that new_ranks =
(old_ranks*conservatism+N*(1-differential_ranks)),
using decayed value if no rating are given to ratee
during the period
7: do normalization of the sum of the muliplications
per ratee to range 0.0-1.0, get differential_ranks
8: do blending of the old_ranks known at the end of
9: do normalization of new_ranks to range 0.0-1.0
10: return new_ranks
We
open-source
implementations of the reputation system based on the
the
referenced design. The first one was based on
Reputationer
project
at
https://github.com/aigents/aigents-java/ with
a Python
adapter for the SingularityNET reputation system prototype
as
the
https://github.com/singnet/reputation/ project. The second
version was based on a native Python implementation as the
reputation_service_api.py script in the latter project.
During the simulation modeling, the impact of the following
parameters of the reputation system were explored:
the aigents_reputation_api.py
in Aigents
alternative
script of
class
Java
have
explored
two
in
⚫ Rd - default initial reputation rank;
⚫ Rc - decayed reputation in range to be approached
by inactive agents eventually;
⚫ C - conservatism as a blending "alpha" factor
between the previous reputation rank recorded at
the beginning of the observed period and the
differential one obtained during the observation
period;
⚫ FullNorm -- when this boolean option is set to True
the reputation system performs a full-scale
normalization of incremental ratings;
⚫ LogRatings - when this boolean option is set to
True the reputation system applies log10(1+value)
to financial values used for weighting explicit
ratings;
⚫ Aggregation - when this boolean option is set to
True the reputation system aggregates all explicit
ratings between each unique combination of two
agents with computes a weighted average of
ratings across the observation period;
⚫ Downrating - when this boolean option is set to
True the reputation system translates original
explicit rating values in range 0.0-0.25 to negative
values in range -1.0 to 0.0 and original values in
range 0.25-1.0 to the interval 0.0-1.0.
⚫ UpdatePeriod -- the number of days to update
reputation state, considered as observation period
for computing incremental reputations.
3 Reputation System Simulation
Based on a market analysis reported on in the referenced
work [Kolonin et al., 2019] where it was affirmed that a ratio
the
code
simulation,
of which
of 9:1 between buyers and sellers (9 times as many buyers
than sellers) was the most realistic, we used this ratio as a
fixed market parameter. With this ratio, we simulated
populations of 1000 agents interacting over 6 months on an
everyday basis. We also implemented feedback, making the
reputation system available to consumers for choosing
suppliers, who then rate them in the same reputation system.
During initial simulations, 80% of the population were
"good" agents with fair market behaviors and the remaining
20% were "bad" agents that commit scams. It was also
assumed that the amount of "bad" agent transactions is higher
than the amount of "good" agent transactions as a result of
the "bad" agents pumping up the reputation of "fake"
suppliers as they pose as consumers. It was assumed that an
average "bad" agent spends substantially less on every
transaction, compared
to an average "good" agent.
Specifically, in the simulations it was assumed that "bad"
agents emit 10 times more transactions a day than the good
ones, but the ratio of the average transaction payment amount
was varied. For the latter ratio, we considered three types of
conditions: an "unhealthy" market with a ratio equal to 10 (so
the "good" agents have just 10 times more costly purchases),
a "semi-healthy" one with a ratio of 20 and a "healthy" one
with a ratio of 100.
The
at
https://github.com/singnet/reputation/tree/master/agency/pyt
hon/src/snsim/reputation, is meant to resemble a market
place, in which there are different product or service
categories that have a variety of prices reflective of the
market. Each supplier agent has an intrinsic ability to satisfy
its customers with its product or service, and ratings of each
supplier are normally distributed around this "expected
goodness" (Rcea as defined further), here drawn from a normal
distribution with mean of 0.75 and standard deviation of 0.15
to N(0.75, 0.0225), bucketed into five ratings of 0.0, 0.25, 0.5
0.75 and 1.0. Scammer agents are consistently given a zero
by good agents. Each agent has different (normally
distributed) needs for every product or service, and shops for
what it needs the most first. There is a normally distributed
time until each product or service is needed again. There is a
limit to how much shopping an agent can do in a day, and the
number of active agents can vary. Agents have differing
(normally distributed) propensities to try out new agents,
different tolerances for staying with the old ones, and
different capacities to forget. Bad agents have a normally
distributed ring size of other bad agents which they
(mutually) rate positively, here drawn from N(8,4)
Algorithm 2 Market Simulation
Input: Consumer and Supplier trade behaviors
Output: Metrics, Agent qualities, transactions, ranks
1: Assign Agents to Behaviors based on Normal
Random Variates
2: Every day for 6 months:
is
Each consumer makes shopping list
Agents drop past suppliers according to satisfaction
If reputation system in use:
If "winner take all" usage:
Agents choose new suppliers with the highest
reputation score
Else if "roulette wheel" usage:
Agents choose new suppliers in proportion to
their reputation scores
Else if "thresholded random" usage:
Agents choose new suppliers randomly over a
reputation score threshold
Agents make purchases and rate suppliers
Else if reputation system not in use:
If agents have no experience with suppliers
Agents choose new suppliers randomly
Agents make purchases and rate suppliers
3: Print metrics
4 Performance Metrics
In this work we extend the range of the metrics used in
referenced research [Kolonin et al., 2019]. The first key
metric measures are the economic parameters of the market
such as volume ratio for market spending by "good" agents
versus "bad" agents (Vg / Vb ), the percentage of funds spent
by "good" agents to "bad" scammers or "loss to scam"
(Cgbg ), and the ratio between the earnings of scammers and
their spendings or "profit from scam" (Cgbb). The latter
financial metrics serve to identify the amount of financial
resources that fair consumers lose in scams, or the relative
amount that scammers would earn by cheating the reputation
system, so changes in these values based on use of the
reputation system can actually provide the business value of
using it.
Further we measure utility, or how happy fair consumers are
with their purchases. It is the average rating given to
purchases, regardless of the kind of purchase. This metric
would shift with different rules for ratings, such as a different
default rating, however, within a scenario this metric has the
same relative value.
where Fij is the sum of all ratings made by good agents and N
is the number of ratings made by all of the good agents, i.e.
all agents which have an expected goodness of Rea = 1, to be
(1)
discussed further on.
We also explored metrics that assess the reputation system's
prediction of the quality of each agent to be either good or
bad, or ability of the reputation system to have a high
accuracy for both assessments, following the referenced work
[Kolonin et al., 2019]. These metrics compare distributions
of expected reputations Rea per agent a against lists of
computed reputations Rca for the same set of agents. In our
work these values are measured on continuous scale, so Rea
is used to assess the reputation system's ability to predict the
level of "goodness" of an agent. The "bad" agents are
expected to have Rea close to 0.0, while the "good" agents are
expected to have Rea substantially greater than 0 and up to 1.0.
The standared Pearson correlation coefficient PCC between
Rca and Rea is used in the referenced work [Kolonin et al.,
2019]. However, it makes it possible to evaluate only overall
quality of prediction so if the PCC value is below 1.0 then
one can't tell if it is because the flawed "security" or missed
"equity". Because of the reason, we have also used a
"weighted Pearson correlation coefficient," weighted so that
agents matter in proportion to how good they are, or how bad
they are, in order to indicate the capacity of the reputation
system to be used for security (by being good at determining
which agents may be scammers) vs. the capacity of the
reputation system to judge the quality of the honest agent's
products fairly, so that they may participate proportionately
in the economy.
where avg(y,w) is a weighted average. For PCCG, the PCC
weighted towards good, w is the (Rcea) vector. For PCCB it
is the (1-Rcea) vector. We report the weighted average of the
market volume of the PCC, PCCG and PCCB per product or
service category, called PCC by category, PCCG by
category, and PCCB by category. This is useful because we
are ultimately looking for a way to compare providers of a
product or service category, and PCC is a good way to
measure the ability to rank.
The standard confusion matrix metrics for recall, precision,
F1 and accuracy have been used to assess the "security" as
effectiveness of the reputation system for the primary
reputation system goal of protecting the public from scams.
That is, reputation system was considered a tool to solve
"classification problem" categorizing agents as either "good"
or "bad", in the sense of agent being a fair one or a scammer,
respectively. Here, a positive result would mean either a
"good" agent is categorized as "good" in the sense that it is
not a scammer when it is scored over a threshold or a "bad"
agent categorized as "bad", respectively. It is a counted as a
true positive if the agent is in fact good, and is a false positive
if the agent is in fact bad. On the other hand, if an agent is
scored under the threshold and is in fact good it is a false
negative, and if the agent scores under the threshold and is in
fact bad, it is a true negative. In our work, we have used the
threshold as 40% reputation rank value on scale between 0%
and 100%, based on search for the optimal threshold value
differentiating the "good" and the "bad" to the greater extent.
5 Simulation Results
We present three scenario experiments on the reputation
system to find the sets of parameters in which the reputation
system performs best as well as the boundary values of those
left we present expected goodness (Rea) and the lower right we
present computed goodness (Rca), both ordered by expected
goodness. In the charts on the upper and lower right, scammers
appear on the left, and honest agents on the right.
Indeed, the Fig.2 presents how the expected goodness can be
evaluated on per-category basis, assuming that evaluation of
is domain-specific [Kolonin et al., 2018],
reputation
according to specific price ranges and sub-markets of specific
kind of goods or services of the greater market. Where there
are more suppliers and thus more market volume, regardless
of whether bad agents are present, the calculated goodness
are more predictive of the expected goodness of the agent.
The predictions are accurate wherever there are more than
three samples. This result shows a consistent clear
demarcation between bad agents on the left of each chart and
the good agents on the right.
parameters. The first is an experiment is a test of the
parameters under the conditions of a market that is close to
equilibrium, that is, a market in which there is neither a
serious oversupply or serious shortages. Next, in order to test
the robustness of the reputation system we look at its usage
and presentation, in the usual case, where agents trade with
suppliers in proportion to their ratings, and additionally
extremes where agents choose the top-rated supplier, as well
as where they simply choose a random supplier over a
threshold. Finally, to see if the reputation is robust with
respect to market volume surges we take the champion
parameters of the equilibrium market and use them to test
another setting of the reputation system: the periodic setting,
where the update period is set longer than a day, in contexts
with and without periodic surges in purchasing.
The simulation was focused on the case where the reputation
system with explicit
financial
transactions is used. For this case we have explored different
combinations of parameters evaluating different metrics to
access the level of "security" and "equity" provided by the
reputation system.
The extent to which system can provide "security" and
"equity" is illustrated by Fig.1 below. We clearly see that we
can identify "bad agents" with loss of 2 "false negatives". At
first glance one would think that this system only separates
the scammers from the honest agents, providing "security"
while not giving fair ratings to the quality of the honest
agents: it seems that it cannot identify the expected goodness
so the "equity" is not granted. However, the next figure
shows that when you take each product or service category
into account separately, it does predict an agents ratings
accurately.
ratings weighted by
Figure 2. These charts from a single sample run show the calculated
goodness (Rca) along the X axis and the expected goodness value
(Rea) on the Y axis, separated by product or service category. They
include the product or service categories of the realistic simulation
that have more than one supplier. Rca is more predictive of Rea the
larger the sample size (the slope approaching 1), and is accurate
wherever the sample size is over three.
Figure 1. This is an illustration of the suppliers from a sample run
of 1000 agents, 10% of which are suppliers. Each bar is a single
supplier. The reputation system parameters are FullNorm=True,
Weighting=True, LogRatings=False, Rd=0.5, C=0.5, Rc=0.0,
Downrating=False. On the upper left we present computed
goodness (Rca) and on the upper right we present expected
goodness(Rea), both ordered by computed goodness. On the lower
Figure 3. The first of three market scenario types to test the
parameterization and robustness of the reputation system. In this
equilibrium scenario, the boundary value tested is the market
volume ratio, and the parameters tested are the conservatism
(conserv) and default parameters. MVR (Market Volume Ratio)
states: healthy: over 200 semi-heathy: 75-200, unhealthy: below 75.
The best performing combination, default 0.5/conservatism 0.5, is
underlined.
to Scam that comsumers suffer is less when the reputation
system is in use than when it is not. In our consideration of
the importance of balance between offerring protection from
scammers and making sure no honest suppliers are rated
fairly, we have underlined the "champion" parameter
combination
that meets both goals, default 0.5 and
conservatism 0.5.
The healthy market champion's precision of 1.0 in Figure 3
shows that the reputation system did not recommend any of
the scammers despite their best efforts at pumping their
ratings, while at the same time rating the non-scammers fairly
as evidenced by the Pearson-good by category score of 0.92.
The Pearson by category scores show that the system ranks
all agents effectively within a category of goods and services.
If default is set low, then we can make the consumers slightly
happier with their purchases as a result of the reduced loss to
scam, but this is at the expense of ranking good agents fairly.
Figure 4 illustrates the effectiveness of the reputation system
under different usages. One possible usage is winner take all,
when reputation system scores are presented to consumers
such that they would probably just take the highest scoring
supplier. Such a usage has increased the happiness that
consumers have in thier products (increased utility by 11%),
however more studies need to be done in other scenarios that
have enterers and leavers, as winner take all dyanamics have
been known to close markets to newcomers and thus
ultimately result in lower utility. The healthy market with
winner take all dynamics was poor in ranking fair suppliers
(Pearson-good by category of 0.71). However, our champion
scenario, which models the case where customers are
presented with the reputation system such that they would
select agents in proportion to their reputation scores, ranked
non-scamming suppliers fairly (Pearson-good by category of
0.9) so they can participate in the economy. Proportionate
selection usage is roulette wheel selection [Bäck Thomas,
1996], which does better than the thresholded random usage
which does not rank quite as well.
Figure 4. In the second market scenario type we test the robustness
of the reputation system against both normal and extreme usages,
where "Roulette Wheel" indicates agent choice in proportion to the
calculated reputation values, "Thresholded Random" indicates that
agents choose suppliers randomly but over a threshold, and "Winner
Take All" indicates that agents choose the top ranked suppliers.
Figure 3 illustrates how, in a healthy market, the reputation
system is effective in reducing the loss of consumers to
scam,ensuring that nearly all of the suppliers it recommends
are fair market participants while at the same time rating them
fairly. At test of multiple simulation runs shows that, in a
healthy market scenario, there is a 99% chance that the Loss
Figure 5. In the third market scenario type, the period that the
reputation system is updated is tested, in scenarios that are periodic
(the default) in that there is a surge of purchasing every seven days
for half of the goods, and scenarios which are. Scenarios with no
reputation system are presented for comparison in all scenario types,
and best performing parameter combinations in both healthy and
semi-healthy markets, is underlined.
Figure 5 illustrates how the reputation system performs well
even in markets that have periodic surges. The champion of
the market is the champion of the entire paper, where the
reputation system which updates only every week , on a
market with weekend purchasing surges, has a 0.98 Pearson-
good by category score. In markets without surges, the same
system performs nearly as well, and still reduces loss to scam
over the reputation system without the update period and over
no reputation system.
Based on studies within the scope of performed simulations,
the following observations were made.
⚫ The best
set of
are:
Weighting=True, LogRatings=False, Rd=0.5, C=0.5,
Rc=0.0, Downrating=False.
reputation parameters
⚫ Parameters that matter to the result are Weighting, Rd, C,
and Rc. FullNorm does not matter to the result, and
Downrating and LogRatings consistently detract from
the result.
⚫ The reputation system cuts the loss to scam (LTS) that
consumers suffer nearly in half. In a healthy market
LTS is cut from 0.06% to 0.03 or 0.04%.
⚫ The reputation system gives an excellent ability to rank
good agents by product or service category and discern
bad agents in a healthy market, with Pearson-good by
category scores over 0.9 and precision of discerning bad
agents of 1.0, and little societal loss to scam (< 0.0003).
The capability of the reputation is retained in the semi-
healthy market, but decreases dramatically in the
unhealthy market (Pearson of 0.61) making the semi-
healthy market
the
reputation system to function.
the borderline condition for
⚫ The reputation system can handle periodic sales (such as
seasonal and weekly surges in purchasing) with the
same ability to rank good agents and discern bad
(Pearson scores >= 0.9 and precision of 1.0). If there is
no periodicity in purchases, but the periodic mode of the
reputation system is on, the performance is comparable
(Pearson scores = 0.89 and precision of 1.0), however,
if there is a periodicity in purchases and periodic mode
is not employed, performance is slightly lower (Pearson
scores = 0.83 and precision of 1.0).
⚫ The reputation system performs best when used by
agents to trade with suppliers in proportion to their
calculated goodness scores (Precision 1.0, Pearson
scores >=0.9) but still works adequately at the extremes
of "Winner Take All" choice of suppliers (Precision 1.0,
Pearson scores >= 70) and random above threshold
choice (Precision 1.0, Pearson scores >= 80)
It may be possible to incentivize agents to trade with
suppliers in proportion to their calculated goodness
scores financially, not only to keep the reputation
system accurate, but in the interest of equity.
⚫
threshold under which an agent
⚫ Further studies need to be done on automatically finding
a
is never
recommended. Dynamic adjustment of the threshold
will make the system even more robust against market
conditions.
6 Conclusion
Based on the presented work, we can make the following
conclusions.
⚫ For the studied market conditions, the use of the
reputation system based on explicit ratings weighted by
financial values of transactions provides both "security"
in the form of protection from scam and "equity" for the
honest participants of the market
⚫ The parameters that we have found may be used for fine-
tuning of the real reputation systems and the metrics that
we define may be used to optimize these parameters in
further studies.
⚫ The options suggested for threshold management, and
for the incentivization of users to choose amongst the
listed suppliers in proportion to their reputation scores
may be considered as an extra application layer on top of
the reputation system.
The following issues will be considered for our further work.
⚫ Make the simulations more realistic, exploring larger
scales of markets above 1000 agents and 6 months,
studying wider ranges of possible market conditions,
with different populations of scamming agents, different
ratios of transactions committed by the agents and
implementing different
the
behaviors of the agents, primarily having different rates
of newcomers and leavers.
temporal patterns of
⚫ Evaluate possibility to improve "security" and "equity"
with use of rating aggregation.
⚫ Explore possibility of implementation of dynamic
reputation threshold management enabling to cut off
"most likely scam" from "most likely honest" and study
its effect on "security" and "equity".
⚫
⚫ Explore possibility of implementation and evaluation of
the incentivization of the honest agents to act as
members of "reputation militia" so the consumers are
choosing suppliers in proportion to their scores.
Implementation and simulation of the staking-based
reputations [Kolonin et al., 2018] and exploration of its
impact on improvement of "equity", especially in the
case with newcomers entering the system and leavers
leaving the one at realistic rates.
Information Processing, vol 36. Springer, Berlin,
Heidelberg, 2009. https://doi.org/10.1007/978-3-642-
03132-8_24
References
[Androulaki et al., 2008] Androulaki E., Choi S.G.,
Bellovin S.M., Malkin T. Reputation Systems for
Anonymous Networks. In: Borisov N., Goldberg I. (eds)
Privacy Enhancing Technologies. PETS 2008. Lecture
Notes in Computer Science, vol 5134. Springer, Berlin,
Heidelberg, 2008.
https://link.springer.com/chapter/10.1007/978-3-540-
70630-4_13
[Bäck Thomas, 1996] Bäck T. Evolutionary Algorithms in
Theory and Practice. Oxford University Press, Oxford,
United Kingdom, 1996.
[Blömer et al., 2015] Blömer J., Juhnke J. & Kolb C.
Anonymous and Publicly Linkable Reputation Systems.
Financial Cryptography and Data Security 2015,
Cryptology ePrint Archive: Report 2014/546, 2015.
https://eprint.iacr.org/2014/546
[Gupta et al., 2003] Gupta M., Judge P., Ammar M. A
Reputation System for Peer-to-Peer Networks.
NOSSDAV'03, June 1 -- 3, 2003, Monterey, California,
USA, ACM 1-58113-694-3/03/0006, 2003).
https://www.cs.indiana.edu/~minaxi/pubs/reputation.pdf
[Kolonin et al., 2018] Kolonin A., Goertzel D., Duong D.,
Ikle M. A Reputation System for Artificial Societies.
arXiv:1806.07342 [cs.AI], 2018.
https://arxiv.org/abs/1806.07342
[Kolonin et al., 2019] Kolonin A., Goertzel D., Pennachin
C., Duong D., Argentieri M., Znidar N. A Reputation
System for Marketplaces - Viability Assessment. arXiv:
1902.03857 [cs.SI], 2019.
https://arxiv.org/abs/1902.03857
[Swamynathan et al., 2010] Swamynathan G., Almeroth K.,
Zhao B. The design of a reliable reputation system.
Electron Commer Res 10: 239 -- 270, pp.239-270, 2010.
DOI 10.1007/s10660-010-9064-y, 31 August 2010
http://people.cs.uchicago.edu/~ravenben/publications/pd
f/reputation-ecrj10.pdf
[Sänger and Pernul, 2018] Sänger, J. & Pernul G.
Interactive Reputation Systems. Business & Information
Systems Engineering, August 2018, Volume 60, Issue 4,
pp 273 -- 287, 2018 60: 273, 2018.
https://doi.org/10.1007/s12599-017-0493-1
[Zheng and Jin, 2009] Zheng W., Jin L. Online Reputation
Systems in Web 2.0 Era. In: Nelson M.L., Shaw M.J.,
Strader T.J. (eds) Value Creation in E-Business
Management. AMCIS 2009. Lecture Notes in Business
|
0911.1346 | 1 | 0911 | 2009-11-06T20:29:10 | Optimal Approximation Algorithms for Multi-agent Combinatorial Problems with Discounted Price Functions | [
"cs.MA",
"cs.DS"
] | Submodular functions are an important class of functions in combinatorial optimization which satisfy the natural properties of decreasing marginal costs. The study of these functions has led to strong structural properties with applications in many areas. Recently, there has been significant interest in extending the theory of algorithms for optimizing combinatorial problems (such as network design problem of spanning tree) over submodular functions. Unfortunately, the lower bounds under the general class of submodular functions are known to be very high for many of the classical problems.
In this paper, we introduce and study an important subclass of submodular functions, which we call discounted price functions. These functions are succinctly representable and generalize linear cost functions. In this paper we study the following fundamental combinatorial optimization problems: Edge Cover, Spanning Tree, Perfect Matching and Shortest Path, and obtain tight upper and lower bounds for these problems.
The main technical contribution of this paper is designing novel adaptive greedy algorithms for the above problems. These algorithms greedily build the solution whist rectifying mistakes made in the previous steps. | cs.MA | cs | Optimal Approximation Algorithms for Multi-agent
Combinatorial Problems with Discounted Price Functions
Gagan Goel, Pushkar Tripathi and Lei Wang∗
Abstract
Submodular functions are an important class of functions in combinatorial optimiza-
tion which satisfy the natural properties of decreasing marginal costs. The study of
these functions has led to strong structural properties with applications in many areas.
Recently, there has been significant interest in extending the theory of algorithms for
optimizing combinatorial problems (such as network design problem of spanning tree)
over submodular functions. Unfortunately, the lower bounds under the general class of
submodular functions are known to be very high for many of the classical problems.
In this paper, we introduce and study an important subclass of submodular func-
tions, which we call discounted price functions. These functions are succinctly rep-
resentable and generalize linear cost functions. In this paper we study the following
fundamental combinatorial optimization problems: Edge Cover, Spanning Tree, Per-
fect Matching and Shortest Path, and obtain tight upper and lower bounds for these
problems.
The main technical contribution of this paper is designing novel adaptive greedy
algorithms for the above problems. These algorithms greedily build the solution whist
rectifying mistakes made in the previous steps.
9
0
0
2
v
o
N
6
]
A
M
.
s
c
[
1
v
6
4
3
1
.
1
1
9
0
:
v
i
X
r
a
∗College of Computing, Georgia Institute of Technology, Atlanta, GA 30332 -- 0280
1 Introduction
Combinatorial optimization problems such as matching, shortest path and spanning tree
have been extensively studied in operations research and computer science. In these prob-
lems we are given a ground set E and a collection Ω of subsets of the ground set that is
usually implicitly defined by some combinatorial propoerty. We are also given the cost of
each element in E and the price of a subset in Ω is defined to be the sum of costs of its con-
stituents. The objective is to find a subset in Ω with the minimum price. This framework
with linear cost functions has served as the simplified model for many practical problems.
However, linear cost functions do not always model the complex dependencies of the
prices in a real-world setting. Often, they only serve as approximations to the original
functions. Hence solutions to these problems are rarely useful in the practical realm where
these simplifying assumptions breakdown.
Another feature that is observed in a real-world scenarios is the presence of multiple
agents, with different price functions, who wish to collaborate to build a single combinatorial
structure. For linear cost functions, it is easy to see that having multiple agents doesnt
change the complexity of the original problem. This is not the case for more general cost
functions.
Submodular functions provide a natural way to model the non-linear dependencies be-
tween prices. These functions are the discrete analog of convexity and exhibit well known
economic properties such as economy of scale and decreasing marginal cost. There has been
some recent work [18, 9, 11] to study the approximability of combinatorial problems under
such functions and tight upper and lower bounds are known for many problems in this very
general framework.
However, the submodular setting suffers from a major drawback. Although in real
world applications an agent's cost function is not necessarily as simple as a linear function,
it is often not as complicated as a general submodular function either.
i.e. submodular
functions seem to tackle the problem in too much generality which often makes problems
harder than required. As a result most of the bounds presented in previous work in this area
are weak and have little practical applicability. A barrier in designing efficient algorithms
for submodular cost functions arises from difficulty in representing them succinctly. Since a
general submodular function is defined over an exponentially sized domain it is customary
to assume that the function can be accessed by an oracle which can be querried polynomial
number of times. This limits our ability to design efficient algorithms for these problems
owing to the incomplete information about the functions, resulting in information theretic
lower bounds.
In this paper we study an important subclass of succinctly representable submodular
functions called discounted price functions in the multi-agent setting. These functions are
motivated by the observation that often in practical settings agents offer discounts based
on the amount of goods being purchased from them i.e. purchasing more goods from a
single agent results in higher discounts. Apart from such practical considerations discount
functions have strong theoretical motivation too. Recent work [10] pertaining to learning
1
submodular functions has lead to succicnt representations for submodular functions. These
representations also behave like discounted price functions.
Discounted Price Model
We define a function d : R+ → R+ to be a discounted price function if it satisfies the
following properties: (1) d(0) = 0; (2) d is increasing; (3) d(x) ≤ x for all x; (4) d is
concave.
We study combinatorial problems in the following general setting. We are given a set
of elements, E, a collection Ω of its subsets. We are also given a set A of k agents where
each agent, a ∈ A specifies a cost function ca : E → R+ where ca(e) indicates her cost for
the element e. Each agent also declares a discounted price function, da. If an agent a is
e∈T ca(e)). This is
called her discounted price. The objective is to select a subset S from Ω and a partition
assigned a set of elements T , then her total price is specified by da((cid:80)
S1, S2, ..., Sk of S, such that(cid:80)
a∈A da((cid:80)
e∈Sa
ca(e)) is minimized.
Our frame work generalizes the classical single-agent linear cost setting. On the other
hand, (4) implies that discounted price functions are satisfy the decreasing marginal cost
property. Moreover, since any concave function can be well approximated by a piecewise
linear function, discounted price functions can be viewed as a class of succinctly represented
submodular functions.
We study the following four problems over an undirected complete graph G = (V, E).
• Discounted Edge Cover: In this problem, Ω is chosen to be the collection of edge
covers.
• Discounted Spanning Tree: In this problem, Ω is the collection of spanning trees
of the graph.
• Discounted Perfect Matching: In this problem, we assume the graph has an even
number of vertices. Ω is chosen to be the collection of perfect matchings of the graph.
• Discounted Shortest Path: In this problem, we are given two fixed vertices s and
t. Ω consists of all paths connecting s and t.
Our Results
We summarize our results in the following theorem:
Theorem 1.1. There is an O(log n) approximate algorithm for each of the following prob-
lems: discounted edge cover,spanning tree,perfect matching and shortest path, where n is
the number of vertices in their instances. Moreover, it is hard to approximate any of them
within factor (1 − o(1)) log n unless NP=DTIME(nO(log log n)).
Our main technical contribution is the introduction of a new algorithmic technique
called adaptive greedy algorithms. In traditional greedy algorithms like set cover, we make
2
the most 'efficient' decision at every step to inch closer to the objective. However, these
decision are irreversible and cannot be modified in subsequent iterations. For example in
the greedy set cover algorithm, if a set is chosen in a particular iteration it will surely be
included in the solution. This approach works well for problems where the solution does
not need to satisfy combinatorial properties, but fails in the combinatorial setting. This is
because, choosing a particular set may preclude the choice of other efficient sets in future
iterations owing to the combinatorial constraints. To rectify this problem we allow our
algorithm to undo some of the decisions taken during previous iterations. We call such
algorithms adaptive greedy algorithms. Another important contribution of the paper is to
link the shortest path problem to the minimum weight perfect matching problem by a factor
preserving reduction.
From the hardness perspective, we consider the discounted reverse auction problem in
which the collection is devoid of any combinatorial constraints. Using a factor preserving
reduction from the set cover problem we prove that it is hard to approximate the discounted
reverse auction within factor (1 − o(1)) log n unless NP=DTIME(nO(log log n)). We use
discounted reverse auction as a starting point to prove the hardness of all the combinatorial
problems considered in this paper.
From the above argument, one would expect that our combinatorially structured prob-
lems might have weaker lower bounds than discounted reverse auction. However, interest-
ingly, we find it is not the case, as shown by the log approximate algorithms in the section
2.
Related work
The classical versions of edge cover, spanning tree, perfect matching and shortest path
are well studied and polynomial time algorithms are known for all these problems, see
[17, 13, 2, 6, 5, 3]. These have served as part of the most fundamental combinatorial
optimization model in the development of computer science and operation research.
Recently, Svitkina and Fleischer [18] generalized the linear cost settings of some com-
binatorial optimization problems such as sparsest cut, load balancing and knapsack to a
submodular cost setting. They gave(cid:112)n/ log n upper and lower bounds for all these prob-
lems. [11] also studied combinatorial optimization problems in the single agent setting.
Multi-agent setting was first introduced in [9]. In their model of combinatorial problems
with multi-agent submodular cost functions they gave Ω(n) lower bounds for the problems
of submodular spanning tree and perfect matching, and gave a Ω(n2/3) lower bound for
submodular shortest path. They also gave the matching upper bounds for all these problems.
We remark that the lower bounds presented in [18, 9] are information theoretic and not
computational.
Similar generalization from linear objective function to the more general submodular
function was applied to maximization problems in [8, 14, 1]. The multi-agent generalization
of maximization problems which corresponds to combinatorial auction has been extensively
studied both in computer science and economics [4, 16] and tight information lower bounds
3
are known for these problems, see [15].
2 Algorithms for Discounted Combinatorial Optimization
In this section we present approximation algorithms for the combinatorial problems defined
earlier. In each of the problems we are given a complete graph G = (V, E) over n vertices.
We are also given a set A, of k agents each of whom specifies a cost ca : E → R+. Here
ca(e) is the cost for building edge e for agent a. Each agent also specifies a discounted price
function given by da : R+ → R+. The objective is to build a prespecified combinatorial
structure using the edges in E, and allocate these edges among the agents such that the
sum of discounted prices for the agents is minimized.
2.1 Discounted Edge Cover
In this section, we study the discounted edge cover problem and establish a log n approxi-
mate algorithm for this problem.
Here is the basic idea behind our algorithm. Given a discounted edge cover instance,
we construct a set cover instance such that: (1) an optimal edge cover corresponds to a set
cover with the same cost and (2) a set cover corresponds to an edge cover with a smaller
price. In the set cover instance, we apply the greedy algorithm from [12] to get a set cover
whose cost is within log n of the optimal cost, then the corresponding edge cover gives an
log n approximation of the optimum edge cover. We remark that we will have exponentially
many sets in the set cover instance that we construct for our problem. To apply the greedy
algorithm, we need to show that in each step, the set with the lowest average cost can be
found in polynomial time.
Now we state our algorithm formally. Consider a set cover instance where we have to
cover the set of vertices, V , with k2n subsets which are indexed by (a, S) ∈ A × 2V . The
cost of the set (a, S), denoted by cost(a, S), is defined as the minimum discounted price of
an edge cover for the vertices in S that can be built by agent a. For the instance of set cover
described above, we apply the greedy algorithm [12] to get a set cover S. Let Ua be the set
of vertices covered by sets of the form (a, S) ∈ S. Let Ca be agent a's optimal discounted
edge cover of the vertices in Ua. We output {Ca : a ∈ A} as our solution.
The correctness of the algorithm follows from the observation that each Ca is a cover of
Sa thus their union must form an edge cover of the vertex set V .
Now we show that the running time of the algorithm is polynomial in k and n. Notice
that when Ua is given, since agent a's discounted price function is increasing, Ca can be
found in polynomial time. Hence we only need to show that the greedy algorithm on our
set cover instance can be done in polynomial time.
Recall that the greedy algorithm from [12] covers the ground set, V , in phases. Let Q
be the set of covered vertices in the beginning of a phase and the average cost of a set (a, S)
is defined as αa(S) = cost(a, S)/S − Q. The algorithm picks the set with the smallest
4
average cost, covers the corresponding vertices in that set and go to the next phase until
all the vertices are covered. To show that this algorithm can be implemented efficiently, we
only need to show the following:
Lemma 2.1. For any Q ⊂ V , we can find min{cost(a, S)/S − Q : (a, S) ∈ A × 2V } in
polynomial time.
Proof. We can iterate over all choices of agent a ∈ A, thus the problem boils down to finding
min{cost(a, S)/S − Q : S ⊆ V } for each a ∈ A.
For each integer d, if we can find min{cost(a, S) : S − Q = d} in polynomial time, then
we are done since then we can just search over all the possible sizes of S− Q. Unfortunately,
it is NP-hard to compute min{cost(a, S) : S − Q = d} for all integer d. We will use claim
1 to circumvent this problem.
Claim 1. For any graph G = (V, E) and Q ⊆ V and for any positive integer d, we can find
the set (a, S) minimizing cost(a, S) such that S − Q is at least d, in polynomial time.
Proof. Refer to Appendix A1.
By claim 1 above we can generate a collection of subsets {Si ⊆ V : 1 ≤ i ≤ n}, such
that (a, Si) has the lowest value of cost(a, S) among all sets S which satisfy S − Q ≥ i.
Claim 2. min{cost(a, S)/S − Q : S ⊆ V } = min{cost(a, Si)/Si − Q : 1 ≤ i ≤ n}.
Proof. Let ¯S be the set that has the minimum average cost with respect to agent a. Suppose
¯S−Q = d. By our choice of Sd, we have Sd−Q ≥ d = ¯S−Q and cost(a, Sd) ≤ cost(a, ¯S).
Therefore we have cost(a, Sd)/Sd − Q ≤ cost(a, ¯S)/ ¯S − Q, hence they must be equal.
By iterating over all a ∈ A, we can find min{cost(a, S)/S − Q : (a, S) ∈ A × 2V } in
polynomial time.
Next we show that the approximation factor of our algorithm is log n. Let OP TEC
and OP TS denote the costs of the optimal solutions for the discounted edge cover instance
and the corresponding set cover instance respectively. Let {Ca : a ∈ A} be the edge cover
reported by our algorithm. For all a ∈ A let Oa be the set of vertices covered by agent
a in the optimal edge cover. The sets {(a, Oa) : a ∈ A} form a solution for the set cover
instance. Therefore OP TS ≤ OP TEC.
Since we use the greedy set cover algorithm to approximate OP TS, we have
(cid:88)
a∈A
da((cid:88)
e∈Ca
ca(e)) ≤ (log n)OP TS ≤ (log n)OP TEC
Thus we have the following theorem.
Theorem 2.2. There is a polynomial time algorithm which finds a log n-approximate so-
lution to the discounted edge cover problem for any graph over n vertices.
5
2.2 Discounted Spanning Tree
In this section, we study the discounted spanning tree problem and establish a log n ap-
proximation algorithm for this problem.
Let us first consider a simple O(log2 n)-approximation algorithm. Observe that a span-
ning tree is an edge cover with the connectivity requirement. If we apply the greedy edge
cover algorithm in section 2.1, there is no guarantee that we will end up with a connected
edge cover. We may get a collection of connected components. We can subsequently con-
tract these components and run the greedy edge cover algorithm again on the contracted
graph. We keep doing this until there is only one connected component. By this method,
we will get a connected edge cover, i.e. a spanning tree.
We now analyze the above algorithm. Let OP TST be the price of the minimum dis-
counted spanning tree. After each execution of the greedy edge cover algorithm, there is no
isolated vertex, hence the contraction decreases the number of vertices by at least a a factor
of half, therefore we will have to run the greedy edge cover algorithm at most O(log n)
times. Let OP T r
EC be the price of the minimum edge cover for the graph obtained after
the rth contraction and let Cr be the edge cover that we produce for this iteration. Using
EC is
theorem 2.2, the price of Cr is at most (log n)OP T r
at most OP TST for every r. Hence the price of Cr is bounded by (log n)OP TST . Since
there are at most O(log n) iterations, the price of the spanning tree produced by the above
algorithm is bounded by O(log2 n)OP TST .
EC. It is easy to see that OP T r
We observe that greedy edge cover and contraction are two main steps in the above
algorithm. Intuitively, they are used to satisfy the covering and connectivity requirements
respectively. The algorithm proceeds by alternately invoking these subroutines. Based on
this observation, our idea to get a log n approximation algorithm is to apply the following
adaptive greedy algorithm: rather than apply contraction after each complete execution of
the greedy edge cover, we interleave contraction with the iterations of the greedy edge cover
algorithm. After each iteration, we modify the graph and motivate our algorithm to get a
connected edge cover at the end.
Now we describe our adaptive greedy algorithm. For every agent a and subset of vertices
S we define cost(a, S) as the cost of the optimal edge cover for S. We define the average cost
a = cost(a, S)/S. The algorithm proceeds in phases and in each phase
of a set (a, S) as αS
we have two steps, search and contraction. In each phase r, during the search step we
find the set (ar, Sr) with the lowest average cost and set the potential of each vertex v ∈ Sr
as p(v) = αSr
ar . The search step is followed by a contraction step, where we modify the graph
by contracting every connected component in the induced subgraph of agent ar's optimal
edge cover for the set Sr. After this we begin the next phase. The algorithm terminates
when we have contracted the original graph to a single vertex. For every agent, we find
the set of all edges assigned to her across all the search steps declare this as her bundle of
assigned edges. Finally remove unnecessary edges from the set of assigned edges to get a
spanning tree.
It is easy to see that we get a connected edge cover at the end of the algorithm, which
proves the correctness of the algorithm. To analyze the running time, we observe that there
6
can be at most n phases and by Lemma 2.1, each phase can be implemented in polynomial
time. Hence the algorithm runs in polynomial time.
Next, we prove that the approximation factor of the algorithm is O(log n). Let OP TST
be the price of the optimal solution of the discounted spanning tree instance and let {Ta :
a ∈ A} be our solution. Let V (cid:48) be the set of contracted vertices we produced during the
algorithm. Number the elements of V and V (cid:48) in the order in which they were covered by
the algorithm, resolving ties arbitrarily. Suppose V = {v1, ..., vn} and V (cid:48) = {z1, ..., zn(cid:48)}.
Obviously, n(cid:48) ≤ n.
It is easy to verify that (cid:80)
a da(Ta) ≤ (cid:80)
i p(vi) +(cid:80)
j p(zj). Therefore we only need to
bound the potentials of the vertices in V ∪ V (cid:48).
Claim 3. p(vi) ≤ OP TST
n−i+1 for any i ∈ {1··· n} and p(zj) ≤ OP TST
n(cid:48)−j
for any j ∈ {1··· n(cid:48)}.
Proof. Refer to Appendix A3.
(cid:88)
da(Ta) ≤ (cid:88)
a
OP TST
n − i + 1
1≤i≤n
From the above claim, we have
+ (cid:88)
1≤j≤n(cid:48)
OP TST
n(cid:48) − j
≤ (log n + log n(cid:48))OP TST ≤ O(log n)OP TST
Therefore we have the following:
Theorem 2.3. There is a polynomial time algorithm which finds an O(log n)-approximate
solution to the discounted spanning tree problem for any graph with n vertices.
2.3 Discounted Perfect Matching
In this section we provide a log n approximate algorithm for the discounted (minimum)
perfect matching problem.
The main difficulty in tackling matching is that unlike spanning tree or edge cover, the
union of perfect matchings for two overlapping subsets of vertices may not contain perfect
matching over their union. So a greedy algorithm which iteratively matches unmatched
vertices cannot be used to solve this problem.
Here we provide an adaptive greedy algorithm for solving this problem. In our algorithm
we successively match unmatched vertices. Once a vertex gets matched, it remains matched
through the course of the algorithm. However unlike traditional greedy algorithms, we
provide the algorithm the ability to change the underlying matching for previously matched
vertices. The algorithm is adaptive in the sense that it alters some of the decisions taken
in previous phases to reduce the price incurred in the current phase.
Let us explain the algorithm in greater detail now. The algorithm runs in phases and
in each phase it augments the set of matched vertices by adding unmatched vertices and
rematching some of the previously matched vertices. At the end of each phase let Z denote
the set of matched vertices and let M be the underlying matching covering Z. For every
7
a ∈ A we define cM
a : E → R+ which attains value 0 for all edges in M and takes the value
ca(e) for all other edges e /∈ M. For any F ⊆ E let V (F ) be the set of vertices in the graph
induced by F . For a given matching M, we define the average cost of a set (a, F ) ∈ A× 2E
with respect to M as αM
a (F )/V (F ) − Z.
a (F ) = cM
In the beginning of every phase we pick the element (a, F ) from A× 2E with the lowest
average cost such that there exists a perfect matching over Z ∪ V (F ) using edges from
M ∪ F . We defer details of this subroutine until the proof of lemma 2.4. For each vertex
v ∈ V (F ) − Z we define its potential p(v) = αM
a (F ). Finally we augment the set Z with
vertices in V (F ) and update the underlying matching covering it. The algorithm terminates
when all vertices have been matched, i.e. belong to Z.
We will now show that the algorithm can be implemented in polynomial time. For this
we will need to prove the following lemma.
Lemma 2.4. Given a matching M and Z = V (M), we can find, in polynomial time, the
element (a, F ) from A × 2E with the lowest average cost with respect to M such that there
exists a perfect matching over Z ∪ V (F ) using edges from M ∪ F .
Proof. Refer to Appendix A2.
To analyze the approximation factor for the algorithm, we number the vertices in V in
the order in which they are added to Z and resolve ties arbitrarily. Let V = {v1, v2 ··· vn}.
Let OP T be the price of the optimal solution. We have the following lemma to bound the
potential of every vertex.
Lemma 2.5. For each i ∈ {1, 2··· n} , p(vi) ≤ OP T /(n − i + 1).
Proof. Similar to the proof of Claim 3.
Since the price of our solution is at most the sum of the potentials for the vertices the
following theorem follows immediately from lemma 2.5
Theorem 2.6. There exists a log n approximate algorithm for the discounted perfect match-
ing problem.
2.4 Shortest s-t Path
In this section we consider the discounted shortest path problem between two given vertices
s and t. We provide a log n approximation algorithm for this problem.
Unlike any of the previous problems, it seems to difficult to design a greedy algorithm
for the discounted shortest path problem. However using ideas developed in section 2.3
and by a factor preserving reduction we obtain a log n approximate algorithm this problem.
Our reduction also implies that the shortest path problem is easier than the minimum
weight perfect matching problem, and this technique can be applied to very general models
whereby any algorithm for perfect matching problem can be used to solve the shortest path
problem while preserving the approximation factor.
8
First of all, we describe our reduction:
Lemma 2.7. Let A be a β-approximate algorithm for the perfect matching problem, then
we can get a β-approximation for the shortest path problem using A as a subroutine
Proof. Suppose we are given a graph G = (V, E). Construct an auxiliary graph ¯G in the
following way: Replace every vertex v ∈ V by v(cid:48) and v(cid:48)(cid:48) and add an edge connecting them.
The cost of this edge is zero for every agent. For every edge uv ∈ E where u, v /∈ {s, t} we
replace uv with the gadget shown in figure 1.
Figure 1: Gadget for edges not incident on s or t
If d = ca(uv) was the cost of the edge uv for agent a ∈ A then two of the edges in our
gadget have the same cost as shown above. Rest of the edges have zero cost for all agents.
Replace any edge su ∈ E with the gadget shown in figure 2. Do the same for any edge ut.
Figure 2: Gadget for edges incident on s or t
On this graph ¯G, use the algorithm A to get the minimum cost matching. Let M be
the matching returned. We can interpret M as a s − t path in G in the following way. Let
g(uv) be the edges in ¯G corresponding to the edge uv for the gadget shown in figure 1.
Observe that either one or two edges of every such gadget must belong to M. Let S be the
set of edges in G such that two edges in their corresponding gadget belong to M. One can
check that every vertex in V is incident with zero or two edges from S, whereas s and t
are each incident with exactly one edge in S. Therefore S consists of an s − t path PS and
some other circuits. Now the circuits in S must have cost zero. This is because if a circuit
has positive cost then the cost of the matching can be reduced further by pairing up the
vertices in the circuit as shown in figure 3.
Figure 3: Circuits not involving edges in S should have zero costs
9
Note that this defines a cost preserving bijection between s − t paths in G to perfect
matchings in ¯G.
Using the algorithm from section 2.3, by Lemma 2.7, we have:
Theorem 2.8. There exists a log n approximate algorithm for the discounted shortest path
problem.
3 Hardness of Approximation
In this section we present hardness of approximation results for the problems defined earlier.
Unlike some of the previous work on combinatorial optimization [9, 18] over non-linear cost
functions, the bounds presented here are not information theoretic but are contingent on
N P = DT IM E(nO(log log n)). It should be noted that the discount functions for the agents
are the only part of the input that is not presented explicitly. However it is well known
that concave functions that accessible through an oracle can be closely approximated by a
piecewise linear function using few queries to the oracle. So, we are not handicapped by
the lack of information from solving these problems optimally.
To show the hardness of approximation of the problems stated earlier we consider the
following general problem and use a reduction from set cover to establish its hardness of
approximation.
Discounted Reverse Auction: We are given a a set E of n items and a set A of agents
each of whom specifies a function ca : E → R+. Here ca(e) is the cost for procuring item e
from agent a. Each agent also specifies a discounted price function given by da : R+ → R+.
ca(e)) is
The task is to find a partition P = {P1 ··· Pk} of E such that (cid:80)
a∈A da((cid:80)
e∈Pa
minimized.
Lemma 3.1. It is hard to approximate the discounted reverse auction problem within factor
(1 − o(1)) log n unless N P = DT IM E(nO(log log n)).
Proof. Refer to Appendix A4
This reduction can be extended to other combinatorial problems in this setting to give
logarithmic hardness of approximation for many combinatorial problems. This can be
achieved by considering an instance of the problem where we have just one combinatorial
object and our task is the allocate it optimally among the agents. For example for the
discounted spanning tree problem we consider the instance when the input graph is itself
a tree and we have to optimally allocate its edges among the agents to minimize the total
price. Thus, we have the following:
Theorem 3.2. It is hard to approximate any of the problems of the discounted edge cover,spanning
tree,perfect matching and shortest path can be approximated within factor (1 − o(1)) log n
on a graph over n vertices unless N P = DT IM E(nO(log log n)).
10
References
[1] Gruia Calinescu, Ra Chekuri, Martin Pl, and Jan Vondrk. Maximizing a submodular
set function subject to a matroid constraint. In Proc. of 12 th IPCO, page 2007, 2007.
[2] William Cook and Andr Rohe. Computing minimum-weight perfect matchings. IN-
FORMS Journal on Computing, 11:138 -- 148, 1998.
[3] Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, and Clifford Stein. Intro-
duction to Algorithms. The MIT Press, 2001.
[4] Sven de Vries and Rakesh V. Vohra. Combinatorial auctions: A survey. INFORMS
Journal on Computing, (3):284 -- 309, 2003.
[5] Edsger W. Dijkstra. A note on two problems in connexion with graphs. Numerische
Mathematik, 1:269 -- 271, 1959.
[6] Jack Edmoonds. Paths,trees and flowers. Canad J.Math, 17, 1965.
[7] Uriel Feige. A threshold of ln n for approximating set cover. Journal of the ACM,
45:314 -- 318, 1998.
[8] Uriel Feige and Vahab S. Mirrokni. Maximizing non-monotone submodular functions.
In In Proceedings of 48th Annual IEEE Symposium on Foundations of Computer Sci-
ence (FOCS, page 2007, 2007.
[9] Gagan Goel, Chinmay Karande, Pushkar Tripathi, and Lei Wang. Approximability
of combinatorial problems with multi-agent submodular cost functions. In FOCS '09:
Proceedings of the 2009 50th Annual IEEE Symposium on Foundations of Computer
Science, 2009.
[10] M.X. Goemans, N.J.A. Harvey, S. Iwata, and V. Mirrokni. Approximating submodular
functions everywhere. In SODA '09: Proceedings of the 20th ACM-SIAM Symposium
on Discrete Algorithms, 2009.
[11] Satoru Iwata and Kiyohito Nagano. Submodular function minimization under covering
constraints. In FOCS '09: Proceedings of the 2009 50th Annual IEEE Symposium on
Foundations of Computer Science, 2009.
[12] Johnson and David S. Approximation algorithms for combinatorial problems. In STOC
'73: Proceedings of the fifth annual ACM symposium on Theory of computing, pages
38 -- 49, New York, NY, USA, 1973. ACM.
[13] Joseph B. Kruskal. On the shortest spanning subtree of a graph and the traveling
salesman problem. Proceedings of the American Mathematical Society, 7(1):48 -- 50,
February 1956.
11
[14] Jon Lee, Vahab S. Mirrokni, Viswanath Nagarajan, and Maxim Sviridenko. Non-
monotone submodular maximization under matroid and knapsack constraints.
In
STOC '09: Proceedings of the 41st annual ACM symposium on Theory of comput-
ing, pages 323 -- 332, New York, NY, USA, 2009. ACM.
[15] Vahab Mirrokni, Michael Schapira, and Jan Vondrak. Tight information-theoretic lower
bounds for welfare maximization in combinatorial auctions. In EC '08: Proceedings of
the 9th ACM conference on Electronic commerce, pages 70 -- 77, New York, NY, USA,
2008. ACM.
[16] Noam Nisam, Tim Roughgarden, ´Eva Tardos, and Vijay V. Vazirani. Algorithmic
Game Theory. Cambridge University Press, September 2007.
[17] Seth Pettie and Vijaya Ramachandran. An optimal minimum spanning tree algorithm.
J. ACM, 49(1):16 -- 34, 2002.
[18] Zoya Svitkina and Lisa Fleischer. Submodular approximation: Sampling-based algo-
rithms and lower bounds. In FOCS '08: Proceedings of the 2008 49th Annual IEEE
Symposium on Foundations of Computer Science, pages 697 -- 706, Washington, DC,
USA, 2008. IEEE Computer Society.
Appendix
A1 Proof of Claim 1
To find the desired set we construct a graph G(cid:48) = (V (cid:48), E(cid:48)) as follows: Add a set X ∪ Y to
the set of vertices in G, where X = Q and Y = n− d. Match every vertex X to a vertex
Q with an edge of cost 0. Connect each vertex in Y to each vertex in V by an edge of very
large cost. Set the cost of each edge e ∈ E as ca(e). Find the minimum cost edge cover in
G(cid:48). Let S∗ be such a cover. It is easy to verify that S∗ is the desired set.
A2 Proof of Lemma 2.4
We may assume that the agent a, and the size of V (F ) − Z in the formula for αM
a (F ) are
fixed by iterating over all values of these parameters. So the above statement may be viewed
as one concerning a single agent for a fixed value of V (F ) − Z. Let this agent be a ∈ A
and let t = V (F ) − Z.
i.e. We wish to find the minimum discounted weight matching
which saturates t new vertices(not in Z) and keeps the vertices in Z saturated. We create
an auxiliary graph G(cid:48) by adding n − (Z + t) vertices to V . We add edges connecting each
of the newly added vertex with each vertex in V − Z. Let E(cid:48) be the set of newly added
a by setting the cost of edges in E(cid:48) to be 0. Finally we find
edges. We extend cM
a
the minimum weight perfect matching in G(cid:48) under the cost function cM
a . Let M(cid:48) be this
matching. It is easy to check that M(cid:48)− E(cid:48) is the desired matching saturating t new vertices.
to cM
12
A3 Proof of Claim 3
For i ∈ {1··· n}, suppose vi is covered in phase r. Let Gr be the underlying graph at the
beginning of phase r. Since vi, vi+1, ..., vn are not covered before phase r, Gr contains at
least n − i + 1 vertices. Since the optimal spanning tree can cover the vertices in Gr by a
price of OP TST , by our greedy choice, p(vi) ≤ OP TST /(n − i + 1).
Similarly, let 1 ≤ j ≤ n(cid:48) and assume zj is covered in phase r. Since we should be able
to produce zj+1, zj+2, ..., zn(cid:48) from contraction on vertices of Gr, there are at least n(cid:48) − r
vertices in Gr. Therefore we have p(zj) ≤ OP TST /(n(cid:48) − j).
A4 Proof of Lemma 3.1
We reduce set cover to the discounted reverse auction problem to prove this result.
Consider an instance I = (U, C, w) of set cover where we wish to cover all elements
in the universe U using sets from C to minimize the sum of weights under the weight
function w : U → R+. We define an instance, I(cid:48) of our discounted reverse auction problem
corresponding to I in the following way. Let U be the set of items. For every set S ∈ C
define an agent aS, whose cost function ca assigns the value w(S) for every element s ∈ S
and sets the cost of all other elements in U to be infinity. The discount price function for
the agent is shown in figure A1. Here the slope of the second segment is small enough.
Figure A1: Discount function for agent corresponding to set S
Consider a solution for I(cid:48) where we procure at least one item from agent aS; then we
can buy all elements in S from aS without a significant increase in our payment. So the
cost of the optimal solution to I can be as close to the price of the optimal solution for
I(cid:48) as we want. By [7], set cover is hard to approximate beyond a factor of log n unless
N P = DT IM E(nO(log log n)). Therefore the discounted reverse auction problem can not be
approximated within factor (1 − o(1)) log n unless N P = DT IM E(nO(log log n)).
13
|
1909.01741 | 1 | 1909 | 2019-09-04T12:46:08 | B\"uchi automata for distributed temporal logic | [
"cs.MA"
] | The distributed temporal logic DTL is a logic for reasoning about temporal properties of distributed systems from the local point of view of the system's agents, which are assumed to execute sequentially and to interact by means of synchronous event sharing. Different versions of DTL have been provided over the years for a number of different applications, reflecting different perspectives on how non-local information can be accessed by each agent. In this paper, we propose a novel notion of distributed B\"uchi automaton envisaged to encompass DTL with a model-checking mechanism. | cs.MA | cs |
Buchi automata for distributed
temporal logic
Jaime Ramos
Dep. Matem´atica, Instituto Superior T´ecnico, Universidade de Lisboa, Portugal
SQIG, Instituto de Telecomunica¸coes, Portugal
[email protected]
September 5, 2019
Abstract
The distributed temporal logic DTL is a logic for reasoning about
temporal properties of distributed systems from the local point of view
of the system's agents, which are assumed to execute sequentially and
to interact by means of synchronous event sharing. Different versions of
DTL have been provided over the years for a number of different applica-
tions, reflecting different perspectives on how non-local information can
be accessed by each agent. In this paper, we propose a novel notion of
distributed Buchi automaton envisaged to encompass DTL with a model-
checking mechanism.
Keywords: Distributed Temporal Logic (DTL), Buchi automata, dis-
tributed systems, specification and verification, model-checking.
1
Introduction
The distributed temporal logic DTL was introduced in [13] as a logic for speci-
fying and reasoning about distributed information systems. DTL allows one to
reason about temporal properties of distributed systems from the local point of
view of the system's agents, which are assumed to execute sequentially and to
interact by means of synchronous event sharing. In DTL, distribution is implicit
and properties of entire systems are formulated in terms of the local properties
of the agents and their interaction. The logic was shown to be decidable, as well
as trace-consistent, which makes it suitable for model-checking tasks.
Different versions of distributed temporal logic have been given over the
years for a number of different applications, reflecting different perspectives on
how non-local information can be accessed by each agent. In particular, DTL
has proved to be useful in the context of security protocol analysis in order to
reason about the interplay between protocol models and security properties [8,
9, 5]. However, most of the results for security protocol analysis and for other
case studies were obtained directly by semantic arguments.1 To overcome this
1DTL is closely related to the family of temporal logics whose semantics are based on
the models of true concurrency introduced and developed in [17, 18, 21]. In particular, the
1
problem, a labeled tableaux system for DTL was proposed in [3, 4]. The main
goal was to have a usable deductive system in which deductions followed closely
semantic arguments, also thanks to the labeling of the formulas along with a
labeling algebra capturing the different semantic properties.
The labeled tableaux system was proved to be sound and complete, but
decidability was not considered in [3, 4] and the system included an infinite
closure rule to capture eventualities that are always delayed. Hence, the labeled
system proved to be quite hard to use in practice although several properties
can still be proved using only the tableaux system. For instance, the correctness
of the two-phase commit protocol
is one of such examples where a decision
procedure is not needed. The DTL specification for a simplified version of the
protocol as well as a proof of correctness using labelled tableaux can be found
in [4].
Nevertheless, DTL was shown to be decidable via a translation to linear
temporal logic (LTL). However, when translating DTL specifications into LTL
specifications, we lose one of the main advantages of DTL, namely the natural-
ness of the distributed nature of DTL, which allows for more natural and simpler
specifications. Later, in [7], a decidable tableaux system was proposed for DTL.
The tableaux system was built on top of a tableaux system for LTL as presented
in [15]. Similar systems for LTL have also been proposed, e.g., [16]. In the case
of DTL, the tableaux system integrated in a smooth way both the usual rules
for the temporal operators and rules for tackling the specific communication
features of DTL.
In this paper, we take a first step towards empowering DTL with model-
checking tools. Nowadays, systems are becoming more and more complex which
makes the task of verification such systems harder. Model-checking stands out
as a tool well suited for automatic verification, which has been successfully
used in industry with several well documented cases [19, 14, 2]. Depending
on the temporal logic considered [20, 11], the approach to model-checking is
different[10, 12, 22]. In the case of DTL, we adopt an approach closer to the
usual approaches in LTL, based on Buchi automata [22]. Our goal is to use
Buchi automata to capture DTL models.
For the local component of our automata, we follow closely the ideas in [22,
It is worth mentioning that, similar to [1], in which an anchored version
1].
of LTL is considered, in this paper we consider an anchored version of DTL.
This anchored version of DTL is less expressive in terms of global reasoning
since DTL does not include global temporal operators and, thus, we cannot use
the usual correspondence between anchored and floating semantics of temporal
logic. However, it let us focus on the distributed nature and synchronization
primitives of the logic.
We proceed as follows. In Section 2, we briefly introduce DTL, its syntax,
semantics and some auxiliary notions that will be useful later. In Section 3, we
present distributed Buchi automata for DTL and prove the correctness of the
construction with respect to the semantics of DTL. In Section 4, we conclude
and discuss future work.
semantics of these logics are based on a conflict-free version of Winskel's event structures [23],
enriched with information about sequential agents.
2
2 The Distributed Temporal Logic DTL∅
As we mentioned above, a number of variants of DTL have been considered in
the past, especially to adapt it to specific applications and case studies. In this
paper, we consider an anchored variant of DTL that we call DTL∅ and that has
the following syntax and semantics.
2.1 Syntax
The logic is defined over a distributed signature
Σ = hId , {Prop}i∈Id i ,
where Id is a finite non-empty set (of agent identifiers) and, for each agent
i ∈ Id , Prop i is a set of local state propositions, which, intuitively characterize
the current local states of the agents. We assume that Prop i ∩ Prop j = ∅, for
i 6= j.
The local language Li of each agent i ∈ Id is defined by
Li ::= Prop i ¬ Li Li ⇒ Li X Li G Li c(cid:13)j[Lj]
with j ∈ Id . We will denote such local formulas by the letters ϕ and ψ. As the
names suggests, local formulas hold locally for the different agents. For instance,
locally for an agent i, the operators X and G are the usual next (tomorrow) and
always in the future temporal operators, whereas the communication formula
c(cid:13)j[ψ] means that agent i has just communicated (synchronized) with agent j,
for whom ψ held.
Other logical connectives (conjunction ∧, disjunction ∨, true ⊤, etc.) and
temporal operators (sometime in the future F) can be defined as abbreviations
as is standard.
The global language L is defined by
L ::= @i[Li] ¬ L L ⇒ L
with i ∈ Id . We will denote the global formulas by α, β and δ. A global formula
@i[ϕ] means that the local formula ϕ holds for agent i.
In the sequel, we will need some auxiliary notions. The set of i-literals is the
set of all state propositions and their negations:
Liti = Prop i ∪ {¬ p p ∈ Prop i}.
An i-valuation v is a set of i-literals such that for each p ∈ Prop i, p ∈ v iff
¬ p /∈ v. The set of all i-valuations is denoted by Vi. Observe that Vi ⊆ 2Liti .
Given i ∈ Id and ϕ, ψ ∈ Li, we say that ψ is an i-subformula of ϕ if ψ is ϕ
or:
• ϕ is ¬ ϕ1 and ψ is a subformula of ϕ1;
• ϕ is ϕ1 ⇒ ϕ2 and ψ is a subformula of ϕ1 or of ϕ2;
• ϕ is X ϕ1 and ψ is a subformula of ϕ1;
• ϕ is G ϕ1 and ψ is a subformula of ϕ1.
3
We denote by subfi(ϕ) the set of all i-subformulas of ϕ. When no confusion
arises, we drop the reference to i and talk about subformulas. For instance, the
set of subformulas of G(p ⇒ c(cid:13)j[q1 ⇒ q2]) ∈ Li, subfi(G(p ⇒ c(cid:13)j[q1 ⇒ q2])), is
{G(p ⇒ c(cid:13)j[q1 ⇒ q2]), p ⇒ c(cid:13)j[q1 ⇒ q2], p, c(cid:13)j[q1 ⇒ q2]}.
Note that, from the point of view of agent i, formula c(cid:13)j[q1 ⇒ q2] has no further
structure and is treated as atomic.
The i-closure of ϕ is the set of all its subformulas and their negations with
the proviso that ¬ ¬ ψ is identified with ψ, that is,
closurei(ϕ) = subfi(ϕ) ∪ {¬ ψ ψ ∈ subfi(ϕ)}.
Again, when no confusion arises, we will talk about the closure of a formula.
We also define similar concepts for the global language. Given α, β ∈ L, we
say that β is a subformula of α if β is α or:
• α is @i[ψ] and β ∈ subfi(ϕ)
• α is ¬ α1 and β is a subformula of α1;
• α is α1 ⇒ α2 and β is a subformula of α1 or of α2.
For instance, the set of subformulas of formula @i[X(p ⇒ c(cid:13)j[q])] ⇒ @j[X q],
subf(@i[X(p ⇒ c(cid:13)j[q])] ⇒ @j[X q]), is:
{@i[X(p ⇒ c(cid:13)j[q])] ⇒ @j[X q], @i[X(p ⇒ c(cid:13)j[q])], @j[X q]}
∪ subfi(X(p ⇒ c(cid:13)j[q])) ∪ subfj(X q) =
{@i[X(p ⇒ c(cid:13)j[q])] ⇒ @j[X q], @i[X(p ⇒ c(cid:13)j[q])], @j[X q]}
∪ {X(p ⇒ c(cid:13)j[q]), p ⇒ c(cid:13)j[q], p, c(cid:13)j[q], X q, q}.
The closure of α is the set of all its subformulas and their negations with
the proviso that ¬ ¬ β is identified with β, that is,
closure(α) = subf(α) ∪ {¬ β β ∈ subf(α)}.
Finally, given a set B ⊆ closure(α) and i ∈ Id we denote B↓i the subset of
B that contains all the global formulas of B and no local formulas other than
those of agent i, that is, B↓i satisfies the following conditions:
• B↓i⊆ B;
• B↓i ∩L = B ∩ L;
• B↓i ∩Li = B ∩ Li;
• B↓i ∩Lj = ∅, for j 6= i.
For instance, if B = {@i[X(p ⇒ c(cid:13)j[q])]⇒@j[X q], X(p⇒ c(cid:13)j[q]), c(cid:13)j[q], X q} then
B↓i= {@i[X(p ⇒ c(cid:13)j[q])] ⇒ @j[X q], X(p ⇒ c(cid:13)j[q]), c(cid:13)j[q]}
and
B↓j= {@i[X(p ⇒ c(cid:13)j[q])] ⇒ @j[X q], X q}.
4
2.2 Semantics
The interpretation structures of L are labeled distributed life-cycles, built upon
a simplified form of Winskel's event structures [23].
A local life-cycle of an agent i ∈ Id is a countable infinite, discrete, and well-
founded total order λi = hEv i, ≤ii, where Ev i is the set of local events and ≤i
the local order of causality. We define the corresponding local successor relation
→i ⊆ Ev i × Ev i to be the relation such that e →i e′ if e <i e′ and there is no
e′′ such that e <i e′′ <i e′. As a consequence, we have that ≤i = →∗
i , i.e., ≤i is
the reflexive and transitive closure of →i.
A distributed life-cycle is a family λ = {λi}i∈Id of local life-cycles such that
≤= (Si∈Id ≤i)∗ defines a partial order of global causality on the set of all events
Ev =Si∈Id Ev i.
Communication is modeled by event sharing, and thus for some event e we
may have e ∈ Ev i ∩ Ev j, with i 6= j. In that case, requiring ≤ to be a partial
order amounts to requiring that the local orders are globally compatible, thus
excluding the existence of another e′ ∈ Ev i ∩ Ev j such that e <i e′ but e′ <j e.
We denote by Ids(e) the set {i ∈ Id e ∈ Ev i}, for each e ∈ Ev .
We can check the progress of an agent by collecting all the local events that
have occurred up to a given point. This yields the notion of the local state of
agent i, which is a finite set ξi ⊆ Ev i down-closed for local causality, i.e., if
e ≤i e′ and e′ ∈ ξi then also e ∈ ξi. The set Ξi of all local states of an agent i
is totally ordered by inclusion and has ∅ as the minimal element.
Each non-empty local state ξi is reached, by the occurrence of an event that
we call last (ξi), from the local state ξi \ {last(ξi)}. The local states of each agent
are totally ordered, as a consequence of the total order on local events. Since
they are discrete and well-founded, we can enumerate them as follows: ∅ is the
0th state; {e}, where e is the minimum of hEv i, ≤ii, is the 1st state; and if ξi
is the kth state of agent i and last (ξi) →i e, then ξi ∪ {e} is agent i's (k + 1)th
state.
We will denote by ξk
i the kth state of agent i, so ξ0
i = ∅ is the initial state
i is the state reached from the initial state after the occurrence of the first
is the only state of agent i that contains k elements, i.e.,
i = k. Given e ∈ Ev i, e ↓i= {e′ ∈ Ev i e′ ≤i e} is always a local state.
and ξk
k events. In fact, ξk
i
where ξk
Moreover, if ξi is non-empty, then last (ξi) ↓i= ξi.
We can also define the notion of a global state: a finite set ξ ⊆ Ev closed for
global causality, i.e. if e ≤ e′ and e′ ∈ ξ, then also e ∈ ξ. The set Ξ of all global
states constitutes a lattice under inclusion and has ∅ as the minimal element.
Clearly, every global state ξ includes the local state ξi = ξ ∩ Ev i of each agent
i. Given e ∈ Ev , e↓= {e′ ∈ Ev e′ ≤ e} is always a global state.
Figure 1 depicts a distributed life-cycle where each row comprises the local
life-cycle of one agent. In particular, Ev i = {e1, e4, e5, e8, . . . } and →i corre-
sponds to the arrows in i's row. We can think of the occurrence of event e1 as
leading agent i from its initial state ∅ to the state {e1}, and the the occurrence
of event e4 as leading to state {e1, e4}, and so on. Shared events at communica-
tion points are highlighted by the dotted vertical lines. Note that the numbers
annotating the events are there only for convenience since, in general, no global
total order on events is imposed. Figure 2 shows that corresponding lattice of
global states.
An interpretation structure µ = hλ, ϑi consists of a distributed life-cycle λ
5
i
j
k
e1
e2
e3
e4
e4
e4
e5
e6
e8
e8
e9
. . .
. . .
. . .
e7
e7
Figure 1: A distributed life-cycle for agents i, j and k.
{e1}
{e1, e2}
{e1, e2, e3, e4, e5}
∅
{e2}
{e1, e3}
{e1, e2, e3}
{e1, e2, e3, e4}
. . .
{e3}
{e2, e3}
{e1, e2, e3, e4, e6}
Figure 2: The lattice of global states.
and a family ϑ = {ϑi}i∈Id of local labeling functions, where, for each i ∈ Id ,
ϑi : Ξi → ℘(Prop i) associates a set of local state propositions to each local
state. We denote the tuple hλi, ϑii also by µi.
We can the define a global satisfaction relation as follows. Given a global
interpretation structure µ and a global state ξ then
• µ, ξ (cid:13) ¬α if µ, ξ 6(cid:13) α;
• µ, ξ (cid:13) α ⇒ β if µ, ξ 6(cid:13) α or µ, ξ, (cid:13) β;
• µ, ξ (cid:13) @i[ϕ] if µi, ξi (cid:13)i ϕ.
The local satisfaction relations at local states are defined by
• µi, ξi (cid:13)i p if p ∈ ϑi(ξi);
• µi, ξi (cid:13)i ¬ ϕ if µi, ξi 6(cid:13)i ϕ;
• µi, ξi (cid:13)i ϕ ⇒ ψ if µi, ξi 6(cid:13)i ϕ or µi, ξi (cid:13)i ψ;
• µi, ξi (cid:13)i X ϕ if there is e ∈ Ev i\ξi such that ξi∪{e} ∈ Ξi and µi, ξi∪{e} (cid:13)i ϕ;
• µi, ξi (cid:13)i G ϕ if µi, ξ′
i
(cid:13)i ϕ, for every ξ′
i ∈ Ξi such that ξi ⊆ ξ′
i;
• µi, ξi (cid:13)i c(cid:13)j[ϕ] if ξi 6= ∅, last (ξi) ∈ Ev j and µj, last(ξi)↓j (cid:13)j ϕ.
We say that µ (globally) satisfies α, or that µ is a model of α, written µ (cid:13) α,
whenever µ, ∅ (cid:13) α. As expected, α is said to be satisfiable whenever there is
µ such that µ (cid:13) α. We denote by Mod(α) the set of all models of α. We
define similar notion for the local languages. We say that µi (locally) satisfies
ϕ, written µi (cid:13)i ϕ if µi, ∅ (cid:13)i ϕ.
The following result will be useful in the future. It basically captures the
traditional fixed-point characterization of the G temporal operator:
G ϕ ⇔ (ϕ ∧ X G ϕ).
6
Lemma 2.1 Let µi be a local interpretation structure and ξi ∈ Ξi any of its
local states. Then
1. µi, ξi (cid:13)i G ϕ iff µi, ξi (cid:13)i ϕ and µi, ξi ∪ {e} (cid:13)i G ϕ, provided that ξi ∪ {e} ∈
Ξi.
3 Distributed Buchi Automata
In this section we present Buchi automota for DTL. We start by presenting
the traditional notion of nondeterministic Buchi automaton and generalized
nondeterministic Buchi automaton. We use these notions to capture the local
behaviour of the agents, given that each agent is essentially linear. In this case,
we follow very closely the ideas presented in [1]. Then, we propose a novel notion
of distributed Buchi automaton to capture the distributed nature of DTL.
A nondeterministic Buchi automation (NBA) is a tuple A = hQ, Σ, δ, Q0, F i
where:
• Q is a nonempty finite set of states;
• Σ is a finite set alphabet symbols such that Q ∩ Σ = ∅;
• δ : Q × Σ → 2Q is the transition function;
• Q0 ⊆ Q is a set of initial states;
• F ⊆ Q is a set of acceptance states (also called final states).
a−→ qk′ instead. Let Σω denote the set of
When q′ ∈ δ(q, a), we may write q
all infinite words over Σ. A run for w = a0a1a2 · · · ∈ Σω in A is an infinite
ak−→ qk+1, for k ∈ N:
sequence q0q1q2 . . . of states in A such that q0 ∈ Q0 and qk
q0
a0−→ q1
a1−→ q2
a2−→ . . .
A run q0q1q2 . . . is accepting if qk ∈ F for infinitely many indices k ∈ N. The
accepted language of A is
L(A) = {w ∈ Σω there exists an accepting run for w in A}.
A generalized nondeterministic Buchi automaton (GNBA) is a tuple G =
hQ, Σ, δ, Q0, Fi where Q, Σ, δ and Q0 are defined just as for NBA and F is a
(possibly empty) subset of 2Q. The elements of F are called acceptance sets.
A run for w = a0a1a2 · · · ∈ Σω in G is defined as in the case of an NBA. A
run q0q1q2 . . . is accepting if for each acceptance set F ∈ F there are infinitely
many indices k ∈ N such that qk ∈ F . The accepted language for a GNBA is
defined just as for the case of an NBA.
The classes of NBA's and GNBA's are equivalent in the sense that they
accept exactly the same languages. Every NBA is a particular case of a GNBA.
Furthermore, for each GNBA G there exists an NBA AG such that L(AG) =
L(G). Details of this equivalence can be found in [1].
In the sequel, we overload the ↓i notation and use q↓i to denote the projection
of tuple q over component i.
Next, we present the novel notion of distributed Buchi automata for DTL.
From now on, we assume fixed a distributed signature Σ = hId , {Prop}i∈Id i.
7
For each i ∈ Id , let Ai = hQi, Σi, δi, Q0i, Fii be an NBA such that for distinct
i, j ∈ Id :
• Qi ∩ Qj = ∅;
A distributed nondeterministic Buchi automaton (DNBA) based on {Ai}i∈Id is
a tuple
D = hQ, Σ, δ, Q0, Fi
such that:
• Q =Ni∈Id Qi;
• Σ = {a ⊆ ⊎i∈Id Σi a 6= ∅ and a ∩ Σi ≤ 1, for i ∈ Id };
• δ : Q × Σ → 2Q is such that δ(q, a) is the set of all states q′ satisfying:
-- if a ∩ Σi = ∅ then q′↓i= q↓i;
-- if a ∩ Σi 6= ∅ then q′↓i∈ δi(q↓i, a ∩ Σi);
• Q0 =Ni∈Id Q0i ;
• F = {Fi ⊆ Q
for i ∈ Id } such that Fi = {q ∈ Q q↓i∈ Fi};
The states of the DNBA are tuples of states from the local automata, one
for each agent. Each symbol of the distributed alphabet is a nonempty set of
symbols of the local automata with the proviso that in each global symbol there
is at most one symbol from each agent. The transition from one state to the
next at the global level is guided by the local behaviour of each component. If,
for a particular global symbol a, agent i is not involved, that is, if a ∩ Σi = ∅
then for this transition the agent's local state will not change. If, on the other
hand, the agent is involved in a, that is, if a ∩ Σi 6= ∅ then the agent's local
state will change according to its local behaviour, which is dictated by δi. Note
that, in this case, we are abusing notation. If a ∩ Σi 6= ∅ then a ∩ Σi is a set,
a singleton {a′} with a′ ∈ Σi, but nevertheless, a set. Hence, when we write
δi(q↓i, a ∩ Σi) we obviously mean δi(q↓i, a′).
The language accepted by the distributed automaton will be as expected. It
will accepted all the local words of the local automata. However, we need one
additional proviso: we only consider fair words. A global word a0a1a2 is fair
if, for every i ∈ Id , ak ∩ Σi 6= ∅, for infinitely many indices k ∈ N. We need
to ensure that a global accepting run is locally accepting for each agent. So,
we cannot simply promote a state q to accepting because one of its components
is accepting in the local automaton. This would allow for the acceptance of
other words from other local automata. A global run for a fair word w in D is
ak−→ qk+1, just as for the local case.
a sequence of states q0q1q2 . . . such that qk
is accepting if, for each i ∈ Id , qk ∈ Fi, for infinitely
A global run a0a1a2 . . .
many indices k ∈ N.
Let w = a0a1a2 · · · ∈ Σω be a fair global word. Then, we denote by w↓i the
local word obtained from w as follows:
• first, consider the projection w′ = (a0 ∩ Σi)(a1 ∩ Σi)(a2 ∩ Σi) . . . over the
alphabet Σi;
• then, let w↓i be the local word obtained from w′ by removing all the empty
sets and replacing each nonempty set {a} by its element a.
8
Recall that ak ∩ Σi ≤ 1 hence ak ∩ Σi is either a singleton or the empty set.
Similarly, let τ = q0q1q2 . . . be a global run for w = a0a1a2 . . . . Then, we
denote by τ↓w,i the local run for w↓i obtained from τ as follows:
• first, consider the projection τ ′ = q0↓i q1↓i q2↓i . . . over the states of Ai;
• then, let τ ↓w,i be the local run obtained from τ ′ by removing qk+1 if
(ak ∩ Σi) = ∅, for k ∈ N.
In this case, we project each global state on its local component for agent i
and then remove all the states resulting from transitions where agent i was not
involved. The follow lemma proves that w↓i is indeed a word in Σω
i and that
τ↓w,i is a local run for w↓i in Ai.
Lemma 3.1 Let D be a DNBA based on {Ai}i∈Id . If τ = q0q1q2 . . . is a global
run for a fair global word w = a0a1a2 · · · ∈ Σω then, for each i ∈ Id :
1. w↓i∈ Σω
i ;
2. τ↓w,i is a local run for w↓i in Ai.
Furthermore, τ is accepting if and only if τ↓w,i is accepting, for every i ∈ Id .
Proof: 1. Straightforward from the definition of w↓i and the fact that w is fair.
2. We briefly sketch the intuition behind this result. Consider the situation:
. . . h. . . , qk, . . .i ak−→ h. . . , qk+1, . . .i
ak+1−→ h. . . , qk+2, . . .i . . .
where ak ∩ Σi = ∅ and ak+1 ∩ Σi 6= ∅. Then, in τ ↓w,i, we get the following
situation:
. . . qk
ak+1∩Σi−→ qk+2 . . .
where qk+1↓i was deleted. By definition of δ,
qk+1↓i= qk↓i and qk+2↓i∈ δi(qk+1↓i, ak+1 ∩ Σi).
It is not very difficult to conclude that this leads to a run in Ai. Furthermore,
the fact that τ is accepting if and only if τ↓w,i is accepting, for every i ∈ Id , is
an immediate consequence of the definition of global acceptance.
(cid:3)
Example 3.2 Consider the NBA's A1 and A2 depicted in Figure 3, with Σ1 =
{0, 1} and Σ2 = {a, b}. A1 accepts all the infinite words over {0, 1} with in-
finitely many 0's, and A2 accepts all the infinite words over {a, b} with finitely
many a's.
Now let us consider the DNBA D based on {A1, A2}. The alphabet is com-
posed of sets with one symbol from one or from the two agents:
Σ = {{0}, {1}, {a}, {b}, {0, a}, {0, b}, {1, a}, {1, b}}.
The set of states is
Q = {hq0, p0i, hq0, p1i, hq1, p0i, hq1, p1i}.
9
0
q1
1
q0
0
1
a, b
p0
b
b
p1
Figure 3: NBA's A1 (on the left) and A2 (on the right).
{1}, {a}, {b}
{1, a}, {1, b}
{1}, {b}, {1, b}
hq0, p0i
{b}, {1, b}
hq0, p1i
{1}
{1, a}
{1, b}
{0, b}
{0}
{0, a}
{0, b}
{1}
{1, b}
{0}
{0, b}
hq1, p0i
{b}, {0, b}
hq1, p1i
{0}, {a}, {b}
{0, a}, {0, b}
{0}, {b}, {0, b}
Figure 4: DNBA D based on {A1, A2}.
Of these, only hq0, p0i is initial, and
F1 = {hq1, p0i, hq1, p1i} and F2 = {hq0, p1i, hq1, p1i}.
The transition function δ is depicted is Figure 4.
It is not very difficult to observe that words with an infinite number of 0's
and a finite number of a's are accepted. For instance, the word
{1}{a}{1, b}{0, b}{0}{b}{0, b}{0}{b} . . .
is accepted given that state hq1, p1i is visited infinitely often, that is, a final state
form A1 and a final state from A2 are visited infinitely often. However, if this
was the only requirement for acceptance, then the word
{1}{a}{1, b}{0, b}{0}{0}{0}{0} . . .
would also be accepted given that state hq1, p1i, in this case, is also visited in-
finitely often. We don't want this word to be accepted because its projection on
A2 yields the finite word aba which is not part of the language of A2. But, this
global word is not a fair word hence it will not be accepted by D.
10
Our goal now is to define a DNBA Dα for a given formula α ∈ L that
accepts all the models of α and only those. To this end, we start by defining
some auxiliary notions.
From now on, assume fixed a global formula α. A set B ⊆ closure(α) is said
to be consistent with respect to propositional logic if:
• γ1 ⇒ γ2 ∈ B if and only if ¬ γ1 ∈ B or γ2 ∈ B, for γ1 ⇒ γ2 ∈ closure(α);
• if γ1 ∈ B then ¬ γ1 /∈ B;
• if ⊤ ∈ closure(α) then ⊤ ∈ B.
Herein, γ1, γ2 denote either local or global formulas.
A set B ⊆ closure(α) is said to be locally consistent with respect to the
temporal operator G if:
• if G ϕ1 ∈ B then ϕ1 ∈ B, for every G ϕ1 ∈ closure(α).
A set B ⊆ closure(α) is said to be i-consistent with respect to global formulas
if
• @i[ϕ] ∈ B iff ϕ ∈ B, for every @i[ϕ] ∈ subf(α).
A set B ⊆ closure(α) is said to be maximal if for all γ ∈ closure(α):
• if γ /∈ B then ¬ γ ∈ B.
A set B ⊆ closure(α) is i-elementary if it is consistent with respect to propo-
sitional logic, maximal and locally consistent with respect to the temporal op-
erator G and i-consistent with respect to global formulas. Elementary sets try
to capture all the properties that can be asserted locally. When i is clear from
context, we may write elementary instead of i-elementary.
Recall formula @i[X(p ⇒ c(cid:13)j[q])] ⇒ @j[X q]. The set
B1 = {@i[X(p ⇒ c(cid:13)j[q])] ⇒ @j[X q], @i[X(p ⇒ c(cid:13)j[q])], @j[X q],
X(p ⇒ c(cid:13)j[q]), X q, ¬ X p, ¬ c(cid:13)j[q], q}
is an example of an elementary sets. However, for instance, sets
B2 = {@i[X(p ⇒ c(cid:13)j[q])] ⇒ @j[X q], @i[X(p ⇒ c(cid:13)j[q])], ¬ @j[X q], . . . }
and
B3 = {@i[X(p ⇒ c(cid:13)j[q])] ⇒ @j[X q], ¬ @i[X(p ⇒ c(cid:13)j[q])], @j[X q], ¬ X q, . . . }
are not elementary. Set B2 is not consistent with propositional logic and set B3
is not j-consistent with global formulas.
We have all we need to define the envisaged DNBA. We start by defining
the local GNBA's Gi for each agent i ∈ Id . The construction is similar the one
presented in [1]. From these, we can then obtain equivalent NBAs Ai that will
be used to define the DNBA. Each GNBA Gi = hQi, Vi, δi, Q0i, Fii is as follows:
• Qi = {B↓i B ⊆ closure(α) and B is i-elementary};
• Q0i = {B ∈ Qi α ∈ B and c(cid:13)j[ϕ] /∈ B, for c(cid:13)j[ϕ] ∈ closure(α)};
11
• Fi = {FG ϕ G ϕ ∈ closure(α)} where
-- FG ϕ = {B ∈ Qi G ϕ ∈ B or ϕ /∈ B};
• δi : Qi × Vi → 2Qi is such that:
-- if v 6= B ∩ Liti then δi(B, v) = ∅;
-- if v = B ∩ Liti then δi(B, v) is the set of all elementary sets B′ such
that:
1. X ϕ ∈ B iff ψ ∈ B′, for every X ϕ ∈ closure(α);
2. G ϕ ∈ B iff ϕ ∈ B and G ϕ ∈ B′, for every G ϕ ∈ closure(α).
Recall that Vi is the set of all i-valuations and that a valuation is a set of literals
such that, for each propositional symbol either the symbol is in the valuation
or its negation is. This is the alphabet of the automaton. The states of the
automaton are all the elementary sets (restricted to the relevant formulas, that
is, all the global formulas and all the local formulas for the agent at hand).
Each state contains all the formulas that are intended to hold at that point. In
particular, initial states characterize the initial set-up conditions. We want α
to hold initially and, as imposed by the semantics of DTL, there can only by
synchronizations after the first event occurs. Hence, there can be no commu-
nication formulas in any initial state. Regarding the transition function, given
an alphabet symbol v and state B, the transition will only be enabled if the
valuation v agrees with the information in B, i.e., if the state propositions in
v are also present in B, meaning that they should be true, and the negation of
state propositions in v are also present in B, meaning that they should be false.
Additionaly, conditions (1) and (2) reflect the semantics of temporal operators.
In particular, condition (2) is based on the fixed-point semantics of the G oper-
ator. The final states are defined in order to capture the temporal semantics of
the G operator. They are basically used to exclude runs where, from a certain
point on, a formula ϕ is always true (that is, it present in all the states) but G ϕ
is not (that is, it is not present in the states of the run), for instance, as follows:
B0
v0−→ . . .
vk−1−→ {. . . , ϕ, . . . } vk−→ {. . . , ϕ, . . . }
vk+1−→ . . .
In this run, ϕ is present in all the states starting from k. Then, this means that
G ϕ is true from that point on. In order for the run to be accepting, FG ϕ must
be visited infinitely often. This means that after k and as ϕ ∈ Bn for n ≥ k
then G ϕ must be in infinitely of these states. Then, by condition (2) of the
transition function, G ϕ must be in all of them, as intended.
For each i ∈ Id , let Ai be an NBA equivalent to the GNBA Gi. Then
Dα = hQ, Σ, δ, Q0, Fi is the DNBA based on {Ai}i∈Id satisfying the following
conditions, for every q, q′ ∈ Q, a ∈ Σ and i, j ∈ Id :
(LC) if c(cid:13)j[ϕ] ∈ q↓i then ϕ ∈ q↓j;
(SC1) if q′ ∈ δ(q, a) and c(cid:13)j[ϕ] ∈ q′↓i and a ∩ Vi 6= ∅ then a ∩ Vj 6= ∅;
(SC2) if a ∩ Vi 6= ∅ and a ∩ Vj 6= ∅ and ϕ ∈ q′↓j then c(cid:13)j[ϕ] ∈ q′↓i.
12
Condition (LC) states that in a global state, if for agent i it holds c(cid:13)j[ϕ] then it
must be the case that ϕ holds for agent j, as intended for the semantics of the
communication primitive. Condition (SC1) states that in every state q′ reached
by a transition where i was an active participant (expressed by a ∩ Vi 6= ∅),
if c(cid:13)j[ϕ] holds for i then i and j must have just synchronized and so j must
also have been an active participant in a (expressed by a ∩ Vj 6= ∅). Finally,
condition (SC1) states that if i and j were both active in the last transition and
if ψ holds for agent j then, in the event that i wants to communicate with j, it
will be able to infer that ψ holds for j, that is, c(cid:13)j[ψ] holds for i.
We now proceed to show the correctness of this construction. We aim at
proving that any word accepted by the automaton is captured by a DTL model
of α and that any DTL model of α is represented by words accepted by the
automaton.
Let w = a0a1a2 . . . · · · ∈ L(Dα). Then, there is an accepting run τ =
q0q1q2 . . . in Dα. We denote by µτ = hλ, ϑi the interpretation structure induced
by τ (and consequently by w), defined as follows:
• Ev = {ek k ≥ 1};
• Ev i = {ek ∈ Ev ak−1 ∩ Vi 6= ∅};
• λi = hEv i ≤ii is the local life-cycle such that ek1 ≤i ek2 if k1 ≤ k2;
• λ = {λi}i∈Id is the corresponding distributed life-cycle;
• ϑi : Ξi → 2Propi is such that, for every p ∈ Prop i and ek ∈ Ev i:
0 if ¬ p ∈ q0↓i
-- ϑi(∅) =(1 if p ∈ q0↓i
-- ϑi(ξ ∪ {ek}) =(1
if p ∈ qk↓i
if ¬ p ∈ qk↓i
0
, for ξ ∈ Ξi;
• ϑ = {ϑi}i∈Id .
Note that each ϑi is well defined because qk is elementary. In the sequel, we can
consider the following enumeration of global events:
• ξ0 = ∅
• ξk = {e1, . . . , ek}, for k ≥ 1.
Theorem 3.3 If w ∈ L(Dα) then µτ ∈ Mod(α), for some accepting run τ for
w in Dα.
Proof: Let τ = q0q1q2 . . . . Our goal is to prove that µτ (cid:13) α. We start by
establishing a preliminary result for the local level. We prove that µτ
i , ξki (cid:13)i ψ
iff ψ ∈ qk↓i, for every ψ ∈ closure(α) ∩ Li. The proof is done by induction on
the structure of ψ, simultaneously for all agents.
Basis: ψ ∈ Prop i. Then, if k = 0 then ξ0 = ∅ and p ∈ q0 ↓i iff ϑi(∅) = 1
iff µτ
If ek ∈ Ev i then
ξki = ξ′ ∪ {ek}, for some local state ξ′ ∈ Ξi, and p ∈ qk↓i iff ϑi(ξ′ ∪ {ek}) = 1 iff
µτ
i , ξki (cid:13)i p. If ek /∈ Ev k, and consequently ak−1 ∩ Vi = ∅, then we distinguish
If k > 0, then ξk 6= ∅ and last (ξk) = ek.
i , ξ0 (cid:13)i p.
13
two cases: either (i) ak1 ∩ Vi = ∅, for every k1 < k; or (ii) there is k1 < k such
that Vk1 ∩ Vi 6= ∅. In the first case, this means that ek1 /∈ Ev i, for k1 < k and so
ξki = ∅ and, by definition of DNBA, it also follows that q0↓i= q1↓i= · · · = qk↓i.
The proof then follows as in the case of k = 0. In case (ii), let k1 be the greatest
k′ < k such that ak′ ∩ Vi 6= ∅. Then, ek1+1 ∈ Ev i, last (ξki) = ek1+1 and
ξki = ξ′ ∪ {ek1+1}, for some local state ξ′ ∈ Ξi. Furthermore, it follows by
definition of DNBA that qk1+1↓i= · · · = qk↓i. Hence, p ∈ qk↓i iff p ∈ qk1+1↓i iff
ϑi(ξ′ ∪ {ek1+1}) = 1 iff µτ
i , ξ′ ∪ {ek1+1} (cid:13)i p iff µτ
i , ξki (cid:13)i p.
Induction step: The case of propositional formulas is an immediate consequence
of the definition elementary set and we omit the details.
Assume that ψ = X ψ1. Additionally, assume also that X ψ1 ∈ qk ↓i. If ak ∩
Vi 6= ∅ then ψ1 ∈ qk+1 ↓i, by definition of Gi, and, by induction hypothesis,
i , ξk+1i (cid:13)i ψ1. But ak ∩ Vi 6= ∅ also implies that ek+1 ∈ Ev i and, so, ξk+1i =
µτ
i , ξki ∪ {ek+1} (cid:13)i ψ1 which implies
(ξk ∪ {ek+1})i = ξki ∪ {ek+1}. Hence, µτ
that µτ
i , ξki (cid:13)i X ψ1. If ak ∩ Vi = ∅ then let k1 be the least index greater than
k such that ak1 ∩ Vi 6= ∅. Then, by definition of DNBA, qk ↓i= · · · = qk1 ↓i
and so X ψ1 ∈ qk1 ↓i. Consequently, ψ1 ∈ qk1+1 ↓i. By induction hypothesis,
i , ξk1+1i (cid:13)i ψ1. By definition of Ev i, it follows that ek1+1 ∈ Ev i, ξk1 i =
µτ
ξki and thus ξk1+1i = (ξk1 ∪ {ek1+1})i = ξk1 i ∪ {ek1+1} = ξki ∪ {ek1+1}.
i , ξki (cid:13)i X ψ1. Assume now that
Hence, µτ
µτ
i , ξki (cid:13)i X ψ1. Then, there is e ∈ Ev i \ ξki such that ξki ∪ {e} ∈ Ξi and
i , ξki ∪ {e} (cid:13)i ψ1. Clearly, there is k1 > k such that e = ek1 and ξki ∪ {e} =
µτ
ξk1 i. Using the induction hypothesis, it follows that ψ1 ∈ qk1↓i. If k1 = k + 1
then ak ∩ Vi 6= ∅ and, by definition of Gi, X ψ1 ∈ qk ↓i.
If k1 > k + 1 then
ak ∩ Vi = · · · = ak1−2 ∩ Vi = ∅ and ak1−1 ∩ Vi 6= ∅. Hence qk↓i= · · · = qk1−1↓i
and if ψ1 ∈ qk1↓i then X ψ1 ∈ qk1−1↓i= qk↓i.
i , ξki ∪ {ek1+1} (cid:13)i ψ1 and thus µτ
i , ξk′
i , ξ′
i
i , ξki (cid:13)i G ψ1. Assume now that µτ
Assume now that ψ is G ψ1. We start by observing that for any run B0B1B2 . . .
in Gi if G ψ1 ∈ Bk then G ψ1 ∈ Bk′ for every k′ ≥ k. This is an immediate
consequence of condition (2) in the definition of δi and can easily be established
by induction. Assume first that G ψ ∈ qk↓i. Then, by the previous claim and
Lemma 3.1, it follows that G ψi ∈ qk′ ↓i for every k′ ≥ k. As each set qk′ ↓i
is elementary then it is locally consistent with respect to temporal operator
G and so ψ1 ∈ qk′ ↓i, for every k′ ≥ k. Using the induction hypothesis, it
i (cid:13)i ψ1, for every k′ ≥ k. And this last condition implies
follows that µτ
that µτ
(cid:13)i ψ1,
for every ξ′
i ⊇ ξki. A simple inductive argument allows us to conclude that
i , ξk′
i = ξ′
µτ
i ∪ {ek′ }
i = ξk′−1i and
which is in Ξi and satisfies ξ′
again ξk′
i ⊇ ξki. Hence, by induction hypothesis, it follows that ψ1 ∈ qk′ ↓i,
for every k′ ≥ k. As the run is accepting then, some of these states must be in
. Let qk1↓i, with k1 ≥ k, be the first of such states. Clearly, it must be the
FG ψ1
case that k1 = k. In fact, if k1 > k, given that ψ ∈ qk1↓i then, by condition (2)
in the definition of δi this would imply that G ψ1 ∈ qk1−1↓i forcing qk1−1↓i to
also be in FG ψ1
and thus contradicting the fact the k1 was the first final state
after k. Hence, G ψ1 ∈ qk↓i.
i (cid:13)i ψ1, for every k′ ≥ k. Note that if ek′ ∈ Ev i then ξk′
i ∪{ek′ } ⊇ ξki. If ek′ /∈ Ev i then ξk′
i , ξki (cid:13)i G ψ1. Then, µτ
Finally, assume that ψ = c(cid:13)j[ψ1]. If k = 0 then, by definition of initial state and
of the local satisfaction relation, ψ /∈ q0↓i and µτ
i , ∅ 6(cid:13)i ψ and the result follows.
14
If k > 0 then last (ξki) = ek. Assume first that c(cid:13)j[ψ1] ∈ qk↓i. Furthermore, let
k1 be the greatest index less that k such that ak1 ∩ Vi 6= ∅. Then ek1+1 ∈ Ev i.
We have to consider two cases: either (i) k1 = k − 1; or (i) k1 < k − 1. Let us
consider case (i). Then, by condition (SC1), it follows that ak1 ∩Vj 6= ∅ and thus
ek ∈ Ev j. Furthermore, by condition (LC), it follows that ψi ∈ qk ↓j. Hence,
j , ξkj (cid:13)j ψ1. But, as last (ξki) = ek = last (ξkj)
by induction hypothesis, µτ
j , last (ξki)↓j (cid:13)j ψ1 which implies
then last (ξki)↓j= last (ξkj)↓j= ξkj and so µτ
that µτ
i , ξki (cid:13)i c(cid:13)j[ψ1]. Consider now the case (ii). In this case, we know that
last (ξki) = ek1+1. We also know that qk1+1↓i= · · · = qk ↓i. Hence c(cid:13)j[ψ1] ∈
qk1+1↓i and, by condition (LC), it also follows that ψ1 ∈ qk1+1↓j. Additionally,
by condition (SC1), ak1 ∩ Vj 6= ∅, which implies that ek1+1 ∈ Ev j. Reasoning
i , ξk1+1i (cid:13)i c(cid:13)j[ψ1]. But ξk1+1i = ξki
as in case (i), we can conclude that µτ
given that last (ξki) = ek1+1 = last (ξk1+1i). Hence, µτ
i , ξki (cid:13)i c(cid:13)j[ψ1]. To
i , ξki (cid:13)i c(cid:13)j[ψ1]. Then last (ξki) ∈ Ev j and
prove the converse, assume that µτ
µτ
j , last(ξki)↓j (cid:13)j ψ1. Let last (ξki) = ek1 ∈ Ev i. Clearly, k1 ≤ k. Again, we
need to consider two cases: either (i) k1 = k; or (ii) k1 < k. In the first case,
ek ∈ Ev i implies that ak−1 ∩ Vi 6= ∅, ek ∈ Ev j implies that ak−1 ∩ Vj 6= ∅ and,
by induction hypothesis, ψ1 ∈ qk↓j, given that last (ξki) = ek = last (ξkj) and
j , ξkj (cid:13)j ψ1. Hence, using condition (SC2),
so µτ
we conclude that c(cid:13)j[ψ1] ∈ qk ↓i. If condition (ii) holds then ak1−1 ∩ Vi 6= ∅
and ak1 ∩ Vi = · · · = ak−1 ∩ Vi = ∅, which implies that qk1 ↓i= · · · = qk ↓i.
Furthermore, given that last ((ξki) ↓j) = ek1 then (ξki) ↓j= ξk1 ↓j. Thus,
µτ
j , ξk1 ↓j (cid:13)j ψ1 and, by induction hypothesis, ψ1 ∈ qk1 ↓j. Furthermore, like
in case (i), we also know that ak1−1 ∩ Vi 6= ∅ and ak1−1 ∩ Vj 6= ∅. Hence,
c(cid:13)j[ψ1] ∈ qk1↓i, which implies that c(cid:13)j[ψ1] ∈ qk↓i.
j , last (ξki)↓j (cid:13)j ψ1 implies µτ
Next, we prove a similar result for the global level. For each α1 ∈ closure(α),
α1 ∈ q0 iff µτ , ξ0 (cid:13) α1. We abuse notation and write α1 ∈ q0 to mean that
α1 ∈ qk ↓i, for some i ∈ Id . Clearly, q0 ↓i ∩subf(α) = q0 ↓j ∩subf(α), that
is, the initial states of all the local automata have exactly the same global
subformulas of α. Again, the proof follows by induction in the structure of
α. The propositional cases are immediate consequences of the properties of
elementary sets. So, let α1 = @i[ϕ]. Then, µτ , ξ0 (cid:13) @i[ϕ] iff µτ
i , ξ0i (cid:13)i ϕ iff
ϕ ∈ q0↓i, by the previous result, iff @i[ϕ] ∈ q0↓i, by the properties of elementary
sets, iff @i[ϕ] ∈ q0↓i.
(cid:3)
We now prove the converse, i.e, we prove that any DTL model of α can
be captured by Dα. Let µ = hλ, ϑi be an interpretation structure and let
hEv , ≤Ev i be the underlying global order on events.
It is always possible to
linearize hEv , ≤Ev i, i.e., it is always possible to define a bijection ℓ : N1 → Ev
such that if k1 <N k2 then ℓ(k1) <Ev ℓ(k2), where <N is the usual ordering on
the natural numbers. See, e.g., [6]. From now on, we assume fixed a linearization
function (or just linearization) ℓ, which induces an enumeration of the global
states as follows
• ξ0 = ∅;
• ξk = ξk−1 ∪ {ℓ(k)} for each k ≥ 1.
15
Consider the word wµ,ℓ = a0a1a2 . . . where
ak =
[i∈Ids (ℓ(k+1))
{p ∈ Liti µi, ξki (cid:13)i p}
This word represent one possible evolution of the system represented by µ. Our
goal is to show that wµ,ℓ is captured by Dα, that is, to show that wµ,ℓ ∈ L(Dα).
Theorem 3.4 If µ ∈ Mod(α) then wµ,ℓ ∈ L(Dα).
Proof: To show that wµ,ℓ ∈ L(Aα) we need to present an accepting run for wµ,ℓ.
For each k ∈ N consider the sets of formulas induced by µ:
• xi
0 = {α ∈ closure(α) µ, ξ0 (cid:13) α};
• xi
k =({α ∈ closure(α) µ, ξk (cid:13) α}
k−1
xi
if last (ξk) ∈ Ev i
otherwise
• yi
k = {ϕ ∈ closure(α) ∩ Li µi, ξki (cid:13)i ϕ}.
• qk = ⊗i∈Id (xi
k ∪ yi
k).
Each xi has information about the global formulas and each yi has information
about the local formulas of agent i. We start by establishing a structural result
If, for i ∈ Id , ℓ(k + 1) /∈ Ev i then
on the local component of the states.
k+1 = yi
yi
k. This is an immediate consequence of the fact that if ℓ(k + 1) /∈ Ev i
then ξk+1i = ξki and so yi
k+1 = yi
k.
k∪yi
k ∪ yi
Having established this result, we prove that each qk is a state in Dα. By
construction, we have that (xi
k ⊆ closure(α). Further-
more, each xi
k is i-elementary. The conditions concerning the connectives
and temporal operators are a consequence of the definition of the satisfaction
relation. The only condition worth checking is the one related to global formu-
k iff µ, ξk (cid:13) @i[ϕ] iff µi, ξki (cid:13)i ϕ
las. In this case, @i[ϕ] ∈ xi
iff ϕ ∈ yi
k iff @i[ϕ] ∈ xi
k)↓i= xi
k and xi
k ∪ yi
k∪yi
k∪yi
k iff ϕ ∈ xi
k ∪ yi
k.
Next, we prove that q0q1q2 . . . is a run for wµ,ℓ in Dα, that is, we need to
ak−→ qk+1, for every k ∈ N. The fact that q0 ∈ Q0
establish that q0 ∈ Q0 and qk
is straightforward. Indeed, q0 ∈ Q0 iff q0↓i∈ Q0i iff α ∈ q0↓i and q0↓i has no
0 because µ, ξ0 (cid:13) α given that
communication formulas. Observe that α ∈ xi
µ ∈ Mod(α). And q0↓i has no communication formulas because ξ0 = ∅ and so
ak−→ qk+1 we
it does not satisfy any communication formula. To prove that qk
consider two cases: (i) ak ∩ Vi = ∅; and (ii) ak ∩ Vi 6= ∅, for i ∈ Id .
(i) If ak ∩ Vi = ∅ then i /∈ Ids(ℓ(k + 1)) which implies that yi
more, by definition, xi
(ii) If ak ∩ Vi 6= ∅ then ℓ(k + 1) ∈ Ev i and ξk+1i = ξki ∪ {ℓ(k + 1)}. We prove
that, in this case, qk+1↓i∈ δi(qk↓i, ak ∩ Vi):
k. Hence, qk+1↓i= qk↓i.
k. Further-
k+1 = xi
k+1 = yi
• ak ∩ Vi = qk↓i ∩Vi: straightforward by construction of ak and qk;
• let X ψ ∈ closure(α) ∩ Li: X ψ ∈ qk ↓i iff X ψ ∈ yi
µi, ξki ∪ {ℓ(k + 1)} (cid:13)i ψ iff µi, ξk+1i (cid:13)i ψ iff ψ ∈ yi
k iff µi, ξki (cid:13)i X ψ iff
k+1↓i iff ψ ∈ qk+1↓i;
16
• let G ψ ∈ closure(α) ∩ Li: G ψ ∈ qk ↓i iff G ψ ∈ yi
k iff µi, ξki (cid:13)i G ψ
iff µi, ξ′ (cid:13)i ψ, for ξ′ ⊇ ξki, iff µi, ξki (cid:13)i ψ and µi, ξ′ (cid:13)i ψ, for ξ′ ⊇
ξki ∪ {ℓ(k + 1)}, iff µi, ξki (cid:13)i ψ and µi, ξki ∪ {ℓ(k + 1)} (cid:13)i G ψ iff
µi, ξki (cid:13)i ψ and µi, ξk+1i (cid:13)i G ψ iff ψ ∈ yi
k+1 iff ψ ∈ qk↓i
and G ψ ∈ qk+1↓i.
k and G ψ ∈ yi
Hence, from (i) and (ii), if follows that qk+1 ∈ δ(ak, qk), as desired.
Finally, we just need to establish that the run is accepting. We start by
showing that each local run is accepting. Let G ϕ ∈ closure(α) ∩ Li. We need
to show that there are infinitely many indices k such that qk↓i∈ FG ϕ. Assume
that this is not the case, i.e., assume that there are only finitely many indices
k such that qk↓i∈ FG ϕ. Then, there is n ∈ N such that qk↓i /∈ FG ϕ, for every
k ≥ n. But, if qk↓i /∈ FG ϕ then G ϕ /∈ qk↓i and ϕ ∈ qk↓i, for k ≥ n. If G ϕ /∈ qk↓i
k and so µi, ξki 6(cid:13) G ϕ. This implies that there is ξ′ ⊇ ξki such
then G ϕ /∈ yi
that µi, ξ′
6(cid:13) ϕ. It is not very difficult to see that there is m ≥ k such that
ξ′ = ξmi. Hence µi, ξmi 6(cid:13) ϕ which implies that ϕ /∈ yi
m and, consequently,
ϕ /∈ qm ↓i. But, as m ≥ k ≥ n then ϕ ∈ qm ↓i and we reach a contradiction.
This means that each set FG ϕ is visited infinitely often and, thus, the local run
is accepting. The fact that the global word wµ,ℓ is fair is a consequence of the
linearization. Then, by Lemma 3.1, we can conclude that the global run is also
accepting.
(cid:3)
We now study the relationship between µ and µτ where τ is an accepting
run for wµ,ℓ, and between w and wµτ ,ℓ. If we start with a model µ, construct
wµ,ℓ and then define µwµ,ℓ
, we may wonder what is the relation between µ and
µwµ,ℓ
? Conversely, if we start with a word w (with accepting run τ ) and we
build the model µτ , can we can find a linearization ℓ such that wµτ ,ℓ is w? The
following lemmas answer both these questions.
Lemma 3.5 Let w ∈ L(Dα) with accepting run τ . Then, there is a linearization
ℓ such that w = wµτ ,ℓ.
Proof: Let w ∈ L(Dα) with accepting run τ and consider µτ defined as above.
Consider the linearization ℓ : N1 → Ev such that ℓ(k) = ek. First, we observe
that ξ0 = ∅ and ξk = {ℓ(1), . . . , ℓ(k)} = {e1, . . . , ek}. Let p ∈ Prop i. Then, for
k ∈ N
p ∈ wµτ ,ℓ
k
i , ξki (cid:13)i p (by definition of wµ,ℓ)
iff µτ
iff p ∈ ϑi(ξki)
iff p ∈ qk↓i
iff p ∈ wk ∩ Vi
iff p ∈ wk
(by definition of satisfaction)
(by definition of µτ )
(by definition of δi)
(because p ∈ Prop i).
Hence, wµτ ,ℓ
k = wk, for every k ∈ N, and so wµτ ,ℓ = w.
(cid:3)
We can state a similar result for µ and µwµ,ℓ
. But in case, we cannot say that
the two interpretation structures are equal but only isomorphic. We say that
two distributed life-cycles λ1 = {hEv 1
i ii}i∈Id are
isomorphic, written λ1 ∼=f λ2, if there is an bijection f : Ev 1 → Ev 2 such that
e ≤1 e′ if and only if f (e) ≤2 f (e′), for every e, e′ ∈ Ev 1. Function f establishes
i , ≤1
i ii}i∈Id and λ2 = {hEv 2
i , ≤2
17
a bijection between states of λ1 and λ2 as would be expected. We say that
two interpretation structures µ1 = hλ1, ϑ1i and µ2 = hλ2, ϑ2i are isomorphic,
written µ1 ∼=f µ2, if λ1 ∼=f λ2 and ϑ1
i (f (ξi)), for every state ξi ∈ Ξ1
i .
We may drop the reference to f and simply write λ1 ∼= λ2. We can now state
the converse result of Lemma 3.5.
i (ξi) = ϑ2
Lemma 3.6 Let µ ∈ Mod(α). Then, µ ∼= µτ , where τ is an accepting run for
wµ,ℓ, for a given linearization ℓ.
Proof: We start by defining a bijection between Ev and Ev τ , where Ev τ denotes
the set of events of µτ . Let f : Ev → Ev τ be such that f (e) = ek where k is
such that ℓ(k) = e that exists because ℓ is a linearization of Ev . Furthermore,
let e, e′ ∈ Ev such that ℓ(k) = e and ℓ(k′) = e′, for some k, k′ ∈ N1. Then e ≤ e′
iff ℓ(k) ≤ ℓ(k′) iff k ≤ k′ iff ek ≤τ ek′ . Hence, λ ∼= λτ . As it was said before,
f (∅) = ∅ and f (ξk) = f ({ℓ(1), . . . , ℓ(k)}) = {e1, . . . , ek}. Next, we prove that
µ ∼= µτ . Let p ∈ Prop i. Then for k ∈ N
p ∈ ϑτ
i (f (ξk)i)
i ({e1, . . . , ek}i)
iff p ∈ ϑτ
iff p ∈ qk↓i
iff p ∈ wµτ ,ℓ
iff p ∈ wµτ ,ℓ
iff µτ
i , ξki (cid:13)i p
iff p ∈ ϑi(ξki)
k
∩ Vi
k
(as observed above)
(by definition of µτ )
(by definition of δi)
(because p ∈ Prop i)
(by definition of wµ,ℓ)
(by definition of satisfaction).
Hence, we conclude that µ ∼= µτ .
(cid:3)
These two lemmas allow us to conclude that Mod(α) and L(Dα) have essen-
tially the same information.
4 Concluding remarks
We have proposed a notion of distributed Buchi automaton. We have then
endowed DTL with an operation semantics based on DNBA's, where for the
local components (that have a linear behaviour) an approach similar to the
followed in [22, 1] was adopted. The construction was proved correct with
respect to DTL semantics.
As future work, we believe that it would be interesting to extend our ap-
proach to other temporal operators, like the until operator and past operators.
No surprises are expected as these have been widely studied for LTL and the
local agents of DTL have a linear time behaviour.
The main goal of this ongoing work is to endow DTL with a model-checking
tool. The work presented in this paper is the first step towards that goal.
Having such a tool will allows us to verify some of the problems to which DTL
has successfully been applied, but in an automated way [5, 8, 9]. It is also our
goal to study the complexity of our intendend approach and compare it with
existing tools.
18
Acknowledgements
This work was supported by the Portuguese Funda¸cao para a Ciencia e a Tec-
nologia (FCT) by way of grant UID/EEA/50008/2013 to Instituto de Teleco-
munica¸coes (IT).
References
[1] F. Baier and J.-P. Katoen. Principles of Model Checking. The MIT Press,
2008.
[2] E. Bartocci and C. R. C. R. Ramakrishnan. Preface of the special issue on
model checking of software. International Journal on Software Tools for
Technology Transfer, 18(4):355 -- 357, 2016.
[3] D. Basin, C. Caleiro, J. Ramos, and L. Vigan`o. A labeled tableaux for
the distributed temporal logic DTL. In Proceedings of the 15th Int. Symp.
on Temporal Representation and Reasoning (TIME 2008), pages 101 -- 109.
IEEE Computer Society Press, 2008.
[4] D. Basin, C. Caleiro, J. Ramos, and L. Vigan`o. Labelled tableaux for
distributed temporal logic. Journal of Logic and Computation, 19:1245 --
1279, 2009.
[5] D. Basin, C. Caleiro, J. Ramos, and L. Vigan`o. Distributed temporal logic
for the analysis of security protocol models. Theoretical Computer Science,
412(31):4007 -- 4043, 2011.
[6] E. Best and C. Fern´andez. Nonsequential processes -- A Petri net view.
Springer-Verlag, 1988.
[7] C. Caleiro, P. Gouveia, J. Ramos, and L. Vigan`o. A tableaux-based deci-
sion procedure for distributed temporal logic. In C. Caleiro, F. Dion´ısio,
P. Gouveia, P. Mateus, and J. Rasga, editors, Essays in Honour of Amil-
car Sernadas, Logic and Computation, pages 73 -- 124. College Publications,
London, 2017.
[8] C. Caleiro, L. Vigan`o, and D. Basin. Metareasoning about security pro-
tocols using distributed temporal logic. Electronic Notes in Theoretical
Computer Science, 125(1):67 -- 89, 2005. Preliminary version presented at
IJCAR'04 ARSPA Workshop.
[9] C. Caleiro, L. Vigan`o, and D. Basin. Relating strand spaces and distributed
temporal logic for security protocol analysis. Logic Journal of the IGPL,
13(6):637 -- 664, 2005.
[10] E. A. Clarke and E. M. Edmund. Characterizing correctness properties of
parallel programs using fixpoints.
In J. de Bakker and J. van Leeuwen,
editors, Automata, Languages and Programming. ICALP 1980, Lecture
Notes in Computer Science. Springer, Berlin, 1980.
[11] E. M. Clarke and E. A. Emerson. Design and synthesis of synchronization
skeletons using branching time temporal logic. In D. Kozen, editor, Logics
of Programs, pages 52 -- 71. Springer Berlin Heidelberg, 1982.
19
[12] E. M. Clarke, E. A. Emerson, and A. P. Sistla. Automatic verification of
finite-state concurrent systems using temporal logic specifications. ACM
Trans. Program. Lang. Syst., 8(2):244 -- 263, 1986.
[13] H.-D. Ehrich and C. Caleiro. Specifying communication in distributed
information systems. Acta Informatica, 36:591 -- 616, 2000.
[14] G. Holzmann. The SPIN Model Checker: Primer and Reference Manual.
Addison-Wesley Professional, 2004.
[15] F. Kroger and S. Merz. Temporal logic and state systems. Springer, 2008.
[16] O. Lichtenstein and A. Pnueli. Propositional Temporal Logic: Decidability
and Completeness. Logic Journal of the IGPL, 8(1):55 -- 85, 2000.
[17] K. Lodaya, R. Ramanujam, and P. Thiagarajan. Temporal logics for com-
municating sequential agents: I. International Journal of Foundations of
Computer Science, 3(1):117 -- 159, 1992.
[18] K. Lodaya and P. Thiagarajan. A modal logic for a subclass of event struc-
tures. In Proceedings of 14th ICALP, LNCS 267, pages 290 -- 303. Springer,
1987.
[19] K. L. McMillan. Symbolic Model Checking. Kluwer Academic Publishers,
Norwell, MA, USA, 1993.
[20] A. Pnueli. The temporal logic of programs. In FOCS, pages 46 -- 57, 1977.
[21] R. Ramanujam. Locally linear time temporal logic. In In Proceeding of
11th LICS, pages 118 -- 127. IEEE Computer Society Press, 1996.
[22] M.Y. Vardi and P. Wolper. Reasoning about infinite computations. Infor-
mation and Computation, 115(1):1 -- 37, 1994.
[23] G. Winskel. Event structures. In W. Brauer, W. Reisig, and G. Rozen-
berg, editors, Petri Nets: Applications and Relationships to Other Models
of Concurrency, LNCS 255, pages 325 -- 392. Springer-Verlag, 1987.
20
|
1805.03691 | 2 | 1805 | 2018-05-13T00:36:13 | Self-Stabilizing Task Allocation In Spite of Noise | [
"cs.MA",
"cs.DC"
] | We study the problem of distributed task allocation inspired by the behavior of social insects, which perform task allocation in a setting of limited capabilities and noisy environment feedback. We assume that each task has a demand that should be satisfied but not exceeded, i.e., there is an optimal number of ants that should be working on this task at a given time. The goal is to assign a near-optimal number of workers to each task in a distributed manner and without explicit access to the values of the demands nor the number of ants working on the task.
We seek to answer the question of how the quality of task allocation depends on the accuracy of assessing whether too many (overload) or not enough (lack) ants are currently working on a given task. Concretely, we address the open question of solving task allocation in the model where each ant receives feedback that depends on the deficit defined as the (possibly negative) difference between the optimal demand and the current number of workers in the task. The feedback is modeled as a random variable that takes value lack or overload with probability given by a sigmoid of the deficit. Each ants receives the feedback independently, but the higher the overload or lack of workers for a task, the more likely it is that all the ants will receive the same, correct feedback from this task; the closer the deficit is to zero, the less reliable the feedback becomes. We measure the performance of task allocation algorithms using the notion of regret, defined as the absolute value of the deficit summed over all tasks and summed over time.
We propose a simple, constant-memory, self-stabilizing, distributed algorithm that quickly converges from any initial distribution to a near-optimal assignment. We also show that our algorithm works not only under stochastic noise but also in an adversarial noise setting. | cs.MA | cs |
Self-Stabilizing Task Allocation In Spite of Noise
Anna Dornhaus1, Nancy Lynch2, Frederik Mallmann-Trenn∗2, Dominik Pajak2, and Tsvetomira Radeva2
1University of Arizona, Department of Ecology and Evolutionary Biology
2MIT, CSAIL
Abstract
We study the problem of distributed task allocation inspired by the behavior of social insects,
which perform task allocation in a setting of limited capabilities and noisy environment feedback.
We assume that each task has a demand that should be satisfied but not exceeded, i.e., there is an
optimal number of ants that should be working on this task at a given time. The goal is to assign
a near-optimal number of workers to each task in a distributed manner and without explicit access
to the values of the demands nor the number of ants working on the task.
We seek to answer the question of how the quality of task allocation depends on the accuracy
of assessing whether too many (overload) or not enough (lack) ants are currently working on a
given task. Concretely, we address the open question of solving task allocation in the model where
each ant receives feedback that depends on the deficit defined as the difference between the optimal
demand and the current number of workers in the task. The feedback is modeled as a random
variable that takes values lack or overload with probability given by a sigmoid of the deficit.
Each ants receives the feedback independently. The higher the overload or lack of workers for a
task, the more likely is that an ant receives the correct feedback from this task; the closer the deficit
is to zero, the less reliable the feedback becomes. We measure the performance of task allocation
algorithms using the notion of regret, defined as the absolute value of the deficit summed over all
tasks and summed over time.
We propose a simple, constant-memory, self-stabilizing, distributed algorithm that converges
from any initial distribution to a near-optimal assignment. We then show that our algorithm works
not only under stochastic noise but also in an adversarial noise setting. Finally we prove a lower
bound on the regret for any constant-memory algorithm, which matches, up to a constant factor,
the regret achieved by our algorithm.
keywords- distributed task allocation; self-stabilization; randomized algorithms; load balancing;
social insects
∗[email protected]
Contents
1 Introduction
1.1 Related work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2 Model
2.1 Notation and Assumptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.2 Noisy feedback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.3 Regret metric, closeness and farness.
. . . . . . . . . . . . . . . . . . . . . . . . . . . .
3 Results and Discussion
3.1 High-Level Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
3.2 Results for Both Noise Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
3.3 Results for Sigmoid Noise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
3.4 Results for Adversarial Noise
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
4 Algorithm Ant - Theorem 3.1
5 Algorithm Precise Sigmoid - Theorem 3.2
6 Conclusion and Open Problems
A Missing Proofs of Section 4 and Proof of Theorem 3.1
B Sigmoid Noise - Missing Proofs of Section 3.3
C Adversarial Noise
D Trivial Algorithm
D.1 Sequential Model
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
D.2 Synchronous Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
E Auxiliary Tools
2
3
5
5
6
7
7
7
8
8
9
10
13
14
18
21
23
25
26
26
26
1
1
Introduction
Task allocation in social insect colonies is the process of assigning workers to tasks such as foraging,
scouting, nursing, etc. in a way that maximizes the reproductive success of the colony. Each ant can
work on each of the tasks but the demands of the tasks are different and might also vary over time.
The ants probably neither know the number of ants needed nor can count the current number of ants
working on a given task [20]. Therefore the allocation has to be performed based only on the feedback
from the tasks. The feedback, in biology called 'task stimulus', corresponds for example to sensing a
too-high temperature in the nest, seeing light through a hole in the nest-wall, or smelling a pheromone
produced by hungry brood. Despite using limited communication, local observations, and noisy sens-
ing, many ant species are known to excel at task allocation. How do ants perform task allocation and
what can we learn from their behavior?
In [11], the authors proposed a solution to the problem of task allocation in the case where the
feedback received by the ants is always correct. More precisely, in [11], each task j ∈ [k] has a demand
d(j), that represents the number of workers needed at that task. If the load, i.e., the number of ants
working on the task, exceeds the demand, then all ants receive feedback overload. Conversely, if the
load is below or equals the demand of the task, then all ants receive feedback lack. Such a feedback
function is rather unrealistic in ant colonies due to its sharp transition between overload and lack-
it requires each ant to be able to tell the difference between d(j) and d(j) + 1 number of workers at a
task. The authors in [11] therefore pose the open problem of considering a weaker, noisy version of the
binary-feedback-the focal point of this paper.
We study the performance of task allocation in two noise models: a realistic, stochastic model and
a more theoretical, adversarial model. In the stochastic model, the feedback from the tasks for each
ant in each step is a random variable with possible values lack and overload. The probability that
it takes value lack equals to the sigmoid function of the deficit (demand minus load1) of the task. In
the adversarial noise model, the feedback is deterministic and it is always correct if the absolute value
of the deficit is large but can be arbitrary if the absolute value of the deficit is small.
We assume that the ants regularly receive the feedback from all the tasks. However, there is a delay
between the moments when an ant collects the feedback and when it changes its allocation during which
other ants may also make some decisions. To model this delay we assume, similarly to [11], synchronous
rounds: at the beginning of each round each ant receives binary feedback of the load of the task. The
ants then concurrently make a decision of whether to join or to leave their current task.
How can the ants make independent decisions and achieve a 'good' task allocation in spite of out-
dated observations, in spite of noise and in spite of the lack of global information-not knowing the
demands nor the current load of a task?
In order to define what a 'good' task allocation means we propose to use the notion of regret. In-
tuitively, the regret in our setting measures the sum over all rounds over all tasks of the absolute value
of the deficits (demand minus load) of the tasks. Here we penalize overload and underload equally:
An underload corresponds to work that is not being done, and each ant exceeding the demand of a
task corresponds to work being wasted (or, even worse, sometimes the excessive number of workers in
a task may block each other and decrease the efficiency [15, 12]). Note, that we do not charge any cost
for switching tasks.
It turns out that any constant-memory algorithm for task allocation can be lower bounded in terms
of this 'cost' function. We show that the quality of task allocation is determined by the critical value
(see Section 2 for a formal definition). Intuitively, the critical value determines a value of the deficit
(seen as a fraction of the demand) for which the feedback is correct for each ant with high probabil-
ity. This corresponds to a smallest value of the deficit at which the sigmoid is very close to 1 and a
1Note, that the deficit can be negative.
2
largest value for which it is very close to 0. The lower bound shows that the regret of the optimal
constant-memory algorithm is linear in the sum of demands times this critical value.
We then provide a simple, constant-memory Algorithm Ant that utilizes the oscillations in the num-
ber of workers in each task in order to achieve a stable allocation in the synchronous model. The size of
the oscillation at each task in our algorithm is proportional to the demand of the task times the critical
value. In the light of our lower bound the algorithm achievess a constant factor approximation of the
optimal regret. Our algorithm assumes a slightly stronger form of synchronization where the ants take
actions through cycles (phases) of length two (for example, day and night) and all of the ants are at the
same step of the cycle2. Our algorithm is parameterized by a learning parameter γ that upper bounds
the critical value. Smaller values of γ yield better bounds for the regret but slower convergence time.
On a high level, in our Algorithm Ant, the ants repeatedly collect two samples each to asses which
decision (joining, leaving or remaining) would be optimal in terms of regret. To obtain the first sample,
all ants assigned to a task work on it. For the second sample ants collectively leave their tasks with
a small probability. If both samples of a working ant indicate an overload, then it will permanently
leave the task with a small probability. If both samples of an idle ant indicate underload, then such
ant will join this task (or if there are multiple such tasks then the idle ant joins one chosen uniformly
at random). This two-sample approach can be seen as computing the slope of the regret function in
each task. The ants collectively, in a distributed fashion, increase or decrease the loads in the tasks by
a small fraction depending on the computed "direction of the gradient" and learning parameter γ. The
algorithm bears similarities to gradient descent; in our case a noisy and distributed version. We show
that this algorithm achieves a task allocation that is up to a constant factor optimal with respect to
the aforementioned lower bound.
We then build upon our two-sample algorithm to derive a more theoretical algorithm Algorithm
Precise Sigmoid that uses more memory as well as longer synchronous phases (consisting of more than
two rounds). This algorithm, together with a lower bound, establish a theoretical tradeoff between
the memory available at each ant and the optimal regret that can be achieved by an algorithm using
this memory. Moreover, we also consider the adversarial noise setting in which we propose algorithm
Algorithm Precise Adversarial that also achieves a constant approximation of the best possible regret.
We also show that if the deficit is too close to 0 for some number of steps then (due to the noisy
feedback) it drastically increases. It is therefore impossible to keep the absolute value of the deficit
very small for too long. This means that small oscillations in the number of workers at each task are
unavoidable in any algorithm that 'tries' to achieve a good and stable allocation. Our proposed solution
is to avoid getting too close to 0 with the absolute value of the deficit and use the oscillations (jumping
between positive and negative deficit) to achieve stable allocation and asymptotically optimal regret.
1.1 Related work
Distributed task allocation in the context of social insect colonies and similar simple models have been
studied for years in both the theoretical distributed computing and the behavioral ecology communities.
The most related previous work on task allocation is [11], in which the authors also assume syn-
chronous rounds and binary feedback. The authors present a very simple algorithm that converges to
an almost-optimum allocation (the allocation that differs from the demand by at most 1 at each task)
and analyze its convergence time. Considering a noisy version of the model was left as an open question.
Moreover, the author of [29] provide a model similar to that of [11] but they also study different
versions of the feedback that ants receive from the environment, which varies in the amount of infor-
mation the ants receive about the deficits of the tasks. In short, the model consists of two feedback
components: a success component that informs each ant in each round whether it is successful, e.g.,
needed at the task it is currently working on, and a choice component that provides unsuccessful ants
2In a theoretical model, this can be achieved using one bit of additional memory for each worker and using very
limited communication, e.g. [4].
3
with an alternative task to work on. The results in [29] analyze the convergence time of task allocation,
and as such are not directly comparable to our work here. In [29], the noise model is very rudimentary:
in each round the feedback of the binary success component can be noisy for at most a small fixed
number of ants. The results do not generalize to our setting.
The problem of task allocation in social insect colonies has been well studied in the communi-
ties of theoretical and experimental biology. The observations show that social insect colonies are
self-organized, with no individuals directing the task choices of others, with interactions between indi-
viduals potentially affecting task selection [18]. Workers in a colony may switch tasks as needed [17],
although this may come at additional cost [25]. The concept of task switching gives rise to an intrigu-
ing question: what is the algorithm used by the ants to decide whether to switch and which tasks to
choose? Some notable examples of models of task allocation [3] include (1) the threshold-based model
where ants compared the stimulus of a task to their built-in threshold to determine whether to work
on a given task, and (2) the 'foraging for work' model [33] where the ants are believed to actively look
for work when they are idle or redundant in the current task. In some species the ants are believed
to choose the tasks based on physical suitability (physical polyethism) [24], whereas in other species,
the ants are physically similar and suitable to do any task (temporal polyethism) [5]. In this paper, we
assume that the ants are identical (no thresholds) and universal (they can work on any task).
Some biological studies have focused on the efficiency of the task allocation process itself, and how
it is determined by the specific algorithm used by the ants. For example, [27] and [13] model task allo-
cation determined by social interactions and response thresholds, respectively, and both demonstrate
that perfect task allocation of workers to tasks cannot be achieved, potentially due to the speed and
accuracy of task allocation trading off against each other. In [32], an algorithm of task allocation is
analyzed in a setting where there are no thresholds, the tasks are arranged in a line and there is no
noise in sensing of the demand. The goal of [32] is to explain the experimental observations where
certain tasks were preferred by older ants.
Additional factors such as individual experience, interactions with other workers, spatial and hier-
archical position in the colony, and random encounters with tasks are also known to affect the specific
task allocation mechanism employed [6, 14, 18]. Unfortunately, most often it is not precisely known
what is the actual algorithm that the ants use to select tasks or how the factors listed above interact
to produce variation in preferences across tasks or across individuals [28].
A key property that we observe in our results-oscillations in the task allocation behavior of ants-
is also a commonly observed biological phenomenon more generally known as cyclical activity patterns
[9]. Although the role of cyclical activity patterns is not completely understood [10], several studies
make conjectures that may be related to the conclusions in our paper. First, our assumption that
ants perform actions in synchronized rounds and phases as a means of introducing 'delay' between
one another's actions is also observed in biological studies. Ants perform actions in bursts of activity
and inactivity in order to clear stale information from spreading through the colony [30]. Second, our
results suggest that, assuming that ants have constant memory, and noisy environmental feedback, the
oscillations are inevitable as the deficit becomes small. We conjecture that such cyclic activity patterns
(switching between different tasks and being idle) are necessary and a product of the limitations of the
ants and the noisy feedback about number of workers at a task.
Another key assumption we make is that the noise follows a sigmoid function (also known as
a logistic sigmoid activation function). Such functions appear in countless biological contexts (e.g.
[16, 22, 31]), to model the uncertainty with which the ants sense the need for work at different tasks.
We believe that the versatility and applicability to the real-world problems of the sigmoid noise model
makes it a good choice to model the noise of the environment in our setting.
Finally, somewhat related load-balancing processes have been studied under the term user-based
migration in which the tasks move in a network of resources [1, 23, 2] by querying the load of the cur-
rent resource and moving to a neighbor in case of an overload. However, this line of research assumes
4
that each resource knows an upper bound on how many tasks it can accept. Furthermore, the setting
is noise-free and we hope that this paper can be used to derive more realistic models, in which the load
cannot be determined precisely as it is unclear how long each task will need to be processed.
2 Model
The sections consists of three parts. First, we present the model, the assumptions and the bulk of
the notation. Second, we define the noise models (adversarial noise model and sigmoid noise model).
Finally, we define the regret metric and the closeness of a task allocation.
t = d(j) − W (j)
2.1 Notation and Assumptions
We have a collection of n ants and k tasks where each task j ∈ [k] has a fixed demand d(j) meaning
, j ∈ [k]
that the task requires d(j) many ants assigned to it. Let d be the demand vector. Let W (j)
denote the load of resource j at time t, i.e., the number of ants performing the task. For task j ∈ [k]
we define the deficit as ∆(j)
and a negative deficit signifies an overload. Unless specified
otherwise, each ant has memory that is linear in the number of tasks, but independent of n. We assume
there is no communication among the ants.
We assume synchronous rounds each consisting of two sub-rounds. We define round t ≥ 1 to be the
time interval between times t − 1 and t. Fix round t. In sub-round 1 (of this round), each ant receives
noisy feedback of the load situation at time t − 1 (see definition below). Then, in sub-round 2-based
on the obtained feedback and the internal state (memory) of the ant-the ant decides whether to work
and on which task during round t. We will bundle two consecutive rounds into a phase and we assume
that each phase starts for all ants at the same time step.
t
t
We assume that the demands do not change, but our results trivially extend to changing demands
due to the self-stabilizing nature of our algorithms.
We now give our assumptions on the demand vector. First, we require the demands to be at least
of logarithmic size in the number of ants. Second we assume that there is is sufficient slack of the
demands, so that not all ants are required to work.
Indeed, it is commonly observed that a large
fractions of the ants do not work (e.g. [7, 8]).
Assumptions 2.1. Assume that for all j ∈ [k] we have d(j) = Ω(log n) for j ∈ [k]. Moreover, assume
that the sum of the demands satisfies(cid:80)
j∈[k] dj ≤ n/2.
We model ants as finite state automata and assume that the states of all the ants must be always
reachable from each other. We do not allow for example algorithms where an ant working on some task
can never leave this task. It is well-known (e.g. [19]) that ants do not stabilize to a fixed allocation
but switch between the tasks whenever it is needed.
Assumptions 2.2. We assume that for any pair of states s1, s2 (idle or working on one of the tasks
j ∈ [k]), there must exists a finite sequence of feedbacks F1, F2, . . . such that an ant in state s1 transi-
tions with nonzero probability to state s2.
We use the shorthand w.p.
'with high
probability' to mean that the event happens w.p. at least 1 − O(1/n). We say an event happens with
overwhelming probability is it happens w.p. at least 1 − e−Ω(n). We define the configuration at time τ
to be the internal state of all ants at time τ.
for 'with probability'. We say an event happens w.h.p.
5
2.2 Noisy feedback
We seek to model the noise in the sensing such that the following axioms are fulfilled. First, in case of
a very large deficit almost all ants will notice this (w.h.p. all ants receive feedback lack). Similarly,
in case of a high overload (negative deficit) almost all ants will notice this as well. Second, whenever
exactly the correct number of ants are working on a given task, then the 'uncertainty' in this task is
the largest and each ant receives lack and overload with equal probability. In the following we define
the sigmoid feedback and the adversarial feedback that both fulfill these axioms.
Sigmoid feedback The noisy feedback is modeled by a sigmoid function
s(x) =
1
1 + e−λx ,
(cid:40)
for fixed λ ∈ R. At the beginning of round t, each ant i receives for each task j noisy feedback F (j)
of the deficit:
t
(i)
F (j)
t
(i) =
lack
overload
with probability s(∆(j)
otherwise
t−1)
.
We write Ft(i) to denote the vector of feedbacks for all tasks that ant i receives at time t. It is not
crucial for our results to have a sigmoid function; in fact all our results apply for any monotone antisym-
metric function s with exponential decay and limx→−∞ s(x) = 0 and limx→∞ s(x) = 1 and s(0) = 1/2.
Adversarial feedback This feedback is parameterized by threshold γad ∈ R. The adversarial feed-
back F (j)
(i) received at the beginning of round t by each ant i for each task j is defined as:
t
lack
F (j)
t
(i) =
∆(j)
t−1 > γadd(j)
t−1 ∈ [−γadd(j), γadd(j)]
arbitrary value in {lack, overload} ∆(j)
t−1 < −γadd(j)
∆(j)
overload
.
Critical value The critical value is the deficit which ensures that all the ants receive with high
probability the correct feedback provided that the overload/lack is far enough away from 0. The idea
is that an ant will be able to see an overload (lack, respectively) if the number of ants working at a
task exceeds (1 + c)d (or is lower than (1− c)d, respectively) for some small constant c > 0 and demand
d. The value c is the critical value. Note that, by symmetry, a deficit of −cd also ensures that all ants
receive feedback overload.
Definition 2.3 (critical value and grey zone). We define the critical (feedback) value for the respective
models as follows.
• Sigmoid feedback model. Let y(x) = minx(cid:48)∈R{s(−x(cid:48) · d(j)) ≤ x :
for all j ∈ [k]}. We define the
critical (feedback) value to be γ∗ = y(1/n8). Observe that, due to the antisymmetry of the sigmoid,
s(−γ∗·d(j)) = 1−s(γ∗·d(j)). Wwe make no assumption on γ∗ apart from being smaller than 1/2.
• Adversarial feedback model. We define the critical (feedback) value γ∗ to be γad.
We define for each task j ∈ [k] the grey zone to be gj = [−γ∗d(j), γ∗d(j)].
6
Figure 1: Whenever the overload is in the green (red, respectively) region, all ants will receive w.h.p.
the feedback lack (overload, respectively). Whenever the overload is in the grey region (falling tilling
pattern), and the closer the overload is to 0, the more unpredictable is the feedback received by the ants.
2.3 Regret metric, closeness and farness.
In order to compare the quality of task allocation strategies we use the following notion of regret r(t),
defined for time t ∈ R as:
r(t) =
d(j) − W (j)
=
t
∆(j)
.
t
(cid:88)
j∈[k]
(cid:88)
j∈[k]
Furthermore, we define the (total) regret up to time t as:
R(t) =(cid:80)
i≤t r(i).
The idea behind the regret metric is that if over large scales of time the deficit is only rarely large,
then this should not affect the performance (i.e., the survival of the colony) too much. Moreover, as
we will see later, any constant-memory algorithm will have oscillations (or a significant deficit) and
hence classical metrics such as convergence time carry little meaning. It is worth pointing out that we
penalize lack and overload (measuring a waste of energy) equally and we leave it as a future direction
to use different weights.
We say that an algorithm produces an assignment that is c-close if the average regret of the alloca-
tion is at most c times the critical value and the sum of demands, i.e., limt→∞ R(t)
+
O(1). Similarly, we say an the assignment of an algorithm is c-far if the average regret of is at least c
times the critical value and the sum of demands, i.e., limt→∞ R(t)
cγ∗(cid:80)
t ≥(cid:16)
t ≤(cid:16)
cγ∗(cid:80)
j∈[k] d(j)(cid:17)
.
j∈[k] d(j)(cid:17)
3 Results and Discussion
In this section we present our results. We start with an overview of all the results. Second, we give
results that hold for both noise models (sigmoid and adversarial). We then give the results for the sig-
moid noise model followed by the results for the adversarial noise model. The corresponding algorithms
are defined in Section 4, Section 5 and Appendix C.
3.1 High-Level Overview
Our results on sigmoid noise are threefold.
(i) In our main theorem we show that the somewhat realistic Algorithm Ant with parameter γ results
γ∗ -close provided that γ ≥ γ∗. In particular, the assignment is
w.h.p. in an assignment that is 5 γ
5-close if γ = γ∗. (Theorem 3.1)
(ii) Second, we develop Algorithm Precise Sigmoid that is slightly more artificial but achieves arbi-
trary closeness: for any ε ∈ (0, 1), the algorithm produces w.h.p. an assignment that is ε-close
provided that γ = γ∗. The algorithm uses O(log(1/ε)) memory and synchronous phases of length
O(1/ε). (Theorem 3.2)
7
overload(−∆)γ∗d−γ∗d0greyzoneProb.ofreceivingfeedbackoverload121n6w.h.pallantsreceivefeedbacklackw.h.pallantsreceivefeedbacksurplus(iii) Finally, we show that this bound is in fact tight: any algorithm using c log(1/ε) memory, for
small enough constant c will produce, with overwhelming probability, an assignment that is at
least ε-far for almost all time steps. (Theorem 3.3)
In the adversarial noise setting, we prove the following bounds.
(i) Our Algorithm Ant also achieves in the adversarial noise setting w.h.p. an assignment that is
γ∗ -close. (Theorem 3.1)
5 γ
(ii) Second, we develop Algorithm Precise Adversarial that is slightly more artificial but achieves
for any ε ∈ (0, 1), the algorithm produces w.h.p. an assignment that is
arbitrary closeness:
(1 + ε)-close provided that γ = γ∗. The algorithm uses O(log(1/ε)) memory and synchronous
phases of length O(1/ε). (Theorem 3.6)
(iii) Any algorithm, regardless of the memory, produces an assignment that is in expectation at least
(1 − o(1))-far. (Theorem 3.5)
3.2 Results for Both Noise Models
We proceed by giving the precise statements of Theorem 3.1 showing that the assignment of Algorithm
Ant is w.h.p. 5 γ
γ∗ -close.
Theorem 3.1. The following holds for the sigmoid noise model as well as for the adversarial noise
model. Consider an arbitrary initial allocation at time 0. Fix an arbitrary t ∈ N. Algorithm Ant with
learning rate γ ≥ γ∗ has w.h.p. a total regret during the first t rounds that is bounded by
for some constant c.
R(t) ≤ c
nk
γ
+
5γ
(cid:88)
j∈[k]
· t,
d(j) + 3
Moreover for any interval of time of length at most n4, for each task j ∈ [k], the absolute value of
the deficit is w.h.p. in all but O(k log n/γ) rounds bounded by 5γd(j) + 3.
Note that we allow t to take arbitrary values-in particular, values that are super-exponential in n.
3.3 Results for Sigmoid Noise
In the following we show that Algorithm Precise Sigmoid is ε-close but requires synchronous cycles of
length O(1/ε). For applications where this is tolerable, the algorithm becomes superior and in fact
optimal w.r.t. to the closeness as we will see later.
Theorem 3.2. The following holds for the sigmoid noise model. Fix an arbitrary ε = Ω(1/ log n).
Algorithm Precise Sigmoid with parameter γ ≥ γ∗ and ε has a regret of
lim
t→∞
R(t)
t
= γε
d(j) + O(1),
(cid:88)
j∈[k]
where we suppress all terms that are independent of t. The algorithm uses O(log(1/ε)) memory and
synchronous rounds of length O(1/ε).
We finally show a lower bound on the memory size for any algorithm that is ε-close establishing
optimality of Algorithm Precise Sigmoid.
8
Furthermore, if the deficit for all tasks is below 2εγ∗d(j) for a constant number of consecutive steps
(of sufficient length), then, with overwhelming probability, there will be a task j with an oscillation
(i.e., a deficit) of order ω(γ∗d(j)).
In the proof of our lower we show that, unless the deficit is of order γ∗(cid:80)
j∈[k] d(j) oscillations are
unavoidable.
The lower bound focuses on the perpetual cost of the algorithm that, once t is large enough,
marginalizes the initial costs. Nevertheless, we point out that if the demands can change arbitrarily in
any round, then any algorithm that does not know when the demands, will pay an initial regret of Ω(n).
Remark 3.4. The guarantees from Theorem 3.1 and Theorem 3.2 even apply if the feedback is arbi-
trarily correlated as long as the marginal probability for each ant to receive incorrect feedback outside
the grey zone is 1/nc for some small constant c > 1.
Moreover, our algorithm trivially also works-due to its self-stabilizing nature-for changing de-
mands.
Theorem 3.3. The following holds for the sigmoid noise model. Assume γ∗ ≤ 1 and let c ≤ 1 be a
small enough constant. Let ε ∈ (0, 1/4) and let n (number of ants) be large enough integer. There exists
a demand vector (d(1), d(2), . . . , d(k)) such that for any collection of n ants executing (possibly distinct)
algorithms A1, A2, . . . , An, each using at most c(cid:98)log(1/ε)(cid:99) bits of memory, the following holds. For any
√
time t ≥ 1/
ε with overwhelming probability
R(t) ≥
εγ∗(cid:88)
j∈[k]
t.
d(j)
Furthermore, even though we state Algorithm Ant and Algorithm Precise Sigmoid in a way that the
feedback of all the tasks is collected (as in [11]), this is not necessary and only the initial cost would
change if each ant could only receive feedback from one (adaptively) chosen task. In addition for the
ease of presentation, our algorithms store the samples inefficiently (e.g. the median). The bounds we
claim on the space complexity assume slightly smarter, but obvious techniques.
constant need not be 1/2; it must only guarantee that(cid:80)
Finally, the required bound on the sum of demands of Assumptions 2.1 can be relaxed and the
j∈[k](1+5γ∗)d(j) ≤ c∗n for some constant c∗ < 1.
3.4 Results for Adversarial Noise
In the following we present our results for the adversarial noise model.
Theorem 3.5. In the adversarial noise model, any algorithm, possibly randomized, using unlimited
memory and communication has expected regret of at least:
E [ R(t) ] ≥ (1 − o(1))tγ∗(cid:88)
d(j).
j∈[k]
Note that in the sigmoid noise model a ε-closeness is possible showing a separation between the
two models. Using a modification of Algorithm Ant we can achieve (1 + ε)-closeness.
Theorem 3.6. Let γ∗ ≤ 1/4. Fix an arbitrary ε = Ω(1/ log n). Algorithm Precise Adversarial with
parameter γ ≥ γ∗ using synchronized cycles of length O(1/ε) and memory O(log(1/ε)) achieves in the
adversarial noise model the following asymptotic bound on regret:
lim
t→∞
R(t)
t
= γ(1 + ε)
d(j) + O(1).
(cid:88)
j∈[k]
Interestingly, our algorithm also minimizes the total number of switches of ants between tasks in
comparison to Algorithm Ant; this might be of interest, if one changes the regret to incorporate costs
for switching between tasks.
9
4 Algorithm Ant - Theorem 3.1
In this section we introduce Algorithm Ant. We start by giving the intuition and we refer the reader to
page 11 for full definition of the algorithm. We present the intuition behind the algorithm by focusing
on the single task setting, however, the full algorithm is written and analyzed in the general setting
with k > 1. We divide time into phases, where each phase consists of two consecutive rounds. This
allows each ant in each phase to take two samples where a sample is simply the binary feedback (lack
or overload) for the task. We say that the samples are taken at different points which means that the
number of ants working at the considered task is temporarily reduced between the first and the second
sample. The intuition of taking two samples is as follows. If both samples indicate an overload, then
since the second sample is taken while the number of workers is reduced (and it still shows overload),
we should decrease the number of workers in the task. If one sample indicates overload and the other
lack, then load is likely to be close to the optimal demand and there is no need to change the number
of ants working on the task in the next phase. Finally, if both samples indicate a lack, then additional
ants are required to join the task.
How can we, without any central control, take two samples of feedback for different values of load?
The ants achieve it by independently with probability Θ(γ), temporarily, pausing their work on the
current task. With this idea we can obtain two samples that are taken at two different values of load in
the task, and the distance between the samples can be regulated by the probability of pausing. More
precisely, assume that W ants are working on some fixed task with demand d in the first round of some
phase. Then the first sample is simply the feedback of this load (i.e., lack with probability s(W − d)
and overload otherwise). The second sample (in the second round of the phase) is taken after each ant
independently stopped working with probability csγ, where cs is a constant. Therefore, the number of
ants working in the second sample is roughly W(1 − csγ) (see Figure 2 for an illustration).
Why do we need to take two samples that are 'spaced' apart? The reason is that if the deficit of
task j ∈ [k] in the current step is in the range [−γ∗d(j), γ∗d(j)] ("grey zone") then the feedback in this
step might be unreliable. In our algorithm we take two samples-spaced far enough apart-so that at
least one of them must lie w.h.p. outside of the above range. When the deficit is outside this range,
then with high probability, all the ants receive the same, correct feedback. If W ≥ d(1 + γ∗) then the
first sample shows overload hence after this phase we may decrease the number of ants in this task
but we cannot increase (to increase we need lack in both samples). Similarly if W ≤ d(1 + γ∗) then
the second samples shows lack (because the samples are sufficiently spaced apart) hence we cannot
decrease but we may increase in this phase. This shows that, informally speaking, the load of a task
w.h.p. can move only in the correct direction (if we look only at the loads after the decision at the
end of each phase and disregard the loads in the second sample in each phase). Finally we can identify
a "stable zone" in which the first sample lies on the right side of grey zone (Figure 2) and the second
sample lies to left of the grey zone. Note that once the load of a task is in the stable zone, it can
neither increase nor decrease (because the first sample always gives overload and the second lack).
Analysis The idea of our proof is to analyze the regret in three different regions. For this we split the
regret R(t) into R+(t), R≈(t) and R−(t) which intuitively measure the regret in the overload region,
the region that is close to 0 deficit and in a region in which there is a lack of ants.
We divide time into intervals of length n4 and show, by using a series of potential arguments, that
R−(t) is w.h.p. bounded by O(nk) during any fixed interval. We do this by arguing that in any phase
w.h.p. either the 'lack' of the resources decreases by a significant amount or the number of tasks that
are underloaded does. It turns out that both quantities are monotonically decreasing every second
round and will w.h.p. quickly reach 0. We then bound R+(t), by showing, that w.h.p. each task can
only cause at most once in the interval an overload of Θ(n) and once this happens, the overload of
the task will decrease in a geometrical fashion. Summing over all tasks gives w.h.p. a total regret of
10
Figure 2: A typical execution of one phase in which two samples are taken-each ant temporarily
drops out with probability linear in γ ≈ γ∗.
It is convenient to think of the process as gradient
descent-like with learning rate γ. The left figure shows a phase in which both samples for all ants
indicate an overload (red). As a result, at the end of the phase, a few ants drop out-again with w.p.
linear in γ; this time the drop out is 'permanent'.
The next phase is depicted in the right figure. Here the first sample indicate an overload (for all ants
w.h.p.), the second a lack (green) for ants (for all ants w.h.p.). From here on no ant will join or leave
the task for a polynomial number of steps (w.h.p.).
t )j∈[k] for each task, learning parameter γ ∈ [γ∗, 1/16]
Algorithm Ant
(see Theorem 3.1)
3
Input at round t: Noisy feedback Fj = (F j
Output at round t: Assignment of the ant to a task at ∈ {idle, 1, 2, . . . , k}
1: cd ← 19 and cs ← 2 1
2: for At every step t ≥ 1 do
t mod 2 = 1 then
3:
currentT ask ← at−1
4:
s1 ← Ft
5:
if currentT ask (cid:54)= idle, then at ←
t mod 2 = 0 then
s2 ← Ft
[receive feedback]
if currentT ask = idle then
idle
currentT ask
w.p. csγ
otherwise
[receive feedback]
(cid:40)
if
if
underloadedT asks ← {j ∈ [k] : s(j)
at ←
Uniform (underloadT asks)
idle
1 = s(j)
2 = lack}
if underloadT asks (cid:54)= ∅
otherwise
6:
7:
8:
9:
10:
11:
12:
13:
(cid:40)
(cid:40)
else
at ←
output at
idle
currentT ask
w.p. γ/cd if scurrentT ask
otherwise
1
= scurrentT ask
2
= overload
O(nk). Finally, R≈(t) can simply, by definition, be bounded by O(γ(cid:80)
this is, up to constants, tight as our lower bounds show.
j∈[k] d(j)) per time step; in fact
In the remainder we give the formal statements. See Appendix A for the missing proofs.
In the following claims we consider a continuous interval of time steps I of length t ≤ n4 and we
will analyze the dynamics of the system in this interval assuming an arbitrary initial configuration
in step 0. For each ant i we define ai
t to be the task the ant i is assigned to at the end of round
0 denotes the initial assignment of ants. We start by
t, i.e., ai
defining the pair of 'good' events that occur w.h.p. during I. For each task j we define the grey zone
gj = [−γ∗d(j), γ∗d(j)] which intuitively corresponds to deficits, in which the feedback is very 'noisy'.
t ∈ {idle, 1, 2, . . . , k}. In particular, ai
11
overload(−∆)regretγ∗d−γ∗d0greyzoneoverload(−∆)regretγ∗d−γ∗d0greyzoneLet Ef eedback be the event that for any step t of the interval I, any task j, and any ant i the
t−1 − d(j) (cid:54)∈ gj then the feedback received by ant i for task j is correct, meaning
t−1 ≥ γ∗d(j) and F j
Let Econcentration be the event that for any step t of the interval I, such that t mod 2 = 0 and for
following holds. If W (j)
t = lack if ∆(j)
that F j
t = overload if ∆(j)
t−1 ≤ −γ∗d(j).
any task j such that W (j)
t ≥ (1 − γ)d(j) we have:
(1 − 0.9csγ)],
t
t
(1 − 1.1csγ), W (j)
(1 − 3γ
t+1 ∈ [W (j)
t+2 ≥ W (j)
t ≥ d(j)(1 + (1 + 1.2cs)γ), then W (j)
• W (j)
• W (j)
• if W (j)
In the following we show, using standard techniques, that w.h.p. each of these events occurs.
t+2 ≤ W (j)
(1 − γ
2cd
2cd
),
).
t
t
Claim 4.1. We have that:
1. P [Ef eedback ] ≥ 1 − n−2 and
2. P [Econcentration ] ≥ 1 − 2n−2,
In the following we condition on both of these events.
Claim 4.2. Conditioned on events Ef eedback and Econcentration. For each task j ∈ [k] there exists at
most one time step τj ∈ I such that W (j)
τj−1 and if τj exists, then for any τ ∈ I
τj ≥ d(j)(1 + γ) > W (j)
such that τ > τj and τ mod 2 = 0 we have:
τ ≥ d(j)(1 + γ).
τj ≥ W (j)
W (j)
In the following, we will split the cost of the regret into three different more tractable costs: the
regret induced by a significant overload R+(t), by being close to the demands R≈(t) and by significant
lacks R−(t). Let c+ = 1.2cs and c− = 1 + 1.2cs Let
(W (j)
t − (1 + c+γ)d(j)) · 1
) · 1
((1 − c−γ)d(j) − W (j)
t
W (j)
t −(1+c+γ)d(j)>0
(1−c−γ)d(j)−W (j)
t >0
(cid:88)
(cid:88)
j∈[k]
j∈[k]
r+(t) =
r−(t) =
(cid:88)
(cid:88)
γ
r≈(t) = r(t) − r+(t) − r−(t).
(cid:88)
Similarly, define
R+(t) =
r+(τ ),
R≈(t) =
r≈(τ ),
and R−(t) =
We have R(t) = R+(t) + R≈(t) + R−(t).
τ≤t
We will simply bound R≈(t) by using its definition resulting in R+(t) ≤ 2kncd
τ≤t
τ≤t
r−(τ ).
. Bounding the other
two quantities is more involved; we will start by bounding R+(t).
Using Claim 4.2 we can upper bound the total regret related to the overload in all the tasks. The
idea of the proof is that for a fixed task, we have that during the interval I, there can only be at most
one significant increase in the load. After such an increase in the load of that task j, the number of
ants working on task j will from there on drop every phase by roughly a factor γ until the regret due
to overload (r+(τ )) becomes zero. Integrating over the entire period results in a geometric series and
summing over all tasks gives a regret of R+(t) ≤ 2nkcd
Claim 4.3. Conditioned on Ef eedback and Econcentration. If γ ≤ 1/16, then we have that: R+(t) ≤ 2nkcd
and r+(τ ) > 0 for at most 4kcd log n/γ different rounds of τ ∈ I.
.
γ
γ
,
12
We say that all tasks are saturated in step t if for all tasks j ∈ [k] we have in step t that
t ≥ d(j)(1 − γ).
W (j)
Claim 4.4. Condition on Ef eedback and Econcentration. If in time step t ∈ I all tasks are saturated, then
1. in any step t(cid:48) > t such that t(cid:48) mod 2 = 0, all tasks are saturated,
2. in any step t(cid:48) ≥ t, r−(t(cid:48)) = 0.
In order to bound R−(t) we use the following potential functions, which measure the number
of ants working on a significantly overloaded task and the number of significantly overloaded tasks,
respectively. For any t ∈ N let
Φ(t) =
and
((1 + γ)d(j) − W (j)
2t ) · 1
(1+γ)d(j)>W (j)
2t
,
(cid:88)
j∈[k]
(cid:88)
j∈[k]
Ψ(t) =
1
(1+γ)d(j)>W (j)
2t
.
Observe that functions Φ and Ψ are defined for phase numbers not for steps. Phase number t consists
of two time steps 2t and 2t + 1. In the following we show that after 2 phases we have that either one
of three events must occur: 1) the number of ants working on underloaded tasks increases significantly
2) the number of saturated tasks increases 3) all tasks are saturated.
Claim 4.5. Condition on Ef eedback and Econcentration. We have that the functions Φ(t) and Ψ(t) are
non-increasing and moreover for an arbitrary t such that in step 2t not all tasks are saturated and
2t ≤ n4 − 4, we have that at least one of the following three events must happen:
1. Φ(t + 2) − Φ(t) ≤ −cγn for some constant c > 0
2. Ψ(t + 2) − Ψ(t) ≤ −1,
3. all tasks are saturated in step 2(t + 2).
From this we are able to derive a bound on R−(t) and by putting everything together we derive
the desired bound on R(t) = R+(t) + R≈(t) + R−(t).
Lemma 4.6. Condition on Ef eedback and Econcentration. We have that
R(t) ≤ ckn
γ
+ c
γtd(j),
(cid:88)
j∈[k]
where c is a constant. Moreover for all tasks j ∈ [k] the absolute value of the deficit is bounded by
5γd(j) in all but O(k log n/γ) rounds.
From Lemma 4.6 and Claim 4.1 we are able to establish our main theorem Theorem 3.1. Since the
claims have been shown for any initial configuration we can simply cut the time horizon into intervals
of length at most n4 and use the bounds on the regret for each interval. See Appendix A for the proof.
5 Algorithm Precise Sigmoid - Theorem 3.2
In this section we present Algorithm Precise Sigmoid that is built on the foundations of Algorithm Ant
and to takes advantage of the sigmoid noise to achieve an even better total regret than Algorithm Ant.
Recall that all Algorithm Ant requires is that whenever the deficit is outside of the grey zone, then the
probability to receive an incorrect feedback is at most 1/n8. Now if we choose a step size of roughly εγ
then, due to the sigmoid noise, the probability of failure increases roughly to 1/nε8. However, by taking
13
multiple samples instead of a single sample and by computing the median, we can amplify the proba-
bility that the median sample is correct to 1− 1/n8. This means that the result of Theorem 3.1 applies
with the same guarantees but at a much smaller step size, ultimately resulting in a much smaller regret.
More precisely, the modified version uses a step size of εγ/cχ and relies on synchronized phases of
length 2m, with m = (cid:100)2cχ/ε + 1(cid:101). Each such phase consists of m rounds during which the algorithm
calculates the median of the feedback. This results in 2 samples per phase just as in Algorithm Ant
and the rest of the algorithm is exactly the same as Algorithm Ant. Up to the different step size and
the computation of the median, the proof is along the same lines as the proof of Algorithm Ant. See
Appendix B for the proof.
Algorithm Precise Sigmoid
(see Theorem 3.2)
t )j∈[k] for each task, learning parameter γ < 1/2,
3
precision parameter ε < 1.
Input at round t: Noisy feedback Ft = (F j
Output at round t: Assignment of the ant to a task at ∈ {idle, 1, 2, . . . , k}.
1: cχ ← 10, cd ← 19 and cs ← 2 1
2: m ← (cid:100)2cχ/ε + 1(cid:101)
3: for At every step t ≥ 1 do
r ← t mod 2m
4:
if r = 1 then
5:
6:
if r ∈ [1, m] then
7:
8:
9:
10:
11:
currentT ask ← at−1
sr ← Ft
at ← at−1
s1 ← median(sr(cid:48) : r(cid:48) ∈ [1, m])
if currentT ask (cid:54)= idle, then at ←
if r ∈ [m + 1, 2m − 1] ∪ {0} then
w.p. εcsγ/cχ
otherwise
idle
currentT ask
[receive feedback]
if r = m then
(cid:40)
[receive feedback]
sr ← Ft
at ← at−1
s2 ← median(sr(cid:48) : r(cid:48) ∈ [m + 1, 2m − 1] ∪ {0})
if currentT ask = idle then
if r = 0 then
underloadedT asks ← {j ∈ [k] : s(j)
at ←
Uniform (underloadT asks)
idle
1 = s(j)
2 = lack}
if underloadT asks (cid:54)= ∅
otherwise
idle
currentT ask
w.p. γ/(cχcd) if scurrentT ask
otherwise
1
= scurrentT ask
2
= overload
12:
13:
14:
15:
16:
17:
18:
19:
20:
21:
22:
(cid:40)
(cid:40)
else
at ←
output at
6 Conclusion and Open Problems
We presented a simple proof-of-concept algorithm that achieves, given a suitable learning parameter γ,
a fairly good assignment of ants. The algorithm is very resilient to noise, changes in demands, changes
of the number of ants and even changes of the number of tasks. The algorithm embraces the seeming
14
obstacle of full-synchronization (which we introduced to model the delay of information) to perform
controlled oscillations. It would be interesting to see if variations of this algorithm also work in settings
of less synchronization.
Moreover, it remains an open problem to understand if and by how much simple communication
among the ants can help. In the adversarial setting for example, it is clear that even unlimited com-
munication cannot help. This leads to the question of which other noise models would make sense to
study and how to design experiments with real ants to gather more knowledge about the way noise
affects the sensing.
15
References
[1] H. Ackermann, S. Fischer, M. Hoefer, and M. Schöngens. Distributed algorithms for QoS load
balancing. Distributed Computing, 23(5-6):321–330, 2011.
[2] P. Berenbrink, T. Friedetzky, F. Mallmann-Trenn, S. Meshkinfamfard, and C. Wastell. Threshold
load balancing with weighted tasks. J. Parallel Distrib. Comput., 113:218–226, 2018.
[3] S. N. Beshers and J. H. Fewell. Models of division of labor in social insects. Annual review of
entomology, 46(1):413–440, 2001.
[4] L. Boczkowski, A. Korman, and E. Natale. Minimizing message size in stochastic communication
patterns: Fast self-stabilizing protocols with 3 bits. In Proceedings of the Twenty-Eighth Annual
ACM-SIAM Symposium on Discrete Algorithms, SODA 2017, Barcelona, Spain, Hotel Porta
Fira, January 16-19, pages 2540–2559, 2017.
[5] P. Calabi. Behavioral flexibility in hymenoptera: a re-examination of the concept of caste.
Advances in myrmecology, pages 237–258, 1988.
[6] D. Charbonneau and A. Dornhaus. When doing nothing is something. How task allocation mech-
anisms compromise between flexibility, efficiency, and inactive agents. Journal of Bioeconomics,
17:217–242, 2015.
[7] D. Charbonneau, C. Poff, H. Nguyen, M. C. Shin, K. Kierstead, and A. Dornhaus. Who are the
"lazy" ants? the function of inactivity in social insects and a possible role of constraint: Inactive
ants are corpulent and may be young and/or selfish.
Integrative and Comparative Biology,
57(3):649–667, 2017.
[8] D. Charbonneau, T. Sasaki, and A. Dornhaus. Who needs "lazy" workers? inactive workers act
as a reserve labor force replacing active workers, but inactive workers are not replaced when they
are removed. PLOS ONE, 12(9):1–20, 09 2017.
[9] B. J. Cole. Short-term activity cycles in ants: generation of periodicity by worker interaction.
The American Naturalist, 137(2):244–259, 1991.
[10] B. J. Cole and F. I. Trampus. Activity cycles in ant colonies: worker interactions and decentralized
control. In Information processing in social insects, pages 289–307. Springer, 1999.
[11] A. Cornejo, A. R. Dornhaus, N. A. Lynch, and R. Nagpal. Task allocation in ant colonies. In
Distributed Computing - 28th International Symposium, DISC 2014, Austin, TX, USA, October
12-15, 2014. Proceedings, pages 46–60, 2014.
[12] T. J. Czaczkes, C. Grüter, and F. L. Ratnieks. Negative feedback in ants: crowding results in
less trail pheromone deposition. Journal of the Royal Society Interface, 10(81):20121009, 2013.
[13] A. Duarte, I. Pen, L. Keller, and F. J. Weissing. Evolution of self-organized division of labor in
a response threshold model. Behavioral Ecology and Sociobiology, 66(6):947–957, 2012.
[14] A. Duarte, F. J. Weissing, I. Pen, and L. Keller. An evolutionary perspective on self-organized
insects. Annual Review of Ecology, Evolution, and Systematics,
division of labor in social
42:91–110, 2011.
[15] A. Dussutour, S. C. Nicolis, J.-L. Deneubourg, and V. Fourcassié. Collective decisions in ants
when foraging under crowded conditions. Behavioral Ecology and Sociobiology, 61(1):17–30, 2006.
16
[16] C. A. Edwards and P. J. Bohlen. Biology and ecology of earthworms, volume 3. Springer Science
& Business Media, 1996.
[17] D. M. Gordon. Dynamics of task switching in harvester ants. Animal Behaviour, 38(2):194–204,
1989.
[18] D. M. Gordon. The organization of work in social insect colonies. Nature, 380(14 March):121–124,
1996.
[19] D. M. Gordon. Ants at work: how an insect society is organized. Simon and Schuster, 1999.
[20] D. M. Gordon and N. J. Mehdiabadi. Encounter rate and task allocation in harvester ants.
Behavioral Ecology and Sociobiology, 45(5):370–377, Apr 1999.
[21] T. Hagerup and C. Rüb. A guided tour of chernoff bounds.
33(6):305–308, 1990.
Information Processing Letters,
[22] M. Hassell and H. Comins. Sigmoid functional responses and population stability. Theoretical
Population Biology, 14(1):62–67, 1978.
[23] M. Hoefer and T. Sauerwald. Brief announcement: Threshold load balancing in networks.
In
32nd Symposium on Principles of Distributed Computing PODC, pages 54–56, Montreal, Canada,
2013. ACM. The full version is available at https://arxiv.org/abs/1306.1402.
[24] B. Hölldobler and E. O. Wilson. The ants. Harvard University Press, 1990.
[25] G. M. Leighton, D. Charbonneau, and A. Dornhaus. Task switching is associated with temporal
delays in temnothorax rugatulus ants. Behavioral Ecology, 28(1):319–327, 2016.
[26] M. Mitzenmacher and E. Upfal. Probability and Computing: Randomized Algorithms and
Probabilistic Analysis. Cambridge University Press, 2005.
[27] H. M. Pereira and D. M. Gordon. A trade-off in task allocation between sensitivity to the
environment and response time. Journal of Theoretical Biology, 208(2):165–184, 2001.
[28] N. Pinter-Wollman, J. Hubler, J. A. Holley, N. R. Franks, and A. Dornhaus. How is activity
distributed among and within tasks in Temnothorax ants? Behavioral Ecology and Sociobiology,
66(10):1407–1420, 2012.
[29] T. Radeva, A. Dornhaus, N. Lynch, R. Nagpal, and H.-H. Su. Costs of task allocation with local
feedback: Effects of colony size and extra workers in social insects and other multi-agent systems.
PLoS computational biology, 13(12):e1005904, 2017.
[30] T. O. Richardson, J. I. Liechti, N. Stroeymeyt, S. Bonhoeffer, and L. Keller.
Short-term
activity cycles impede information transmission in ant colonies. PLoS computational biology,
13(5):e1005527, 2017.
[31] H. R. Thieme. Mathematics in population biology. Princeton University Press, 2003.
[32] C. Tofts. Algorithms for task allocation in ants.(a study of temporal polyethism: theory). Bulletin
of mathematical biology, 55(5):891–918, 1993.
[33] C. Tofts and N. R. Franks. Doing the right thing: ants, honeybees and naked mole-rats. Trends
in ecology & evolution, 7(10):346–349, 1992.
17
[34] A. C.-C. Yao. Probabilistic computations: Toward a unified measure of complexity. In Proceedings
of the 18th Annual Symposium on Foundations of Computer Science, SFCS '77, pages 222–227.
IEEE Computer Society, 1977.
A Missing Proofs of Section 4 and Proof of Theorem 3.1
t
Proof of Claim 4.1. The probability that any ant receives an incorrect feedback from task j in step t
assuming that ∆(j)
≥ γ∗dj is by the definition of γ∗ at most n−8. By taking union bound over n4
step, at most n ants and at most n tasks we get that the total probability of all 'bad' events is at most
n−2, hence P [Ef eedback ] ≥ 1 − n−2.
In the following we condition on Ef eedback. Fix any task j and round t such that t mod 2 = 0. We
assume that γ ≤ 1/16 and W (j)
t ≥ (1 − γ)d(j) ≥
(1 − γ)50000 log n/γ2 ≥ 120 · max{c2
t ≥ (1 − γ)d(j). By Assumptions 2.1 we have W (j)
Recall that W (j)
sample for the considered task j. We have E(cid:104)
P(cid:104)
(cid:105)
t+1 ≥ (1 + δ2)E(cid:104)
for any 0 < δ2 < 1:
t+1 denotes the random variable indicating the number of ants working in the second
(1 − csγ). By Chernoff bound we have
(cid:105)(cid:105) ≤ e
(cid:114) 24 log n
E(cid:104)
(cid:105) ≤ 1 each of these probabilities is upper bounded by n−8. Moreover
(cid:115)
t+1 ≤ (1 − δ2)E(cid:104)
(cid:105)(cid:105) ≤ e
and by choosing δ2 =
we have, since γ ≤ 1/16, cs < 1/(2γ), and w1 ≥ 120c2
d} · log n/γ2.
W (j)
t+1
W (j)
t+1
W (j)
t+1
W (j)
E(cid:104)
E(cid:104)
s, c2
W (j)
t+1
W (j)
t+1
W (j)
t+1
−δ2
−δ2
(cid:105)
/2
/3
,
t
2
2
W (j)
= W (j)
(cid:105)
, P(cid:104)
(cid:115)
(cid:105) ≥ 1 − n−6, because W (j)
t+2 ≤ (1 − δstay)E(cid:104)
s log n/γ2 that:
≤ csγ
24 log n
10
w1(1 − csγ)
,
t
Hence P(cid:104)
E(cid:104)
t
24 log n
E [ W3 ]
δ2 =
=
(1 − 1.1csγ), (1 − 0.9csγ)]
t
t
t
t
t
,
/2
stay
(cid:105)
W (j)
t+2
W (j)
t+2
W (j)
W (j)
W (j)
t+2
W (j)
t+2
P(cid:104)
t+1 ∈ [W (j)
W (j)
(cid:105)(cid:105) ≤ P(cid:104)
(1 − 1.1csγ) and W (j)
(1 − csγ)(1 − csγ/10) ≥
(1 − 0.9csγ). Now if in step t + 2 some ants
W (j)
decide to transition to state idle then each of them decides independently with probability γ/cd hence
(1 − csγ)(1 + csγ/10) ≤ W (j)
(1 − γ/cd). We have by Chernoff bound
(cid:105) ≥ W (j)
t+2 ≤ (1 − γ/(2cd))E(cid:104)
(cid:114) 24 log n
E(cid:104)
t ≥ d(j)(1 + (1 + 1.2cs)γ). We have with probability 1 − n−8 that W (j)
t+1 ≥
d(j)(1 + 2.2csγ)(1 − 0.9csγ) = d(j)(1 + 2.1γ − 1.98γ2) ≥ d(j)(1 + γ), where in the last inequality we use
the fact that γ ≤ 1/16. Then, conditioned on Ef eedback, each ant working on task j receives feedback
overload in both samples in step t and t + 1. By the definition of the algorithm, Each such ant leaves
the task in step t + 2 with probability γ/cd. Let random variable Wleave denote the number of ants
that leave task j in step t + 2. We can bound the value of this variable using Chernoff bound:
by choosing δstay =
(1 − γ/cd)(1 − γ/(2cd)) ≥ (1 − 3γ/(2cd))).
(cid:105) ≤ γ/(2cd), we get that P(cid:104)
E(cid:104)
(cid:105) ≤ n−8 (because
−δ2
W (j)
t+2
(1 − 3γ/(2cd))
(cid:105)(cid:105) ≤ e
t+2 ≤ W (j)
W (j)
Assume that W (j)
P [ Wleave ≤ E [ Wleave ] /2Ef eedback ] ≤ P [ Wleave ≤ (1 − δleave)E [ Wleave ] ] ≤ e−δ2
(cid:113) 18 log n
E[ Wleave ] ≤ 1/2, the inequality is true with probability at most n−9. We ob-
t /cd we have that with probability of at most n−9 at most
E[ Wleave ]/2,
t γ/(2cd) ants decide to leave task j in step t + 2. Thus P(cid:104)
and by choosing δleave =
serve that since E [ WleaveEf eedback ] = γW (j)
W (j)
n−9.
We showed that each bad event happens with probability at most n−8. By the union bound
over all ants (at most n), steps (n4) and tasks (at most k) and 4 different bad events we get that
(1 − γ/(2cd))Ef eedback
t+2 ≥ W (j)
W (j)
(cid:105) ≤
leave
t
18
with probability at least 1 − n−2 no bad event happens in the considered interval. This shows
that P [EconcentrationEf eedback ] ≥ 1 − n2 but since P [Ef eedback ] ≥ 1 − n−2 we get P [Econcentration ] ≥
P [EconcentrationEf eedback ] P [Ef eedback ] ≥ (1 − n−2)2 ≥ 1 − 2n−2.
Second, observe that if W (j)
Proof of Claim 4.2. First observe that, since the number of ants working on a task increases only in
τ ≥ dj(1 + γ), then the smallest
steps τ such that τ mod 2 = 0 then if there exists τ such that W (j)
such τ (call it τj) must satisfy τj mod 2 = 0. Fix a task j and assume that τj exists. We observe that
conditioned on Ef eedback all idle ants receive feedback overload in the first sample for task j in step
τj. Hence no ant can join task j in this phase (recall that in order to join, both samples of the phase
need to show lack). This shows that whenever the load is at least dj(1 + γ) in the first step of a phase
then it cannot be larger in the first step of the next phase.
τj ≤ d(j)(1 + (0.9cs − 1)γ) then conditioning on event Econcentration, the
τj (1 − 0.9csγ) ≤ d(j)(1 − γ) thus
second sample in the phase starting in step τj satisfies W (j)
conditioning on Ef eedback, all ants receive feedback lack in the second sample thus no ant can leave this
task in this phase. These two claims show the existence of a stable zone [d(j)(1+γ), d(j)(1+(0.9cs−1)γ)]
(which is nonempty because cs > 2), where the number of ants in the task can neither increase nor
decrease (if we look only at steps τ such that τ mod 2 = 0).
τj ≥ d(j)(1 + (0.9cs − 1)γ), then conditioning on event Econcentration al-
τj (1− 3γ/(2cd)) ≥
ways at least W (j)
d(j)(1 + (0.9cs − 1)cs)(1 − 3γ/(2cd)). The last expression is lower bounded by d(j)(1 + γ) if cs ≥
20/9 + 2/(cd − 1). Observe that with our choice of cs and cd this holds. This shows that it is not
possible to 'jump over' the stable zone.
Now we can inductively consider steps τj + 2, τj + 4, . . . and assuming that τj + 2i, τj + 2(i + 1) ∈ I
(1− 3γ/(2cd)) ants remain in this task. We have then W (j)
Observe moreover that if W (j)
τj +1 ≤ W (j)
τj +2 ≥ W (j)
τ
and conditioned on Econcentration and Ef eedback we have that W (j)
τj +2i ≥ W (j)
τj +2(i+1) ≥ d(j)(1 + γ).
Proof of Claim 4.3. Fix any task j ∈ [k]. Let us define the regret due to overload with respect to task j:
r+
j (τ ) = (W (j)
τ − (1 + c+γ)d(j)) · 1
W (j)
τ −(1+c+γ)d(j)>0
and
Clearly R+(t) =(cid:80)
j∈[k] R+
j (t).
(cid:88)
τ≤t
R+
j (t) =
r+
j (τ ).
tl
tl+1
j (t) = 0.
step τ∗ does not exist in interval I then R+
if for some l ≥ 1, we have W (j)
≥ d(j)(1 + c+γ), then W (j)
So for some l∗ ≤ log1/(1−γ/(2cd)) n we must have that W (j)
step τ ≥ tl∗ we have W (j)
steps τ, τ + 1 such that τ (mod 2) = 0 then in step τ + 1 ants only leave the task hence W (j)
and W (j)
τj ≥ d(j)(1 + c+γ). If such a
Let us define the smallest step τ∗ such that τ∗(mod 2) = 0 and W (j)
In the opposite case we can define a sequence of steps tl = τ∗ + 2 · l. Conditioned on Econcentration
τj (1 − γ/(2cd))l.
tl∗ ≤ d(j)(1 + c+γ). And by Claim 4.2 in any
τl∗ ≤ d(j)(1 + c+γ). Observe that for any phase consisting of two time
τ +1 ≤ W (j)
(cid:88)
(cid:88)
j (τ + 1) ≤ 2r+
l∗−1(cid:88)
j (τ ) ≤ (cid:88)
thus r+
j (τ ) + r+
r+
j (τ ) =
j (τ ). We have:
r+
j (τ ) +
τ +1 ≤ W (j)
j (t) =
(cid:88)
l∗−1(cid:88)
(1 − γ/(2cd)) ≤ W (j)
(cid:88)
∞(cid:88)
τ ≤ W (j)
≤ W (j)
tl
r+
j (τ ) +
τ∗≤τ <tl∗
τ∗≤τ <tl∗
τ
R+
n · (1 − γ/(2cd))l ≤ 2n
(1 − γ/(2cd))l ≤ 2ncd/γ
τ <τ∗
j (tl) ≤ 2
r+
r+
τ≥tl∗
τ≤t
≤ 2
r+
j (τ )
τ
l=0
l=0
l=0
19
Finally R+(t) =(cid:80)
j∈[k] R+
j (t) ≤ 2nkcd/γ. Observe that r+(τ ) > 0 only for at most
2kl∗ = 2k log1/(1−γ/(2cd)) n =
2k ln n
1−γ/(2cd)
1
ln
≤ 4kcd log n/γ
t
steps in the considered interval, where we in the last inequality we used that ln x ≥ (x − 1)/x.
Proof of Claim 4.4. To prove the first claim take any task j ∈ [k] and observe that if W (j)
t ≥ d(j)(1+γ)
then it remains at least d(j)(1 + γ) in all even time steps by Claim 4.2. On the other hand if
∈ [d(j)(1 − γ), d(j)(1 + γ)] then in the second sample in this phase we have by Econcentration
W (j)
at most d(j)(1 + γ)(1− 0.9csγ) ≤ d(j)(1− (0.9cs − 1)γ) and since 0.9cs ≥ 2, the last expression is upper
bounded by d(j)(1 − γ) hence by Ef eedback all the ants receive feedback lack in the second sample in
the considered phase. Hence no ant can leave the task in this phase. Thus we also have that in step
t + 2 all tasks are saturated.
t ≥ d(j)(1− γ), then conditioned on Econcentration, in the second
sample in this phase the number of workers in this task is at least d(j)(1−γ)(1−1.1csγ) > d(j)(1−c−γ)
combined with the fact that no ant can leave the task at the end of the phase this shows the second
claim.
Proof of Claim 4.5. First, we observe that Φ(·) and Ψ(·) are non-increasing, because due to Ef eedback
and Claim 4.2, no ant can join a task j that has load of at least d(j)(1 + γ) at the first step of a phase.
We observe that if for a task j, W (j)
We distinguish between two cases depending on ιt: the number of idle ants at time 2t.
1. Suppose ιt ≥ γn
64 . We know that not all tasks are saturated hence there exists in at the beginning
of step 2t + 1 at least one task j with at most d(j)(1 − γ) workers. By Ef eedback all idle ants
receive feedback lack from task j at the beginning of step 2(t + 1). Hence, by the definition of
the algorithm, all the idle ants join some tasks in step 2(t + 1). By Ef eedback all idle ants will join
tasks {j(cid:48) : W (j(cid:48))
2t < d(j(cid:48))(1 + γ)}. Again, there are two cases, either there is now at least one task j
for which load is now above d(j)(1 + γ) and we have that Ψ(t + 2)− Ψ(t) ≤ Ψ(t + 1)− Ψ(t) ≤ −1,
due to monotonicity of Ψ(·). Otherwise, Φ(t + 2) − Φ(t) ≤ Φ(t + 1) − Φ(t) ≤ − γn
64 .
assume γ ≤ 1/16 and cs = 2 1
we get that the sum of ants working on tasks j with W (j)
64 . Since we assume (Assumptions 2.1) that(cid:80)
j∈[k] d(j) ≤ n/2. Moreover, we
(cid:18)
8 )n and
(cid:88)
j∈[k](1 + (1 + 1.2cs)γ)d(j) ≤(cid:0)1 + 1
(cid:19)
3 and hence(cid:80)
t ≥(1+(1+1.2cs))γd(j) ≥ n − γn
t ≥ (1 + (1 + 1.2cs))γd(j) is at least
(cid:1) n
2 = (1− 3
2. Now suppose ιt < γn
W =
W (j)
t
W (j)
n ≥ n
4
.
1 − 3
8
−
64
1
4
j∈[k]
By definition of the algorithm, after one phase each of these W many ants leaves w.p. γ/cd and
by Econcentration, at least γW/(2cd) resulting in ιt+1 ≥ γn
idle ants at the beginning of the next
phase. From here on the same argument as above holds and we will have that either all tasks
are saturated in step 2(t + 1) or Ψ(t + 2) − Ψ(t) ≤ −1 or Φ(t + 2) − Φ(t) ≤ − γn
4cd
.
4cd
Proof of Lemma 4.6. The proof consists of three parts.
First observe that for any round τ, the regret in that round is trivially bounded by:
r(τ ) ≤ (cid:88)
τ − d(j) ≤ (cid:88)
X j
j∈[k]
X j
τ +
j∈[k]
(cid:88)
j∈[k]
d(j) ≤ 2n
We know by Claim 4.3 that:
R+(t) ≤ 2kncd
γ
.
20
(1)
(2)
Secondly, by the definition of R≈(t):
R≈(t) ≤ max{c+, c−}(cid:88)
j∈[k]
γtd(j).
(3)
Finally we need to show that, for some constant c2:
R−(t) ≤ c2kn
γ
.
(cid:16) 2n
(4)
To prove this we use the potential argument from Claim 4.5. By Claim 4.5 we have that for any step
τ such that τ mod 2 = 0 if Φ(τ ) = 0 and Ψ(τ ) = 0 then all the tasks are saturated which in turn
implies by Claim 4.4 that r−(τ(cid:48)) = 0 for all τ(cid:48) ≥ τ. Observe that Ψ(0) ≤ k and Φ(0) ≤ 2n and by
Claim 4.5 from the monotonicity of Ψ and Φ and the rate at which these potentials decrease there can
be at most 2
γ ) steps in which not all tasks are saturated. The regret per round
is, by (1), bounded by 2n, which yields (4).
γ steps r−(t) > 0. By Claim 4.3 in at most O(k log n/γ) steps
we have r+(t) > 0. Thus in all but O(k log n/γ) steps in all tasks j ∈ [k] the absolute value of the
deficit is bounded by 5γd(j).
We also showed that in at most k + 1
= O(k + 1
cγn + k
(cid:17)
Proof of Theorem 3.1. From Lemma 4.6 it follows that the total regret is w.h.p. during the interval I
is, by Union bound, w.p. p ≥ 1 − 1/n bounded by
+ c−1(cid:88)
j∈[k]
ckn
γ
γtd(j).
regret in any interval of length n4 is bounded by 2n5, by (1).
In the case that the high probability event fails, we simply use the following crude bound: The
Now consider an arbitrary time step t ∈ N (possibly super-exponential in n). Let (cid:96) =(cid:4)t/n4(cid:5) denote
B ∼ Binomial((cid:96), P [Econcentration ∩ Ef eedback ]) (cid:45) Binomial((cid:96), n−1),
the number of complete intervals that are contained in the first t time steps. Let B denote the number
of complete intervals among the first (cid:96) in which the regret is exceeds the upper bound in the statement
of Lemma 4.6. Observe that E [ B ] ≤ (1 − p)(cid:96) ≤ t
where we use the symbol ∼ to denote "distributed as" and the symbol (cid:45) to express stochastic domi-
(cid:3) ≤ P [ B ≥ nE [ B ] ] ≤ 1/n and therefore, by Union
nation. Hence, by Markov inequality, P(cid:2) B ≥ t
(cid:88)
bound, we have that w.h.p.
n6 . We have
(cid:88)
n5
+ c−1γ
(t − (cid:96)n4)d(j)
R(t) ≤ B2n5 + ((cid:96) − X)
ckn
γ
n4d(j)
j∈[k]
+
(cid:18)
ckn
(cid:19) ckn
γ
t
n4
γ
j∈[k]
+ c−1γ
(cid:88)
j∈[k]
td(j)
+ c−1γ
(cid:88)
j∈[k]
td(j) + 3t.
+ c−1γ
td(j) ≤ 2t +
1 +
≤ 2t + (1 + (cid:96))
≤ ckn
γ
+ c−1γ
This concludes the proof.
ckn
γ
(cid:88)
j∈[k]
B Sigmoid Noise - Missing Proofs of Section 3.3
Proof of Theorem 3.3. Consider the setting where k = O(1). We choose the constant c in the statement
of Theorem 3.3 such that each Ai uses at most
bits of memory.
log
√
(cid:106)
(cid:17)(cid:107)
(cid:16) 1
16
ε
21
√
= 1
16
∆(j)
This implies that the corresponding state-machine has at most s = 2
ε states. Fur-
thermore, we assume that all transition probabilities are either 0 or lower bounded by some p ∈ (0, 1),
which can be a function of ε, but not of n.
Consider an interval of length s and remark that s is a constant since ε is a constant. In the remain-
der we will show that there exists for each task j ∈ [k] w.p. at least 1 − e−Ω(n) a time step τ such that
(5)
j∈[k] d(j) for all tasks j ∈ [k] with
overwhelming probability, by taking Union bound. From this we easily get that for any t large enough:
Hence, the regret in the interval of length s is at least 2sεγ∗(cid:80)
t,
τ ≥ 2sεγ∗(cid:88)
εγ∗(cid:88)
of time intervals in which the regret is larger than 2sεγ∗(cid:80)
≤ P
Xt(cid:48) ≥ sεγ∗(cid:88)
Xt(cid:48) ≥ E [ Xt(cid:48) ]
due to the following reasoning. Consider t(cid:48) many time intervals of length s. Let Xt(cid:48) be the number
j∈[k] d(j). We have that E [ Xt(cid:48) ] = t(cid:48)e−Ω(n).
Thus, by Chernoff bounds (the random choices made in each interval are independent),
≤ e−t(cid:48)Ω(n).
R(t) ≥
d(j)t(cid:48)
j∈[k]
j∈[k]
d(j).
(cid:21)
(cid:20)
d(j)
2
Thus, by Union bound,(cid:80)∞
P
√
j∈[k]
P [ Xt(cid:48) ] ≤ e−Ω(n)+1. It remains to show (5).
t(cid:48)=1
We set d(j) =
n, for j ∈ [k]. Let γ(cid:48) = 2sεγ∗. Recall that for any task j ∈ [k]:
(cid:106)
log
(cid:17)(cid:107)
(cid:16) 1
√
ε
16
1
1 + eλγ∗d(j) = 1 − s(γ∗d(j)) = s(−γ∗d(j)) =
1
n8 .
Assuming that the load of a task j is in [(1 − γ(cid:48))d(j), (1 + γ(cid:48))d(j)], we have that the probability of
receiving incorrect feedback for each ant is at least, using the symmetry of the sigmoid function,
q = min{s(x) : x ∈ [−γ(cid:48)d(j), γ(cid:48)d(j)]} = s(−γ(cid:48)d(j)) =
(cid:18) 1
(cid:19)2sε ≥ 1
(cid:18)
eλγ∗d(j)
e
1 + eλγ∗d(j)
1
(cid:19)2sε ≥ 1
en16sε .
=
1
e
1
1 + eλsεγ∗d(j) ≥ 1
e
1
eλ2sεγ∗d(j)
By the Pigeonhole principle and Assumptions 2.2, there must exist a task i such that there must
exist a sequence of feedback signals (possibly different for each ant) such that n/k ants joins task
i. W.l.o.g. we assume that the probability of receiving an incorrect feedback signal for task i in
every round throughout the interval is at least q;
if it is less than this value, then this implies
that the regret is already of order γ(cid:48)d(j). Thus, the probability for every ant to join is at least
p(cid:48) = (p · q)s ≥ (p ·
distributed with parameters n/k and p(cid:48). We have E [ Yi ] ≥ n
δ = 1/2 we get
Let Yi denote the number of ants joining task i in the interval of length s. Note that Yi is binomially
k p(cid:48) ≥ 2n2/3. By Chernoff inequality with
(cid:32)
en16sε )s = p16sεn−16/(16)2es.
(cid:33)
1
(cid:21)
P(cid:104)
Yi ≥ n2/3(cid:105) ≤ P
(cid:20)
Yi ≥ E [ Yi ]
2
≤ exp
− 2n2/3
12
= e−Ω(n).
(6)
Summing over all k tasks gives that
22
s(cid:88)
(cid:88)
τ =1
j∈[k]
d(j) − W (j)
τ
≥ (cid:88)
≥ (cid:88)
j∈[k]
j∈[k]
This yields (5) and completes the proof.
min{Yi − d(j), 0}e−Ω(n) ≥ n2/3e−Ω(n)
2εγ∗d(j),
Proof of Theorem 3.2. Recall that s(−γ∗d(j)) ≤ 1/n8. For any task j ∈ [k]
1
1 + eλγd(j) = s(−γd(j)) ≤ s(−γ∗d(j)) =
1
n8 .
Moreover,
and hence, by putting both together, we get
1/e
eλγd(j) ≤
1
1 + eλγd(j)
1
eλγd(j) ≤ e
n8 .
Thus, the event Y that the median computed for a single round for a single ant is incorrect is, by
From this we get that for a step size of γ(cid:48) = εγ/cχ the probability p that the sample is incorrect, is at
most,
Theorem E.3 with α = 1/2, bounded by
P(cid:104)
Y ≥ m
2
(cid:105) ≤(cid:16)
p = s(−γ(cid:48)d(j)) =
1
≤
eλεγd(j)/cχ
1
(cid:18)(cid:16) e
n8
=
n8
(cid:16) e
(cid:17)ε/cχ
(cid:17)ε/(2cχ)(cid:19)m ≤ 1
· t,
n8 .
1 + eλεγd(j)/cχ
(2p)1/2 (2)1/2(cid:17)m ≤ 2m
(cid:88)
εγ
nk
γ(cid:48) +
j∈[k]
R(t) ≤ c
d(j) + O(1)
We observe that these are exactly the same guarantees that Algorithm Ant requires and hence we
get from Theorem 3.1 using a step size of γ(cid:48) instead of γ a regret of
for some constant c. We note that it will take longer to converge to right value as the step size is
smaller and the rounds are longer.
C Adversarial Noise
We first give the intuition behind Algorithm Precise Adversarial. Again, the algorithm builds on Algo-
rithm Ant. This time, every phase consists of two sub-phases. In the first sub-phase, the algorithm takes
samples spaced roughly εγ/32 apart. Each ant then remembers the task j (including the idle state) it
executed when it received for the first time the feedback lack (during the first-sub phase the feedback).
Throughout the second sub-phase, the ant will execute task j.
The idea behind this is that when an ant received for the first time the feedback lack, the deficit
must have been close to 0. Hence, taking many samples in this region yields a small regret.
We now give the sketch of Theorem 3.6.
Proof of Theorem 3.6. Algorithm Precise Adversarial is variation of Algorithm Ant with the difference
that O(1/ε) samples are taken in each phase instead of just 2. The main ideas are the same; in partic-
ular, if all samples indicate an overload, then after the phase, the number of ants reduces by a factor
of roughly γ.
Each phase consists of two sub-phases, the first one covering O(1/ε) rounds that is used to find the
first round rmin in the sub-phase where the the feedback received by the ant switched from overload
to lack.
23
Algorithm Precise Adversarial
(see Theorem 3.6)
Input at round t: Noisy feedback Ft = (F j
precision parameter ε < 1
Output at round t: Assignment of the ant to a task at ∈ {idle, 1, 2, . . . , k}
r1 ← 32
for At every step t ≥ 1 do
ε , r2 ← 4r1
t )j∈[k] for each task, learning parameter γ ∈ [γ∗, 1/16],
r ← t mod(r1 + r2)
if r = 1 then
[receive feedback]
s1 ← Ft
currentT ask ← at−1
t(cid:48) ← t
sr ← Ft
if currentT ask (cid:54)= idle, then at ←
[receive feedback]
if r ∈ [2, r1) then
if r = r1 then
rmin ← min{r(cid:48) < r1 : s(j)
sr ← Ft
if currentT ask (cid:54)= idle, then at ←
[receive feedback]
(cid:40)
r(cid:48) = lack or r(cid:48) = r1}
if r ∈ [r1 + 1, r1 + r2 − 1] then
at ← armin
if r = 0 then
s0 ← Ft
[receive feedback]
if currentT ask = idle then
(cid:40)
idle
currentT ask
w.p. εγ
32
otherwise
idle
currentT ask
if at(cid:48)+rmin−1 = idle
otherwise
(cid:40)
(cid:40)
else
at ←
output at
underloadedT asks ← {j ∈ [k] : s(j)
at ←
Uniform (underloadT asks)
idle
0 = s(j)
r1+r2−1 = lack}
1 = ··· = s(j)
if underloadT asks (cid:54)= ∅
otherwise
idle
currentT ask
32 if scurrentT ask
0
w.p. εγ
otherwise
= scurrentT ask
1
= ··· = scurrentT ask
r1+r2−1
= overload
Then in the second sub-phase of length r2 = O(1/ε) samples are taken as follows: if an ant was
working in round rmin (which may differ from ant to ant) then it will work throughout r2; and otherwise
it will be idle throughout r2.
We now argue that w.h.p. the average regret per phase is small for the case that load is not in a zone
where it will either decrease or increase w.r.t. to the beginning of the following phase. Let c = 1/16. Fix
an arbitrary task j ∈ [k]. Assume that at the beginning of the phase we had W (j)
t ≤ (1 + 3γ)d(j) since
otherwise w.h.p. all ants working on j will see an overload. Moreover, we assume that at the beginning
of the phase it must hold that W (j)
t ≥ (1 − 2γ)d(j) since otherwise, the resource is underloaded.
Therefore, throughout one can show that w.h.p. the first sub-phase we have ∆(j)
Furthermore, we have w.h.p. that throughout the second sub-phase it holds that ∆(j)
≤ (1 + 4γ)d(j).
≤ (1 + cεγ)d(j).
t
t
By definition,
r2 = 4r1
24
This implies that w.h.p. the total regret during the phase is at most:
(4r1 + cεr2)
d(j)γ ≤ (1 + ε)(r1 + r2)γ
d(j),
(cid:88)
j∈[k]
(cid:88)
j∈[k]
where the last inequality holds since r2 = 4r1 ≥ 4−(1+ε)
1+ε−cε r1. Similar as in Theorem 3.1, we can
bounded the regret in case that the high probability events did not hold. Summing over all phases
yields the desired result.
We now give the proof of Theorem 3.5.
Proof of Theorem 3.5. We argue that an algorithm cannot distinguish between two different demands.
We define two demand vectors. Let d = (n/(2k), n/(2k), . . . , n/(2k)) and d(cid:48) = (n/(2k) − 2τ, n/(2k) −
2τ, . . . , n/(2k) − 2τ ), where τ = (1 − o(1))γadn/(2k) is the threshold parameter defined in Section 2.2.
We now define the responses of the adversary
For the case of d we define the responses
1 ∆(j)
0 ∆(j)
Similarly, for the case of d(cid:48) we define the responses
i (j) =
F t
(cid:40)
(cid:40)
.
t−1 ≥ −γadd(j)
t−1 < −γadd(j)
t−1 ≥ γadd(j)
t−1 < γadd(j)
.
1 ∆(j)
0 ∆(j)
F t
i (j) =
It can easily be verified that the feedback in both cases is identical for any load distribution.
We apply Yao's principle Theorem E.1: With probability 1/2 we choose the demand vector d and
otherwise d(cid:48); we assume that the algorithm knows this input distribution. The cost of the algorithm
is simply the demand.
Consider the best deterministic algorithm A on this input distribution. We have
E [ R(t) ] ≥(cid:88)
(cid:88)
(cid:18) 1
2
(cid:12)(cid:12)(cid:12)W (j)
(cid:12)(cid:12)(cid:12) +
(cid:12)(cid:12)(cid:12)W (j)
By Theorem E.1 any randomized algorithm has at least an regret of tkτ = (1 − o(1))tγ∗(cid:80)
j∈[k]
+ 2τ
t(cid:48)≤t
τ − n
2k
τ − n
2k
≥ tkτ.
1
2
(7)
j∈[k] d(j)
over the course of t time steps. This concludes the proof.
(cid:12)(cid:12)(cid:12)(cid:19)
D Trivial Algorithm
In this section we consider for the sake of completeness the following trivial algorithm. Each ant that
is currently not working and receives the feedback that there is lack of ants a task, joins one of those
tasks (chosen u.a.r.); if the ant is already working at a task, then it continues working until it receives
feedback that there is an overload. We will analyze this algorithm in two models:
1. Sequential model: here exactly one ant is chosen u.a.r. and receives the feedback of the round
before.
2. Synchronous model: all ants receive feedback simultaneously. See Section 2 for details.
25
D.1 Sequential Model
In this section we show that the trivial algorithm performs reasonably well in this model. The reason
is that once some fixed task j is slightly overloaded (by a constant factor), then all other ants will see
this and refrain from joining. To make this more concrete, we can again use the critical value γ∗. Once
the overload (or underload) is at least γ∗d(j), each following ant-for the next n4 time steps, by the
same argument as in Claim 4.1-will w.h.p. receive the correct feedback and will refrain from joining
(or leaving).
It is also not too hard to see that the obtained regret is up to a constant factor intrinsic to this
algorithm (and any other constant memory sequential algorithm): The proof follows from a very similar
algorithm as Theorem 3.3. Consider the setting with one task with demand d(1) =
n. Suppose the
overload is less than γ∗d(1)/20, then the probability for an idle ant to join the task is s(−γ∗d(1)/20)
which is roughly 1/(en8/20). Hence, the expected increase in the number of ants working (assuming
ants are chosen u.a.r.) is at least:
√
t − W (j)
W (j)
t−1 Ft−1
1
− W (j)
t−1
n
≥ 1
en8/20
− 2W (j)
t−1
n
≥
1
,
2en8/20
n
en8/20
where we used our assumption that γ∗ is a constant and we generously assumed that every working
ant leaves the task. This positive drift, shows that as long the overload is less than γ∗d(1)/20, the
system will slowly converge to an overload of γ∗d(1)/20. From here one can use standard techniques
to conclude and we note that the proof generalizes to any constant number of jobs k. Therefore, the
regret is of size limt→∞ R(t)
j∈[k] d(j)) , which asymptotically matches the optimal regret in
the synchronous setting (Theorem 3.1 and Theorem 3.3).
t = Θ(γ∗(cid:80)
E(cid:104)
(cid:105) ≥ (n − W (j)
t−1)
D.2 Synchronous Model
In this section we argue that the trivial algorithm fails to achieve a good task allocation in the syn-
chronous model. Concretely, we show that the trivial algorithm does not converge in eΩ(n) steps.
Consider the example with one task having a demand d(1) = n/4 and assume γ∗ to be some constant
smaller than 1/2. Assume that the initial load is 0, then with overwhelming probability all ants will
receive lack and join. In the following step all ants will receive with overwhelming probability the
feedback overload and all leave. Union bound, these oscillations continue for at least eΩ(n) steps.
E Auxiliary Tools
Given a problem, let X be the set of inputs and A be the set of all deterministic algorithms solving it.
Then, for any x ∈ X and A ∈ A, the cost of executing A on x is denoted by cost(a, x).
Theorem E.1 (Yao's principle [34]). Let p be a probability distribution over A, and let A be an al-
gorithm chosen at random according to p. Let q be a probability distribution over X , and let X be an
input chosen at random according to q. Then
max
x∈X
Ep[cost(A, x)] ≥ min
a∈A
Theorem E.2 (Chernoff bound [26, Theorem 4.4 and 4.5]). Let X =(cid:80)
(cid:19)E[ X ]
pendent random variables. Then,
Eq[cost(a, X)].
1. for any δ > 0,
(cid:18)
P [ X ≥ (1 + δ)E [ X ] ] <
eδ
(1 + δ)1+δ)
.
i Xi be the sum of 0/1 inde-
26
2. for any 0 < δ ≤ 1,
3. for R ≥ 6E [ X ],
4. for 0 < δ < 1,
P [ X ≥ (1 + δ)E [ X ] ] ≤ e−E[ X ]δ2/3.
P [ X ≥ R ] ≤ 2−R.
P [ X ≤ (1 − δ)E [ X ] ] ≤
(cid:18)
e−δ
(1 − δ)1−δ)
(cid:19)E[ X ]
.
5. for 0 < δ < 1,
Theorem E.3 ([21, Equation 10]). Let Y = (cid:80)m
(cid:32)(cid:16) p
P [ Y ≥ α · m ] ≤
P [ Yi = 1 ] = p and P [ Yi = 0 ] = 1 − p. We have for any α ∈ (0, 1) that
P [ X ≤ (1 − δ)E [ X ] ] ≤ e−E[ X ]δ2/2.
(cid:19)1−α(cid:33)m
(cid:17)α(cid:18) 1 − p
1 − α
.
i=1 Yi be the sum of m i.i.d. random variables with
α
27
|
1704.02935 | 1 | 1704 | 2017-04-10T16:20:43 | A Cooperative Enterprise Agent Based Control Architecture | [
"cs.MA"
] | The paper proposes a hierarchical, agent-based, DES supported, distributed architecture for networked organization control. Taking into account enterprise integration engineering frameworks and business process management techniques, the paper intends to apply control engineering approaches for solving some problems of coordinating networked organizations, such as performance evaluation and optimization of workflows. | cs.MA | cs | A COOPERATIVE ENTERPRISE AGENT BASED CONTROL ARCHITECTURE
Simona Caramihai, Ioan Dumitrache, Aurelian Stanescu, Janetta Culita
Politehnica University of Bucharest, Dept. of Automatic Control and Computer Science
E-mail(s): [email protected] , [email protected], [email protected],
[email protected]
Abstract: The paper proposes a hierarchical, agent-based, DES supported, distributed
architecture for networked organization control. Taking into account enterprise
integration engineering frameworks and business process management techniques, the
paper intends to apply control engineering approaches for solving some problems of
coordinating networked organizations, such as performance evaluation and optimization
of workflows.
Keywords: Manufacturing Modelling for Management and Control, Discrete Event
Dynamic Systems.
1. INTRODUCTION
this
the
capabilities
dependent
on
increasingly
competition,
The globalization of business and commerce makes
enterprises
their
cooperation partners, clients and suppliers. At
present, competition occurs between networks of
enterprises instead of between individual enterprises.
In
for
interoperability of the enterprises become critical.
Interoperability has been used initially for the
analysis of software systems, from the process
control point of view. This means that a software
system is actually composed by a number of
subsystems able to communicate with each other and
with the environment through well defined interfaces.
All the communications are based on pre-defined
function implementation.
The most important challenge raised by the new
interpretation of the interoperability idea is how to
represent
semantics
according to the given purpose. The recent research
has highlighted the following conclusions:
Interoperability covers technical, semantic and
specification
the
system
pragmatic interoperability (Berre, 2005).
Technical interoperability means that messages
can be transmitted from one application to
another.
Semantic
the
message content becomes understood in the
same way by the senders and the receivers. This
may require
information
representation or messaging sequences.
interoperability means
transformations of
that
The pragmatic
interoperability captures
the
willingness of partners for the actions necessary
for
the collaboration. The willingness of
participating presumes both capability of
performing a requested action and policies
dictating whether
the potential action
is
preferable for the enterprise to be involved in.
Based on these premises, recent publications have
revealed that the interoperability only at data and
information level is not longer sufficient. The
collaboration must be done at knowledge level. At
this level all the organizational
interoperability
senses can be applied. For an efficient knowledge
sharing process, a new research field appeared:
knowledge management (KM).
and
through
feedback control
experimenting with
Knowledge and particularly the capacity to manage,
create and share knowledge, are becoming now the
centre of the scope for a successful company.
Knowledge becomes another attribute of
the
changing economic reality. KM and the learning
culture of the company, as a "necessary" condition
for Knowledge Economy (KE) represent an attitude
and a way of working with management. This
process is one of redefining the target of the company
from a profit making or share value increasing entity
to a knowledge creating and sharing unit.
In order to build a learning organization or a
corporate learning culture, companies should be
skilled in systematic problem solving, learning from
their own experience and from the others, processing
the
knowledge quickly and efficiently
organization
new
approaches.
There is a certain necessity to create a new type of
company with high autonomy, by using a distributed
intelligent system with most important attributes:
perception, learning, thinking, communication and
planning. The large FMS (Flexible Manufacturing
Systems) could be viewed as an Adaptive Complex
Dynamic System with a high capacity
to be
reconfigurable and a large knowledge base. The feed
forward and
strategies are
integrated on the general philosophy of knowledge
management into a company.
The process of KM means the identification and
analysis of knowledge,
for developing new
knowledge that will be used to realize organizational
goals. Knowledge is gathered from a geographical
and informational distributed system.
The best choice to define and to model a distributed
system
is represented by multi-agent systems
(MAS). A MAS is defined by modularity, abstraction
and
intelligent agent must be
autonomous, but in the same time it has to develop
the capacity of interoperability with the other entities
of the system. The concept of autonomy can be
interpreted in different ways (Wooldrige, 2002) by
reactivity, pro-activity and socialization.
Usually, the agent strategy consists in an ordered set
of activities and constraints – and can be modeled by
workflows. Knowledge management implies, in this
case, the appropriate choice of knowledge that can be
used for partial or full completion of the workflow
tasks. Moreover, a new workflow can be designed
using pieces of other workflows.
Agent's interoperability must be translated into
identification of the knowledge that can be used for
the accomplishment of each other goals. This
knowledge, having a structured modularity and
representation, can be the basics for the collaboration
support between the agents that have different
intelligence. An
systems,
(manufacturing
for diagnostics. Few
modeling technologies and also that are physically
placed into another structure. After the classes of
knowledge have been identified, the simulation of
business objective workflows can be done in order to
determine the failure and success rate. Different
applications
business
processes and also information technology (Brooke,
et al., 2003), make obvious that there is necessary
this type of approach.
Another challenge is related to the existence of a
support
interoperability
architectures support simulation, verification and
validation of process designs. Few systems support
collection and interpretation of real-time data. (van
der Aalst, et al., 2003). Anytime an agent can decide
that it no longer desires to share its knowledge,
therefore it is necessary to define protocols and
standards for the recovering – simulation becomes
critical for finding the scenarios when this approach
is useful.
The paper intends to present an original approach for
solving the above-mentioned problems in terms of
control engineering – architecture, modelling support
and evaluation. This approach is based on intelligent
agent-based
for Flexible
Manufacturing Systems (FMS), derived itself from
agent-based negotiation procedures proposed by Lin
and Solberg (1994) and from holonic architectures
(Wyns, et al., 1999). It was based on a Petri Nets
(PN) Discrete Event System modeling framework,
allowing control policies synthesis and evaluation.
The second part of the paper will shortly introduce
control
above mentioned
architecture. The third one will present its extension
for networked organisation as well as an illustrative
case study. Conclusions will include some comments
and further research directions.
architecture
concepts
control
and
the
2.THE SUPERVISED CONTROL
ARCHITECTURE
The control architecture (Caramihai, et al., 2001) was
designed to have two main levels: the agent level and
supervisory one.
The agent
level has extended autonomy and
communication capabilities. If the system is not
perturbed, the agents will act following given rules
and according to some pre-established patterns of
association, with a global behavior similar to a
hierarchical architecture. When a perturbation occurs,
agents have to take their own decisions, acting as
autonomous units. The agent-level itself acts as a
real-time control level for the manufacturing system.
On the other hand, the supervisory level has a more
complex behavior: on-line functioning for monitoring
the agents and taking some decisions on their
performances and an off-line supervisory1 policy
synthesis for ensuring robustness and efficiency in
the FMS global control.
The generic structure of an agent includes the
following basic blocks:
The World Model block - is a knowledge base
containing the internal model of the agent
(including relevant knowledge about the real
world, i.e. the state of temporary links with other
agents, the state of the controlled processes, the
long and short-term goals of the agent and the
value of the criteria of their achievement) and a
rule base on "how to take decisions". The world
model must have intrinsic updating mechanisms
for its two main parts, verifying and ensuring the
global consistency of data;
The decision making block – it decides either
how to process the received data (with direct and
explicit consequences on the immediate actions
of
to modify
information and knowledge contained in the
world model block (with implicit consequences
on the whole behavior of the agent);
the control agent) or how
The perception block - receives information
from the environment, via the Sensors block and
modifies, if necessary, the internal model of the
agent;
The actuators block - is basically an interface
with the environment – the real world: in this
situation it is rather a communication interface,
either with the control module of the controlled
process or with the other agents
The sensors block – is the interface between the
real world and the perception block, usually
consisting of sensors and transducers with the
purpose to record modifications induced by
actuators on the real world. In this case, it is also
a communication interface with the control
module of the controlled process (for updates in
the world model block) and with other agents.
The generic agent structure could be conceived as
being "split" in two components:
The computational agent part is working with
symbolic information and has as modules the
perception, world model and decision making
blocks;
the actuators blocks and works with
The real agent part is composed of the sensors
and
the
environment (the real world), modifying it and
recording the effect of both its own actions and of
those of other agents.
1 Supervisor – the term is used with its both connotations:
1. supervisory
if necessary,
correcting agent activities, and 2. supervisor in the sense
given by the classical DES theory; when using the
"synthesis of the supervisor" expression, the second
connotation is taken into account.
level, monitoring and,
the
the FMS
agents
are
considered
is achieved by
The two agent components act as a closed loop
structure, where the real agent is the controlled
process and the computational one is an adaptive
control module. It is important to note that the
actions of other
as
perturbations in the real world, for which, because of
agent-based philosophy, the world model is only a
partial model.
It was assumed that a FMS can be modeled
exclusively by two basic types of agents, each one
having a specific internal organization: the product
resource agent. The desired
agent and
functioning of
the
negotiations between the different types of agents.
A product agent is in charge with the completion of
a specific product or activity. In order to accomplish
its objective it negotiates with resource agents the
necessary operations and tasks, following a given
workflow model. A product agent owns a
"manufacturing account" consisting in virtual cost
units, which it can use for "paying" every operation it
requires from other agents. Its goal is to finalize the
products or activities it is responsible with following
the associated workflow, in a given time interval,
with minimum manufacturing cost and an adequate
quality.
A resource agent controls a resource in order to
ensure the required processing for product agents. It
is supposed that it acts as a high level control
structure and communicates with
the real-time
control module of
the resource for obtaining
information about its state and for starting specific
tasks. Its goal is to maximize the amount of cost units
received in a given time interval.
The internal model of a resource agent should
contain at least: the list of processing tasks that the
resource could perform - with their respective
duration and cost - and the current state of the
resource.
an
The
the main
interconnected
implementation
agent-based
architecture is derived from the large amount of
inter-agents communication, which could become
difficult to manage and overload the software system.
The architecture presented in this paper restricts this
communication flow by the fact that an agent has to
contact only agents of different type.
The PN part of the world model of a resource agent
takes
two aspects
mentioned above. The detailed internal model of the
agents is not needed because the control architecture
behavior is based on the global model. The PN model
of a product agent describes the workflow it has to
implement. The global model of a processing FMS is
obtained by the synchronous composition of the
respective resource and products PN models.
structure. One of
an
problems
into consideration only
the
communicate,
agents
can
creating
of
is
functioning
represented
the state-space analysis,
The supervisor presents two functioning regimes: one
for the off-line synthesis and one for the on-line
behavior.
When the system is working off-line, the supervisor
have
to be determined by firstly qualitatively
analyzing the PN model of the FMS for ensuring that
the system functioning will respect the desired
specifications, without deadlocks or forbidden states.
After performing
the
synthesis process determines a desired functioning
(based on optimality criteria, as the time spent in the
system by a product agent) and, based on this, it will
prescribe an "optimum functioning" for agents. This
prescribed
as
recommended partners for negotiations.
During its on-line regime, the supervisor monitors
the system. The monitoring is aimed to verify that the
agents respect their recommended evolutions. If a
perturbation occurs, then the global system will start
a degraded functioning regime with respect to the
pre-established optimal one.
In this paper the breakdown of a resource has been
considered as perturbation. Obviously, the respective
resource agent will no longer participate to the
negotiations. This will degrade the functioning of the
product agents whose recommended partner it was.
Furthermore, if the break-down has occurred during a
processing task, then a product agent could be more
specifically affected and the supervisor will have to
take some decisions concerning it.
Other kind of decisions the supervisory module
should take during the on-line functioning is linked
especially with agent-based architectures and
manufacturing processes specificities. Other kind of
decisions is concerned with the proper resource
sharing and with eventual bottlenecks and undesired
states that can appear in the degraded functioning
regime. The supervisor is still in possession of the
overall model of the system and can simulate on it
the results of achieved negotiations in order to
estimate in advance the problems that can occur.
A procedure for
the supervisor synthesis was
presented in detail in (Bratosin, et al., 2005) and
there was designed
application
implementing
it. The synthesis methodology is
highly general and it can be applied for any size of
the system.
a
software
3. ENTREPRISE CONTROL ARCHITECTURE
At enterprise level, the main problem is how to
implement a general control architecture allowing to
different and heterogeneous structures
to share
knowledge without having a predetermined idea on
the actual goal and without having to modify the
communication interfaces.
Fig. I Distributed control architecture
The main idea of the design is to realize a distributed
intelligent
architecture, where highly general
activities initiated at the strategic level should be
stepwise decomposed in more particular activities,
using partial workflow models. Figure I illustrates
the composition of partial workflow models into
complex models. Basically, every workflow unit
should encompass a "piece of knowledge" used for
solving a given type of problem. So, the global
knowledge of the system is distributed, and every
agent acting with respect to a given workflow will
include a part of the global intelligence of the system.
This characteristic will result only by the interaction
of agents, without requirements of real intelligence at
agent level. Moreover, the actual management and
evaluation of knowledge are performed at workflow
level, and they do not depend on
the actual
implementation. At the strategic level, there are
processes to be defined, each of them implying the
planning and execution of a sequence of activities.
Fig. II Knowledge bases - agents interfaces
types of
Agents could have
communications: with
base
(dynamical part) – via a dedicated interface, and with
some of the other agents, for eventual negotiation and
cooperative tasks. Static and dynamic knowledge-
two different
knowledge
the
Static knowledge base (workflows) Dynamic knowledge base (alternatives in-course) Strategic Operational Implementation – Real-time
interfaces with
bases are in a general format representation (as Petri
Nets, for instance).
The actual implementation of agents will necessitate
communication
the dynamical
knowledge base, but the knowledge transfer from one
agent to another could be made at the workflow
level, as well as the combination of different
workflows in order to design new activities (Figure
II). From the management level point of view, the
static part of the database can be the support for
strategic decisions and conception and the dynamic
part for the operational ones.
The structure provides great flexibility in the choice
of workflow alternatives and possibilities of dynamic
reconfiguration in failure situations, in the sense
described in Section 2. Moreover, it can be extended
from shop-floor level until to networks of enterprises
by the basic extension of the knowledge base, and
without regard to the actual implementation of
control agents; as well as the workflow definition is
performed and the interfaces between the workflow
representation and real-time control part exist.
4. CASE STUDY
result
three different activities performed by
The following case-study aims to illustrate how
workflows can be modeled by Petri Nets and,
consequently, different pieces of workflows can be
combined to obtain a new one. It will be underlined
how this composition can affect the execution of
initial workflows and how limited resources sharing
will
in several possibilities of activity
scheduling, therefore necessitating a decision support
system for choosing the most appropriate one.
Let be
different actors that have to share common resources.
At operational level they can be executed with the
following constraints:
- A1 consists of three jobs: J11, J12, J13, that are
executed strictly sequential;
- A2 consists of jobs J21, J22, J23, where J21 should
be performed first; the other two can be performed in
any order, but sequentially, as long as they are
starting after J21.
- A3 consists of jobs J31, J32, J33, where J33 is the
last to be performed, staring after the end of the other
two, which can be performed in any order, including
concurrency.
Each job needs some resources, as presented in Table
1. There are two resources R1 available and one of
each other type. The workflows representing the
activities are contained at the static knowledge base
level while the global model including them together
with their relationships at the dynamical knowledge
base level. The global model could be stored for an
eventually employment, after that being removed
from its location.
Table 1 Resource allocation and time duration for
each component job of workflow activities
Job
Res.
(time)
Job
Res.
(time)
J21
J22
J13
J12
R3(1) R4(2) R1(2) R2(1)
J11
R1(3)
R3(3)
J23
R3(2) R1(3) R4(2) R2(2)
J31
J32
J33
Figure III illustrates the global workflow model for
this case study.
Fig. III Petri net global model
From the modeling point of view, there are some
representation rules for workflows:
- workflows in static database are only represented at
a structural
job
sequencing with execution constraints and necessary
resources;
thus representing
level,
jobs,
P1P2P3P4P5P6P7P8P9R1J11J12J13P10P11J21P12P13P15P14P16P17P18P19R2J22J23J23J22P20P21P22P23P24P25P26J31J32J33interoperability
Retrieved June 13, 2006, from http://interop-
noe.org/deliv/DAP1B.
for non-functional aspects"
of
the
15th
Bratosin, C, S. Caramihai and H. Alla (2005).
Supervisory Synthesis for Safe Petri Nets. In:
Proceedings
International
Conference on Control Sytems and Computer
Science (I.Dumitrache & C.Buiu (Eds)), Vol. 1,
pp. 149-154. Politehnica Press, Bucharest, RO.
Brooke, J., K. Garwood and C. Goble (2003).
Interoperability of Grid Resource Descriptions:
A Semantic Approach. Retrieved May 15, 2004,
from http://www.semanticgrid.org/GGF/ggf9/
Caramihai, S., C. Bratosin and C. Munteanu (2005).
A DES – supported agent based control
architecture for FMS. In: 17th IMACS World
Congress, CD-ROM, Paris, France.
Caramihai, S., C. Munteanu, J. Culita and A.
Stănescu (2001). Control Architecture for FMSs
based on Supervised Control of Autonomous
Agent. In: Proceedings of the 13th International
Conference on Control Systems and Computer
Science (I.Dumitrache & C.Buiu (Eds)), Vol. 1,
pp. 164-169. Politehnica Press, Bucharest, RO.
Lin, Y and Solberg, J (1994). Autonomous control
for open manufacturing systems. In: Computer
Control of Flexible Manufacturing Systems. (S.
Joshi and J. Smith (Eds)), pp. 169-206.
Chapman & Hall, London, UK.
Wyns, J., H. Van Brussel and P. Valckenaers (1999).
Design pattern for deadlock handling in holonic
manufacturing systems. In: Production Planning
and Control, Vol. 10, No. 7, pp. 616-626.
(2003). Business
Van der Aalst, W. M. P, A. H. M. ter Hofstede and
M. Weske
process
management: A survey. In: Proceedings of the
International Conference on Business Process
Management (W.M.P. van der Aalst, A.H.M.
ter Hofstede and M. Weske (Eds)), Volume
Lecture Notes in Computer Science, pp. 1-12.
Springer-Verlag, Berlin.
Wooldridge, M. (2002), An Introduction to Multi
Agent Systems, John Wiley & Sons Ltd, New
York.
- real-time process data as number of entities to be
processed (markings of P1, P10, P20) according to
workflow and actual resource capacities (marking of
P7, P8, P9, P19) – i.e. the complete initial marking of
the Petri Net are specified (by an initialization
procedure) only in the dynamic part of the data base;
- every job is represented by a block transition-place-
transition, as its execution is considered indivisible
(places meaning "job in execution" and transitions
"start" and respectively "end" job);
- between every two successive jobs, there is a place
with the meaning of "waiting", in order to avoid
deadlocks due to resources sharing.
It could be observed that even for a unary initial
marking of P1, P10, P20, there are several effective
conflicts that will affect the execution of activities,
thus delaying some of them.
Using the software application mentioned in Section
2 (Caramihai, et al., 2005), the above mentioned
initial marking will result in 8 execution possibilities
that
the application will underline. Therefore,
allocating an adequate cost function for every
activity, priorities can be established in order to
obtain the "better" activity scheduling for the context.
5. CONCLUSION
interoperability
The paper presents an architectural approach, based
on agent-based knowledge management, Petri Net
modeling and
for cooperative
enterprise networks.
The approach continues
in
supervisory synthesis for agent-based architectures
and it offers the foundation for a Decision Support
System in activity planning.
the previous work
REFERENCES
Berre, A-J
(2005).
"State-of-the
for
Interoperability architecture approaches" with a
focus on "Model driven and dynamic, federated
enterprise
interoperability architectures and
art
|
1908.09184 | 1 | 1908 | 2019-08-24T18:36:17 | Universal Policies to Learn Them All | [
"cs.MA",
"cs.LG"
] | We explore a collaborative and cooperative multi-agent reinforcement learning setting where a team of reinforcement learning agents attempt to solve a single cooperative task in a multi-scenario setting. We propose a novel multi-agent reinforcement learning algorithm inspired by universal value function approximators that not only generalizes over state space but also over a set of different scenarios. Additionally, to prove our claim, we are introducing a challenging 2D multi-agent urban security environment where the learning agents are trying to protect a person from nearby bystanders in a variety of scenarios. Our study shows that state-of-the-art multi-agent reinforcement learning algorithms fail to generalize a single task over multiple scenarios while our proposed solution works equally well as scenario-dependent policies. | cs.MA | cs | Universal Policies to Learn Them All
Hassam Ullah Sheikh
Department of Computer Science
University of Central Florida
Orlando, Florida, United States
[email protected]
9
1
0
2
g
u
A
4
2
]
A
M
.
s
c
[
1
v
4
8
1
9
0
.
8
0
9
1
:
v
i
X
r
a
Abstract
We explore a collaborative and cooperative multi-
agent reinforcement learning setting where a team
of reinforcement learning agents attempt to solve
a single cooperative task in a multi-scenario set-
ting. We propose a novel multi-agent reinforce-
ment learning algorithm inspired by universal value
function approximators that not only generalizes
over state space but also over a set of different sce-
narios. Additionally, to prove our claim, we are in-
troducing a challenging 2D multi-agent urban se-
curity environment where the learning agents are
trying to protect a person from nearby bystanders
in a variety of scenarios. Our study shows that
state-of-the-art multi-agent reinforcement learning
algorithms fail to generalize a single task over mul-
tiple scenarios while our proposed solution works
equally well as scenario-dependent policies.
1 Introduction
Recent research in deep reinforcement learning (RL) has led
to wide range of accomplishments in learning optimal poli-
cies for sequential decision making problems. These ac-
complishments include training agents in simulated environ-
ments such as playing Atari games [Mnih et al., 2015], beat-
ing the best players in board games like Go and Chess [Sil-
ver et al., 2016] as well as learning to solve real world
problems. Similar to single agent reinforcement learning,
multi-agent reinforcement (MARL) is also producing break
through results in challenging collaborative-competitive en-
vironments such as [OpenAI, 2018; Jaderberg et al., 2018;
Liu et al., 2019].
The success in reinforcement learning has prompted inter-
est in more complex challenges as well as a shift towards
cases in which an agent tries to learn multiple tasks in a single
environment. Formally this paradigm of learning is known
as multitask reinforcement learning [Teh et al., 2017]. The
essence of multitask reinforcement learning is to simultane-
ously learn multiple tasks jointly to speed up learning and
induce better generalization by exploiting the common struc-
tures among multiple tasks.
Despite having success in single agent multitask reinforce-
ment learning [Borsa et al., 2019; Teh et al., 2017], multitask
Ladislau Boloni
Department of Computer Science
University of Central Florida
Orlando, Florida, United States
[email protected]
multi-agent reinforcement learning has been explored in only
one recent study [Omidshafiei et al., 2017]. In this paper, we
are exploring an opposite problem where multiple reinforce-
ment learning agents are trying to master a single task across
multiple scenarios. Consider multiple RL agents trying to
master a single task in multiple scenarios. In order for the
agents to generalise, they need to able to identify and exploit
common structure of the single task under multiple scenarios.
One possible structure is the similarity between the solutions
of the single task over multiple scenarios either in the policy
space or associated value-function space. For this, we build
our solution upon two frameworks. The first framework is
universal value function approximators (UVFAs) by [Schaul
et al., 2015] and the second framework is multi-agent deep
deterministic policy gradient (MADDPG) by [Lowe et al.,
2017]. UVFAs are extension of value functions that also in-
clude the notion of a task or a scenario thus exploiting com-
mon structure in associated optimal value functions. MAD-
DPG is a multi-agent reinforcement learning algorithm that
uses the centralized training and distributed testing paradigm
to stabilize learning. The outcome of combining these two
frameworks is a solution for multi-agents that learn to gener-
alize over both state space and a set of multiple scenarios.
To investigate the emergence of collaboration in multi-
scenario learning for multi-agent learning agents, we de-
signed a challenging environment with simulated physics in
Multi-Agent Particle Environment [Mordatch and Abbeel,
2017]. We have developed 4 different simulated scenarios
representing a challenging urban security problem of pro-
viding physical protection to VIP from nearby bystanders of
more than one different class. The complexity in our environ-
ment arises primarily from the different moving patterns of
these bystanders that a standard state-of-the-art MARL algo-
rithm such as MADDPG [Lowe et al., 2017] fail to capture.
The goal here is to learn a stable and a consistent multi-agent
cooperative behavior across all the known scenarios. Here,
we are not dealing with unknown scenarios.
2 Background
Partially observable Markov Game [Littman, 1994] is a multi-
agent extension of MDP characterized by S, N agents with
partial observations O = {O1, . . . ,ON} of the environment
with a collective action space of A = {A1, . . . ,AN}, a re-
ward function R and a state transition function T . At every
time step, each agent chooses an action ai from it's policy
π parameterized by θi conditioned on its private observation
oi i.e ai = πθi (oi) and receives a reward ri = R (s, ai) The
goal of each agent is to maximise its own total expected return
i is the collected reward by
E [Gi] = E(cid:104)(cid:80)T
where rt
t=0 γtrt
i
(cid:105)
agent i at time t.
2.1 Policy Gradients
Policy gradient methods have been shown to learn the opti-
mal policy in a variety of reinforcement learning tasks. The
main idea behind policy gradient methods is to maximize the
objective function by parameterizing the policy π with θ and
updating the policy parameters in the direction of the gradient
∇J(θ) of the objective function J (θ) = E [Gt]. The gradient
is defined as
∇J(θ) = E [∇θ log πθ (as) Qπ (s, a)]
[Silver et al., 2014] has shown that it is possible to extend
the policy gradient framework to deterministic policies i.e.
πθ : S → A. In particular we can write ∇J (θ) as
∇J(θ) = E(cid:2)∇θπ (as)∇aQπ (s, a)a=π(s)
(cid:3)
(cid:3)
A variation of this model, Deep Deterministic Policy Gra-
dients (DDPG) [Lillicrap et al., 2015] is an off-policy algo-
rithm that approximates the policy π and the critic Qπ with
deep neural networks. DDPG also uses an experience replay
buffer alongside a target network to stabilize the training.
∇J(θi) = E(cid:2)∇θiπi (aioi)∇ai Qπ
Multi-agent deep deterministic policy gradients (MAD-
DPG) [Lowe et al., 2017] extends DDPG for the multi-agent
setting where each agent has it's own policy. The gradient of
each policy is written as
i (s, a1, . . . , aN )ai=πi(oi)
where s = (o1, . . . , oN ) and Qπ
i (s, a1, . . . , aN ) is a cen-
tralized action-value function that takes the actions of all the
agents in addition to the state of the environment to estimate
the Q-value for agent i. Since every agent has it's own Q-
function, the model allows the agents to have different ac-
tion spaces and reward functions. The primary motivation be-
hind MADDPG is that knowing all the actions of other agents
makes the environment stationary that helps in the stabiliza-
tion of the training, even though the policies of the agents
change.
The Universal Value Function Approximator [Schaul et al.,
2015] is an extension of DQN [Mnih et al., 2015] where it
generalizes not only over a set of states but also on a set
of goals. At the beginning of the episode, a state-goal pair
is sampled from a probability distribution, the goal remains
constant throughout the episode. At each timestep, the agent
receives a pair of current state and goal and gets the reward
rt = rg (st, at). As a result, the Q-function is not only depen-
dent on state-action pair but also on the goal. The extension
of this approach is straight forward for DDPG [Marcin et al.,
2017] and MADDPG.
3 Multi-Agent Universal Policy Gradient
We propose multi-agent universal policy gradient: a multi-
agent deep reinforcement learning algorithm that learns dis-
tributed policies not only over state space but also over a set
of scenarios.
ig
While generalization across multi-task in multi-agent rein-
forcement learning has been studied in [Omidshafiei et al.,
2017], to our best knowledge we are the first one to con-
sider the multi-scenario multi-agent deep RL system. Our ap-
proach uses Universal Value Function Approximators [Schaul
et al., 2015] to train policies and value functions that take a
state-scenario pair as an input. The outcome are universal
multi-agent policies that are able to perform on multiple sce-
narios as well as policies that are trained separately.
The main idea is to represent the different value function
approximators for each agent i by a single unified value func-
tion approximator that generalizes of over both state space
and a set of scenarios. For agent i we consider Vi (s, g; φ) ≈
V ∗
(s, a) that approximate the
ig
optimal unified value functions over multiple scenarios and a
large state space. These value functions can be used to extract
policies implicitly or as critics for policy gradient methods.
(s) or Qi (s, a, g; φ) ≈ Q∗
The learning paradigm we used is similar to the central-
ized training with decentralized execution during testing used
by [Lowe et al., 2017]. In this setting, additional information
is provided for the agents during training that is not available
during test time. Thus, extracting policies from value func-
tions is not feasible in this model. However, the value func-
tions can be used as critics in a multi-agent deep deterministic
policy gradient setting.
Concretely, consider an environment with N agents
with policies πππ = {π1π1π1, . . . , πNπNπN} parameterized by θθθ =
{θ1θ1θ1, . . . , θNθNθN} then the multi-agent deep deterministic policy
gradient for agent i can written as
∇J(θi) = E(cid:2)∇θiπi (aioi)∇aiQπ
i (s, a1, . . . , aN )ai=πi(oi)
where s = (o1, . . . , oN ) and Qπ
i (s, a1, . . . , aN ) is a central-
ized action-value function parameterized by φi that takes the
actions of all the agents in addition to the state of the environ-
ment to estimate the Q-value for agent i. We extend the idea
of MADDPG with universal functional approximator, specif-
ically we augment the centralized critic with an embedding
of the scenario. Now the modified policy gradient for each
agent i can be written as
(cid:3)
(cid:34)
∇J(θi) = Es,a,g∼D
∇θiπi (aioi, g)
(cid:35)
(1)
∇aiQπ
i (s, a1, . . . , aN , g)
where ai = πi (oi, g) is action from agent i following pol-
icy πi and D is the experience replay buffer. The centralized
critic is Qπ
i is updated as:
L (φi) = Es,a,r,s(cid:48),g [(Qπ
i (s, a1, . . . , aN , g)) − y]
y = rg
1, . . . , a(cid:48)
where y is defined as:
(s(cid:48), a(cid:48)
i + γQπ(cid:48)
φ(cid:48)
where π(cid:48)π(cid:48)π(cid:48) = {π(cid:48)
N} are target policies parameterized
1π(cid:48)
Nπ(cid:48)
1, . . . , π(cid:48)
1π(cid:48)
Nπ(cid:48)
by θ(cid:48)θ(cid:48)θ(cid:48) = {θ(cid:48)
N}.
1θ(cid:48)
Nθ(cid:48)
Nθ(cid:48)
1θ(cid:48)
1, . . . , θ(cid:48)
The overall algorithm to which we refer as multi-agent uni-
versal policy gradient (MAUPG) is described in algorithm 1.
N , g)a(cid:48)
i=π(cid:48)
i(o(cid:48)
i,g)
i
Additionally, we refer the learnt policies as universal policies.
The overview of the architecture can be seen in fig. 1.
i, g)
i
for t = 1 to episode -- length do
For each agent i, select action at
Execute actions at = [at
1, . . . , at
For each agent i, get next observation ot+1
i = πθi (ot
N ]
end for
Sample an additional scenario k
for t = 1 to episode -- length do
Algorithm 1 Multi-agent Universal Policy Gradient
1: Sample a random scenario g
2: for episode = 1 to M do
3:
4:
5:
6:
7:
8:
9:
10:
11:
12:
13:
14:
15:
16:
17:
18:
19:
20:
for agent i = 1 to N do
i := rg
i, ot+1
i, rt
/* Hindsight Replay */
Get reward rt
i (ot
i, at
end for
Set g = k
for agent i = 1 to N do
Store(cid:0)ot
Store(cid:0)ot
Get reward rt
i, at
i := rk
i, ot+1
i, rt
i
end for
i (ot
i
i, at
i)
i, at
i)
, g(cid:1) in replay buffer
, k(cid:1) in replay buffer
(cid:16)
sj, aj, rj, s(cid:48)j, gj(cid:17)
(cid:17)
N , gj(cid:17)
N , gj(cid:17)(cid:17)
1, . . . , a(cid:48)
(cid:48)j
N , gj)
1, . . . , aj
(o
(cid:16)
θi
Sample minibatch of size S
(cid:48)j
π(cid:48)
i , gj), . . . , π(cid:48)
w :=
(o
(a(cid:48)
1, . . . , a(cid:48)
N ) := w
s(cid:48)j, a(cid:48)
i + γQπ(cid:48)
Set yj = rj
φ(cid:48)
Update critic by minimizing
(cid:16)
θN
i
yj − Qπ
φi
sj, aj
(cid:16)
1
S
(cid:16)
(cid:88)
θi+ =(cid:80)
j
j
21:
22:
23:
24:
25:
26:
27:
∇θi πi(aioj
i ,gj)∇ai Qπ
φi(sj ,aj
1,..,aj
N ,gj)
end for
Update target network parameters for each agent i
S
i ← τ θi + (1 − τ ) θ(cid:48)
θ(cid:48)
i ← τ φi + (1 − τ ) φ(cid:48)
φ(cid:48)
i
i
(a) An overview of the mutli-agent de-
centralized actor with centralized critic
represented by a universal value function
approximator.
(b) Representation of
the single centralized
critic by a universal
function approximator.
Figure 1: An overview of the multi-agent universal policy gradient
architecture where both actors and critics are augmented with the
goal that the agents are trying to achieve.
a given moment from the nearby bystanders -- the aim of the
bodyguards is to reduce this value.
Two agents x and y have a line of sight LoS(x, y) ∈ [0, 1]
if x can directly observe y and with no obstacle between
them. A bystander b can only pose a threat to the VIP if it
is closer than the safe distance SafeDist. The threat level
TL (VIP, b) [Bhatia et al., 2016] is defined as the probability
that a bystander b can successfully assault the VIP, defined as
a value exponentially decaying with distance:
TL (VIP, b) = exp−A(Dist(VIP,b))/B
(2)
where the VIP should be in line of sight of b and
Dist(VIP, b) < SafeDist. A and B are positive constants
that control the decay rate of the threat level.
The residual threat RT (V IP,B, R) is defined as the threat
to the VIP at time t from bystanders B. Bodyguards can block
the line of sight from the bystanders, thus the residual threat
is always smaller than the threat level and depends on the po-
sition of the bodyguards with respect to the bystanders and
the VIP. The cumulative residual threat to the VIP from by-
standers B in the presence of bodyguards R over the time
period [0, T ] is defined as:
T(cid:90)
1 − k(cid:89)
28: end for
CRT =
(1 − RT (V IP, bi, R)) dt
(3)
0
i=1
4 Experimental Setup
4.1 The VIP Protection Problem
To demonstrate the effectiveness of our proposed algorithm,
we simulated an urban security problem of VIP protection
where a team of learning agents (bodyguards) are providing
physical protection to a VIP from bystanders in a crowded
space. This problem is briefly explored in [Sheikh and
Boloni, 2018a; Sheikh and Boloni, 2018b].
We are considering a VIP moving in a crowd of bystanders
B = {b1, b2, . . . , bM} protected from assault by a team of
bodyguards R = {r1, r2, . . . , rN}. To be able to reason about
this problem, we need to quantify the threat to the VIP at
Our end goal is to minimize CRT through multi-agent rein-
forcement learning.
4.2 Simulation and Scenarios
We designed four scenarios inspired from possible real world
situations of VIP protection and implemented them as behav-
iors in the Multi-Agent Particle Environment( fig. 2) [Mor-
datch and Abbeel, 2017].
In each scenario, the participants are the VIP, 4 bodyguards
and 10 bystanders of one or more classes. The scenario de-
scription contains a number of landmarks, points on a 2D
space that serve as a starting point and destinations for the
goal-directed movement by the agents. For each scenario,
𝑔𝜋1𝑎1𝑜1𝑄1𝑑𝜋𝑛𝑎𝑛𝑜𝑛𝑔𝑄𝑛𝑑Neural Neta𝑄sg(a) Random Landmarks
(b) Shopping Mall
(c) Street
(d) Pie-in-the-face
Figure 2: Visual representation of the four different scenarios. Emergence of complex behavior can be clearly seen where the bodyguards(in
blue) have positioned themselves between the VIP(in brown) and the bystanders(in red) shielding from potential threat.
(a) Random Landmarks
(b) Shopping Mall
(c) Street
(d) Red Carpet
Figure 3: Learning curve of the scenarios in terms of average cumulative reward for the bodyguards. Notice that start-of-the-art multi-agent
reinforcement learning algorithms such as COMA and Q-MIX fail to even take off in most of the challenging scenarios. MADDPG was the
only consistent algorithm that was able to learn in the environment.
the VIP (brown disk) starts from the starting point and moves
towards the destination landmark (green disk). The VIP ex-
hibits a simple path following behavior, augmented with a
simple social skill metric:
it is about to enter the personal
space of a bystander, it will slow down or come to a halt.
The scenarios differ in the arrangement of the landmarks
and the behavior of the different classes of bystanders.
A Random Landmark: In this scenario, 12 landmarks are
placed randomly in the area. The starting point and des-
tination for the VIP are randomly selected landmarks.
The bystanders are performing random waypoint nav-
igation:
they pick a random landmark, move towards
it, and when they reached it, they choose a new desti-
nation. A set of fixed seeds were used for placement
of landmarks and a different set of seeds were used for
spawning bystanders in the environment.
B Shopping Mall:
In this scenario, 12 landmarks are
placed in fixed position on the periphery of the area, rep-
resenting shops in a market. The bystanders visit ran-
domly selected shops and were spawned using a fixed
set of random seeds.
C Street: This scenario aims to model the movement on a
crowded sidewalk. The bystanders are moving towards
waypoints that are outside the current area. However,
due to their proximity to each other, the position of the
other bystanders influence their movement described by
laws of particles motion [Vicsek et al., 1995].
D Pie-in-the-Face: While the in other scenarios the by-
standers treat the VIP as just another person, in this "red
carpet" scenario the bystanders take an active interest in
the VIP. We consider two distinct classes of bystanders
with different behaviors. Rule-abiding bystanders stay
behind a designated line observing as the VIP passes in
front of them. Unruly bystanders break the limit im-
posed by the line and try to approach the VIP (presum-
ably, to throw a pie in his/her face).
Observation and Action Space
Following the model of Multi-Agent Particle Environ-
ment [Mordatch and Abbeel, 2017], the action space Ai of
each bodyguard i consists of 2D vector of forces applied
on the bodyguard and to promote collaboration and coopera-
tion [Mordatch and Abbeel, 2017], a c dimensional commu-
nication channel.
The observation of each bodyguard is the physical state
of the nearest m ⊂ M bystanders, all the N bodyguards
in the scenario and their verbal utterances such that oi =
[xj,...N +m, ck,...N ] ∈ Oi where xj is the observation of the
entity j from the perspective of agent i and ck is the verbal
utterance of the agent k.
In this problem, we are assuming that all bodyguards have
010002000300040005000600070008000Number of Episodes−30−25−20−15−10−5Average Cumu ative RewardMADDPGQ-MixCOMAIQLVDN010002000300040005000Number of Episodes−18−16−14−12−10−8−6−4−2Average Cu ulative RewardMADDPGQ-MixCOMAIQLVDN010002000300040005000Number of E isodes−35−30−25−20−15−10−5Average Cumulative RewardMADDPGQ-MixCOMAIQLVDN010002000300040005000Number of Episodes−14−12−10−8−6−4−2Average Cu ulative RewardMADDPGQ-MixCOMAIQLVDNidentical observation space and action space. Moreover, each
scenario embedding g is represented as a one hot vector.
4.3 Reward Function
Using the definitions of threat level and cumulative residual
threat defined in eq. (2) and eq. (3) respectively, the reward
function rb for bodyguard i can be written as
rb = −1 +
(1 − RT (V IP, bi, R))
(4)
To encourage the bodyguards to stay at a limited distance
from the VIP and discourage them to attack the bystanders,
a distance regularizer D is added to eq. (4) to form the final
reward function.
D (VIP , xi) =
−1
m ≤ (cid:107)xi − VIP(cid:107)2 ≤ d
otherwise
(5)
k(cid:89)
i=1
0
where m is the minimum distance the bodyguard has to main-
tain from VIP and d is the SafeDist mentioned in section 4.1.
The final reward function is represented as
(cid:32)
k(cid:89)
i=1
+ β (D (VIP , xi))
rb =α
−1 +
(1 − RT (V IP, bi, R))
(cid:33)
(6)
Depending upon on the scenario g, different values of α,
and β were chosen for the optimal performance. A different
value of α and β also fulfills the requirement of a different
reward function to train a UVFA.
5 Experiments and Results
In this section, we first evaluate the usefulness of multi-agent
reinforcement learning on the given problem by comparing
it's results with an hand-engineered solution for the VIP prob-
lem. Then we demonstrate the inability of the state-of-the-
art MARL algorithms to generalize over different scenarios.
Finally we compare the results of scenario dependant poli-
cies with the results of universal policies. Our primary eval-
uation metric is Cumulative Residual Threat (CRT) defined
in eq. (3).
5.1 Multi-Agent Reinforcement Learning vs
Quadrant Load Balancing
In order to verify that multi-agent reinforcement learning so-
lutions are better than explicitly programmed behavior of the
bodyguards, we evaluate policies trained on individual sce-
narios with quadrant load balancing technique (QLB) intro-
duced in [Bhatia et al., 2016].
To identify the best MARL algorithm to compete with
the hand-engineered solution, we trained five state-of-the-
art MARL algorithms such as Q-Mix, VDN, IQL, COMA1
and MADDPG on our environment. It can be seen in fig. 3
1https://github.com/oxwhirl/pymarl/
Figure 4: Comparing the average cumulative residual threat values
of MADDPG and QLB on four different scenarios.
that MADDPG was the only algorithm that was successful in
learning in our environment while other algorithms fail even
to take off. Therefore, we dropped the CRT graphs.
We then compared the results of MADDPG with quadrant
load-balancing (QLB). From the results in fig. 4 we can see
that the outcome are different depending on the characteris-
tics of the scenario. For the Pie-in-the-face scenario, where
most of the bystanders stay away behind the lines, both the
RL-learned agent and the QLB model succeeded to essen-
tially eliminate the threat. This was feasible in this specific
setting, as there were four bodyguard agents for one "unruly"
bystander. For the other scenarios, the average cumulative
residual threat values are higher for both algorithms. How-
ever, for the Random Landmark and Shopping Mall scenarios
the RL algorithm is able to reduce the threat to less than half,
while in the case of the Street scenario, to less than one ninth
of the QLB value.
Overall,
these experiments demonstrate that the multi-
agent reinforcement learning can learn behaviors that im-
prove upon algorithms that were hand-crafted for this specific
task.
5.2 Universal Policies Vs Scenario-Dependant
Policies
In order to verify the claim that MARL algorithms trained on
specific scenario fail to generalize over different scenarios,
we evaluate policies trained via MADDPG on specific sce-
nario and test them on different scenarios. Policies on specific
scenarios were trained using the same settings and configura-
tions from experiments performed in section 5.1.
From the results shown in fig. 5 we can see that MADDPG
policies trained on specific scenarios performed poorly when
tested on different scenarios as compared to when tested on
same scenario with different seeds.
In order to tackle the
generalization problem, we train the agents using multi-agent
universal policy gradient and compare its results with the re-
sults of scenario-dependant MADDPG policies.
From the results in fig. 6 we can see that our proposed
method performs better than policies trained on specific sce-
narios as well as quadrant-load balancing. Overall, these ex-
periments demonstrate that start-of-the-art MARL algorithms
such as MADDPG fail to generalize a single task over mul-
tiple scenarios while our proposed solution MAUPG learn
3.862.942.750.0011.391.570.310.00100.511.522.533.544.5Random LandmarkShopping MallStreetPie-in-the-faceResidual ThreatQuadrant Load BalancingMADDPGFigure 5: A confusion matrix representing the average residual
threat values of MADDPG policies trained on specific scenario
when tested on different scenarios over 100 episodes.
Figure 7: Learning curves of the ablated version of MAUPG. Notice
the increase in performance in terms of average cumulative reward
with an addition of UVFAs and hindsight replay step.
Figure 6: Comparing the average cumulative residual threat values
for universal policy agents with MADDPG and QLB agents
policies that allows a single task to be learnt across multiple
scenarios and improve upon the start-of-the-art multi-agent
reinforcement learning algorithm.
6 Ablation Study
The first natural question that can be asked here is that why
can't we just sample scenarios during training of a standard
MADDPG? To answer this question and to see the effect of
UVFA and hindsight replay used in MAUPG, we perform an
ablation study in which we gradually add important building
blocks to MADDPG to transform the solution into MAUPG.
First to answer the question, we trained a MADDPG and
sampled different scenarios. Second we replaced the stan-
dard centralized critic with an UVFA and finally we added
the hindsight replay step. All the training settings and hyper-
parameters were kept same across all the experiments.
From figs. 7 and 8, we can see that MADDPG does not
learn half as good as MAUPG with or without the hind-
sight replay step. MAUPG learns better and faster than
MAUPG without hindsight replay. This happens because
MAUPG with hindsight replay benefits from replaying trajec-
tories from one scenario in other scenarios(see lines 14 and 15
of algorithm 1) thus providing more experience to learn effi-
ciently.
Figure 8: Learning curves of the ablated version of MAUPG. Notice
the decline in average cumulative residual threat with an addition of
UVFAs and hindsight replay step.
7 Conclusion
In this paper, we highlighted the issue with MARL algorithms
of failing to generalize a single task over multiple known sce-
narios. To solve the generalization problem, we proposed
multi-agent universal policy gradient, a universal value func-
tion approximator inspired policy gradient method that not
only generalizes over state space but also over set of differ-
ent scenarios. We also built a 2D challenging environment
simulating an urban security problem that can be used as a
benchmark for similar problems. Experimental studies have
demonstrated that our proposed method generalizes well on
different scenario and performs better than MADDPG when
trained on different scenarios individually.
References
[Bhatia et al., 2016] T.S. Bhatia, G. Solmaz, D. Turgut, and
L. Boloni. Controlling the movement of robotic body-
In Proc. of the
guards for maximal physical protection.
29th International FLAIRS Conference, pages 380 -- 385,
May 2016.
[Borsa et al., 2019] Diana Borsa, Andre Barreto, John Quan,
Daniel J. Mankowitz, Hado van Hasselt, Remi Munos,
3.862.942.750.0011.391.570.310.0011.011.250.210.00100.511.522.533.544.5Random LandmarksShopping MallStreetPie-in-the-faceResidual ThreatQuadrant Load BalancingMADDPGMAUPG02000400060008000Number f Epis des−22.5−20.0−17.5−15.0−12.5−10.0−7.5−5.0−2.5Average Cumulative RewardMADDPGMAUPG-w/o-HERMAUPG-w/-HER02000400060008000Number of Episodes1.01.52.02.53.0Average Cumulative Residual ThreatMADDPGMAUPG-w/o-HERMAUPG-w/-HERDavid Silver, and Tom Schaul. Universal successor fea-
In International Conference on
tures approximators.
Learning Representations, 2019.
[Jaderberg et al., 2018] Max Jaderberg, Wojciech M. Czar-
necki, Iain Dunning, Luke Marris, Guy Lever, Anto-
nio Garcia Castaneda, Charles Beattie, Neil C. Rabi-
nowitz, Ari S. Morcos, Avraham Ruderman, Nicolas Son-
nerat, Tim Green, Louise Deason, Joel Z. Leibo, David
Silver, Demis Hassabis, Koray Kavukcuoglu, and Thore
Graepel. Human-level performance in first-person mul-
tiplayer games with population-based deep reinforcement
learning. arXiv preprint arXiv: 1807.01281, 2018.
[Lillicrap et al., 2015] Timothy P. Lillicrap,
Jonathan J.
Hunt, Alexander Pritzel, Nicolas Heess, Tom Erez, Yuval
Tassa, David Silver, and Daan Wierstra. Continuous con-
trol with deep reinforcement learning. In Proc. of the 3rd
Int'l Conf. on Learning Representations (ICLR), 2015.
[Littman, 1994] Michael L. Littman. Markov games as a
framework for multi-agent reinforcement learning.
In
Proc. of the 11th Int'l Conf. on Machine Learning(ICML),
pages 157 -- 163. Morgan Kaufmann, 1994.
[Liu et al., 2019] Siqi Liu, Guy Lever, Nicholas Heess, Josh
Merel, Saran Tunyasuvunakool, and Thore Graepel. Emer-
In International
gent coordination through competition.
Conference on Learning Representations, 2019.
[Lowe et al., 2017] Ryan Lowe, Yi Wu, Aviv Tamar, Jean
Harb, Pieter Abbeel, and Igor Mordatch. Multi-agent
actor-critic for mixed cooperative-competitive environ-
ments. In Advances in Neural Information Processing Sys-
tems 30, pages 6379 -- 6390, 2017.
[Marcin et al., 2017] Andrychowicz Marcin, Wolsk Filip,
Ray Alex, Schneider Jonas, Fong Rachel, Welinde Peter,
McGrew Bob, Tobin Josh, Pieter Abbeel, and Zaremba
In Advances in
Wojciech. Hindsight experience replay.
Neural Information Processing Systems 30, pages 5048 --
5058, 2017.
[Mnih et al., 2015] Volodymyr Mnih, Koray Kavukcuoglu,
David Silver, Andrei A. Rusu, Joel Veness, Marc G. Belle-
mare, Alex Graves, Martin Riedmiller, Andreas K. Fid-
jeland, Georg Ostrovski, Stig Petersen, Charles Beattie,
Amir Sadik, Ioannis Antonoglou, Helen King, Dharshan
Kumaran, Daan Wierstra, Shane Legg, and Demis Has-
sabis. Human-level control through deep reinforcement
learning. Nature, 518(7540):529 -- 533, 02 2015.
[Schaul et al., 2015] Tom Schaul, Daniel Horgan, Karol
Gregor, and David Silver. Universal value function ap-
proximators. In Proc. of the 32st Int'l Conf. on Machine
Learning(ICML), pages 1312 -- 1320, 2015.
[Sheikh and Boloni, 2018a] H. U. Sheikh and L. Boloni.
Designing a multi-objective reward function for creat-
ing teams of robotic bodyguards using deep reinforce-
In Prof. of 1st Workshop on Goal Spec-
ment learning.
ifications for Reinforcement Learning (GoalsRL-2018) at
ICML 2018, July 2018.
[Sheikh and Boloni, 2018b] H. U. Sheikh and L. Boloni. The
emergence of complex bodyguard behavior through multi-
In Proc. of Autonomy in
agent reinforcement learning.
Teams (AIT-2018) workshop at ICML-2018, July 2018.
[Silver et al., 2014] David Silver, Guy Lever, Nicolas Heess,
Thomas Degris, Daan Wierstra, and Martin Riedmiller.
Deterministic policy gradient algorithms. In Proc. of the
31st Int'l Conf. on Machine Learning(ICML), pages 387 --
395, 2014.
[Silver et al., 2016] David Silver, Aja Huang, Christopher J.
Maddison, Arthur Guez, Laurent Sifre, George van den
Driessche, Julian Schrittwieser, Ioannis Antonoglou, Veda
Panneershelvam, Marc Lanctot, Sander Dieleman, Do-
minik Grewe,
Ilya
Sutskever, Timothy Lillicrap, Madeleine Leach, Koray
Kavukcuoglu, Thore Graepel, and Demis Hassabis. Mas-
tering the game of Go with deep neural networks and tree
search. Nature, 529:484 -- 503, 2016.
John Nham, Nal Kalchbrenner,
[Teh et al., 2017] Yee Teh, Victor Bapst, Wojciech M. Czar-
necki, John Quan, James Kirkpatrick, Raia Hadsell, Nico-
las Heess, and Razvan Pascanu. Distral: Robust multitask
reinforcement learning. In Advances in Neural Informa-
tion Processing Systems 30, pages 4496 -- 4506. 2017.
[Vicsek et al., 1995] Tam´as Vicsek, Andr´as Czir´ok, Eshel
Ben-Jacob, Inon Cohen, and Ofer Shochet. Novel type of
phase transition in a system of self-driven particles. Phys-
ical review letters, 75(6):1226, 1995.
[Mordatch and Abbeel, 2017] Igor Mordatch and Pieter
lan-
arXiv preprint
Abbeel.
guage in multi-agent populations.
arXiv:1703.04908, 2017.
Emergence of grounded compositional
[Omidshafiei et al., 2017] Shayegan Omidshafiei,
Jason
Pazis, Christopher Amato, Jonathan P. How, and John
Vian. Deep decentralized multi-task multi-agent rein-
forcement learning under partial observability. In Proc. of
the 34th Int'l Conf. on Machine Learning(ICML), pages
2681 -- 2690, 2017.
[OpenAI, 2018] OpenAI. OpenAI Five, 2018. https://blog.
openai.com/openai-five/.
|
1503.05317 | 1 | 1503 | 2015-03-18T09:35:16 | Model Checking AORTA: Verification of Organization-Aware Agents | [
"cs.MA"
] | As agent systems grow larger and more complex, there is an increasing need to formally verify them. Furthermore, it is often suggested that complex systems can be regulated using organizational models, imposing constraints on the agents in the systems. Agents that can understand the organizational model and constraints in a system is said to be organization-aware. This paper is concerned with verification of organization-aware agents. We show how agents using AORTA, a framework for making agents organization-aware, can be formally verified using an extended version of the Agent Java PathFinder (AJPF), a model checking system designed specifically for agent programming languages. We integrate AORTA with the Agent Infrastructure Layer (AIL), which is an intermediate layer on top of which APLs can be implemented, and use our extension of AJPF to verify a system of agents aiming to write a paper together by using an organization for coordination. | cs.MA | cs |
Model Checking AORTA:
Verification of Organization-Aware Agents
Andreas Schmidt Jensen
Technical University of Denmark, Kongens Lyngby, Denmark
[email protected]
Abstract. As agent systems grow larger and more complex, there is an
increasing need to formally verify them. Furthermore, it is often sug-
gested that complex systems can be regulated using organizational mod-
els, imposing constraints on the agents in the systems. Agents that can
understand the organizational model and constraints in a system is said
to be organization-aware. This paper is concerned with verification of
organization-aware agents. We show how agents using AORTA, a frame-
work for making agents organization-aware, can be formally verified us-
ing an extended version of the Agent Java PathFinder (AJPF), a model
checking system designed specifically for agent programming languages.
We integrate AORTA with the Agent Infrastructure Layer (AIL), which
is an intermediate layer on top of which APLs can be implemented, and
use our extension of AJPF to verify a system of agents aiming to write
a paper together by using an organization for coordination.
Keywords: Model Checking, Agent Programming Languages, Organi-
zational Reasoning, Organization-Aware Agents
1
Introduction
In many of the areas where multi-agent systems (MASs) are used, there is a need
for dependability and security. Therefore, it is increasingly necessary to consider
formal verification of such systems [4]. Furthermore, we have seen an increase of
interest in the area of organization-oriented MAS, i.e. systems in which agents
have to consider organizational constraints. The motivation for organizational
MASs is the increasing complexity of heterogeneous agents in open systems. The
owner of an open system cannot in general assume much about agents entering
the system, and it is therefore important to be able to regulate their behavior
to ensure that it is within the acceptable boundaries of the system.
Organizational models (e.g. Moise+ [16]) are designed to describe what is
expected of agents in the system without taking the individual agents and their
implementation into account. This is done using the notion of roles: an agent
can a enact roles, giving it certain responsibilities (the objectives of the role)
while providing certain capabilities (access to objects in the system, access to
groups of other agents, etc.). Furthermore, organizational models often have a
normative aspect: behavior, or states of affair, that is expected of the agents in
1
the system, but is not directly enforced. That is, the agents are free to violate the
norms of a system, but they should then expect to be punished. Organizational
models thus provide a way for the designer of a system to explain to the agents
entering the system, what is expected of them.
However, if agents are expected to fulfill the system's expectations of them,
they need a way to understand the organizational model of that system. Agents
that are able to do this are organization-aware [3]. Organization-aware agents
will naturally tend to be more complex than their "unaware" counterparts; even
though programming them may be easier, since certain aspects may be auto-
mated (task allocation, coordination, etc.), the reasoning cycle of the agents will
include more steps. This makes it even harder to convince ourselves that our
implementation is correct.
Since agent-oriented programming (AOP) differs from the well-known object-
oriented programming (OOP), the verification techniques from OOP must be
extended to capture the agent metaphor. That is, since agents are autonomous
and their behavior is based on beliefs and intentions, we need to be able to not
only check what the agent does (similar to verification in OOP), but also why it
did so.
The principles of model checking as defined in [2] "is an automated technique
that, given a finite-state model of a system and a formal property, systematically
checks whether this property holds for (a given state in) that model ". Model
checking agent programming languages (APLs) can thus be reduced to translat-
ing the system into a finite-state model in which we can prove certain properties.
Since agents are usually enriched with mental attitudes such as beliefs, goals and
intentions, model checking APLs is only interesting, if we can verify properties
about these mental attitudes. For example, it is possible to check whether agents
in a system only intend to achieve goal states by checking the temporal formula
✷(I(ag, φ) → G(ag, φ)). Here, ag refers to an agent, φ is a state and I and G
are modal operators referring to intentions and goals, respectively. Quite some
work has been done to make it possible to perform model checking on existing
APLs, and for example, the Agent Java PathFinder project [11] is an example
of a practical system in which model checking is feasible.
In this paper, we present an extension to AJPF, which makes it possible to
perform verification of organization-aware agents. We use AORTA [18] to make
agents organization-aware, and extend the specification language to incorporate
modalities about organizational information. Our contribution is two-fold: first,
we integrate AORTA with the Agent Infrastructure Layer (AIL), which is an
intermediate layer on top of which APLs can be implemented. By integrating
AORTA with AIL, we enable verification of organization-aware agents from po-
tentially any APL with a clear semantics. Second, we use the integration to verify
properties in a system of agents working together to write a scientific paper.
The rest of the paper is organized as follows. First, we provide a brief de-
scription of the AORTA framework in section 2. We then describe the AJPF
system, which is used to translate MASs into finite-state models on which model
checking can be done (section 3). In section 4 we present our extension to AJPF,
2
making it possible to perform model checking on organization-aware agents. We
evaluate the system in section 5 and we conclude the paper in section 6.
2 The AORTA framework
AORTA [18] is an organizational reasoning component that can be integrated into
an agent's reasoning mechanism, allowing it to reason about (and act upon) reg-
ulations specified by an organizational model using reasoning rules. That is, the
organization is preexisting and independent from the agent and the component
is agent-centered, focusing on letting the agent reason about the organization.
By separating the organization from the agent, the architecture of the agent is
independent from the organizational model, and the agent is free to decide on
how to use AORTA in its reasoning. The separation is achieved by basing the
component on reasoning rules using an organizational metamodel, designed to
support different organizational models. A prototype of AORTA has been imple-
mented in Java1 [19], designed such that it can provide organizational reasoning
capabilities to agents implemented in existing APLs.
In this paper, we use an extended version of the AORTA architecture de-
scribed in [19]: options are generated automatically, action deliberation and
coordination are merged into a single phase, and we incorporate obligations.
Organizational reasoning in AORTA is then divided into three phases: obligation
check (OC), option generation (OG) and action execution (AE). The OC-phase
uses the agent's mental state and organizational state to determine if obligations
are activated, satisfied or violated, and updates the organizational state accord-
ingly. The OG-phase uses the organizational specification to generate possible
organizational options. The agent considers these options in the AE-phase using
reasoning rules, which can alter the organizational state and the agent's inten-
tions, or send messages to other agents. The component is shown in figure 1.
We assume is connected to a cognitive agent, i.e., agents with mental attitudes
(such as beliefs and goals) and practical reasoning rules.
Checking obligations: In the OC-phase, AORTA uses the agent's state to deter-
mine for each obligation if it should change to a new state. We use conditional
obligations with a deadline, so an obligation can change state in several different
situations. If the condition for activating an obligation has happened, the com-
ponent activates the obligation by updating the organizational state. Similarly,
it checks whether the obligation has been satisfied (the objective is completed)
or violated (the deadline was reached before the objective was completed).
Option generation: In the OG-phase, AORTA uses the mental state of the agent
and the organizational state to consider what the agent can do regarding the
organization. The following organizational aspects are considered in the OG-
phase:
1 Java was chosen since many existing agent platforms are built in Java.
3
AORTA
Cognitive Agent
Organizational beliefs
Beliefs
Goals
OC
OG
AE
Reasoning rules
Mailbox
Fig. 1. The AORTA component. The arrows indicate flow of information. Obligations
and options are generated from the organizational beliefs, and actions are based on the
generated options.
Role enactment: Roles that are possible to enact given the agent's goals.
Role deactment: (Currently enacting) roles that have been fulfilled or are no
longer useful.
Obligations: States the agent is currently obliged to achieve.
Delegation: Objectives that can be delegated based on a dependency relation.
Information: Obtained information that other agents will benefit from know-
ing.
The options that are generated in this phase are then available to act upon in
the AE-phase.
Action execution: The AE-phase uses reasoning rules to decide how to react on
a given option in a given context. The AE-phase selects at most one option to
act upon. The reasoning is based on rules of the form2
option : context → action
where option is a previously generated option, context is a state description
that should hold for an action to be applicable, and action is the action to be
executed.
The agent has actions available to enact or deact a role, commit to complete
or drop an objective, and send messages. This corresponds to the options that
can be generated in the previous phase.
2.1 The AORTA organizational metamodel
Reasoning in AORTA uses an organizational metamodel, which is based on roles,
objectives and obligations, as these concepts are commonly used in existing
organizational models (e.g. Moise+).
2 Inspired by the plan syntax of AgentSpeak(L) [20].
4
Definition 1 (Organizational metamodel). The organizational metamodel
of AORTA is defined by the following predicates:
role(Role , Objs)
obj(Obj , SubObjs)
dep(Role 1 , Role 2 , Obj )
Role is the role name, and Objs is a set of
objectives.
Obj is the name of an objective, and SubObjs is a
set of sub-objectives.
Role Role 1 depends on role Role 2 for completion
of objective Obj .
rea(Ag , Role)
Agent Ag enacts role Role.
cond(Role, Obj, Deadline, Cond) A conditional obligation for role Role to complete
obl(Ag, Role, Obj, Deadline)
viol(Ag, Role, Obj)
Obj before Deadline when Cond holds.
An obligation for agent Ag playing role Role to
complete Obj before Deadline.
Agent Ag playing role Role has violated the obli-
gation to complete Obj.
A role is defined only by its name and its main objectives. Sub-objectives of
an objective are specified using obj-predicates. We distinguish between the differ-
ent states of obligations by using different predicates. For example, a conditional
obligation is represented by the predicate cond(borrower, return(Book ), Dead-
line, borrowed (Book )). If an agent Bob enacts the borrower role and borrows
the book "1984", the obligation is activated, which is represented by the predi-
cate obl(bob, borrower, return(1984 ), Deadline). A violation of the obligation is
represented by the predicate viol(bob, borrower, return(1984 )).
2.2 Operational semantics of AORTA
The AORTA framework has a well-defined operational semantics, which has been
implemented in Java and integrated with Jason. We will not go into details
with the semantics in this paper, but give the relevant definitions required to
understand our integration of AORTA with AIL.
One of the key ideas of AORTA is the notion of the organizational knowledge
base used by the component for reasoning about options and actions. Further-
more, the component contains an options base containing the options generated
in the OG-phase.
Definition 2 (Mental state). The AORTA mental state is based on knowledge
bases. Each knowledge base is based on a predicate language, L, with typical
formula φ. The agent's belief base and intention base are denoted Σa and Γa,
respectively. The language of the organization is denoted Lorg, and Lorg ⊆ L,
and the option language is denoted Lopt, and Lopt ⊆ L. The organizational
specification and options are denoted Σo and Γo, respectively. The mental state,
MS, is then a tuple of knowledge bases:
where Σa, Γa ⊆ L, Σo ⊆ Lorg and Γo ⊆ Lopt
MS = hΣa, Γa, Σo, Γoi,
5
Definition 3 (Options). The option language, Lopt with typical element γ is
defined as follows:
γ ::= role(R) obj(O) send(R, ilf, φ),
where R is a role identifer, O is an objective, ilf is tell or achieve, and φ ∈ L is
a message.
Each of the knowledge bases in the mental state can be queried using rea-
soning formulas.
Definition 4 (Formulas). AORTA uses reasoning formulas, LR, with typical
element ρ, which are based on organizational formulas, option formulas, belief
formulas and goal formulas:
ρ ::= ⊤ org(φ) opt(φ) bel(φ) goal(φ) ¬ρ ρ1 ∧ ρ2,
where φ ∈ L.
Organizational formulas, org(φ), queries the organizational beliefs, option
formulas, opt(φ), queries the options base, belief formulas, bel(φ), queries the
belief base and goal formulas, goal(φ), queries the goal base.
Definition 5 (Semantics of reasoning formulas). The semantics are based
on the agent's mental state, MS = hΣa, Γa, Σo, Γoi.
MS = ⊤
MS = bel(φ)
iff φ ∈ Σa
MS = goal(φ) iff φ ∈ Γa
MS = org(φ) iff φ ∈ Σo
MS = opt(φ) iff φ ∈ Γo
MS = ¬ρ
MS = ρ1 ∧ ρ2 iff MS = ρ1 and MS = ρ2
iff MS 6= ρ
We define the configuration of an agent with an AORTA component as follows:
Definition 6 (AORTA-agent). An AORTA-agent configuration is defined by
the following tuple:
A = hα, MS, AR, F, µi,
where α is the name of the agent, MS is the mental state, AR is the agents rea-
soning rules, AR ⊆ RA, F is the set of transition functions and µ = hµin, µouti
is the mailbox, contains incoming and outgoing messages.
The initial configuration consists of a set of initial beliefs and goals, and the
organizational specification. The agent has a number of state transition rules
available, which can be used to change its state. The execution of an entire orga-
nizational cycle will check for messages and external changes, apply obligation
rules, generate options and execute an action. Then, the reasoning cycle of the
agent enriched with the component is executed (e.g. the Jason reasoning cycle).
6
3 Model Checking Agent Programming Languages
Much of the work done in the area of model checking MASs and agent pro-
gramming languages has been in the setting of AgentSpeak(L) [5,6,7]. While
interesting, such approaches are generally hard to extend to other languages
without a lot of hard work. Furthermore, verification of heterogeneous MASs3
is not possible. Recently, others have proposed a way to verify heterogeneous
MASs by translating programs into a common metalanguage, meta-APL [13].
However, since this approach requires a translation of the program, we need to
convince ourselves that the translation is faithful to the original program.
In this paper, we are focusing on another approach for verifying agent sys-
tems, which is based on an extended version of Java PathFinder (JPF) [22]
called Agent JPF (AJPF), which takes advantage of the advanced model check-
ing features of JPF, while making it possible to verify properties relevant to
intelligent agents. AJPF can be used as-is for potentially any APL implemented
in Java, but its real power shows, when combined with the agent infrastructure
layer (AIL). AIL is designed so that interpreters of semantically well-defined
agent programming languages can be implemented using it [11], and has been
optimized for model checking in AJPF, by using techniques such as state-space
reduction. AIL comes with a simple APL, Gwendolen [10], which provides the
default semantics for AIL. An AIL agent has a belief base, possibly a rule base,
goals, plans and intentions. Furthermore, the agent has a reasoning cycle, which
executes the implementation of the operational semantics. We will not go into
details with all the different components of AIL, but refer to [11] for a detailed
description.
3.1 Specifying properties
Model checking agent systems is only useful, if we can specify desirable properties
in a language that can incorporate the mental attitudes of agents. In AJPF, these
properties are specified in the property specification language (PSL) [11]. PSL is
a linear-time temporal logic (LTL) with additional modal operators for beliefs,
goals, intentions, actions and percepts. We can thus specify formulas that should
hold in the system.
The full PSL syntax is given below. ag is the agent's name, f is a ground
first-order atomic formula.
φ ::= B(ag , f ) G(ag , f ) A(ag , f ) I(ag , f ) P(f ) φ ∨ φ ¬φ φUφ φRφ
B(ag , f ) is true if agent ag believes f to be true, G(ag , f ) is true if the
agent has f as a goal. A represents actions, I intentions and P properties of the
environment. The LTL formulas U and R represents "until" and "release", re-
spectively. The temporal operators ✸ (eventually) and ✷ (always) can be derived
from U and R.
3 That is, MASs comprised of agents implemented in different APLs.
7
The underlying semantics of the modal operators depends on the MAS being
verified. When using AORTA we can specify the semantics of beliefs as follows:
MAS = B(ag , f )
iff MS ag = bel(f ),
where MAS is the multi-agent system, and MS ag is agent ag's mental state as
defined in section 2. The semantics of the other modal operators can be given in
a similar way.
3.2 AJPF
Agent JPF is a module for the Java PathFinder [22]. JPF consists of an im-
plementation of the Java Virtual Machine (JVM), which can execute all paths
through a program in order to verify some predefined properties about the pro-
gram. Since the state space often explodes, JPF employs state matching in order
to reduce the number of states explored.
AJPF implements a controller, which takes care of execution of each of the
agents in the system. At each time step, it checks whether the system is in an end
state4 and should terminate, and otherwise it decides which agent to execute.
This decision is made by a scheduler, which keeps a list of active agents, i.e.
agents that do not want to sleep. The model checker can then branch out at
each of these states and execute each of the active agents (by choosing one path,
executing it until reaching an end state and then backtracking).
Each agent in an APL (either an AIL-enabled or an existing APL) needs
to implement the MCAPLLanguageAgent interface, which is used by AJPF to
perform all the steps necessary for the verification of a system:
-- Perform a reasoning step (MCAPLreason()).
-- Decide to put the agent to sleep (MCAPLwantstosleep()) or wake it up
(MCAPLwakeup()).
-- Check if a property holds (MCAPLbelieves(fml), MCAPLhasGoal(fml), etc.).
AJPF provides a listener, which is used to verify the properties specified in
PSL. This can be done by first building a Buchi automaton that represents the
property, and then compute the global behavior of the system by executing it.
The product of these, the product automaton, can then be used to check if the
property is violated. A property is violated if there exists a path to an accepting
state [8]. The implementation of the model checker in AJPF employs techniques
that allows progressively building the product automaton [14], making the veri-
fication process more efficient.
4 Verification of Organizations in Multi-Agent Systems
In the previous section, we described the AJPF framework, which can be used
for verification of MASs. We now turn to verification of organizational MASs.
4 An end state is defined as a state where every agent is sleeping and the environment
is not changing, thus nothing new can happen after such state has been reached.
8
In [12], several desirable properties of organizational MASs were define: what
makes an organization well-defined, good, effective, etc. These properties re-
quire not only a way to express the beliefs of the agents in the system, but also
the state of the organization. For example, a good organization "is an organi-
zation such that if the organization has the capability to achieve φ and there is
a group of roles in the organization responsible for realizing it, then the roles
being in charge have a chain of delegation to roles that are played by agents in
Ai that are actually capable of achieving it" [12]. Being able to verify that a sys-
tem satisfies these properties would be a large step towards convincing oneself
that the system actually works. Verification of organizational aspects has been
investigated before [1,9,17,21], but usually only by considering the internals of
each agent as a black box. Model checking of electronic institutions specified in
the ISLANDER framework was explored in [17]. By translating an ISLANDER
specification into MABLE, a language for automatic verification of MASs, the
system can be verified using the SPIN model checker.
The work most similar to ours is described in [9], where a programming
language for normative MASs is implemented in AIL. Agents in the system can
interact with an organization, and the system can then verify various properties
of both the agents and the organization. Our integration with AIL differs in
that we only verify properties of the agents, but these properties may include
organizational properties, as defined in the AORTA component. Since AORTA
is not tightly coupled to a specific APL, the integration with AIL allows us to
perform verification of existing agents with additional properties concerning an
organization.
In the remainder of this section, we show how AORTA can be integrated into
AIL, such that 1) interpreters implemented in AIL can make use of AORTA, and
2) verification of these systems is possible using AJPF5.
4.1 Specifying organizational properties
In order to verify properties about organizational beliefs and options, we need
to be able to express the properties in PSL. We therefore extend the PSL syntax
to incorporate such properties:
ψ ::= φ Org(ag , f ) Opt(ag , f )
The interpretation of Org(ag , f ) is given as:
MAS = Org(ag , f )
iff MS ag = org(f ),
where MAS is the multi-agent system (AIL+AORTA) and MSag is agent ag's
mental state as defined in section 2. Similarly, the interpretation of Opt(ag , f )
is:
MAS = Opt(ag , f )
iff MS ag = opt(f ).
5 AORTA and the integration with AIL is open source and is available at
http://www2.compute.dtu.dk/~ascje/AORTA/
9
In AJPF, we have implemented the extended PSL by adding functions check-
ing whether an agent has organizational beliefs or options to the MCAPLLanguage-
Agent interface, which defines the methods needed by AJPF to perform model
checking.
4.2 Verifying AORTA
Verification of the agents with an AORTA component requires (1) an integration
of the AORTA architecture within existing AIL agents, and (2) the ability to
verify properties about organizational beliefs and organizational options.
We have integrated the AORTA architecture in AIL, allowing existing in-
terpreters implemented in AIL to take advantage of the AORTA organizational
reasoning component. The AortaAILAgent extends the AILAgent class as fol-
lows:
MCAPLreason(int flag) Executes the AORTA reasoning cycle before calling
the AIL agent's own reasoning cycle.
MCAPLhasOrganizationalBelief(MCAPLFormula phi) Returns true if Σo con-
tains phi.
MCAPLhasOrganizationalOption(MCAPLFormula phi) Returns true if Γo con-
tains phi.
wantstosleep() Returns true if both AORTA and the AIL agent wants to sleep.
AORTA wants to sleep if the last execution did not change anything.
addBel(...)/addGoal(...)/delBel(...)/removeGoal(...) Responsible for
synchronization of knowledge bases.
newMessages(Set<Message> msgs) Checks if any of the incoming messages are
organizational messages and if so, lets AORTA handle them. Otherwise, they
are forwarded to the AIL agent.
We have furthermore implemented an AILBridge, which is responsible for
updating the AIL agent, when AORTA performs actions that change the belief
base or goal base.
5 Evaluation of AIL+AORTA
In this section, we evaluate our integration of AORTA in AIL. As we shall see,
the example is small enough to generate the entire state space within reasonble
time (takes approximately 10 minutes), so we evaluate the system in two ways:
1. We generate the product automata on the fly by executing the agent system,
while verifying each of the properties.
2. We first generate the entire state space for the system, and use it to verify
each of the properties.
The first method is practical for large (possible infinite) systems, or properties
that can be verified quickly (e.g. that the agents eventually enacts a role, since
this is the first thing happening in our system). The second method is practical
10
Listing 1. Gwendolen-program for writing a paper.
GWENDOLEN
:name: alice
: I n i t i a l B e l i e f s :
: B e l i e f R u l e s :
: I n i t i a l G o a l s :
editor [ achieve ]
: P l a n s :
+! editor [ achieve ] : { True } <- + editor ;
+! wtitle [ achieve ] : { True } <- + wtitle ;
+! wabs [ achieve ] : { True } <- + wabs ;
+! w s e c t i t l e [ achieve ] : { True } <- + w s e c t i t l e;
+! fdv [ achieve ] : { True } <- + fdv ;
+! wcon [ achieve ] : { True } <- + wcon ;
+! sv [ achieve ] : { True } <- + sv ;
:name: bob
: I n i t i a l B e l i e f s :
: B e l i e f R u l e s :
: I n i t i a l G o a l s :
writer [ achieve ]
: P l a n s :
+! writer [ achieve ] : { True } <- + writer ;
+! wsec [ achieve ] : { True } <- + wsec ;
+! wref [ achieve ] : { True } <- + wref ;
for verifying many properties in a single, finite system, since the time used for
verification of each property is significantly lower than the time spend generating
the state space.
5.1 Example: Writing a paper
To illustrate the capabilities of the model checker for AIL+AORTA, we use a
simple example of a group of agents aiming to write a scientific paper using
an organizational specification to help them collaborate (inspired by [15]). In
the example, an editor should create a first draft version (fdv ), consisting of
a title (wtitle) and an abstract (wabs) and the section titles (wsectitle). The
submission version (sv ) is then created by letting a number of writers write the
sections (wsec) and the references (wref ), while the editor writes the conclusion
(wconc). The writers depend on the editor for the completion of fdv, while the
editor depends on the writers for the completion of wsec and wref.
We consider two agents: Alice, capable of editing the paper and Bob, capable
of being a writer. We have implemented the agents in Gwendolen. The imple-
mentation of the agents is shown in listing 1. Since the focus is not on verification
of agents writing a paper, but rather on the organizational coordination mech-
anisms of AORTA, the implementation of each objective is very simple. Note
that the initial goals of each agent are artificial goals, which are used to generate
a role enactment option, since AORTA currently only supports generating role
enactment options based on the agent's goals.
The agents are enriched with an AORTA component that enables them to
enact roles, commit to objectives and coordinate. The AORTA-program for the
agents is shown in listing 2. The agents are able to delegate goals (the send(R,
11
Listing 2. AORTA-program for writing a paper.
role ( R ) : true = > enact ( R ).
obj ( bel ( O )) : bel ( me ( Me )) , org ( obl ( Me ,_ , bel ( O ) , _ )) = > commit ( O ).
send (_ , tell , org ( rea ( Me , R )))
bel ( me ( Me ) , agent ( Ag ) , Ag \= Me ) , ∼( bel ( sent ( Ag , org ( rea ( Me , R )))))
:
= > send ( Ag , org ( rea ( Me , R ))).
send (R , achieve , O )
org ( rea ( Ag , R )) , bel ( me ( Me ) , Ag \= Me ) , ∼( bel ( sent ( Ag , goal ( O ))))
:
= > send ( Ag , goal ( O )).
send (R , tell , O )
org ( rea ( Ag , R )) , bel ( me ( Me ) , Ag \= Me ) , ∼( bel ( sent ( Ag , bel ( O ))))
:
= > send ( Ag , bel ( O )).
achieve, O) option) and inform about completion of goals (the send(R, tell,
O) option). They commit to objectives that they are obliged to complete, and
for simplicity simply enact a role, if it is considered an option.
5.2 Main results
Our system was evaluated6 using the properties listed in table 1. Our results
are divided into two sets: 1) the on the fly verification, for which we specify the
number of states explored and the time used, and 2) the complete state space
verification, in which we only state the time used, since in that case, the number
of states is constant (the example contains 251 states).
Properties 1 and 2 check that the agents eventually enacts their roles. Prop-
erty 3 tries to verify that Alice eventually enacts the writer role, but fails, since
that is not the case. Properties 4 and 5 check that the agents furthermore eventu-
ally knows about the other agent's enactment. Property 7 verifies that whenever
Alice is obliged to achieve wabs, she will eventually believe that she has achieved
it. Property 9 verifies that when Alice believes she has completed fdv, she will
eventually inform Bob, because of the dependency relation between their roles.
Finally, property 11 verifies that the paper is eventually written. Note that the
time difference between properties 1 and 2 are due to the way the AJPF sched-
uler executes the agents: Bob is only executed once AJPF has detected that
Alice has nothing more to do.
Since the time complexity of LTL model checking is exponential in the length
of the formula [2], we furthermore verified larger formulas to get an assessment
of the model checker's capabilities. Property 6 verifies that the agents know
their own role and the role of the other agent. Property 8 verifies that for every
obligation it is the case that it is eventually satisfied. Property 10 verifies that
all dependency relations are used for generating options, and finally, 12 verifies
all of the properties above.
As expected, once the state space has been fully generated, verification of
each property is quite fast. We also see that verification of larger formulas takes
much more time (e.g. property 8 compared to property 7), which is expected,
6 We evaluated the system using Java 7 on a laptop with a dual core 2.80 GHz Intel
i7 CPU and 8 GB RAM running Windows 8.1.
12
Table 1. The properties that were verified by AJPF. The results are specified for 1)
the on the fly verification and 2) the complete state space verification.
Property
✸Org(alice, rea(alice, editor ))
✸Org(bob, rea(bob, writer ))
✸Org(alice, rea(alice, writer ))
✸Org(alice, rea(bob, writer ))
✸Org(bob, rea(alice, editor ))
(1) ∧ (2) ∧ (4) ∧ (5)
✷(Org(alice, obl(alice, editor , wabs, fdv ))
→ ✸B(alice, wabs))
✷(V Org(ag, obl(ag , role, obj , deadline))
→ ✸B(ag , obj ))
✷(Org(alice, dep(writer , editor , fdv )) ∧ B(alice, fdv )
→ ✸B(alice, sent (bob, bel(fdv ))))
✷ V Org(ag, dep(role1 , role2 , obj )) ∧ B(ag, obj )
→ ✸B(ag , sent (ag rea(role1 ), bel(obj )))
✸B(alice, sv )
(6) ∧ (8) ∧ (10) ∧ (11)
1
2
3
4
5
6
7
8
9
10
11
12
States1
6
6
11
21
27
31
Time1
0:14
0:26
0:40
1:38
1:48
2:24
Time2
<10ms
<10ms
<10ms
15ms
15ms
85ms
251
251
251
251
167
251
8:46
110ms
10:33
2740ms
8:51
9:15
8:34
13:10
25ms
95ms
<10ms
15812ms
since the formulas are LTL formulas. Obviously, generating the entire model
beforehand is only necessary, when we want to validate several properties, since
in several of the cases, the entire state space does not need to be explored.
Our experiments have further shown that one execution of an AORTA cycle
is on average 10 times slower when executed using JPF compared to executing
the system on the host JVM (i.e. without running the verification process).
Even though some decrease in performance is expected, it should be possible
to improve this by implementing the operational semantics of AORTA using
AIL. In that case, we have to convince ourselves that the semantics are correctly
implemented in AIL (i.e., the functionality should correspond to the functionality
of the existing implementation). Still, the advantage of verifying the existing
implementation is that the results are directly applicable (i.e., we know that the
agents will inform each other about their roles, that they will conform with their
obligations, etc.).
In section 4, we mentioned that an organization could be considered good if
the roles are related in such a way that the objectives of the organization will
be delegated to the agents that can actually achieve them. We cannot directly
specify general properties like this in PSL, so instead, they must be specified
using the specific properties relevant to the given system. In our case, we can
specify this using the dependency relations (property 10) and the fact that the
paper is eventually written (property 11). Using the organizational model and
the agent programs it should be possible to generate such specifications, but
that is out of scope for this paper.
6 Conclusion
As agent systems gain popularity and become increasingly complex, the possi-
bility to understand every part of a system becomes difficult. By model checking
13
agent systems, it will be possible to verify that the agents of the system be-
have as expected and that the outcome is satisfactory. We have discussed some
of the work done concerning model checking of agent programming languages,
focusing especially on the generic Agent Java PathFinder, which enables model
checking of potentially any kind of agent programming language. Furthermore,
by allowing the implementation of an APL interpreter within AJPF (using the
Agent Infrastructure Layer), it is possible to optimize the model checking pro-
cess, making it feasible for larger systems.
In increasingly complex systems, there is often a need for regulation, since
agents may come from different sources and cannot as such be forced to perform
actions required to achieve the system objectives. This further creates a need
for model checking, since the complexity again increases. In this paper, we have
shown that our framework for organizational reasoning, AORTA, can be model
checked using an extended version of AJPF. We have integrated AORTA in
AIL and have verified properties about a system implemented in an APL using
AORTA for organizational reasoning. We have verified that the agents of the
system enacts roles, coordinate role enactment and that they can successfully
delegate tasks using an organizational model describing roles and their relations.
The AORTA framework is not tightly integrated with AIL, but is rather used
as a library, which means that many of the optimization techniques of AJPF
cannot be used. Furthermore, a single step of the AORTA reasoning cycle is
considered atomic in the current implementation, making it impossible to ver-
ify properties about the internals of AORTA. Even though the system, in its
current state, makes it possible to verify interesting properties about a system,
it would be interesting to address these shortcomings in the future. However,
as we have mentioned, even though the advantages of implementing the opera-
tional semantics of AORTA in AIL rather than using it as a library are desirable,
they should be weighed against the drawback of not verifying the actual system,
but a (hopefully) equivalent one (in terms of operational semantics). We believe
that both approaches have their merits, and an implementation of the oper-
ational semantics in AIL will be also a useful contribution to model checking
of organization-aware agents. An obvious direction for future work is thus to
implement the operational semantics in AIL.
Finally, even though the example used in this paper shows that it is possible
to verify properties about organization-aware agents, it is rather small and it
would be interesting to verify larger, more complex systems containing more
than a handful of agents.
References
1. A¸stefanoaei, L., Dastani, M., Meyer, J.J., de Boer, F.S.: A verification framework
for normative multi-agent systems. In: Intelligent and Multi-Agent Systems. pp.
54 -- 65 (2008)
2. Baier, C., Katoen, J.P.: Principles of Model Checking (Representation and Mind
Series). The MIT Press (2008)
14
3. Boissier, O., van Riemsdijk, M.B.: Organisational Reasoning Agents. Agreement
Technologies pp. 309 -- 320 (2013)
4. Bordini, R.H., Dennis, L.A., Farwer, B., Fisher, M.: Automated Verification of
Multi-Agent Programs. In: 2008 23rd IEEE/ACM International Conference on
Automated Software Engineering. pp. 69 -- 78. IEEE (2008)
5. Bordini, R.H., Fisher, M., Visser, W., Wooldridge, M.: Verifiable multi-agent pro-
grams. Programming Multi-Agent Systems LNCS(LNAI 3067), 72 -- 89 (2004)
6. Bordini, R.H., Fisher, M., Visser, W., Wooldridge, M.: Verifying Multi-agent Pro-
grams by Model Checking. Autonomous Agents and Multi-Agent Systems 12(2),
239 -- 256 (2006)
7. Bordini, R.H., Fisher, M., Wooldridge, M., Visser, W.: Model checking rational
agents. IEEE Intelligent Systems (2004)
8. Courcoubetis, C., Vardi, M., Wolper, P., Yannakakis, M.: Memory-efficient algo-
rithms for the verification of temporal properties. In: Formal Methods in System
Design. pp. 275 -- 288 (1992)
9. Dennis, L., Tinnemeier, N., Meyer, J.J.: Model checking normative agent organi-
sations. In: Computational Logic in Multi-Agent Systems (2009)
10. Dennis, L.A., Farwer, B.: Gwendolen: A BDI Language for Verifiable Agents. In:
Lowe, B. (ed.) Logic and the Simulation of Interaction and Reasoning. AISB,
Aberdeen (2008), AISB'08 Workshop
11. Dennis, L.A., Fisher, M., Webster, M.P., Bordini, R.H.: Model Checking Agent
Programming Languages. Automated Software Engineering 19(1), 5 -- 63 (2011)
12. Dignum, V., Dignum, F.: A logic of agent organizations. Logic Journal of IGPL
pp. 283 -- 316 (2011)
13. Doan, T.T., Yao, Y., Alechina, N., Logan, B.: Verifying heterogeneous multi-agent
programs. In: Autonomous Agents and Multi-Agent Systems. pp. 149 -- 156 (2014)
14. Gerth, R., Peled, D., Vardi, M.Y., Wolper, P.: Simple on-the-fly automatic verifi-
cation of linear temporal logic. In: Protocol Specification, Testing and Verification.
pp. 3 -- 18. Chapman & Hall, Ltd. (1996)
15. Hubner, J.F., Boissier, O., Kitio, R., Ricci, A.: Instrumenting multi-agent organ-
isations with organisational artifacts and agents. Autonomous Agents and Multi-
Agent Systems 20(3), 369 -- 400 (2010)
16. Hubner, J.F., Sichman, J.S., Boissier, O.: A model for the structural, functional,
and deontic specification of organizations in multiagent systems. In: SBIA '02
Proceedings. pp. 118 -- 128 (2002)
17. Huget, M.P., Esteva, M., Phelps, S., Sierra, C., Wooldridge, M.: Model checking
electronic institutions. In: MoChArt 2002. pp. 51 -- 58 (2002)
18. Jensen, A.S., Dignum, V.: AORTA: Adding Organizational Reasoning to Agents.
In: Proc. AAMAS '14. pp. 1493 -- 1494 (2014)
19. Jensen, A.S., Dignum, V., Villadsen, J.: The AORTA architecture: Integrating
organizational reasoning in Jason. In: 2nd International Workshop on Engineering
Multi-Agent Systems (EMAS 2014). pp. 112 -- 128 (2014)
20. Rao, A.S.: AgentSpeak (L): BDI agents speak out in a logical computable language.
Agents Breaking Away (L) (1996)
21. Vigan`o, F.: A framework for model checking institutions. In: Model Checking and
Artificial Intelligence. pp. 129 -- 145 (2007)
22. Visser, W., Havelund, K., Brat, G., Park, S., Lerda, F.: Model checking programs.
Automated Software Engineering 10, 203 -- 232 (2003)
15
|
1712.08507 | 1 | 1712 | 2017-12-20T19:02:33 | Limits for Rumor Spreading in stochastic populations | [
"cs.MA",
"cs.OH"
] | Biological systems can share and collectively process information to yield emergent effects, despite inherent noise in communication. While man-made systems often employ intricate structural solutions to overcome noise, the structure of many biological systems is more amorphous. It is not well understood how communication noise may affect the computational repertoire of such groups. To approach this question we consider the basic collective task of rumor spreading, in which information from few knowledgeable sources must reliably flow into the rest of the population.
In order to study the effect of communication noise on the ability of groups that lack stable structures to efficiently solve this task, we consider a noisy version of the uniform PULL model. We prove a lower bound which implies that, in the presence of even moderate levels of noise that affect all facets of the communication, no scheme can significantly outperform the trivial one in which agents have to wait until directly interacting with the sources. Our results thus show an exponential separation between the uniform PUSH and PULL communication models in the presence of noise. Such separation may be interpreted as suggesting that, in order to achieve efficient rumor spreading, a system must exhibit either some degree of structural stability or, alternatively, some facet of the communication which is immune to noise.
We corroborate our theoretical findings with a new analysis of experimental data regarding recruitment in Cataglyphis niger desert ants. | cs.MA | cs | Limits for Rumor Spreading in stochastic populations∗
Lucas Boczkowskia, Ofer Feinermanc, Amos Kormana, and Emanuele Nataleb
aCNRS, IRIF, Universit Paris Diderot, 75013 Paris, France, [email protected]
bMax-Planck-Institut fr Informatik, 66123 Saarbrcken, Germany, [email protected]
cWeizmann Institute of Science, 76100 Rehovot, Israel, [email protected]
Abstract
Biological systems can share and collectively process information to yield emer-
gent effects, despite inherent noise in communication. While man-made systems often
employ intricate structural solutions to overcome noise, the structure of many biolog-
ical systems is more amorphous. It is not well understood how communication noise
may affect the computational repertoire of such groups. To approach this question we
consider the basic collective task of rumor spreading, in which information from few
knowledgeable sources must reliably flow into the rest of the population.
In order to study the effect of communication noise on the ability of groups that
lack stable structures to efficiently solve this task, we consider a noisy version of the
uniform PULL model. We prove a lower bound which implies that, in the presence of
even moderate levels of noise that affect all facets of the communication, no scheme
can significantly outperform the trivial one in which agents have to wait until directly
interacting with the sources. Our results thus show an exponential separation be-
tween the uniform PUSH and PULL communication models in the presence of noise.
Such separation may be interpreted as suggesting that, in order to achieve efficient
rumor spreading, a system must exhibit either some degree of structural stability or,
alternatively, some facet of the communication which is immune to noise.
We corroborate our theoretical findings with a new analysis of experimental data
regarding recruitment in Cataglyphis niger desert ants.
7
1
0
2
c
e
D
0
2
]
A
M
.
s
c
[
1
v
7
0
5
8
0
.
2
1
7
1
:
v
i
X
r
a
∗This work has received funding from the European Research Council (ERC) under the European Union's
Horizon 2020 research and innovation programme (grant agreement No 648032).
1
1
Introduction
1.1 Background and motivation
Systems composed of tiny mobile components must function under conditions of unrelia-
bility. In particular, any sharing of information is inevitability subject to communication
noise. The effects of communication noise in distributed living systems appears to be
highly variable. While some systems disseminate information efficiently and reliably
despite communication noise [2, 22, 11, 31, 37], others generally refrain from acquiring
social information, consequently losing all its potential benefits [25, 35, 38]. It is not
well understood which characteristics of a distributed system are crucial in facilitating
noise reduction strategies and, conversely, in which systems such strategies are bound
to fail. Progress in this direction may be valuable towards better understanding the
constraints that govern the evolution of cooperative biological systems.
Computation under noise has been extensively studied in the computer science com-
munity. These studies suggest that different forms of error correction (e.g., redundancy)
are highly useful in maintaining reliability despite noise [3, 1, 40, 39]. All these, however,
require the ability to transfer significant amount of information over stable communica-
tion channels. Similar redundancy methods may seem biologically plausible in systems
that enjoy stable structures, such as brain tissues.
The impact of noise in stochastic systems with ephemeral connectivity patterns is
far less understood. To study these, we focus on rumor spreading - a fundamental
information dissemination task that is a prerequisite to almost any distributed system
[10, 12, 16, 28]. A successful and efficient rumor spreading process is one in which a
large group manages to quickly learn information initially held by one or a few informed
individuals. Fast information flow to the whole group dictates that messages be relayed
between individuals. Similar to the game of Chinese Whispers, this may potentially
result in runaway buildup of noise and loss of any initial information [9]. It currently
remains unclear what are the precise conditions that enable fast rumor spreading. On
the one hand, recent works indicate that in some models of random noisy interactions,
a collective coordinated process can in fact achieve fast information spreading [20, 23].
These models, however, are based on push operations that inherently include a certain
reliable component (see more details in Section 1.3.2). On the other hand, other works
consider computation through noisy operations, and show that several distributed tasks
require significant running time [26]. The tasks considered in these works (including the
problem of learning the input bits of all processors, or computing the parity of all the
inputs) were motivated by computer applications, and may be less relevant for biological
contexts. Moreover, they appear to be more demanding than basic tasks, such as rumor
spreading, and hence it is unclear how to relate bounds on the former problems to the
latter ones.
In this paper we take a general stance to identify limitations under which reliable
and fast rumor spreading cannot be achieved. Modeling a well-mixed population, we
consider a passive communication scheme in which information flow occurs as one agent
1
observes the cues displayed by another. If these interactions are perfectly reliable, the
population could achieve extremely fast rumor spreading [28]. In contrast, here we focus
on the situation in which messages are noisy. Informally, our main theoretical result
states that when all components of communication are noisy then fast rumor spreading
through large populations is not feasible. In other words, our results imply that fast
rumor spreading can only be achieved if either 1) the system exhibits some degree of
structural stability or 2) some facet of the pairwise communication is immune to noise.
In fact, our lower bounds hold even when individuals are granted unlimited computa-
tional power and even when the system can take advantage of complete synchronization.
Finally, we corroborate our theoretical findings with new analyses regarding the
efficiency of information dissemination during recruitment by desert ants. More specif-
ically, we analyze data from an experiment conducted at the Weizmann Institute of
Science, concerning recruitment in Cataglyphis niger desert ants [34]. These analyses
suggest that this biological system lacks reliability in all its communication components,
and its deficient performances qualitatively validate our predictions. We stress that this
part of the paper is highly uncommon. Indeed, using empirical biological data to vali-
date predictions from theoretical distributed computing is extremely rare. We believe,
however, that this interdisciplinary methodology may carry significant potential, and
hope that this paper could be useful for future works that will follow this framework.
1.2 The problem
In this section, we give an intuitive description of the problem. Formal definitions are
provided in Section 2.
Consider a population of n agents. Thought of as computing entities, assume that
each agent has a discrete internal state, and can execute randomized algorithms - by
internally flipping coins. In addition, each agent has an opinion, which we assume for
simplicity to be binary, i.e., either 0 or 1. A small number, s, of agents play the role of
sources. Source agents are aware of their role and share the same opinion, referred to
as the correct opinion. The goal of all agents is to have their opinion coincide with the
correct opinion.
To achieve this goal, each agent continuously displays one of several messages taken
from some finite alphabet Σ. Agents interact according to a random pattern, termed
as the parallel-PULL model: In each round t ∈ N+, each agent u observes the message
currently displayed by another agent v, chosen uniformly at random (u.a.r) from all
agents.
Importantly, communication is noisy, hence the message observed by u may
differ from that displayed by v. The noise is characterized by a noise parameter δ > 0.
Our model encapsulates a large family of noise distributions, making our bounds highly
general. Specifically, the noise distribution can take any form, as long as it satisfies the
following criterion.
2
Definition 1.1 (The δ-uniform noise criterion). Any time some agent u observes an
agent v holding some message m ∈ Σ, the probability that u actually receives a message
m(cid:48) is at least δ, for any m(cid:48) ∈ Σ. All noisy samples are independent.
When messages are noiseless, it is easy to see that the number of rounds that are
required to guarantee that all agents hold the correct opinion with high probability is
O(log n) [28]. In what follows, we aim to show that when the δ-uniform noise criterion
is satisfied, the number of rounds required until even one non-source agent can be
moderately certain about the value of the correct opinion is very large. Specifically,
thinking of δ and s as constants independent of the population size n, this time is at
least Ω(n).
To prove the lower bound, we will bestow the agents with capabilities that far surpass
those that are reasonable for biological entities. These include:
• Unique identities: Agents have unique identities in the range {1, 2, . . . n}. When
observing agent v, its identity is received without noise.
• Complete knowledge of the system: Agents have access to all parameters of the
system (including n, s, and δ) as well as to the full knowledge of the initial
configuration except, of course, the correct opinion and the identity of the sources.
In addition, agents have access to the results of random coin flips used internally
by all other agents.
• Full synchronization: Agents know when the execution starts, and can count
rounds.
We show that even given this extra computational power, fast convergence cannot be
achieved.
1.3 Our contributions
1.3.1 Theoretical results
In all the statements that follow we consider the parallel-PULL model satisfying the
δ-uniform noise criterion, where cs/n < δ ≤ 1/2 for some sufficiently large constant
c. Note that our criterion given in Definition 1.1 implies that δ ≤ 1/Σ. Hence,
the previous lower bound on δ implies a restriction on the alphabet size, specifically,
Σ ≤ n/(cs).
Theorem 1.2. Any rumor spreading protocol cannot converge in less than Ω(
rounds.
nδ
s2(1−2δ)2 )
Recall that a source is aware that it is a source, but if it wishes to identify itself as
such to agents that observe it, it must encode this information in a message, which is, in
3
turn, subject to noise. We also consider the case in which an agent can reliably identify
a source when it observes one (i.e.,, this information is not noisy). For this case, the
following bound, which is weaker than the previous one but still polynomial, applies (a
formal proof appears in Section B):
Corollary 1.3. Assume that sources are reliably detectable. There is no rumor spread-
ing protocol that converges in less than Ω((
s2(1−2δ)2 )1/3) rounds.
nδ
Our results suggest that, in contrast to systems that enjoy stable connectivity, struc-
tureless systems are highly sensitive to communication noise. More concretely, the two
crucial assumptions that make our lower bounds work are: 1) stochastic interactions,
and 2) δ-uniform noise (see the right column of Figure 1). When agents can stabilize
their interactions the first assumption is violated. In such cases, agents can overcome
noise by employing simple error-correction techniques, e.g., using redundant messag-
ing or waiting for acknowledgment before proceeding. As demonstrated in Figure 1
(left column), when the noise is not uniform, it might be possible to overcome it with
simple techniques based on using default neutral messages, and employing exceptional
distinguishable signals only when necessary.
Figure 1: Non-uniform noise vs. uniform noise. On the left, we consider an example
with non-uniform noise. Assume that the message vocabulary consists of 5 symbols, that is,
Σ = {m1, m2, m3, m4, m5}, where m1 = 0 and m5 = 1, represent the opinions. Assume that
noise can occur only between consecutive messages. For example, m2 can be observed as either
m2, m3 or m1, all with positive constant probability, but can never be viewed as m4 or m5.
In this scenario, the population can quickly converge on the correct opinion by executing the
following. The sources always display the correct opinion, i.e., either m1 or m5, and each other
agent displays m3 unless it has seen either m1 or m5 in which case it adopts the opinion it saw
and displays it. In other words, m3 serves as a default message for non-source agents, and m1
and m5 serve as attracting sinks. It is easy to see that the correct opinion will propagate quickly
through the system without disturbance, and within O(log n) number of rounds, where n is the
size of the population, all agents will hold it with high probability. In contrast, as depicted on
the right picture, if every message can be observed as any other message with some constant
positive probability (for clarity, some of the arrows have been omitted from the sketch), then
convergence cannot be achieved in less than Ω(n) rounds, as Theorem 1.2 dictates.
4
Non-uniformnoiseδ-uniformnoisem1m2m3m4m5m1m2m3m4m51.3.2 Exponential separation between PUSH and PULL
Our lower bounds on the parallel-PULL model (where agents observe other agents)
should be contrasted with known results in the parallel-PUSH model, which is the push
equivalent to parallel-PULL model, where in each round each agent may or may not
actively push a message to another agent chosen u.a.r. (see also Section 2.3). Although
never proved, and although their combination is known to achieve more power than each
of them separately [28], researchers often view the parallel-PULL and parallel-PUSH
models as very similar on complete communication topologies. Our lower bound result,
however, undermines this belief, proving that in the context of noisy communication,
there is an exponential separation between the two models. Indeed, when the noise level
is constant for instance, convergence (and in fact, a much stronger convergence than we
consider here) can be achieved in the parallel-PUSH using only logarithmic number of
rounds [20, 23], by a simple strategy composed of two stages. The first stage consists of
providing all agents with a guess about the source's opinion, in such a way that ensures
a non-negligible bias toward the correct guess. The second stage then boosts this bias
by progressively amplifying it. A crucial aspect in the first stage is that agents remain
silent until a certain point in time that they start sending messages continuously, which
happens after being contacted for the first time. This prevents agents from starting to
spread information before they have sufficiently reliable knowledge. It further allows to
control the dynamics of the information spread in a balanced manner. More specifically,
marking an edge corresponding to a message received for the first time by a node, the
set of marked edges forms a spanning tree of low depth, rooted at the source. The depth
of such tree can be interpreted as the deterioration of the message's reliability.
On the other hand, as shown here, in the parallel-PULL model, even with the
synchonization assumption, rumor spreading cannot be achieved in less than a linear
number of rounds. Perhaps the main reason why these two models are often considered
similar is that with an extra bit in the message, a PUSH protocol can be approximated
in the PULL model, by letting this bit indicate whether the agent in the PUSH model
was aiming to push its message. However, for such a strategy to work, this extra bit
has to be reliable. Yet, in the noisy PULL model, no bit is safe from noise, and hence,
as we show, such an approximation cannot work. In this sense, the extra power that
the noisy PUSH model gains over the noisy PULL model, is that the very fact that
one node attempts to communicate with another is reliable. This, seemingly minor,
difference carries significant consequences.
1.3.3 Generalizations
Several of the assumptions discussed earlier for the parallel-PULL model were made for
the sake of simplicity of presentation. In fact, our results can be shown to hold under
more general conditions, that include: 1) different rate for sampling a source, and 2) a
more relaxed noise criterion. In addition, our theorems were stated with respect to the
5
parallel-PULL model. In this model, at every round, each agent samples a single agent
u.a.r. In fact, for any integer k, our analysis can be applied to the model in which, at
every round, each agent observes k agents chosen u.a.r. In this case, the lower bound
would simply reduce by a factor of k. Our analysis can also apply to a sequential variant,
in which in each time step, two agents u and v are chosen u.a.r from the population and
u observes v. In this case, our lower bounds would multiply by a factor of n, yielding,
for example, a lower bound of Ω(n2) in the case where δ and s are constants1.
1.3.4 Recruitment in desert ants
Our theoretical results assert that efficient rumor spreading in large groups could not be
achieved without some degree of communication reliability. An example of a biological
system whose communication reliability appears to be deficient in all of its components
is recruitment in Cataglyphis niger desert ants. In this species, when a forager locates an
oversized food item, she returns to the nest to recruit other ants to help in its retrieval
[4, 34].
We complement our theoretical findings by providing new analyses from an exper-
In such
iment on this system conducted at the Weizmann Institute of Science [34].
experimental setting, we interpret our theoretical findings as an abstraction of the in-
teraction modes between ants. While such high-level approximation may be considered
very crude, we retain that it constitutes a good trade-off between analytical tractability
and experimental data.
In our experimental setup recruitment happens in the small area of the nest's en-
trance chamber (Figure 2a). We find that within this confined area, the interactions
between ants are nearly uniform [32], such that an ant cannot control which of her nest
mates she meets next (see Figure 2b). This random meeting pattern coincides with the
first main assumption of our model. Additionally, it has been shown that recruitment
in Cataglyphis niger ants relies on rudimentary alerting interactions [18, 27] which are
subject to high levels of noise [34]. Furthermore, the responses to a recruiting ant and
to an ant that is randomly moving in the nest are extremely similar [34]. Although this
may resemble a noisy push interaction scheme, ants cannot reliably distinguish an ant
that attempts to transmit information from any other non-communicating individual.
In our theoretical framework, the latter fact means that the structure of communication
is captured by a noisy-pull scheme (see more details about PUSH vs. PULL in Section
1.3.2).
It has previously been shown that the information an ant passes in an interaction
can be attributed solely to her speed before the interaction [34]. Binning ant speeds
into four arbitrary discrete messages and measuring the responses of stationary ants
to these messages, we can estimate the probabilities of one message to be mistakenly
1This increase in not surprising as each round in the parallel-PULL model consists of n observations,
while the sequential model consists of only one observation in each time step.
6
Figure 2: Unreliable communication and slow recruitment by desert ant
(Cataglyphis niger ). a. The experimental setup. The recruiter ant (circled) returns to
the nest's entrance chamber (dark, 9cm diameter, disc) after finding the immobilized food item
(arrow). Group size is ten. b. A pdf of the number of interactions that an ant experiences
before meeting the same ant twice. The pdf
is compared to uniform randomized interaction
pattern. Data summarizes N = 671 interactions from seven experiments with a group size of
6 ants. c. Interactions with moving ants where classified into four different messages ('a' to
'd') depending on the ants' speed. The noise at which messages were confused with each other
was estimated according to the response recipient, initially stationary, ants (see Materials and
Methods). Gray scale indicates the estimated overlap between every two messages δ(i, j). Note
that δ = min(δ(i, j)) ≈ 0.2. Data collected over N = 64 interactions. d. The mean time it takes
an ant that is informed about the food to recruit two nest-mates to exit the nest is presented
for two group size ranges.
perceived as another one (see Materials and Methods). Indeed, we find that this com-
munication is extremely noisy and complies with the uniform-noise assumption with a
δ of approximately 0.2 (Figure 2c).
Given the coincidence between the communication patterns in this ant system and
the requirements of our lower bound we expect long delays before any uninformed
ant can be relatively certain that a recruitment process is occurring. We therefore
measured the time it takes an ant, that has been at the food source, to recruit the
help of two nest-mates. We find that this time increases with group size (p < 0.05
Kolmogorov-Smirnov test over N = 24 experiments, Figure 2d). Thus, in this system,
inherently noisy interactions on the microscopic level have direct implications on group
7
level performance. While group sizes in these experiments are small, we nevertheless
find these recruitment times in accordance with our asymptotic theoretical results. More
details on the experimental methodology can be found in Appendix A.
1.4 Related work
Lower bound approaches in biological contexts are still extremely rare [8, 21]. Our ap-
proach can be framed within the general endeavour of addressing problems in theoretical
biology through the algorithmic perspective of theoretical computer science [14, 13].
The computational study of abstract systems composed of simple individuals that
interact using highly restricted and stochastic interactions has recently been gaining con-
siderable attention in the community of theoretical computer science. Popular models
include population protocols [7], which typically consider constant size individuals that
interact in pairs (using constant size messages) in random communication patterns, and
the beeping model [41], which assumes a fixed network with extremely restricted com-
munication. Our model also falls in this framework as we consider the PULL model
[16, 28, 29] with constant size messages. So far, despite interesting works that consider
different fault-tolerant contexts [5, 6], most of the progress in this framework considered
noiseless scenarios.
In Rumor Spreading problems (also referred to as Broadcast) a piece of information
typically held by a single designated agent is to be disseminated to the rest of the
population. It is the subject of a vast literature in theoretical computer science, and
more specifically in the distributed computing community, see, e.g., [10, 12, 16, 17,
20, 26, 28, 33]. While some works assume a fixed topology, the canonical setting does
not assume a network. Instead agents communicate through uniform PUSH/PULL
based interactions (including the phone call model), in which agents interact in pairs
with other agents independently chosen at each time step uniformly at random from all
agents in the population. The success of such protocols is largely due to their inherent
simplicity and fault-tolerant resilience [19, 28]. In particular, it has been shown that
under the PUSH model, there exist efficient rumor spreading protocol that uses a single
bit per message and can overcome flips in messages (noise) [20].
The line of research initiated by El-Gamal [15], also studies a broadcast problem
with noisy interactions. The regime however is rather different from ours: all n agents
hold a bit they wish to transmit to a single receiver. This line of research culminated
in the Ω(n log log n) lower bound on the number of messages shown in [26], matching
the upper bound shown many years sooner in [24].
2 Formal description of the models
We consider a population of n agents that interact stochastically and aim to converge
on a particular opinion held by few knowledgable individuals. For simplicity, we assume
8
that the set of opinions contain two opinions only, namely, 0 and 1.
As detailed in this section, we shall assume that agents have access to significant
amount of resources, often exceeding reasonable more realistic assumptions. Since we
are concerned with lower bounds, we do not loose generality from such permissive
assumptions. These liberal assumptions will actually simplify our proofs. One of these
assumptions is the assumption that each agent is equipped with a unique identity id(v)
in the range {1, 2, . . . , n} (see more details in Section 2.4).
2.1 Initial configuration
The initial configuration is described in several layers. First, the neutral initial con-
figuration corresponds to the initial states of the agents, before the sources and the
desired opinion to converge to are set. Then, a random initialization is applied to the
given neutral initial configuration, which determines the set of sources and the opinion
that agents need to converge to. This will result in what we call the charged initial
configuration. It can represent, for example, an external event that was identified by
few agents which now need to deliver their knowledge to the rest of the population.
Neutral Initial Configuration x(0). Each agent v starts the execution with an
input that contains, in addition to its identity, an initial state taken from some discrete
set of states, and2 a binary opinion variable λv ∈ {0, 1}. The neutral initial configuration
for i ∈ [n], is the input of the agent with identity
x(0) is the vector whose i'th index, x(0)
i.
i
Charged Initial Configuration and Correct Opinion. The charged initial con-
figuration is determined in three stages. The first corresponds to the random selection
of sources, the second to the selection of the correct opinion, and the third to a possible
update of states of sources, as a result of being selected as sources with a particular
opinion.
• 1st stage - Random selection of sources. Given an integer s ≤ n, a set S of
size s is chosen uniformly at random (u.a.r) among the agents. The agents in S
are called sources. Note that any agent has equal probability of being a source.
We assume that each source knows it is a source, and conversely, each non-source
knows it is not a source.
• 2nd stage - Random selection of correct opinion. In the main model we
consider, after sources have been determined in the first stage, the sources are
randomly initialized with an opinion, called the correct opinion. That is, a fair
coin is flipped to determine an opinion in {0, 1} and all sources are assigned with
this opinion.
• 3rd stage - Update of initial states of sources. To capture a change in
behavior as a result of being selected as a source with a particular opinion, we
2The opinion of an agent could have been considered as part of the state of the agent. We separate
these two notions merely for the presentation purposes.
9
assume that once the opinion of a source u has been determined, the initial state
of u may change according to some distribution fsource−state that depends on (1)
its identity, (2) its opinion, and (3) the neutral configuration. Each source samples
its new state independently.
2.2 Alphabet and noisy messages
Agents communicate by observing each other according to some random pattern (for
details see Section 2.3). To improve communication agents may choose which content,
called message, they wish to reveal to other agents that observe them. Importantly,
however, such messages are subject to noise. More specifically, at any given time, each
agent v (including sources) displays a message m ∈ Σ, where Σ is some finite alphabet.
The alphabet Σ agents use to communicate may be richer than the actual information
content they seek to disseminate, namely, their opinions. This, for instance, gives them
the possibility to express several levels of certainty [30]. We can safely assume that the
size of Σ is at least two, and that Σ includes both symbols 0 and 1. We are mostly
concerned with the case where Σ is of constant size (i.e., independent of the number of
agents), but note that our results hold for any size of the alphabet Σ, as long as the
noise criterion is satisfied (see below).
δ-uniform noise. When an agent u observes some agent v, it receives a sample
of the message currently held by v. More precisely, for any m, m(cid:48) ∈ Σ, let Pm,m(cid:48) be
the probability that, any time some agent u observes an agent v holding some message
m ∈ Σ, u actually receives message m(cid:48). The probabilities Pm,m(cid:48) define the entries of the
noise-matrix P [23], which does not depend on time. We hereby also emphasize that
the agents' samples are independent.
The noise in the sample is characterized by a noise parameter 0 < δ ≤ 1/2. One of
the important aspects in our theorems is that they are general enough to hold assuming
any distribution governing the noise, as long as it satisfies the following noise criterion.
Definition 2.1 (The noise ellipticity parameter δ). We say that the noise has ellipticity
δ if Pm,m(cid:48) ≥ δ for any m, m(cid:48) ∈ Σ.
Observe that the aforementioned criterion implies that δ ≤ 1/Σ, and that the case
δ = 1/Σ corresponds to messages being completely random, and the rumor spreading
problem is thus unsolvable. We next define a weaker criterion, that is particularly
meaningful in cases in which sources are more restricted in their message repertoire than
general agents. This may be the case, for example, if sources always choose to display
their opinion as their message (possibly together with some extra symbol indicating
that they are sources). Formally, we define Σ(cid:48) ⊆ Σ as the set of possible messages that
a source can hold together with the set of messages that can be observed when viewing
a source (i.e., after noise is applied). Our theorems actually apply to the following
10
criterion, that requires that only messages in Σ(cid:48) are attained due to noise with some
sufficient probability.
Definition 2.2 (The relaxed noise ellipticity parameter δ). We say that the noise has
Σ(cid:48)-relaxed ellipticity δ if Pm,m(cid:48) ≥ δ for any m ∈ Σ and m(cid:48) ∈ Σ(cid:48).
2.3 Random interaction patterns
We consider several basic interaction patterns. Our main model is the parallel-PULL
model. In this model, time is divided into rounds, where at each round i ∈ N+, each
agent u independently selects an agent v (possibly u = v) u.a.r from the population and
then u observes the message held by v. The parallel-PULL model should be contrasted
with the parallel-PUSH model, in which u can choose between sending a message to
the selected node v or doing nothing. We shall also consider the following variants of
PULL model.
• parallel-PULL(k). Generalizing parallel-PULL for an integer 1 ≤ k ≤ n, the
parallel-PULL(k) model allows agents to observe k other agents in each round.
That is, at each round i ∈ N+, each agent independently selects a set of k agents
(possibly including itself) u.a.r from the population and observes each of them.
In each time step t ∈ N+, two agents u and v are selected
uniformly at random (u.a.r) among the population, and agent u observes v.
It each time step t ∈ N+ one agent is chosen u.a.r.
• sequential-PULL.
• broadcast-PULL.
from
the population and all agents observe it, receiving the same noisy sample of its
message3.
Regarding the difference in time units between the models, since interactions occur in
parallel in the parallel-PULL model, one round in that model should informally be
thought of as roughly n time steps in the sequential-PULL or broadcast-PULL model.
2.4 Liberal assumptions
As mentioned, we shall assume that agents have abilities that surpass their realistic
ones. These assumption not only increases the generality of our lower bounds, but also
simplifies their proofs. Specifically, the following liberal assumptions are considered.
• Unique identities. Each agent is equipped with a unique identity id(v) ∈
{1, 2, . . . , n}, that is, for every two agents u and v, we have id(u) (cid:54)= id(v). More-
over, whenever an agent u observes some agent v, we assume that u can infer
3The broadcast-PULL model is mainly used for technical considerations. We use it in our proofs as
it simplifies our arguments while not harming their generality. Nevertheless, this broadcast model can
also capture some situations in which agents can be seen simultaneously by many other agents, where
the fact that all agents observe the same sample can be viewed as noise being originated by the observed
agent.
11
the identity of v. In other words, we provide agents with the ability to reliably
distinguish between different agents at no cost.
• Unlimited internal computational power. We allow agents to have unlimited
computational abilities including infinite memory capacity. Therefore, agents can
potentially perform arbitrarily complex computations based on their knowledge
(and their id).
• Complete knowledge of the system. Informally, we assume that agents have
access to the complete description of the system except for who are the sources
and what is their opinion. More formally, we assume that each agent has access
to:
– the neutral initial configuration x(0),
– all the systems parameters, including the number of agents n, the noise pa-
rameter δ, the number of sources s, and the distribution fsource−state govern-
ing the update the states of sources in the third stage of the charged initial
configuration.
• Full synchronization. We assume that all agents are equipped with clocks
that can count time steps (in sequential-PULL or broadcast-PULL) or rounds (in
parallel-PULL(k)). The clocks are synchronized, ticking at the same pace, and
initialized to 0 at the beginning of the execution. This means, in particular, that
if they wish, the agents can actually share a notion of time that is incremented at
each time step.
• Shared randomness. We assume that algorithms can be randomized. That
is, to determine the next action, agents can internally toss coins and base their
decision on the outcome of these coin tosses. Being liberal, we shall assume that
randomness is shared in the following sense. At the outset, an arbitrarily long
sequence r of random bits is generated and the very same sequence r is written in
each agent's memory before the protocol execution starts. Each agent can then
deterministically choose (depending on its state) which random bits in r to use as
the outcome of its own random bits. This implies that, for example, two agents
can possibly make use of the very same random bits or merely observe the outcome
of the random bits used by the other agents. Note that the above implies that,
conditioning on an agent u being a non-source agent, all the random bits used by
u during the execution are accessible to all other agents.
• Coordinated sources. Even though non-source agents do not know who the
sources are, we assume that sources do know who are the other sources. This
means, in particular, that the sources can coordinate their actions.
2.5 Considered algorithms and solution concept
Upon observation, each agent can alter its internal state (and in particular, its message
to be seen by others) as well as its opinion. The strategy in which agents update these
12
variables is called "algorithm". As mentioned, algorithms can be randomized, that is,
to determine the next action, agents can use the outcome of coin tosses in the sequence
r (see Shared randomness in Section 2.4). Overall, the action of an agent u at time t
depends on:
1. the initial state of u in the charged initial configuration (including the identity of
u and whether or not it is a source),
2. the initial knowledge of u (including the system's parameters and neutral config-
3. the time step t, and the list of its observations (history) up to time t− 1, denoted
uration),
x(<t)
u
,
4. the sequence of random bits r.
2.6 Convergence and time complexity
At any time, the opinion of an agent can be viewed as a binary guess function that is
used to express its most knowledgeable guess of the correct opinion. The agents aim to
minimize the probability that they fail to guess this opinion. In this context, it can be
shown that the optimal guessing function is deterministic.
Definition 2.3. We say that convergence has been achieved if one can specify a par-
ticular non-source agent v, for which is it guaranteed that its opinion is the correct
opinion with probability at least 2/3. The time complexity is the number of time steps
(respectively, rounds) required to achieve convergence.
We remark that the latter definition encompasses all three models considered.
Remark 2.4 (Different sampling rates of sources). We consider sources as agents in the
population but remark that they can also be thought of as representing the environment.
In this case, one may consider a different rate for sampling a source (environment)
vs. sampling a typical agent. For example, the probability to observe any given source
(or environment) may be x times more than the probability to observe any given non-
source agent. This scenario can also be captured by a slight adaptation of our analysis.
When x is an integer, we can alternatively obtain such a generalization by considering
additional artificial sources in the system. Specifically, we replace each source ui with
a set of sources Ui consisting of x sources that coordinate their actions and behave
identically, simulating the original behavior of ui. (Recall that we assume that sources
know who are the other sources and can coordinate their actions.) Since the number
of sources increases by a multiplicative factor of x, our lower bounds (see Theorem 3.1
and Corollary 1.3) decrease by a multiplicative factor of x2.
13
3 The lower bounds
Throughout this section we consider δ < 1/2, such that (1−2δ)
section is to prove the following result.
δsn ≤ 1
10 . Our goal in this
Theorem 3.1. Assume that the relaxed δ-uniform noise criterion is satisfied.
• Let k be an integer. Any rumor spreading protocol on the parallel-PULL(k) model
(cid:16)
(cid:17)
cannot converge in fewer rounds than Ω
nδ
ks2(1−2δ)2
.
• Consider either the sequential-PULL or the broadcast-PULL model. Any rumor
spreading protocol cannot converges in fewer rounds than Ω
(cid:16)
(cid:17)
n2δ
s2(1−2δ)2
.
To prove the theorem, we first prove (in Section 3.1) that an efficient rumor spreading
algorithm in either the noisy sequential-PULL model or the parallel-PULL(k) model
can be used to construct an efficient algorithm in the broadcast-PULL model. The
resulted algorithm has the same time complexity as the original one in the context of
sequential-PULL and adds a multiplicative factor of kn in the context of parallel-PULL(k).
We then show how to relate the rumor spreading problem in broadcast-PULL to
a statistical inference test (Section 3.2). A lower bound on the latter setting is then
achieved by adapting techniques from mathematical statistics (Section 3.3).
3.1 Reducing to the broadcast-PULL Model
The following lemma establishes a formal relation between the convergence times of the
models we consider. We assume all models are subject to the same noise distribution.
Lemma 3.2. Any protocol operating in sequential-PULL can be simulated by a protocol
operating in broadcast-PULL with the same time complexity. Moreover, for any integer
1 ≤ k ≤ n, any protocol P operating in parallel-PULL(k) can be simulated by a protocol
operating in broadcast-PULL with a time complexity that is kn times that of P in
parallel-PULL(k).
Proof. Let us first show how to simulate a time step of sequential-PULL in the
broadcast-PULL model. Recall that in broadcast-PULL, in each time step, all agents
receive the same observation sampled u.a.r from the population. Upon drawing such
an observation, all agents use their shared randomness to generate a (shared) uniform
random integer X between 1 and n. Then, the agent whose unique identity corresponds
to X is the one processing the observation, while all other agents ignore it. This reduces
the situation to a scenario in sequential-PULL, and the agents can safely execute the
original algorithm designed for that model.
As for simulating a time step of parallel-PULL(k) in broadcast-PULL, agents di-
vide time steps in the latter model into rounds, each composing of precisely kn time
14
steps. Recall that the model assumes that agents share clocks that start when the
execution starts and tick at each time step. This implies that the agents can agree
on the division of time into rounds, and can further agree on the round number. For
1 ≤ i ≤ kn, during the i-th step of each round, only the agent whose identity is (i
mod n)+1 receives4 the observation, while all other agents ignore it. This ensures
that when a round is completed in the broadcast-PULL model, each agent receives
precisely k independent uniform samples as it would in a round of parallel-PULL(k).
Therefore, at the end of each round j ∈ N+ in the broadcast-PULL model, all agents
can safely execute their actions in the j'th round of the original protocol designed for
parallel-PULL(k). This draws a precise bijection from rounds in parallel-PULL(k) and
rounds in broadcast-PULL. The multiplicative overhead of kn simply follows from the
fact that each round in broadcast-PULL consists of kn time steps.
Thanks to Lemma 3.2, Theorem 3.1 directly follows from the next theorem.
Theorem 3.3. Consider the broadcast-PULL model and assume that the relaxed δ-
uniform noise criterion is satisfied. Any rumor spreading protocol cannot converges in
fewer time steps than Ω
(cid:17)
(cid:16)
n2δ
s2(1−2δ)2
.
The remaining of the section is dedicated to proving Theorem 3.3. Towards achieving
this, we view the task of guessing the correct opinion in the broadcast-PULL model,
given access to noisy samples, within the more general framework of distinguishing
between two types of stochastic processes which obey some specific assumptions.
3.2 Rumor Spreading and hypothesis testing
To establish the desired lower bound, we next show how the rumor spreading problem
in the broadcast-PULL model relates to a statistical inference test. That is, from the
perspective of a given agent, the rumor spreading problem can be understood as the
following: Based on a sequence of noisy observations, the agent should be able to tell
whether the correct opinion is 0 or 1. We formulate this problem as a specific task of
distinguishing between two random processes, one originated by running the protocol
assuming the correct opinion is 0 and the other assuming it is 1.
One of the main difficulties lies in the stochastic dependencies affecting these pro-
cesses. In general, at different time steps, they do not consist of independent draws of a
given random variable. In other words, the law of an observation not only depends on
the correct opinion, on the initial configuration and on the underlying randomness used
by agents, but also on the previous noisy observation samples and (consequently) on
the messages agents themselves choose to display on that round. An intuitive version
of this problem is the task of distinguishing between two (multi-valued) biased coins,
4Receiving the observation doesn't imply that the agent processes this observation. In fact, it will
store it in its memory until the round is completed, and process it only then.
15
whose bias changes according to the previous outcomes of tossing them (e.g., due to
wear). Following such intuition, we define the following general class of Adaptive Coin
Distinguishing Tasks, for short ACDT.
Definition 3.4 (ACDT). A distinguisher is presented with a sequence of observations
taken from a coin of type η where η ∈ {0, 1}. The type η is initially set to 0 or 1 with
probability 1/2 (independently of everything else). The goal of the distinguisher is to
determine the type η, based on the observations. More specifically, for a given time
step t, denote the sequence of previous observations (up to, and including, time t − 1)
by x(<t) = (x(1), . . . , x(t−1)). At each time t, given the type η ∈ {0, 1} and the history of
η ∈ Σ, which
previous observations x(<t), the distinguisher receives an observation X (t)
has law5 P (X (t)
η = m x(<t)).
We next introduce, for each m ∈ Σ, the parameter
ε(m, x(<t)) = P (X (t)
1 = m x(<t)) − P (X (t)
0 = m x(<t)).
Since, at all times t, it holds that
0 = m x(<t)) =
P (X (t)
m∈Σ
then (cid:80)
(cid:80)
m∈Σ ε(m, x(<t)) = 0. We shall be interested in the quantity dε(x(<t)) :=
m∈Σ ε(m, x(<t)), which corresponds to the (cid:96)1 distance between the distributions
1 = m x(<t)) given the sequence of previous obser-
0 = m x(<t)) and P (X (t)
m∈Σ
P (X (t)
1 = m x(<t)) = 1,
P (X (t)
vations.
(cid:88)
(cid:88)
Definition 3.5 (The bounded family ACDT(ε, δ)). We consider a family of instances
of ACDT, called ACDT(ε, δ), governed by parameters ε and δ. Specifically, this family
contains all instances of ACDT such that for every t, and every history x(<t), we have:
• dε(x(<t)) ≤ ε, and
• ∀m ∈ Σ such that ε(m, x(<t)) (cid:54)= 0, we have δ ≤ P (X (t)
η = m x(<t)) for η ∈ {0, 1}.
In the rest of the current section, we show how Theorem 3.3, that deals with the
broadcast-PULL model, follows directly from the next theorem that concerns the adap-
tive coin distinguishing task, by setting ε = 2s(1−2δ)
. The actual proof of Theorem 3.6
appears in Section 3.3.
Theorem 3.6. Consider any protocol for any instance of ACDT(ε, δ), The number of
samples required to distinguish between a process of type 0 and a process of type 1
with probability of error less than 1
ε2 . In particular, if
ε
(cid:16)
δ < 10, then the number of necessary samples is Ω(cid:0) δ
3 is at least ln 2
δ3−δ2ε+3δε2−ε3
(cid:17) δ
6(δ−ε)3
(cid:1).
n
9
ε2
5We follow the common practice to use uppercase letters to denote random variables and lowercase
letter to denote a particular realisation, e.g., X(≤t) for the sequence of observations up to time t, and
x(≤t) for a corresponding realization.
16
3.2.1 Proof of Theorem 3.3 assuming Theorem 3.6
Consider a rumor spreading protocol P in the broadcast-PULL model. Fix a node u.
We first show that running P by all agents, the perspective of node u corresponds to a
specific instance of ACDT( 2s(1−2δ)
, δ) called Π(P, u). We break down the proof of such
correspondence into two claims.
n
The ACDT instance Π(P, u). Recall that we assume that each agent knows the com-
plete neutral initial configuration, the number of sources s, and the shared of random
bits sequence r. We avoid writing such parameters as explicit arguments to Π(P, u)
in order to simplify notation, however, we stress that what follows assumes that these
parameters are fixed. The bounds we show hold for any fixed value of r and hence also
when r is randomized.
Each agent is interested in discriminating between two families of charged initial
configurations: Those in which the correct opinion is 0 and those in which it is 1 (each
of these possibilities occurs with probability 1
2 ). Recall that the correct opinion is
determined in the 2nd stage of the charged initial configuration, and is independent
form the choice of sources (1st stage).
We next consider the perspective of a generic non-source agent u, and define the
instance Π(P, u) as follows. Given the history x(<t), we set P (X (t)
η = m x(<t)), for
η ∈ {0, 1}, to be equal to the probability that u observes message m ∈ Σ at time
step t of the execution P. For clarity's sake, we remark that the latter probability is
conditional on: the history of observations being x(<t), ,the sequence of random bits r,
,the correct opinion being η ∈ {0, 1}, ,the neutral initial configuration, ,the identity of u,
,the algorithm P, and the system's parameters (including the distribution fsource−state
and the number of sources s).
Claim 3.7. Let P be a correct protocol for the rumor spreading problem in broadcast-PULL
and let u be an agent for which the protocol is guaranteed to produce the correct opin-
ion with probability at least p by some time T (if one exists), for any fixed constant
p ∈ (0, 1). Then Π(P, u) can be solved in time T with correctness being guaranteed with
probability at least p.
Proof. Conditioning on η ∈ {0, 1} and on the random seed r, the distribution of ob-
servations in the Π(P, u) instance follows precisely the distribution of observations as
perceived from the perspective of u in broadcast-PULL. Hence, if the protocol P at u
terminates with output j ∈ {0, 1} at round T , after the T -th observation in Π(P, u) we
can set Π(P, u)'s output to j as well. Given that the two stochastic processes have the
same law, the correctness guarantees are the same.
Lemma 3.8. Π(P, u) ∈ ACDT
(cid:16) 2(1−2δ)s
(cid:17)
, δ
.
n
17
n
Proof. Since the noise in broadcast-PULL flips each message m ∈ Σ into any m(cid:48) ∈ Σ(cid:48)
with probability at least δ, regardless of the previous history and of η ∈ {0, 1}, at all
times t, if m ∈ Σ(cid:48) then P (X (t)
η = m x(<t)) ≥ δ. Consider a message m ∈ Σ\ Σ(cid:48) (if such
a message exists). By definition, such a message could only be received by observing a
non-source agent. But given the same history x(<t), the same sequence of random bits
r, and the same initial knowledge, the behavior of a non-source agent is the same, no
matter what is the correct opinion η. Hence, for m ∈ Σ \ Σ(cid:48) we have P (X (t)
0 = m
1 = m x(<t)), or in other words, m ∈ Σ \ Σ(cid:48) =⇒ ε(m, x(<t)) = 0.
x(<t)) = P (X (t)
It remains to show that dε(x(<t)) ≤ 2(1−2δ)s
. Let us consider two executions of
the rumor spreading protocol, with the same neutral initial configuration, same shared
sequence of random bits r, same set of sources, except that in the first the correct
opinion is 0 while in the other it is 1. Let us condition on the history of observations
x(<t) being the same in both processes. As mentioned, given the same history x(<t),
the behavior of a non-source agent is the same, regardless of the correct opinion η. It
follows that the difference in the probability of observing any given message is only due
to the event that a source is observed. Recall that the number of sources is s. Therefore,
the probability of observing a source is s/n, and we may write as a first approximation
ε(m, x(<t)) ≤ s/n . However, we can be more precise. In fact, ε(m, x(<t)) is slightly
smaller than s/n, because the noise can still affect the message of a source. We may
interpret ε(m, x(<t)) as the following difference. For a source v ∈ S, let mv
η be the
message of u assuming the given history x(<t) and that v is of type η ∈ {0, 1} (the
message mv
η is deterministically determined given the sequence r of random bits, the
neutral initial configuration, the parameters of the system, and the identity of v). Let
αm(cid:48),m be the probability that the noise transforms a message m(cid:48) into a message m.
Then ε(m, x(<t)) = 1
n
0,m), and
v∈S(αmv
(cid:80)
(cid:88)
m∈Σ
1,m − αmv
ε(m, x(<t)) ≤ 1
n
(cid:88)
(cid:88)
m∈Σ
v∈S
dε(x(<t)) =
αmv
1,m − αmv
0,m.
(1)
By the definition of ACDT(ε, δ), it follows that either αmv
or δ ≤ αmv
(1), we can use the following claim.
0,m (if ε(m, x(<t)) = 0)
0,m ≤ 1 − δ (if ε(m, x(<t)) (cid:54)= 0). Thus, to bound the right hand side in
1,m = αmv
1,m, αmv
element m ∈ Σ, δ ≤ P (m), Q(m) ≤ 1 − δ. Then(cid:80)
Claim 3.9. Let P and Q be two distributions over a universe Σ such that for any
Proof of Claim 3.9. Let Σ+ := {m : P (m) > Q(m)}. We may write
P (m) − Q(m) =
(P (m) − Q(m)) +
(Q(m) − P (m))
(cid:88)
m∈ΣP (m) − Q(m) ≤ 2(1 − 2δ).
(cid:88)
m∈Σ+
(cid:88)
m∈Σ
m∈setminusΣ+
= P (Σ+) − Q(Σ+) + Q(Σ \ Σ+) − P (Σ \ Σ+)
= 2(P (Σ+) − Q(Σ+)),
18
obtain
1
n
(cid:88)
(cid:88)
m∈Σ
v∈S
αmv
1,m − αmv
(cid:16) 2(1−2δ)s
0,m ≤ 1
(cid:17)
n
2
(cid:88)
v∈S
(1 − 2δ) ≤ 2(1 − 2δ)s
n
.
Case 2. Otherwise, Σ+ ≥ 2 and 2(cid:80)
where in the last line we used the fact that Q(Σ \ Σ+) − P (Σ \ Σ+) = 1 − Q(Σ+) −
1 + P (Σ+) = P (Σ+) − Q(Σ+). We now distinguish two cases. Case 1.If Σ+ is a
singleton, Σ+ = {m∗}, then P (Σ+)−Q(Σ+) = P (m∗)−Q(m∗) ≤ 1−2δ, by assumption.
Q(m) ≤
2(1 − δΣ+) ≤ 2(1 − 2δ), using the fact that for any m, Q(m) ≥ δ, and the fact that P
is a probability measure. This completes the proof of Claim 3.9.
(P (m) − Q(m)) ≤ 2 − 2(cid:80)
m∈Σ+
m∈Σ+
Applying Claim 3.9 for a fixed v ∈ S to distributions (αmv
0,m)m and (αmv
1,m)m, we
Hence, we have Π(P) ∈ ACDT
, δ
, establishing Lemma 3.8.
n
Thanks to Claims 3.7 and Lemma 3.8, Theorem 3.3 regarding the broadcast-PULL
(cid:16) ε2
(cid:17)
model becomes a direct consequence of Theorem 3.6 on the adaptive coin distinguishing
task, taking ε = 2(1−2δ)s
δsn ≤ c for some small
constant c, ensures that ε
. More precisely, the assumption (1−2δ)
(cid:17)
δ ≤ c as required by Theorem 3.6. The lower bound Ω
(cid:16)
n
δ
corresponds to Ω
. This concludes the proof of Theorem 3.3.
n2δ
(1−2δ)2s2
To establish our results it remains to prove Theorem 3.6.
3.3 Proof of Theorem 3.6
We start by recalling some facts from Hypothesis Testing. First let us recall two standard
(cid:80)
notions of (pseudo) distances between probability distributions. Given two discrete dis-
tributions P0, P1 over a probability space Ω with the same support6, the total variation
x∈ΩP0(x) − P1(x), and the Kullback-Leibler
distance is defined as T V (P0, P1) := 1
2
divergence KL(P0, P1) is defined7 as KL(P0, P1) :=(cid:80)
x∈Ω P0(x) log P1(x)
P0(x) .
The following lemma shows that, when trying to discriminate between distributions
P0, P1, the total variation relates to the smallest error probability we can hope for.
Lemma 3.10 (Neyman-Pearson [36, Lemma 5.3 and Proposition 5.4]). Let P0, P1 be
two distributions. Let X be a random variable of law either P0 or P1. Consider a
(possibly probabilistic) mapping f : Ω → {0, 1} that attempts to "guess" whether the
and is thus made for simplicity's sake.
6The assumption that the support is the same is not necessary but it is sufficient for our purposes,
7We use the notation log(·) to denote the base 2 logarithms, i.e., log2(·) and for a probability
distribution P , use the notation P (x) as a short for P (X = x).
19
observation X was drawn from P0 (in which case it outputs 0) or from P1 (in which
case it outputs 1). Then, we have the following lower bound,
P0 (f (X) = 1) + P1 (f (X) = 0) ≥ 1 − T V (P0, P1).
The total variation is related to the KL divergence by the following inequality.
Lemma 3.11 (Pinsker [36, Lemma 5.8]). For any two distributions P0, P1,
T V (P0, P1) ≤(cid:112)KL (P0, P1).
We are now ready to prove the theorem.
0
η
Proof of Theorem 3.6. Let us define Pη ( · ) = P ( · "correct distribution is η") for η ∈
{0, 1}. We denote P (≤t)
, η ∈ {0, 1}, the two possible distributions of X(≤t). We refer to
P (≤t)
as the distribution of type 1. Furthermore,
we define the correct type of a sequence of observations X(≤t) to be 0 if the observations
are sampled from P (≤t)
, and to be 1 if they are sampled from P (≤t)
as the distribution of type 0 and to P (≤t)
After t observations x(≤t) = (x(1), . . . , x(t)) we have to decide whether the distribu-
tion is of type 0 or 1. Our goal is to maximize the probability of guessing the type of
the distribution, observing X(≤t), which means that we want to minimize
0
1
.
1
f (X(≤t)) = 1 − η
Pη
P ("correct type is η") .
(2)
(cid:88)
(cid:16)
f =
η∈{0,1}
Recall that the correct type is either 0 or 1 with probability 1
bility described in (2) becomes
2 . Thus, the error proba-
1
2
P0
f (X(≤t)) = 1
+
1
2
P1
f (X(≤t)) = 0
.
(3)
By combining Lemmas 3.10 and 3.11 with X = X(≤t) and Pη = P (≤t)
for η = 0, 1,
we get the following Theorem. Although for convenience we think of f as a deterministic
function, it could in principle be randomized.
η
(cid:17)
Theorem 3.12. Let f be any guess function. Then
f t(X(≤t)) = 1
P0
+ P1
f (X(≤t)) = 0
(cid:16)
(cid:114)
(cid:17) ≥ 1 −
KL
(cid:16)
(cid:17)
.
P (≤t)
0
, P (≤t)
1
Theorem 3.12 implies that for the probability of error to be small, it must be the
is large. Our next goal is therefore to show that
, P (≤t)
P (≤t)
case that the term KL
in order to make this term large, t must be large.
0
1
(cid:17)
(cid:16)
(cid:17)
(cid:16)
(cid:17)
20
(cid:16)
(cid:17)
(cid:16)
η
Note that P (≤T )
for η ∈ {0, 1} cannot be written as the mere product of the marginal
distributions of the X (t)s, since the observations at different times may not necessarily
be independent. Nevertheless, we can still express the term KL(P (≤T )
) as a
sum, using the Chain Rule for KL divergence8. It yields
KL(P (≤T )
KL(P0(x(t) x(<t)), P1(x(t) x(<t)))
, P (≤T )
, P (≤T )
(cid:88)
) =
(4)
0
1
0
1
t≤T
(cid:88)
(cid:88)
x(<t)∈Σt−1
x(<t)∈Σt−1
:=
=
(cid:88)
(cid:88)
x(t)∈Σ
m∈Σ
P0(x(<t))
P0(x(t) x(<t)) log
P0(x(t) x(<t))
P1(x(t) x(<t))
.
P0(x(<t))
P0(X (t)
0 = m x(<t)) log
P (X (t)
P (X (t)
0 = m x(<t))
1 = m x(<t))
(5)
.
Since we are considering an instance of ACDT (ε, δ), we have
• dε(x(<t)) =(cid:80)
m∈Σ ε(m, x(<t)) ≤ ε, and
• for every m ∈ Σ such that ε(m, x(<t)) (cid:54)= 0, it holds that δ ≤ Pη(X (t)
0 = m x(<t))
for η ∈ {0, 1}.
We make use of the previous facts to upper bound the KL divergence terms in the right
hand side of (5), as follows.
(cid:33)
KL(P0(x(t) x(<t)), P1(x(t) x(<t)))
P0(x(<t))
P (X (t)
x(<t)∈Σt−1
=
(cid:88)
= −(cid:88)
x(<t)
(cid:32)
(cid:88)
(cid:32)
(cid:88)
m∈Σ
m∈Σ
0 = m x(<t)) log
(cid:32)
P (X (t)
P (X (t)
0 = m x(<t)) + ε(m, x(<t))
0 = m x(<t))
(cid:33)(cid:33)
ε(m, x(<t))
0 = m x(<t))
P (X (t)
.
(6)
P0(x(<t))
P (X (t)
0 = m x(<t)) log
1 +
Recall that we assume
ε(m,x(<t))
0 =mx(<t))
P (X (t)
≤ ε(m,x(<t))
δ
≤ ε
δ . We make use of the following
claim, which follows from the Taylor expansion of log(1 + u) around 0.
Claim 3.13. Let x ∈ [−a, a] for some a ∈ (0, 1). Then log(1 + x)− x + x2/2 ≤ x3
3(1−a)3 .
8See Lemma 3 in http://homes.cs.washington.edu/anuprao/pubs/CSE533Autumn2010/lecture3.
pdf.
21
(8)
0 = m x(<t))2(cid:17)
(9)
m∈Σ
m ε(m, x(<t)) = 0, thus the first term in (7) disappears. Hence, sub-
δ , we can bound the inner sum appearing in (6) from
(cid:33)(cid:33)
.
(ε(m, x(<t)))3
0 = m x(<t))2
P (X (t)
(7)
m (ε(m, x(<t)))2 ≤ ε2. The latter
0 = m x(<t)) ≥ δ for any m ∈ Σ such that
(cid:32)
(ε(m, x(<t)))2
0 = m x(<t))
P (X (t)
mε(m, x(<t)) ≤ ε, we also have that (cid:80)
±
δ3
3(δ − ε)3
1
ln 2
m∈Σ
above and below with
Using Claim 3.13 with a = ε
ε(m, x(<t)) − 1
2
bound, together with the fact that P (X (t)
(cid:32)
(cid:88)
Since (cid:80)
ε( m, x(<t)) (cid:54)= 0, implies (cid:88)
Finally, we can similarly bound the term(cid:80)
Recall that(cid:80)
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)log
(cid:32)
ε(m, x(<t))
0 = m x(<t))
(cid:88)
P (X (t)
P (X (t)
(cid:16)
with
1 +
m
(ε(m, x(<t)))3/P (X (t)
stituting the bounds (8) and (9) in (7), we have
(ε(m, x(<t)))3/P (X (t)
.
m∈Σ
≤ ε2
δ
(ε(m, x(<t)))2
(cid:16)
0 = m x(<t))
0 = m x(<t))2(cid:17) ≤ ε3
(cid:33)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) ≤ 1
ε2
δ
+
δ2 .
(cid:18) 1
(cid:18) 1
2
ln 2
≤ 1
ln 2
(cid:19)
(cid:19) ε2
δ
δε3
3(δ − ε)3
δ2ε
+
3(δ − ε)3
2
.
(10)
If we define the right hand side (10) to be W (ε, δ) and we substitute the previous bound
in (6), we get
KL(P0(x(t) x(<t)), P1(x(t) x(<t))) ≤ W (ε, δ),
and combining the previous bound with (4), we can finally conclude that for any integer
T , we have KL(P (≤T )
) ≤ T · W (ε, δ). Thus, from Theorem 3.12 and the latter
bound, it follows that the error under a uniform prior of the source type, as defined in
(3), is at least
, P (≤T )
1
0
(cid:16)
(cid:17)
(cid:16)
1
2
P0
f t(X(≤t)) = 1
+
1
2
P1
f (X(≤t)) = 0
(cid:17) ≥ 1
2
≥ 1
2
− 1
2
− 1
2
KL(P (≤T )
(cid:113)
(cid:112)T · W (ε, δ).
(cid:16)
0
, P (≤T )
)
1
1
W (ε,δ) = ln 2
9
6(δ−ε)3
δ3−δ2ε+3δε2−ε3
(cid:17) δ
ε2
Hence, the number of samples T needs to be greater than 1
9
to allow the possibility that the error be less than 1/3.
22
100
In particular, if we assume that 10ε < δ, then we can bound
2187 . It follows that (10) can be bounded with W (ε, δ) ≤ 1
so 1
9
Theorem 3.3.
W (ε,δ) ≥ 0.14 · δ
ε2 = Ω(cid:0) δ
ε2
1
(cid:1) ≤ 0.79 , and
(cid:1) . This completes the proof of Theorem 3.6 and hence of
(cid:0) 1
3(δ−ε)3 ≤ δ3
10·
2 + 100
3(9/10)3δ3 ≤
2187
δ2ε
ln 2
1
References
[1] A. El Gamal a. Young-Han Kim. Network Information Theory. 2011.
[2] M. Abeles. Corticonics: Neural circuits of the cerebral cortex. 1991.
[3] N. Alon, M. Braverman, K. Efremenko, R. Gelles, and B. Haeupler. Reliable
communication over highly connected noisy networks. In PODC, pages 165–173,
2016.
[4] F. Amor, P. Ortega, X. Cerd´a, and R. Boulay. Cooperative prey-retrieving in the
ant cataglyphis floricola: An unusual short-distance recruitment. Insectes Sociaux,
57(1), 2010.
[5] D. Angluin, J. Aspnes, and D. Eisenstat. A simple population protocol for fast
robust approximate majority. Distributed Computing, 21(2):87–102, 2008.
[6] D. Angluin, J. Aspnes, M. J. Fischer, and H. Jiang. Self-stabilizing population
protocols. TAAS, 3(4), 2008.
[7] J. Aspnes and E. Ruppert. An introduction to population protocols. Bulletin of
the EATCS, 93:98–117, 2007.
[8] W. Bialek. Physical limits to sensation and perception. Annual review of biophysics
and biophysical chemistry, 16(1):455–478, 1987.
[9] S. Bikhchandani, D. Hirshleifer, and I. Welch. Learning from the behavior of
others: Conformity, fads, and informational cascades. J. Economic Perspectives,
12(3):151–170, 1998.
[10] L. Boczkowski, A. Korman, and E. Natale. Minimizing message size in stochastic
In SODA,
communication patterns: Fast self-stabilizing protocols with 3 bits.
pages 2540–2559, 2017.
[11] A. Cavagna, A. Cimarelli, I. Giardina, G. Parisi, R. Santagati, F. Stefanini, and
M. Viale. Scale-free correlations in starling flocks. PNAS, 107(26):11865–11870,
2010.
23
[12] K. Censor-Hillel, B. Haeupler, J. A. Kelner, and P. Maymounkov. Global compu-
tation in a poorly connected world: fast rumor spreading with no dependence on
conductance. In STOC, pages 961–970, 2012.
[13] E. Chastain, A. Livnat, C. Papadimitriou, and U. Vazirani. Algorithms, games,
doi:10.1073/pnas.
and evolution. PNAS, 111(29):10620–10623, July 2014.
1406556111.
[14] Bernard Chazelle. Natural algorithms. In SODA, pages 422–431, 2009.
[15] Thomas M Cover and B Gopinath. Open problems in communication and compu-
tation. Springer Science & Business Media, 2012.
[16] A. Demers, D. Greene, C. Hauser, W. Irish, J. Larson, S. Shenker, H. Sturgis,
D. Swinehart, and D. Terry. Epidemic algorithms for replicated database mainte-
nance. In PODC, 1987.
[17] B. Doerr, L. A. Goldberg, L. Minder, T. Sauerwald, and C. Scheideler. Stabilizing
consensus with the power of two choices. In SPAA, pages 149–158, 2011.
[18] A. Dornhaus and L. Chittka. Food alert in bumblebees (bombus terrestris): Pos-
sible mechanisms and evolutionary implications. Behavioral Ecology and Sociobi-
ology, 50(6):570–576, 2001.
[19] R. Elsasser and T. Sauerwald. On the runtime and robustness of randomized
broadcasting. Theor. Comput. Sci., 410(36):3414–3427, 2009.
[20] O. Feinerman, B. Haeupler, and A. Korman. Breathe before speaking: efficient
information dissemination despite noisy, limited and anonymous communication.
In PODC, 2014.
[21] O. Feinerman and A. Korman. Theoretical distributed computing meets biology:
A review. In ICDCIT, pages 1–18. Springer, 2013.
[22] O. Feinerman, A. Rotem, and E. Moses. Reliable neuronal logic devices from
patterned hippocampal cultures. Nature physics, 4(12):967–973, 2008.
[23] P. Fraigniaud and E. Natale. Noisy rumor spreading and plurality consensus. In
PODC, pages 127–136, 2016.
[24] R. G. Gallager. Finding parity in a simple broadcast network. IEEE Trans. Inf.
Theor., 34(2):176–180, 2006.
[25] L. A. Giraldeau, T. J. Valone, and J.J. Templeton. Potential disadvantages of using
socially acquired information. Philosophical Transactions of the Royal Society of
London B: Biological Sciences, 357(1427):1559–1566, 2002.
24
[26] N. Goyal, G. Kindler, and M. E. Saks. Lower bounds for the noisy broadcast
problem. SIAM J. Comput., 37(6):1806–1841, 2008.
[27] B. Holldobler. Recruitment behavior in camponotus socius (hym. formicidae). J.
of Comparative Physiology A, 75(2):123–142, 6 1971.
[28] R. M. Karp, C. Schindelhauer, S. Shenker, and B. Vocking. Randomized rumor
spreading. In FOCS, pages 565–574, 2000.
[29] D. Kempe, A. Dobra, and J. Gehrke. Gossip-based computation of aggregate
information. In FOCS, pages 482–491. IEEE, 2003.
[30] A. Korman, E. Greenwald, and O. Feinerman. Confidence sharing: An economic
strategy for efficient information flows in animal groups. PLoS Comp. Biology,
10(10), 2014.
[31] S. Marras, R. Batty, and P. Domenici.
Information transfer and antipredator
maneuvers in schooling herring. Adaptive Behavior, 20(1):44–56, 2012.
[32] C. Musco, H. Su, and N. A. Lynch. Ant-inspired density estimation via random
walks: Extended abstract. In PODC, pages 469–478, 2016.
[33] B. Pittel. On spreading a rumor. SIAM J. Appl. Math., 47(1):213–223, 1987.
[34] N. Razin, J.P. Eckmann, and O. Feinerman. Desert ants achieve reliable re-
Journal of the Royal Society Interface;
cruitment across noisy interactions.
10(20170079)., 2013.
[35] G. Rieucau and L. A. Giraldeau. Persuasive companions can be wrong: the use
of misleading social information in nutmeg mannikins. Behavioral Ecology, pages
1217–1222, 2009.
[36] P. Rigollet. High dimensional statistics. Lecture notes for course 18S997., 2015.
[37] S. B. Rosenthal, C. R. Twomey, A. T. Hartnett, H. S. Wu, and I. D. Couzin. Reveal-
ing the hidden networks of interaction in mobile animal groups allows prediction
of complex behavioral contagion. PNAS, 112(15):4690–4695, 2015.
[38] J. J. Templeton and Giraldeau L. A. Patch assessment in foraging flocks of european
starlings: evidence for the use of public information. Behavioral Ecology, 6(1):65–
72, 1995.
[39] J. von Neumann. Probabilistic logics and the synthesis of reliable organisms from
unreliable components. Automata Studies, pages 43–98, 1956.
25
[40] A. Xu and M. Raginsky. Information-theoretic lower bounds for distributed func-
tion computation. IEEE Trans. Information Theory, 63(4):2314–2337, 2017.
[41] Y.Afek, N. Alon, O. Barad, E. Hornstein, N. Barkai, and Z. Bar-joseph. A biological
solution to a fundamental distributed computing problem. Science, 2011.
A Methods
All experimental results presented in this manuscript are re-analysis of data obtained in
Cataglyphis niger recruitment experiments [34]. In short, ants in the entrance chamber
of an artificial nest were given access to a tethered food item just outside the nest's
entrance (Fig 2a). The inability of the ants to retrieve the food induced a recruitment
process [34].
The reaction of the ants to this manipulation was filmed and the locations, speeds and
interactions of all participating ants were extracted from the resulting videos.
Calculation of δ. To estimate the parameter δ we used interactions between ants
moving at four different speed ranges (measured in cm/sec), namely, 'a': 0-1, 'b': 1-
5, 'c': 5-8, and 'd': over 8, and stationary "receiver" ants where used. The message
alphabet is then assumed to be Σ = {a, b, c, d}. The response of a stationary ant v to
the interaction was quantified in terms of her speed after the interaction. Assuming
equal priors to all messages in Σ, and given specific speed of the receiver ant, v, the
probability that it was the result of a specific message i ∈ Σ was calculated as pi(v) =
k∈Σ p(v k), where p(v j) is the probability of responding in speed v after
"observing" j. The probability δ(i, j) that message i was perceived as message j was
then estimated as the weighted sum over the entire probability distribution measured
v p(v j) · pi(v). The parameter δ can then be calculated
using δ = min{δ(i, j) i, j ∈ Σ}.
p(v i)/(cid:80)
as a response to j: δ(i, j) =(cid:80)
B Proof of Corollary 1.3
Let us start with the first item of the corollary, namely the lower bound in the sequential-PULL
model. For any step t, let S(t) denote the set of sources together with the agents that
have directly observed at least one of the sources at some point up to time t. We have
S = S(0) ⊆ S(1) ⊆ S(2) ⊆ . . .. The size of the set S(t) is a random variable which is
expected to grow at a moderate speed. Specifically, letting s(cid:48) = 11
Claim B.1. With probability at least 1 − n−10, we have S(T ) ≤ s(cid:48).
10 · s · T , we obtain:
26
Proof of Claim B.1. The variable S(T ) may be written as a sum of indicator variables
n(cid:88)
≤ n(cid:88)
i=1
i=1
(cid:88)
r≤T
S(T ) =
1(Agent i observed at least one source before step t)
1(Agent i observes a source on step r).
This last expression is a sum of n · T independent Bernoulli variables with parameter
s/n. In other terms, it is a binomial variable with probability s/n and T · n trials. By a
standard Chernoff bound the probability that it deviates by a multiplicative factor 11
from its mean s · T is less than exp(−Ω(sT )) ≤ n−10. The last bound holds because we
10
assume sT ≥ C log n for some large enough constant C.
Denote by E the event that S(t) ≤ s(cid:48) for every t ≤ T . Using Claim B.1, we know
that P (E) ≥ 1 − n−10. Our goal next is to prove that the probability ρ that a given
agent correctly guesses the correct opinion is low for any given time t ≤ cT , where c is a
small constant. For this purpose, we condition on the highly likely event E. Removing
this conditioning will amount to adding a negligible term (of order at most n−10) to ρ.
In order to bound ρ, we would like to invoke Theorem 3.3 with the number of
sources upper bounded by s(cid:48). Let us explain why it applies in this context. To begin
with, we may adversarially assume (from the perspective of the lower bound) that all
agents in S(t) learn the value of the correct bit to spread. Thus, they essentially become
"sources" themselves. In this case the number of sources varies with time, but the proof
of Theorem 3.3 can easily be shown to cover this case as long as s (i.e., s(cid:48) here) is
an upper bound on the number of sources at all times. We can therefore safely apply
Theorem 3.3 with s(cid:48). By the choice of T ,
(cid:18)
(cid:19)
T = Θ
n2δ
(s(cid:48))2(1 − 2δ)2
.
Hence, we can set c to be a sufficiently small constant such that for all times t ≤ cT ,
the probability of guessing correctly, even in this adversarial scenario, is less than 1/3.
In other words, we have ρ ≤ 1/3. All together, this yields a lower bound of Ω(T ) on
the convergence time.
As for the parallel-PULL(k) model, the argument is similar. After T (cid:48) = T /k parallel
rounds, using a similar claim as Claim B.1, we have that with high probability, at most
O(ksT (cid:48)) agents have directly observed one of the s sources by time T (cid:48). Applying
Theorem 3.3 with s(cid:48)(cid:48) = O(ksT (cid:48)) = O(sT ) yields a lower bound (in terms of samples in
the broadcast model) of
(cid:18)
Θ
n2δ
(s(cid:48)(cid:48))2(1 − 2δ)2
n2δ
s2T 2(1 − 2δ)2
= Θ(T ).
(cid:19)
(cid:19)
(cid:18)
= Θ
27
The last line follows by choice of T . Hence T is a lower bound on the number of samples,
which is attained in T (cid:48) rounds of parallel-PULL(k) model.
28
|
1204.5399 | 3 | 1204 | 2013-04-09T21:49:06 | A Consensual Linear Opinion Pool | [
"cs.MA",
"math.ST",
"math.ST"
] | An important question when eliciting opinions from experts is how to aggregate the reported opinions. In this paper, we propose a pooling method to aggregate expert opinions. Intuitively, it works as if the experts were continuously updating their opinions in order to accommodate the expertise of others. Each updated opinion takes the form of a linear opinion pool, where the weight that an expert assigns to a peer's opinion is inversely related to the distance between their opinions. In other words, experts are assumed to prefer opinions that are close to their own opinions. We prove that such an updating process leads to consensus, \textit{i.e.}, the experts all converge towards the same opinion. Further, we show that if rational experts are rewarded using the quadratic scoring rule, then the assumption that they prefer opinions that are close to their own opinions follows naturally. We empirically demonstrate the efficacy of the proposed method using real-world data. | cs.MA | cs | A Consensual Linear Opinion Pool
Arthur Carvalho
Kate Larson
Cheriton School of Computer Science
Cheriton School of Computer Science
University of Waterloo
[email protected]
University of Waterloo
[email protected]
3
1
0
2
r
p
A
9
]
A
M
.
s
c
[
3
v
9
9
3
5
.
4
0
2
1
:
v
i
X
r
a
Abstract
An important question when eliciting opinions
from experts is how to aggregate the reported opin-
ions. In this paper, we propose a pooling method
to aggregate expert opinions. Intuitively, it works
as if the experts were continuously updating their
opinions in order to accommodate the expertise of
others. Each updated opinion takes the form of a
linear opinion pool, where the weight that an ex-
pert assigns to a peer’s opinion is inversely related
to the distance between their opinions.
In other
words, experts are assumed to prefer opinions that
are close to their own opinions. We prove that such
an updating process leads to consensus, i.e., the ex-
perts all converge towards the same opinion. Fur-
ther, we show that if rational experts are rewarded
using the quadratic scoring rule, then the assump-
tion that they prefer opinions that are close to their
own opinions follows naturally. We empirically
demonstrate the efficacy of the proposed method
using real-world data.
1 Introduction
Predicting outcomes of relevant uncertain events plays an es-
sential role in decision-making processes. For example, com-
panies rely on predictions about consumer demand and ma-
terial supply to make their production plans, while weather
forecasts provide guidelines for long range or seasonal agri-
cultural planning, e.g., farmers can select crops that are best
suited to the anticipated climatic conditions.
Forecasting techniques can be roughly divided into statis-
tical and non-statistical methods. Statistical methods require
historical data that contain valuable information about the fu-
ture event. When such data are not available, a widely used
non-statistical method is to request opinions from experts re-
garding the future event [Cooke, 1991]. Opinions usually
take the form of either numerical point estimates or prob-
ability distributions over plausible outcomes. We focus on
opinions as probability mass functions.
The literature related to expert opinions
typi-
cally concerned about how expert opinions are used
[Mosleh et al., 1988], how uncertainty is or should be repre-
sented [Ng and Abramson, 1990], how experts do or should
is
reason with uncertainty [Cooke, 1991], how to score the
quality and usefulness of expert opinions [Savage, 1971;
Boutilier, 2012], and how to produce a single consensual
opinion when different experts report differing opinions
[DeGroot, 1974]. It is this last question that we address in
this paper.
We propose a pooling method to aggregate expert opinions
that works as if the experts were continuously updating their
opinions in order to accommodate the expertise and knowl-
edge of others. Each updated opinion takes the form of a
linear opinion pool, or a convex combination of opinions,
where the weight that an expert assigns to a peer’s opinion
is inversely related to the distance between their opinions. In
other words, experts are assumed to prefer opinions that are
close to their own opinions. We prove that such an updat-
ing process leads to consensus, i.e., the experts all converge
towards the same opinion. We also show that if the opinions
of rational experts are scored using the quadratic scoring rule,
then the assumption that experts prefer opinions that are close
to their own follows naturally.
2 Related Work
The aggregation of expert opinions have been extensively
studied in computer science and, in particular, artificial intel-
ligence, e.g., the aggregation of opinions represented as pref-
erences over a set of alternatives as in social choice theory
[Chevaleyre et al., 2007], the aggregation of point estimates
using non-standard opinion pools [Jurca and Faltings, 2008],
and the aggregation of probabilistic opinions using prediction
markets [Chen and Pennock, 2010].
A traditional way of aggregating probabilistic opinions
is through opinion pooling methods. These methods are
often divided into behavioral and mathematical methods
[Clemen and Winkler, 1999]. Behavioral aggregation meth-
ods attempt to generate agreement among the experts through
interactions in order for them to share and exchange knowl-
edge. Ideally, such sharing of information leads to a consen-
sus. However, these methods typically provide no conditions
under which the experts can be expected to reach agreement
or even for terminating the iterative process.
On the other hand, mathematical aggregation methods con-
sist of processes or analytical models that operate on the in-
dividual probability distributions in order to produce a single,
aggregate probability distribution. An important mathemati-
cal method is the linear opinion pool, which involves taking
a weighted linear average of the opinions [Cooke, 1991].
Several interpretations have been offered for the weights
in the linear opinion pool. The performance-based approach
recommends setting the weights based on previous perfor-
mance of the experts [Genest and McConway, 1990]. A
caveat with this approach is that performance measurements
typically depend on the true outcome of the underlying event,
which might not be available at the time when the opinions
have to be aggregated. Also, previous successful (respective-
ly, unsuccessful) predictions are not necessarily good indica-
tors of future successful (respectively, unsuccessful) ones.
More closely related to this work is the interpretation of
weights as a measure of distance. For example, Barlow et
al. [1986] proposed that the weight assigned to each expert’s
opinion should be inversely proportional to its distance to the
most distant opinion, where distance is measured according
to the Kullback-Leibler divergence. A clear drawback with
this approach is that it only considers the distance to the most
distant opinion when assigning a weight to an expert’s opin-
ion. Thus, even if the majority of experts have similar and
accurate opinions, the weights of these experts’ opinions in
the aggregate prediction can be greatly reduced due to a sin-
gle distant opinion.
For a comprehensive review of different perspectives on
the weights in the linear opinion pool, we refer the interested
reader to the work by Genest and McConway [1990].
3 Model
We consider the forecasting setting where a decision maker
is interested in a probability vector over a set of mutually
exclusive outcomes θ1, . . . , θz, for z ≥ 2. The decision
maker deems it inappropriate to interject his own judgment
about these outcomes. Hence, he elicits probabilistic opin-
ions from n experts. Experts’ opinions are represented by
z-dimensional probability vectors f1, . . . , fn. The probabil-
ity vector fi = (fi,1, . . . , fi,z) represents expert i’s opinion,
where fi,k is his subjective probability regarding the occur-
rence of outcome θk.
Since experts are not always in agreement, belief aggrega-
tion methods are used to combine their opinions into a single
probability vector. Formally, f = T (f1, . . . , fn), where f is
called an opinion pool, and the function T is the pooling op-
erator. The linear opinion pool is a standard approach that
involves taking a weighted linear average of the opinions:
n
T (f1, . . . , fn) =
wifi
(1)
where wi denotes the weight associated with expert i’s opin-
ion. We make the standard assumption that 0 ≤ wi ≤ 1, for
every i ∈ {1, . . . , n}, andPn
i=1 wi = 1.
3.1 Consensus and Weights
DeGroot [1974] proposed a model which describes how a
group can reach agreement on a common probability distri-
bution by pooling their individual opinions.
Initially, each
expert i is informed of the opinion of every other expert. In
Xi=1
order to accommodate the information and expertise of the
rest of the group, expert i updates his own opinion as follows:
n
f (1)
i =
pi,j fj
Xj=1
where pi,j is the weight that expert i assigns to the opinion
of expert j when he carries out this update. Weights must be
chosen on the basis of the relative importance that experts as-
sign to their peers’ opinions. It is assumed that pi,j > 0, for
j=1 pi,j = 1. In this way, each
updated opinion takes the form of a linear opinion pool. The
whole updating process can be written in a slightly more gen-
eral form using matrix notation, i.e., F(1) = PF(0), where:
every expert i and j, and Pn
P =
F(0) =
p1,1
p2,1
...
pn,1
f1
f2
...
fn
p1,2
p2,2
...
pn,2
=
· · ·
· · ·
...
· · ·
f1,1
f2,1
...
fn,1
p1,n
p2,n
...
pn,n
f1,2
f2,2
...
fn,2
· · ·
· · ·
...
· · ·
,
and
f1,z
f2,z
...
fn,z
Since all the opinions have changed, the experts might wish
to revise their new opinions in the same way as they did
before.
If there is no basis for the experts to change their
weights, we can then represent the whole updating process
after t revisions, for t ≥ 1, as follows:
(2)
F(t) = PF(t−1) = PtF(0)
i,1 , . . . , f (t)
Let f
(t)
i = (cid:16)f (t)
i,z(cid:17) be expert i’s opinion after t
j
i = f (t)
updates, i.e., it denotes the ith row of the matrix F(t). We
say that a consensus is reached if f (t)
, for every expert
i and j, as t → ∞. Since P, the matrix with weights, is a
n×n stochastic matrix, it can then be regarded as the one-step
transition probability matrix of a Markov chain with n states
and stationary probabilities. Consequently, one can apply a
limit theorem that says that a consensus is reached when there
exists a positive integer t such that every element in at least
one column of the matrix Pt is positive [DeGroot, 1974].
3.2 Weights as a Measure of Distance
The original method proposed by DeGroot [1974] has some
drawbacks. First,
the experts might want to change the
weights that they assign to their peers’ opinions after learn-
ing their initial opinions or after observing how much the
opinions have changed from stage to stage. Further, opin-
ions and/or identities have to be disclosed to the whole group
when the experts are assigning the weights. Hence, privacy
is not preserved, a fact which might be troublesome when the
underlying event is of a sensitive nature.
In order to tackle these problems, we derive the weights
that experts assign to the reported opinions by interpreting
each weight as a measure of distance between two opinions.
We start by making the assumption that experts prefer opin-
ions that are close to their own opinions, where closeness is
measured by the following distance function:
D(fi, fj) =rPz
k=1(fi,k − fj,k)2
z
i.e., it is the root-mean-square deviation between two opin-
ions fi and fj. Given the above assumption, one can estimate
the weight that expert i assigns to expert j’s opinion at a given
time t, for t ≥ 1, as follows:
(3)
(4)
p(t)
i,j =
α(t)
i
ǫ + D(cid:16)f (t−1)
i
, f (t−1)
j
(cid:17)
i
where α(t)
normalizes the weights so that they sum to one,
and ǫ is a small, positive constant used to avoid division by
zero. We set f (0)
i = fi, i.e., it is the original opinion reported
by expert i. There are some important points regarding equa-
tion (4). First, the distance between two opinions is always
non-negative. Hence, the constant ǫ ensures that every single
weight is strictly greater than 0 and strictly less than 1. Fur-
(t−1)
are, the higher
ther, the closer the opinions f
i
the resulting weight p(t)
0, the weight that each expert assigns to his own opinion is
always greater than or equal to the weights that he assigns to
his peers’ opinions.
i,j will be. Since D(cid:16)f (t−1)
(t−1)
and f
j
(cid:17) =
, f (t−1)
i
i
Now, we can redefine equation (2) so as to allow the experts
to update their weights based on the most recent opinions. Af-
ter t revisions, for t ≥ 1, we have that F(t) = P(t)F(t−1) =
P(t)P(t−1) . . . P(1)F(0), where each element of each matrix
P(k) is computed according to equation (4):
P(k) =
p(k)
1,1
p(k)
2,1
...
p(k)
n,1
p(k)
1,2
p(k)
2,2
...
p(k)
n,2
· · ·
· · ·
...
· · ·
p(k)
1,n
p(k)
2,n
...
p(k)
n,n
Pn
The opinion of each expert i at time t then becomes f
(t)
i =
. Algorithm 1 provides an algorithmic de-
j=1 p(t)
i,j
f (t−1)
j
scription of the proposed method.
In order to prove that all opinions converge towards a con-
sensual opinion when using the proposed method, consider
the following functions:
δ (U) =
1
2
max
i,j
ui,k − uj,k
γ(U) = min
i,j
min(ui,k, uj,k)
z
z
Xk=1
Xk=1
where 0 ≤ δ (U) , γ(U) ≤ 1, and U is a stochastic matrix.
δ (U) computes the maximum absolute difference between
two rows of a stochastic matrix U. Thus, when δ(cid:0)F(t)(cid:1) = 0,
all rows of F(t) are the same, i.e., a consensus is reached. We
use the following results in our proof [Paz, 1971]:
Algorithm 1 Algorithmic description of the proposed method
to find a consensual opinion.
Require: n probability vectors f (0)
Require: recalibration factor ǫ.
1: for t = 1 to ∞ do
for i = 1 to n do
2:
3:
1 , . . . , f (0)
n .
for j = 1 to n do
(t)
α
i
4:
p(t)
i,j =
end for
(t)
f
i =Pn
5:
6:
7:
8: end for
end for
ǫ+D(cid:16)f (t−1)
i
,f (t−1)
j
(cid:17)
j=1 p(t)
i,j
(t−1)
f
j
Proposition 1. Given two stochastic matrices U and V,
δ(UV) ≤ δ(U)δ(V).
Proposition 2. Given a stochastic matrix U, then δ(U) =
1 − γ(U).
Our main result is stated below.
Theorem 1. When t → ∞, f (t)
j.
i = f (t)
j
, for every expert i and
that F(t)
is the stochastic matrix repre-
Proof. Recall
senting the experts’ opinions after t revisions, and that
F(t) = P(t)F(t−1). Now, consider the following sequence:
(cid:0)δ(cid:0)F(0)(cid:1) , δ(cid:0)F(1)(cid:1) , ..., δ(cid:0)F(t)(cid:1)(cid:1). We are interested in the
behavior of this sequence when t → ∞. First, we show that
such a sequence is monotonically decreasing:
δ(cid:16)F(t)(cid:17) = δ(cid:16)P(t)F(t−1)(cid:17)
≤ δ(cid:16)P(t)(cid:17) δ(cid:16)F(t−1)(cid:17)
=(cid:16)1 − γ(cid:16)P(t)(cid:17)(cid:17) δ(cid:16)F(t−1)(cid:17)
≤ δ(cid:16)F(t−1)(cid:17)
The second and third lines follow, respectively, from
Propositions 1 and 2. Since δ (U) ≥ 0 for every stochastic
matrix U, then the above mentioned sequence is a bounded
decreasing sequence. Hence, we can apply the standard
monotone convergence theorem [Bartle and Sherbert, 2000]
and δ(cid:0)F(∞)(cid:1) = 0. Consequently, all rows of the stochastic
matrix F(∞) are the same.
In other words, a consensus is always reached under the
proposed method, and this does not depend on the initial re-
ported opinions. A straightforward corollary of Theorem 1 is
that all revised weights converge to the same value.
Corollary 1. When t → ∞, p(t)
j.
n , for every expert i and
i,j = 1
Hence, the proposed method works as if experts were
continuously exchanging information so that their individual
knowledge becomes group knowledge and all opinions are
equally weighted. Since we derive weights from the reported
opinions, we are then able to avoid some problems that might
arise when eliciting these weights directly, e.g., opinions do
not need to be disclosed to others in order for them to assign
weights, thus preserving privacy.
i,j
f (t−1)
j
j=1 p(t)
j=1 βj f (0)
an instance of the linear opinion pool. Recall that f (t)
The resulting consensual opinion can be represented as
i =
= · · · =
, where β = (β1, β2, . . . , βn) is a probability
vector that incorporates all the previous weights. Hence, an-
other interpretation of the proposed method is that experts
reach a consensus regarding the weights in equation (1).
= Pn
i,jPn
Pn
Pn
k=1 p(t−1)
j=1 p(t)
f (t−2)
k
j,k
j
3.3 Numerical Example
A numerical example may clarify the mechanics of the pro-
posed method. Consider three experts (n = 3) with the fol-
lowing opinions: f1 = (0.9, 0.1), f2 = (0.05, 0.95), and
f3 = (0.2, 0.8). According to (3), the initial distance be-
tween, say, f1 and f2 is:
D(f1, f2) =r (0.9 − 0.05)2 + (0.1 − 0.95)2
2
= 0.85
Similarly, we have that D(f1, f1) = 0 and D(f1, f3) = 0.7.
Using equation (4), we can then derive the weights that each
expert assigns to the reported opinions. Focusing on expert
1 at time t = 1 and setting ǫ = 0.01, we obtain p(1)
1,1 =
α(1)
1 /0.01, p(1)
1 /0.71. Since
these weights must sum to one, we have α(1)
1 ≈ 0.00975 and,
consequently, p(1)
1,3 ≈ 0.014.
Repeating the same procedure for all experts, we obtain the
matrix:
1,2 ≈ 0.011, and p(1)
1 /0.86, and p(1)
1,1 ≈ 0.975, p(1)
1,3 = α(1)
1,2 = α(1)
P(1) =" 0.975 0.011 0.014
0.013 0.058 0.929 #
0.011 0.931 0.058
1
1,j
P3
The updated opinion of expert 1 is then f (1)
j=1 p(1)
=
fj ≈ (0.8809, 0.1191). By repeating the above
procedure, when t → ∞, P(t) converges to a matrix where
all the elements are equal to 1/3. Moreover, all experts’ opin-
ions converge to the prediction (0.3175, 0.6825). An inter-
esting point to note is that the resulting prediction would be
(0.3833, 0.6167) if we had taken the average of the reported
opinions, i.e., expert 1, who has a very different opinion,
would have more influence on the aggregate prediction.
4 Consensus and Proper Scoring Rules
The major assumption of the proposed method is that experts
prefer opinions that are close to their own opinions. In this
section, we formally investigate the validity of this assump-
tion. We start by noting that in the absence of a well-chosen
incentive structure, the experts might indulge in game playing
which distorts their reported opinions. For example, experts
who have a reputation to protect might tend to produce fore-
casts near the most likely group consensus, whereas experts
who have a reputation to build might tend to overstate the
probabilities of outcomes they feel will be understated in a
possible consensus [Friedman, 1983].
Scoring rules are traditional devices used to promote hon-
esty in forecasting settings [Savage, 1971]. Formally, a scor-
ing rule is a real-valued function, R(fi, e), that provides a
score for the opinion fi upon observing the outcome θe.
Given that experts’ utility functions are linear with respect
to the range of the score used in conjunction with the scor-
ing rule,
the condition that R is strictly proper implies
that the opinion reported by each expert strictly maximizes
his expected utility if and only if he is honest. Formally,
i )] = fi, where Efi [R(·)] is the fi-expected
argmaxf ′
i , e). A well-known
value of R, Efi [R(f ′
strictly proper scoring rule is the quadratic scoring rule:
e=1 fi,e R(f ′
Efi [R(f ′
i
i )] = Pz
R(fi, e) = 2fi,e −
f 2
i,k
(5)
z
Xk=1
The proof that the quadratic scoring rule is indeed strictly
proper as well as some of its interesting properties can be
seen in the work by Selten [1998].
Proper scoring rules have been used as a tool to promote
truthfulness in a variety of domains, e.g., when sharing
rewards among a set of agents based on peer evaluations
[Carvalho and Larson, 2010;
Carvalho and Larson, 2011;
Carvalho and Larson, 2012],
to incentivize agents to ac-
curately estimate their own efforts to accomplish a task
[Bacon et al., 2012], in prediction markets [Hanson, 2003],
in weather forecasting [Gneiting and Raftery, 2007], etc.
4.1 Effective Scoring Rules
Scoring rules can also be classified based on monotonicity
properties. Consider a metric G that assigns to any pair of
opinions fi and fj a real number, which in turn can be seen as
the shortest distance between fi and fj. We say that a scoring
rule R is effective with respect to G if the following relation
holds for any opinions fi, fj, and fk [Friedman, 1983]:
G(fi, fj) < G(fi, fk) ⇐⇒ Efi [R(fj)] > Efi [R(fk)]
In words, each expert’s expected score can be seen as a mono-
tone decreasing function of the distance between his true
opinion and the reported one, i.e., experts still strictly max-
imize their expected scores by telling the truth, and the closer
a reported opinion is to the true opinion, the higher the ex-
pected score will be. The property of effectiveness is stronger
than strict properness, and it has been proposed as a desider-
atum for scoring rules for reasons of monotonicity in keeping
an expert close to his true opinion [Friedman, 1983].
By definition, a metric G must satisfy the following condi-
tions for any opinions fi, fj, and fk:
1. Positivity: G(fi, fj) ≥ 0, for all experts i, j, and
G(fi, fj) = 0 if and only if fi = fj;
2. Symmetry: G(fi, fj) = G(fj , fi);
3. Triangle Inequality: G(fi, fk) ≤ G(fi, fj) + G(fj , fk).
The root-mean-square deviation shown in (3) satisfies the
above conditions. However, equation (4), taken as a func-
tion of opinions, is not a true metric, e.g., symmetry does
not always hold. We adjust the original definition of effec-
tive scoring rules so as to consider weights instead of metrics.
We say that a scoring rule R is effective with respect to a set
of weights W = {p(t)
n,n} assigned at
any time t ≥ 1 if the following relation holds for any opinions
f (t−1)
i
2,1, . . . , p(t)
1,1, . . . , p(t)
, and f (t−1)
1,n, p(t)
, f (t−1)
:
j
k
j
k
)]
f (t−1)
i
f (t−1)
i
)] > E
[R(f (t−1)
[R(f (t−1)
i,k ⇐⇒ E
i,j < p(t)
p(t)
In words, each expert’s expected score can be seen as a
monotone increasing function of his assigned weights, i.e.,
the higher the weight one expert assigns to a peer’s opinion,
the greater the expected score of that expert would be if he
reported his peer’s opinion, and vice versa. We prove below
that the quadratic scoring rule shown in (5) is effective with
respect to a set of weights assigned according to (4).
Proposition 3. The quadratic scoring rule shown in (5)
to a set of weights W =
is effective with respect
{p(t)
n,n} assigned at any time t ≥ 1
according to equation (4).
2,1, . . . , p(t)
1,1, . . . , p(t)
1,n, p(t)
Proof. Given an opinion fj, we note that the fi-expected
value of the quadratic scoring rule in (5) can be written as:
z
Efi [R(fj)] =
=
=
=
z
z
fi,e R(fj, e)
Xe=1
Xe=1 2fj,efi,e − fi,e
Xe=1
Xe=1
Xx=1
Xe=1
2fj,efi,e −
2fj,efi,e −
z
z
z
fi,e
f 2
j,x
z
f 2
j,x!
Xx=1
Xx=1
f 2
j,x
z
Now, consider the weights assigned by expert i to the opin-
ions of experts j and k at time t ≥ 1 according to equation
(4). We have that p(t)
i,k if and only if:
i,j < p(t)
i,x − f (t−1)
i,x − f (t−1)
, f (t−1)
α(t)
i
i
i
z
k
ǫ + D(cid:16)f (t−1)
D(cid:16)f (t−1)
Xx=1(cid:16)f (t−1)
Xx=1
Xx=1
2f (t−1)
2f (t−1)
i,x
i,x
z
z
E
f
(t−1)
i
hR(cid:16)f (t−1)
k
α(t)
i
<
, f (t−1)
j
i
i
j
z
z
<
, f (t−1)
(cid:17)
(cid:17) < D(cid:16)f (t−1)
k,x (cid:17)2
ǫ + D(cid:16)f (t−1)
(cid:17)
Xx=1(cid:16)f (t−1)
k,y (cid:17)2
Xy=1(cid:16)f (t−1)
j,y (cid:17)2
Xy=1(cid:16)f (t−1)
hR(cid:16)f (t−1)
(cid:17)i > E
(t−1)
i
>
z
j
f
f (t−1)
k,x −
f (t−1)
j,x −
≡
≡
≡
≡
, f (t−1)
k
(cid:17)
j,x (cid:17)2
(cid:17)i
Proposition 3 implies that there is a correspondence be-
tween weights, assigned according to (4), and expected scores
from the quadratic scoring rule: the higher the weight one ex-
pert assigns to a peer’s opinion, the greater that expert’s ex-
pected score would be if he reported his peer’s opinion, and
vice versa. Hence, whenever experts are rational, i.e., when
they behave so as to maximize their expected scores, and their
opinions are rewarded using the quadratic scoring rule, then
the major assumption of the proposed method for finding a
consensual opinion, namely that experts prefer opinions that
are close to their own opinions, is formally valid. A straight-
forward corollary of Proposition 3 is that a positive affine
transformation of the quadratic scoring rule is still effective
with respect to a set of weights assigned according to (4).
Corollary 2. A positive affine transformation of
the
quadratic scoring rule R in (5), i.e., xR (fi, e) + y, for x > 0
and y ∈ ℜ, is effective with respect to a set of weights
W = {p(t)
n,n} assigned at any time
t ≥ 1 according to equation (4).
2,1, . . . , p(t)
1,1, . . . , p(t)
1,n, p(t)
5 Empirical Evaluation
In this section, we describe an experiment designed to test
the efficacy of the proposed method for finding a consensual
opinion. In the following subsections, we describe the dataset
used in our experiments, the metrics used to compare differ-
ent methods to aggregate opinions, and the obtained results.
5.1 Dataset
Our dataset was composed by 267 games (256 regular-season
games and 11 playoff games) from the National Football
League (NFL) held between September 8th, 2005 and Febru-
ary 5th, 2006. We obtained the opinions of 519 experts for
the NFL games from the ProbabilityFootball1 contest. The
contest was free to enter. Each expert was asked to report his
subjective probability that a team would win a game. Pre-
dictions had to be reported by noon on the day of the game.
Since the probability of a tie in NFL games is very low (less
than 1%), experts did not report the probability of such an
outcome. In particular, no ties occurred in our dataset.
Not all 519 registered experts reported their predictions for
every game. An expert who did not enter a prediction for a
game was removed from the opinion pool for that game. On
average, each game attracted approximately 432 experts, the
standard deviation being equal to 26.37. The minimum and
maximum number of experts were, respectively, 243 and 462.
Importantly, the contest rewarded the performance of experts
via a positive affine transformation of the quadratic scoring
rule, i.e., 100 − 400 × p2
l , where pl was the probability that
an expert assigned to the eventual losing team.
A positive affine transformation of a strictly proper scor-
ing rule is still strictly proper [Gneiting and Raftery, 2007].
The above scoring rule can be obtained by multiplying (5) by
200 and subtracting the result by 100. The resulting proper
scoring rule rewards bold predictions more when they are
right. Likewise, it penalizes bold predictions more when they
are wrong. For example, a prediction of 99% earns 99.96
1Available at http://probabilityfootball.com/2005/
points if the chosen team wins, and it loses 292.04 points if
the chosen team loses. On the other hand, a prediction of
51% earns 3.96 points if it is correct, and it loses 4.04 points
if it is wrong. A prediction of 50% neither gains nor loses
any points. The experts with highest accumulated scores won
prizes in the contest. The suggested strategy at the contest
website was “to make picks for each game that match, as
closely as possible, the probabilities that each team will win”.
We argue that this dataset is very suitable for our purposes
due to many reasons. First, the popularity of NFL games pro-
vides natural incentives for people to participate in the Proba-
bilityFootball contest. Furthermore, the intense media cover-
age and scrutiny of the strengths and weaknesses of the teams
and individual players provide useful information for the gen-
eral public. Hence, participants of the contest can be viewed
as knowledgeable regarding to the forecasting goal. Finally,
the fact that experts were rewarded via a positive affine trans-
formation of the quadratic scoring rule fits perfectly into the
theory developed in this work (see Corollary 2).
5.2 Metrics
We used two different metrics to assess the prediction power
of different aggregation methods.
Overall Accuracy
We say that a team is the predicted favorite for winning a
game when an aggregate prediction that this team will win
the game is greater than 0.5. Overall accuracy is then the per-
centage of games that predicted favorites have indeed won. A
polling method with higher overall accuracy is more accurate.
Absolute Error
Absolute error is the difference between a perfect prediction
(1 for the winning team) and the actual prediction. Thus, it is
just the probability assigned to the losing team (pl). An ag-
gregate prediction with lower absolute error is more accurate.
5.3 Experimental Results
For each game in our dataset, we aggregated the reported
opinions using three different linear opinion pools:
the
method proposed in Section 3, henceforth referred to as the
consensual method, with ǫ = 10−4; the traditional average
approach, where all the weights in (1) are equal to 1/n; and
the method proposed by Barlow et al. [1986], henceforth re-
ferred to as the BMS method. These authors proposed that the
weight assigned to expert i’s opinion should be wi =
i∗ ) ,
where c is a normalizing constant, I(fi, fi∗ ) is the Kullback-
Leibler divergence, and fi∗ achieves max{I(fi, fj) : 1 ≤ j ≤
n}, i.e., fi∗ is the most distant opinion from expert i’s opin-
ion. The BMS method produces indeterminate outputs when-
ever there are probability assessments equal to 0 or 1. Hence,
we recalibrated the reported opinions when using the BMS
method by replacing 0 and 1 by, respectively, 0.01 and 0.99.
Given the aggregated opinions, we calculated the perfor-
mance of each method according to the accuracy metrics pre-
viously described. Regarding the overall accuracy of each
method, the consensual method achieves the best perfor-
mance in this experiment with an overall accuracy of 69.29%.
The BMS and average methods achieve an overall accuracy
of, respectively, 68.54% and 67.42%.
c
I(fi,f
Table 1: Average absolute error of each method over the 267
games. Standard deviations are in parentheses.
Consensual
Average
BMS
0.4115 (0.1813)
0.4176 (0.1684)
0.4295 (0.1438)
Table 1 shows the average absolute error of each method
over the 267 games. The consensual method achieves the
best performance with an average absolute error of 0.4115.
We performed left-tailed Wilcoxon signed-rank tests in order
to investigate the statistical relevance of these results. The
resulting p-values are all extremely small(cid:0)< 10−4(cid:1), showing
that the results are indeed statistically significant.
Despite displaying a decent overall accuracy, the BMS
method has the worst performance according to the absolute
error metric. A clear drawback with this method is that it
only considers the distance to the most distant opinion when
assigning a weight to an opinion. Since our experimental de-
sign involves hundreds of experts, it is reasonable to expect at
least one of them to have a very different and wrong opinion.
The high number of experts should give an advantage to the
average method since biases of individual judgment can off-
set with each other when opinions are diverse, thus making
the aggregate prediction more accurate. However, the aver-
age method achieves the worst overall accuracy, and it per-
forms statistically worse than the consensual method when
measured under the absolute error metric. We believe this re-
sult happens because the average method ends up overweight-
ing extreme opinions when equally weighting all opinions.
On the other hand, under the consensual method, experts
put less weight on opinions far from their own opinions,
which implies that this method is generally less influenced
by extreme predictions as illustrated in Section 3.3.
6 Conclusion
We proposed a pooling method to aggregate expert opin-
ions. Intuitively, the proposed method works as if the experts
were continuously updating their opinions, where each up-
dated opinion takes the form of a linear opinion pool, and the
weight that each expert assigns to a peer’s opinion is inversely
related to the distance between their opinions. We proved that
this updating process leads to a consensus.
A different interpretation of the proposed method is that
experts reach a consensus regarding the weights of a linear
opinion pool. We showed that if rational experts are rewarded
using the quadratic scoring rule, then our major assumption,
namely that experts prefer opinions that are close to their own
opinions, follows naturally. To the best of our knowledge, this
is the first work linking the theory of proper scoring rules to
the seminal consensus theory proposed by DeGroot [1974].
Using real-world data, we compared the performance of
the proposed method with two other methods:
the tradi-
tional average approach and another distance-based aggrega-
tion method proposed by Barlow et al. [1986]. The results of
our experiment show that the proposed method outperforms
all the other methods when measured in terms of both overall
accuracy and absolute error.
[Gneiting and Raftery, 2007] Tilmann
and
Adrian E. Raftery. Strictly proper scoring rules, pre-
diction, and estimation.
the American
Statistical Association, 102(477):359–378, 2007.
Journal of
Gneiting
[Hanson, 2003] R. Hanson. Combinatorial information mar-
ket design. Information Systems Frontiers, 5(1):107–119,
2003.
[Jurca and Faltings, 2008] R. Jurca and B. Faltings. Incen-
tives for expressing opinions in online polls. In Proceed-
dings of the 2008 ACM Conference on Electronic Com-
merce, pages 119–128, 2008.
[Mosleh et al., 1988] A. Mosleh, V.M. Bier, and G. Aposto-
lakis. A critique of current practice for the use of expert
opinions in probabilistic risk assessment. Reliability Engi-
neering & System Safety, 20(1):63 – 85, 1988.
[Ng and Abramson, 1990] K.C. Ng and B. Abramson. Un-
IEEE Expert,
certainty management in expert systems.
5(2):29 – 48, april 1990.
[Paz, 1971] A. Paz. Introduction to Probabilistic Automata.
Academic Press, 1971.
[Savage, 1971] L.J. Savage. Elicitation of Personal Probabil-
ities and Expectations. Journal of the American Statistical
Association, 66(336):783–801, 1971.
[Selten, 1998] R. Selten. Axiomatic characterization of the
quadratic scoring rule. Experimental Economics, 1(1):43–
62, 1998.
References
[Bacon et al., 2012] David F. Bacon, Yiling Chen, Ian Kash,
David C. Parkes, Malvika Rao, and Manu Sridharan. Pre-
dicting Your Own Effort. In Proceedings of the 11th In-
ternational Conference on Autonomous Agents and Multi-
agent Systems, pages 695–702, 2012.
[Barlow et al., 1986] R. E. Barlow, R. W. Mensing, and
N. G. Smiriga. Combination of experts’ opinions based
on decision theory. In A. P. Basu, editor, Reliability and
quality control, pages 9–19. North-Holland, 1986.
[Bartle and Sherbert, 2000] R. G. Bartle and D. R. Sherbert.
Introduction to Real Analysis. Wiley, 3rd edition, 2000.
[Boutilier, 2012] C. Boutilier. Eliciting forecasts from self-
interested experts: Scoring rules for decision makers. In
Proceedings of the 11th International Conference on Au-
tonomous Agents and Multiagent Systems, pages 737–744,
2012.
[Carvalho and Larson, 2010] Arthur Carvalho and Kate Lar-
son. Sharing a reward based on peer evaluations.
In
Proceedings of the 9th International Conference on Au-
tonomous Agents and Multiagent Systems, pages 1455–
1456, 2010.
[Carvalho and Larson, 2011] Arthur Carvalho and Kate Lar-
son. A truth serum for sharing rewards. In Proceedings of
the 10th International Conference on Autonomous Agents
and Multiagent Systems, pages 635–642, 2011.
[Carvalho and Larson, 2012] Arthur Carvalho and Kate Lar-
son. Sharing rewards among strangers based on peer eval-
uations. Decision Analysis, 9(3):253–273, 2012.
[Chen and Pennock, 2010] Y. Chen and D.M. Pennock. De-
signing markets for prediction. AI Magazine, 31(4):42–52,
2010.
[Chevaleyre et al., 2007] Y. Chevaleyre, U. Endriss, J. Lang,
and N. Maudet. A short introduction to computational so-
cial choice. In Proceedings of the 33rd conference on Cur-
rent Trends in Theory and Practice of Computer Science,
pages 51–69, 2007.
[Clemen and Winkler, 1999] R.T. Clemen and R.L. Winkler.
Combining probability distributions from experts in risk
analysis. Risk Analysis, 19:187–203, 1999.
[Cooke, 1991] R.M. Cooke. Experts in uncertainty: opinion
and subjective probability in science. Oxford University
Press, 1991.
[DeGroot, 1974] M.H. DeGroot.
Reaching a consen-
Journal of the American Statistical Association,
sus.
69(345):118–121, 1974.
[Friedman, 1983] D. Friedman. Effective scoring rules for
probabilistic forecasts. Management Science, 29(4):447–
454, 1983.
[Genest and McConway, 1990] C. Genest and K.J. Mc-
Conway. Allocating the weights in the linear opinion pool.
Journal of Forecasting, 9(1):53–73, 1990.
|
1812.04985 | 1 | 1812 | 2018-12-12T15:17:03 | Implementing Argumentation-enabled Empathic Agents | [
"cs.MA"
] | In a previous publication, we introduced the core concepts of empathic agents as agents that use a combination of utility-based and rule-based approaches to resolve conflicts when interacting with other agents in their environment. In this work, we implement proof-of-concept prototypes of empathic agents with the multi-agent systems development framework Jason and apply argumentation theory to extend the previously introduced concepts to account for inconsistencies between the beliefs of different agents. We then analyze the feasibility of different admissible set-based argumentation semantics to resolve these inconsistencies. As a result of the analysis we identify the maximal ideal extension as the most feasible argumentation semantics for the problem in focus. | cs.MA | cs |
Implementing Argumentation-enabled Empathic Agents
Timotheus Kampik (cid:66)[0000−0002−6458−2252], Juan Carlos
Nieves[0000−0003−4072−8795], and Helena Lindgren[0000−0002−8430−4241]
Umea University, 901 87, Umea, Sweden
{tkampik,jcnieves,helena}@cs.umu.se
Abstract. In a previous publication, we introduced the core concepts of em-
pathic agents as agents that use a combination of utility-based and rule-based
approaches to resolve conflicts when interacting with other agents in their envi-
ronment. In this work, we implement proof-of-concept prototypes of empathic
agents with the multi-agent systems development framework Jason and apply
argumentation theory to extend the previously introduced concepts to account
for inconsistencies between the beliefs of different agents. We then analyze the
feasibility of different admissible set-based argumentation semantics to resolve
these inconsistencies. As a result of the analysis, we identify the maximal ideal
extension as the most feasible argumentation semantics for the problem in focus.
Keywords: Agent architectures · Agent-oriented software engineering · Argu-
mentation
1
Introduction
Complex information systems that act with high degrees of autonomy and automation
are ubiquitous in human society and shape day-to-day life. This leads to societal chal-
lenges of increasing frequency and impact, in particular when systems are primarily
optimized towards simple metrics like views and clicks and are then used by malevolent
actors for deceptive purposes, for example, to manipulate political opinions. Emerging
research highlights these challenges and suggests the development of new multi-agent
system concepts to address the problem ([17], [12]). In a recent publication, we outlined
the basic concepts of empathic agents [13], based on an established definition of empa-
thy as the ability to "simulate another's situated psychological states, while maintaining
clear self -- other differentiation" [8]1. Our empathic agent is utility-based but addition-
ally uses acceptability rules to avoid conflicts with agents that act in its environment.
Thereby, we attempt to emulate empathic human behavior, which considers rules and
societal norms, as well as the goals and intentions of others. We consider our agent a
research contribution to the "synergistic combination of modelling methods" for "au-
tonomous agents modelling other agents" as outlined as an open research problem in
the discussion of a survey by Albrecht and Stone [1].
This paper addresses the following research questions:
1 We based our empathic agent on a rationality-oriented definition of empathy, to avoid the
technical ambiguity definitions that focus on emotional empathy imply. A comprehensive dis-
cussion of definitions of empathy is beyond the scope of this work.
2
T. Kampik et al.
-- How can proof-of-concept prototypes of empathic agents be implemented with a
multi-agent systems development framework?
-- How can abstract argumentation (see: Dung [9]) be used to extend the agents to
be able to resolve scenarios in which the beliefs of different agents are initially
inconsistent?
-- Which admissible set-based argumentation semantics are most feasible for resolv-
ing these inconsistencies?
To illustrate our work in a context that can be considered of societal relevance, we
introduce the following example scenario: A persuader agent can select exactly one
item from a list of persuasive messages (ads) it can display to a mitigator agent. Based
on the impact the message will have on a particular end-user the mitigator represents,
the mitigator will either accept the message and allow the end-user to consume the per-
suader's service offering (and the message), or terminate its session with the persuader.
The persuader's messages are considered empathic agent actions; the mitigator does
not act in the sense of the empathic agent core framework (see: Section 2). If the mit-
igator accepts the action proposal of the persuader, the environment will pay different
utility rewards (or punishments) to persuader and mitigator. The goal of the persuader
is to select a message that is utility-optimal for itself, considering that the mitigator
has to accept it. We suggest that the scenario, albeit simple, reflects a potential type
of real-world use case for future empathic agents of greater maturity. Improving the
end-user experience of systems that are traditionally primarily optimized towards one
simple metric can be considered a societally beneficial use case for empathic agents:
(self-)regulation could motivate advertisement-financed application providers to either
implement both persuader and mitigator to create a more purposeful user experience,
or to open up their APIs to third-party clients that try to defend the interests of the
end-users.
The rest of this paper is organized as follows: First, we elaborate on the core con-
cepts of the empathic agent (Section 2), taking into consideration the belief-desire-
intention (BDI) architecture in which the concepts are to be implemented. Then, we
describe the implementation of the concepts with the multi-agent systems development
framework Jason [6] (Section 3). Next, we apply argumentation theory and extend the
core concepts and their implementation with Jason to handle inconsistencies between
the beliefs of different agents (Section 4). To clarify our choice of argumentation se-
mantics, we then analyze the applicability of different admissible set-based semantics
(Section 5). Subsequently, we examine other work related to argumentation with Jason,
briefly discuss the work in the context of existing negotiation approaches, discuss lim-
itations of the implemented agents, and outline possible steps towards more powerful
empathic agents (Section 6), before we conclude the paper (Section 7).
2 Empathic Agent Concepts
In this section, we elaborate on the empathic agent core concepts as initially sketched
out in [13].
A set of interacting empathic agents can be described as follows:
Implementing Argumentation-enabled Empathic Agents
3
, ..., ActAim
-- In an environment, n empathic agents {A0, ..., An} are acting.
-- Each agent Ai(0 ≤ i ≤ n) can execute a finite set of actions
}. All agents execute all actions simultaneously
ActsAi = {ActAi0
at one specific point in time; (inter)actions in continuous time or over a series of
discrete time steps are beyond the scope of the basic concept.
-- In its belief base, each agents has a utility function that assigns a numeric value to
all possible action combinations: uAi : ActsA0 × ... × ActsAn → {−∞, R, +∞}.
-- Each agent strives to determine a set of actions it should execute that is considered
acceptable by all agents. For this, an agent Ai determines the sets of actions that
maximize its own utility function (arg max uAi)2: If there is no own best set of ac-
tions actsami,k ∈ arg max uAi that matches a set of best actions of all of the other
agents, a conflict of interests exists. Hence, a conflict of interest can be determined
by the following boolean function:
c(arg max uA0, ..., arg max uAi, ..., arg max uAn ) =
true, if :
(cid:54) ∃ actsam0,l , ..., actsami,k , ..., actsamn,m
in arg max uA0 × ... × arg max uAi × ... × arg max uAn :
{actsam0,l ∩ ... ∩ actsami,k ∩ ... ∩ actsamn,m} (cid:54)= {}
else : f alse
-- In addition to its utility mapping, each agent Ai has a set of acceptability rules
∈ AccsAi is a boolean func-
AccsAi in its belief base. An acceptability rule AccAij
tion that takes as it input the to-be-executed actions and returns a boolean value3:
ActsA0 × ... × ActsAn → {true, f alse}.
-- If the conflict determination function does not determine a conflict, the agents can
go ahead and execute their optimal actions. If the conflict determination function
returns true (determines a conflict), each agent applies the acceptability rules to
check whether the actions it would ideally execute are in fact not acceptable or
whether they can potentially be executed nevertheless. Here, the agents can employ
different game-theoretical approaches (for example: minimizing the maximal loss)
for ensuring that the execution of conflicting, but acceptable action sets by multiple
agents does not lead to utility outcomes that are "bad" (in particular: worse than
executing the actions that maximize combined utility) for all parties4. If the actions
are not acceptable or are acceptable but chosen to not be executed, each agent can
either choose to maximize the shared utility of all agents (arg max(uA0 × ... ×
uAn)) or to select the next best action set and execute the conflict and acceptability
check for them. We refer to agent variants that employ the former approach as
lazy empathic agents, and agents that use the latter as full empathic agents. Lazy
2 Note that arg max uAi returns a set of sets.
3 Note that a single acceptability rule does not necessarily consider all to-be-executed actions,
i.e. it might ignore some of its input arguments.
4 As the simple examples we implement in this paper feature only one acting agent (a second
agent is merely approving or disapproving of the actions), such game-theoretical considera-
tions are beyond scope. Hence, we will not elaborate further on them.
4
T. Kampik et al.
empathic agents save computation time by not iterating through action sets that
do not optimize the ideally possible individual utility but provide better individual
utility than the action sets that maximize combined utility. However, they might not
find "good" solutions that are represented by action sets they do not cover5.
Listing 1 describes the empathic agent base algorithm (lazy variant) in a two-agent
scenario.
Listing 1: Empathic agent base algorithm
1. Determine actions that maximize own utility (arg max uA self ).
2. Check for conflict with actions that maximize utility of other agent (arg max uA other).
3. If conflicts appear (apply conflict determination function c):
Check if actions that maximize own utility are acceptable despite conflicts.
if conflicts are acceptable
(apply acceptability rules as function Actsself × Actsother → {true, f alse}):
else: Execute (arg max(uA self × uA other)) ∩ Actsself .
Execute (arg max uA self ) ∩ Actsself .
else: Execute (arg max uA self )∩Actsself (or (arg max(uA self ×uA other))∩Actsself ).
3
Implementation of an Empathic Agent with Jason
To provide proof-of-concept prototypes of empathic agents, we implemented a simple
empathic agent example scenario with Jason, a development framework that is well-
established in the multi-agent systems community6.
The agents implement the scenario type we explained in the introduction as follows:
1. The persuader agent has a set of utility mappings -- (utility value, unique action
name)-tuples -- in its belief base7:
revenue(3, "Show vodka ad").
revenue(1, "Show university ad").
...
The mappings above specify that the persuader can potentially receive three utility
units for showing a vodka advertisement, or one utility unit for showing a university
advertisement. The persuader communicates these utility mappings to the mitigator.
5 For now, we assume all agents in a given scenario have the same implementation variant.
Empathic agents that are capable to effectively interact with empathic agents of other imple-
mentation variants or with non-empathic agents are -- although interesting -- beyond scope.
6 The implementation of our empathic agents with Jason (including the Jason extension we
introduce below, as well as a technical report that documents the implementation) is available
at https://github.com/TimKam/empathic-jason.
7 The mappings are end-user specific. In a scenario with multiple end-users, the persuader would
have one set of mappings per user.
Implementing Argumentation-enabled Empathic Agents
5
2. The mitigator has its own utility mappings:
benefit(-100, "Show vodka ad").
benefit(10, "Show university ad").
...
The mitigator's utility mappings are labelled benefit, in contrast to the persuader's
revenue label. While this should reflect the difference in impact the actions have on
persuader and mitigator (or rather: on the end-user the mitigator is proxying), it is
important to note that we consider the utility of the two different mappings com-
parable. The mitigator responds to the persuader's announcement by sending back
its own mapping. In addition to the utility mappings, both persuader and mitigator
have a set of acceptability rules in their belief base8 :
acceptable(
"Show university ad",
"Show community college ad").
acceptable(
"Show community college ad",
"Show university ad").
...
The intended meaning the empathic agents infer from these rules is that both agents
agree that Show university ad is always acceptable if the preferred action of the mit-
igator is Show community college ad and vice versa. After sending the response, the
mitigator determines the action it thinks should be executed (the expected action),
using the algorithm as described in Section 2. In the current implementation, the
agents are lazy empathic agents, i.e. they will only consider the actions with maxi-
mal individual and maximum shared utility (as explained above) 9.
3. The persuader determines its action proposal in the same way and announces it to
the mitigator.
4. When the response is received and the own expected action is determined, the mit-
igator compares the received action with the determined action. If the actions are
identical, the mitigator sends its approval of the action proposal to the persuader. If
the actions are inconsistent, the mitigator sends a disapproval message and cancels
the session.
5. If the persuader receives the approval from the mitigator, it executes the agreed-
upon action.
Figure 1 shows a sequence diagram of the basic empathic agent example we imple-
mented with Jason. The message labels show the internal actions the agents use for
communicating with each other.
8 Note that in Jason terminology, acceptability rules are beliefs and not rules.
9 If at any step of the decision process, several actions could be picked because they provide
the same utility, the agents will always pick the first one in the corresponding list to reach a
deterministic result.
6
T. Kampik et al.
Persuader
Mitigator
.broadcast(tell, announce(utility, Utility))
.send(Source, tell, respond(OwnUtility))
Note: compute
expected action
while waiting for
reply
.broadcast(tell, propose(action, DeterminedAction))
alt
.send(Source, tell, approve(ReceivedAction))
If: action acceptable
.broadcast(tell, execute(action, AgreedAction))
.send(Source, tell, disapprove(ReceivedAction))
Else
Note:
cancel session
Fig. 1: Empathic agent interaction: sequence diagrams, basic example
4 Argumentation for Empathic Agents: Reaching Consensus in
Case of Inconsistent Beliefs
In real-world scenarios, agents will often have inconsistent beliefs because of an only
partially observable environment or subjective interpretations of environment informa-
tion. Then, further communication is necessary for the agents to reach consensus on
what actions to execute and to prevent mismatches between the different agents' deci-
sion making processes that lead to poor results for all involved agents. In this section,
we show how abstract argumentation can be used to synchronize inconsistent agents ac-
ceptability rules in the agents' belief bases. I.e., we improve the autonomy for the agent
from the perspective of moral philosophy in that we enhance ability of an empathic
agent to "impose the [...] moral law on [itself]" [7].
Abstract argumentation, as initially introduced by Dung formalizes a theory on the
exchange of arguments and the acceptability of arguments within a given context (ar-
gumentation framework) as a tuple (cid:104)A, R(cid:105) where A is a finite set of arguments (for
example: {a, b, c} and R denotes the arguments' binary attack relations (for example:
{(a, b), (b, c)}, i.e. a attacks b and b attacks c). Dung introduces different properties
of argument sets in argumentation frameworks, such as acceptability, admissibility,
and completeness [9]. Dung's initial theory has since been extended, for example by
Bench-Capon, who introduced value-based argumentation to account for values and
value preferences in argumentation [3]. In multi-agent systems research, argumentation
is a frequently applied concept, "both for automating individual agent reasoning, as well
Implementing Argumentation-enabled Empathic Agents
7
as multiagent interaction" [16]. It can be assumed that applying (abstract) argumenta-
tion to enhance the consensus-finding capabilities of the empathic agents is an approach
worth investigating.
In the previous example implementation, which primarily implements the empathic
agent core concepts, inconsistencies between acceptability rules are irreconcilable (and
would lead to the mitigator's rejection of the persuader's action proposal). To address
this limitation, we use an abstract argumentation approach based on Dung's argumen-
tation framework [9] and its maximal ideal extension definition [10]. We enable our
agents to launch attacks at acceptability rules. An attack is a tuple (a, b), with a being
the identifier of an action or of another attack and b being the identifier of the attack
itself. Each attack is added to a list of arguments, with the rule it attacks as its target.
Attacked rules are added as arguments without attack targets. Additional arguments
can be used to launch attacks on attacks. The argumentation framework is resolved by
determining its maximal ideal extension10. The instructions in Listing 2 describe the
algorithm the argumentation-enabled empathic agents use for belief synchronization.
The algorithm is executed if the agents initially cannot agree on a set of actions, which
would lead to a cancellation of the interaction using only the basic approach as intro-
duced above. We extended Jason to implement an argumentation function as an internal
action. The function calls the argumentation framework solver of the Tweety Libraries
for Logical Aspects of Artificial Intelligence and Knowledge Representation [18], which
we wrapped into a web service with a RESTful HTTP interface. In our example imple-
mentation, we extend our agents as follows:
1. The persuader starts with some acceptability rules in its belief base that are not
existent in the belief set of the mitigator:
acceptable("Show vodka ad", "Show university ad").
...
In the provided example, the persuader believes (for unknown reasons) that the
action Show vodka ad is acceptable even if the action Show university ad provides
greater utility to the mitigator.
2. When the mitigator assesses the action proposal, it detects that its own expected
action (Show university ad) is inconsistent with the persuader's expected action
(Show vodka ad). It sends a disapproval message to the persuader that includes an
attack on the acceptability rules of the Show vodka ad action:
attack("Show vodka ad", "Alcoholic").
3. The persuader then constructs an argumentation framework from acceptability rules
and attacks. With the help of the Jason argumentation extension, it determines all
preferred extensions of the argumentation framework and removes the arguments
(acceptability rules and attacks) that are not part of any preferred extension. Subse-
quently, the persuader updates its belief base accordingly, re-determines the action
proposal, and sends the proposal to the mitigator, who then re-evaluates it (and
ideally accepts it). Potentially, the persuader could also launch attacks on the miti-
gator's attacks and so on, until consensus is reached or the session is aborted11.
10 Note that we compare different argumentation semantics in Section 5.
11 However, the provided example code implements only one argumentation cycle.
8
T. Kampik et al.
Listing 2: Argumentation-enabled belief synchronization
1. Mitigator agent (After having received not acceptable action proposal): Request acceptabil-
ity rules from mitigator.
2. Persuader agent: Send acceptability rules.
3. Mitigator agent (Upon receiving acceptability rules):
(a) Consider acceptability rules as initial arguments {acc0, ..., accn} in argumentation
framework AF = (cid:104){acc0, ..., accn},{}(cid:105). Resolve AF by determining maximal ideal
extension.
(b) Decide whether:
new attacks should and can be launched,
or AF can be accepted as-is,
or session should be cancelled.
(c) If attacks should be launched:
Add additional set of arguments to AF that attack acceptability rules that are
inconsistent with own beliefs. Send updated AF to persuader (go to 4a).
else if AF can be accepted as-is:
Accept and resolve AF .
else:
Cancel session.
4. Persuader agent (Upon receiving AF ):
(a) Generate/update own argumentation framework AF . Resolve AF by determining max-
imal ideal extension.
(b) Decide whether:
new attacks should and can be launched,
or AF can be accepted as-is,
or session should be cancelled.
(c) If attacks should be launched:
Add additional set of arguments to AF that attack acceptability rules that are
inconsistent with own beliefs. Send updated AF to mitigator (go to 3c).
else if AF can be accepted as-is:
Accept and resolve AF .
else:
Cancel session.
Figure 2 shows a sequence diagram of the argumentation-capable empathic agent ex-
ample we implemented with Jason.
5 Argumentation Semantics Analysis
In this section, we explain why our argumentation-enabled empathic agents use ar-
gumentation semantics that select the maximal ideal extension. The purpose of the
required argumentation reasoner is to remove all arguments from an argumentation
framework that have been attacked by arguments that in turn have not been success-
fully attacked. I.e., the naive requirements are as follows:
Implementing Argumentation-enabled Empathic Agents
9
Persuader
Mitigator
.broadcast(tell, announce(utility, Utility))
.send(Source, tell, respond(OwnUtility))
Note: compute
expected action
while waiting for
reply
.broadcast(tell, propose(action, DeterminedAction))
alt
.send(Source, tell, approve(ReceivedAction))
If: action acceptable
.broadcast(tell, execute(action, AgreedAction))
Else
.send(Source, tell, disapprove(Rules, Attacks, ApprovedAction))
Note: cancel
session if
conversation does
not terminate
Fig. 2: Empathic agent interaction: sequence diagrams, argumentation example
1. Given a set of arguments S, the semantics must exclude all successfully attacked
arguments from S, and only these.
2. An argument in S is considered successfully attacked if it is attacked by any argu-
ment in S that is not successfully attacked itself.
According to Dung, a "preferred extension of an argumentation framework AF is a max-
imal (with respect to set inclusion) admissible set of AF". In this context, "a conflict-free
set of arguments S is admissible iff each argument in S is acceptable with respect to S",
given an "argument A ∈ AR is acceptable with respect to a set S of arguments iff for
each argument B ∈ AR: if B attacks A then B is attacked by S" [9]. As Dung's defini-
tion of preferred extensions is congruent with the stipulated requirements, it seems rea-
sonable for the empathic agent implementations to resolve argumentation frameworks
by using the corresponding argumentation semantics.
However, if there are arguments that attack each other directly or that form any
other circular structure with an even number of nodes, multiple preferred extensions
exist. For example, given the arguments {a, b} and the attacks {(a, b), (b, a)} both {a}
and {b} are preferred extensions.
This behavior implies ambiguity, which prevents the empathic agents from reaching
a deterministic resolution of their belief inconsistency. As this is to be avoided, we
introduce an additional requirement:
3. The semantics must determine exactly one set of arguments by excluding ambigu-
ous arguments.
10
T. Kampik et al.
Dung defines the grounded extension of an argumentation framework as "the least (with
respect to set inclusion) complete extension" and further stipulates that an "admissible
set S of arguments is called a complete extension iff each argument, which is acceptable
with respect to S, belongs to S" [9]. In the above example, the grounded extension is
{}. As determining the grounded extension avoids ambiguity, using grounded semantics
seems to be a reasonable approach at first glance. However, as Dung et al. show in a
later work, grounded semantics are sceptical beyond the stipulated requirements, in
that they exclude some arguments that are not successfully attacked [10]12. In the same
work, the authors define a set of arguments X as ideal "iff X is admissible and it is
contained in every preferred set of arguments" and show that the maximal ideal set is
"a proper subset of all preferred sets" [10]. Hence, we adopt maximal ideal semantics
for determining the set of acceptable arguments of our empathic agents.
The following two running examples highlight the relevance of the distinction be-
tween preferred, maximal ideal, and grounded semantics in the context of our empathic
agents.
Example 1 Example 1 highlights the advantage of grounded and maximal ideal seman-
tics over preferred and complete semantics for the use case in focus. The to-be-solved
empathic agent scenario is as follows:
-- Acceptability rules persuader: {(Show steak ad,∗)} (a1)13
-- Acceptability rules mitigator: {}.
To resolve the acceptability rule inconsistency, the agents exchange the following argu-
ments:
1. Mitigator: {(a1, Steak ad too unhealthy)} (b1)
2. Persuader: {(b1, Steak ad healthy enough)} (c1)
3. Mitigator: {(c1, b1)}
As a result, we construct the following argumentation framework:
AF1 = (cid:104){a1, b1, c1},{(b1, a1)(c1, b1), (b1, c1)}(cid:105)
Applying preferred, complete, grounded, and maximal ideal semantics to solve the
framework yields the following results:
-- Preferred: {b1},{a1, c1}
-- Complete: {b1},{a1, c1},{}
-- Grounded: {}
-- Maximal ideal: {}
semantics are overly strict.
12 In Example 2, we illustrate an empathic agent argumentation scenario, in which grounded
13 For the sake of simplicity, we use a wild card (∗) to denote that the acceptability rule applies
no matter which preference the mitigator agent has. Note that this syntax is not supported by
our implementation.
Implementing Argumentation-enabled Empathic Agents
11
As can be seen, applying preferred or complete semantics does not allow for a clear
decision on whether the acceptability rule should be discarded or not, whereas both
grounded and maximal ideal semantics are addressing this problem by discarding all
arguments that are ambiguous in complete or ideal semantics, respectively. Figure 3
contains a graphical overview of how the different argumentation semantics solve the
argumentation framework of the first example.
c1
b1
a1
Fig. 3: Example 1: argumentation semantics visualization: preferred (bold and grey, respectively).
Grounded and maximal ideal extensions are {}. The preferred argument sets are also complete.
{} is an additional complete set of arguments.
Example 2 Example 2 highlights the advantage of maximal ideal over grounded se-
mantics for the use case in focus. We start with the following empathic agent scenario:
-- Acceptability rules persuader: (Show steak ad,∗) (a2)
-- Acceptability rules mitigator: {}
To resolve the acceptability rule inconsistency, the agents exchange the following argu-
ments:
1. Mitigator: {(a2, Steak ad too unhealthy)} (b2)
2. Persuader: {(b2, Steak ad shows quality meat)} (c2)
3. Mitigator: {(c2, U ser pref ers sweets)} (d2)
4. Persuader: {(d2, T his pref erence does not matter)} (e2)
5. Mitigator: {(e2, d2)}
6. Persuader: {(c2, b2)}
From the scenario specification, the following argumentation framework can be con-
structed:
AF2 = (cid:104){a2, b2, c2, d2, e2},{(b2, a2)(b2, d2), (c2, b2), (d2, c2), (e2, d2)}(cid:105)
Applying preferred, complete, grounded, and maximal ideal semantics to solve the
framework yields the following results:
T. Kampik et al.
12
-- Preferred: {a2, c2, e2}
-- Complete: {a2, c2, e2}, {}
-- Grounded: {}
-- Maximal ideal: {a2, c2, e2}
As can be seen, applying grounded semantics removes acceptability rule a2, although
this rule is not successfully attacked according to the definition stipulated in our re-
quirements. In contrast, applying maximal ideal semantics does not remove a2. Figure 4
contains a graphical overview of how the different argumentation semantics solve the
argumentation framework of the second example.
e2
b2
a2
d2
c2
Fig. 4: Example 2: argumentation semantics visualization: preferred (grey) and maximal ideal
(dashed border). The grounded extension is {}. The preferred/maximal ideal argument set is also
complete. {} is an additional complete set of arguments.
6 Discussion
6.1 Argumentation and Jason
Argumentation in agent-oriented programming languages has been covered by previous
research. In particular, both Berariu [4] and Panisson et al. [14] describe the implemen-
tation of argumentation capabilities with Jason. In contrast to these works, we present
a service-oriented approach for argumentation support that provides one simple func-
tion to solve arguments and thus offers a higher level of abstraction for application
developers. For future work, we suggest considering advanced abstract argumentation
approaches like value-based argumentation [3] to account for agent preferences and
possibilistic argumentation [2] to account for uncertainty. Generally, we consider the
approach of writing service interface extensions for Jason as promising to integrate
with existing relevant technologies, for example to provide technology bridges to tools
and frameworks developed by the machine learning community.
Implementing Argumentation-enabled Empathic Agents
13
6.2 Alternative Negotiation Approaches
We consider the empathic agent approach as fundamentally different from other ne-
gotiation approaches (see for an overview: Fatima and Rahwan [11]) in that the em-
pathic agents only optimize their own utility if acceptability rules explicitly permit
doing so and strongly consider the utility of other agents in their environment. I.e.,
empathic agent application scenarios can be considered at the intersection of mixed-
motive and fully cooperative games. Comprehensive comparisons, in particular with
other argumentation-based negotiation approaches, as for example developed by Black
and Atkinson [5], are certainly relevant future work. For example, simulations that elab-
orate on the benefits and limitations of specific empathic agent implementations could
be developed and executed in scenarios similar to the one presented in the examples of
this paper.
6.3 Limitations
This paper explains how to implement basic empathic agents with Jason and how to
extend Jason to handle scenarios with initially inconsistent beliefs by applying argu-
mentation theory. However, the implemented agents are merely running examples to
illustrate the empathic agent concept and do not solve any practical problem. The fol-
lowing limitations need to be addressed to facilitate real-world applicability:
-- Although we extended Jason to better support the use case in focus, the current
implementation does not provide sufficient abstractions to conveniently implement
complex empathic agents. Moreover, our empathic agent implementation does not
make use of the full range of BDI-related concepts Jason offers.
-- While the agents can find consensus in case of simple belief inconsistencies, they do
not use scalable methods for handling complex scenarios with large state and action
spaces, and are required to explicitly exchange their preferences (utility mappings)
with each other, which is not possible in many application scenarios, in which the
utility mappings need to be learned.
-- So far our empathic agent only interacts with other empathic agents. This simplifi-
cation helps explain the key concepts with basic running examples and is permis-
sible in some possible real-world scenarios, in particular when designing empathic
agents that interact with agents of the same type in closed environments (physically
or virtually) that are not accessible to others. To interact with agents of other de-
signs, the empathic agent concept needs to be further extended, for example, to be
capable of dealing with malevolent agents.
-- The analysis of the argumentation approach is so far limited to the admissible set-
based semantics as introduced in the initial abstract argumentation paper by Dung
[9] that considers arguments as propositional atoms. The structure of the arguments
is not addressed.
6.4 Towards a Generic Empathic Agent
For future research, we suggest further extending Jason -- or to work with alternative pro-
gramming languages and frameworks -- to support more powerful abstractions for imple-
menting empathic agents, for example:
14
T. Kampik et al.
-- Develop engineering-oriented abstractions for empathic agents, possibly following
a previously introduced architecture proposal [13]. While further extending Jason
can facilitate scientific applications and re-use, providing a minimally invasive li-
brary or framework for a general-purpose programming language could help in-
troduce the concept to the software engineering mainstream. User interfaces could
be developed that facilitate the explainability of the empathic agents' decision pro-
cesses.
-- Leverage existing research to better address partial observability and subjectivity.
The aforementioned survey by Albrecht and Stone shows that a body of reinforce-
ment learning research from which can be drawn upon exists [1]. Yet, the general
problem of scaling intelligent agents in complex and uncertain environments re-
mains an open challenge. It would be interesting to investigate how this problem
affects the applicability of our empathic agent.
-- Design and implement empathic agents that can meaningfully interact with agents
of other architectures and ultimately with humans. As a starting point, one could
develop an empathic Jason agent that interacts with a deceptive Jason agent as
introduced by Panisson et al. [15].
-- Extend the analysis of a suitable argumentation semantics for the empathic agent
by considering advanced approaches, for example value-based argumentation as in-
troduced by Bench-Capon [3], and by identifying a feasible structure the arguments
can use internally.
7 Conclusion
In this paper, we show how to implement proof-of-concept prototypes of empathic
agents with an existing multi-agent development framework. Also, we devise an exten-
sion of the previously established empathic agent concept that employs argumentation
theory to account for inconsistent beliefs between agents. In our analysis of different
admissible set-based argumentation semantics, we have determined that maximal ideal
semantics are the most feasible for addressing the problem in focus, as they provide
both an unambiguous solution of a given argumentation framework and are not overly
sceptical (in contrast to grounded semantics) as to which arguments are acceptable.
However, the provided empathic agent implementations do not yet scale to solve
real-world problems. It is important to identify or devise more powerful methods to
handle subjectivity and partial observability, and to ultimately enable empathic agents
to meaningfully interact with agents of other architecture types. On the technology side,
an abstraction specifically for empathic agents is needed that forms a powerful frame-
work for implementing empathic agents. We suggest creating a Jason extension that
can facilitate the implementation of empathic agents with a framework that is famil-
iar to members of the academic multi-agent systems community, but to also consider
providing abstractions for programming frameworks that are popular among industry
software engineers and are not necessarily BDI-oriented or even agent-oriented per se.
Acknowledgements We thank the anonymous reviewers for their constructive feed-
back. This work was partially supported by the Wallenberg AI, Autonomous Systems
and Software Program (WASP) funded by the Knut and Alice Wallenberg Foundation.
Implementing Argumentation-enabled Empathic Agents
15
References
1. Albrecht, S.V., Stone, P.: Autonomous agents modelling other agents: A comprehensive sur-
vey and open problems. Artificial Intelligence 258, 66 -- 95 (May 2018)
2. Alsinet, T., Chesnevar, C.I., Godo, L., Simari, G.R.: A logic programming framework for
possibilistic argumentation: Formalization and logical properties. Fuzzy Sets and Systems
159(10), 1208 -- 1228 (2008)
3. Bench-Capon, T.J.: Persuasion in practical argument using value-based argumentation
frameworks. Journal of Logic and Computation 13(3), 429 -- 448 (2003)
4. Berariu, T.: An argumentation framework for BDI agents. In: Intelligent Distributed Com-
puting VII, pp. 343 -- 354. Springer (2014)
5. Black, E., Atkinson, K.: Choosing persuasive arguments for action. In: The 10th Interna-
tional Conference on Autonomous Agents and Multiagent Systems-Volume 3. pp. 905 -- 912.
International Foundation for Autonomous Agents and Multiagent Systems (2011)
6. Bordini, R.H., Hubner, J.F.: BDI agent programming in AgentSpeak using Jason. In: Inter-
national Workshop on Computational Logic in Multi-Agent Systems. pp. 143 -- 164. Springer
(2005)
7. Christman, J.: Autonomy in moral and political philosophy. In: Zalta, E.N. (ed.) The Stanford
Encyclopedia of Philosophy. Metaphysics Research Lab, Stanford University, spring 2018
edn. (2018)
8. Coplan, A.: Will the real empathy please stand up? a case for a narrow conceptualization.
The Southern Journal of Philosophy 49(s1), 40 -- 65 (2011)
9. Dung, P.M.: On the acceptability of arguments and its fundamental role in nonmonotonic
reasoning, logic programming and n-person games. Artificial Intelligence 77(2), 321 -- 357
(1995)
10. Dung, P.M., Mancarella, P., Toni, F.: Computing ideal sceptical argumentation. Artificial
Intelligence 171(10-15), 642 -- 674 (2007)
11. Fatima, S., Rahwan, I.: Negotiation and bargaining. In: Weiss, G. (ed.) Multiagent Systems,
Second Edition, chap. 4, pp. 143 -- 176. MIT Press, Cambridge (2013)
12. Kampik, T., Nieves, J.C., Lindgren, H.: Coercion and deception in persuasive technologies.
In: 20th International TRUST Workshop (Jul 2018)
13. Kampik, T., Nieves, J.C., Lindgren, H.: Towards empathic autonomous agents. In: 6th In-
ternational Workshop on Engineering Multi-Agent Systems (EMAS 2018). Stockholm (Jul
2018)
14. Panisson, A.R., Meneguzzi, F., Vieira, R., Bordini, R.H.: An approach for argumentation-
based reasoning using defeasible logic in multi-agent programming languages. In: 11th In-
ternational Workshop on Argumentation in Multiagent Systems (2014)
15. Panisson, A.R., Sarkadi, S., McBurney, P., Parson, S., Bordini, R.H.: Lies, Bullshit, and De-
ception in Agent-Oriented Programming Languages. In: 20th International TRUST Work-
shop. Stockholm (Jul 2018)
16. Rahwan, I.: Argumentation among agents. In: Weiss, G. (ed.) Multiagent Systems, Second
Edition, chap. 5, pp. 177 -- 210. MIT Press, Cambridge (2013)
17. Sen, S., Crawford, C., Rahaman, Z., Osman, Y.: Agents for Social (Media) Change. In: Pro-
ceedings of the 17th International Conference on Autonomous Agents and Multiagent Sys-
tems (AAMAS 2018). Stockholm (Jul 2018)
18. Thimm, M.: Tweety - A Comprehensive Collection of Java Libraries for Logical Aspects
of Artificial Intelligence and Knowledge Representation. In: Proceedings of the 14th Inter-
national Conference on Principles of Knowledge Representation and Reasoning (KR'14).
Vienna, Austria (Jul 2014)
|
0902.2751 | 4 | 0902 | 2009-03-01T10:35:34 | Object Classification by means of Multi-Feature Concept Learning in a Multi Expert-Agent System | [
"cs.MA",
"cs.LG"
] | Classification of some objects in classes of concepts is an essential and even breathtaking task in many applications. A solution is discussed here based on Multi-Agent systems. A kernel of some expert agents in several classes is to consult a central agent decide among the classification problem of a certain object. This kernel is moderated with the center agent, trying to manage the querying agents for any decision problem by means of a data-header like feature set. Agents have cooperation among concepts related to the classes of this classification decision-making; and may affect on each others' results on a certain query object in a multi-agent learning approach. This leads to an online feature learning via the consulting trend. The performance is discussed to be much better in comparison to some other prior trends while system's message passing overload is decreased to less agents and the expertism helps the performance and operability of system win the comparison. | cs.MA | cs | Object Classification by means of
Multi-Feature Concept Learning in a Multi Expert-
Nima Mirbakhsh
CS Department, IASBS
[email protected]
Agent System
Arman Didandeh
CS Department, IASBS
[email protected]
Mohsen Afsharchi
CS Department, IASBS
[email protected]
Abstract -- Classification of some objects in classes of related
concepts is an essential and even breathtaking task in many
applications. A solution is discussed here based on Multi-Agent
systems. A kernel of some expert agents in several classes is to
consult a central agent decide among the classification problem
of a certain object. This kernel is moderated with the center
agent, trying to manage the querying agents for any decision
problem by means of a data-header like feature set. Agents have
cooperation among concepts related to the classes of this
classification decision-making; and may affect on each others'
results on a certain query object in a multi-agent learning
approach. This leads to an online feature learning via the
consulting trend. The performance is discussed to be much better
in comparison to some other prior trends while system's message
passing overload id decreased to less agents and the expertism
helps the performance and operability of system win the
comparison.
Keywords-component; Agent, Feature, Concept Learning,
Expertism
I.
INTRODUCTION
In this part, we represent some definitions to clarify the
expressions we are going to use in the following parts of this
paper:
AGENTS, MAS AND EXPERTISM
Fortunately or unfortunately,
there are very several
definitions for an Agent like [8] or [9]. To meet the term in a
more general look, an agent is a tool that carries out some task
or tasks on behalf of a human. Intelligent agents have
additional domain knowledge that enables them to carry out
their tasks even when the parameters of the task change or
when unexpected situations arise. Many intelligent agents are
able to learn, from their own performance, from other agents,
from the user, or from the environment in which they are
situated. An intelligent Agent has properties as: Autonomy,
Ability to Learn, Cooperation &many other ones [4]. Giving a
more formal definition, an agent is defined in [5].
A Multi Agent System is a system consisting of several,
not-the-same-type agents which are in collaboration with
eachother to do a complicated task, usually with some
constraints like time and recourses. The MAS is studied for
many reasons and by so many pioneers of AI, esp. for Agent-
Studying, Decision Making and also Expert Systems. The most
important obstacle to be met in perusal of MAS is the trade-off
between performance-based and goal-based nature of agents
gathering together to model the MAS, where usually a trade-off
seems to be undeniable.
"The goal of Multi Agent Systems' research is to find
methods that allow us to build complex systems composed of
autonomous agents who, while operating on local knowledge
and possessing only limited abilities, are nonetheless capable of
enacting the desired global behaviors." [6]
Regarding an Expert-Agent, we usually mean an agent
which is able to decide about a specific topic so much better
than some others agents. This ability may be gained with agent
collaboration in a MAS, with learning among some dataset or
using any other way of decision optimization. If we have a
MAS in which agent are to be experts in their own area of
deciding problems, then we will have a Multi Expert-Agent
System.
CONCEPTS, OBJECTS AND FEATURES
As we look around into the world we live, it is available to
understand several things and differentiate them from others.
This task of differentiation is because of that these being
compared things are under some sort of experiment to show
their specific characteristics as a react in response to some
query-like act. These responses are generated due to the
characteristics which are known under the set of "Features". It
is clear that the sets we are mentioning here are not disjoint, but
have several in common among eachother.
The THINGS which are carrying these feature sets as a
collection of properties are called "Objects". Objects are
exactly what we see in the world around. But what is making
the difference between these objects to generate the responses?
Several objects may carry several feature sets which have
nothing in common or may share some or even all features in
their feature sets. Besides the set of all features that can
introduce the objects to us, one more important matter to be
remi
takin
is de
and
amo
inded is the v
ng in compari
efined with the
also with the
ng the set of a
values that th
son to other o
e set of all fea
specific valu
all values they
hese features
objects in com
atures carrying
es that these f
y can be instan
can take and
mmon. So an o
g in its feature
features are ta
ntiated with.
d are
object
e set;
aking
B
But what is ha
at le
ast very likely
course that the
Of c
also
they have f
hother. When
each
ng looked, the
bein
like,
we are menti
esentation ca
repre
colle
ection of all
h most proxim
with
share
e in their feat
take-, the mor
can t
It is
s clear for su
mbers of a C
mem
stand
dpoint of Obje
appening when
y to be the sam
ese objects are
feature values
we have suc
ey remind us
ioning a more
alled
the "C
objects that a
mity. The mo
ture sets -- an
re we call them
ure that the le
Concept-famil
ect Orientation
n some objects
me when they
e near in the s
s that make t
ch groups of
of some othe
e abstract elem
Concept". C
are usually ca
ore these coll
nd also in the
m an integrate
evel of proxi
y can be m
n.
s seem the sam
are being stud
set of features
them come a
objects that w
er objects of
ment of knowl
Concepts are
arrying featur
ections of ob
set of values
ed unique con
imity between
modeled under
me or
died?
s and
about
while
their
ledge
the
re set
bjects
they
ncept.
n the
r the
CONCEPT
LEARNING
A
A very import
Agen
nt systems is
deal with each
to d
w nothing or
know
ut. This mak
abou
ning. Several
learn
ning where so
learn
set o
of peer agent
ther. A good
toge
be m
met in [1].
munication in M
tant hindrance
always put on
h other about
even are not
kes us deal
attempts was
ome agent lear
ts into the sy
example of "
e about comm
n where some
t some concep
t sure to have
with the pro
made on the p
rns some conc
ystem they ar
"New Concep
agents are wi
pts of which
e unanimous i
oblem of con
process of con
cept from one
re collaboratin
pt Learning" c
Multi
illing
they
ideas
ncept
ncept
e or a
ng in
could
We here addre
W
of which w
roach. In [3],
-unanimous co
oncept fluctu
phery objects.
analogy of it w
ess the attemp
we believe is
Afsharchi et
oncepts for wh
uate between
. We will later
with [3] in bas
idea
appr
non-
a co
perip
the a
ts made in [3]
having a lot
al. brings to
hich they allow
two bounda
r talk more on
e ideas.
] while it has s
t common to
o front the ide
w the definitio
aries of core
n our approach
some
o our
ea of
on of
and
h and
II. APPROA
ACH OVERVIEW
W
A
Assume that
dinality of M
sisting of an ob
ome of these m
s is so similar
ch we mention
cts are assum
ed system for
acted from kn
port of initial d
Naïve-Bayes
we have som
M, let's say {
bject to decide
main classes t
to many appl
n here [2] and
med to be text
the task of
nown Machine
datasets. [10]
classifier in a
me set of ma
C1, C2, …,
e about, could
to be classifie
lication-based
d [10]. In both
in a web pag
classification
e Learning me
has this task d
hierarchical s
ain classes w
CM}. Any q
d go mapped to
ed into our sys
d previous task
mentioned w
ge. [2] uses a
and the rule
ethods with a
done with the
structure.
with a
uery,
o one
stem.
ks, of
works,
rule-
s are
good
help
card
cons
or so
This
whic
obje
base
extra
supp
of a
H
Here we intro
M} which each
AgM
ses. We try t
class
decid
ding over on
em, annotatin
syste
ording to the p
acco
conc
cepts for incom
oduce M agen
is willing to b
to make any
ne and only o
ng the known
probability of
ming queries.
nts, let to nam
be an expert o
Agent, Agi to
one of the ma
features of t
f those feature
These agents
me {Ag1, Ag2,
on one of the
o be an expe
ain classes o
their main cla
es representing
have collabor
. . .,
main
ert in
f the
asses,
g the
ration
unde
with
thes
fact
any
over
er the name o
h eachother. It
e main classe
is not an obs
agent over its
r such hindran
of MAS and
t's somehow
es may have s
stacle to our a
s own class is
nces.
have the rela
clear that at m
something in
approach whil
important her
ation called "P
most attention
common. Bu
le the expertis
re, and is a triu
Peer"
n, yet
ut this
sm of
umph
T
To moderate t
ong agents/cla
amo
nt, called the C
agen
h any agent r
with
em maintains
syste
the s
system at any
ward the quer
forw
patching is hel
disp
gree of confi
"deg
Cen
nterAgent thin
n. It then inc
upon
ing job on t
mixi
fidence and g
conf
uld the incom
wou
outp
putted as a se
ure 1 shows h
Figu
from
m outside.
the action of
asses, we utili
CenterAgent a
epresenting a
an abstract in
y time, and du
ry to a subset
ld under some
idence" whic
nks the object
epts the resul
these results
gets a percepti
ming object a
et of concepts
how this syst
dispatching th
ize a more ge
and has the rel
a main class.
nformation of
ue to this infor
t of all its ag
e value of pro
ch shows to
is for the pa
lts of all its p
with regard
ion on in whi
a consonant b
s with the mo
tem works wh
he incoming q
eneral and ab
lation called "
This entity o
f all other agen
rmation, decid
gents. The ta
obability, calle
what extents
air agent to d
pair agents, do
to the degre
ch class or cl
be. This resu
ost probable p
hen you look
query
stract
"Pair"
of our
nts of
des to
sk of
ed the
s our
decide
oes a
ee of
lasses
ult is
posse.
k at it
Figure 1.
i
is the big picture
of the system bei
ing discussed
A
Another impo
nt, having a se
agen
ble to revise
is ab
conc
cept of that m
ries. These qu
quer
data
aset to learn th
ortant matter
et of features f
the probabili
main class in t
ueries are also
he agent on fea
in our appr
for its corresp
ities of featur
time with the
o utilized as a
atures related t
roach is that
ponding main c
res expressing
e help of inco
a shape of sui
to its main cla
each
class,
g the
oming
itable
ass.
A
A talk on mo
syste
ems operabilit
ore details com
ty and perform
mes next, and
mance after.
d the discussio
on of
III. MOR
N
RE DISCUSSION
A. B
Before Runnin
ng the System
H
Here we prov
ume that our
se main class
erts before th
vide the proced
system is equ
ses are gathere
e system initi
dure of our sy
uipped with s
ed and approv
ialization, and
ystem. At firs
some base cla
ved by a grou
d then are fed
st, we
asses.
up of
d into
assu
The
expe
the k
abstr
Supe
conc
child
abstr
more
hiera
kernel of syst
ract concept w
erConcept is
cepts in the di
dren of the ma
ract agent lik
e concrete ag
archy is shown
tem. Each ma
which is name
the parent
scussed criter
ain classes. Th
ke CenterAgen
ents like its p
n in Figure 2.
ain class repre
ed here as a S
of a group
ria, which thes
his is as we ar
nt holding the
pair decision-e
esents a some
uperConcept.
of more det
se concepts ar
re talking abo
e control of s
expert agents.
ehow
This
tailed
re the
ut an
some
. The
Figu
ure 2. shows the
e hierarchy of con
to
o the system mod
ncepts and the rela
del being discusse
ation of this hiera
ed
archy
is a
E
Each of these
r own, are m
their
cept
conc
racteristics of t
char
here
named as f
archical repre
hiera
node in the lo
any
he SuperConc
of th
repre
esenting the p
abstract main
modeled with
group of o
their own in g
features and a
esentation we
ower levels of
cept, holding
arent SuperCo
n classes holdi
a group of
objects havin
general. These
are held in a
are using he
f the hierarchy
a subset of
ing the Conce
features, wh
ng
the com
characteristic
a feature set.
ere lets us pro
y as a SubCon
the base fea
ept of
hile a
mmon
cs are
The
ovide
ncept
atures
oncept.
T
These base fea
system befor
our
runn
are r
of ou
poin
ning the system
reserved into t
ur CenterAge
nting the conce
atures we are
re its initializ
m. A set of al
the CenterAge
ent's base feat
epts of that cla
discussing her
zation with he
l base feature
ent and some
tures into any
ass.
re are also fed
elp of the ex
s for all M cla
M disjoint su
main class a
d into
xperts
asses
ubsets
agent,
B
Before discus
sing about th
essen
ntial to expla
ain more on s
ne two thresh
defin
holds, after W
babilities of ea
prob
ach class's fea
y feature inclu
Any
uding the bas
m experts at th
from
he beginning o
a reg
gion above the
e first threshol
on as [1]. Any
regio
y feature betw
yet another re
in y
egion, named
w the second
belo
d threshold is
regio
on features ha
ave the most p
er a main cl
unde
lass, while b
formance of c
perfo
classification
ures have a lo
featu
ower probabili
authorized to
are a
either enter t
featu
ure set for the
e D-region. T
may not refl
who
ect any prope
reserved in the
are r
e agent featur
track
k -- maybe the
dispatching w
e- and to be a
time
allowed to ye
impa
acting on gen
nerating the re
.
nt's feature set
agen
he starting of
some idea we
Williams [1]
atures, being h
se features o
of system runn
ld. We name th
ween the two th
as the M re
placed into a
probability to
eing revised
to the system
ity showing th
the K-region
The D-region
erty of the cla
re collection i
was false ove
et come back
esult. Figure
f the system,
e are utilizing
for governing
held in each a
f subjective i
ning, is placed
his region as t
hresholds is pl
gion. Any fe
D-region. Th
show the con
to give the
m. The M-re
he main class
or even leave
features are t
ass they are in
in order to be
er a long perio
to the region
3 shows one
it is
. We
g the
agent.
ideas
d into
the K
laced
eature
he K-
cepts
best
egion
s, but
e the
those
n, but
kept
od of
ns of
e pair
Fig
gure 3. Figure (3
including the K
3) is the represen
K, M and D-regio
ntation of an agen
n features with th
nt's feature collect
heir probabilities
tion,
T
This all mean
K-re
egion features
a set of M-reg
and
M threshold
and
erating and se
gene
patched query.
disp
of al
ll classes are g
ide about the
deci
This
s is shown in F
ns that each ag
s with upper
gion features w
ds. These feat
ending results
Yet another s
gathered toget
dispatching ta
Figure 4 below
gent of a main
threshold K-
with probabili
ture sets are
back to the C
set of all these
ther in the Cen
ask of any late
w.
n class has a s
-region proba
ities between t
the main hel
CenterAgent o
e K-region fea
nterAgent to h
er incoming q
set of
ability
the K
lp on
on its
atures
help it
query.
Figu
ure 4. show the
relation between
feature c
n CenterAgent and
collection
d its pair agents o
on the
B. R
Running the sy
ystem
W
When a newl
cess is done
ect, which are
hen forwarded
. The CenterA
ection of tags
agents -- whic
ly come obje
to extract th
named as tag
d to CenterAge
Agent, now re
s and based o
ch is the base f
ect arises to o
he collection
g collection. T
ent as the coll
eads the queri
on its abstract
feature set dis
our system, a
of features in
This queried o
lection of extr
ied object usin
t knowledge o
cussed above
a pre-
n the
object
racted
ng its
of its
to be
proc
obje
is th
tags
colle
pair
held
to di
tags
disp
degr
any
our
pair
prob
sear
prob
This
Cen
and
of c
vect
inco
shou
d in the kernel
ispatch this qu
to one or s
patching task i
ree our Center
pair agent. T
CenterAgent o
agent Agi n
babilities of e
rches for ma
bability and pa
s package is
nterAgent sorts
generates a v
onfidence for
tor consists o
oming queried
uld be what is
l of this syste
uery in a stand
some pair ag
is under a deg
rAgent thinks
These pair age
on deciding ab
now viewing
expertism, say
apping featur
ackages this a
sent back t
s these packag
vector of outgo
r any result co
of main clas
d object repres
seen as the re
em- and their
dard view incl
gents. As onc
gree of confid
the dispatchin
ents would be
bout the classi
g over its se
ay {<fj, pj>
res to some
s a result of th
towards the
ges of results f
oing output lo
oming from an
ses and the
senting any of
esult of the sys
expertism, de
luding its extr
ce mentioned,
dence which i
ng is done trul
as a consulta
ification task.
t of features
fj Ki !
concept wi
he incoming q
CenterAgent.
from its pair a
ooking at its d
ny pair agent.
likelihood o
f them. This v
stem but its us
ecides
racted
, this
is the
ly for
ant to
Each
s and
Mi},
ith a
query.
Our
agents
egree
This
f the
vector
ser.
C. L
Learning more
e on each age
ent's feature pr
robabilities
O
Our object-cla
h the help of t
with
ch it stores so
whic
subconcepts o
the
ures on the h
featu
expe
ert agent m
terAgent. The
Cent
ures, here tags
featu
ection or not.
colle
agent to indiv
any
their corresp
and
set. Wheneve
datas
ed to an agen
pass
query and the
the q
expe
ert agent -- in
esponding pr
corre
mory, named t
mem
t recently inco
most
wn in Figure
show
featu
ure for describ
he queries bein
of th
and
over for Agi
bability that th
prob
cepts is releva
conc
featu
ure on decisio
ut it repeating
abou
assification m
the collection
me K, M and
of its own m
hierarchy of p
meets some
multi-agent sys
of features an
d D region fea
main class. W
probabilities,
dispatched q
ese objects, f
for sure inclu
s, which may
be a member
This may lea
ad to have a
vidually learn
and revise its
ponding prob
babilities due
er a new obje
ect consisting
nt, it is going
to keep track
eir density ov
ver time. For
addition to
its collection
obabilities- is
s equipped w
the "Time-Inte
erval Memory
oming feature
es. This time-i
5. Here the a
agent can dis
bing its own c
concepts over
ng passed to
it. If a feature
and it is in t
the base featu
his feature is
more helpful
ant. Unlike it i
is cool to low
on making ta
asks which w
s.
in Ci concepts
stem does its
nd probabilitie
atures, represen
While having t
any willing-to
queries from
ude some se
of any main
feature datase
s feature colle
to the incom
of several ta
k of the tags in
this purpose,
n of features
with a time-b
y" to keep trac
interval memo
scover any ne
the whole fea
e fj is coming
ures of it, then
l for describin
wer the impact
we are not so
task
es, in
nting
these
o-be-
the
veral
class
et for
ction
ming
ags is
nside
, any
and
based
ck of
ory is
eeded
atures
over
n the
ng Ci
t of a
sure
Fig
gure 5. Figure (5
feature c
5) shows the struc
collection besides
cture of any pair
s its time-interval
agent on holding
l memory
g the
D. L
Learning best f
features by an
ny agent
T
The above to
nts to collabor
agen
featu
ures with the
cess of object
proc
h its peer age
with
MAS
S by consultin
w deciding feat
now
ld tag collect
rate within an
e help of the
t classification
ents, trying to
ng on whethe
tures.
tion is also a
nd do some e
e peer agents
n, any agent
o improve the
er they know
a good datase
extra learning
s. Along with
has a correl
e expertism o
anything abou
et for
over
h the
lation
f the
ut its
are parts
F
For this purpo
keep
ping track of m
tags
Cent
help
whic
begi
its p
cons
its m
terAgent, ther
ful to Agi in i
ch could be a
nning by the
peer agents.
sults on the n
memory time s
se, again we u
most recently i
of a query
re may come
its future deci
base feature o
expert team.
Simply talki
on-familiar fe
slice over and
utilize the tim
incoming feat
y which
is
some feature
ision making p
of Ci but is no
Here Agi nee
ng about thi
eatures which
over.
me-interval mem
tures. Almost t
dispatched
es which coul
processes, i.e.
ot mentioned a
eds to consult
is procedure,
are repeated
mory
these
from
ld be
. tags
at the
with
Agi
over
If this process
I
wly-come featu
new
there
e has to be so
ure probabiliti
featu
of consulting
ure should be
ome raise/redu
ies.
g leads to this p
added to Agi
uce modificati
perception tha
i's feature set,
ion on peer ag
at this
, then
gents'
L
Let us suppose
ts time-interva
in it
featu
ure set. Now A
ropriate proba
appr
on. As it fin
regio
bability of this
prob
one over and o
is do
the M
M and K regi
cedure is call
proc
nd out that th
foun
on features an
regio
is re
epresenting, i
in and put it
agai
blem while w
prob
ses to be disjo
clas
he CenterAgen
in th
som
me other agents
tacle, we prov
obst
e that Agi has
al memory in
Agi adds this
ability, let to b
nds the featur
s feature to som
over until this
ons, which is
led the raise
his feature ha
nd could be a b
it would like
up to its K
e have govern
oint subsets of
nt), and it is p
s' K-region fe
ide an approac
s found some n
nteresting for
feature to its
be the floor pr
re more intere
me extent, let
s feature reach
the first defin
procedure. N
s a lot in com
base feature fo
to add the f
K-region. But
ned the K-reg
f all-features s
possible for fj
eature sets. In
ch as below:
new feature, s
itself to add
feature set wi
robability of it
esting, it add
us suppose .
hes to the bord
ned threshold.
Now that Ag
mmon with it
for the main cl
feature proba
this may cau
gion features o
set (being rese
to be a memb
order to solve
say fj,
to its
ith an
ts M-
ds the
. This
der of
This
i has
ts K-
lass it
ability
use a
of all
erved
ber of
e this
"
"Whenever an
ature fj suitab
a fea
with
h its peer agen
egion. If not s
K-re
ropriate proba
appr
on. But in the
regio
peer
r agents, let A
nts having it i
agen
pose . This p
supp
w this fact tha
know
procedure co
fall
abov
ve, now."
n agent Agi re
ble to enter its
nts on whether
so, add fj to t
ability, let to
e case of hav
Agi reduce th
in their K-reg
procedure is ca
at no peer agen
omprises the c
eaches to the p
s K-region, le
r they have suc
the feature set
be the floor
ing the contra
he probability
gion to some e
alled the fall p
nt has fj in its
contradiction.
point where it
t the agent co
ch a feature in
ts of Ci with
probability o
adiction withi
of fj for the
extent, let us
procedure. Le
K-region whe
Let Agi add
finds
onsult
n their
some
of K-
in the
peer
again
et Agi
en the
fj as
T
The more inte
all peer agen
ses the -value
can have yet
s by adding fj
eresting this fe
nts for their a
e probability r
again disjoin
to Agi's class
eature is for Ag
advisory sight
reduce happen
nt sets of base
s feature set.
for
caus
we
clas
gi, the more it
t, and the mo
n. This is done
e features for
t calls
ost it
e until
each
E. D
Differences w
with prior attem
mpts on the top
pic
S
Several attemp
ect classificati
obje
point of view
our p
he list of its
in th
diffe
erences in a co
ed on [1] and W
base
pts have been
ion, of which
is Williams' [
citations! So
omparison bet
Williams hims
n made on con
the one that
[1]. This impo
o we provide
tween our app
self.
ncept learning
is so importa
ortance shows
some outstan
proach and the
g and
ant in
itself
nding
e ones
W
Williams' wor
K, M and D
cepts. This is
approaches.
ures in an age
iding about w
oming query o
ures. The next
s and then us
performance
rk is based on
D regions for
the first poin
We utilize t
ent's feature co
which features
or easier to say
t is Williams u
ses these rules
of such syste
n features, as
deciding abo
nt of disagree
these regions
ollection. This
s to let in d
y, to decide ab
uses features
s to decide. B
ems is directly
ours. But he
out the additio
ement betwee
s to moderate
s moderation
eciding about
bout the additi
to generate se
But we believe
y dependant t
e uses
on of
n the
e the
is for
t any
ion of
everal
e that
to the
the
conc
two
featu
deci
inco
featu
rule
the
number of rules we use. Better to say, each time we ask
something in our system, we are using some resources. So it is
better to lower the number of these queries. Another matter is
that the probabilities which Williams use are put over the rules
that he uses. In our approach, the rule set is somehow constant
and the decision making task is due to the feature collection
and their corresponding probabilities. It is once told above that
this feature-probability collection is allowed to shrink or
expand during system working time.
As a big picture to get the differences, Williams uses some
agent to collaborate about learning some concepts with
questioning eachother whether anyone knows anything about
the mentioned concept. We are using a MAS with several
expert agents, each in some realm of knowledge, to decide on
classifying one object into one or some of the realms, known as
concepts. This is done by utilizing the implicit knowledge of
our expert agents. This knowledge is represented as a
collection of coupled feature-probability metadata.
F. Fault Tolerance, Performance and Operability
It is clear from the above section "Learning more on each
agent's feature probabilities" that if some feature fj is wrongly
supposed to be added to some class's feature sets and it is
inserted to the M-region for that reason-and even increased
during some interval of false tag mentioning-, after a period of
time that it is not mentioned in its forwarded objects by the
CenterAgent, we would have the system automatically lower
its probability to lower M-region and may also to D-region not
to have bad impact on our system. This fact exists in the steady
state for the wrong features that some expert would falsely put
into some agent's body.
Another matter is the performance of this system, trying to
make its agents expert in some fields. As time goes by, the
features of a same kind and similar -- not in essence but in
concept recognition- gather together in collections, showing the
concepts they are the representative to identify with. Besides,
the reserved collection of all the disjoint class features sets in
the CenterAgent makes the system lower the message passing
rate among the pair and peer agents after a period of system
execution. This means that the CenterAgent has to consult with
fewer consultants and even get a better result and it is indeed
an economical thrift in the realm of decision making. Of course
that it will not appear when the class numbers are in the order
of 10 or 100. But suppose that we are willing to decide upon
100000 or 1000000 classes to correlate some objects into them.
Using the methods based on [1] and of course itself, any agent
should consult to any other agent on knowing anything about
the decision matter. Unavoidably a great extent of this message
passing is for nothing while there are so many agents that are
not aware of what the concept is or what objects point to it.
Using our approach in a MAS, the CenterAgent consults only
to some agents -of an order of for example 50 or 100- whether
they could help the decision making problem. It is discussed
before that these agent are the most probable agents on most
probable concepts that the pointed object could be a match for.
We believe that it is clear that such a system is better in
performance in comparison to its parents. We also believe that
the operability of such approach in any realm of application is
fully applicable and also implementable.
CONCLUSION AND FUTURE WORK
Here we addressed a method of concept learning in a Multi
Agent system, in which several agents are labeled to be an
expert in a specific domain of itself. This is supposed to be a
good way for object classification -into some known main
classes- in almost any application domain. Along with this
going on, we would like to let our system add needed (willing
to be expert) agents for any newly accepted main concept
classes. Another work is to revise the likelihood of concept
features, based on their agent-rules along the time. We would
like to mention these tasks in near future.
REFERENCES
[1] A. B. Williams: Learning to Share Meaning in a Multi-Agent System;
Autonomous Agents and Multi-Agent Systems, 8, 165-193; 2004
Kluwer Academic Publishers, Manufactured in Netherlands.
[2] L. Gravano, P. G. Ipeirotis, M. Sahami: QProber: A System for
Automatic Classification of Hidden-Web Databases
[3] M. Afsharchi, J. Denzinger, B.H. Far: Enhancing Communication with
Groups of Agents using Learned Non-Unanimous Ontology Concepts;
Web Intelligence and Agent Systems 3 (2007) 1-3; IOS Press;
[4] B. Coppin: Artificial Intelligence Illuminated; Jones and Bartlett
Publishers 2004; Sudbury, Massachusetts; pages 543-546.
[5] M. Afsharchi: Ontology-Guided Collaborative Concept Learning in
Multiagent Systems; PhD Thesis; DEPARTMENT OF ELECTRICAL
AND COMPUTER ENGINEERING, UNIVERSITY OF CALGARY;
pages 13-15.
J. M. Vidal: Fundamentals of Multiagent Systems; 24th August 2007;
page 9.
[6]
[7] N. J. Nilsson: Artificial Intelligence, a New Synthesis; Morgan
Kaufmann Publishers Inc., 1998.
[8] S. J. Russell, P. Norvig: Artificial Intelligence, a Modern Approach, 2nd
Edition; Prentice Hall Series in AI, 2002.
[9] M. Afsharchi, B.H. Far, J. Denzinger: Ontology-Guided Learning to
Improve Communication between Groups of Agents; Proceedings of the
5th International Joint Conference on Autonomous and Multi-Agent
Systems, 923-930; Hakodate, Japan 2006.
[10] D. Koller, M. Sahami: Hierarchically Classifying Documents using few
words.
|
1509.04826 | 1 | 1509 | 2015-09-16T06:48:04 | Inter-Robot Interactions in Multi-Robot Systems Using Braids | [
"cs.MA",
"cs.RO",
"eess.SY"
] | This paper describes a framework for multi-robot coordination and motion planning with emphasis on inter-agent interactions. We focus on the characterization of inter-agent interactions with sufficient level of abstraction so as to allow for the enforcement of desired interaction patterns in a provably safe (i.e., collision-free) manner, e.g., for achieving rich movement patterns in a shared space, or to exchange sensor information. We propose to specify interaction patterns through elements of the so-called braid group. This allows us to not focus on a particular pattern per se, but rather on the problem of being able to execute a whole class of patterns. The result from such a construction is a hybrid system driven by symbolic inputs that must be mapped onto actual paths that both realize the desired interaction levels and remain safe in the sense that collisions are avoided. | cs.MA | cs | Inter-Robot Interactions in
Multi-Robot Systems Using Braids
Yancy Diaz-Mercado and Magnus Egerstedt
1
5
1
0
2
p
e
S
6
1
]
A
M
.
s
c
[
1
v
6
2
8
4
0
.
9
0
5
1
:
v
i
X
r
a
Abstract -- This paper describes a framework for multi-robot
coordination and motion planning with emphasis on inter-agent
interactions. We focus on the characterization of inter-agent
interactions with sufficient level of abstraction so as to allow
for the enforcement of desired interaction patterns in a provably
safe (i.e., collision-free) manner, e.g., for achieving rich movement
patterns in a shared space, or to exchange sensor information. We
propose to specify interaction patterns through elements of the
so-called braid group. This allows us to not focus on a particular
pattern per se, but rather on the problem of being able to execute
a whole class of patterns. The result from such a construction is
a hybrid system driven by symbolic inputs that must be mapped
onto actual paths that both realize the desired interaction levels
and remain safe in the sense that collisions are avoided.
I. INTRODUCTION
M ANY applications have been proposed for multi-
robot systems. For example, the multi-robot foraging
paradigm, in which agents wander around an environment
searching for items of interest [1], [2], can relate to many
real-world problems (e.g., waste or specimen collection in
hazardous environments, explosive detection and disposal, and
search and rescue operations after a crisis such as floods and
earthquakes). Another application of interest in the research
community and in industry is cooperative assembly [3], [4] and
self-assembly [5], [6]. In the cooperative assembly scenario,
multiple robots need to coordinate their motion in order to
cooperatively assemble a structure using a possibly heteroge-
neous set of tools, end effectors, skills, or parts. Similarly, in
the self-assembly scenario, multiple robots need to coordinate
their motion in order to collectively form a structure or achieve
a geometric configuration. There has been a recent push for
robotic farming and precision agriculture [7], [8], where a fleet
of robots is sent to gather data on the status of crops, tend
to and harvest them. In some communication architectures,
mobile agents called data MULEs or message ferries [9] --
[11] are used to transport data between sensors, access points,
or base stations,
to
establish physical communication. Multi-robot simultaneous
localization and mapping (SLAM) takes advantage of the robot
team's size to attain a more complete (or more detailed) map
faster than with a single robot by combining information from
multiple sources and coordinating motion [12], [13]. Other
applications include transportation systems (e.g., intelligent
highways, air traffic control) [14], and the convoy protection
scenario (e.g., surveillance, coverage) [15].
in situations where it
is impractical
The authors are is with the Department of Electrical and Computer
Engineering, Georgia Institute of Technology, Atlanta, GA, 30332 USA.
E-mail: {[email protected], [email protected]}.
In many of these applications, the overall objectives can
be stated in terms of making a team of robots follow a
physical path, such as a road or the movements of a ground
convoy, while ensuring that particular search patterns are
executed [16] -- [18]. These patterns should be selected in such
a way that certain secondary geometric objectives are met,
including ensuring that an area along the path is covered, that
multiple views of the same objects are achieved, that an aerial
vehicle is always on top of the convoy, or that sufficiently
many vehicle-to-vehicle interactions take place for the purpose
of information sharing [19], [20]. In this work, we collect
all of these different secondary objectives under one unified
banner, namely multi-robot mixing. In particular, we specify
interaction patterns with certain desired levels of mixing, and
then proceed to generate the actual cooperative movements
that realize these mixing levels.
In this paper we study the problem of characterizing inter-
robot interactions for the sake of coordination and collision
avoidance. We specify the mixing patterns through elements
of the so-called braid group [21], [22], where each element
corresponds to a particular mixing pattern, i.e., we do not focus
on a particular pattern per se, but rather on the problem of
being able to execute a whole class of patterns. The result
from such a construction is a hybrid system driven by symbolic
inputs [23], i.e., the braids, that must be mapped onto actual
paths that both obtain the mixing level specified through the
braid, and remain safe in the sense that collisions are avoided.
The use of symbolic inputs allows us to abstract away
the geometry and physical constraints involved in the multi-
robot motion planning. As described in [23], this provides
the advantage of hierarchical abstractions that are typically
broken into three stages. At the top layer is the specification
level, which describes the motion tasks (such as robots A and
B should interact, and arrive at the goal simultaneously). The
second layer is the execution level, which describes how to
obtain the motion plans, e.g., by generating trajectories based
on optimality conditions. The bottom layer is the implemen-
tation level, which concerns itself with constructing the robot
controller, e.g., to track a reference trajectory. This work also
extends the notions presented in [24] for trajectory tracking of
virtual vehicles. The idea there is to have the physical vehicles
track a virtual vehicle, as opposed to a path (or trajectory)
itself. The virtual vehicle, which is being controlled directly
with simplified dynamics, can be controlled in order to track a
reference path while satisfying the constraints, compensating
for the physical vehicle's dynamics and other disturbances.
The outline of the paper is as follows: in Section II we
start with a brief summary of the existing literature on braid-
ing for the sake of multi-robot motion planning; in Section
II-B, the braid group is introduced as a way of specifying
mixing levels and the corresponding symbolic braid objects
are given a geometric interpretation in terms of planar robot
paths; controllers are then proposed so that mixing strategies
satisfying a given specification can be executed by a class of
robots as described in Section III, together with a bound on the
highest achievable mixing level. In Section IV, implementation
of these controllers on actual robotic platforms is addressed,
and these ideas are deployed on a team of actual mobile robots.
II. BRAIDS AND ROBOTICS
The use of braids for robot motion planning has been
considered before. Using the notion of configuration space
[25] for robot motion planning, [26] studies the problem
of construction and classification of configuration spaces for
graphs, e.g., robots on a manufacturing floor constrained on
rails or paths. By studying the topological data associated with
these graphs, such as the braid groups, he is able to provide
a measure of the complexity of the control problem (e.g., the
construction of potential field controllers on homeomorphic
spaces).
In [27], the graph braid group is used as the fundamental
group of the configuration space of graphs that describe robot
motion. There, each graph in the configuration space repre-
sents discretized collision-free robotic motion plan (e.g. road
maps), where at each discrete time the graph vertices represent
the positions of robots and (possibly moving) obstacles, and
the edges represent fixed tracks connecting these vertices.
They present an algorithm to construct the presentation of the
graph braid group of N agents, where the group generators
(i.e., the braids) represent actual paths between configurations
of robots on the graph, i.e., the motion plan to transition from
one configuration to another. However, they only consider
zero-size robots where they rely on a "one edge separation"
between points at all times to avoid collisions, and as such,
their approach is purely academic and mainly focuses on the
combinatorics of ideal robots moving on a graph.
We will use the braid group's generators as symbolic
inputs to multi-robot hybrid controllers which characterize
and enforce collision-free interactions, take into account kine-
matic and geometric constraints, and are executable on actual
robotic platforms. This is the first approach that uses braids
in multi-robot motion planning to symbolically characterize
and enforce rich interaction patterns, implementable on ac-
tual robotic platforms. In particular, we extend the notions
presented in [28], [29]. The definition on planar braids and
their geometric interpretations are generalized from their orig-
inal form presented in [28]. A controller was designed for
nonholonomic vehicles to track a geometric path in [29].
In this paper, we modify this controller to instead produce
optimal trajectories that are provably safe in the collision-free
sense, satisfy a set of spatio-temporal constraints, and follow
desired geometric paths (Section III-B). This also allows us
to obtain tighter bounds on the amount of interaction patterns
that are achievable in a space than the one found in [29]. Two
new contributions to this work are found in Section III-C,
2
1
2
1
2
1
2
2
1
1
2
2
1
σ1
σ0
σ1
(a) Two robots, orig-
inally at one side of
a square, map to the
other.
Fig. 1. Two-robot interactions and corresponding symbolic braids.
(b) Three braids for two planar agents. Note that
"strand" 1 goes over "strand" 2 in σ1 and vice versa
in σ1.
where these trajectory generating controllers are extended to
non-rectangular regions, and Section IV-A, which includes
development of an optimal trajectory tracking controller with
formal guarantees on optimality and spatio-temporal constraint
satisfaction.
A. Planar Braids
Consider two agents on a square, initially located at the
two left vertices of the square as in Fig. 1a. The agents' task
is to move to the two right vertices of the square. There are
two ways in which these target vertices can be assigned. The
first is to simply let the robots move along a straight line
while the second is to have them cross paths and move to
vertices diagonally across from their initial placement. If the
robots are not to collide with each other, one agent can cross
the intersection of the two paths first, and then the other (or
vice versa). In the braid group, these two options correspond
to different "braids," and we have thus identified three planar
braids for two agents, as shown in Fig. 1b. Let us momentarily
denote these three braids, σ0, σ1, σ1.
Now, given these three braids, we can concatenate them
together to form other braids, as seen in Fig. 2. The left braid is
given by σ1·σ1 and the right braid is σ1·σ1. In the braid group,
what really matters is not the geometric layout of the paths, but
how the paths wrap around each other. As can be seen, if we
were to "pull" the right corners in σ1· σ1, the "strands" would
get "tangled" in the middle, while a "stretched-out" σ1 · σ1 is
simply σ0. Thus we let σ0 be the identity braid, such that σ1
and σ1 are each others' inverses in the sense that
σ1 · σ1 = σ1 · σ1 = σ0.
1 = σ1 (and σ−1
In fact, every braid has an inverse and, as such, the set of braids
(together with the concatenation operation) is indeed a group.
And, as σ−1
1 = σ1), σ0 and σ1 (or σ0 and
σ1 for that matter) are the so-called generator braids for this
group in that all planar braids can be written as concatenations
of these two braids and their inverses [21], [22].
This notion of generator braids can be extended to the case
when there are N ≥ 2, with the only difference being that
we will have N generators rather than just two, i.e., let σ0
be the trivial generator with no interactions and σk denote the
interactions between agents k and k + 1, k = 1, . . . , N − 1.
If we let ΣN be the set of all planar generator braids over
N agents, this set will serve as the alphabet over which braid
strings (themselves braids) are produced from, and we let ΣM
N
denote the set of all braids of length M (i.e., braids composed
of M generators) over N agents.
σ(1)(cid:121) σ(2)(cid:121)
ξ (0, 1)
ξ (1, 1)
ξ (2, 3)
ξ (0, 2)
ξ (1, 3)
ξ (2, 1)
3
} h
ξ (0, 3)
(cid:124)
ξ (1, 2)
(cid:123)(cid:122)
ξ (2, 2)
(cid:125)
(cid:96)
P 0
3 = {(0, 0) , (0, 0.5h) , (0, h)}
P 2
3 = {((cid:96), 0) , ((cid:96), 0.5h) , ((cid:96), h)}
P 1
3 = {(0.5(cid:96), 0) , (0.5(cid:96), 0.5h) , (0.5(cid:96), h)}
Fig. 3. The geometric interpretation of braid string σ = σ2 · σ1 for the
three-agent case. In this example, σ(1) = σ2 and maps P 0
3 , while
σ(2) = σ1 and maps P 1
3 to P 1
3 to P 2
3 .
where σ (k) is the kth braid2 in the string σ and
(cid:110)(cid:0) q
M (cid:96), 0(cid:1) ,
(cid:16) q
P q
N =
(cid:17)
M (cid:96),
1
(N−1) h
,
(cid:16) q
(cid:17)
, . . . ,(cid:0) q
M (cid:96), h(cid:1)(cid:111)
,
M (cid:96),
2
(N−1) h
as shown for the three-agent case in Fig. 3.
We moreover use the notation ξ(i, j) ∈ R2 to denote the
point agent j should go to at step i, i = 1, . . . , M. We use
the convention that ξ(0, j) = (0, (j − 1)h/(N − 1)), j =
1, 2, . . . , N, to denote agent j's initial position. In other words,
ξ(1, j) = σ(1)(cid:104)ξ(0, j)(cid:105),
ξ(2, j) = σ(2)(cid:104)ξ(1, j)(cid:105) = σ(2) ◦ σ(1)(cid:104)ξ(0, j)(cid:105),
or more generally,
ξ(i, j) = σ(i)(cid:104)ξ(i − 1, j)(cid:105)
= σ(i) ◦ σ(i − 1) ◦ ··· ◦ σ(1)(cid:104)ξ(0, j)(cid:105),
where we use the (cid:104)·(cid:105) notation to denote the argument to
σ(i) and ◦ to denote composition. This construction is also
illustrated in Fig. 3 for the three-agent case.
The geometric interpretation we will make of the planar
braids is that the mobile agents that are to execute them must
traverse through these braid points. They must moreover do
so in an orderly and safe manner, which will be the topic of
the next section.
III. EXECUTING BRAIDS
Given a collection of N agents with dynamics
σ1 · σ1
σ1 · σ1
Fig. 2. Two concatenated braids σ1 · σ1 and σ1 · σ1. The latter of these two
braids is the same as the identity braid σ0.
B. A Geometric Interpretation
Although heavily inspired by geometry in [21], the braid
group is not concerned with the actual geometry of the braid
strands. For the sake of describing the robot motion plans,
we will associate geometric paths with the different braids.
First of all, we assume that the braid is geometrically located
in a rectangular area of height h and length (cid:96) no matter
how long the braid string is. Using the particular two-agent
braids discussed in the previous paragraphs, we assume that
the two agents are initially located at the points (0, 0) and
(0, h), while the final locations are at ((cid:96), 0) and ((cid:96), h). If
the total braid results from the use of one single generator
braid σ0, or σ1 then no additional points are needed. However,
if the braid has length 2, then we also need to introduce
intermediary "half-way" points ((cid:96)/2, 0) and ((cid:96)/2, h). As such,
we let P q
spaced1 positions for these intermediary points, where the
subscript 2 denotes the two-agent case, M is the length of
the braid to be executed, and q = 0, 1, . . . , M.
M (cid:96), h(cid:1)(cid:9) be a set of uniformly
M (cid:96), 0(cid:1) ,(cid:0) q
2 = (cid:8)(cid:0) q
Using this notation, we can refer back to Fig. 1a and say that
each of the two generator braids correspond to an assignment,
i.e., a bijective map, between P 0
2 , and we use the
following notation to denote this fact
2 and P 1
σi : P 0
2 →b P 1
2 ,
i = 0, 1,
where →b denotes "bijection". Note that this is a slight abuse
of notation in that σi now denotes both an element in the braid
group as well as a map -- this distinction, however, should be
entirely clear from the context. Further, we will refer to these
points which agents are bijectively mapped to and from as
braid points.
If we generalize this to N ≥ 2 agents and let σ denote a
N , we will
string of generators of length M ≥ 2, i.e., σ ∈ ΣM
use the notation
σ(k) : P (k−1)
N →b P k
N ,
k = 1, . . . , M,
and planar output
xj = f (xj, uj),
yj = h(xj) ∈ R2,
j = 1, . . . , N,
1Unless otherwise stated, the rest of this document we will assume these
sets of intermediary points are uniformly spaced in h and (cid:96), but the notions
presented here extend to points which are not, as the application demands.
More on this in Section III-C.
2Note that a "braid" here refers to a member of the braid group, e.g., a
single generator (viz., a single bijective map) or a concatenation of several
generators (viz., a composition of bijective maps).
then it is of interest to have these agents execute a braid
σ ∈ ΣM
N . We now define what it means for this braid to be
executed.
Given an input braid string σ, what each individual agent
should do is "hit" the intermediary braid points ξ(i, j) at
specified time instances. We let T denote the time it should
take for the entire string to be executed. As such, the first
condition for a multi-agent motion to be feasible with respect
to the braid is the following:
Definition 3.1 (Braid-Point Feasibility):
A multi-robot trajectory is braid-point feasible if
yj(ti) = ξ(i, j), i = 0, . . . , M, j = 1, . . . , N.
where the ti's form a partition of a given time window [0, T ],
i.e.,
(cid:5)
t0 = 0 < t1 < ··· < ti < ··· < tM = T.
On top of braid-point feasibility, we also insist on the robots
not colliding during the maneuvers. To a certain degree, this
condition is what restricts the level of mixing that is possible,
i.e., since the braid is constrained in a rectangle of fixed height
and width, what length strings the multi-robot system can
execute while maintaining a desired level of safety separation.
Definition 3.2 (Collision-Free):
A multi-robot trajectory is collision-free if
(cid:107)yi(t) − yj(t)(cid:107) ≥ δij,
∀i (cid:54)= j,
t ∈ [0, T ],
where δij > 0 is the desired level of safety separation between
(cid:5)
agents i and j.
For convenience, we will refer to ¯δ = max δij as the
maximum safety separation such that no agent collides. This
will come up in Theorem 2. We are missing a notion to
describe what the multi-robot mixing problem is, that is, what
constitutes a braid controller.
Definition 3.3 (Braid Controller):
A multi-robot controller is a braid controller if the resulting
trajectories are both braid-point feasible and collision free, for
all collision-free initial conditions such that
4
A. Braid Controllers: Stop-Go-Stop Hybrid Strategy
Our first attempt at executing braids will be a hybrid control
strategy called the Stop-Go-Stop. We will assume that agent
dynamics are given by single integrator dynamics, i.e., xj =
uj ∈ R2 with yj = xj, j = 1, . . . , N. Further, for practical
considerations, assume that there is a cap on the maximum
velocity achievable by the agents, i.e., (cid:107)uj(cid:107) ∈ [0, vmax]. The
idea is then at each braid step to "send" agents off straight
to their next braid point in order of the distance they'll need
to travel, waiting just long enough to avoid collisions before
sending an agent off. To that end, we define si : {1, . . . , N} →
{1, . . . , N} to be a bijective mapping that denotes the farthest
distance ordering at step i, that is
si(p) < si(q)
=⇒
(cid:107)ξ(i, p) − ξ(i − 1, p)(cid:107) ≥ (cid:107)ξ(i, q) − ξ(i − 1, q)(cid:107)
(cid:17)
tan−1(cid:16) (ξ(i,j)−ξ(i−1,j))2
where ties are arbitrarily broken such that si
remains a
bijection. We let the agents heading angle be given by θi,j =
where the subscript indicates the
first or second component, and the unit heading vector be
ρi,j = [cos(θi,j), sin(θi,j)]T . Lastly, the time the agents will
wait before entering GO mode will be given by their ordering
as (si(j) − 1)τ where
(ξ(i,j)−ξ(i−1,j))1
τ =
δ
vmax cos(θ∗)
is the time required to be δ apart horizontally3, with cos(θ(cid:63)) =
(cid:96)/M√
(cid:96)2/M 2+h2 being the maximum horizontal distance an agent
could travel given σ ∈ ΣM
N . To ensure that the agents do
not overtake the first agent (horizontally), the speed of the
agents should be scaled by the velocity of the first agent, i.e.,
(1))/ cos(θi,si(j)). The hybrid automaton
uj = vmax cos(θi,s
describing the stop-go-stop controller is given in Fig. 4.
−1
i
Theorem 1: [28] The STOP-GO-STOP controller in Fig. 4 is
a braid controller if the braid points themselves are sufficiently
separated and
(cid:16)
(cid:17)
≥(cid:112)(cid:96)2/M 2 + h2.
yj(0) = ξ(0, j), j = 1, . . . , N.
(cid:5)
cos(θ(cid:63))vmax
min
i
(ti − ti−1) − (N − 1)τ
As a final notion, we are interested in how much mixing a
particular system can support.
Definition 3.4 (Mixing Limit):
The mixing limit M (cid:63) is the largest integer M such that there
(cid:5)
exists a braid controller for every string in ΣM
N .
Whenever two strands of the braid associated with a given
braid string cross, the two associated agents will have to inter-
act. The mixing limit therefore serves as an input-independent
bound on how much mixing is achievable for a given team of
agents operating in a given environment. The mixing limit is
in general quite hard to compute, it needs to consider every
permutation of strings of varying lengths up to some number,
the geometry assigned to each string and is dependent on
the kinematical response of the multi-robot system. However,
under certain assumptions it is possible to find bounds on M (cid:63)
for a given braid controller.
Proof:
The STOP-GO-STOP controller ensures that the agents are
never within δ of each other by virtue of the fact that they
have to wait until they are indeed at least that far apart (hor-
izontally) before entering GO mode. As such, the trajectories
are collision-free.
What remains to show is that they are also braid-point
feasible. Consider the agent that has to wait the longest before
it can move, i.e., the agent that has to wait a total of (N −1)τ,
and at its worst has mini (ti − ti−1) − (N − 1)τ time left
to reach the next braid point. In other words, we need that
the distance traveled in that amount of time at the speed
3Since we are interested in the mixing limit, the analysis is done with the
horizontal direction being the limiting factor for safe execution of the braids.
t = (si (j) − 1) τ + ti−1
Mixing Bounds
i := 1
STOP
xj = 0
i := i + 1
t = ti
xj = vmax
STOP
xj = 0
xi = ξ (i, j)
GO
(cid:16)
cos(cid:0)θi,si(j)
θi,s
−1
i
cos
(cid:17)
(cid:1) ρi,j
(1)
Fig. 4. Hybrid STOP-GO-STOP braid controller.
vmax cos(θi,s
required. But, we note that
−1
i
(1))/ cos(θi,si(j)) is greater than the distance
vmax cos(θi,s
−1
i
(1))/ cos(θi,si(j)) ≥ vmax cos(θ(cid:63))
and, as we are only looking for a bound, we assume that we
use this lower speed and that the distance required to travel is
the largest distance possible (which it really is not). In other
words, we need
(cid:16)
cos(θ(cid:63))vmax
min
i
(ti − ti−1) − (N − 1)τ
(cid:17)
≥(cid:112)(cid:96)2/M 2 + h2,
and the proof follows.
Note that Theorem 1 implicitly provides a lower bound on
the mixing limit as long as the agents' paths are straight lines.
In Fig. 5 we can see the mixing limit as a function of the
number of agents in the team for parameters vmax = 5, T =
20, (cid:96) = 5, h = 10, and ∆ = 0.2. The problem with this
strategy is that it does not allow for more general geometric
paths (which could be interpreted as feasible trajectories under
a given robot dynamical model), nor does it ensure that agents
get within a specified distance from each other (which could be
necessary when collaboration is required). The next section we
present a new strategy called braid reparameterization which
will explicitly consider more general strand geometries, and
allow us to obtain analytical bounds on the mixing limit.
B. Braid Controller: Braid Reparameterization
We are now seeking a strategy that will allow us to follow
a given geometry while achieving a mixing strategy encoded
as a braid string σ ∈ ΣM
N . Further, we wish to enforce inter-
agent interaction as dictated in σ by having agents get as close
as the safety separation δjk. Before moving forward, consider
the following lemma.
Lemma 1: If at any braid step, the generators in the braid
substring σ(k) = σ ⊆ Σm
N , m ≤ M, have indices that are two
or more apart, then any agent interacts with at most one other
agent at this step.
Proof:
Let Bk
N ∈ RN×2 be a matrix that contains the set of
braid points at time k such that B0
N = [ξ(0, 1)··· ξ(0, N )]T .
Consider the two-generator concatenation σi·σj. As a bijective
map, if σi = σ0, then the agents do not interact, and the agent
in braid point position [Bk−1
N ]n gets mapped to braid point
5
60
70
70
M
s
r
o
t
a
r
e
n
e
G
f
o
r
e
b
m
u
N
10
9
8
7
6
5
4
3
2
1
0
10
10
30
30
20
Number of Agents N
50
50
40
Fig. 5. Lower bound on the mixing limit using the Stop-Go-Stop braid
controller.
N ]n, where [B]n corresponds to the nth row of B,
position [Bk
n = 1, . . . , N. If σi (cid:54)= σ0, then σi will swap the position of the
two agents occupying the braid point positions i and i + 1 at
step k−1, i.e., it maps the agent occupying [Bk−1
N ]i to [Bk
N ]i+1
and the agent occupying [Bk−1
N ]i. Similarly, σj
swaps the position of the agents occupying the braid point
positions j and j + 1.
The two agents in positions i and i + 1 at k − 1 would only
interact with the two agents in positions j and j + 1 at k − 1
if i (or i + 1 for that matter) is equal to either j or j + 1. But
if we let i − j ≥ 2, then we get that
N ]i+1 to [Bk
i − j ≥ 2 ⇔ 2 ≤ i − j or 2 ≤ j − i
⇒ j < j + 1 < j + 2 ≤ i < i + 1
i < i + 1 < i + 2 ≤ j < j + 1
or
i (cid:54)= j
i (cid:54)= j + 1
i + 1 (cid:54)= j
i + 1 (cid:54)= j + 1,
⇒
and as such these two-generator concatenation maps the agents
from one set of braid points to the next with at most two
interaction between at most two agents per interaction.
One of the two braid group relations [21], [22] tells us that
if i − j ≥ 2 then σi · σj = σj · σi. More generally, if we let
h : {1, . . . , m} → {1, . . . , N − 1}
h(i) − h(j) ≥ 2 for all
be a surjective map such that
i, j ∈ {1, . . . , m} with i (cid:54)= j, then for any bijective map
g : {1, . . . , m} → {1, . . . , m} we have that
σ(k) = σh(1) · σh(2) · ··· · σh(m)
= σh(g(1)) · σh(g(2)) · ··· · σh(g(m)).
As such, the braid generators can be rearranged to obtain any
permutation of two-generator concatenations from generators
in σ(k). Since for all permutations of two-generator concate-
nations we will have indices that are two or more apart, these
{σ1 · σ3 · σ2}
= {σ3 · σ1 · σ2}
(a)
{σ1 · σ3} · σ2
= {σ3 · σ1} · σ2
(b)
σ1 · σ3 · σ2
(c)
σ3 · σ1 · σ2
(d)
Fig. 6. A braid string σ = σ1 · σ3 · σ2 taking place in a varying number of
braid steps.
will map the agents at braid step k from the set of braid
points Bk−1
N with at most
m interactions total, and at most one interaction per agent.
to the next set of braid points Bk
N
subject to
6
in order to safely execute braids, one need only consider the
case when two agents interact. We will devise a strategy for
reparameterizing the geometry such that should two agents
interact, the resulting parameters are at least δ from each other.
By tracking the parameterized paths, the agents' trajectories
will be collision-free and braid point feasible. The resulting
controllers can be combined to satisfy a given braid string.
Consider the geometric path agent j must follow at step
i (0) = ξ(i − 1, j) and
i given by γj
i
γj
i (1) = ξ(i, j). Let ∆ be the arclength of this path, given by
: [0, 1] → R2 with γj
(cid:90) 1
(cid:114)(cid:16)
(cid:17)T
∆ =
0
γj
i (p)
γj
i (p) dp.
We wish to find a parameterization of the strand geometries
such that the parameters of two intersecting strands, thought of
as a virtual vehicles that live on their geometries, are collision-
free. The strategy to do so will be to impose constraints on
the agents separation from the path intersection at a specified
time. To ensure braid-point feasibility, the strategy will be to
impose constraints on the time in which the agents must get
from the beginning of one braid step to the end of that step. To
that end, we propose the following constrained optimization
problem
(v(cid:63)
j , v(cid:63)
k) = arg min
(vj ,vk)
J(vj, vk) = arg min
(vj ,vk)
1
2
(cid:90) ti
ti−1
v2
j + v2
k dτ
(1)
If the geometric interpretation of the braid string is restricted
to the case of only pairwise interactions at every braid step,
then it is possible to devise a hybrid strategy with the desired
properties, which we can then compose together to achieve
the desired interaction patterns. As such, we will restrict the
geometric interpretation of braid strings to those satisfying
pairwise interactions as in Lemma 1.
Restriction 1: As a bijective map from one set of braid
points to another, the braid σ(k) will only contain generators
whose indices are two or more apart, i.e., for some h : N →
{0, . . . , N − 1}
σ(k) = σh(1) · σh(2) · ··· , where h(i) − h(j) ≥ 2 ∀i (cid:54)= j
As an example, suppose that a braid string contains the
substring of three concatenated generators σ1 · σ3 · σ2. The
first two generators, σ1 · σ3, may take place simultaneously at
braid step 1 without incurring in more than one interaction per
agent with another agent, but we would require an additional
braid step for σ2 in order to avoid multiple interactions in the
same step. This is illustrated geometrically in Fig. 6. In (a),
an agent interacts with more than one other agent since all
the generators are not at least two indices apart and take place
at the same braid step. Note that in the remaining cases (b)-
(d), we introduce intermediate braid points while retaining the
desired level of interaction, final configuration of the agents,
and reducing to pairwise interactions.
Braid strings that satisfy Restriction 1 will have at most
interactions involving two agents at any given braid step. So
pj
and
pj = vj,
(cid:18) ti−1 + ti
2
2
pk = vk,
(cid:18) ti−1 + ti
pk
(cid:19)
(cid:19)
=
∆ + δ
2∆
,
∆ − δ
2∆
,
=
pj(ti−1) = 0,
pj(ti) = 1,
pk(ti−1) = 0,
pk(ti) = 1.
2∆
The constraints at ti−1 and ti will ensure that the reparame-
terization is braid-point feasible. For collision avoidance we
will define a safety separation region, as depicted in Fig.
7, to be the region from the intersection point to the point
where it is possible for the two agents to be within δjk of
(cid:3) for δ ∈ [0, ∆] such
i (pk)(cid:13)(cid:13) ≥ δjk for all pj, pk ∈ [0, 1], where
each other, i.e., the set (cid:2) ∆−δ
that (cid:13)(cid:13)γj
i (pj) − γk
2∆ , ∆+δ
we let δ be the distance from the intersection point to the
boundary of the safety separation region along the path. Note
that if the geometry of the braid strands are straight lines, the
distance δ can be easily computed by δ = δjk csc(θ), where
θ is the angle between the two intersecting lines, and this
would also imply the parameters get as close as δjk csc (θ/2).
Similarly, when the geometry is "city-block"-like, we can find
2(N−1) and the agent get as close as 2δjk. For
δ = δjk +
more general geometries, δ may be conservatively selected.
At ¯ti
, i.e., half-time along the braid step, we
will require one parameter to exit the safety separation region
as the other one is about to enter it. All these cases are
:= ti−1+ti
h
2
δjk
θ
δ
δ(cid:48)
δjk
δ
Fig. 7. Safety separation region for three different-geometry, two-agent braids.
For straight lines (left) or "city-block"-like (right), the distance δ can be
computed exactly. For arbitrary curves (center), the distance δ(cid:48) can be selected
conservatively.
illustrated in Fig. 7. This way we guarantee that the two
parameters are never inside the region simultaneously and thus
their separation will always be of at least δjk.
The optimality conditions for equation (1) are given by
λj = λk = 0,
pj(¯ti) = ∆+δ
2∆ ,
pj = −λj,
pk(¯ti) = ∆−δ
pk = −λk,
2∆ , pj(ti) = pk(ti) = 1.
Since λj = λk = 0, we will get that λj and λk are piecewise
constant. By using the midway condition, we have that for
t ∈ (ti−1, ¯ti]
pj(¯ti) =
vj dτ =
∆ + δ
2∆
vj(¯ti − ti−1) =
⇒
∆ + δ
2∆
vj =
1
∆
∆ + δ
(ti − ti−1)
and similarly for t ∈ (¯ti, ti], the terminal condition tells us
that
(cid:90) ¯ti
ti−1
⇒
(cid:90) ti
¯ti
⇒
7
performed in a space of height h and length (cid:96) in time T is
bounded above by
(cid:113)
(cid:96)
M (cid:63) ≤ min
4h2 − ¯δ2 (N − 1)2
,
¯δh
(N − 1)(cid:0)vmaxT −(cid:0)(cid:96) + ¯δ(cid:1)(cid:1)
h
(cid:41)
.
− 1
2
Proof:
Consider σ ∈ ΣM
N . Since at any step an agent can either inter-
act with another agent or move straight ahead, the maximum
mixing will be achieved if an agent interacts with another
agent at every step. Thus, at every step it must be enforced
that there are no collisions. Assuming a uniform partition of
the time window, the arclength-normalized parameter velocity
will be given by
(cid:26) (cid:0) M ∆±M δ
(cid:0) M ∆∓M δ
T ∆
(cid:1)
(cid:1)
T ∆
if t ∈(cid:0) i−1
if t ∈(cid:0) 2i−1
2M T(cid:3)
M T(cid:3)
M T, 2i−1
2M T, i
vj =
for i = 1, 2, . . . , M, where the sign on the numerator depends
on the interpretation of whether the "strand" goes over or
under, ∆ is the arclength of the strand geometry connecting
two braid point, assumed equal at each braid step and for both
agents due to symmetry, and δ is the safety separation distance
along the braid as described above. The total braid path length
∆ heavily depends on the geometry of path. However, for the
sake of obtaining bounds on the mixing limit, we may assume
that the braid points are uniformly distributed in height and
length, such that the length of sufficiently regular paths will
be bounded by(cid:115)(cid:18) h
(cid:19)2
N − 1
+
(cid:19)2 ≤ ∆ ≤ h
(cid:18) (cid:96)
M
N − 1
+
(cid:96)
M
(3)
pj(ti) =
vj dτ +
2∆
∆ + δ
∆
=
∆
vj(ti − ¯ti) =
1
2∆
⇒
(2∆ − ∆ + δ)
vj =
1
∆
∆ − δ
(ti − ti−1)
where the lower bound assumes straight lines connecting the
braid points and the upper bound assumes "city block"-like
paths stepping midway between the two points. But after
normalizing the bounds on the parameter velocity, we see that
Note that for agent k, the signs are reversed on the numer-
ator. As such, the resulting braid parameterization will have
velocities given by
pj(t) =
∆
1
∆
∆±δ
∆∓δ
(ti−ti−1)
(ti−ti−1)
t ∈ (ti−1, ¯ti]
t ∈ (¯ti, ti]
(2)
(cid:40) 1
where the sign in the numerator is determined by the interpre-
tation given to the braid strand going "under" (e.g., the agent
crosses the intersection point first) or "over" (e.g., the agent
crosses the intersection point second), and in cases where there
are no intersections we set δ = 0 in the numerator.
It is possible to come up with an upper bound on the
length of the braid attainable under this mixing scheme. Under
Restriction 1, the following theorem provides an upper bound
on the mixing limit.
Theorem 2: Given the maximum safety separation ¯δ and
bounds on the agents' velocities such that vj(t) ∈ [0, vmax]
∀t, j, the mixing limit M (cid:63) for N-agent braids that can be
≤ M (∆ + δ)
T ∆
≤ vmax
∆
.
(4)
The lower bound of (4) tells us that for the parameter to not
go backwards we need δ ≤ ∆. To ensure this, we set δ =
¯δ csc θ ≤
¯δ ≤ h
relationships to solve for M yields
(cid:1)2 ≤ ∆, and since we require
N−1 for collision-free braid points, using the geometric
M
T ∆
0 ≤ M (∆ − δ)
(cid:114)(cid:16) h
(cid:17)2
+(cid:0) (cid:96)
(cid:113)
M ≤ (cid:96)
N−1
4h2 − ¯δ2 (N − 1)2
.
¯δh
M
=
N−1 )+¯δ)
Similarly, the right-hand side inequality of (4) tells us that
∆ ≤ vmaxT−δ
, and to ensure this we
set ∆ ≤ h
. Solving for M
yields
vmaxT−( 1
2 ( h
M
M ≤ vmaxT−( 1
M ≤ (N − 1)(cid:0)vmaxT −(cid:0)(cid:96) + ¯δ(cid:1)(cid:1)
N−1 + (cid:96)
N−1 )+¯δ)
2 ( h
M
− 1
2
.
h
M
d
n
u
o
B
t
i
m
L
i
g
n
i
x
i
M
20
0
10
20
Number of Agents N
40
20
60
)
s
(
T
d
e
t
o
l
l
A
e
m
T
i
Fig. 8. Upper bound on the Mixing Limit presented in Theorem 2 for
parameters (cid:96) = 2 m, h = 4 m, δ = 0.13 m, vmax = 2 m/s
(cid:113)
Thus
M (cid:63) ≤ min
(cid:96)
4h2 − ¯δ2 (N − 1)2
,
¯δh
(N − 1)(cid:0)vmaxT −(cid:0)(cid:96) + ¯δ(cid:1)(cid:1)
h
(cid:41)
− 1
2
. (cid:4)
Theorem 2 provides a compact expression to obtain an
upper bound on the mixing limit that abstracts away strand
geometry. It provides a notion of the whether or not desirable
mixing levels are achievable in the space, regardless of what
the actual movement patterns to achieve these mixing levels
are (encoded in the braid string of length M ≤ M (cid:63)). Fig. 8
includes a plot of the bound on the mixing limit for varying
number of agents and time window size.
C. Non-Rectangular Regions
Up to this point, only the problem of braiding on a rect-
angular region of height h and length l has been considered.
On this region, the braid points were uniformly distributed
along both dimensions and bounds on the mixing limit were
provided through the use of the proposed braid controller. In
this section, the scheme is extended to more generally shaped
regions, e.g., the road on Fig. 9. As has been done previously,
discussion begins by first considering the two agent case.
Consider the two agents attempting to perform a braid
of length one on the arbitrarily curved region on Fig. 9b.
Connecting the braid points together results in the quadrilateral
depicted in the red dotted line. Let
this quadrilateral be
considered as the space where the agent needs to perform a
braid of length one, rather than the curved region itself. Note
that as longer length braids are included in this road segment,
other quadrilaterals appended together will be obtained which
approximate the road slightly better. Since it is of interest to
obtain mixing strategies near the mixing limit, as longer length
8
(a) Three agents braiding on a curved region.
(b) Two agents need to move
from the left-most circles to
the right-most circles along
the curved region.
(c) The longer the braid length
in this curved road segment,
the closer the quadrilaterals
resemble the curved region.
Fig. 9. Agents braiding on a region that curves.
braids are included in this road segment, better approximations
of the curved region will be obtained by these composition of
quadrilaterals. This is depicted in Fig. 9c.
The strategy for performing a mixing strategy in curved re-
gion will be to transform the curved region into a straightened
rectangular region of known height and length, as illustrated
in Fig. 10a. In this way the braid controller can be fashioned
as in previous sections and the resulting braid controller can
be transformed back into the actual curved region. After
distributing the braid points on both the curved region and
the rectangular region, as in Fig. 10a, the next step is to find
a transformation to map between these two regions.
Let agents j and k interact in at braid step i. Denote S q
i,j
to be the quadrilateral formed by connecting together the
braid points ξ(i − 1, j), ξ(i − 1, k), ξ(i, j), and ξ(i, k), like
the one depicted in Fig. 9b. Let S r
i,j be a rectangular plane
of specified height and length whose corners are given by
ξr(i − 1, j), ξr(i − 1, k), ξr(i, j), and ξr(i, k).
With knowledge of these braid points and through the use of
a projective transform as in [30], it is possible to obtain a local
diffeomorphism that maps from a rectangle of specified height
and length to the convex arbitrarily shaped quadrilateral, i.e.,
Ti,j : S r
i,j → S q
i,j.
i,j and S r
Note that by selecting transforms based on the corners of
these quadrilaterals, a continuous curve that spans across the
boundary between S r
i+1,j might be mapped to a
discontinuous curve that spans across the boundary between
S q
i,j and S q
i+1,j when transformed using Ti,j and Ti+1,j in their
respective spaces. However, there will certainly be continuity
in the mapping of curves passing through the braid points,
since these points are shared by the quadrilaterals and are
used to compute the transforms, i.e., Ti,j (ξr(i, j)) = ξ(i, j) =
Ti+1,j (ξr(i, j)).
Recall
the braid controller proposed for the rectangular
9
point along the curve where the two curves intersect (resp.
where the agent exits the safety separation region).
In the special case where the geometry is given by straight
lines, then by setting
i (p) = (1 − p)ξ(i − 1, n) + pξ(i, n), p ∈ [0, 1], n = j, k.
γn
as the path agent j and k must follow, the intersection point
s may be found by setting s = γj
i (πk) where
i (πj) = γk
= A−1 (ξ(i − 1, k) − ξ(i − 1, j))
(cid:20)πj
(cid:21)
πk
with A = [(ξ(i, j) − ξ(i − 1, j)) ,− (ξ(i, k) − ξ(i − 1, k))].
Recall that the distance in S q
i,j from the intersection point s,
for the special case of the geometry being straight lines, was
given by δ = δjk csc(θ) with θ being the angle between these
two lines, i.e., θ = cos−1(cid:0)x(cid:62)
(cid:1) where xn is the unit vector
j xk
pointing towards the next point, i.e.,
(ξ(i, n) − ξ(i − 1, n))
(cid:107)ξ(i, n) − ξ(i − 1, n)(cid:107) ,
xn =
n = j, k.
(cid:90) 1
(cid:113)
By setting γ(p) = (1 − p)s ± pδ xj, where sign depends on
whether the braid goes "over" or "under," it is possible to
determine δ in the non-rectangular plane directly as
δr =
(±δ xj − s)
(cid:62) M (γ(p)) (±δ xj − s) dp.
0
i,d(t) = γj
(cid:13)(cid:13)(cid:13)DTi,j(γj
With this information, vj can be found in S r
i,j for interactions
between agents j and k. Note that a reparameterization of the
path can now be set equivalent to the desired trajectory of
agent j by setting γj
i,r(pj(t)) (see (5) below). Thus,
the braid controller parameter velocity vq
j (t) for agent j in
S q
i,j will be given by vq
This strategy was implemented in simulation over the
curved region illustrated in Fig. 11. In the figure, agents are
performing the mixing strategy given to them by a braid of
length 80 on the curved region (top) and simultaneously on the
straightened rectangular region (bottom). The parameters used
for this simulation were δjk = 7.7 cm and vmax = 1.5 m/s
∀j, k, and T = 30 s.
i,d(t)) γj
(cid:13)(cid:13)(cid:13).
j (t) =
i,d(t)
IV. IMPLEMENTING BRAIDS
Section II approached the problem of multi-robot mixing
from an execution level, where given a specification it is
possible to synthesize a braid controller that satisfies the
specification. In this section we consider the implementation
level, that is, we address how to find controllers that are
implementable on actual robotic systems that follow the braid
controllers found in the previous section. We then validate the
framework by implementing a mixing strategy on a team of
six robots.
A. Optimal Tracking Controller
We will now utilize the braid parameter velocity to find the
braid controller for the agents. By integrating (2) we obtain
the braid parameterization of the path γj
i
(cid:40) t−ti−1
(ti−ti−1)
(ti−ti−1)
t−¯ti
∆±δ
∆
∆ + ∆±δ
∆∓δ
2∆
t ∈ (ti−1, ¯ti]
t ∈ (¯ti, ti] .
(5)
pj(t) =
(a) The curved region will be mapped to the rectangular region of
known width and height where control design will take place.
(b) The bijective transformation T maps points in the rectangle to
points in the quadrilateral. Both shapes are defined by the braid points
which determine the corners.
Fig. 10. Rectangular and non-rectangular regions.
∆
1
∆
vj(t) =
1
(cid:16) ∆−δ
(cid:16) ∆+δ
if t ∈ (ti−1, ¯ti] ,
if t ∈ (¯ti, ti] .
region. For agent j, at braid step i, this was given by
(cid:17)
(cid:17)
ti−ti−1
ti−ti−1
where it is expected that T −1
i,j (x (ti−1)) = ξr(i − 1, j) and
T −1
i,j (x (ti)) = ξr(i, j). In the expression, ∆ corresponds to
the length of the geometric path agent j must follow to move
between ξr(i − 1, j) and ξr(i, j), while δ corresponds to the
distance along the path agent j switches velocities in order to
avoid collisions. Note that for a given parameterization of the
i,j with parameter p ∈ [0, 1], the
geometric path γj
arclength ∆ may be computed as follows
γj(cid:62)
i,r (p) γj
0
∆ =
i,r(p) dp.
If the geometric curve is directly given in S q
that the curve in S r
T −1
i,j (γj
i,j as γj
i,j may be parameterized as γj
i (p)), then the arclength may be computed by
i (p) such
i,r(p) =
i,r(p) in S r
(cid:90) 1
(cid:113)
(cid:90) 1
(cid:114)(cid:16)
∆ =
0
(cid:17)(cid:62) M(γj
(cid:16)
γj
i (p)
(cid:16)
i (p)) γj
i (p) dp.
(cid:17)(cid:17)(cid:62)
(cid:16)
(cid:17)
i,j
i,j
i,j
DT −1
where M(γj
γj
γj
i (p)
i (p)
i (p)) =
is the Jacobian of T −1
and DT −1
i,j . In the special case
where the geometry is given by straight lines, then ∆ =
(cid:107)ξr(i, j) − ξr(i − 1, j)(cid:107).
DT −1
Finally, it is of interest to find δ in order to avoid collisions.
i,j is known,
i,j as before
i (p) of the curve in S q
If the parameterization γj
then the safety separation ball may be set in S q
and the safety separation distance may be computed as
(cid:90) b
(cid:114)(cid:16)
δ =
a
(cid:17)(cid:62)M(γj
γj
i (p)
i (p)) γj
i (p) dp.
where [a, b] ⊂ [0, 1], and if the agent is meant to braid "over"
(resp. "under") then γj
i (a) corresponds to the point along the
curve where the agent enters the safety separation region (resp.
where the two curves intersect) and γj
i (b) corresponds to the
10
(a) Simulation Time 5.04 seconds.
(b) Simulation Time 9.57 seconds.
Fig. 11. Five agents performing a mixing strategy given by a braid of length 80. The top left plot represents the actual curved region the agents are mixing
in and the top right is a close-up of the agents. The lower plot is the virtual "straightened" rectangular region where the design of the braid took place.
(cid:17)
(cid:17)T
(cid:16)
(cid:90) ti
(cid:16)
1
2
Assume that agents have single integrator dynamics, i.e., xj =
uj with yj = xj ∈ R2. The agent's controller will be found
by optimally tracking the reparameterized path γj
i (pj(t)) to
minimize the cost
xj − γj
xj − γj
i
i
Q
ti−1
+ uT
j Ruj dτ (6)
J(uj) =
for Q = QT (cid:31) 0 and R = RT (cid:31) 0, with constraints
xj = uj, xj(ti−1) = γj
i (1). Using
the standard variational argument together with Pontryagin's
minimum principle, the first order necessary conditions for
optimality tell us that the optimal tracking controller u∗
j is
given by
i (0), and xj(ti) = γj
where λ is the so-called costate and satisfies
j = −R−1λj
u∗
(cid:16)
λj = −Q
xj − γj
i
(cid:17)
with unknown terminal condition λj(ti). Suppose that simi-
larly to [31, Chapter 5.3] we can construct λj as an affine
combination of the unknown λj(ti) and the state, i.e.,
λj(t) = H(t)xj(t) + K(t)λj(ti) + E(t)
and similarly, the terminal state as
xj(ti) = ξ(i, j) = F (t)xj(t) + G(t)λj(ti) + D(t)
for some yet unknown functions H, K, E, F, G, and D. One
can differentiate these equations and manipulate the equations
to obtain
(cid:16)
HR−1H − Q − H
(cid:17)
(cid:16)
(cid:16)
xj +
+
HR−1K − K
HR−1E + Qγj
(cid:17)
(cid:16)
F R−1K − G
λj(ti)
F R−1E − D
+
(cid:17)
(cid:17)
λj(ti)
i − E
(cid:17)
= 0
= 0.
and(cid:16)
(cid:17)
xj +
(cid:16)
F R−1H − F
In order to satisfy these equations for any value of xj(t) and
λj(ti), the terminal conditions, and after noticing that F =
K T , we obtain that
H = HR−1H − Q,
K = HR−1K,
G = K T R−1K,
E = HR−1E + Qγj
i ,
D = K T R−1E,
H(ti) = 02×2
K(ti) = I2
G(ti) = 02×2
E(ti) = 02×1
D(ti) = 02×1.
(7)
Note that G(ti) = 0 and G(t) (cid:23) 0 for all t, which suggests
that G(t) (cid:22) 0 for t < ti. If the problem is not abnormal, i.e.,
there exists a neighboring minimum solution, then G will be
invertible at some t < ti. In particular, by solving backwards
in time in the sequence H → K → E → G → D up to
t = ti−1, we can find that
G−1 (ti−1)(cid:0)ξ (i, j) − K T (ti−1) ξ (i − 1, j) − D (ti−1)(cid:1)
j (xj, t) = −R−1(cid:104)
resulting in the feedback optimal trajectory tracking control
law
u∗
H(t)xj(t) + K(t)G−1(ti−1)
λj (ti) =
ξ(i, j)
(cid:16)
− K T (ti−1)ξ(i − 1, j) − D(ti−1)
+ E(t)
(8)
(cid:17)
(cid:105)
where H, K, E, G and D are the solutions to terminal value
problems in (7). which can be solved numerically backwards
from ti. As it turns out, these conditions are also sufficient for
optimality as presented in the following theorem.
(cid:104)
(cid:18) 1
J(u∗) =
Theorem 3: The tracking controller in (8) is a minimizer to
the cost functional (6) whose optimal value is given by
ξ(i − 1, j)
(cid:19)
(cid:105)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)t=ti−1
+ ξ(i − 1, j)T(cid:0)KG−1 (ξ(i, j) − D) + E(cid:1) + ϕ
H − KG−1K T
ξ(i − 1, j)T
2
01234560123Track (Real World)East (m)North (m)3.5400.20.40.60.8Zoomed in Track (Real World)East (m)North (m)246810121400.20.40.6Straightened Track (Virtual World)Counter Clockwise along Path (m, along Center of Path)From Outer to InnerTrack Boundary (m)01234560123Track (Real World)East (m)North (m)55.25.45.65.80.40.60.811.2Zoomed in Track (Real World)East (m)North (m)246810121400.20.40.6Straightened Track (Virtual World)Counter Clockwise along Path (m, along Center of Path)From Outer to InnerTrack Boundary (m)11
(a) The robots start at the beginning of the braid.
(b) Collision-free -- robots get as close as δ.
Fig. 12. Actual robots executing the mixing strategy in (10). The geometric paths and spatio-temporal constraints are being projected on the workspace with
an overhead projector for the sake of visualization.
(c) The controller is braid point feasible -- braid points are reached simultaneously.
where ϕ(t) is the solution to the terminal boundary problem
(cid:16)
(cid:17)T
γj
i (t)
Qγj
i (t)
1
2
(Λj(t))T R−1Λj(t) − 1
ϕ =
2
ϕ(ti) = −ξ(i, j)T Λj(ti)ξ(i, j)
with
Λj(t) = E(t)+
K(t)G−1(ti−1)(ξ(i, j) − K T (ti−1)ξ(i − 1.j) − D(ti−1)).
Proof:
As the control law was derived from the necessary conditions
for optimality, we only need to show that it is sufficient for
optimality. We will do so by leveraging the Hamilton-Jacobi-
Bellman theorem [32, Chapter 2].
Note that the optimization problem is regular as there exists
a uj that allows the Hamiltonian to achieve a minimum with
respect to it, i.e.,
H(xj, uj, λj)
(cid:20)(cid:16)
(cid:17)T
(cid:1)T
(cid:0)uj + R−1λj
xj − γj
i
Q
(cid:17)
(cid:16)
R(cid:0)uj + R−1λj
xj − γj
i
+ uT
=
=
1
2
1
2
j Ruj
(cid:21)
(cid:1) − 1
+ λT
j uj
(cid:16)
(cid:17)T
j R−1λj
λT
xj − γj
Q
2
i
(cid:17)
(cid:16)
+
1
2
xj − γj
i
which attains a minimum with respect to uj when
j = −R−1λj.
u∗
1
0
)
m
(
h
t
r
o
N
−1
−2
−1
0
East (m)
1
2
12
)
m
(
e
c
n
a
t
s
i
D
0.5
0.4
0.3
0.2
0.1
0
min ≈ 0.132867m
0
10
20
30
Time (s)
40
50
60
(a) Robot trajectories in the plane.
(b) Instantaneous minimum inter-robot distance.
Fig. 13. Data associated with robotic implementation in Fig. 12.
Define V (z, t) as
−zT(cid:16)
V (z, t) =
1
2
zT H(t)z + zT K(t)G−1(ti−1)ξ(i, j)
K(t)G−1(ti−1)(cid:0)K T (ti−1)ξ(i−1, j)−D(ti−1)(cid:1)+E(t)
(cid:17)
in order to obtain the fully closed-loop optimal
controller
j (xj, t) = −R−1(cid:2)(cid:0)H(t) − K(t)G−1(t)K T (t)(cid:1) xj(t)
+K(t)G−1(t) (ξ(i, j) − D(t)) + E(t)(cid:3) .
u∗
tracking
(9)
+ ϕ(t)
B. Robotic Implementation
where ϕ(t) is as defined above. It can be verified that
V (z, t) satisfies the terminal condition V (ξ(i, j), ti) = 0, that
∂V (z,t)
= λj, and that is satisfies the Hamilton-Jacobi-
(cid:12)(cid:12)(cid:12)T
In order to validate the above results in a practical setting,
the braid controllers were implemented on a team of Khepera
III differential-drive robots, which may be modelled using
unicycle dynamics, i.e.,
νj sin θj
,
θj = ωj.
where xj ∈ R2 is the robot's position and θj its heading.
The single integrator control uj from (9) can be mapped to
unicycle dynamics as
(cid:3)T
xj =(cid:2)νj cos θj
νj =(cid:2)cos θj
ωj =
(cid:3) · uj,
(cid:26) κ [ − sin θj cos θj ] · uj(cid:107)uj(cid:107) ,
κ [ − sin θj cos θj ] · uj,
sin θj
if (cid:107)uj(cid:107) > 1
otherwise
for tuning gain κ > 0. Fig. 12 illustrates the team of 6 real
robots executing the braid string
σ = {σ1·σ3·σ5}·σ2·σ3·σ4·{σ3·σ5}·{σ2·σ4}·σ1
(10)
where the braids grouped in braces are executed simultane-
ously. A visual representation of the braid string geometry
is being projected onto the robot workspace via an overhead
projector mounted on the ceiling of the lab space. Fig.
13b illustrates the minimum pairwise distance throughout the
execution of the braid. It can be seen that
the minimum
distance achieved is approximately 0.132867m -- greater than
the size of the robots which is approximately 0.13m. Fig. 13a
illustrates the trajectories taken by the robots and how they
follow the strand geometry, which were selected as straight
lines, while still accommodating for the agents' unicycle
dynamics.
∂z
z=xj
Bellman equation, i.e.,
0 =
∂V (z, t)
∂t
xj, u∗
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)z=xj
+ H
j (xj, t) ,
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)T
z=xj
∂V (z, t)
∂z
.
As a consequence, u∗
and
j is a minimizer to the cost functional
J(u∗) = V (ξ(i − 1, j), ti−1).
(cid:4)
As a final note, the terminal costate value λj(ti) was com-
puted using the initial conditions for the problem. However,
as the gains involved are solved from terminal conditions,
the choice of initial conditions is arbitrary, and evaluating at
t = ti−1 results in control law (8) being open-loop in the
terminal costate value. This could yield undesired results under
the influence of disturbances and errors. To alleviate this, we
can rewrite the terminal costate as a function of the current
state value instead, i.e.,
λj(ti) =
G−1 (ti−1)(cid:0)ξ (i, j) − K T (ti−1) ξ (i − 1, j) − D (ti−1)(cid:1)
= G−1 (t)(cid:0)ξ (i, j) − K T (t) xj (t) − D (t)(cid:1)
V. CONCLUSION
The notion of multi-robot mixing is presented as a frame-
work with which to characterize rich movement patterns in
a multi-robot system symbolically in terms of inter-robot
interactions. Two controllers are presented which allow to the
multi-robot system to achieve provably safe interactions, in the
sense that agents get close without colliding, while meeting
certain spatio-temporal constraints. Under these controllers, it
is possible to obtain theoretical bounds on the mixing limit, the
greatest level of mixing or inter-robot interactions achievable
in a given region. Further, tracking controllers that optimally
follow desired geometries are provided which can be mapped
to classes of nonholonomic dynamical systems. The concepts
presented here are validated on an actual multi-robot system
executing a interaction patterns with a desired mixing level.
Not found in this paper is the question of how to select the
interaction pattern that should be executed by these controllers.
This question addresses the specification level of our symbolic
approach. This discussion will be presented in a different paper
where motion tasks are encoded in linear temporal logic,
allowing for syntactically rich specifications at a high level,
such as "agents 1 and 3 need to collected data before arriving
at a goal location," which are then translated into a mixing
strategy encoded as a braid.
ACKNOWLEDGMENT
This work is partially supported under a grant from the Air
Force Office of Scientific Research.
The authors would like to thank the members of the Georgia
Robotics and Intelligent Systems Laboratory (GRITS Lab) for
the many fruitful discussions.
REFERENCES
[1] T. Balch, "The impact of diversity on performance in multi-robot
foraging," in Proceedings of the third annual conference on Autonomous
Agents. ACM, 1999, pp. 92 -- 99.
[2] K. Sugawara, T. Kazama, and T. Watanabe, "Foraging behavior of
interacting robots with virtual pheromone," in Intelligent Robots and
Systems, 2004. (IROS 2004). Proceedings. 2004 IEEE/RSJ International
Conference on, vol. 3, Sept 2004, pp. 3074 -- 3079 vol.3.
[3] M. Bonert, L. Shu, and B. Benhabib, "Motion planning for multi-
robot assembly systems," International Journal of Computer Integrated
Manufacturing, vol. 13, no. 4, pp. 301 -- 310, 2000.
[4] W. Nguyen and J. K. Mills, "Multi-robot control for flexible fixtureless
assembly of flexible sheet metal auto body parts," in Robotics and
Automation, 1996. Proceedings., 1996 IEEE International Conference
on, vol. 3.
IEEE, 1996, pp. 2340 -- 2345.
[5] R. Gross, M. Bonani, F. Mondada, and M. Dorigo, "Autonomous self-
assembly in swarm-bots," Robotics, IEEE Transactions on, vol. 22, no. 6,
pp. 1115 -- 1130, 2006.
[6] E. Klavins, "Programmable self-assembly," Control Systems, IEEE,
vol. 27, no. 4, pp. 43 -- 56, 2007.
[7] S. M. Pedersen, S. Fountas, H. Have, and B. Blackmore, "Agricultural
robotssystem analysis and economic feasibility," Precision agriculture,
vol. 7, no. 4, pp. 295 -- 308, 2006.
[8] N. Noguchi, J. Will, J. Reid, and Q. Zhang, "Development of a master --
slave robot system for farm operations," Computers and Electronics in
agriculture, vol. 44, no. 1, pp. 1 -- 19, 2004.
13
[9] R. C. Shah, S. Roy, S. Jain, and W. Brunette, "Data mules: Modeling
and analysis of a three-tier architecture for sparse sensor networks," Ad
Hoc Networks, vol. 1, no. 2, pp. 215 -- 233, 2003.
[10] I. Vasilescu, K. Kotay, D. Rus, M. Dunbabin, and P. Corke, "Data
collection, storage, and retrieval with an underwater sensor network," in
Proceedings of the 3rd international conference on Embedded networked
sensor systems. ACM, 2005, pp. 154 -- 165.
[11] W. Zhao, M. Ammar, and E. Zegura, "Controlling the mobility of
multiple data transport ferries in a delay-tolerant network," in INFO-
COM 2005. 24th annual joint conference of the IEEE computer and
communications societies. Proceedings IEEE, vol. 2.
IEEE, 2005, pp.
1407 -- 1418.
[12] A. Howard, "Multi-robot simultaneous localization and mapping using
particle filters," The International Journal of Robotics Research, vol. 25,
no. 12, pp. 1243 -- 1256, 2006.
[13] N. E. Ozkucur and H. L. Akın, "Cooperative multi-robot map merging
using fast-slam," in RoboCup 2009: Robot Soccer World Cup XIII.
Springer, 2010, pp. 449 -- 460.
[14] R. M. Murray, "Recent research in cooperative control of multivehicle
systems," Journal of Dynamic Systems, Measurement, and Control, vol.
129, no. 5, pp. 571 -- 583, 2007.
[15] X. C. Ding, A. R. Rahmani, and M. Egerstedt, "Multi-uav convoy
protection: an optimal approach to path planning and coordination,"
Robotics, IEEE Transactions on, vol. 26, no. 2, pp. 256 -- 268, 2010.
[16] R. Hall, "Efficient spiral search in bounded spaces," IEEE Transactions
on Pattern Analysis and Machine Intelligence, vol. 4, no. 2, pp. 208 -- 215,
March 1982.
[17] W. Huang, "Optimal
line-sweep-based decompositions for coverage
algorithms," in IEEE International Conference on Robotics and Automa-
tion, 2001.
[18] R. Hashemi, L. Jin, G. Anderson, E. Wilson, and M. Clark, "A
comparison of searchpatterns for cooperative robots operating in remote
environment," in International Conference on Information Technology:
Coding and Computing, 2001.
[19] J. Kim, F. Zhang, and M. Egerstedt, "Simultaneous cooperative explo-
ration and networking based on Voronoi diagrams," in IFAC Workshop
on Networked Systems, October 2009.
[20] B. Tovar, L. Freda, and S. M. LaValle, "Using a robot to learn geometric
information from permutations of landmarks," in Contemporary Math-
ematics. American Mathematical Society, 2007, vol. 438, pp. 33 -- 45.
[21] E. Artin, "Theory of braids," Annals of Mathematics, vol. 48, no. 1, pp.
101 -- 126, 1947.
[22] J. S. Birman, Braids, links, and mapping class groups.
Princeton
University Press, 1975, no. 82.
[23] C. Belta, A. Bicchi, M. Egerstedt, E. Frazzoli, E. Klavins, and G. J. Pap-
pas, "Symbolic planning and control of robot motion," IEEE Robotics
and Automation Magazine, vol. 14, no. 1, pp. 61 -- 70, March 2007.
[24] M. Egerstedt, X. Hu, and A. Stotsky, "Control of mobile platforms using
a virtual vehicle approach," Automatic Control, IEEE Transactions on,
vol. 46, no. 11, pp. 1777 -- 1782, 2001.
[25] T. Lozano-Perez, "Spatial planning: A configuration space approach,"
Computers, IEEE Transactions on, vol. C-32, no. 2, pp. 108 -- 120, Feb
1983.
[26] R. Ghrist, "Configuration spaces and braid groups on graphs in robotics,"
AMS IP STUDIES IN ADVANCED MATHEMATICS, vol. 24, pp. 29 -- 40,
2001.
[27] V. Kurlin et al., "Computing braid groups of graphs with applications to
robot motion planning," Homology, Homotopy and Applications, vol. 14,
no. 1, pp. 159 -- 180, 2012.
[28] Y. Diaz-Mercado and M. Egerstedt, "Multi-robot mixing using braids,"
in Decision and Control (CDC), 2013 IEEE 52nd Annual Conference
on, Dec 2013, pp. 2001 -- 2005.
[29] -- -- , "Multi-robot mixing of nonholonomic mobile robots," in Control
Applications (CCA), 2014 IEEE Conference on, Oct 2014, pp. 524 -- 529.
[30] A. Criminisi, I. Reid, and A. Zisserman, "A plane measuring device,"
Image and Vision Computing, vol. 17, no. 8, pp. 625 -- 634, 1999.
[31] A. E. Bryson, Applied optimal control: optimization, estimation and
[32] A. Locatelli, Optimal control: An introduction.
Springer Science &
control. CRC Press, 1975.
Business Media, 2001.
|
1611.01006 | 1 | 1611 | 2016-11-02T16:57:42 | Bayesian Heuristics for Group Decisions | [
"cs.MA",
"cs.SI",
"eess.SY",
"math.ST",
"stat.AP",
"math.ST"
] | We propose a model of inference and heuristic decision-making in groups that is rooted in the Bayes rule but avoids the complexities of rational inference in partially observed environments with incomplete information, which are characteristic of group interactions. Our model is also consistent with a dual-process psychological theory of thinking: the group members behave rationally at the initiation of their interactions with each other (the slow and deliberative mode); however, in the ensuing decision epochs, they rely on a heuristic that replicates their experiences from the first stage (the fast automatic mode). We specialize this model to a group decision scenario where private observations are received at the beginning, and agents aim to take the best action given the aggregate observations of all group members. We study the implications of the information structure together with the properties of the probability distributions which determine the structure of the so-called "Bayesian heuristics" that the agents follow in our model. We also analyze the group decision outcomes in two classes of linear action updates and log-linear belief updates and show that many inefficiencies arise in group decisions as a result of repeated interactions between individuals, leading to overconfident beliefs as well as choice-shifts toward extremes. Nevertheless, balanced regular structures demonstrate a measure of efficiency in terms of aggregating the initial information of individuals. These results not only verify some well-known insights about group decision-making but also complement these insights by revealing additional mechanistic interpretations for the group declension-process, as well as psychological and cognitive intuitions about the group interaction model. | cs.MA | cs |
Bayesian Heuristics for Group Decisions
?
Institute for Data, Systems, and Society (IDSS), Massachusetts Institute of Technology (MIT), Cambridge, MA 02139, USA.
Emails: rahimian , jadbabai @mit.edu
M. Amin Rahimian & Ali Jadbabaie ?
We propose a model of inference and heuristic decision making in groups that is rooted in the Bayes
rule but avoids the complexities of rational inference in partially observed environments with incomplete
information. According to our model, the group members behave rationally at the initiation of their interac-
tions with each other; however, in the ensuing decision epochs, they rely on a heuristic that replicates their
experiences from the first stage. Subsequently, the agents use their time-one Bayesian update and repeat
it for all future time-steps; hence, updating their actions using a so-called Bayesian heuristic. This model
avoids the complexities of fully rational inference and also provides a behavioral and normative foundation
for non-Bayesian updating. It is also consistent with a dual-process psychological theory of decision mak-
ing, where a controlled (conscious/slow) system develops the Bayesian heuristic at the beginning, and an
automatic (unconscious/fast) system takes over the task of heuristic decision making in the sequel.
We specialize this model to a group decision scenario where private observations are received at the
beginning, and agents aim to take the best action given the aggregate observations of all group members.
We present the implications of the choices of signal structure and action space for such agents. We show
that for a wide class of distributions from the exponential family the Bayesian heuristics take the form of
an affine update in the self and neighboring actions. Furthermore, if the priors are non-informative (and
possibly improper), then these action updates become a linear combination. We investigate the requirements
on the modeling parameters for the action updates to constitute a convex combination as in the DeGroot
model. The results reveal the nature of assumptions that are implicit in the DeGroot updating and highlights
the fragility and restrictions of such assumptions; in particular, we show that for a linear action update to
constitute a convex combination the precision or accuracy of private observations should be balanced among
all neighboring agents, requiring a notion of social harmony or homogeneity in their observational abilities.
Following the DeGroot model, agents reach a consensus asymptotically. We derive the requirements on the
signal structure and network topology such that the consensus action aggregates information efficiently. This
involves additional restrictions on the signal likelihoods and network structure. In the particular case that
all agents observe the same number of i.i.d. samples from the same distribution, then efficiency arise in
degree-regular balanced structures, where all nodes listen to and hear from the same number of neighbors.
We next shift attention to a finite state model, in which agents take actions over the probability simplex;
thus revealing their beliefs to each other. We show that the Bayesian heuristics, in this case, prescribe a
log-linear update rule, where each agent's belief is set proportionally to the product of her own and neigh-
boring beliefs. We analyze the evolution of beliefs under this rule and show that agents reach a consensus.
The consensus belief is supported over the maximizers of a weighted sum of the log-likelihoods of the initial
observations. Since the weights of the signal likelihoods coincide with the network centralities of their respec-
tive agents, these weights can be equalized in degree-regular and balanced topologies, where all nodes have
the same in and out degrees. Therefore, in such highly symmetric structures the support of the consensus
belief coincides with the maximum likelihood estimators (MLE) of the truth state; and here again, balanced
regular structures demonstrate a measure of efficiency. Nevertheless, the asymptotic beliefs systematically
reject the less probable alternatives in spite of the limited initial data, and in contrast with the optimal
(Bayesian) belief of an observer with complete information of the environment and private signals. The
latter would assign probabilities proportionally to the likelihood of every state, without rejecting any of the
possible alternatives. The asymptotic rejection of less probable alternatives indicates a case of group polar-
ization, i.e. overconfidence in the group aggregate that emerges as a result of the group interactions. Unlike
the linear action updates and the DeGroot model which entail a host of knife-edge conditions on the signal
structure and model parameters, we observe that the belief updates are unweighted; not only they effectively
internalize the heterogeneity of the private observations, but also they compensate for the individual priors.
Thence, we are led to the conclusion that multiplicative belief updates, when applicable provide a relatively
robust description of the decision making behavior.
Key words : opinion dynamics; social learning; Bayesian learning; non-Bayesian learning; rational learning;
observational learning; statistical learning; distributed learning; distributed hypothesis testing;
distributed detection; DeGroot model; linear regression; conjugate priors; exponential families
MSC2000 subject classification : Primary: 91B06; secondary: 91A35, 62C10
OR/MS subject classification : Primary: Games/group decisions: Voting/committees; secondary:
Organizational studies: Decision making Effectiveness/performance Information; Networks/graphs:
Heuristics
History : This version is dated September 12th, 2016. A preliminary version was presented in NBER-NSF
Seminar on Bayesian Inference in Econometrics and Statistics on April 30, 2016.
1
2
Rahimian and Jadbabaie: Bayesian Heuristics for Group Decisions
1. Introduction. Daniel Kahneman in his highly acclaimed work, "Thinking, Fast and Slow ",
points out that the proper way to elicit information from a group is not through a public discus-
sion but rather confidentially collecting each person's judgment [52, Chapter 23]. Indeed, decision
making among groups of individuals exhibit many singularities and important inefficiencies that
lead to Kahneman's noted advice. As a team converges on a decision expressing doubts about the
wisdom of the consensus choice is suppressed; subsequently teams of decision makers are afflicted
with groupthink as they appear to reach a consensus.1 The mechanisms of uncritical optimism,
overconfidence, and the illusions of validity in group interactions also lead to group polarization,
making the individuals more amenable toward extreme opinions [92].
In more abstract terms, agents in a social network exchange opinions to benefit from each other's
experience and information when making decisions about adoption of technologies, purchasing
products, voting in elections and so on. The problem of social learning is to characterize and
understand such interactions and it is a classical focus of research in microeconomics [45, Chapter
8], [39, Chapter 5], [18]. Research on formation and evolution of beliefs in social networks and
subsequent shaping of the individual and group behaviors have attracted much attention amongst
diverse communities in engineering [58, 97], statistics [66], economics [47, 65], and sociology [82].
An enhanced understanding of decision making and learning in social networks sheds light on
the role of individuals in shaping public opinion and how they influence efficiency of information
transmissions. These in turn help us improve our predictions about group behavior and provide
guidelines for designing effective social and organizational policies.
1.1. Rational social learning. The rational approach advocates application of Bayes rule to
the entire sequence of observations successively at every step. However, such repeated applications
of Bayes rule in networks become very complex, especially if the agents are unaware of the global
network structure; and as they use their local data to make inferences about all possible contin-
gencies that can lead to their observations. While some analytical properties of rational learning
is deduced and studies in the literature [32, 1, 68, 66, 42], their tractable modeling and analysis
remains an important problem in network economics and continues to attract attention.
Some of the earliest results addressing the problem of social learning are due to Banerjee (1992)
[9], and Bikhchandani et al. (1998) [13] who consider a complete graph structure where the agent's
observations are public information and also ordered in time, such that each agent has access to
the observations of all the past agents. These assumptions help analyze and explain the interplay
between public and private information leading to fashion, fads, herds etc. Later results by Gale
and Kariv [32] relax some of these assumptions by considering the agents that make simultane-
ous observations of only their neighbors rather than the whole network, but the computational
complexities limit the analysis to networks with only two or three agents. In more recent results,
Mueller-Frank [68] provides a framework of rational learning that is analytically amenable. Mossel,
Sly and Tamuz [66] analyze the problem of estimating a binary state of the world from a single
initial private signal that is independent and identically distributed amongst the agents conditioned
on the true state; and they show that by repeatedly observing each other's best estimates of the
unknown as the size of the network increases with high probability Bayesian agents asymptotically
learn the true state. Hence, the agents are able to combine their initial private observations and
learn the truth. Further results by Kanoria and Tamuz [53] provide efficient algorithms to calculate
each agent's estimate in the case of tree networks.
On the one hand, the properties of rational learning models are difficult to analyze beyond some
simple asymptotic facts such as convergence. On the other hand, these models make unrealistic
1Gar Klein proposes a famous method of project premortem to overcome the groupthink through an exercise: imagining
that the the planned decision was failed in implementation and writing a brief report of the failure [57].
Rahimian and Jadbabaie: Bayesian Heuristics for Group Decisions
3
assumptions about the complexity and amount of computations that agents perform before com-
mitting to a decision. To avoid these shortcomings, an alternative "non-Bayesian" approach relies
on simple and intuitive heuristics that are descriptive of how agents aggregate the reports of their
neighbors before coming up with a decision.
1.2. Heuristic decision making. Heuristics are used widely in the literature to model social
interactions and decision making [34, 35, 36]. They provide tractable tools to analyze boundedly
rational behavior and offer insights about decision making under uncertainty. Hegselmann and
Krause [43] investigate various ways of averaging to model opinion dynamics and compare their
performance for computations and analysis. Using such heuristics one can avoid the complexities of
fully rational inference, and their suitability are also verified in experimental studies by Grimm and
Mengel [40] and Chandrasekhar, Larreguy and Xandri [19]. The study of such heuristics started in
1974 with the seminal work of DeGroot [20] in linear opinion pooling, where agents update their
opinions to a convex combination of their neighbors' beliefs and the coefficients correspond to the
level of confidence that each agent puts in each of her neighbors. More recently, Jadbabaie, Molavi
and Tahbaz-Salehi [47, 48, 65] consider a variation of this model for streaming observations, where in
addition to the neighboring beliefs the agents also receive private signals. Despite their widespread
applications, theoretical and axiomatic foundations of social inferences using heuristics and non-
Bayesian updates have received limited attention and only recently [65, 69], and a comprehensive
theory of non-Bayesian learning that reconciles the rational and boundedly rational approaches
with the widely used heuristics remains in demand. The main goal of our paper is to address this
gap and to do so from a behavioral perspective.
A dual process theory for the psychology of mind and its operation identifies two systems of
thinking [24]: one that is fast, intuitive, non-deliberative, habitual and automatic (system one);
and a second one that is slow, attentive, effortful, deliberative, and conscious (system two).1 Major
advances in behavioral economics are due to incorporation of this dual process theory and the
subsequent models of bounded rationality [51]. Reliance on heuristics for decision making is a
distinctive feature of system one that avoids the computational burdens of a rational evaluation;
system two on the other hand, is bound to deliberate on the options based on the available infor-
mation before making recommendations. The interplay between these two systems and how they
shape the individual decisions is of paramount importance [17].
Tversky and Kahneman argue that humans have limited time and brainpower, therefore they
rely on simple rules of thumb, i.e. heuristics, to help them make judgments. However, the use of
these heuristics causes people to make predictable errors and subjects them to various biases [96].
Hence, it is important to understand the nature and properties of heuristic decision making and
its consequences to individual and organizational choice behavior. This premise underlies many of
the recent advances in behavioral economics [93], and it motivates our work as well.
1.3. Our contribution.
In this work we are concerned with the operations of system one: we
aim to study heuristics for information aggregation in group decision scenarios when the relevant
information is dispersed among many individuals. In such situations, individuals in the group are
subjected to informational (but not strategic) externalities. By the same token, the heuristics that
are developed for decision making in such situations are also aimed at information aggregation.
In our model as the agent experiences with her environment her initial response would engage
1While many decision science applications focus on developing dual process theories of cognition and decision mak-
ing (cf. [25, 63] and the references therein); other researchers identify multiple neural systems that derive decision
making and action selection: ranging from reflexive and fast (Pavlovian) responses to deliberative and procedural
(learned) ones; and these systems are in turn supported by several motoric, perceptual, situation-categorization and
motivational routines which together comprise the decision making systems [80, Chapyter 6].
Rahimian and Jadbabaie: Bayesian Heuristics for Group Decisions
4 h
er system two: she rationally evaluates the reports of her neighbors and use them to make a
decision. However, after her initial experience and by engaging in repeated interactions with other
group members her system one takes over her decision processes, implementing a heuristic that
imitates her (rational/Bayesian) inferences from her initial experience; hence avoiding the burden
of additional cognitive processing in the ensuing interactions with her neighbors.
On the one hand, our model of inference based on Bayesian (initial) heuristics is motivated by
the real-world behavior of people induced by their system one and reflected in their spur-of-the-
moment decisions and impromptu behavior: basing decisions only on the immediately observed
actions and disregarding the history of the observed actions or the possibility of correlations among
different observations; i.e. "what you see is all there is" [52]. On the other hand, Bayesian heuristics
offer a boundedly rational approach to model decision making over social networks. The latter is
in the sense of the word as coined by Herbert A. Simon: to incorporate modifications that lead to
substantial simplifications in the original choice problem [87].1 This in contrast with the Bayesian
approach which is not only unrealistic in the amount of cognitive burden that it imposes on the
agents, but also is often computationally intractable and complex to analyze.
Our main contribution is to offer a normative framework for heuristic decision making, by relying
on the time-one Bayesian update and using it for all future decision epochs. This model offers a
behavioral foundation for non-Bayesian updating that is compatible with the dual-process psycho-
logical theory of decision making. In Section 2, we describe the mathematical details of our model;
in particular, we explain the mathematical steps for deriving the so-called Bayesian heuristics in
a given decision scenario. Specific cases of Bayesian heuristics that we explore in the following
sections are the log-linear (multiplicative) updating of beliefs over the probability simplex, and the
linear (weighted arithmetic average) updating of actions over the Euclidean space. In Section 3, we
specialize our group decision model to a setting involving exponential family of distributions for
both signal likelihoods and agents' beliefs. The agents aim to estimate the expected values of the
sufficient statistics for their signal structures. We show that the Bayesian heuristics in this case
are affine rules in the self and neighboring actions, and we give explicit expressions for their coeffi-
cients. Subsequently, we provide conditions under which these action updates constitute a convex
combination as in the DeGroot model, with actions converging to a consensus in the latter case. We
also investigate the efficiency of the consensus action in aggregating the initial observations of all
agents across the network. Next in Section 4, we discuss a situation where agents exchange beliefs
about a truth state that can takes one of the finitely many possibilities. The Bayesian heuristics
in this case set the updated beliefs proportional to the product of self and neighboring beliefs,
as reported in every decision epoch. We investigate the evolution of beliefs under the prescribed
update rules and compare the asymptotic beliefs with that of a Bayesian agent with direct access
to all the initial observations; thus characterizing the inefficiencies of the asymptotic beliefs. We
summarize our findings from the analysis of linear action and log-linear belief updates in Section
5, where we reiterate the assumptions that are implicit in the adoption of popular aggregation
heuristics such as the DeGroot model; moreover, we discuss the inefficiencies that arise as a result
of their application. Such heuristics allow us to aggregate the information in our environment, and
provide for desirable asymptotic properties such as consensus; however, this consensus often fails as
an efficient group aggregate for the individuals' private data. We provide the mathematical proofs
and the relevant details for many of the results in the appendices at end of the paper.
1Simon advocates "bounded rationality" as compatible with the information access and the computational capacities
that are actually possessed by the agents in their environments. Most importantly he proposes the use of so-called
"satisficing" heuristrics; i.e. to search for alternatives that exceed some "aspiration levels" by satisfying a set of
minimal acceptability criteria [88, 89].
Rahimian and Jadbabaie: Bayesian Heuristics for Group Decisions
5
2. The model. Consider a group of n agents that are labeled by [n] and interact according
to a digraph G = ([n],E).1 The neighborhood of agent i is the set of all agents whom she observes
including herself, and it is denoted by Ni = {j ∈ [n]; (j, i) ∈ E}∪{i}; every node having a self-loop:
(i, i) ∈ E for all i. We refer to the cardinality of Ni as the degree of node i and denote it by
deg(i). There is a state θ ∈ Θ that is unknown to the agents and it is chosen arbitrarily by nature
from an underlying state space Θ, which is measurable by a σ-finite measure Gθ(·). For example
if a space (Θ or S) is a countable set, then we can take its σ-finite measure (Gθ or Gs) to be
the counting measure, denoted by K(·); and if the space is a subset of Rk with positive Lebesgue
measure, then we can take its σ-finite measure to be the Lebesgue measure on Rk, denoted by
Λk(·). Associated with each agent i, Si is a measurable space called the signal space of i, and given
θ, Li(· θ) is a probability measure on Si, which is referred to as the signal structure of agent i.
Furthermore, (Ω, F ,Pθ) is a probability triplet, where Ω = S1 × . . . × Sn is a product space, and
F is a properly defined sigma field over Ω. The probability measure on Ω is Pθ(·) which assigns
probabilities consistently with the signal structures Li(· θ), i ∈ [n]; and in such a way that with θ
fixed, the random variables si, i ∈ [n] taking values in Si, are independent. These random variables
represent the private signals that agents i ∈ [n] observe at time 0. Note that the private signals are
independent across the agents. The expectation operator Eθ{·} represents integration with respect
to Pθ(dω), ω ∈ Ω.
2.1. Beliefs, actions and rewards. An agents' belief about the unknown allows her to
make decisions even as the outcome is dependent on the unknown value θ. These beliefs about the
unknown state are probability distributions over Θ. Even before any observations are made, every
agent i ∈ [n] holds a prior belief Vi(·) ∈ ∆Θ; this represents her subjective biases about the possible
values of θ. For each time instant t, let Mi,t(·) be the (random) probability distribution over Θ,
representing the opinion or belief at time t of agent i about the realized value of θ. Moreover, let
the associated expectation operator be Ei,t{·}, representing integration with respect to Mi,t(dθ).
We assume that all agents share the common knowledge of signal structures Li(·θ),∀θ ∈ Θ, their
priors Vi(·), and their corresponding sample spaces Si and Θ for all i ∈ [n]. 2
Let t ∈ N0 denote the time index; at t = 0 the values θ ∈ Θ followed by si ∈ Si of si are realized
and the latter is observed privately by each agent i for all i ∈ [n]. Associated with every agent i is
an action space Ai that represents all the choices available to her at every point of time t ∈ N0, and
a utility ui(·,·) : Ai × Θ → R which in expectation represents her von Neumann-Morgenstern pref-
erences regarding lotteries with independent draws from Ai and/or Θ. These utilities are additive
over time corresponding to successive independent draws. The utility functions and action spaces
are common knowledge amongst the agents. Subsequently, at every time t ∈ N0 each agent i ∈ [n]
chooses an action ai,t ∈ Ai and is rewarded ui(ai,t, θ).
1 Some notations: Throughout the paper, R is the set of real numbers, N denotes the set of all natural numbers,
and N0 := N ∪ {0}. For n ∈ N a fixed integer the set of integers {1, 2, . . . , n} is denoted by [n], while any other set
is represented by a capital Greek or calligraphic letter. For a measurable set X we use ∆X to denote the set of all
probability distributions over the set X . Furthermore, any random variable is denoted in boldface letter, vectors are
represented in lowercase letters and with a bar over them, measures are denoted by upper case Greek or calligraphic
Latin letters, and matrices are denoted in upper case Latin letters. For a matrix A, its spectral radius ρ(A) is the
largest magnitude of all its eigenvalues.
2The signal structures Li(·θ),∀θ ∈ Θ and the priors Vi(·), as well as the corresponding sample spaces Si and Θ are
common knowledge amongst the agents for all i ∈ [n]. The assumption of common knowledge in the case of fully
rational (Bayesian) agents implies that given the same observations of one another's beliefs or private signals distinct
agents would make identical inferences; in the sense that starting form the same belief about the unknown θ, their
updated beliefs given the same observations would be the same; in Aumann's words, rational agents cannot agree to
disagree [5].
6
Rahimian and Jadbabaie: Bayesian Heuristics for Group Decisions
about the value of θ and chooses her action ai,0 ←- arg maxai∈Ai RΘ ui(ai, θ)Mi,0(dθ), maximizing
2.2. Aggregation heuristics. Given si, agent i forms an initial Bayesian opinion Mi,0(·)
her expected reward. Here for a set A, we use the notation a ←- A to denote an arbitrary choice
from the elements of A that is assigned to a. Not being notified of the actual realized value for
ui(ai,0, θ), she then observes the actions that her neighbors have taken. Given her extended set of
observations {aj,0, j ∈ Ni} at time t = 1, she refines her opinion into Mi,1(·) and makes a second,
and possibly different, move ai,1 according to:
ai,1 ←- arg max
ai∈Ai ZΘ
ui(ai, θ)Mi,1(dθ),
(1)
maximizing her expected pay off conditional on everything that she has observed thus far; i.e.
maximizing Ei,1{ui(ai, θ)} = Eθ{ui(ai,1, θ)si, aj,0 : j ∈ Ni} = RΘ ui(ai, θ)Mi,1(dθ). Subsequently,
she is granted her net reward of ui(ai,0, θ) + ui(ai,1, θ) from her past two plays. Following realization
of rewards for their first two plays, in any subsequent time instance t > 1 each agent i ∈ [n] observes
the preceding actions of her neighbors aj,t−1 : j ∈ Ni and takes an option ai,t out of the set Ai. Of
particular significance in our description of the behavior of agents in the succeeding time periods
t > 1, is the relation:
fi(aj,0 : j ∈ Ni) := ai,1 ←- arg max
ai∈Ai
Ei,1{ui(ai, θ)}
(2)
derived in (1), which given the observations of agent i at time t = 0, specifies her (Bayesian) pay-off
maximizing action for time t = 1. Once the format of the mapping fi(·) is obtained, it is then
used as a heuristic for decision making in every future epoch. The agents update their action
by choosing: ai,t = fi (aj,t−1 : j ∈ Ni) ,∀t > 1. We refer to the mappings fi :Qj∈Ni Aj → Ai thus
obtained, as Bayesian heuristics.1,2,3
1The heuristics thus obtained suffer from same fallacies of snap judgments that are associated with the recommen-
dations of system one in "Thinking, Fast and Slow"; flawed judgments that rely on simplistic interpretations: "what
you see is all there is", in Kahneman's elegant words [52]. Indeed, the use of the initial Bayesian update for future
decision epochs entails a certain level of naivety on the part of the decision maker: she has to either assume that the
structure of her neighbors' reports have not departed from their initial format, or that they are not being influenced
back by her own or other group members and can thus be regarded as independent sources of information. Such
naivety in disregarding the history of interactions has been highlighted in our earlier works on Bayesian learning
without recall [75], where we interpret the use of time-one Bayesian update for future decision epochs, as a rational
but memoryless behavior: by regarding their observations as being direct consequences of inferences that are made
based on the initial priors, the agents reject any possibility of a past history beyond their immediate observations.
2Similar and related forms of naivety have been suggested in the literature. Eyster and Rabin [26, 27] propose the
autarkic model of naive inference, where players at each generation observe their predecessors but naively think that
any predecessor's action relies solely on that player's private information, thus ignoring the possibility that successive
generations are learning from each other. Bala and Goyal [7]study another form of naivety and bounded-rational
behavior by considering a variation of observational learning in which agents observe the action and pay-offs of their
neighbors and make rational inferences about the action/pay-off correspondences, based on their observations of
the neighboring actions; however, they ignore the fact that their neighbors are themselves learning and trying to
maximize their own pay-offs. Levy and Razin look at a particularly relevant cognitive bias called correlation neglect,
which makes individuals regard the sources of their information as independent [60]; they analyze its implications to
diffusion of information, and focus in particular, on the voting behavior.
3Cognitive and psychological roots of the Bayesian heuristics as aggregation rules can be traced to Anderson's seminal
theory of information integration, developed throughout 1970s and 1980s [3]. Accordingly, a so-called "value function"
assigns psychological values to each of the stimuli and these psychological values are then combined into a single
psychological (and later an observable) response through what is called the "integration function". A fundamental
assumption is that valuation can be represented at a higher (molar) level as a value on the response dimension for each
stimulus, as well as a weight representing the salience of this stimulus in the overall response. These valuations and
weights are themselves the result of integration processes in the lower (molecular) level. At the heart of information
integration theory is the "cognitive algebra" which describes the rules by which the values and weights of stimuli are
integrated into an overall response [4].
Rahimian and Jadbabaie: Bayesian Heuristics for Group Decisions
7
3. Affine action updates, linear updating and DeGroot learning.
In this section we
explore the essential modeling features that lead to a linear structure in the Bayesian Heuristics.
We present a general scenario that involves the exponential family of distributions and leads to
linear action updates.
To describe the signal structures, we consider a measurable sample space S with a σ-finite
measure Gs(·), and a parametrized class of sampling functions {L(·θ; σi) ∈ ∆S : σi > 0 and δi > 0}
belonging to the k-dimensional exponential family as follows:
'(sθ; σi, δi) :=
dL(·θ; σi, δi)
dGs
Λk(ξ(ds))
Gs(ds)
(cid:12)
(cid:12)
(cid:12) τ (σiξ(s), δi) eσiη(θ)T ξ(s)−δiγ(η(θ)),
(cid:12)
(3)
where ξ(s) : S → Rk is a measurable function acting as a sufficient statistic for the random samples,
η : Θ → Rk is a mapping from the parameter space Θ to Rk, τ : Rk ×(0, +∞) → (0, +∞) is a positive
weighting function, and
Λk(ξ(ds))
Gs(ds)
(cid:12)
(cid:12)
(cid:12) τ (σiξ(s), δi)eσiη(θ)T ξ(s)Gs(ds),
(cid:12)
lnZs∈S
1 δ
i
γ(η(θ)) :=
is a normalization factor that is constant when θ is fixed, even though δi > 0 and σi > 0
vary. This normalization constant for each θ is uniquely determined by the functions η(·),
ξ(·) and τ (·). The parameter space Θ and the mapping η(·) are such that the range space
Ωθ := {η(θ) : θ ∈ Θ} is an open subset of the natural parameter space Ωη := {η ∈ Rk :
Rs∈S Λk(ξ(ds))/Gs(ds)τ (ξ(s), 1) eηT ξ(s)Gs(ds) < ∞}. In (3), σi > 0 and δi > 0 for each i are scal-
ing factors that determine the quality or informativeness of the random sample si with regard to
the unknown θ: fixing either one of the two factors σi or δi, the value of the other one increases
with the increasing informativeness of the observed value ξ(si). The following conjugate family of
priors1 are associated with the likelihood structure (3). This family is determined uniquely by the
transformation and normalization functions: η(·) and γ(·), and it is parametrized through a pair
of parameters (α, β), α ∈ Rk and β > 0:
ν(θ; α, β) :=
dV(·; α, β)
Fγ,η :=(cid:26)V(θ; α, β) ∈ ∆Θ, α ∈ Rk, βi > 0 :
(cid:12)
(cid:12)
(cid:12)
(cid:12)
κ(α, β) := Zθ∈Θ(cid:12)(cid:12)(cid:12)(cid:12)
=(cid:12)(cid:12)(cid:12)(cid:12)
(cid:12)
(cid:12) eη(θ)T α−βγ(η(θ))Gθ(dθ) < ∞(cid:27).
(cid:12)
(cid:12)
dGθ
Λk(η(dθ))
Gθ(dθ)
Λk(η(dθ))
Gθ(dθ)
eη(θ)T α−βγ(η(θ))
,
κ(α, β)
mi,θ), ∀a ∈ Ai = Rk, where mi,θ := Ei,θ{ξ(si)} :=Rs∈S
Furthermore, we assume that agents take actions in Rk, and that they aim for a minimum variance
estimation of the regression function or conditional expectation (given θ) of the sufficient statistic
ξ(si). Hence, we endow every agent i ∈ [n] with the quadratic utility ui(a, θ) = −(a − mi,θ)T (a −
Our main result in this section prescribes a scenario in which each agent starts from a prior
belief V(·; αi, βi) belonging to Fγ,η and she observes a fixed number ni of i.i.d. samples from the
distribution L(· θ; σi, δi). The agents then repeatedly communicate their actions aimed at minimum
variance estimation of mi,θ. These settings are formalized under the following assumption that we
term the Exponential Family Signal-Utility Structure.
ξ(s)L(dsθ; σi, δi) ∈ Rk.
1Consider a parameter space Θ, a sample space S, and a sampling distribution L(·θ) ∈ ∆S, θ ∈ Θ. Suppose that s
is a random variable which is distributed according to L(·θ) for any θ. A family F ⊂ ∆Θ is a conjugate family for
L(·θ), if starting from any prior distribution V(·) ∈ F and for any signal s ∈ S, the posterior distribution given the
observation s = s belongs to F.
= σi(cid:12)(cid:12)(cid:12)(cid:12)
σi(cid:12)(cid:12)(cid:12)(cid:12)
8
Rahimian and Jadbabaie: Bayesian Heuristics for Group Decisions
Assumption 1 (Exponential family signal-utility structure).
(i) Every agent i ∈ [n] observes ni i.i.d. private samples si,p, p ∈ [ni] from the common sample
space S and that the random samples are distributed according to the law L(·θ; σi, δi) given
by (3) as a member of the k-dimensional exponential family.
(ii) Every agent starts from a conjugate prior Vi(·) = V(·; αi, βi) ∈ Fγ,η, for all i ∈ [n].
(iii) Every agent chooses actions a ∈ Ai = Rk and bears the quadratic utility ui(a, θ) = −(a −
mi,θ)T (a− mi,θ), where mi,θ := Ei,θ{ξ(si)} :=Rs∈S
ξ(s)L(dsθ; σi, δi) ∈ Rk.
The Bayesian heuristics fi(·), i ∈ [n] under the settings prescribed by the exponential family
signal-utility structure (Assumption 1) are linear functions of the neighboring actions with specified
coefficients that depend only on the likelihood structure parameters: ni, σi and δi as well as the
prior parameters: αi and βi, for all i ∈ [n].1
Theorem 1 (Affine action updates). Under the exponential family signal-utility structure
specified in Assumption 1, the Bayesian heuristics describing the action update of every agent i ∈ [n]
Tijaj,t−1 + i, where for all i, j ∈ [n] the constants Tij
and δi are as follows:
are given by: ai,t = fi(aj,t−1 : j ∈ Ni) =Pj∈Ni
Tij =
δiσj(nj + δ−1
j βj)
σi(βi +Pp∈Ni
npδp)
, i = −
δi
σi(βi +Pp∈Ni
npδp) Xj∈Ni\{i}
αj.
1,t, . . . , aT
The action profile at time t is the concatenation of all actions in a column vector: at =
(aT
n,t)T . The matrix T with entries Tij, i, j ∈ [n] given in Theorem 1 is called the social
influence matrix. The constant terms i in this theorem appear as the rational agents attempt to
compensate for the prior biases of their neighbors when making inferences about the observations
in their neighborhood; we denote = (T
n )T and refer to it as the vector of neighborhood
biases. The evolution of action profiles under conditions of Theorem 1 can be specified as follows:
at+1 = (T ⊗ Ik)at + , where Ik is the k × k identity matrix and (T ⊗ Ik) is a Kronecker product.
Subsequently, the evolution of action profiles over time follows a non-homogeneous positive linear
discrete-time dynamics, cf. [28]. If the spectral radius of T is strictly less than unity: ρ(T ) < 1, then
I − T is non-singular; there is a unique equilibrium action profile given by ae = ((I − T )−1 ⊗ Ik)
and limt→∞ at = ae. If unity is an eigenvalue of T , then there may be no equilibrium action profiles
or an infinity of them. If ρ(T ) > 1, then the linear discrete-time dynamics is unstable and the action
profiles may grow unbounded in their magnitude, cf. [49].
1 , . . . , T
Example 1 (Gaussian Signals with Gaussian Beliefs). Mossel and Tamuz [67] consider
the case where the initial private signals as well as the unknown states are normally distributed
and the agents all have full knowledge of the network structure. They show that by iteratively
observing their neighbors' mean estimates and updating their beliefs using Bayes rule all agents
converge to the same belief. The limiting belief is the same as what a Bayesian agent with direct
access to everybody's private signals would have hold; and furthermore, the belief updates at each
step can be computed efficiently and convergence occurs in a number of steps that is bounded
in the network size and its diameter. These results however assume complete knowledge of the
network structure by all the agents.
Here, we consider the linear action updates in the Gaussian setting. Let Θ = R be the param-
eter space associated with the unknown parameter θ ∈ Θ. Suppose that each agent i ∈ [n] holds
1Some of the non-Bayesian update rules have the property that they resemble the replication of a first step of a
Bayesian update from a common prior. For instance, DeMarzo, Vayanos and Zwiebel [21] interpret the weights in
the DeGroot model as those assigned initially by rational agents to the noisy opinions of their neighbors based on
their perceived precision. However, by repeatedly applying the same weights over and over again, the agents ignore
the need to update these weights and to account for repetitions in their information sources (the so-called persuasion
bias); as one of our main objectives, we formalize this setup as a Bayesian heuristic.
Rahimian and Jadbabaie: Bayesian Heuristics for Group Decisions
9
i
i
i = δ−1
i
and variance β−1
onto a Gaussian prior belief with mean αiβ−1
; here, γ(θ) = θ2/2 and η(θ) =
θ. Further suppose that each agent observes an independent private Gaussian signal si with
mean θ and variance σ−1
, for all i ∈ [n]; hence, ξ(si) = si and τ (σiξ(si), δi) = τ (σisi, σi) =
(2π/σi)−1/2 exp(σis2
i /2). After observing their private signals all engage in repeated communica-
tions with their neighbors. Finally, we assume that each agents is trying to estimate the mean
mi,θ = Ei,θ{si} of her private signal with as little variance as possible. Under the prescribed set-
ting, Theorem 1 applies and the Bayesian heuristic update rules are affine with the coefficients as
specified in the theorem with ni = 1 and σi = δi for all i. In particular, if αi = (0, . . . , 0) ∈ Rk and
βi → 0 for all i, then i = 0 for all i and the coefficients Tij = σj/Pp∈Ni
σp > 0 specify a convex
combination:Pj∈Ni
Example 2 (Poisson signals with gamma beliefs). As the second example, suppose that
each agent observe ni i.i.d. Poisson signals si,p : p ∈ [ni] with mean δiθ, so that Θ = Ai = (0, +∞)
for all i ∈ [n]. Moreover, we take each agent's prior to be a Gamma distribution with parameters
αi > 0 and βi > 0, denoted Gamma(αi,βi):
Tij = 1 for all i.
νi(θ) :=
dVi
dΛ1
=
αi
βi
Γ(αi)
θαi−1e−βiθ,
for all θ ∈ (0,∞) and each i ∈ [n]. Note that here η(θ) = log θ, γ(η(θ)) = exp(η(θ)) = θ, κ(αi, βi) =
si,p
Γ(αi)βi−αi, mi,θ = δiθ, ξ(si,p) = si,p, σi = 1 and τ (σiξ(si,p), δi) = δ
i /(si,p!), for all i, p. This setting
corresponds also to a case of Poisson observers with common rate θ and individual exposures
δi, i ∈ [n], cf. [33, p. 54]. The posterior distribution over Θ after observing of the sum of ni Poisson
p=1 si,p + αi
and niδi + βi, [33, pp. 52–53]. Using a quadratic utility −(a− δiθ)2, the expected pay-off at time zero
is maximized by the δi-scaled mean of the posterior Gamma belief distribution [33, p. 587]: ai,0 =
j )aj,0 − αj,
[(nj +
βjδ−1
njδj. The subsequent optimal action at time 1 and the resultant
Bayesian heuristics are as claimed in Theorem 1 with σi = 1 for all i ∈ [n]. Here if we let αi, βi → 0
np > 0 again
Tij = 1 for all i as in the DeGroot model. In the following
two subsections, we shall further explore this correspondence with the DeGroot updates and the
implied asymptotic consensus amongst the agents.
mean δiθ samples is again a Gamma distribution with updated (random) parametersPni
δi(Pni
p=1 si,p + αi)/(niδi + βi). Given the neighboring informationPnj
∀j ∈ Ni, agent i can refine her belief into a Gamma distribution with parameters αi +Pj∈Ni
j )aj,0 − αj] and βi +Pj∈Ni
and δi = δ > 0 for all i, then i = 0 for all i and the coefficients Tij = nj/Pp∈Ni
specify a convex combination: Pj∈Ni
p=1 sj,p = (nj + βjδ−1
3.1. Linear updating and convergence.
In general, the constant terms i in Theorem 1
depend on the neighboring prior parameters αj, j ∈ Ni \ {i} and can be non-zero. Accumulation
of constant terms over time when ρ(T ) ≥ 1 prevents the action profiles from converging to any
finite values or may cause them to oscillate indefinitely (depending upon the model parameters).
However, if the prior parameters are vanishingly small, then the affine action updates in Theorem
1 reduce to linear update and i = 0. This requirement on the prior parameters is captured by our
next assumption.
Assumption 2 (Non-informative priors). For a member V(·; α, β) of the conjugate family
Fγ,η we denote the limit limαi,βi→0 V(·; α, β) by V∅(·) and refer to it as the non-informative (and
improper, if V∅(·) 6∈ Fγ,η) prior. 1 All agents start from a common non-informative prior: Vi(·) =
V∅(·), ∀i.
1Conjugate priors offer a technique for deriving the prior distributions based on the sample distribution (likelihood
structures). However, in lack of any prior information it is impossible to justify their application on any subjective
basis or to determine their associated parameters for any agent. Subsequently, the use of non-informative priors is
suggested by Bayesian analysts and various techniques for selecting non-informative priors is explored in the literature
[55]. Amongst the many proposed techniques for selecting non-informative priors, Jeffery's method sets its choice
10
Rahimian and Jadbabaie: Bayesian Heuristics for Group Decisions
As the name suggest non-informative priors do not inform the agent's action at time 0 and
the optimal action is completely determined by the observed signal si,p : p ∈ [ni] and its likelihood
structure, parameterized by σi and δi. If we let αi, βi → 0 in the expressions of Tij and i from
Theorem1, then the affine action updates reduce to linear combinations and the preceding corollary
is immediate.
Corollary 1 (Linear updating). Under the exponential
family signal-utility structure
(Assumption 1) with non-informative priors (Assumption 2); the Bayesian heuristics describe
each updated action ai,t as a linear combination of the neighboring actions aj,t−1, j ∈ Ni: ai,t =
npδp).
Pj∈Ni
Tijaj,t−1, where Tij = δiσjnj/(σiPp∈Ni
The action profiles under Corollary 1 evolve as a homogeneous positive linear discrete-time system:
at+1 = (T ⊗ Ik)at and if the spectral radius of T is strictly less than unity, then limt→∞ at = 0. For a
strongly connected social network with Tii > 0 for all i the Perron-Frobenius theory [85, Theorems
1.5 and 1.7] implies that T has a simple positive real eigenvalue equal to ρ(T ). Moreover, the
left and right eigenspaces associated with ρ(T ) are both one-dimensional with the corresponding
eigenvectors l = (l1, . . . , ln)T and r = (r1, . . . , rn)T , uniquely satisfying klk2 = krk2 = 1, li > 0, ri > 0,
i=1 liri = 1. The magnitude of any other eigenvalue of T is strictly less than ρ(T ). If
ρ(T ) = 1, then limt→∞ at = limt→∞(T t ⊗ Ik)a0 = (rl
⊗ Ik) a0; in particular, the asymptotic action
profile may not represent a consensus although every action converges to some point within the
convex hull of the initial actions {ai,0, i ∈ [n]}. If ρ(T ) > 1, then the linear discrete-time dynamics
is unstable and the action profiles may increase or decrease without bound; pushing the decision
outcome to extremes, we can associate ρ(T ) > 1 to cases of polarizing group interactions.
∀i and Pn
T
3.2. DeGroot updates, consensus and efficiency.
In order for the linear action updates
in Corollary 1 to constitute a convex combination as in the DeGroot model,1 we need to introduce
some additional restrictions on the likelihood structure of the private signals.
Assumption 3 (Locally balanced likelihoods). The likelihood structures given in (3) are
δjnj) /Pj∈Ni
called locally balanced if for all i ∈ [n], (δi/σi) = (Pj∈Ni
structures of every agent i and her neighborhood to satisfy: δiPj∈Ni
Assumption 3 signifies a local balance property for the two exponential family parameters σi
and δi and across every neighborhood in the network. In particular, we need for the likelihood
δjnj. Since
parameters σi and δi are both measures of accuracy or precision for private signals of agent i,
the balance condition in Assumption 3 imply that the signal precisions are spread evenly over the
agents; i.e. the quality of observations obey a rule of social balance such that no agent is in a
σjnj = σiPj∈Ni
σjnj.
proportional to the square root of Fisher's information measure of the likelihood structure [81, Section 3.5.3], while
Laplace's classical principle of insufficient reason favors equiprobability leading to priors which are uniform over the
parameter space.
1The use of linear averaging rules for modeling opinion dynamics has a long history in mathematical sociology and
social psychology [30]; their origins can be traced to French's seminal work on"A Formal Theory of Social Power"
[29]. This was followed up by Harary's investigation of the mathematical properties of the averaging model, including
the consensus criteria, and its relations to Markov chain theory [41]. This model was later generalized to belief
exchange dynamics and popularized by DeGroot's seminal work [20] on linear opinion pools. In engineering literature,
the possibility to achieve consensus in a distributed fashion (through local interactions and information exchanges
between neighbors) is very desirable in a variety of applications such as load balancing [6], distributed detection and
estimation [15, 95, 54], tracking [56], sensor networks and data fusion [98, 99], as well as distributed control and
robotics networks [46, 64]. Early works on development of consensus algorithms originated in 1980s with the works
of Tsitsiklis et.al [94] who propose a weighted average protocol based on a linear iterative approach for achieving
consensus: each node repeatedly updates its value as a weighted linear combination of its own value and those received
by its neighbors.
Rahimian and Jadbabaie: Bayesian Heuristics for Group Decisions
11
position of superiority to everyone else. Indeed, fixing δi = δ for all i, the latter condition reduces
to a harmonic property for the parameters σi, when viewed as a function of their respective nodes
(cf. [61, Section 2.1] for the definition and properties of harmonic functions):
σi =Xj∈Ni
njσjPk∈Ni
, δi = δ,∀i.
nk
(4)
However, in a strongly conceded social network (4) cannot hold true unless σi is a constant: σi = σ
for all i. Similarly, when σi = σ is a constant, then under Assumption 3 δi is spread as a harmonic
function over the network nodes, and therefore can only take a constant value δi = δ for all i, cf.
[61, Section 2.1, Maximum Principle]. In particular, fixing either of the parameters σi or δi for all
agents and under the local balance condition in Assumption 3, it follows that the other parameter
should be also fixed across the network; hence, the ratio σi/δi will be a constant for all i. Later
when we consider the efficiency of consensus action we introduce a strengthening of Assumption 3,
called globally balanced likelihood (cf. Assumption 4), where the ratio δi/σi should be a constant
for all agents across the network. Examples 1 and 2 above provide two scenarios in which the
preceding balancedness conditions may be satisfied: (i) having σi = δi for all i, as was the case
with the Gaussian signals in Example 1, erasures that the likelihoods are globally balanced; (ii)
all agents receiving i.i.d. signals from a common distribution in Examples 2 (Poisson signals with
the common rate θ and common exposure δ) makes a case for likelihoods being locally balanced.
Theorem 2 (DeGroot updating and consensus). Under the exponential family signal-
utility structure (Assumption 1), with non-informative priors (Assumption 2) and locally balanced
likelihoods (Assumption 3); the updated action ai,t is a convex combination of the neighboring
Tij = 1 for all i. Hence, in a strongly connected
social network the action profiles converge to a consensus, and the consensus value is a convex
combination of the initial actions ai,0 : i ∈ [n].
actions aj,t−1, j ∈ Ni: ai,t =Pj∈Ni
Tijaj,t−1,Pj∈Ni
In light of Theorem 2, it is of interest to know if the consensus action agrees with the min-
imum variance unbiased estimator of mi,θ given all the observations of every agent across the
network, i.e. whether the Bayesian heuristics efficiently aggregate all the information amongst the
networked agents. Our next result addresses this question. For that to hold we need to introduce
a strengthening of Assumption 3:
Assumption 4 (Globally balanced likelihoods). The likelihood structures given in (3) are
called globally balanced if for all i ∈ [n] and some common constant C > 0, δi/σi = C.
In particular, under Assumption 4, σiδj = σjδi for all i, j, and it follows that the local balance
of likelihoods is automatically satisfied. We call the consensus action efficient if it coincides with
the minimum variance unbiased estimator of mi,θ for all i and given all the observations of every
agent across the network. Our next result indicates that global balance is a necessary condition
for the agents to reach consensus on a globally optimal (efficient) action. To proceed, let the
network graph structure be encoded by its adjacency matrix A defined as [A]ij = 1 ⇐⇒ (j, i) ∈ E,
and [A]ij = 0 otherwise. To express the conditions for efficiency of consensus, we need to consider
the set of all agents who listen to the beliefs of a given agent j; we denote this set of agents by
N out
:= {i ∈ [n] : [I + A]ij = 1} and refer to them as the out-neighborhood of agent j. This is in
contrast to her neighborhood Nj, which is the set of all agents whom she listens to. Both sets Nj
and N out
include agent j as a member.
Theorem 3 ((In-)Efficiency of consensus). Under the exponential
family signal-utility
structure (Assumption 1) and with non-informative priors (Assumption 2); in a strongly connected
social network the agents achieve consensus at an efficient action if, and only if, the likelihoods are
npδp, for all i and j. The efficient consensus action is
j
j
globally balanced andPp∈N out
then given by a? =Pn
j=1(cid:16)δjnjaj,0/Pn
npδp =Pp∈Ni
p=1 npδp(cid:17).
j
12
Rahimian and Jadbabaie: Bayesian Heuristics for Group Decisions
Following our discussing of Assumption 3 and equation (4), we pointed out that if either of
the two parameters σi and δi that characterize the exponential family distribution of (3) are held
fixed amongst the agents, then the harmonicity condition required for the local balancedness of
the likelihoods implies that the other parameter is also fixed for all the agents. Therefore the local
balancedness in many familiar cases (see Example 2) restricts the agents to observing i.i.d. signals:
allowing heterogeneity only in the sample sizes, but not in the distribution of each sample. This
special case is treated in our next corollary, where we also provide the simpler forms of the Bayesian
heuristics and their linearity coefficients in the i.i.d. case:
j
Corollary 2 (DeGroot learning with i.i.d. samples). Suppose that each agent i ∈ [n]
observes ni i.i.d. samples belonging to the same exponential family signal-utility structure (Assump-
tion 1 with σi = σ and δi = δ for all i). If the agents have non-informative priors (Assump-
tion 2) and the social network is strongly connected social network, then following the Bayesian
Tijaj,t−1,
np, and reach a consensus. The consensus action is efficient if, and only
np for all i and j, and the efficient consensus action is given by a? =
heuristics agents update their action according to the linear combination: ai,t =Pj∈Ni
where Tij = nj/Pp∈Ni
if, Pp∈N out
np =Pp∈Ni
j=1(cid:16)aj,0nj/Pn
p=1 np(cid:17) .
Pn
It is notable that the consensus value pinpointed by Theorem 2 does not necessarily agree with
the MVUE of mi,θ given all the private signals of all agents across the network; in other words,
by following Bayesian heuristics agents may not aggregate all the initial data efficiently. As a
simple example, consider the exponential family signal-utility structure with non-informative priors
(Assumptions 1 and 2) and suppose that every agent observes an i.i.d. sample from a common
distribution L(·θ; 1, 1). In this case, the action updates proceed by simple iterative averaging:
aj,t−1 for all i ∈ [n] and any t ∈ N. For an undirected graph G it is well-known
that the asymptotic consensus action following simple iterative averaging is the degree-weighted
i=1(deg(i)/E)ai,0, cf. [38, Section II.C]; and the consensus action is different form the
i=1 ai,0 unless the social network is a regular graph in which case,
ai,t = (1/Ni)Pj∈Ni
averagePn
global MVUE a? = (1/n)Pn
tion for efficiency of consensus,Pp∈N out
j
Remark 1 (Efficiency of Balanced Regular Structures).
deg(i) = d is fixed for all i, and E = n.d.
In general, if we assume
that all agents receive the same number of i.i.d. samples from the same distribution, then the condi-
np, is satisfied for balanced regular structures.
In such highly symmetric structures, the number of outgoing and incoming links are the same for
every node and equal to fixed number d.
np =Pp∈Ni
Our results shed light on the deviations from the globally efficient actions, when consensus is
being achieved through the Bayesian heuristics. This inefficiency of Bayesian heuristics in globally
aggregating the observations can be attributed to the agents' naivety in inferring the sources of
their information, and their inability to interpret the actions of their neighbors rationally, [38];
in particular, the more central agents tend to influence the asymptotic outcomes unfairly. This
sensitivity to social structure is also due to the failure of agents to correct for the repetitions in
the sources of the their information: agent i may receive multiple copies that are all influenced by
the same observations from a far way agent; however, she fails to correct for these repetition in the
sources of her observations, leading to the co-called persuasion bias, [21].1
1Sobel [90] provides a theoretical framework to study the interplay between rationality and group decisions and points
out the subsequent inefficiencies in information aggregation. The seminal work of Janis [50] provides various examples
involving the American foreign policy in the mid-twentieth where the desire for harmony or conformity in the group
have resulted in bad group decisions, a phenomenon that he coins groupthink. Various other works have looked at the
choice shift toward more extreme options [23, 91] and group polarization [44, 83].
Rahimian and Jadbabaie: Bayesian Heuristics for Group Decisions
13
4. Log-Linear belief updates. When the state space Θ is finite, the action space is the
probability simplex and the agents bear a quadratic utility that measures the distance between
their action and the point mass on the true state, the communication structure between the agents
is rich enough for them to reveal their beliefs at every time period. The Bayesian heuristics in
this case lead to a log-linear updating of beliefs similar to what we analyze in [73, 75] under the
Bayesian without recall model; the chief question of interest to the latter works is whether the
agents, after being exposed to sequence of private observations and while communicating with each
other, can learn the truth using the Bayesian without recall update rules. 1 The learning framework
of [73, 74, 75, 78] in which agents have access to an stream of new observations is in contrast with
the group decision model of this paper; the difference being in the fact that here the agents have a
single initial observation and engage in group decision making to come up with the best decision
that aggregates their individual private data with those of the other group members.
Consider an environment where the state space is a finite set of cardinality m and agents take
actions over the (m− 1)-simplex of probability measures while trying to minimize their distance to
a point mass on the true state. Specifically, let Θ = {θ1, . . . , θm}, Ai = ∆Θ and for any probability
measure M(·) ∈ Ai with probability mass function µ(·) := dM/dK, suppose that
ui(M, θj) = −(1− µ(θj))2 −
µ(θk)2.
m
X
k=1,
k6=j
Ei,t{ui(M, θ)}, and the agents proceed by truthfully announc-
Subsequently, Mi,t = arg maxM∈∆Θ
ing their beliefs to each other at every time step. In particular, if we denote the belief probability
mass functions νi(·) := dVi/dK and µi,t(·) := dMi,t/dK for all t, then we can follow the steps of [77]
to derive the Bayesian heuristic fi in (2) by replicating the time-one Bayesian belief update for all
future time-steps:
µi,t(θ) =
for all θ ∈ Θ and at any t > 1.2,3
µj,t−1(θ)
µi,t−1(θ)(cid:16)Qj∈Ni\{i}
Pθ∈Θ µi,t−1(θ)(cid:16)Qj∈Ni\{i}
νj (θ) (cid:17)
νj (θ) (cid:17) ,
µj,t−1(θ)
(5)
1Naivety of agents in these cases impedes their ability to learn; except in simple social structures such as cycles or
rooted trees (cf. [74]). Rahimian, Shahrampour and Jadbabaie [78] show that learning in social network with complex
neighborhood structures can be achieved if agents choose a neighbor randomly at every round and restrict their belief
update to the selected neighbor each time. In the literature on theory of learning in games [31], log-linear learning
refers to a class of randomized strategies, where the probability of each action is proportional to an exponential of the
difference between the utility of taking that action and the utility of the optimal choice. Such randomized strategies
combine in a log-linear manner [14], and they have desirable convergence properties: under proper conditions, it can
be shown that the limiting (stationary) distribution of action profiles is supported over the Nash equilibria of the
game [62].
2In writing (5), every time agent i regards each of her neighbors j ∈ Ni as having started from some prior belief
νj(·) and arrived at their currently reported belief µj,t−1(·) upon observing their private signals, hence rejecting any
possibility of a past history, or learning and correlation between their neighbors. Such a rule is of course not the
optimum Bayesian update of agent i at any step t > 1, because the agent is not taking into account the complete
observed history of beliefs and is instead, basing her inference entirely on the initial signals and the immediately
observed beliefs.
3It is notable that the Bayesian heuristic in (5) has a log-linear structure. Geometric averaging and logarithmic opinion
pools have a long history in Bayesian analysis and behavioral decision models [37, 84] and they can be also justified
under specific behavioral assumptions [65]. The are also quite popular as a non-Bayesian update rule in engineering
literature for addressing problems such as distributed detection and estimation [86, 79, 71, 59, 8]. In [8] the authors use
14
Rahimian and Jadbabaie: Bayesian Heuristics for Group Decisions
4.1. An algebra of beliefs. Both the linear action updates studied in the previous chapter
as well as the weighted majority update rules that arise in the binary case and are studied in
[76, 75] have a familiar algebraic structure. It is instructive to develop similar structural properties
for belief updates in (5) and over the space ∆Θ, i.e. the points of the standard (m − 1)-simplex.
Given two beliefs µ1(·) and µ2(·) over Θ we denote their "addition" as
µ1 ⊕ µ2(θ) =
µ1(θ)µ2(θ)
Pθ∈Θ µ1(θ)µ2(θ)
.
Indeed, let ∆Θo denote the (m − 1)-simplex of probability measure over Θ after all the edges are
excluded; ∆Θo endowed with the ⊕ operation, constitutes a group (in the algebraic sense of the
word). It is easy to verify that the uniform distribution ¯µ(θ) = 1/Θ acts as the identity element
for the group; in the sense that ¯µ ⊕ µ = µ for all µ ∈ ∆Θo, and given any such µ we can uniquely
identify its inverse as follows:
µinv(θ) =
1/µ(θ)
.
Pθ∈Θ 1/µ(θ)
Moreover, the group operation ⊕ is commutative and we can thus endow the abelian group (∆Θo,⊕)
with a subtraction operation:
µ1 (cid:9) µ2(θ) = µ1 ⊕ µinv
2 (θ) =
µ1(θ)/µ2(θ)
Pθ∈Θ µ1(θ)/µ2(θ)
.
We are now in a position to rewrite the Bayesian heuristic for belief updates in terms of the group
operations ⊕ and (cid:9) over the simplex interior:
µi,t = ⊕j∈Ni
µj,t−1 (cid:9)j∈Ni\{i}
νj.
The above belief update has a structure similar to the linear action updates studied in (1): the
agents incorporate the beliefs of their neighbors while compensating for the neighboring priors to
isolate the observational parts of the neighbors' reports. A key difference between the action and
belief updates is in the fact that action updates studied in Section 3 are weighted in accordance
with the observational ability of each neighbor, whereas the belief updates are not. Indeed, the
quality of signals are already internalized in the reported beliefs of each neighbor; therefore there
is no need to re-weight the reported beliefs when aggregating them.
a logarithmic opinion pool to combine the estimated posterior probability distributions in a Bayesian consensus filter;
and show that as a result: the sum of KullbackLeibler divergences between the consensual probability distribution
and the local posterior probability distributions is minimized. Minimizing the sum of KullbackLeibler divergences as
a way to globally aggregate locally measured probability distributions is proposed in [11, 10] where the corresponding
minimizer is dubbed the KullbackLeibler average. Similar interpretations of the log-linear update are offered in [70]
as a gradient step for minimizing either the KullbackLeibler distance to the true distribution, or in [72] as a posterior
incorporation of the most recent observations, such that the sum of KullbackLeibler distance to the local priors is
minimized; indeed, the Bayes' rule itself has a product form and the Bayesian posterior can be characterized as the
solution of an optimization problem involving the KullbackLeibler divergence to the prior distribution and subjected
to the observed data [100]. In the past, we have investigated the implications of such log-linear behavior and properties
of convergence and learning when agents are exposed to a stream of private observation [73, 74, 77, 78].
Rahimian and Jadbabaie: Bayesian Heuristics for Group Decisions
15
Given the abelian group structure we can further consider the "powers" of each element µ2 =
µ ⊕ µ and so on; in general for each inetger n and any belief µ ∈ ∆Θo, let the n-th power of µ be
denoted by n(cid:12) µ := µn, defined as follows:1
µn(θ) =
µn(θ)
.
Pθ∈Θ µn(θ)
([I + A]ij (cid:12) µj,t) (cid:9)j∈[n]
Using the ⊕ and (cid:12) notations, as well as the adjacency matrix A we get:
µi,t+1 = ⊕j∈Ni
µj,t (cid:9)j∈Ni\{i}
νj = ⊕j∈[n]
([A]ij (cid:12) νj).
(9)
With some abuse of notation, we can concatenate the network beliefs at every time t into a column
vector µt = (µ1,t, . . . , µn,t)T and similarly for the priors ν = (ν1, . . . , νn)T ; thus (9) can be written
in the vectorized format by using the matrix notation as follows:
µt = {(I + A)(cid:12) µt−1}(cid:9){A(cid:12) ν}
Iterating over t and in the common matrix notation we obtain:
µt =n(I + A)t (cid:12) µ0o(cid:9)n(Pt
τ =0(I + A)τ A)(cid:12) νo.
The above is key to understanding the evolution of beliefs under the Bayesian heuristics in (5), as
we will explore next. In particular, when all agents have uniform priors νj = ¯µ for all j, then (10)
and (11) simplify as follows: µt = (I + A) (cid:12) µt−1 = (I + A)t (cid:12) µ0. This assumption of a common
uniform prior is the counterpart of Assumption 1 (non-informative priors) in Subsection 3.1, which
paved the way for transition from affine action updates into linear ones. In the case of beliefs over
a finite state space Θ, the uniform prior ¯µ is non-informative. If all agents start form common
uniform priors, the belief update in (5) simplifies as follows:
(10)
(11)
µi,t(θ) = Qj∈Ni
Pθ∈ΘQj∈Ni
µj,t−1(θ)
µj,t−1(θ)
.
(12)
Our main focus in the next section is to understand how the individual beliefs evolve under (5),
or (12) which is a spacial case of (5). The gist of our analysis is encapsulated in the group theoretic
iterations: µt = (I + A)t (cid:12) µ0, derived above for the common uniform priors case. In particular,
our understanding of the increasing matrix powers (I + A)t plays a key role. When the network
graph G is strongly connected, the matrix I + A is primitive. The Perron-Frobenius theory [85,
Theorems 1.5 and 1.7] implies that I + A has a simple positive real eigenvalue equal to its spectral
radius ρ(I + A) = 1 + ρ, where we adopt the shorthand notation ρ := ρ(A). Moreover, the left and
right eigenspaces associated with this eigenvalue are both one-dimensional and the corresponding
eigenvectors can be taken such that they both have strictly positive entries. The magnitude of
any other eigenvalue of I + A is strictly less than 1 + ρ. Hence, the eigenvalues of I + A denoted
by λi(I + A), i ∈ [n], can be ordered in their magnitudes as follows: λn(I + A) ≤ λn−1(I + A) ≤
1This notation extends to all real numbers n ∈ R, and it is easy to verify that the following distributive properties are
satisfied:
n(cid:12) (µ1 ⊕ µ2) = (n(cid:12) µ1)⊕ (n(cid:12) µ2),
(m + n)(cid:12) µ1 = (m(cid:12) µ1)⊕ (n(cid:12) µ1),
(m.n)(cid:12) µ1 = m(cid:12) (n(cid:12) µ1),
for all m, n ∈ R and µ1, µ2 ∈ ∆Θo.
16
Rahimian and Jadbabaie: Bayesian Heuristics for Group Decisions
(13)
! .
T i
(λi(I + A)/(1 + ρ))tril
n
X
i=2
(I + A)t = (1 + ρ)t r1α
T
+
. . . < λ1(I + A) = 1 + ρ. Subsequently, we can employ the eigendecomposition of (I + A) to analyze
the behavior of (I + A)t+1. Specifically, we can take a set of bi-orthonormal vectors li, ri as the
left and right eigenvectors corresponding to the ith eigenvalue of I + A, satisfying: klik2 = krik2
rj = 0, i 6= j; in particular, the left eigenspace associated with ρ is
= 1, l
one-dimensional with the corresponding eigenvector l1 = α = (α1, . . . , αn)T , uniquely satisfying
i=1 αi = 1, αi > 0, ∀i ∈ [n], and αT A = (ρ + 1)αT . The entry αi is called the centrality of agent i
and as the name suggests, it measures how central is the location of agent in the network. We can
now use the spectral representation of A to write [49, Section 6]:
ri = 1 for all i and l
Pn
T i
T i
Asymptotically, we get that all eigenvalues other than the Perron-Frobenius eigenvalue 1 + ρ are
subdominant; hence, (I + A)t → (1 + ρ)tr1α
(cid:12) µ0 as t → ∞; the latter holds
true for the common uniform priors case and also in general, as we shall see next.
and µt = (1 + ρ)tr1α
T
T
4.2. Becoming certain about the group aggregate. We begin our investigation of the
evolution of beliefs under (12) by considering the optimal response (belief) of an agents who has
been given access to the set of all private observations across the network; indeed, such a response
can be achieved in practice if one follows Kahneman's advice and collect each individual's infor-
mation privately before combining them or allowing the individuals to engage in public discussions
[52, Chapter 23]. Starting from the uniform prior and after observing everybody's private data our
aggregate belief about the truth state is given by the following implementation of the Bayes rule:
µ?(θ) = Qj∈Ni
Pθ∈ΘQj∈Ni
'j(sjθ)
'j(sjθ)
.
(14)
as opposed to the global (network-wide) likelihood maximizer Θ?
Our next theorem describes the asymptotic outcome of the group decision process when the agents
report their beliefs and follow the Bayesian heuristic (12) to aggregate them. The outcome indi-
cated in Theorem 4 departs from the global optimum µ? in two major respects. Firstly, the
agents reach consensus on a belief that is supported over Θ♦ := arg maxθ∈ΘPn
i=1 αi log('i(siθ)),
:= arg maxθ∈Θ µ?(θ) =
arg maxθ∈ΘPn
i=1 log('i(siθ)); note that the signal log-likelihoods in the case of Θ♦ are weighted
by the centralities, αi, of their respective nodes. Secondly, the consensus belief is concentrated
uniformly over Θ♦, its support does not include the entire state space Θ and those states which
score lower on the centrality-weighted likelihood scale are asymptotically rejected as a candidate
for the truth state; in particular, if {θ♦} = Θ♦ is a singlton, then the agents effectively become
certain about the truth state of θ♦, in spite of their essentially bounded aggregate information and
in contrast with the rational (optimal) belief µ? that is given by the Bayes rule in (14) and do not
discredit or reject any of the less probable states. This unwarranted certainty in the face of limited
aggregate data is a manifestation of the group polarization effect that derive the agent to more
extreme beliefs, rejecting the possibility of any alternatives outside of Θ♦.
Theorem 4 (Certainty about the group aggregate). Following the Bayesian heuristic
belief updates in (5), limt→∞ µi,t(θ) = 1/Θ♦ for all i ∈ [n] and any θ ∈ Θ?, where Θ♦ :=
arg maxθ∈ΘPn
i=1 αi log('i(siθ)). In particular, if the sum of signal log-likelihoods weighted by node
centralities is uniquely maximized by θ♦, i.e. {θ♦} = Θ♦, then limt→∞ µi,t(θ♦) = 1 almost surely for
all i ∈ [n].
Rahimian and Jadbabaie: Bayesian Heuristics for Group Decisions
17
Remark 2 (Efficiency of balanced regular networks). The fact that log-likelihoods
in Θ♦ are weighted by the node centralities is a source of inefficiency for the asymptotic outcome of
the group decision process. This inefficiency is warded off in especially symmetric typologies, where
in and out degrees of all nodes in the network are the same. In these so-called balanced regular
digraphs, there is a fixed integer d such that all agents receive reports from exactly d agents, and
also send their reports to some other d agents; d-regular graphs are a special case, since all links
are bidirectional and each agent sends her reports to and receive reports from the same d agents.
In such structures α = (1/n)1 so that Θ? = Θ♦ and the support of the consensus belief identifies
the global maximum likelihood estimator (MLE); i.e. the maximum likelihood estimator of the
unknown θ, given the entire set of observations from all agents in the network.
5. Conclusions. We propose the Bayesian heuristics framework to address the problem of
information aggregation and decision making in groups. Our model is consistent with the dual
process theory of mind with one system developing the heuristics through deliberation and slow
processing, and another system adopting the heuristics for fast and automatic decision making:
once the time-one Bayesian update is developed, it is used as a heuristic for all future decision
epochs. On the one hand, this model offers a behavioral foundation for non-Bayesian updating; in
particular, linear action updates and log-linear belief updates. On the other hand, its deviation from
the rational choice theory captures common fallacies of snap-judgments and history neglect that
are observed in real life. Our behavioral method also complements the axiomatic approaches which
investigate the structure of belief aggregation rules and require them to satisfy specific axioms such
as label neutrality and imperfect recall, as well as independence or separability for log-linear and
linear rules, respectively [65].
We showed that under a natural quadratic utility and for a wide class of distributions from the
exponential family the Bayesian heuristics correspond to a minimum variance Bayes estimation
with a known linear structure. If the agents have non-informative priors, and their signal structures
satisfy certain homogeneity conditions, then these action updates constitute a convex combination
as in the DeGroot model, where agents reach consensus on a point in the convex hull of their
initial actions. In case of belief updates (when agents communicate their beliefs), we showed that
the agents update their beliefs proportionally to the product of the self and neighboring beliefs.
Subsequently, their beliefs converge to a consensus supported over a maximum likelihood set, where
the signal likelihoods are weighted by the centralities of their respective agents.
Our results indicate certain deviations from the globally efficient outcomes, when consensus is
being achieved through the Bayesian heuristics. This inefficiency of Bayesian heuristics in globally
aggregating the observations is attributed to the agents' naivety in inferring the sources of their
information, which makes them vulnerable to structural network influences: the share of centrally
located agents in shaping the asymptotic outcome is more than what is warranted by the quality
of their data. Another source of inefficiency is in the group polarization that arise as a result of
repeated group interactions; in case of belief updates, this is manifested in the structure of the
(asymptotic) consensus beliefs. The latter assigns zero probability to any alternative that scores
lower than the maximum in the weighted likelihoods scale: the agents reject the possibility of less
probable alternatives with certainty, in spite of their limited initial data. This overconfidence in
the group aggregate and shift toward more extreme beliefs is a key indicator of group polarization
and is demonstrated very well by the asymptotic outcome of the group decision process.
We pinpoint some key differences between the action and belief updates (linear and log-linear,
respectively): the former are weighted updates, whereas the latter are unweighted symmetric
updates. Accordingly, an agent weighs each neighbor's action differently and in accordance with
the quality of their private signals (which are inferred from the actions). On the other hand, when
communicating their beliefs the quality of each neighbor's signal is already internalized in their
18
Rahimian and Jadbabaie: Bayesian Heuristics for Group Decisions
reported beliefs; hence, when incorporating her neighboring beliefs, an agent regards the reported
beliefs of all her neighbors equally and symmetrically. Moreover, in the case of linear action updates
the initial biases are amplified and accumulated in every iteration. Hence, the interactions of biased
agents are very much dominated by their prior beliefs rather than their observations. This issue can
push their choices to extremes, depending on the aggregate value of their initial biases. Therefore, if
the Bayesian heuristics are to aggregate information from the observed actions satisfactorily, then
it is necessary for the agents to be unbiased, i.e. they should hold non-informative priors about the
state of the world and base their actions entirely on their observations. In contrast, when agents
exchange beliefs with each other the multiplicative belief update can aggregate the observations,
irrespective of the prior beliefs. The latter are asymptotically canceled; hence, multiplicative belief
updates are robust to the influence of priors.
The Bayesian heuristics approach is strongly motivated by the behavioral processes that underlie
human decision making. These processes often deviate from the predictions of the rational choice
theory, and our investigation of the Bayesian heuristics highlights both the mechanisms for such
deviations and their ramifications. In our ongoing research, we expand this behavioral approach by
incorporating additional cognitive biases such as inattentiveness, and investigate how the decision
processes are affected. On the one hand, the obtained insights highlight the value of educating
the public about benefits of rational decision making and unbiased judgment, and how to avoid
common cognitive errors when making decisions. On the other hand, by investigating the effect of
cognitive biases, we can improve the practice of social and organizational policies, such that new
designs can accommodate commonly observed biases, and work well in spite of them.
Appendix A: Proof of Theorem 1.
If agent i starts from a prior belief Vi(·) = V(·; αi, βi) ∈
Fγ,η, then we can use the Bayes rule to verify that, cf. [81, Proposition 3.3.13], the Radon-Nikodym
derivative of the Bayesian posterior of agent i after observing ni samples si,p ∈ S, p ∈ [ni], with
p=1 ξ(si,p), βi + niδi), and in particular the Bayesian posterior at time
likelihood (3) is ν(·; αi + σiPni
zero belongs to the conjugate family Fγ,η: Mi,0(·) = V(·; αi + σiPni
Subject to the quadratic utility ui(a, θ) = −(a − mi,θ)T (a − mi,θ), the expected pay-off at any
time time t is maximized is by choosing [12, Lemma 1.4.1]:
p=1 ξ(si,p), βi + niδi).
ai,t = Ei,t{mi,θ} :=Zθ∈Θ
mi,θMi,t(dθ),
which coincides with her minimum variance unbiased estimator (Bayes estimate) for mi,θ. The
members of the conjugate family Fγ,η satisfy the following linearity property of the Bayes estimates
that is key to our derivations.1
Lemma 1 (Proposition 3.3.14 of [81]). Let ζ ∈ Rk be a parameter and suppose that the
parameter space Ωζ is an open set in Rk. Suppose further that ζ ∈ Ωζ has the prior distribution
W(·; α, β) with density κ0(α, β)eζT α−βγ(ζ) w.r.t. Λk where κ0(α, β) is the normalization constant. If
s0 ∈ S0 ⊂ Rk is a random signal with distribution D(·; ζ) and density τ 0(s)eζts−γ0(ζ) w.r.t. Λk, then
.
α β
sD(ds; ζ)W(dζ; α, β) =
Zζ∈Ωζ Zs0∈S0
1In fact, such an affine mapping from the observations to the Bayes estimate characterizes the conjugate family Fγ,η
and every member of this family can be uniquely identified from the constants of the affine transform [22].
Rahimian and Jadbabaie: Bayesian Heuristics for Group Decisions
19
Hence for any V(·; α, β) ∈ Fγ,η we can write
(cid:12)
(cid:12)
(cid:12)
(cid:12)
Zθ∈Θ
mi,θV(dθ; α, β) = Zθ∈Θ Zs∈S
= Zθ∈Θ(cid:12)(cid:12)(cid:12)(cid:12)
ξ(s)σ(cid:12)(cid:12)(cid:12)(cid:12)
Zs∈S
= Zζ∈Ωθ (cid:12)(cid:12)(cid:12)(cid:12)
ξ(s)σ(cid:12)(cid:12)(cid:12)(cid:12)
Zs∈S
= Zζ∈Ωη
Λk(η(dθ))
Gθ(dθ)
Λk(ξ(ds))
Gs(ds)
Λk(η(dθ))
Gθ(dθ)
Λk(ξ(ds))
Gs(ds)
δ γ0(ζ)
eζT α− β
κ(α, β)
αδ
σβ
ξ(s)L(dsθ; σ, δ)V(dθ; α, β)
eη(θ)T α−βγ(η(θ))
κ(α, β)
Gθ(dθ)×
κ(α, β)
Gθ(dθ)×
eη(θ)T α−βγ(η(θ))
(cid:12)
(cid:12)
(cid:12) τ (σξ(s), δ) eση(θ)T ξ(s)−δγ(η(θ))Gs(ds)
(cid:12)
(cid:12)
(cid:12)
(cid:12)
(cid:12)
(cid:12)
(cid:12)
(cid:12) τ (σξ(s), δ) eση(θ)T ξ(s)−δγ(η(θ))Gs(ds)
(cid:12)
Λk(dζ) Zs0∈S0
eζT s0−γ0(ζ)Λk(ds0)
s0τ 0(s0)
σ
=
,
(15)
where in the penultimate equality we have employed the following change of variables: ζ = η(θ),
s0 = σξ(s), γ0(ζ) = δγ(ζ), τ 0(s0) = τ (s0, δ); and the last equality is a direct application of Lemma 1.
p=1 ξ(si,p), βi + niδi), the expectation maximizing action
at time zero coincides with:
In particular, given Mi,0(·) = V(·; αi + σiPni
ai,0 =Pni
p=1 ξ(si,p) + σ−1
i αi
ni + δ−1
i βi
.
(16)
Subsequently, following her observations of aj,0, j ∈ Ni and from her knowledge of her neighbor's
p=1 ξ(sj,p) for all her
neighbors. Hence, we get
priors and signal likelihood structure, agent i infers the observed values ofPnj
ξ(sj,p) = (nj + δ−1
j βj)aj,0 − σ−1
j αj,∀j ∈ Ni.
(17)
njXp=1
The observations of agent i are therefore augmented by the set of independent samples from her
p=1 ξ(sj,p) : j ∈ Ni}, and her refined belief at time 1 is again a member of the conjugate
neighbors: {Pnj
family Fγ,η and is give by:
Mi,1(·) = V(·; αi +Xj∈Ni
σj
njXp=1
ξ(sj,p), βi +Xj∈Ni
njδj).
We can again invoke the linearity of the Bayes estimate for the conjugate family Fγ,η and the
subsequent result in (15), to get that the expected pay-off maximizing action at time 1 is given by:
ai,1 =
δi(cid:16)αi +Pj∈Ni
p=1 ξ(sj,p)(cid:17)
σjPnj
njδj(cid:17)
σi(cid:16)βi +Pj∈Ni
.
(18)
Finally, we can use (17) to replace for the neighboring signals and derive the expression of the
action update of agent i at time 1 in terms of her own and the neighboring actions aj,0, j ∈ Ni;
(cid:3)
leading to the expression of linear Bayesian heuristics as claimed in Theorem 1.
20
Rahimian and Jadbabaie: Bayesian Heuristics for Group Decisions
that the coefficients of the linear conbination from Corollary 1 sum to one:Pj∈Ni
by setting ai,0 =Pni
Appendix B: Proof of Theorem 2. The balancedness of likelihoods (Assumption 3) ensures
Tij = 1, for all
i; thus forming a convex combination as in the DeGroot model. Subsequently, the agents begin
p=1 ξ(si,p)/ni according to (16), and at every t > 1 they update their actions
according to at = T at−1, where at = (a1,t, . . . , an,t)T and T is the n× n matrix whose i, j-th entry
is Tij. Next note from the analysis of convergence for DeGroot model, cf. [38, Proporition 1], that
for a strongly connected network G if it is aperiodic (meaning that one is the greatest common
divisor of the lengths of all its circles; and it is the case for us, since the diagonal entries of T
are all non-zero), then limτ→∞ T τ = 1s
, where s := (s1, . . . , sn)T is the unique left eigenvector
i=1 si = 1, si > 0, ∀i. Hence, starting from
non-informative priors agents follow the DeGroot update and if G is also strongly connected, then
(cid:3)
associated with the unit eigenvalue of T and satisfyingPn
they reach a consensus at sT a0 =Pn
Appendix C: Proof of Theorem 3. We begin by a lemma that determines the so-called
global MVUE for each i, i.e. the MVUE of mi,θ given all the observations of all agents across the
network.
i=1 si(Pni
p=1 ξ(si,p)/ni).
T
Lemma 2 (Global MVUE). Under the exponential family signal-utility structure (Assump-
tion 1), the (global) MVUE of mi,θ given the entire set of observations of all the agents across the
network is given by:
If we further impose non-informative priors (Assumption 2), then the global MVUE for each i can
be rewritten as
a?
i =
δi(cid:16)αi +Pn
p=1 ξ(sj,p)(cid:17)
j=1 σjPnj
j=1 njδj(cid:17)
σi(cid:16)βi +Pn
p=1 ξ(sj,p)(cid:17)
j=1 σjPnj
σi(cid:16)Pn
j=1 njδj(cid:17)
X
δi
σi
j=1
=
n
p=1 npδp
σjnjPn
δi(cid:16)Pn
a?
i =
.
(19)
aj,0.
(20)
This lemma can be proved easily by following the same steps that lead to (18) to get (19); making
the necessary substitutions under Assumption 2 yields (20). From (20), it is immediately clear that
if some consensus action is to be the efficient estimator (global MVUE) for all agents i ∈ [n], then
we need δiσj = σiδj for all i, j; hence, the global balance is indeed a necessary condition. Under this
condition, the local balance of likelihoods (Assumption 3) is automatically satisfied and given non-
informative priors Theorem 2 guarantees convergence to a consensus in strongly connected social
network. Moreover, we can rewrite (20) as a?
p=1 npδp, for all i. Hence, if
the consensus action (sT a0 in the proof of Theorem 2, Appendix B) is to be efficient then we need
j=1 njδj for all i; s = (s1, . . . , sn) being the unique normalized left eigenvector associated
with the unit eigenvalue of T : sT T = sT , as defined in Appendix B. Using δiσj = σiδj, we can also
si = δini/Pn
rewrite the coefficients Tij of the DeGroot update in Theorem 2 as Tij = δjnj/(Pp∈Ni
Therefore, by expanding the eigenvector condition sT T = sT we obtain that in order for the
consensus action sT a0 to agree with the efficient consensus a?, it is necessary and sufficient to have
that for all j
j=1 δjnjaj,0)/Pn
i = a? = (Pn
npδp).
siTij =
n
X
i=1
n
i=1 δiniPn
X
j=1 δjnj! δjnj[I + A]ij
npδp
Pp∈Ni
= sj =
,
j=1 δjnj
δjnjPn
(21)
Rahimian and Jadbabaie: Bayesian Heuristics for Group Decisions
21
(22)
= 1,
or equivalently,
Xi:j∈Ni
δiniPp∈Ni
npδp
= Xi∈N out
j
δiniPp∈Ni
npδp
δjnj/(Pp∈Ni
for all j. Under the global balance condition (Assumption 4), δiσj = δjσi, the weights Tij =
npδp) as given above, correspond to transition probabilities of a node-weighted ran-
dom walk on the social network graph, cf. [16, Section 5]; where each node i ∈ [n] is weighted
by wi = niδi. Such a random walk is a special case of the more common type of random walks
on weighted graphs where the edge weights determine the jump probabilities; indeed, if for any
edge (i, j) ∈ E we set its weight equal to wi,j = wiwj then the random walk on the edge-weighted
graph reduces to a random walk on the node-weighted graph with node weights wi, i ∈ [n]. If the
social network graph is undirected and connected (so that wi,j = wj,i for all i, j), then the edge-
weighted (whence also the node-weighted) random walks are time-reversible and their stationary
distributions (s1, . . . , sn)T can be calculated in closed form as follows [2, Section 3.2]:
(23)
In a node-weighted random walk we can replace wi,j = wiwj for all j ∈ Ni and (23) simplifies into
Similarly to (21), the consensus action will be efficient if and only if
wj
wi,j
si =
.
wi,j
.
wj
si = Pj∈Ni
i=1Pj∈Ni
Pn
wiPj∈Ni
Pn
i=1 wiPj∈Ni
wiPj∈Ni
wiPn
Pn
i=1 wiPj∈Ni
X
wk)Xj∈Ni
X
(wiXj∈Ni
which holds true only if Pj∈Ni
Pj∈Ni
Pi∈N out
wj =Pj∈Ni
or equivalently:
wj =
=
wj
si =
n
(
k=1
n
i=1
wj
k=1 wk
,∀i,
wj),∀i,
wj is a common constant that is the same for all agents, i.e.
δjnj = C0 > 0 for all i ∈ [n]. Next replacing in (22) yields that, in fact, C0 =
(cid:3)
δini for all j, completing the proof for the conditions of efficiency.
j
Appendix D: Proof of Theorem 4. We address the more general case of (5), which includes
(12) as a special case (with common uniform priors). For any pair of states θ and θ, define the log
ratio of beliefs, likelihoods, and priors as follows:
By concatenating the log-ratio statistics of the n networked agents, we obtain the following three
vectorizations for the log-ratio statistics:
φi,t(θ, θ) := log(cid:16)µi,t(θ)/µi,t(θ)(cid:17) ,
λi(θ, θ) := log(cid:16)'i(siθ)/'i(siθ)(cid:17) ,
γi(θ, θ) := log(cid:16)νi(θ)/νi(θ)(cid:17) ,
φt(θ, θ) := (φ1,t(θ, θ), . . . , φn,t(θ, θ)),
λ(θ, θ) := (λ1(θ, θ), . . . , λn(θ, θ)),
γ(θ, θ) := (γ1(θ, θ), . . . , γn(θ, θ)).
22
Rahimian and Jadbabaie: Bayesian Heuristics for Group Decisions
Using the above notation, we can rewrite the log-linear belief updates of (5) in a linearized vector
format as shown below:
(I + A)τ Aγ(θ, θ)
φt+1(θ, θ) =(I + A)φt(θ, θ)− Aγ(θ, θ)
X
τ =0
t
=(I + A)t+1φ0(θ, θ)−
=(I + A)t+1(cid:16)λ(θ, θ) + γ(θ, θ)(cid:17)−
X
=(I + A)t+1λ(θ, θ) + (I + A)t+1 −
X
τ =0
τ =0
t
t
(I + A)τ Aγ(θ, θ)
(I + A)τ A! γ(θ, θ).
Next we use the spectral decomposition in (13) to obtain: 1
φt+1(θ, θ) = (1 + ρ)t+1r1Λ(θ, θ) + ((1 + ρ)t+1 −
X
= (1 + ρ)t+1 r1Λ(θ, θ) + (1−
→ (1 + ρ)t+1r1Λ(θ, θ),
τ =0
t
(1 + ρ)τ ρ)r1β(θ, θ) + o((1 + ρ)t+1)
t
τ =0
X
(1 + ρ)τ−t−1ρ)r1β(θ, θ) + o(1)!
(24)
τ =0 ρ(1 + ρ)τ−1 = 1.
where we adopt the following notations for the global log likelihood and prior ratio statistics:
β(θ, θ) := αT γ(θ, θ) and Λ(θ, θ) := αT λ(θ, θ); furthermore, in calculation of the limit in the last
step of (24) we use the geometric summation identityP∞
To proceed denote Λ(θ) :=Pn
i=1 αi'i(siθ) so that Λ(θ, θ) = Λ(θ) − Λ(θ). Since Θ♦ consists of
the set of all maximizers of Λ(θ), we have that Λ(θ, θ) < 0 whenever θ ∈ Θ♦ and θ 6∈ Θ♦. Next recall
from (24) that φt+1(θ, θ) → (1 + ρ)t+1r1Λ(θ, θ) and r1 is the right Perron-Frobenius eigenvector
with all positive entries; hence, for all θ ∈ Θ♦ and any θ, φi,t(θ, θ) → −∞ if θ 6∈ Θ♦ and φi,t(θ, θ) = 0
whenever θ ∈ Θ♦; or equivalently, µi,t(θ)/µi,t(θ) → 0 for all θ 6∈ Θ♦, while µi,t(θ) = µi,t(θ) for any
θ ∈ Θ♦. The latter together with the fact thatP θ∈Θ µi,t(θ) = 1 for all t implies that with probability
one: limt→∞ µi,t(θ) = 1/Θ♦,∀θ ∈ Θ♦ and limt→∞ µi,t(θ) = 0,∀θ 6∈ Θ♦ as claimed in the Theorem.
In the special case that Θ♦ is a singleton, {θ♦} = Θ♦, we get that limt→∞ µi,t(θ♦) = 1 almost surely
for all i ∈ [n].
Acknowledgments. This work was supported by ARO MURI W911NF-12-1-0509.
References
[1] Acemoglu D, Dahleh MA, Lobel I, Ozdaglar A (2011) Bayesian learning in social networks. The Review
of Economic Studies 78(4):1201–1236.
[2] Aldous D, Fill J (2002) Reversible markov chains and random walks on graphs. Book in progress.
[3] Anderson NH (1971) Integration theory and attitude change. Psychological review 78(3):171.
[4] Anderson NH (1981) Foundations of information integration theory .
[5] Aumann RJ (1976) Agreeing to disagree. The annals of statistics 1236–1239.
[6] Baikerikar J, Surve S, Prabhu S (2011) Consensus based dynamic load balancing for a network of
heterogeneous workstations. Advances in Computing, Communication and Control, 116–124 (Springer).
[7] Bala V, Goyal S (1998) Learning from neighbours. The Review of Economic Studies 65(3):595–621.
1Given two functions f (·) and g(·) we use the asymptotic notation f (t) = o(g(t)) to signify the relations
limt→∞ f (t)/g(t) = 0.
Rahimian and Jadbabaie: Bayesian Heuristics for Group Decisions
23
[8] Bandyopadhyay S, Chung SJ (2014) Distributed estimation using bayesian consensus filtering. Amer-
ican Control Conference 634–641.
[9] Banerjee AV (1992) A simple model of herd behavior. The Quarterly Journal of Economics 107(3):797–
817.
[10] Battistelli G, Chisci L (2014) Kullback–leibler average, consensus on probability densities, and dis-
tributed state estimation with guaranteed stability. Automatica 50(3):707–718.
[11] Battistelli G, Chisci L, Morrocchi S, Papi F (2011) An information-theoretic approach to distributed
state estimation. IFAC Proceedings Volumes 44(1):12477–12482.
[12] Bickel PJ, Doksum KA (2015) Mathematical Statistics: Basic Ideas and Selected Topics, volume I
(CRC Press).
[13] Bikhchandani S, Hirshleifer D, Welch I (1998) Learning from the behavior of others: Conformity, fads,
and informational cascades. The Journal of Economic Perspectives 12(3):pp. 151–170, ISSN 08953309.
[14] Blume LE (1993) The statistical mechanics of strategic interaction. Games and Economic Behavior
5(3):387–424.
[15] Borkar V, Varaiya P (1982) Asymptotic agreement in distributed estimation. IEEE Transactions on
Automatic Control 27(3):650–655.
[16] Brightwell GR, Winkler P (1999) Graph homomorphisms and phase transitions. Journal of Combina-
torial Theory, Series B 77(2):221–262.
[17] Brocas I, Carrillo JD (2014) Dual-process theories of decision-making: A selective survey. Journal of
economic psychology 41:45–54.
[18] Chamley CP (2004) Rational Herds: Economic Models of Social Learning (Cambridge University
Press).
[19] Chandrasekhar AG, Larreguy H, Xandri JP (2015) Testing models of social learning on networks:
Evidence from a lab experiment in the field. Technical report, National Bureau of Economic Research.
[20] DeGroot MH (1974) Reaching a consensus. Journal of American Statistical Association 69:118 – 121.
[21] DeMarzo PM, Vayanos D, Zwiebel J (2003) Persuasion bias, social influence, and unidimensional
opinions. The Quarterly Journal of Economics 118:909–968.
[22] Diaconis P, Ylvisaker D (1979) Conjugate priors for exponential families. The Annals of statistics
7(2):269–281.
[23] Eliaz K, Ray D, Razin R (2006) Choice shifts in groups: A decision-theoretic basis. The American
economic review 1321–1332.
[24] Evans JSB (2003) In two minds: dual-process accounts of reasoning. Trends in cognitive sciences
7(10):454–459.
[25] Evans JSB, Stanovich KE (2013) Dual-process theories of higher cognition advancing the debate.
Perspectives on psychological science 8(3):223–241.
[26] Eyster E, Rabin M (2010) Naive herding in rich-information settings. American economic journal:
microeconomics 2(4):221–243.
[27] Eyster E, Rabin M (2014) Extensive imitation is irrational and harmful. The Quarterly Journal of
Economics qju021.
[28] Farina L, Rinaldi S (2011) Positive linear systems: theory and applications, volume 50 (John Wiley &
Sons).
[29] French Jr JR (1956) A formal theory of social power. Psychological review 63(3):181–194.
[30] Friedkin NE (1986) A formal theory of social power. Journal of Mathematical Sociology 12(2):103–126.
[31] Fudenberg D (1998) The Theory of Learning in Games (MIT Press).
[32] Gale D, Kariv S (2003) Bayesian learning in social networks. Games and Economic Behavior 45:329–
346.
[33] Gelman A, Carlin JB, Stern HS, Dunson DB, Vehtari A, Rubin DB (2014) Bayesian data analysis.
Texts in Statistical Science Series (CRC Press, Boca Raton, FL), third edition.
24
Rahimian and Jadbabaie: Bayesian Heuristics for Group Decisions
[34] Gigerenzer G, Gaissmaier W (2011) Heuristic decision making. Annual review of psychology 62:451–
482.
[35] Gigerenzer G, Goldstein DG (1996) Reasoning the fast and frugal way: models of bounded rationality.
Psychological review 103(4):650.
[36] Gigerenzer G, Todd PM (1999) Simple heuristics that make us smart (Oxford University Press, USA).
[37] Gilardoni GL, Clayton MK (1993) On reaching a consensus using DeGroot's iterative pooling. The
Annals of Statistics 391–401.
[38] Golub B, Jackson MO (2010) Naıve Learning in Social Networks and the Wisdom of Crowds. American
Economic Journal: Microeconomics 2(1):112–149.
[39] Goyal S (2012) Connections: an introduction to the economics of networks (Princeton University Press).
[40] Grimm V, Mengel F (2014) An experiment on belief formation in networks. Available at SSRN 2361007
.
[41] Harary F (1959) A criterion for unanimity in french's theory of social power. Studies in Social Power,
168–182 (University of Michigan), d. Cartwright, Ed.
[42] Harel M, Mossel E, Strack P, Tamuz O (2014) When more information reduces the speed of learning
ArXiv preprint arXiv:1412.7172.
[43] Hegselmann R, Krause U (2005) Opinion dynamics driven by various ways of averaging. Computational
Economics 25(4):381–405.
[44] Isenberg DJ (1986) Group polarization: a critical review and meta-analysis. Journal of personality and
social psychology 50(6):1141.
[45] Jackson MO (2008) Social and Economic Networks (Princeton, NJ: Princeton University Press).
[46] Jadbabaie A, Lin J, Morse AS (2003) Coordination of groups of mobile autonomous agents using
nearest neighbor rules. IEEE Transactions on Automatic Control 48(6):988–1001.
[47] Jadbabaie A, Molavi P, Sandroni A, Tahbaz-Salehi A (2012) Non-bayesian social learning. Games and
Economic Behavior 76(1):210 – 225.
[48] Jadbabaie A, Molavi P, Tahbaz-Salehi A (2013) Information heterogeneity and the speed of learning
in social networks. Revise and Resubmit, Review of Economic Studies .
[49] James G, Rumchev V (2005) Stability of positive linear discrete-time systems. Bulletin of the Polish
Academy of Sciences. Technical Sciences 53(1):1–8.
[50] Janis IL (1982) Groupthink: Psychological studies of policy decisions and fiascoes (Houghton Mifflin
Boston).
[51] Kahneman D (2003) Maps of bounded rationality: Psychology for behavioral economics. The American
economic review 93(5):1449–1475.
[52] Kahneman D (2011) Thinking, fast and slow (Farrar Straus Giroux).
[53] Kanoria Y, Tamuz O (2013) Tractable bayesian social learning on trees. Selected Areas in Communi-
cations, IEEE Journal on 31(4):756–765.
[54] Kar S, Moura JM (2009) Distributed consensus algorithms in sensor networks with imperfect commu-
nication: Link failures and channel noise. IEEE Transactions on Signal Processing 57(1):355–369.
[55] Kass RE, Wasserman L (1996) The selection of prior distributions by formal rules. Journal of the
American Statistical Association 91(435):1343–1370.
[56] Katragadda S, SanMiguel JC, Cavallaro A (2014) Consensus protocols for distributed tracking in wire-
less camera networks. 17th International Conference on Information Fusion (FUSION), 1–8 (IEEE).
[57] Klein G (2007) Performing a project premortem. Harvard Business Review 85(9):18–19.
[58] Krishnamurthy V, Poor HV (2013) Social learning and bayesian games in multiagent signal processing:
How do local and global decision makers interact? IEEE Signal Processing Magazine, 30(3):43–57.
[59] Lalitha A, Sarwate A, Javidi T (2014) Social learning and distributed hypothesis testing. IEEE Inter-
national Symposium on Information Theory 551–555.
Rahimian and Jadbabaie: Bayesian Heuristics for Group Decisions
25
[60] Levy G, Razin R (2015) Correlation neglect, voting behavior, and information aggregation. The Amer-
ican Economic Review 105(4):1634–1645.
[61] Lyons R, Peres Y (2016) Probability on Trees and Networks (Cambridge Series in Statistical and
Probabilistic Mathematics).
[62] Marden JR, Shamma JS (2012) Revisiting log-linear learning: Asynchrony, completeness and payoff-
based implementation. Games and Economic Behavior 75(2):788–808.
[63] Masicampo EJ, Baumeister RF (2008) Toward a physiology of dual-process reasoning and judgment:
Lemonade, willpower, and expensive rule-based analysis. Psychological Science 19(3):255–260.
[64] Mesbahi M, Egerstedt M (2010) Graph Theoretic Methods in Multiagent Networks (Princeton Univer-
sity Press).
[65] Molavi P, Tahbaz-Salehi A, Jadbabaie A (2016) Foundations of non-bayesian social learning. Columbia
Business School Research Paper .
[66] Mossel E, Sly A, Tamuz O (2014) Asymptotic learning on bayesian social networks. Probability Theory
and Related Fields 158(1-2):127–157, ISSN 0178-8051.
[67] Mossel E, Tamuz O (2010) Efficient bayesian learning in social networks with gaussian estimators.
arXiv preprint arXiv:1002.0747 .
[68] Mueller-Frank M (2013) A general framework for rational learning in social networks. Theoretical
Economics 8(1):1–40.
[69] Mueller-Frank M, Neri C (2015) A general model of boundedly rational observational learning: Theory
and experiment. Available at SSRN 2566210 .
[70] Nedi´c A, Olshevsky A, Uribe C (2016) Distributed learning with infinitely many hypotheses. arXiv
preprint arXiv:1605.02105 .
[71] Nedi´c A, Olshevsky A, Uribe CA (2014) Nonasymptotic convergence rates for cooperative learning
over time-varying directed graphs. arXiv preprint arXiv:1410.1977 .
[72] Nedi´c A, Olshevsky A, Uribe CA (2015) Fast convergence rates for distributed non-bayesian learning.
arXiv preprint arXiv:1508.05161 .
[73] Rahimian MA, Jadbabaie A (2015) Learning without recall: A case for log-linear learning. 5th IFAC
Workshop on Distributed Estimation and Control in Networked Systems .
[74] Rahimian MA, Jadbabaie A (2015) Learning without recall in directed circles and rooted trees. Amer-
ican Control Conference 4222–4227.
[75] Rahimian MA, Jadbabaie A (2016) Bayesian learning without recall Preprint.
[76] Rahimian MA, Jadbabaie A (2016) Naive social learning in ising networks. American Control Confer-
ence .
[77] Rahimian MA, Molavi P, Jadbabaie A (2014) (Non-) bayesian learning without recall. IEEE Conference
on Decision and Control (CDC) 5730–5735.
[78] Rahimian MA, Shahrampour S, Jadbabaie A (2015) Learning without recall by random walks on
directed graphs. IEEE Conference on Decision and Control (CDC) .
[79] Rahnama Rad K, Tahbaz-Salehi A (2010) Distributed parameter estimation in networks. 49th IEEE
Conference on Decision and Control (CDC) 5050–5055.
[80] Redish AD (2013) The mind within the brain: How we make decisions and how those decisions go
wrong (Oxford University Press).
[81] Robert C (2001) The Bayesian Choice: From Decision-Theoretic Foundations to Computational Imple-
mentation. Springer Texts in Statistics (Springer).
[82] Rogers EM (2003) Diffusion of Innovations (Simon and Schuster), 5th edition.
[83] Roux N, Sobel J (2015) Group polarization in a model of information aggregation. American Economic
Journal: Microeconomics 7(4):202–32.
[84] Rufo MJ, Martin J, P´erez CJ, et al. (2012) Log-linear pool to combine prior distributions: A suggestion
for a calibration-based approach. Bayesian Analysis 7(2):411–438.
26
Rahimian and Jadbabaie: Bayesian Heuristics for Group Decisions
[85] Seneta E (2006) Non-negative matrices and Markov chains (Springer).
[86] Shahrampour S, Jadbabaie A (2013) Exponentially fast parameter estimation in networks using dis-
tributed dual averaging. 52nd IEEE Conference on Decision and Control (CDC) 6196–6201.
[87] Simon HA (1955) A behavioral model of rational choice. The Quarterly Journal of Economics 99–118.
[88] Simon HA (1956) Rational choice and the structure of the environment. Psychological review 63(2):129.
[89] Simon HA (1979) Rational decision making in business organizations. The American economic review
69(4):493–513.
[90] Sobel J (2014) On the relationship between individual and group decisions. Theoretical Economics
9(1):163–185.
[91] Stoner JA (1968) Risky and cautious shifts in group decisions: The influence of widely held values.
Journal of Experimental Social Psychology 4(4):442–459.
[92] Sunstein CR (2000) Deliberative trouble? why groups go to extremes. The Yale Law Journal 110(1):71–
119.
[93] Thaler RH (2015) Misbehaving: The making of behavioral economics (WW Norton & Company).
[94] Tsitsiklis J, Bertsekas D, Athans M (1986) Distributed asynchronous deterministic and stochastic
gradient optimization algorithms. IEEE Transactions on Automatic Control 31(9):803–812.
[95] Tsitsiklis JN, Athans M (1984) Convergence and asymptotic agreement in distributed decision prob-
lems. Automatic Control, IEEE Transactions on 29(1):42–50.
[96] Tversky A, Kahneman D (1975) Judgment under uncertainty: Heuristics and biases. Utility, probability,
and human decision making, 141–162 (Springer).
[97] Wang Y, Djuric PM (2015) Social learning with bayesian agents and random decision making. IEEE
Transactions on Signal Processing 63(12):3241–3250.
[98] Xiao L, Boyd S, Lall S (2005) A scheme for robust distributed sensor fusion based on average consensus.
Fourth International Symposium on Information Processing in Sensor Networks (IPSN), 63–70.
[99] Xiao L, Boyd S, Lall S (2006) A space-time diffusion scheme for peer-to-peer least-squares estimation.
Proceedings of the 5th international conference on Information Processing in Sensor Networks, 168–176.
[100] Zellner A (1988) Optimal information processing and bayes's theorem. The American Statistician
42(4):278–280.
|
1508.02674 | 1 | 1508 | 2015-08-11T18:14:27 | Space-Time Diagram Generation for Profiling Multi Agent Systems | [
"cs.MA",
"cs.SE"
] | Advances in Agent Oriented Software Engineering have focused on the provision of frameworks and toolkits to aid in the creation of Multi Agent Systems (MASs). However, despite the need to address the inherent complexity of such systems, little progress has been made in the development of tools to allow for the debugging and understanding of their inner workings.
This paper introduces a novel performance analysis system, named AgentSpotter, which facilitates such analysis. AgentSpotter was developed by mapping conventional profiling concepts to the domain of MASs. We outline its integration into the Agent Factory multi agent framework. | cs.MA | cs | Space-Time Diagram Generation for Profiling
Multi Agent Systems
Dinh Doan Van Bien, David Lillis, and Rem W. Collier
School of Computer Science and Informatics
[email protected], {david.lillis,rem.collier}@ucd.ie
University College Dublin
Abstract. Advances in Agent Oriented Software Engineering have fo-
cused on the provision of frameworks and toolkits to aid in the creation
of Multi Agent Systems (MASs). However, despite the need to address
the inherent complexity of such systems, little progress has been made in
the development of tools to allow for the debugging and understanding
of their inner workings.
This paper introduces a novel performance analysis system, named
AgentSpotter, which facilitates such analysis. AgentSpotter was developed
by mapping conventional profiling concepts to the domain of MASs. We
outline its integration into the Agent Factory multi agent framework.
1
Introduction
Recent developments in the area of Multi Agent Systems (MASs) have been
concerned with bridging the gap between theory and practice, by allowing concrete
implementations of theoretical foundations to be built and deployed. However, the
dearth of agent-specific development and debugging tools remains a significant
obstacle to MASs being adopted in industry on a large scale.
While some simple debugging and logging tools exist for MAS analysis,
these tend not to aid in reasoning about large-scale system when viewed at the
high agent-oriented abstraction level. Such tools typically allow for traditional
debugging actions such as state stepping and breakpoint insertion.
One popular performance analysis technique is known as profiling. Profiling is
based on the observation that the majority of the execution time of a program can
be attributed to a small number of bottlenecks (or hot spots). By improving the
efficiency of these portions of a program, overall performance can be dramatically
improved. Profiling was initially introduced by Donald E. Knuth in an empirical
study conducted on FORTRAN programs [1]. Since then, the technique has been
successfully applied to a variety of languages, platforms and architectures.
The aim of this paper is to apply the principles of traditional profiling systems
in a multi agent environment, so as to facilitate the developers of MASs in
debugging their applications by gaining a better understanding of where the
bottlenecks exist and performance penalties are incurred.
This paper is organised as follows: Section 2 provides a brief overview of
existing tools aimed at aiding in the analysis of MASs. In Section 3, we introduce
5
1
0
2
g
u
A
1
1
]
A
M
.
s
c
[
1
v
4
7
6
2
0
.
8
0
5
1
:
v
i
X
r
a
the AgentSpotter profiling system, with particular focus on outlining a conceptual
model for generic MAS profiling. A concrete implementation of this work, aimed at
the Agent Factory MAS framework, is outlined in Section 4. Section 5 presents the
space-time diagram produced by AgentSpotter in more detail, with an evaluation
of its usefulness given in Section 6. Finally, Section 7 presents our conclusions
and ideas for future work.
2 Related Work
In designing a profiler for MASs, the features that tend to be present in traditional
profilers for non-MAS applications must be identified. It is also necessary to
examine those debugging and analysis tools that already exist for MASs.
The motivation behind the use of profiling on computer applications is clearly
outlined in Knuth's observation that "less than 4% of a program accounts for
more than half of its running time" [1]. This statement implies that a developer
can achieve substantial increases in performance by identifying and improving
those parts of the program that account for the majority of the execution time.
The key aim of profilers is to identify these bottlenecks.
Another observation leading to the widespread adoption of profilers as debug-
ging tools is that there frequently exists a mismatch between the actual run-time
behaviour of a system and the programmers' mental map of what they expect
this behaviour to be. Profilers are useful in enlightening developers to particular
aspects of their programs that they may not otherwise have considered.
A traditional profiler typically consists of two logical parts. Firstly, an in-
strumentation apparatus is directly weaved into the program under study or run
side-by-side to gather and record execution data. Secondly, a post-processing
system uses this data to generate meaningful performance analysis listings or
visualisations.
In the traditional software engineering community, historical profilers such
as gprof [2] or performance analysis APIs like ATOM [3] and the Java Virtual
Machine Tool Interface (JVMTI) [4] have made performance analysis more
accessible for researchers and software engineers. However, the MAS community
does not yet have general access to these types of tools.
Unique amongst all of the mainstream MAS development platforms, Cougaar
is alone in integrating a performance measurement infrastructure directly into
the system architecture [5]. Although this is not applicable to other platforms,
it does provide a good insight into the features that MAS developers could
reasonably expect from any performance measurement application. The principal
characteristics of this structure are as follows:
-- Primary data channels consist of raw polling sensors at the heart of the
system execution engine that gather simple low-impact data elements such
as counters and event sensors.
-- Secondary channels provide more elaborate information, such as summaries
of the state of individual components and history analysis that stores perfor-
mance data over lengthy running times.
-- Computer-level metrics provide data on such items as CPU load, network
load and memory usage.
-- The message transport service gathers data on messages flowing through it.
-- An extension mechanism based on servlets allows the addition of visualisation
plugins that bind to the performance metrics data source.
-- The service that is charged with gathering these metrics is designed so as to
have no impact on system performance when not in use.
Other analysis tools exist for aiding the development of MASs. However,
these tend to be narrower in their focus, concentrating only on specific aspects of
debugging MASs and typically being only applicable to a specific agent platform.
The Agent Factory Debugger [6] is an example of a tool that is typical of most
multi agent frameworks. Its principal function is inspecting the status and mental
state of an individual agent: its goals, beliefs, commitments and the messages
it has exchanged with other agents. Tools such as this give limited information
about the interaction between agents and the consequences of these interactions.
The Brahms toolkit features an AgentViewer that allows developers to view
along a time line the actions that particular agents have taken, so as to enable
them to verify that the conceptual model of the MAS is reflected in reality [7].
An administrator tool for the LS/TS agent platform provides some high-level
system monitoring information, such as overall memory consumption and data on
the size of the agent population [8]. Another type of agent debugging tool is the
ACLAnalyzer that has been developed for the JADE platform [9]. Rather than
concentrating on individual agents, it is intended to analyse agent interaction in
order to see how the community of agents interacts and is organised. In addition
to visualising the number and size of messages sent between specific agents, it
also employs clustering in order to identify cliques in the agent community.
These latter tools are focused mostly on identifying what actions an agent is
carrying out, together with identifying the reasons why such actions are taken (in
response to the agents' own belief set or as a result of receiving communication
from other agents).
3 AgentSpotter Overview
The overriding objective of AgentSpotter is to map the traditional concepts
of profiling to agent-oriented concepts so as to build a profiler tool for MAS
developers. It could be argued that most mainstream agent toolkits are written
in Java, hence the existing profiling tools for the Java programming language
are appropriate for the analysis of such platforms and their agents. However, to
do so would necessitate the mapping of low-level method profiles to high-level
agent-specific behaviour. Thus, tools aimed specifically at Java operate at an
inappropriate conceptual level to be of use in agent analysis. Although it may be
useful to incorporate some Object-Oriented metrics into an MAS profiling tool,
the focus of this paper is on the agent-specific metrics that are appropriate.
Ideally, MASs should be capable of managing their own performance and
identifying their own bottlenecks which hamper system efficiency, and indeed
Fig. 1. AgentSpotter abstract architecture
much work is being undertaken towards this goal [10]. However, until this aim is
realised, the provision of analysis tools aimed at aiding human developers identify
issues with their systems remains of paramount importance.
This section outlines the abstract infrastructure of the AgentSpotter system,
which is capable of being integrated into any agent platform. An analysis of
the integration of AgentSpotter into a specific agent platform (namely Agent
Factory) is contained in Section 4.
The AgentSpotter abstract architecture is displayed in Figure 1, using the
following graphical conventions:
-- Top-level architectural units are enclosed in dashed lines and are titled in
slanted capital letters, e.g.
AGENT PLATFORM
-- Self-contained software packages are enclosed in solid lines e.g Profiler
-- Logical software modules (groups of packages) are titled using slanted capi-
talised names e.g. AgentSpotter Service
-- Arrows denote data or processing interactions e.g.
queries -
At the highest level, the AgentSpotter Service should communicate with the
Run-Time Environment to capture the profiling data from a Profiled Application
running inside an Agent Platform. The captured data should be stored into a
Snapshot File which would then be processed by a Query Engine to generate the
input data for AgentSpotter Station, the visualisation application.
The AgentSpotter profiler monitors performance events generated by the
Agent Platform's Run-Time Environment. These include such events as agent
management events, messaging and other platform service activity. Additionally,
the AgentSpotter service may employ system monitors to record performance
information such as CPU load, memory usage or network throughput. This
provides a general context for the event-based information.
Run-Time EnvironmentPro(cid:127)led ApplicationAgentSpotter ServicePro(cid:127)lerSystem MonitorsAGENT PLATFORMAGENTSPOTTER STATION (visualisation application)Snapshot File (.aspot)Session Summary TablesSpace-Time DiagramCall Graph Tree ViewSessionsAgentsEventsMessagesmessagesactivityeventseventsdatadataqueriesQUERY ENGINESession summary queryAgent activity queryMessages sent/received queryCall graph querySystem activity queryThe event data and other information collected by the AgentSpotter profile
is stored in a snapshot file, which contains the results of a single uninterrupted
data capture session. This snapshot contains a series of raw instrumentation data.
Because large MASs may generate potentially hundreds of events per second, it
is necessary to introduce a Query Engine that is capable of extracting summaries
and other information and make it available to visualisation tools in a transparent
manner. Ideally, this should be through a data manipulation language such as
SQL so as to facilitate the specification of rich and complex queries.
The final component of the abstract architecture is the AgentSpotter Station,
which is the visualisation tool that summarises the information gathered from
the Query Engine in a visual form. The principal focus of this paper is the
Space-Time Diagram, which is presented in Section 5.
When profiling any application, it is important to identify the appropriate
execution unit for profiling (e.g. in the context of object-oriented programming,
this would typically be an object or a method). For profiling a MAS, we believe
that the appropriate execution units are individual agents.
At the agent level, when considering only the autonomous computational entity
abstracted away from the interaction with its peers, the focus is on responsiveness.
It is obvious that the main influence on the responsiveness of an agent is the
amount of computation it requires to carry out the set of tasks required to meet
its design objectives. Agreeing with the BT researchers in [11], we make a further
distinction based on the rationality level of the agent architecture. For reactive
agents, this set of tasks includes only purely reactive behaviour, which is similar
to the behaviour of a traditional process. For deliberative agents that implement
a reasoning system, the computational cost of the reasoning activity must be
considered separately from the actual task execution. Based on this analysis, the
minimum information provided by the system should include:
-- Agent description: name, role, type (deliberative or reactive) of the agent.
-- Cumulative activity: cumulative computation time used by the agent.
-- Perception time: perception time used by a deliberative agent.
-- Action time: task execution time used by a deliberative agent.
-- Reasoning time: reasoning time used by a deliberative agent.
-- % session activity: percentage of the global session computation time used
by the agent.
-- Number of iterations: number of non-zero duration iterations used by the
agent.
-- Total number of messages sent and received: total number of ACL
messages exchanged by the agent.
Additionally, a number of global statistics should also be maintained:
-- Total duration: session run-time recorded.
-- Total activity: amount of computation time recorded over the session.
-- Total number of messages: number of messages sent or received by agents
on the platform being profiled.
Table 1. Benchmark application flat profile
Total Session Time
Total Activity
Messages Sent
Messages Received
Time Slice Duration
18:50.691
10:29.164
1206
1206
1000 ms
Agent
agent001
agent009
agent004
agent014
agent003
agent006
agent005
agent013
agent007
agent008
agent010
agent015
agent002
agent011
agent012
master2
master1
agent024
agent019
agent026
agent030
agent017
agent025
agent027
agent018
agent020
agent022
agent021
agent016
agent029
agent028
agent032
agent031
agent023
agent033
iterations
338
365
349
284
401
361
367
301
378
357
330
285
348
357
225
901
873
46
31
42
26
46
40
31
38
39
47
32
219
38
45
34
36
40
30
22
21
22
14
13
12
12
9
11
7
8
9
8
5
3
0
0
2
1
1
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
T > 0 T > 100% Activity % Session M ax(T ) Average(T ) Msg. Msg.
rec.
57
77
69
36
76
73
76
71
71
72
81
42
70
39
41
86
82
7
5
4
8
3
3
2
7
3
13
7
6
8
4
4
2
1
0
overload mm:ss.ms
1:08.564
1:04.257
1:01.529
46.413
43.881
40.141
34.903
34.716
31.864
30.850
30.280
29.382
23.196
19.363
13.172
6.681
6.485
6.281
4.449
4.400
4.002
3.811
3.767
3.694
3.384
1.762
1.523
1.300
1.194
1.039
0.749
0.749
0.742
0.598
0.043
ss.ms sent
6
0.202
13
0.176
10
0.176
0.163
2
12
0.109
12
0.111
17
0.095
0.115
14
21
0.084
14
0.086
21
0.091
4
0.103
0.066
9
4
0.054
9
0.058
0.007
504
0.007 514
0.136
3
0
0.143
0
0.104
2
0.153
0.082
0
0
0.094
0
0.119
2
0.089
0
0.045
0.032
5
2
0.040
2
0.005
2
0.027
1
0.016
0.022
1
0
0.020
0
0.014
0.001
0
activity
10.90
10.21
9.78
7.38
6.97
6.38
5.55
5.52
5.06
4.90
4.81
4.67
3.69
3.08
2.09
1.06
1.03
1.00
0.71
0.70
0.64
0.61
0.60
0.59
0.54
0.28
0.24
0.21
0.19
0.17
0.12
0.12
0.12
0.10
0.01
ss.ms
3.740
3.425
3.235
3.148
3.323
3.279
3.325
3.190
3.356
3.201
3.147
3.257
3.147
3.095
3.049
0.183
0.227
3.045
3.014
3.084
3.132
3.031
3.006
3.103
3.044
0.547
0.559
0.555
0.555
0.550
0.546
0.561
0.545
0.543
0.003
-- Average number of active agents per second: This gives an idea of the
level of concurrency in the application.
Following the convention of traditional profiling tools, we describe this in-
formation as a flat profile. AgentSpotter displays this by means of a JTable
(provided by Java's Swing interface tools). An example of how the information
is presented is given in Table 1. This is not necessarily an exhaustive list of
every piece of information a developer may desire for identifying problems with
a system, however we believe that other metrics (such as memory consumption)
are not as crucial for the purposes of profiling the application.
4 Agent Factory Integration
Following the definition of the abstract architecture outlined above, a concrete (i.e.
platform-specific) implementation was created for Agent Factory. Agent Factory
is a cohesive framework that supports a structured approach to the development
of agent-oriented applications [12]. This implementation is illustrated in Figure 2,
which uses the same graphical conventions as Figure 1.
Fig. 2. AgentSpotter concrete architecture
To create a concrete implementation, only the platform-specific details must
change, as the mechanisms required to monitor events vary from one agent
platform to another. In contrast, the AgentSpotter file processing and visualisation
components (shown in the lower part of Figure 2) are identical to those in the
abstract architecture (Figure 1). Thus, when implementing AgentSpotter for
a new type of agent platform, only the AgentSpotter Service that is coupled
directly with the platform needs to be reprogrammed. Provided this service
creates snapshot files in a consistent way, the Query Engine need not differentiate
Metrics ServiceAgent Management ServiceSchedulerMessage Transport ServiceAgent Factory Run-Time EnvironmentPro(cid:127)led ApplicationAgentSpotter ServicePro!lerCustom MetricsAgentsCPU MonitorHeap MonitorAGENT FACTORY PLATFORMAGENTSPOTTER STATION (visualisation application)Snapshot File (.aspot)Session Summary TablesSpace-Time DiagramCall Graph Tree ViewSessionsAgentsEventsMessagesdatadataqueriesQUERY ENGINESession summary queryAgent activity queryMessages sent/received queryCall graph querySystem activity queryFig. 3. AgentSpotter Space-Time Diagram specification annotated with AgentSpotter
for Agent Factory infrastructure links (see Figure 2).
between agent platforms. AgentSpotter snapshot files are actually transportable
single-file databases managed by the public domain SQLite Database Engine [13].
As a result, profiling data is stored as queryable relational database tables.
Within the Agent Factory Run-Time Environment, there are three specific
subsystems that generate events of interest in agent profiling, and as such are
recorded by the AgentSpotter service. First, the Agent Management Service is
responsible for creating, destroying, starting, stopping and suspending agents.
It generates events corresponding to each of these actions, which are recorded
in the snapshot file. The Scheduler is charged with scheduling which agents are
permitted to execute at particular times and generates events based on this.
Finally, the Message Transport Service records the sending and receipt of FIPA
messages by agents.
Metrics ServiceAgent Management ServiceSchedulerMessage Transport ServiceAgent Factory Run-Time EnvironmentPro!led ApplicationAgentSpotter ServicePro!lerCustom MetricsAgentsCPU MonitorHeap MonitorAGENT FACTORY PLATFORMSession Time LineCPU LineAgent Life Lineintra-platform message linesAgent Life Lineinformation window on mouse hoverExternal Platform Life LineHeap MonitorMessage Transport ServiceMessage Transport ServiceMessage Transport Serviceinter-platform messages linestimed events (with duration)"Bird's Eye View"♣♦♠simple events (no duration)Session Time LineCPU LineAgent Life LineAgent Life LineExternal Platform Life Line♣♦♠current viewport5 Space-Time Diagram
In Section 3, we outlined the minimum amount of information that should be
made available by an agent profiler. However, this information can be presented
merely by the creation of a simple table. We believe that proper visualisation
tools will be far more useful to a developer in understanding a MAS. This section
introduces the Space-Time Diagram, which is at the core of the AgentSpotter
Station visualisation application. The aim of this diagram is to give as much
detail and context as possible about the performance of the MAS to the developer.
The user may pan the view around and zoom in and out so as to reveal hidden
details or focus on minute details.
The Session Time Line represents the running time of the application being
profiled. Regardless of the position and scale of the current viewport, this time
line remains visible to provide temporal context to the section being viewed and
also to allow a developer to move to various points in the session.
The CPU Line is a graphical plot of the CPU load of the host system during
the session. A vertical gradient going from green (low CPU usage) to red (high
CPU usage) provides a quick graphical sense of system load. A popup information
window reveals the exact usage statistics once the mouse is hovered over the line.
Perhaps the most important feature of the space-time diagram is the Agent
Time Lines. Each of these display all the performance and communication events
that occur for a single agent during a profiling session. A number of visual features
are available to the developer so as to gain greater understanding of the status
and performance of the system. For instance, an agent time line begins only at
the point in time when the agent is created. This facilitates the developer in
viewing the fluctuations in the agent population. Another simple visual aid is
that a time line's caption (i.e. the name of the associated agent) is always visible,
regardless of what position along the line a developer has scrolled to. Visual
clutter may also be reduced by temporarily hiding certain time lines that are not
of interest at a particular point in time.
The time line also changes colour to distinguish busier agents from the rest
of the community. Darker lines indicate agents that have consumed a greater
proportion of the system's CPU time. In a situation where system performance
has been poor, this will allow a developer to quickly identify candidate agents for
debugging, if they are consuming more resources than is appropriate or expected.
The default ordering of the time lines shares this aim. The time lines are in
descending order of total computation time, again visually notifying the developer
of those agents consuming more processing resources. However, a developer may
alter this default order by dragging time lines into different positions, perhaps to
group lines with particularly interesting interactions.
In addition to this simple information, the main purpose of the time line
is to show events performed by an agent that are likely to be of interest from
a performance point of view. These performance events are divided into two
categories. Simple performance events are those that have a time stamp only.
These are shown by means of standard icons (such as an envelope icon to denote
that a message was received by the agent).
Fig. 4. Agent Factory agent activity representation in the Space-Time Diagram
The other category of performance events are timed performance events. These
events are typically actions being performed by an agent. A basic timed perfor-
mance event displays as a rectangle with a fixed height and a width proportional
to its duration. More elaborate event representations can be implemented. For
example, in the context of Agent Factory's time slice based scheduler, we have
represented the concept of time slice overshoots i.e. when an agent has overused
its time slice allocation.
An example of how these timed events are represented is given in Figure 4.
Each agent has a particular time slice within which it is expected to perform
all of its actions in a particular iteration. Agents exceeding their time slice may
prevent or delay other agents from accessing CPU. As a visual aid to identifying
when this situation occurs, timing events are represented by coloured rectangles.
The size of these rectangles is proportional to the duration of the event and
the percentage of the allocated timeslice used. The colour code also indicates
how the agent has used its available time. A green rectangle indicates that the
agent has used anything up to 75% of the time available. From 75% to 100%, an
orange rectangle indicates that the agent may require further analysis from the
developer to avoid the danger of exceeding the time slice. Finally, whenever an
agent exceeds its time, a red rectangle is used. It must be acknowledged that as
a result of different approaches to scheduling agent platforms, timed performance
events may not be available to a specific AgentSpotter implementation. When
this arises, all events will be recorded as simple performance events.
Communication between agents is shown by lines linking the appropriate agent
timelines. These include arrows to indicate the direction of the communication.
Hovering the mouse pointer over such a line causes a popup window to display the
Time% time slice50%75%100%0%{{{1 time slice150% of time slice (exceeded allocation: RED)80% of time slice (over 75%: ORANGE)50% of time slice (under 75%: GREEN)proportional dimensionsFIPA headers and content of the message. There is also a distinction made between
messages passed between agents housed on the same agent platform (intra-
platform) and those passed between agents on different platforms (inter-platform).
Since agents on other platforms will not have an agent time line, an external
platform life line is drawn for each other platform with which agents communicate.
Rather than linking with individual agent time lines, communications with these
platforms are drawn directly to the external platform life line.
The combination of these communication lines and the performance event
indicators are very useful in identifying the causes of agent activity. Given
the inherently social nature of MASs, it is very common for agent activity to
be motivated by communication. For example, an agent may be requested to
perform a task by some other agent. Alternatively, an agent may receive a piece
of information from another agent that it requires in order to perform a task to
which it has previously committed as a result of its own goals and plans.
Providing such detailed visualisation of a MAS requires a substantial amount
of screen space. The basic features of zooming and panning are complemented
by the provision of a "bird's eye view", which displays a zoomed-out overview of
the entire session. This allows the user to quickly move the current viewport to
focus on a particular point in time during the session, as illustrated in Figure 3.
6 Evaluation
Having outlined the required features of AgentSpotter, along with details of
its implementation, it is necessary to demonstrate how it can be utilised on a
running MAS. To this end, a specialist benchmark application was developed
that will allow the features of the AgentSpotter application to be shown.
6.1 Specification
The aim of the benchmark application is to perform all the activities necessary
for AgentSpotter to display its features. The requirements for the application
can be summarised as follows:
-- Load history: a normally distributed random load history should be gener-
ated so that we can get an idea of a "normal" profile which can be contrasted
with "abnormal" profiles where, for example, a single agent is monopolising
all the load, or the load is spread equally among all agents.
-- Agent population: the number of active agents should be changeable
dynamically to simulate process escalation.
-- Interactions: in addition to direct interactions, the application should
exercise some task delegation scenarios. The idea is to generate multiple hops
messaging scenarios and see their impact on performance.
-- Messages: agents should generate a steady flow of messages with occasional
bursts of intense communication.
-- Performance events: all three performance behaviours described in Sec-
tion 3 should be represented, i.e. green (t ≤ 50% time slice), orange (50% ≤
t ≤ 75% time slice), and red (t > 100%).
These requirements were satisfied by creating a MAS with overseer agents that
request worker agents to execute small, medium or large tasks. Worker agents
that have been recently overloaded will simply refuse to carry out the tasks (in a
real application they would inform requester about their refusal). From time to
time, overseer agents would request agents to delegate some tasks. In this case,
worker agents will behave as overseers just for one iteration. A simple interface
allows the user to start and pause the process, along with the ability to set the
number of active worker agents.
6.2 Evaluation Scenario and Objective
The following simple scenario was played out in order to generate a flat profile
and space-time diagram.
1. Start the session with 12 worker agents and 2 overseer agents.
2. After 10 minutes add 15 worker agents to spread the load.
3. After 4 further minutes, suspend the process for 20 seconds.
4. At this point, reduce the number of worker agents to 12.
5. Run for 5 minutes more and then stop the session.
6.3 Flat profile
The resulting flat profile of this test is reproduced in Table 1. For the reader's
convenience, the maximum value for each column is identified by an enclosing
box. Overseer agents are called "master1" and "master2". The worker agents are
called "agent" followed by a number e.g. "agent007".
Firstly, the benchmark appears to make a good job of producing a load history
following a normal distribution.
Secondly, we can draw the following conclusions from a quick study of Table 1:
-- The most active agents in terms of number of iterations are the overseer agents,
"master1" and "master2", however in terms of CPU load and overload, three
worker agents are topping the list with 30% of the total activity: "agent001",
"agent009", and "agent003".
-- The agents with the highest CPU load also display a high number of time
slice overshoots, and a high average time slice duration.
-- As expected, the overseer agents were very busy exchanging messages with
the workers. However, it seems that messaging is not CPU intensive. This
possibly results from the way in which message sending is implemented, with
the CPU load indicated here corresponding to the scheduling of a message for
sending, rather than the actual sending of the message. It may be necessary
to attach a specialist monitor to the Message Transport Service to gain full
information about the impact of sending messages. This causes the activity
percentage of the overseer agents to be very low, at only 1%.
Fig. 5. Benchmark application sample space-time diagram (18 minute long session)
In this instance, the flat profile lends evidence to the notion that the actual
behaviour of the system matches the design principles on which it was built.
6.4 Space-Time Diagram
The space-time diagram for this session is shown in Figure 5. The individual
agent time lines can clearly be seen as horizontal bars in the main window of
the application. Within these, rectangular boxes represent processing tasks being
carried out by each agent. The vertical lines between the time lines represent
messages being passed between agents. For this simple scenario, only a single
agent platform was used, meaning that there are no external platform time lines
to indicate messages travelling to and from other agent platforms. A number of
points of interest are labelled on the diagram. These can be described as follows:
-- This portion of the diagram shows what happens when the initial 12 workers
are active. The large red rectangles illustrate the time-consuming tasks ordered
by the overseers. As mentioned in Section 5, these are also identifiable by
their size, which increases proportionally to the processing time taken. These
blocks never overlap because of the way Agent Factory schedules agents (i.e.
agents are given access to the CPU sequentially). It is also noteworthy that
the Agent Factory scheduler does not preempt agents that have exceeded
their time allocation. The red rectangles also come in bursts, because both
overseers send the same order to the same worker at the same time. This was
revealed by zooming into what initially appeared to be a single message line.
At a high magnification level, there were in fact two messages lines within a
few microseconds interval to the same worker.
-- At this point, 15 more workers are added to the system, following a slight
pause that is indicated by the temporary absence of message lines. The agent
time lines for the additional agents only begin at this point, clearly indicating
an increase in the agent population.
-- This third portion shows the impact of the new workers. The red blocks are
still present, but they are better spread among the agents, with the new
agents taking some of the load from their predecessors.
-- The Bird's Eye View reveals the bigger picture, and reminds us that we are
looking only at one third of the overall session.
7 Conclusions and Future Work
Currently, the only concrete implementation of AgentSpotter is for the Agent
Factory platform. As noted in Section 3, only the data capture apparatus should
require a separate implementation for another platform. It is intended to develop
such an implementation for other platforms, such as JADE [14].
The most obvious source of improvement for the AgentSpotter application
is the addition of extra information above that which is already available. For
instance, the performance of additional system services should be recorded, and
more details should be collected about agents' performance events, such as the
distribution of an agent's execution time among its sensors, actuators, reasoning
engine and other components. Finally, the AgentSpotter application currently
supports only one agent platform at any given time. The capability to visualise
multiple platforms concurrently would be desirable.
References
1. Knuth, D.E.: An empirical study of FORTRAN programs. j-SPE 1(2) (April/June
1971) 105 -- 133
2. Graham, S.L., Kessler, P.B., Mckusick, M.K.: Gprof: A call graph execution profiler.
SIGPLAN Not. 17(6) (1982) 120 -- 126
3. Srivastava, A., Eustace, A.: Atom: a system for building customized program
analysis tools. In: PLDI '94: Proceedings of the ACM SIGPLAN 1994 conference
on Programming language design and implementation, New York, NY, USA, ACM
(1994) 196 -- 205
4. Sun Microsystems, Inc.: JVM Tool Interface (JVMTI), Version 1.0. Web pages
at http://java.sun.com/j2se/1.5.0/docs/guide/jvmti/ (accessed August 4th,
2008) (2004)
5. Helsinger, A., Thome, M., Wright, T., Technol, B., Cambridge, M.: Cougaar: a
scalable, distributed multi-agent architecture. In: Systems, Man and Cybernetics,
2004 IEEE International Conference on. Volume 2. (2004)
6. Collier, R.: Debugging Agents in Agent Factory. Lecture Notes in Computer
Science 4411 (2007) 229
7. Seah, C., Sierhuis, M., Clancey, W., Cognition, M.: Multi-agent modeling and
simulation approach for design and analysis of MER mission operations.
In:
Proceedings of 2005 International conference on human-computer interface advances
for modeling and simulation (SIMCHI'05). (2005) 73 -- 78
8. Rimassa, G., Calisti, M., Kernland, M.E.: Living Systems R(cid:13)Technology Suite.
Whitestein Series in Software Agent Technologies and Autonomic Computing. In:
Software Agent-Based Applications, Platforms and Development Kits. Birkhauser
Basel (2005) 73 -- 93
9. Botia, J., Hernansaez, J., Skarmeta, F.: Towards an Approach for Debugging
MAS Through the Analysis of ACL Messages. In: Multiagent System Technologies:
Second German Conference, MATES 2004, Erfurt, Germany, September 29-30,
2004: Proceedings, Springer (2004)
10. Horn, P.: Autonomic Computing: IBM's Perspective on the State of Information
Technology. IBM TJ Watson Labs, NY, 15th October (2001)
11. Lee, L.C., Nwana, H.S., Ndumu, D.T., Wilde, P.D.: The stability, scalability and
performance of multi-agent systems. BT Technology Journal 16(3) (1998) 94 -- 103
12. Collier, R., O'Hare, G., Lowen, T., Rooney, C.: Beyond Prototyping in the Factory
of Agents. Multi-Agent Systems and Application III: 3rd International Central
and Eastern European Conference on Multi-Agent Systems, Ceemas 2003, Prague,
Czech Republic, June 16-18, 2003: Proceedings (2003)
13. Hwaci: Web site for the SQLite Database Engine (2008) http://www.sqlite.org/
(accessed October, 2008).
14. Bellifemine, F., Poggi, A., Rimassa, G.: JADE -- A FIPA-compliant agent framework.
In: Proceedings of PAAM. Volume 99. (1999) 97 -- 108
|
1801.09584 | 1 | 1801 | 2018-01-29T15:45:05 | A Unifying Framework for Manipulation Problems | [
"cs.MA",
"cs.DS"
] | Manipulation models for electoral systems are a core research theme in social choice theory; they include bribery (unweighted, weighted, swap, shift, ...), control (by adding or deleting voters or candidates), lobbying in referenda and others.
We develop a unifying framework for manipulation models with few types of people, one of the most commonly studied scenarios. A critical insight of our framework is to separate the descriptive complexity of the voting rule R from the number of types of people. This allows us to finally settle the computational complexity of R-Swap Bribery, one of the most fundamental manipulation problems. In particular, we prove that R-Swap Bribery is fixed-parameter tractable when R is Dodgson's rule and Young's rule, when parameterized by the number of candidates. This way, we resolve a long-standing open question from 2007 which was explicitly asked by Faliszewski et al. [JAIR 40, 2011].
Our algorithms reveal that the true hardness of bribery problems often stems from the complexity of the voting rules. On one hand, we give a fixed-parameter algorithm parameterized by number of types of people for complex voting rules. Thus, we reveal that R-Swap Bribery with Dodgson's rule is much harder than with Condorcet's rule, which can be expressed by a conjunction of linear inequalities, while Dodson's rule requires quantifier alternation and a bounded number of disjunctions of linear systems. On the other hand, we give an algorithm for quantifier-free voting rules which is parameterized only by the number of conjunctions of the voting rule and runs in time polynomial in the number of types of people. This way, our framework explains why Shift Bribery is polynomial-time solvable for the plurality voting rule, making explicit that the rule is simple in that it can be expressed with a single linear inequality, and that the number of voter types is polynomial. | cs.MA | cs |
A Unifying Framework for Manipulation Problems ∗
Dusan Knop†
Martin Kouteck´y‡
Matthias Mnich§
Abstract
Manipulation models for electoral systems are a core research theme in social choice theory; they
include bribery (unweighted, weighted, swap, shift, . . . ), control (by adding or deleting voters or candi-
dates), lobbying in referenda and others.
We develop a unifying framework for manipulation models with few types of people, one of the most
commonly studied scenarios. A critical insight of our framework is to separate the descriptive complexity
of the voting rule R from the number of types of people. This allows us to finally settle the computational
complexity of R-Swap Bribery, one of the most fundamental manipulation problems. In particular, we
prove that R-Swap Bribery is fixed-parameter tractable when R is Dodgson's rule and Young's rule,
when parameterized by the number of candidates. This way, we resolve a long-standing open question
from 2007 which was explicitly asked by Faliszewski et al. [JAIR 40, 2011].
Our algorithms reveal that the true hardness of bribery problems often stems from the complexity of
the voting rules. On one hand, we give a fixed-parameter algorithm parameterized by number of types
of people for complex voting rules. Thus, we reveal that R-Swap Bribery with Dodgson's rule is much
harder than with Condorcet's rule, which can be expressed by a conjunction of linear inequalities, while
Dodson's rule requires quantifier alternation and a bounded number of disjunctions of linear systems.
On the other hand, we give an algorithm for quantifier-free voting rules which is parameterized only
by the number of conjunctions of the voting rule and runs in time polynomial in the number of types
of people. This way, our framework explains why Shift Bribery is polynomial-time solvable for the
plurality voting rule, making explicit that the rule is simple in that it can be expressed with a single
linear inequality, and that the number of voter types is polynomial.
1
Introduction
Problems of manipulation, bribery and control constitute a fundamental part of computational social choice.
Many such problems are known to be NP-hard (or worse). However, their input can naturally be partitioned
into several parts, like the number of voters, the number of candidates, and others. This motivates the study
of such problems by the powerful tools of parameterized complexity. One of the most fundamental parameters
is the number of candidates C, which in many real-life scenarios can be expected to be reasonably small.
A by-now classical example in this direction is the R-Swap Bribery problem, which takes as input an
election consisting of a set C of candidates and a set V of voters with their individual preference lists ≻v
(for v ∈ V ), which are total orders over C. Additionally, for each voter v ∈ V and each pair of consecutive
candidates c ≻v c′, there is some cost σv(c, c′) ∈ Z of swapping the order of c and c′ in ≻v. The objective
is to find a minimum-cost set of swaps of consecutive candidates in the preference lists in order to make
a designated candidate c⋆ ∈ C the winner of the thus-perturbed election under a fixed voting rule R.
This problem was introduced by Elkind et al. [EFS09] and has since been studied for many classical
In particular, its computational complexity has been
voting rules R [DS12, FRRS14, KKM17c, SFE17].
∗Research supported by CE-ITI grant project P202/12/G061 of GA CR, project NFR MULTIVAL, and ERC Starting Grant
306465 (BeyondWorstCase).
†[email protected] Department of Applied Mathematics, Charles University, Prague, Czech Republic and Department of
Informatics, University of Bergen, Bergen, Norway
‡[email protected] Technion - Israel Institute of Technology, Haifa, Israel
§[email protected] Institut fur Informatik, Universitat Bonn, Bonn, Germany and Department of Quantitative Economics,
Maastricht University, Maastricht, The Netherlands
1
thoroughly analyzed with respect to the number of candidates C. The observation that C is often small
motivated the search for fixed-parameter algorithms for R-Swap Bribery parameterized by C, which are
algorithms that run in time f (C) · nO(1) for some computable function f , here n denotes the size of the
input election; if such an algorithm exists, we then say that the problem is fixed-parameter tractable with
respect to the parameter C.
Despite the problem's importance, for a long time, only the "uniform cost" case of R-Swap Bribery was
known to be fixed-parameter tractable for various voting rules, parameterized by the number of candidates;
here, uniform cost refers to the special case that all voters have the same cost function, that is, σv ≡ σ for all
v ∈ V . This is a fundamental result due to Dorn and Schlotter [DS12], who showed that R-Swap Bribery
with uniform cost can be solved in time 22C
· nO(1) for all voting rules R that are "linearly describable".
Many classical voting rules are indeed linearly describable, like any scoring protocol, Copelandα, Maximin,
or Bucklin.
O(1)
Recently, Knop et al. [KKM17c] gave the first fixed-parameter algorithms for R-Swap Bribery for
general cost functions for most voting rules R studied in the literature (scoring protocol, Copelandα, Maximin,
Bucklin etc.), thereby removing the uniform cost assumption. This way, they resolved a long-standing open
problem. Moreover, their algorithm runs in time 2CO(1)
· nO(1) for many rules R, and thus improves the
double-exponential run time by Dorn and Schlotter. Their key idea was to reduce the problem to so-called
n-fold integer programming, which allowed them to solve the problem efficiently for bounded number of
candidates despite their integer program having an unbounded number of variables. Their approach also
solved R-Swap Bribery for R being the Kemeny rule, even for general cost functions, though the Kemeny
rule is not known to be linearly describable (cf. [FHH11, p. 338]). However, this does not apply for Dodgson's
and Young's rules.
1.1 The challenge
Even so, there are some notable voting rules R for which the complexity of R-Swap Bribery remained open
even in the uniform cost case. This includes the Dodgson rule and the Young rule. Those rules are based
on the notion of Condorcet winner, which is a candidate who beats any other candidate in a head-to-head
contest. The Condorcet voting rule is very natural and dates back to the 18th century; however, clearly there
exist elections without a Condorcet winner. In such a situation one proclaims those candidates as winners
who are "closest" to being a Condorcet winner; different notions of closeness then yield different voting rules:
• Closeness measured as the of number of swaps in voter's preference orders defines the Dodgson rule.
• Closeness measured as the number of voter deletions defines the Young rule.
Thus, a candidate c is a Dodgson winner if s/he can be made a Condorcet winner by a minimum number of
swaps in the voter's preference orders over all candidates; analogously for the Young rule and voter deletions.
Kemeny rule1,
When considering R-Swap Bribery, the Dodgson rule and the Young rule are much more complicated
to handle than other rules; the reasons are several. First, for many voting rules R, the winner of an election
can be found in polynomial time, and solving this winner determination problem is certainly a necessary
subtask when solving R-Swap Bribery. However, for R ∈ {Dodgson, Young, Kemeny}, already winner
determination is NP-hard, and so even verifying a solution (that c⋆ is indeed the winner of the perturbed
election) is intractable. However, for R ∈ {Dodgson, Young}, already winner determination is NP-hard,
and so even verifying that c⋆ is indeed the winner of the perturbed election is intractable. In fact, winner
determination for these voting rules is complete for parallel access to NP [HSV05, HHR97, RSV03], denoted
-complete2. Second, for more than 25 years the winner determination problem for the Dodgson rule and
PNP
1Faliszewski [FHH09] give a fixed-parameter algorithm for the R-Bribery problem when R =Kemeny; R-Bribery is, in a
sense, simpler than R-Swap Bribery because in Bribery the cost of bribing a voter does not depend on how we bribe, while
in Swap Bribery the cost is the sum of costs for each performed swap.
2The class PNP
contains all problems solvable in polynomial time by a deterministic Turing machine which has access to an
NP oracle, but must ask all of its oracle queries at once (i.e., the queries can not depend on each other).
2
Young rule was only known to be solvable by an ILP-based algorithm [BITT89] with doubly-exponential
dependence in C; a single-exponential algorithm is only known since recently [KKM17c]. Even though
winner determination for these rules turns out to be fixed-parameter tractable with parameter C, there
is a sharp difference:
for the Kemeny rule, a simple procedure enumerating all C! possible preference
orders suffices to determine the winner, while for Dodgson and Young, only a double-exponential ILP-
based algorithm was known for a long time [BITT89] and a single-exponential algorithm is only known
recently [KKM17c]. This provides a sharp contrast to the Kemeny rule, for which simply enumerating all
C! possible preference orders suffices to determine the winner. Faliszewski et al. [FHH09] describe these
difficulties:
It is interesting to consider which features of Kemeny elections allow us to employ the above [ILP-based]
attack, given that the same approach does not seem to work for either Dodgson or Young elections. One
of the reasons is that the universal quantification implicit in Dodgson and Young elections is over an
exponentially large search space, but the quantification in Kemeny is, in the case of a fixed candidate set,
over a fixed number of options.
Thus, it is not clear how to solve R-Swap Bribery even for uniform cost with any fixed-parameter algorithm
for R being the Dodgson rule or the Young rule. These complications led Faliszewski et al. [FHH11] to
explicitly ask for the complexity of R-Swap Bribery parameterized by the number of candidates under
these rules.
1.2 Our contributions
We start by making a key observation about the majority of fixed-parameter algorithms for R-Swap Bribery
when C is small. A typical such result is an algorithm for R-Swap Bribery for R being Condorcet's voting
rule. That algorithm uses two key ingredients:
1. There are at most C! preference orders of C, and hence each voter falls into one of C! types; thus, an
input election is expressible as a society s = (s1, . . . , sC!), where si is the number of voters of type i.
2. Expressing that a candidate c⋆ is a Condorcet winner is possible using a conjunction of C − 1 linear
inequalities in terms of s.
As those key properties hold almost universally for voting rules R, one might be tempted to think that if
there are many types of voters, the R-Swap Bribery problem must be hard, and if there are few types of
voters, the problem must be easy. However, two points arise as counter-evidence. First, very recently, Knop
et al. [KKM17c] showed that even if there are many types of voters who differ by their cost functions, the
R-Swap Bribery problem remains fixed-parameter tractable for a wide variety of voting rules R. Second,
as already mentioned, it was open since 2007 whether R-Swap Bribery with Dodgson's and Young's voting
rule are fixed-parameter tractable for few candidates, even for uniform cost functions.
From voters and candidates to societies. Here, we take a novel perspective. We observe that the two key
ingredients (1) and (2) apply much more widely than for R-Swap Bribery; namely, they are also present
in many other manipulation, bribery and control problems. We therefore abstract away the specifics of such
problems and introduce general notions of "society", "moves in societies", and "winning conditions". Let
τ ∈ N be the number of types of people (e.g., voters in an election or a referendum). A society s is simply
a non-negative τ -dimensional integer vector encoding the numbers of people of each type. A move m is
a τ 2-dimensional integer vector whose elements sum up to zero; it encodes how many people move from
one type to another. A change ∆ is a τ -dimensional vector (typically associated with a move) encoding
the effect of a move on a society, such that s + ∆ is again a society. Finally, a winning condition Ψ(s) is
a predicate encoding some desirable property of a society, such as that a preferred candidate has won or
that a preferred agenda was selected in a referendum. Specifically, we study winning conditions which are
describable by formulas in Presburger Arithmetic (PA). PA is a logical language whose atomic formulas are
linear inequalities over the integers, which are then joined with logical connectives and quantifiers. Thus,
3
winning conditions describable by PA formulas widely generalize the class of linearly describable voting rules
by Dorn and Schlotter [DS12].
Our main technical contribution informally reads as follows:
Theorem 1 (informal). Deciding satisfiability of PA formulas with two quantifiers is fixed-parameter
tractable with respect to the dimension and length of formula, provided its coefficients and constants are
given in unary.
The importance of Theorem 1 arises from its applicability to the following general manipulation problem
that we introduce here. This general manipulation problem, which we call Minimum Move, captures that
many manipulation problems can be cast as finding a minimum move with respect to some objective function;
in particular, it encompasses the well-studied R-Swap Bribery problem. We study Minimum Move for
linear objective functions and winning conditions Ψ expressible with PA formulas of the form "∃∀". For
all such Ψ, with the help of Theorem 1, we show that Minimum Move is fixed-parameter tractable for
combined parameter the descriptive complexity (length) of the winning condition Ψ and the number τ of
"types of people", that is, it is fixed-parameter tractable for parameter lengthe of Ψ plus τ . As an important
special case, we obtain the first fixed-parameter algorithm for R-Swap Bribery for R the Dodgson rule
and the Young Rule with uniform costs. To this end, we model the winning condition of the Dodgson
rule and Young rules as a PA formula. For intuition, consider the Young rule: a candidate c⋆ is a Young
winner (with score d) if there exists a set V ⋆ ⊆ V of at most d voters such that c⋆ is a Condorcet winner
of the election (C, V \ V ⋆), and for all sets V ′ ⊆ V of at most d − 1 voters any other candidate c 6= c⋆
is not a Condorcet winner of the election (C, V \ V ′). This formula has one quantifier alternation, and its
length (for a fixed score d) is bounded by some function of C; finally we have to take a disjunction of such
formulas over all possible scores d. For a candidate set C, the number τ of types of people is bounded by C!.
Consequently, we finally settle the long-standing open question about the complexity of R-Swap Bribery
for R ∈ {Dodgson, Young}, that was explicitly raised by Faliszewski [FHH11]:
Theorem 2. R-Swap Bribery with uniform cost is fixed-parameter tractable parameterized by the number
of candidates for R being the Dodgson rule or the Young rule; it can be solved in time f (C) · V O(1) for
some computable function f .
Beyond this fundamental problem, we show that a host of other well-studied manipulation problems are
captured by our fixed-parameter algorithm for Minimum Move:
Corollary 3. For R ∈ {Dodgson, Young}, the following problems are fixed-parameter tractable for uniform
costs when parameterized by the number C of candidates: R-$Bribery, R-CCDV/CCAV, R-Possible
Winner, and R-Extension Bribery.
Let us turn our attention to the parameter "number of types of people" τ . Our main contribution here
is the following:
Theorem 4 (informal). For any quantifier-free winning condition Ψ, Minimum Move can be solved in time
polynomial in the number of types and exponential only in the number of linear inequalities of Ψ.
Note that in many models of bribery and control, the number of potential types of people (i.e., types
that can occur in any feasible solution) is polynomial in the number of people on input. For example, in
Shift Bribery, every voter can be bribed to change their preferences order to one of C − 1 orders; thus
the number of potential types is (C − 1)V . Similarly, in CCAV / CCDV (constructive control by adding
or deleting voters), every voter has an active/latent bit; thus the number of potential types is 2V . Similar
arguments also work for Support Bribery where we change voters' approval counts, and with a more
intricate argumentation also for some voting rules and Bribery and $Bribery. In this sense, the fact that
we need to consider C! potential voter types in R-Swap Bribery almost seems like an anomaly, rather than
a rule. In summary, the complexity of Minimum Move depends primarily on the descriptive complexity of
the winning condition Ψ, because in many cases the number of types of people is polynomially bounded.
4
Another consequence of Theorem 1 are the first fixed-parameter algorithms for two important manip-
ulation problems beyond R-Swap Bribery. The Resilient Budget problem asks, for a given society
whether allocating budget B is sufficient in order to repel any adversary move of cost at most Ba with a
counter-move of cost at most B (so that the winning condition is still satisfied). Similarly, Robust Move
asks for a move of cost at most B which causes the winning condition to be satisfied even after any adversary
move of cost at most Ba. For formal definitions and results, cf. Sect. 4.2.
1.3
Interpretation of results
Intuitively, the results obtained with Theorem 1 can be interpreted as follows. Dodgson-Swap Bribery
is fixed-parameter tractable parameterized by C; however, this comes with at least two limitations as
compared to prior work for simpler voting rules R. First, our methods do not extend beyond the uniform
cost scenario, and this remains a major open problem. Second, our result requires the input election to
be given in unary, while prior work allows it to be given in binary (this is sometimes called the succinct
case [FHH09]). This is easily explained by the different descriptive complexities of the respective voting rules:
for example, while Condorcet's voting rule can be formulated as a quantifier-free PA formula, formulating
Dodgson's rule requires a long disjunction of formulas which use two quantifiers and a bounded number of
disjunctions.
Theorem 4 lets us discuss more specifically the complexity of various voting rules. For example, the
Plurality voting rule can be expressed with a single linear inequality encoding that a preferred candidate
obtained more points than the remaining candidates altogether. Thus, all problems which can be modeled
as Minimum Move are polynomial-time solvable with the Plurality voting rule. This interprets the re-
sult of Elkind et al. [EFS09, Theorem 4.1] that Plurality-Shift Bribery is polynomial-time solvable: the
number of potential voter types is polynomial, and Plurality has a simple description. Continuing, we may
compare R=Borda with R=Copeland. The winning condition for R=Borda can be described with C − 1
inequalities, while R=Copeland requires O(C2) inequalities. Thus Borda-Swap Bribery is solvable in
time CO(C2) log V , while Copeland-Swap Bribery requires time CO(C4) log V . Finally, all descrip-
tions of Kemeny's voting rule we are aware of require C! inequalities, and thus result in Kemeny-Swap
Bribery being solvable in time C!(C!)O(1)
log V . We do not claim these complexities to be best possible,
but conjecture the existence of lower bounds separating the various voting rules; in particular, we believe
that Kemeny-Swap Bribery requires double-exponential time.
Finally, our work provides a natural next step in unifying the many different models that have been
proposed for voting, bribing and manipulation problems. In this direction, Faliszewski et al. [FHH11] study
what happens when multiple bribery and manipulation actions can occur in an election; e.g., CCAV asks
for constructive control by adding voters while CCDV by deleting voters; similarly for CCAC and CCDC
for adding/deleting candidates. Faliszewski et al. unify those various (up to that point separately studied)
attacks. Similarly, Knop et al. [KKM17c] formulate the R-Multi Bribery problem, which also incorporates
swaps and perturbing approval counts. The problem we put forward in this paper, Minimum Move, in some
sense generalizes and simplifies all those "meta"-problems.
1.4 Related work
We have reviewed most of the relevant computational social choice work already. However, there seems
to be some confusion in the literature that deserves clarification. The paper of Faliszewski et al. [FHH09]
pioneering the concept of bribery in elections indeed considers the voting rules Kemeny, Dodgson and Young,
and provides a fixed-parameter algorithm for Kemeny-Bribery. There are three features of their paper that
we wish to discuss.
First, turning their attention to Dodgson-Bribery, they write:
Applying the integer programming attack for the case of bribery within Dodgson-like election systems [...]
is more complicated. These systems involve a more intricate interaction between bribing the voters and
then changing their preferences. For Dodgson elections, after the bribery, we still need to worry about
5
the adjacent switches within voters' preference lists that make a particular candidate a Condorcet winner.
[...] This interaction seems to be too complicated to be captured by an integer linear program, but building
on the flavor of the Bartholdi et al. [BITT89] ILP attack we can achieve the following: Instead of making
p a winner, we can attempt to make p have at most a given Dodgson or Young score.
They call this problem DodgsonScore-Bribery and provide positive results for it. Notice, however, that
finding a bribery which makes c⋆ have a certain Dodgson score does not prevent another candidate to have
a lower score and winning the bribed election. Thus, solving DodgsonScore-Bribery can be very far from
the desired result.
Second, the authors then observe that a brute force approach enumerating all V C! briberies solves
the Dodgson-Bribery problem in polynomial time for constantly many candidates; however, theirs is not a
fixed-parameter algorithm for parameter C.
Third, they then introduce another voting system called Dodgson′, which is similar to Dodgson, and
provide a fixed-parameter algorithm for winner determination. However, as in the case of Dodgson-Bribery,
they do not provide a fixed-parameter algorithm for Dodgson′-Bribery.
The issue is then that a subsequent paper of Falisezwski et al. [FHH11] claims that the Dodgson rule is
"integer-linear-program implementable" and that this implies a certain election control problem generalizing
Bribery to be fixed-parameter tractable [FHH11, Theorem 6.2]. We believe the authors do not sufficiently
differentiate between determining the winner with one ILP, as is the case for most simple voting rules, and
with multiple ILPs, as is the case for Dodgson. Thus, we believe there is no evidence that the Dodgson
rule is "integer-linear-program implementable". Yet, this may be possible and this question still deserves
attention. Whatever the reason, we are convinced that their [FHH11, Theorem 6.1] does not hold for
R=Dodgson. Hence, we believe that ours are the first fixed-parameter algorithms for any Bribery-like
problem for R ∈ {Dodgson, Young}.
2 Preliminaries
Let m, n be integers. We define [m, n] := {m, m + 1, . . . , n} and [n] := [1, n]. Throughout, we reserve bold
face letters (e.g. x, y) for vectors. For a vector x its i-th coordinate is xi.
Next, we provide notions and notations for R-Swap Bribery.
Elections. An election (C, V ) consists of a set C of candidates and a set V of voters, who indicate their
preferences over the candidates in C, represented via a preference order ≻v which is a total order over C.
We often identify a voter v with their preference order ≻v. Denote by rank(c, v) the rank of candidate c
in ≻v; v's most preferred candidate has rank 1 and their least preferred candidate has rank C. For distinct
candidates c, c′ ∈ C, write c ≻v c′ if voter v prefers c over c′.
Swaps. Let (C, V ) be an election and let ≻v∈ V be a voter. For candidates c, c′ ∈ C, a swap s = (c, c′)v
v. A swap (c, c′)v is
means to exchange the positions of c and c′ in ≻v; denote the perturbed order by ≻s
admissible in ≻v if rank(c, v) = rank(c′, v) − 1. A set S of swaps is admissible in ≻v if they can be applied
sequentially in ≻v, one after the other, in some order, such that each one of them is admissible. Note that
the perturbed vote, denoted by ≻S
v , is independent from the order in which the swaps of S are applied. We
extend this notation for applying swaps in several votes and denote it V S. We specify v's cost of swaps by
a function σv : C × C → Z.
Voting rules. A voting rule R is a function that maps an election (C, V ) to a subset W ⊆ C, called the
winners. A candidate c ∈ C is a Condorcet winner if any other c′ ∈ C \ {c} satisfies (cid:12)(cid:12){≻v∈ V c ≻v c′}(cid:12)(cid:12) >
(cid:12)(cid:12){≻v∈ V c′ ≻v c}(cid:12)(cid:12); then we say that c beats c′ in a head-to-head contest. The Young score of c ∈ C is
the size of the smallest subset V ′ ⊆ V such that c is a Condorcet winner in (C, V \ V ′). Analogously, the
Dodgson score of c ∈ C is the size of the smallest admissible set of swaps S such that c is a Condorcet winner
in (C, V S). Then, c is a Young (Dodgson) winner if it has minimum Young (Dodgson) score.
We aim to solve the following problem:
6
R-Swap Bribery
Input: An election (C, V ), a designated candidate c⋆ ∈ C and swap costs σv : C × C → Z for
Find:
v ∈ V .
A set S of admissible swaps of minimum cost so that c⋆ wins the election (C, V S) under
the rule R.
3 Moves in Societies and Presburger Arithmetic
Let τ ∈ N be the number of types of people.
Definition 5. A society is a non-negative τ -dimensional integer vector s = (s1, . . . , sτ ).
In most problems, we are interested in modifying a society by moving people between types.
Definition 6. A move is a vector m = (m1,1, . . . , mτ,τ ) ∈ Zτ 2
Intuitively, mi,j is the number of people of type i turning type j.
Definition 7. A change is a vector ∆ = (∆1, . . . , ∆τ ) ∈ Zτ whose elements sum up to 0. We say that ∆
is the change associated with a move m if ∆i = Pτ
j=1 mj,i − mi,j, and we write ∆ = ∆(m). A change ∆ is
feasible with respect to society s if s + ∆ ≥ 0, i.e., if applying the change ∆ to s results in a society.
.
One more useful notion is that of a move costs vector:
Definition 8. A move costs vector is a vector c = (c1,1, . . . , cτ,τ ) in (N∪{+∞})τ 2
inequality, i.e., ci,k ≤ ci,j + cj,k for all distinct i, j, k.
which satisfies the triangle
Definition 9 ((c, k)-move). Let k ∈ N and c be a move costs vector. A move m is a (c, k)-move if c⊺m ≤ k.
Finally, we want to check that the society (e.g., resulting from applying some moves) satisfies a certain
desired condition. This condition depends on the problem we are modeling: in variants of bribery, it says
that a preferred candidate is elected as a winner or to be a part of a committee under a given voting rule; in
the context of lobbying, it says that a preferred agenda was selected. To allow large expressibility, we make
a very broad definition:
Definition 10. A winning condition of width τ is a predicate Ψ(s) with τ free variables.
3.1 Presburger Arithmetic
For two formulas Φ and Ψ, we write Φ ∼= Ψ to denote their equivalence.
Definition 11 (Presburger Arithmetic). Let
P0,(n0),δ,γ,α,β = n Ψ(x0)o
be the set of quantifier-free Presburger Arithmetic (PA) formulas with n0 free variables x0 which are a
disjunction of at most δ conjunctions of linear inequalities a⊺x0 ≤ b, each of length at most γ, where
kak∞ ≤ α and b ≤ β for each inequality. Then, let
P0,(n0),δ,γ,α,β = nΨ(x0) ∃ Ψ(x0) ∈ P0,(n0),δ,γ,α,β : Ψ ∼= Ψo
be the set of PA formulas equivalent to some DNF formula from P0,(n0),δ,γ,α,β. Finally, let
Pk,n,δ,γ,α,β = {Ψ(x0) ≡ ∃/∀x1∃/∀x2 · · · ∃/∀xk : Φ(x0, x1, . . . , xk)}
be the set of PA formulas with quantifier depth k, n0 free variables x0, and dimension n = (n0, n1, . . . , nk);
here, xi ∈ Zni for each i and Φ(x0, . . . , xk) ∈ P0,(n),δ,γ,α,β with n = Pk
i=1 ni. The length of Ψ(x0) is the
number of symbols it contains, which is polynomially bounded in (n, γ, δ). By ∃P and ∀P we denote the
sets of PA formulas whose leading quantifier is ∃ or ∀, respectively.
7
∃/∀x1
...
∃/∀xk
(∨), δ
(∧), γ
(∧), γ
. . .
(∧), γ
Φ
≤ γ
a1 · (x0, . . . , xk) ≤ b1
...
ap · (x0, . . . , xk) ≤ bp
≤ α
≤ β
Figure 1: Visualization of PA formula Ψ(x0) in DNF.
Example. A simple example of PA is the following formula.
Ψ(y) ≡ ∀x1x2∃z1z2z3
:
(x1 + y = z3 ∧ y ≥ 0) ∨
(cid:0)3x1 + 10y − 3z1 ≤ 13 ∧ 2x2 + 5y − z2 ≤ 11
∧ x1 + 1y − z3 ≥ 9 ∧ z1 − z2 + 2z3 ≤ 6(cid:1)
Here k = 2, n = (1, 2, 3) , δ = 2, γ = 4, α = 10, and β = 13.
We study winning conditions Ψ(s) expressible in PA, and state our complexity results with respect to
the descriptive complexity of Ψ, which is its number of variables, quantifiers, logical connectives, and unary
encoding length of coefficients and constants.
Vocabulary. We express relevant definitions by simple PA formulas over integral variables and with integer
coefficients and constants:
• society(s) ≡ s ≥ 0 ∈ P0,(τ ),0,τ,1,0,
• move(m) ∈ P0,(τ 2),0,0,0,0,
• ∆ = ∆(m) is a linear map ∆i = Pτ
Ψ(m, ∆) ∈ P0,(τ +τ 2),0,τ,1,0
j=1 mj,i − mi,j; thus if we let Ψ(m, ∆) ≡ ∆ = ∆(m), then
• feasible(s, ∆) ≡ (s + ∆(m) ≥ 0 ∧ 1⊺∆ = 0) ∈ P0,(2τ ),0,τ,2,0, and,
• (c, k)-move(m) ≡ c⊺m ≤ k ∈ P0,(τ ),0,1,kck∞,k.
We note that, for elections, our definition of winning condition generalizes the notion of "linearly-definable
voting rules" by Dorn and Schlotter [DS12]. Precisely, those rules belong to ∃P with k = 1; we will show
that Dodgson and Young are in ∃P with k = 2. Thus, our winning conditions capture an extensive set of
voting rules.
3.2 Modeling Problems as Minimum Move
We model moves in societies by the following general problem:
Minimum Move
Input: A society s, an objective function f : Zτ 2
Find:
A move m minimizing f (m) s.t. Ψ(s + ∆(m)) ∧ feasible(s, ∆(m)).
→ Z, a winning condition Ψ.
8
It models many well-studied problems:
Multi bribery. Knop et al. [KKM17c] introduce a generalization of various bribery problems called R-
Multi Bribery. Informally, we are given an election (C, V ) where each voter further has an approval count,
and is either active or latent the status of which can be changed at certain cost; likewise, there are costs for
perturbing their preference order or approval count. This problem generalizes Bribery, $Bribery, Swap
Bribery, Shift Bribery, Support Bribery, Extension Bribery, Possible Winner, Constructive
Control by Adding/Deleting Voters and other problems.
Notice that there are at most C! possible preference orders, at most C possible approval counts, and
2 states "active" or "latent". Thus, there are at most τ ≤ 2C · C! potential types of voters, and we
can express the input election as a society s. A move costs vector c describing the costs of moving a voter
from one type to another is obtained by calculating (possibly using a shortest path algorithm) the least costs
based on the given cost functions. Let Ψ(s) be a PA formula which is satisfied if the preferred candidate wins
under the voting rule R in a society s. Then, a bribery of minimum cost in a R-Multi Bribery instance
can be modeled as solving Minimum Move with f (m) = c⊺m. This modeling, combined with Theorem 2
and Corollary 17, yields Corollary 3.
Multiwinner elections. Bredereck et al. [BFN+16] study the complexity of Shift Bribery in committee
elections, that is, in elections with multiple winners. The modeling is exactly the same as above, except for
the winning condition Ψ which will be a long disjunction over all committees which include the preferred
candidate.
Lobbying in referenda. Bredereck et al. [BCH+14] study the complexity of Lobbying in referenda. There,
voters cast ballots with their "yes"/"no" answers to issues. The task is to push an agenda, i.e., a certain
outcome. Again, voters fall into groups according to their ballots, the costs of changing their opinions forms
a move costs vector, and a winning condition Ψ expresses that the selected agenda succeeded.
4 Sentences With Two Quantifiers
We shall now introduce the building blocks of our proof of Theorem 1. Woods [Woo15] gives an algorithm
that efficiently converts any quantifier-free PA formula Φ into an equivalent DNF formula Φ of bounded
length:
Lemma 12 (Woods [Woo15, Proposition 5.1]). Let Φ(x) be a quantifier-free PA formula with x ∈ Zd
containing N inequalities, whose coefficients and right-hand sides are bounded in absolute value by α and
β, respectively. Then Φ(x) can be converted into an equivalent DNF formula Φ(x) with at most δ = N O(d)
disjunctions, each containing at most N conjunctions with the same bound on α and β.
It is often useful for the quantifiers of a PA formula to range over integer points of polyhedra, e.g. ∀x ∈ Q
(we do not write Q ∩ Zn for brevity, as we assume everything to be integer); again, our definition is not
restrictive by the fact that we can always rearrange:
Ψ(x0) ≡ ∃x1 ∈ Q1 · · · ∀/∃xk ∈ Qk : Φ(x0, x1, . . . , xk) ≡
∃x1 · · · ∀/∃xk :(cid:16)Φ(x0, x1, . . . , xk)
^(x1 ∈ Q1 ∧ x3 ∈ Q3 · · · )∧_(x2 6∈ Q2 ∨ x4 6∈ Q4 · · · )(cid:17)
Parametric ILP. A special case of PA are parametric ILPs, which can be viewed3 as deciding the sentence
∀x ∈ Zp : Ax ≤ b ∃y ∈ Zn : B(x, y) ≤ e,
where A ∈ Zℓ×p and B ∈ Zm×n are integer matrices. A consequence of an algorithm of Eisenbrand and
Shmonin [ES08] is the following:
3Parametric ILPs are typically viewed as ILPs with a varying right hand side, that is, deciding the sentence ∀b∃x : Ax ≤ b;
it is known that our formulation is equivalent, as shown by Crampton et al. [CGKW17], who call it ILP Resiliency.
9
Corollary 13 ([ES08, Theorem 4.2], [CGKW17, Corollary 1]). Any parametric ILP whose entries of A, B,
b and e are given in unary, is fixed-parameter tractable when parameterized by n, m and p.
ILP and disjunctions. We shall use a folklore result about implementing disjunctions in ILP when the
domains of variables can be bounded. For that, we need another definition.
Definition 14 (B-bounded, B-small PA formula). Let Ψ(x0) ≡ ∃/∀x1 · · · ∃/∀xk : Φ(x0, . . . , xk) be a PA
formula, and let ΨB(x0) ≡ ∃/∀x1 ∈ [−B, B]n1 · · · ∃/∀xk ∈ [−B, B]nk : Φ(x0, . . . , xk). Then we say that
Ψ(x0) is B-bounded if
{x ∈ Zn0 ΨB(x)} ∩ [−B, B]n0 = {x ∈ Zn0 Ψ(x)} ,
i.e., the set of feasible solutions does not change by restricting all quantifiers and free variables to the
corresponding box of size B.
Moreover, we say that any Ψ ∈ Pk,n,δ,γ,B,B is B-small if it is B-bounded, that is, its coefficients and
constants are bounded by B.
A special case are ILPs which are B-small; they correspond to PA formulas with k = 0 and δ = 0; for
such formulas we show:
Lemma 15 (ILP disjunctions [folklore]). Let Aix ≤ bi for i ∈ [d] be B-small ILPs with Ai ∈ Zm×n for
each i ∈ [d]. Then, a (B2n)-small system Ax ≤ b with A ∈ Z(md+d+1)×(n+d) can be constructed in time
O (cid:16)dm + n + Pd
i=1hAi, bii(cid:17) such that
∃(x, y) ∈ Zn+d : A(x, y) ≤ b ⇐⇒ ∃x ∈ Zn : _
i∈[d]
Aix ≤ bi
.
Proof. Let M = B2n, let yi for i ∈ [d] be binary variables, and consider the following system:
d
X
i=1
yi = 1^ yi ≥ 0, Aix ≤ bi + M (1 − yi) for all i ∈ [d] .
Assume it has an integer solution y. Then there is an index i ∈ [d] such that yi = 1 and thus Aix ≤ bi + 0
holds; thus, the system Aix ≤ bi has an integer solution. In the other direction, assume that the system
Aix ≤ bi has a solution x; then let yi = 1. We shall prove that Ai′ x ≤ bi′ + M holds for all i′ 6= i. Since
Ai′ x ≤ bi′ is B-small, each of its row sums has n terms which are a multiple of two numbers, each bounded
by B, and thus is at most B2n. Moreover, since yi = 1, we have yi′ = 0 and thus the right hand side is
bi′ + M and every assignment of x feasible for Aix ≤ bi satisfies it. Clearly, the new system has n + d
variables, md + d + 1 inequalities, is B-bounded and kAk∞ = B2n and thus it is (B2n)-small, and can be
constructed in the claimed time.
We now prove Theorem 1; we restate it in formal terms here:
Theorem 16 (formal version of Theorem 1). Let Ψ be a β-small P2,n,δ,γ,α,β sentence (i.e., without free
variables and thus n0 = 0). Then Ψ can be decided in time g(n, δ, γ) poly(α, β) for some computable function
g.
Proof. Let Ψ ≡ ∃x1∀x2 : Φ(x1, x2). Clearly, to decide Ψ we can instead decide ¬Ψ ≡ ∀x1∃x2 : ¬Φ(x1, x2).
Consider the formula ¬Φ(x1, x2): by Lemma 12, there exists an equivalent β-small DNF formula ¯Φ(x1, x2)
such that the number of its disjunctions and conjunctions is a function of just the original δ and γ.
Thus, from now on focus on the case Ψ ≡ ∀x1∃x2 : Φ(x1, x2). Our next task is to construct an
instance of Parametric ILP equivalent to deciding Ψ. To do that, replace Φ(x1, x2) with Ξ(x1, x2) ≡
∃x3 : A(x1, x2, x3) ≤ b, where x3 is of dimension δ and the system of linear inequalities A(x1, x2, x3) ≤ b
has bounded length, coefficients and right sides. Now we use Lemma 15. Assume that Φ(x1, x2) is a
disjunction of δ linear systems, each of at most γ conjunctions, and by the assumptions of the theorem
we know that Ψ is β-small. Plugging into Lemma 15, we have B = β, d = δ, m = γ and n = n1 + n2,
and we obtain a formula ∃x3 : A(x1, x2, x3) ≤ b equivalent to Φ(x1, x2). Thus, we are left with deciding
∀x1∃(x2, x3) : A(x1, x2, x3) ≤ b with the following parameters:
10
• The coefficients and right-hand sides k(A, b)k∞ are bounded by some computable function f (n, δ, γ)·(αβ)2.
• The dimensions of A are bounded by f (n, δ, γ).
Thus, we are in the setting of Corollary 13 and we can decide the above sentence by a fixed-parameter
algorithm.
Corollary 17. Let Ψ(x0) be a disjunction of D many β-small ∃P2,(τ,n1,n2),δ,γ,α,β formulas. Then
Minimum Move with objective f (x0) = c⊺x0 and winning condition Ψ can be solved in time
g(τ, n1, n2, δ, γ) poly(D, α, β, c) for some computable function g.
Proof. Let Ψ ≡ Ψ1 ∨ · · · ∨ ΨD, and let Ξi(m) ≡ Ψi(s + ∆(m)) ∧ (c, B)-move(m) ∧ feasible(∆(m), s), for
each i ∈ [D]. Now we need to perform binary search with parameter B on the sentence
∃mΨ(s + ∆(m) ∧ (c, B)-move(m) ∧ feasible(∆(m), s) .
This sentence is obviously equivalent to
∃mΞ1(m) ∨ · · · ∨ ∃mΞD(m),
which can be decided by D application of Theorem 16. This is possible in the claimed time, as, for each
i ∈ [D], ∃mΞi(m) has quantifier depth 2, is β′-small for β′ = poly(β, τ + n1 + n2, kck∞) and has dimension
n = (0, τ + n1, n2). A minimum move can then be constructed by coordinate-wise binary search; cf. [KQR10,
Thm. 4.1].
4.1 Application: Swap Bribery for the Dodgson Rule and Young Rule
We now prove Theorem 2 by giving our fixed-parameter algorithm for R-Swap Bribery with R the Dodgson
Rule or the Young Rule.
Proof of Theorem 2. Fix an instance (C, V, c⋆, σ) of R-Swap Bribery. As there are C! possible total
orders on C, each voter has one of these orders. Thus we view the election as a society s = (s1, . . . , sC!).
Let cswap be a move costs vector defined as ci,j ="swap distance between types i and j" (this is simply the
number of inversions between the permutations i and j [EFS09, Proposition 3.2]); observe that a society s
is in swap distance at most d from s′ if s′ = s + ∆(m) and m is a feasible (cswap, d)-move for s. Moreover,
let cdel be defined as ci,0 = 1 for every type i and ci,j = +∞ for every two types i, j 6= 0, where 0 is a type
for latent voters; observe that s is in voter deletion distance at most d from s′ if s′ = s + ∆(m) and m is a
(cdel, d)-move.
Our plan is to express the winning condition for R using a PA formula ΨDodgson(s) which is a disjunction
of polynomially many (in V and C) formulas from ∃P2,n,δ,γ,α,β, and then solve Minimum Move with
f (m) = σ⊺m and Ψ = ΨDodgson(s) using Corollary 17; recall that since the instance is uniform, we have
σv ≡ σ for all v ∈ V , and we let σ be the move costs vector obtained from σ. For ΨYoung, we proceed
analogously.
In the end, we will verify that n, δ, γ are bounded by a function of C, and that α, β are
polynomial in the input size.
Expressing ΨDodgson and ΨYoung. The winning condition for candidate c⋆ in both the Dodgson and
Young rule can be viewed as c⋆ being closest to being a Condorcet winner with respect to some distance
measure. Specifically, for the Dodgson rule, this distance is the number of swaps in the preference orders,
and in the Young rule, the distance is the number of voter deletions. For this reason, finding a bribery which
makes c⋆ a winner corresponds to finding a bribery which, for some d ∈ N, makes c⋆ be in distance d or less
from being a Condorcet winner, and, simultaneously, making every other candidate c 6= c⋆ be in distance at
least d from being a Condorcet winner.
Let us fix d ∈ N; later we will argue that we can go through all D relevant choices of d. First, we will
express the condition that in a society s, candidate c beats candidate c′ in a head-to-head contest:
beats(c, c′, s) ≡ X
i:c≻ic′
si > X
i:c′≻ic
si,
11
where ≻i is the preference order shared by all voters of type i. Then, it is easy to express that c⋆ is a winner
in s under Condorcet's rule:
ΦCondorcet(c, s) ≡ ^
c′6=c
beats(c, c′, s) .
Finally, we express that c⋆ is a Dodgson-winner with score d by ΨDodgson,d as follows:
ΨDodgson,d(s) ≡(cid:0)∃m : (cswap, d)-move(m) ∧ feasible(∆(m), s)∧
ΦCondorcet(c⋆, s + ∆(m))(cid:1)∧
(cid:0)∀m : (cswap, d − 1)-move(m) ∧ feasible(∆(m), s)∧
^
c6=c⋆
¬ΦCondorcet(c, s + ∆(m))(cid:1)
Then, ΨDodgson ≡ ΨDodgson,1 ∨ · · · ∨ ΨDodgson,D. Clearly, ΨYoung,d is obtained simply by replacing cswap with
cdel.
Complexity. The number D of relevant choices of d is bounded by C2V : at most C2 swaps suffice for
any bribery of a single voter, and there are at most V voters, thus D ≤ C2V is a bound on the Dodgson
score of a candidate. For the Young score, D ≤ V .
Since for each d ∈ [D], ΨDodgson,d ≡ ∃m : Ξ1(m) ∧ ∀m : Ξ2(m) can be equivalently rewritten as
∃m∀m′ : Ξ1(m) ∧ Ξ2(m′), it has quantifier depth 2, and thus belongs to ∃P2,n,δ,γ,α,β. Let us determine the
parameters:
• n is the vector of dimensions; thus n0 = τ = C! are the dimensions of a vector encoding a society, and
n1 = τ 2 = C!2 are the dimensions of a vector encoding a move.
• δ is the number of disjunctions, and it is polynomial in C,
• γ is the number of conjunctions, and it is polynomial in τ = C!,
• α is the largest coefficient, which is kcswapk∞ ≤ C2,
• β is the largest right-hand side, which is d ≤ C2V .
Thus, n, δ, γ are functions of the parameter C and α, β are polynomial in the size of the input election
(C, V, {≻v v ∈ V }), as required by Corollary 17. Analogous analysis applies to ΨYoung,d.
Replacing cswap with 1⊺ produces the winning condition for Dodgson′ as introduced by Faliszewski et
al. [FHH09]. Furthermore, it is interesting to consider voting rules obtained by replacing Condorcet's rule
in the definition of Dodgson's and Young's rule. For example, the Majority rule also might not produce a
winner, and most rules (Copelandα, Scoring protocol etc.) allow ties. Let the score of a candidate be their
distance (swap, deletion, etc.) from being a (unique) winner under rule R. We remark that if we replace
Condorcet's rule with R with a "simple" PA desciription, it corresponds to replacing ΦCondorcet in the proof
above, thus yielding fixed-parameter tractable algorithms for all such rules as well.
4.2 Application: Resilient and Robust Moves
Theorem 1 allows us to develop fixed-parameter algorithms for problems related to moves in society. Problem
Robust Move asks for a move that is robust to any adversary move of cost at most Ba:
Robust Move
Input: A society s, move costs vectors c and ca, a winning condition Ψ, budgets B, Ba ∈ N
Find:
A (c, B)-move m such that for every adversary (ca, Ba)-move ma, Ψ(s + ∆(ma) + ∆(m))
holds.
12
The second problem, Resilient Budget, asks if a budget B suffices to counter any adversary move of
cost at most Ba. Crampton et al. [CGKW17] consider a specialization of this problem for R-Swap Bribery.
Resilient Budget
Input: A society s, move costs vectors c and ca, a winning condition Ψ, budgets B, Ba ∈ N
Find:
Does for every adversary (ca, Ba)-move ma exist a (c, B)-move m such that Ψ(s + ∆(ma) +
∆(m))?
Theorem 18. Robust Move and Resilient Budget with Ψ ∈ P0,(n0),δ,γ,α,β can be solved in time
g(τ, n0, δ, γ)(α + β + B + Ba + kck∞ + kcak∞)O(1), that is, FPT parameterized by τ + n0 + δ + γ.
Proof. We apply Theorem 1 to decide the following formulas, which is clearly equivalent to deciding the
problems at hand:
Ψ(s)RB ≡∃m : feasible(s, ∆(m)) ∧ (c, B)-move(m) ∧
∀ma : feasible(s + ∆(m), ∆(ma)) ∧ (ca, Ba)-move(ma) ∧
Ψ(s + ∆(m) + ∆(ma))
Ψ(s)RM ≡∀ma : feasible(s, ∆(ma)) ∧ (ca, Ba)-move(ma) ∧
∃m : feasible(s + ∆(ma), ∆(m)) ∧ (c, B)-move(m) ∧
Ψ(s + ∆(m) + ∆(ma))
5 Polynomially Many Types
We now prove Theorem 4, which formally reads:
Theorem 19. Let Ψ(s) ∈ P0,(τ,n1),δ,γ,α,β be a winning condition. Minimum Move can be solved in time
g(γ, α)(τ + δ)O(1) log(s) for any linear function f (m) = c⊺m, where g is some computable function.
Proof. Since k = 0, Φ(y) is a disjunction of δ linear systems Aiy ≤ bi, with kAik∞ ≤ α and with at most
γ rows, for every i ∈ [δ]. Thus we instead solve δ instances of Minimum Move with Φi(y) ≡ Aiy ≤ bi
and pick the best solution among them. So from now on assume that Φ(y) ≡ Ay ≤ b with kAk∞ ≤ α and
A ∈ Zγ×τ .
Observe that A can have at most αO(γ) different columns. For two types i, j ∈ [τ ], we say they are
equivalent and write i ∼ j if the columns Ai and Aj are identical. Thus, the τ types of people fall into
C ≤ αO(γ) equivalence classes. For every type i ∈ [τ ], let C[i] = {j ∈ [τ ] j ∼ i} be the equivalence class
containing i, and let ¯A ∈ Zγ×C be a matrix with, for every i ∈ [C], ¯Ai = Aj where j ∈ C[i]. Now, for every
type i ∈ [τ ], we shall create a reduced custom move costs vector ci ∈ NC 2
. For every j ∈ [C], i 6= j, let
ci
i,j = min
j′∈C[j]
ci,j′
be the cost of moving from i to the cheapest equivalent of j, and let ci
¯c = (c1, . . . , cτ )
j,k = +∞ for any i 6= j, k ∈ [C]. Let
Then, consider the following ILP with variables x = (x1, . . . , xτ ) ∈ Zτ C; we obtain the minimum move
m from its optimal solution by taking mi,j = xi
j′ where j′ ∼ j:
min ¯c⊺x s.t. X
i=1,...,τ
¯Axi ≤ b, X
j=1,...,C
xi
j = si
∀i ∈ [τ ] .
This ILP is a combinatorial pre-n-fold IP ; by Knop et al. [KKM17a] (detailed in [KKM17b, Corollary 23]),
it can be solved in the claimed time.
13
6 Discussion
We raise three important questions which naturally arise from this work. First, we ask whether our fixed-
parameter algorithm for {Dodgson,Young}-Swap Bribery with uniform cost extends to general cost func-
tions. This parallels [BCF+14, Challenge #2]. For much simpler voting rules an analogous result was
shown only recently [KKM17c]. We believe that if the answer is positive, proving it would require provid-
ing new powerful integer programming tools, in particular, some analogue of Theorem 1 for n-fold integer
programming, which is the engine behind the recent progress [KKM17c].
Second, can the run time of our algorithm be improved? This analogously recalls [BCF+14, Challenge
#1]. The run time of Corollary 17 is double-exponential in the dimension O(τ ); thus Theorem 2 shows
that Dodgson-Swap Bribery is solvable in triple-exponential time in parameter C. We believe it can be
improved, but we are sceptical that it could be made single-exponential, and thus ask if a double-exponential
lower bound holds. A related question is to show lower bounds separating the complexity of R-Swap
Bribery for different voting rules such as Borda, Copeland and Kemeny.
Third, we note that, unlike most previous results, the run time of our algorithm depends polynomially
on the number V of voters. Many previous results solve the succinct variant of the problem (cf. Falizewski
et al. [FHH09]) and depend polynomially only on log V . Thus we ask whether {Dodgson,Young}-Swap
Bribery is fixed-parameter tractable also in the succinct variant.
Finally, we discuss our usage of Presburger arithmetic as a generalization of ILPs. Solving ILPs amounts
to deciding ∃x : Ax ≤ b; by Lenstra's algorithm [Len83] and its improvements by Kannan [Kan87] and
Frank and Tardos [FT87], this task is fixed-parameter tractable parameterized by the dimension of x even
for unbounded kA, bk∞ and if A has polynomially (in the length of the input) many rows. In 1990, Kannan
claimed to show that Parametric ILP, which amounts to deciding ∀b ∈ Q ∃x : Ax ≤ b for some
polyhedron Q, is fixed-parameter tractable parameterized by the dimension of x; here, kAk∞ must be
bounded by a polynomial and the number of rows of A also has to be a parameter. However, Kannan's result
relies on Kannan's Partitioning Theorem (KPT), which was recently disproved by Nguyen and Pak [NP17].
Nguyen and Pak [NP17, Theorem 1.9] state that Woods [Woo15] gave a polynomial-time algorithm for
deciding ∀y∃x : Φ(x, y) when the dimensions of x and y are constant ; however, it is unclear if this is a fixed-
parameter algorithm. For this reason, as we have the dimensions of x and y as (non-constant) parameter,
we chose to prove Theorem 1 as a slightly weaker result (still sufficient for our purposes) but using only
elementary techniques.
References
[BCF+14] Robert Bredereck, Jiehua Chen, Piotr Faliszewski, Jiong Guo, Rolf Niedermeier, and Gerhard J.
Woeginger. Parameterized algorithmics for computational social choice: Nine research challenges.
Tsinghua Sci. Tech., 19(4):358–373, 2014.
[BCH+14] Robert Bredereck, Jiehua Chen, Sepp Hartung, Stefan Kratsch, Rolf Niedermeier, Ondrej Such´y,
and Gerhard J. Woeginger. A multivariate complexity analysis of lobbying in multiple referenda.
J. Artificial Intelligence Res., 50:409–446, 2014.
[BFN+16] Robert Bredereck, Piotr Faliszewski, Rolf Niedermeier, Piotr Skowron, and Nimrod Talmon.
In Proc. AAAI 2016, pages 2452–2458,
Complexity of shift bribery in committee elections.
2016.
[BITT89]
John J. Bartholdi III, Craig A. Tovey, and Michael A. Trick. Voting schemes for which it can
be difficult to tell who won the election. Soc. Choice Welfare, 6(2):157–165, 1989.
[CGKW17] Jason Crampton, Gregory Gutin, Martin Kouteck´y, and R´emi Watrigant. Parameterized re-
siliency problems via integer linear programming. In Proc. CIAC 2017, volume 10236 of Lecture
Notes Comput. Sci., pages 164–176, 2017.
14
[DS12]
[EFS09]
[ES08]
[FHH09]
[FHH11]
Britta Dorn and Ildik´o Schlotter. Multivariate complexity analysis of swap bribery. Algorithmica,
64(1):126–151, 2012.
Edith Elkind, Piotr Faliszewski, and Arkadii Slinko. Swap bribery. In Proc. SAGT 2009, volume
5814 of Lecture Notes Comput. Sci., pages 299–310, 2009.
Friedrich Eisenbrand and Gennady Shmonin. Parametric integer programming in fixed dimen-
sion. Math. Oper. Res., 33(4), 2008.
Piotr Faliszewski, Edith Hemaspaandra, and Lane A. Hemaspaandra. How hard is bribery in
elections? J. Artificial Intelligence Res., 40:485–532, 2009.
Piotr Faliszewski, Edith Hemaspaandra, and Lane A. Hemaspaandra. Multimode control attacks
on elections. J. Artificial Intelligence Res., 40:305–351, 2011.
[FRRS14] Piotr Faliszewski, Yannick Reisch, Jorg Rothe, and Lena Schend. Complexity of manipulation,
In Proc. AAMAS 2014,
bribery, and campaign management in Bucklin and fallback voting.
pages 1357–1358, 2014.
Andr´as Frank and ´Eva Tardos. An application of simultaneous Diophantine approximation in
combinatorial optimization. Combinatorica, 7(1):49–65, 1987.
[FT87]
[HHR97]
[HSV05]
[Kan87]
Edith Hemaspaandra, Lane A. Hemaspaandra, and Jorg Rothe. Exact analysis of Dodgson
elections: Lewis Carroll's 1876 voting system is complete for parallel access to NP. J. ACM,
44(6):806–825, 1997.
Edith Hemaspaandra, Holger Spakowski, and Jorg Vogel. The complexity of Kemeny elections.
Theoret. Comput. Sci., 349(3):382–391, 2005.
Ravi Kannan. Minkowski's convex body theorem and integer programming. Math. Oper. Res.,
12(3):415–440, August 1987.
[KKM17a] Dusan Knop, Martin Kouteck´y, and Matthias Mnich. Combinatorial n-fold integer programming
and applications. In Proc. ESA 2017, volume 87 of Leibniz Int. Proc. Informatics, pages 54:1–
54:14, 2017.
[KKM17b] Dusan Knop, Martin Kouteck´y, and Matthias Mnich. Combinatorial n-fold integer programming
and applications. Technical report, 2017. https://arxiv.org/abs/1705.08657.
[KKM17c] Dusan Knop, Martin Kouteck´y, and Matthias Mnich. Voting and bribing in single-exponential
time. In Proc. STACS 2017, volume 66 of Leibniz Int. Proc. Informatics, pages 46:1–46:14, 2017.
[KQR10] Matthias Koppe, Maurice Queyranne, and Chris T. Ryan. Parametric integer programming
algorithm for bilevel mixed integer programs. J. Optim. Theory Appl., 146(1):137–150, 2010.
[Len83]
[NP17]
[RSV03]
[SFE17]
[Woo15]
Hendrik W. Lenstra, Jr. Integer programming with a fixed number of variables. Math. Oper.
Res., 8(4):538–548, 1983.
Danny Nguyen and Igor Pak. Complexity of short presburger arithmetic. In Proc. STOC 2017,
pages 812–820, 2017.
Jorg Rothe, Holger Spakowski, and Jorg Vogel. Exact complexity of the winner problem for
Young elections. Theory Comput. Syst., 36(4):375–386, 2003.
Ildik´o Schlotter, Piotr Faliszewski, and Edith Elkind. Campaign management under approval-
driven voting rules. Algorithmica, 77(1):84–115, 2017.
Kevin Woods. Presburger arithmetic, rational generating functions, and quasi-polynomials. J.
Symbolic Logic, 80(2):433–449, 2015.
15
|
1308.0813 | 3 | 1308 | 2015-08-05T04:43:12 | Multi-agent Systems with Compasses | [
"cs.MA"
] | This paper investigates agreement protocols over cooperative and cooperative--antagonistic multi-agent networks with coupled continuous-time nonlinear dynamics. To guarantee convergence for such systems, it is common in the literature to assume that the vector field of each agent is pointing inside the convex hull formed by the states of the agent and its neighbors, given that the relative states between each agent and its neighbors are available. This convexity condition is relaxed in this paper, as we show that it is enough that the vector field belongs to a strict tangent cone based on a local supporting hyperrectangle. The new condition has the natural physical interpretation of requiring shared reference directions in addition to the available local relative states. Such shared reference directions can be further interpreted as if each agent holds a magnetic compass indicating the orientations of a global frame. It is proven that the cooperative multi-agent system achieves exponential state agreement if and only if the time-varying interaction graph is uniformly jointly quasi-strongly connected. Cooperative--antagonistic multi-agent systems are also considered. For these systems, the relation has a negative sign for arcs corresponding to antagonistic interactions. State agreement may not be achieved, but instead it is shown that all the agents' states asymptotically converge, and their limits agree componentwise in absolute values if and in general only if the time-varying interaction graph is uniformly jointly strongly connected. | cs.MA | cs | Multi-agent Systems with Compasses
Ziyang Meng, Guodong Shi, and Karl Henrik Johansson∗
Abstract
This paper investigates agreement protocols over cooperative and cooperative -- antagonistic multi-
agent networks with coupled continuous-time nonlinear dynamics. To guarantee convergence for such
systems, it is common in the literature to assume that the vector field of each agent is pointing inside the
convex hull formed by the states of the agent and its neighbors, given that the relative states between
each agent and its neighbors are available. This convexity condition is relaxed in this paper, as we show
that it is enough that the vector field belongs to a strict tangent cone based on a local supporting
hyperrectangle. The new condition has the natural physical interpretation of requiring shared reference
directions in addition to the available local relative states. Such shared reference directions can be
further interpreted as if each agent holds a magnetic compass indicating the orientations of a global
frame. It is proven that the cooperative multi-agent system achieves exponential state agreement if and
only if the time-varying interaction graph is uniformly jointly quasi-strongly connected. Cooperative --
antagonistic multi-agent systems are also considered. For these systems, the relation has a negative sign
for arcs corresponding to antagonistic interactions. State agreement may not be achieved, but instead
it is shown that all the agents' states asymptotically converge, and their limits agree componentwise in
absolute values if and in general only if the time-varying interaction graph is uniformly jointly strongly
connected.
Keywords: shared reference direction, nonlinear systems, cooperative-antagonistic network
5
1
0
2
g
u
A
5
]
A
M
.
s
c
[
3
v
3
1
8
0
.
8
0
3
1
:
v
i
X
r
a
1
Introduction
In the last decade, coordinated control of multi-agent systems has attracted extensive attention due to
its broad applications in engineering, physics, biology and social sciences, e.g., [6, 15, 22, 26, 36]. A
∗A brief version of this work was presented in the 33rd Chinese Control Conference, Nanjing, China, July 2014 [23].
Z. Meng is with Department of Precision Instrument, Tsinghua University, Beijing 100084, China. G. Shi is with College
of Engineering and Computer Science, The Australian National University, Canberra, Australia. K. H. Johansson is with
ACCESS Linnaeus Centre, School of Electrical Engineering, Royal Institute of Technology, Stockholm, Sweden. This work
has been supported in part by the Knut and Alice Wallenberg Foundation, the Swedish Research Council, and the Alexander
von Humboldt Foundation of Germany. Email: [email protected], [email protected], [email protected].
1
Meng et al. Multi-agent Systems with Compasses
fundamental idea is that by carefully implementing distributed control protocols for each agent, collective
tasks can be reached for the overall system using only neighboring information exchange. Several important
results have been established, e.g., in the area of mobile systems including spacecraft formation flying,
rendezvous of multiple robots, and animal flocking [18, 8, 34].
Agreement protocols, where the goal is to drive the states of the agents to reach a common value using
local interactions, play a basic role in coordination of multi-agent systems. The state agreement protocol
and its fundamental convergence properties were established for linear systems in the classical work [35].
The convergence of the linear agreement protocol has been widely studied since then for both continuous-
time and discrete-time models, e.g., [5, 15, 29]. Much understandings have been established, such as the
explicit convergence rate in many cases [7, 24, 27, 28]. A major challenge is how to quantitatively char-
acterize the influence of a time-varying communication graph on the agreement convergence. Agreement
protocols with nonlinear dynamics have also drawn attention in the literature, e.g., [4, 14, 19, 25, 30, 31].
Due to the complexity of nonlinear dynamics, it is in general difficult to obtain explicit convergence rates
for these systems. All the above studies on linear or nonlinear multi-agent dynamics are based on the stand-
ing assumption that agents in the network are cooperative. Recently, motivated from opinion dynamics
evolving over social networks [10, 37], state agreement problems over cooperative -- antagonistic networks
were introduced [1, 2]. In such networks, antagonistic neighbors exchange their states with opposite signs
compared to cooperative neighbors.
In most of the work discussed above, a convexity assumption plays an essential role in the local inter-
action rule for reaching state agreement. For discrete-time models, it is usually assumed that each agent
updates its state as a convex combination of its neighbors' states [5, 15]. A precise characterization of this
convexity condition guaranteeing asymptotic agreement was established in [25]. For continuous-time mod-
els, an interpretation of this assumption is that the vector field for each agent must fall into the relative
interior of a tangent cone formed by the convex hull of the relative state vectors in its neighborhood [19].
The recent work [21] generalized agreement protocols to convex metric spaces, but a convexity assumption
for the local dynamics continued to play an important role in ensuring agreement convergence.
In this paper, we show that the convexity condition for agreement seeking of multi-agent systems
can be relaxed at the cost of shared reference directions. Such shared reference directions can be easily
obtained by a magnetic compass, with the help of which the direction of each axis can be observed
from a prescribed global coordinate system. Using the relative state information and the shared reference
direction information, each agent can derive a strict tangent cone from a local supporting hyperrectangle.
This cone defines the feasible set of local control actions for each agent to guarantee convergence to state
agreement. In fact, the agents just need to determine, through sensing or communication, the relative
2
Meng et al. Multi-agent Systems with Compasses
orthant of each of their neighbors' states. The vector field of an agent can be outside of the convex hull
formed by the states of the agent and its neighbors, so this new condition provides a relaxed condition
for agreement seeking. We remark that a compass is naturally present in many systems. For instance, the
classical Vicsek's model [36] inherently uses "compass"-like directional information and the calculation of
each agent's heading relies on the information where the common east is. In addition, scientists observed
that the European Robin bird can detect and navigate through the Earth's magnetic field, providing them
with biological compasses in addition to their normal vision [33]. Engineering systems, such as multi-robot
networks, can be equipped with magnetic compasses at a low cost [13, 32].
Under a general definition of nonlinear multi-agent systems with shared reference directions, we establish
two main results:
• For cooperative networks, we show that the underlying graph associated with the nonlinear inter-
actions being uniformly jointly quasi-strongly connected is necessary and sufficient for exponential
agreement. The convergence rate is explicitly given. This improves the existing results based on
convex hull conditions [25, 19].
• For cooperative-antagonistic networks, we propose a general model following the sign-flipping in-
terpretation along an antagonistic arc introduced in [2]. We show that when the underlying graph
is uniformly jointly strongly connected, irrespective with the sign of the arcs, all the agents' states
asymptotically converge, and their limits agree componentwise in absolute values.
The remainder of the paper is organized as follows. In Section 2, we give some mathematical preliminar-
ies on convex sets, graph theory, and Dini derivatives. The nonlinear multi-agent dynamics, the interaction
graph, the shared reference direction, and the agreement metrics are given in Section 3. The main results
and discussions are presented in Section 4. The proofs of the results are presented in Sections 5 and 6,
respectively, for cooperative and cooperative -- antagonistic networks. A brief concluding remark is given in
Section 7.
2 Preliminaries
In this section, we introduce some mathematical preliminaries on convex analysis [3], graph theory [12],
and Dini derivatives [11].
2.1 Convex analysis
For any nonempty set S ⊆ Rd, kxkS = inf y∈S kx − yk is called the distance between x ∈ Rd and S, where
k · k denotes the Euclidean norm. A set S ⊂ Rd is called convex if (1 − ζ)x + ζy ∈ S when x ∈ S, y ∈ S,
3
Meng et al. Multi-agent Systems with Compasses
and 0 ≤ ζ ≤ 1. A convex set S ⊂ Rd is called a convex cone if ζx ∈ S when x ∈ S and ζ > 0. The convex
hull of S ⊂ Rd is denoted co(S) and the convex hull of a finite set of points x1, x2, . . . , xn ∈ Rd denoted
co{x1, x2, . . . , xn}.
Let S be a convex set. Then there is a unique element PS (x) ∈ S, called the convex projection of x onto
S is continuously
S, satisfying kx − PS (x)k = kxkS associated to any x ∈ Rd. It is also known that kxk2
differentiable for all x ∈ Rd, and its gradient can be explicitly computed [3]:
∇kxk2
S = 2(x − PS (x)).
(1)
Let S ⊂ Rd be convex and closed. The interior and boundary of S is denoted by int(S) and ∂S, respectively.
If S contains the origin, the smallest subspace containing S is the carrier subspace denoted by cs(S). The
relative interior of S, denoted by ri(S), is the interior of S with respect to the subspace cs(S) and the
relative topology used. If S does not contain the origin, cs(S) denotes the smallest subspace containing
S − z, where z is any point in S. Then, ri(S) is the interior of S with respect to the subspace z + cs(S).
Similarly, we can define the relative boundary rb(S).
Let S ⊂ Rd be a closed convex set and x ∈ S. The tangent cone to S at x is defined as the set
= 0o. Note that if x ∈ int(S), then T (x,S) = Rd. Therefore, the
T (x,S) = nz ∈ Rd : lim inf ζ→0 kx+ζzkS
definition of T (x,S) is essential only when x ∈ ∂S. The following lemma can be found in [3] and will be
used.
ζ
Lemma 1 Let S1,S2 ⊂ Rd be convex sets. If x ∈ S1 ⊂ S2, then T (x,S1) ⊂ T (x,S2).
2.2 Graph theory
A directed graph G consists of a pair (V,E), where V = {1, 2, . . . , n} is a finite, nonempty set of nodes
and E ⊆ V × V is a set of ordered pairs of nodes, denoted arcs. The set of neighbors of node i is denoted
Ni := {j : (j, i) ∈ E}. A directed path in a directed graph is a sequence of arcs of the form (i, j), (j, k), . . . .
If there exists a path from node i to j, then node j is said to be reachable from node i. If for node i, there
exists a path from i to any other node, then i is called a root of G. G is said to be strongly connected if
each node is reachable from any other node. G is said to be quasi-strongly connected if G has a root.
2.3 Dini derivatives
Let D+V (t, x(t)) be the upper Dini derivative of V (t, x(t)) with respect to t, i.e., D+V (t, x) = lim supτ→0+
The following lemma [9] will be used for our analysis.
V (t+τ,x(t+τ ))−V (t,x(t))
τ
4
Meng et al. Multi-agent Systems with Compasses
Lemma 2 Suppose for each i ∈ V, Vi
: R × M → R is continuously differentiable. Let V (t, x) =
maxi∈V Vi(t, x), and let bV(t) = {i ∈ V : Vi(t, x(t)) = V (t, x(t))} be the set of indices where the maxi-
mum is reached at time t. Then D+V (t, x(t)) = maxi∈ bV(t)
Vi(t, x(t)).
3 Multi-agent Network Model
In this section, we present the model of the considered multi-agent systems, introduce the corresponding
interaction graph, and define some useful geometric concepts used in the control laws.
Consider a multi-agent system with agent set V = {1, . . . , n}. Let xi ∈ Rd denote the state of agent i.
Let x = (xT
1 , xT
2 , . . . , xT
n )T and denote D = {1, 2, . . . , d}.
3.1 Nonlinear multi-agent dynamics
f 1
p (x1, x2, . . . , xn)
Let P be a given (finite or infinite) set of indices. An element in P is denoted by p. For any p ∈
P, we define a function fp(x1, x2, . . . , xn) : Rdn → Rdn associated with p, where fp(x1, x2, . . . , xn) =
f n
p (x1, x2, . . . , xn)
Let σ(t) : [t0,∞) → P be a piecewise constant function, so, there exists a sequence of increasing time
p : Rdn → Rd, i = 1, 2, . . . , n.
instances {tl}∞0 such that σ(t) remains constant for t ∈ [tl, tl+1) and switches at t = tl.
...
with f i
The dynamics of the multi-agent systems is described by the switched nonlinear system
x(t) = fσ(t)(x(t)).
(2)
We place some mild assumptions on this system.
Assumption 1 There exists a lower bound τd > 0, such that inf l(tl+1 − tl) ≥ τd.
Assumption 2 fp(x) is uniformly locally Lipschitz on Rdn, i.e., for every x ∈ Rdn, we can find a neigh-
borhood Uα(x) = {y ∈ Rdn : ky − xk ≤ α} for some α > 0 such that there exists a real number L(x) > 0
with kfp(a) − fp(b)k ≤ L(x)ka − bk for any a, b ∈ Uα(x) and p ∈ P.
Under Assumptions 1 and 2, the Caratheodory solutions of (2) exist for arbitrary initial conditions,
and they are absolutely continuous functions for almost all t on the maximum interval of existence [11].
All our further discussions will be on the Caratheodory solutions of (2) without specific mention.
5
Meng et al. Multi-agent Systems with Compasses
3.2
Interaction graph
Having the dynamics defined for the considered multi-agent system, similar to [19], we introduce next its
interaction graph.
Definition 1 The graph Gp = (V,Ep) associated with fp is the directed graph on node set V = {1, 2, . . . , n}
p depends on xj, i.e., there exist xj, xj ∈ Rd such that
and arc set Ep such that (j, i) ∈ Ep if and only if f i
f i
p(x1, . . . , xj, . . . , xn) 6= f i
p(x1, . . . , xj, . . . , xn).
The set of neighbors of node i in Gp is denoted by Ni(p). The dynamic interaction graph associated
with system (2) is denoted by Gσ(t) = (V,Eσ(t)). The joint graph of Gσ(t) during time interval [t1, t2) is
defined by Gσ(t)([t1, t2)) = St∈[t1,t2) G(t) = (V,St∈[t1,t2) Eσ(t)). We impose the following definition on the
connectivity of Gσ(t), cf., [31].
Definition 2 Gσ(t) is uniformly jointly quasi-strongly (respectively, strongly) connected if there exists a
constant T > 0 such that G([t, t + T )) is quasi-strongly (respectively, strongly) connected for any t ≥ t0.
For each p ∈ P, the node relation along an interaction arc (j, i) ∈ Ep may be cooperative, or antagonistic.
p . To be
We assume that there is a sign, "+1" or "-1", associated with each (j, i) ∈ Ep, denoted by sgnij
precise, if j is cooperative to i, sgnij
p = +1, and if j is antagonistic to i, sgnij
p = −1.
Definition 3 If sgnij
p = +1, for all (j, i) ∈ Ep and all p ∈ P, the considered multi-agent network is called
a cooperative network. Otherwise, it is called a cooperative-antagonistic network.
3.3 Shared reference direction, hyperrectangle, and tangent cone
We assume that each agent has access to shared reference directions with respect to a common Cartesian
coordinate system. We use (−→r1 ,−→r2 , . . . ,−→rd) to represent the basis of that Rd Cartesian coordinate system.
Here −→rk = (0, . . . , 0, 1, 0, . . . , 0) denotes the unit vector in the direction of axis k ∈ D.
A hyperrectangle is the generalization of a rectangle to higher dimensions. An axis-aligned hyperrect-
angle is a hyperrectangle subject to the constraint that the edges of the hyperrectangle are parallel to the
Cartesian coordinate axes.
Definition 4 Let C ⊂ Rd be a bounded set. The supporting hyperrectangle H(C) is the axis-aligned hyper-
rectangle H(C) = [min(C)1, max(C)1] × [min(C)2, max(C)2] × ··· × [min(C)d, max(C)d], where by definition
min(C)k := miny∈C yk, max(C)k := maxy∈C yk, and yk denotes the kth entry of y.
In other words, a supporting hyperrectangle of a bounded set C is an axis-aligned minimum bounding
hyperrectangle.
6
Meng et al. Multi-agent Systems with Compasses
Figure 1: An example of the γ-strict tangent cone.
Definition 5 Let A ⊂ Rd be an axis-aligned hyperrectangle and γ > 0 a constant. The γ-strict tangent
cone to A at x ∈ Rd is the set
Tγ(x,A) =
if x ∈ ri(A)
cs(A);
T (x,A)Tk∈I{z ∈ Rd : hz,−→rki ≥ γDk(A)};
otherwise,
(3)
where I = {k ∈ D : x ∈ rbk(A)}, rbk(A) denotes the two facets of A perpendicular to the axis −→rk , and
Dk(A) = max(A)k − min(A)k denotes the side length parallel to the axis −→rk .
Figure 1 gives an example of the γ-strict tangent cone to A at x.
3.4 Agreement metrics
We next define uniformly asymptotic agreement and exponential agreement in this section.
Definition 6 The multi-agent system (2) is said to achieve uniformly asymptotic agreement on S0 ⊆ Rd
if
(i). point-wise uniform agreement can be achieved, i.e., for all η ∈ J , and ε > 0, there exists δ(ε) > 0
0 , and the
0 denotes S0×S0×. . . S0;
such that for all t0 ≥ 0, kx(t0) − ηk < δ ⇒ kx(t) − ηk < ε, ∀t ≥ t0, where x(t0) ∈ S n
agreement manifold is defined as J = {x ∈ S n
and
0 : x1 = x2 = ··· = xn} and S n
(ii). uniform agreement attraction can be achieved, i.e., for all ε > 0, there exist η(x(t0)) ∈ J and
T (ε) > 0 such that for all t0 ≥ 0, kx(t) − ηk < ε, ∀t ≥ t0 + T.
7
Meng et al. Multi-agent Systems with Compasses
!
"
Figure 2: Convex hull, supporting hyperrectangle, strict tangent cone and feasible vectors f i
p satisfying
Assumption 3.
Definition 7 The multi-agent system (2) is said to achieve exponential state agreement on S0 ⊆ Rd if
(i). point-wise uniform agreement can be achieved; and
(ii). exponential agreement attraction can be achieved, i.e., there exist η(x(t0)) ∈ J and k(S0) > 0,
λ(S0) > 0, such that for all t0 ≥ 0, kx(t) − ηk ≤ ke−λ(t−t0)kx(t0) − ηk.
4 Main Results
In this section, we state the main results of the paper.
4.1 Cooperative networks
We first study the convergence property of the nonlinear switched system (2) over a cooperative network
defined by an interaction graph. Introduce the local convex hull Ci
p(x) = co{xi, xj : j ∈ Ni(p)}. In order
to achieve exponential agreement, we propose the following strict tangent cone condition for the feasible
vector field.
Assumption 3 For all i ∈ V, p ∈ P, and x ∈ Rdn, it holds that f i
p(x) ∈ Tγ(xi,H(Ci
p(x))).
In Assumption 3, the vector f i
p can be chosen freely from the set Tγ(xi,H(Ci
p(x))). Hence, the assumption
specifies constraints on the feasible controls for the multi-agent system. Here Ci
hull formed by agent i and its neighbors, H(Ci
set Ci
example of the convex hull and the supporting hyperrectangle formed by agent 1 and its' neighbors. Two
p(x))) denotes the γ−strict tangent cone to H(Ci
p(x)) denotes the local supporting hyperrectangle of the
p(x), and Tγ(xi,H(Ci
p(x) denotes the convex
p(x)) at xi. Figure 2 gives an
feasible vectors f 1
p are also presented.
8
Meng et al. Multi-agent Systems with Compasses
In order to implement a controller compatible with Assumption 3, the agents need to determine, through
local sensing or communication, the relative orthant of each of their neighbors' states. This can be realized,
for instance, if each agent is capable of measuring the relative states with respect to its neighbors and is
aware of the direction of each axis of a prescribed global coordinate system. More specifically, when the
agent is in the interior of the hyperrectangle, the vector field for the agent can be chosen arbitrarily. When
the agent is on the boundary of its supporting hyperrectangle, the feasible control is any direction pointing
inside the tangent cone of its supporting hyperrectangle. Note that the absolute state of the agents is not
needed, but each agent needs to identify d − 1 absolute directions such that it can identify the direction
of its neighbors with respect to itself. For example, for the planar case d = 2, in addition to the relative
state measurements with respect to its neighbors, each agent just needs to be equipped with a compass.
The compass together with relative state measurements provide the quadrant location information of the
neighbors.
We state an exponential agreement result for the cooperative multi-agent systems.
Theorem 1 Suppose S0 is compact and that Assumptions 1, 2, and 3 hold. Then, the cooperative multi-
agent system (2) achieves exponential agreement on S0 if and only if its interaction graph Gσ(t) is uniformly
jointly quasi-strongly connected.
In order to compare the proposed "supporting hyperrectangle condition" with respect to the usual
convex hull condition [25, 19], we introduce the following assumption, which is a weaker condition than
Assumption 3.
Assumption 4 For all i ∈ V, p ∈ P, and x ∈ Rdn, it holds that f i
p(x) ∈ ri(cid:0)T (xi,H(Ci
p(x)))(cid:1).
We next present a uniformly asymptotic agreement result based on the relative interior condition of a
tangent cone formed by the supporting hyperrectangle.
Proposition 1 Suppose S0 is compact and that Assumptions 1, 2, and 4 hold. Then, the cooperative
multi-agent system (2) achieves uniformly asymptotic agreement on S0 if and only if its interaction graph
Gσ(t) is uniformly jointly quasi-strongly connected.
The proofs of Theorem 1 and Proposition 1 is deferred to Section 5.
Figure 3 illustrates the relative interior of a tangent cone of the convex hull (Assumption A2 of [19]),
relative interior of a tangent cone of the supporting hyperrectangle (Assumption 4), and strict tangent
cone of the supporting hyperrectangle (Assumption 3). It is obvious that the vector fields can be chosen
more freely under Assumption 4 than under Assumption A2 of [19]. On the other hand, strict tangent cone
9
Meng et al. Multi-agent Systems with Compasses
Figure 3: The relative interiors of a tangent cone of the convex hull and the supporting hyperrectangle,
and γ−strict tangent cone of the supporting hyperrectangle.
condition is a more strict condition than the relative interior condition of a tangent cone. However, expo-
nential agreement can be achieved under strict tangent cone condition while only uniformly asymptotic
agreement is achieved under the relative interior condition of a tangent cone.
Remark 1 Theorem 1 and Proposition 1 are consistent with the main results in [19, 21, 25]. Our analysis
relies on some critical techniques developed in [17, 19]. Proposition 1 allows that the vector field belongs
to a larger set compared with the convex hull condition proposed in [19, 21, 25]. In addition, we allow
the agent dynamics to switch over a possibly infinite set and we show exponential agreement and derive
in the proof of Theorem 1 the explicit exponential convergence rate. It follows that by sharing reference
directions in addition to the available local information, agreement of multi-agent systems has an enlarged
set of interactions and faster convergence speed compared with the case of using only local information.
To further illustrate Assumptions 3 and 4, we discuss two examples.
Example 1. Let us first consider Vicsek's model [36]. In particular, consider agent i ∈ V, moving in
the plane with position (xi(t), yi(t)), the same absolute velocity v, and the heading θi(t) at discrete time
t = 0, 1, . . . . The position and angle updates are described by
(4)
(5)
(6)
,
xi(t + 1) = xi(t) + v cos θi(t),
yi(t + 1) = yi(t) + v sin θi(t),
θi(t + 1) = arctan Pj∈Ni(t) sin θj(t)
Pj∈Ni(t) cos θj(t)
for all i ∈ V, where by convention it is assumed that i ∈ Ni(t). From (6), we see that Vicsek's model
inherently uses a "compass"-like directional information. Then, similar to the analysis of Theorem 1, we
can easily show that the first quadrant is an invariant set for (4) and (5). This can be verified by the fact
10
Meng et al. Multi-agent Systems with Compasses
Figure 4: An invariant set of Vicsek's model.
that θi(t + 1) ∈ [0, π
2 ] for all j ∈ Ni(t). Figure 4 illustrates this point for three agents.
At time t, the vector filed of all the agents are pointing inside the first quadrant, so agents construct
2 ] when θj(t) ∈ [0, π
an "unbounded" hyperrectangle (both the upper and right bounds are at infinity). This "unbounded"
hyperrectangle is the invariant set for the positions of all the agents. The existence of left and lower
bounds of the hyperrectangle guarantees that agents 1 and 2 satisfy Assumption 3. However, it is easy to
verify that agent 3 does not satisfy Assumption 3 since the upper and right bounds of the hyperrectangle
do not exist. Therefore, position agreement cannot be achieved in general for Vicsek's model.
Example 2. Consider the following dynamics for each agent i ∈ V:
xi = f i
σ(t)(x) = Ri
σ(t)(x) Xj∈Ni(σ(t))
aij(x)(cid:0)xj − xi(cid:1),
(7)
σ(t)(x) ∈ Rd×d is a
where aij(x) > 0 is a continuous function representing the weight of arc (j, i), and Ri
state-dependent rotation matrix which is continuous in x for any fixed σ ∈ P. Certainly the dynamics
described in (7) is beyond the convex hull agreement protocols [19, 21, 25]. With the results in Theorem 1
and Proposition 1, it becomes evident that the existence of Ri
σ(t)(x) may still guarantee agreement as long
as Ri
σ(t)(x) rotates the convex hull vector filed, Pj∈Ni(σ(t)) aij(x)(cid:0)xj − xi(cid:1), within the proposed tangent
cones given by the local supporting hyperrectangle. Certainly this does not mean that Ri
σ(t)(x) should be
sufficiently small since from Figure 3 this rotation angle can be large for proper x under certain interaction
rules. This can also be viewed as a structural robustness of the proposed "compass"-based framework.
4.2 Cooperative-antagonistic networks
Next, we study the convergence property of the cooperative -- antagonistic networks. Define C
co{xi, xjsgnij
p : j ∈ Ni(p)}. We impose the following assumption.
i
p(x) :=
11
Meng et al. Multi-agent Systems with Compasses
Assumption 5 For all i ∈ V, p ∈ P and x ∈ Rdn, it holds that f i
p(x) ∈ Tγ(xi,H(C
i
p(x))).
Assumption 5 follows the model for antagonistic interactions introduced in [2], where simple examples
can be found on that state agreement cannot always be achieved for cooperative -- antagonistic networks.
Instead, it is possible that agents converge to values with opposite signs, which is known as bipartite
consensus [2]. We present the following result for cooperative -- antagonistic networks.
Theorem 2 Let Assumptions 1, 2 and 5 hold. Then, if (and in general only if ) the interaction graph Gσ(t)
is uniformly jointly strongly connected, all the agents' trajectories asymptotically converge for cooperative-
antagonistic multi-agent system (2), and their limits agree componentwise in absolute values for every
initial time and initial state.
Here by "in general only if," we mean that we can always construct simple examples with fixed inter-
action rule, for which strong connectivity is necessary for the result in Theorem 2 to stand. The proof
of Theorem 2 will be presented in Section 6. Compared with the results given in [2], Theorem 2 requires
no conditions on the structural balance of the network. Theorem 2 shows that every positive or negative
arc contributes to the convergence of the absolute values of the nodes' states, even for general nonlinear
multi-agent dynamics.
The exponential agreement and uniformly asymptotical agreement results given in Theorem 1 and
Proposition 1 rely on uniformly jointly quasi-strong connectivity, while the result in Theorem 2 needs
uniformly jointly strong connectivity. For cooperative networks, we establish the exponential convergence
rate in the proof of Theorem 1. In contrast, for cooperative -- antagonistic networks in Theorem 2, the
convergence speed is unclear. We conjecture that exponential convergence might not hold in general under
the conditions of Theorem 2. The reason is that Lemmas 5 and 7 given in Section 5 cannot be recovered
for cooperative -- antagonistic networks.
We believe that differences between Theorems 1 and 2 discussed in the previous remarks reveal some
important distinctions of cooperative and cooperative -- antagonistic networks.
5 Cooperative Multi-agent Systems
In this section, we focus on the case of cooperative multi-agent systems. We will prove Theorem 1 and
Proposition 1 by analyzing a contraction property of (2), with the help of a series of preliminary lemmas.
5.1
Invariant set
We introduce the following definition.
12
Meng et al. Multi-agent Systems with Compasses
Definition 8 A set M ⊂ Rdn is an invariant set for the system (2) if for all t0 ≥ 0, x(t0) ∈ M =⇒
x(t) ∈ M, ∀t ≥ t0.
For all k ∈ D, define Mk(x(t)) = maxi∈V{xik(t)}, mk(x(t)) = mini∈V{xik(t)}, where xik denotes
kth entry of xi. In addition, define the supporting hyperrectangle by the initial states of all agents as
H0 := H(C(x(t0))), where C(x) = co{x1, x2, . . . , xn}.
In the following lemma, we show that the supporting hyperrectangle formed by the initial states of all
agents is an invariant set for system (2).
0 is an invariant set,
Lemma 3 Let Assumptions 1, 2, and 3 or Assumptions 1, 2, and 4 hold. Then, Hn
i.e., xi(t) ∈ H0, ∀i ∈ V, ∀t ≥ t0.
Proof. We first show that D+Mk(t) ≤ 0, ∀k ∈ D. Let bV(t) = {i ∈ V : xik(t) = Mk(t)} be the
set of indices where the maximum is reached at t. It then follows from Lemma 2 that for all k ∈ D,
D+Mk(t) = maxi∈ bV(t) xik = maxi∈ bV(t) f ik
σ(t). Consider
any initial state x(t0) ∈ Hn
p(x) ∈
p(x)))(cid:1) ⊆
Tγ(xi,H(Ci
p(x))) ⊆ T (xi,H(Ci
T (xi,H(Ci
p(x))), ∀i ∈ V, ∀p ∈ P, for Assumption 4. It follows from the definition of the tangent cone that
0 , D+Mk(t) ≤ 0.
p (x) ≤ 0 for all i ∈ V satisfying xik = Mk. It follows that for all k ∈ D and any x ∈ Hn
f ik
We can similarly show that for all k ∈ D, D+mk(t) ≥ 0.
0 and any initial time t0. It follows from Definition 5 and Lemma 1 that f i
p(x))), ∀i ∈ V, ∀p ∈ P, for Assumption 3 and f i
σ(t)(x(t)), where f ik
σ(t) denotes kth entry of the vector f i
p(x) ∈ ri(cid:0)T (xi,H(Ci
Therefore, it follows that mk(x(t0)) ≤ xik(t) ≤ Mk(x(t0)), ∀k ∈ D, ∀i ∈ V, ∀t ≥ t0. Then, based on the
definition of H0, we have shown that H0 is an invariant set.
(cid:3)
5.2
Interior agents
In this subsection, we study the state evolution of the agents whose states are interior points of H(C(x)).
In the following lemma, we show that the projection of the state on any coordinate axis is strictly less than
an explicit upper bound as long as it is initially strictly less than this upper bound. Figure 5 illustrates
the following Lemma 4.
The proof follows from a similar argument used in the proof Lemma 4.9 in [17] and the following lemma
holds separately for any k ∈ D.
Lemma 4 Let Assumptions 1, 2, and 3 or Assumptions 1, 2, and 4 hold. Also assume that Gσ(t) is
uniformly jointly quasi-strongly connected. Fix any k ∈ D. For any (t1, x(t1)) ∈ R × Hn
0 , any ε > 0, and
1 T ∗
any T ∗ > 0, if xik(t2) ≤ Mk(x(t1)) − ε at some t2 ≥ t1, then xik(t) ≤ Mk(x(t1)) − δ, where δ = e−L∗
for all t ∈ [t2, t2 + T ∗], and L∗1 is a positive constant related to H0.
ε
13
Meng et al. Multi-agent Systems with Compasses
Figure 5: Illustration of Lemma 4
×H(ψ) × ··· × H(ψ), where H(ψ) = [m1(ψ), M1(ψ)] × ··· × [md(ψ), Md(ψ)], and Ho
Proof. Fix (t1, x(t1)) ∈ R × Hn
Ho
k(ψ)
{z }
[m1(ψ), M1(ψ)] × ··· × [mk−1(ψ), Mk−1(ψ)] × [mk+1(ψ), Mk+1(ψ)] × ··· × [md(ψ), Md(ψ)]. The rest of the
proof will be divided in three steps.
0 and any k ∈ D. Denote ψ = x(t1) and Mik = H(ψ) × . . . H(ψ) ×
k(ψ) =
the ith entry
(Step I). Define the following nonlinear function
gψ,k(χ) : [mk(ψ), Mk(ψ)] → R, χ 7→ sup
p∈P{max
where f ik
p (xik, y) denotes the kth entry of the vector f i
y∈Mik{f ik
p (xik, y) : xik = χ}}},
i∈V { max
p(x), xik denotes the kth entry of the vector xi and
(8)
y denotes all the other components of x except xik. The nonlinear function gψ,k(χ) is used as an upper
bound of f ik
σ(t)(x) and the argument χ is used to describe the state xik. In this step, we establish some
useful properties of gψ,k(·) based on Lemmas 11 and 12 in the Appendices. We make the following claim.
Claim A: (i) gψ,k(χ) = 0 if χ = Mk(ψ); (ii) gψ,k(χ) > 0 if χ ∈ [mk(ψ), Mk(ψ)); (iii) gψ,k(χ) is Lipschitz
continuous with respect to χ on [mk(ψ), Mk(ψ)].
p(x) ∈ Tγ(xi,H(Ci
p(x)))(or ri(cid:0)T (xi,H(Ci
It follows from Definition 5, Lemma 1 and the similar analysis of Lemma 3 (by replacing t0 with t1)
p(x)))(cid:1)) ⊆ T (xi,H(Ci
that ∀t ≥ t1, f i
p(x))) ⊆ T (xi,H(C(x))) ⊆
T (xi,H(C(ψ))), ∀i ∈ V, ∀p ∈ P. Then, it follows from Definition 5 that f ik
p (x) ≤ 0 when xik = Mk(ψ).
This implies that gψ,k(χ) ≤ 0 when χ = Mk(ψ) based on the definition of gψ,k(χ). We next show that
actually gψ,k(χ) = 0 when χ = Mk(ψ). Since Gσ(t) is uniformly jointly quasi-strongly connected, there
must exist a ¯p ∈ P such that G¯p has a nonempty arc set E¯p. We can then choose ¯i ∈ V and ¯p such that
agent ¯i has at least one neighbor agent, i.e., N¯i(¯p) is not empty since E¯p is nonempty. We next choose
xj = x¯i ∈ H(C(ψ)), for all j ∈ N¯i(¯p), where x¯ik = Mk(ψ). In such a case, H(C¯i
¯p(x)) is the singleton {x¯i}
14
Meng et al. Multi-agent Systems with Compasses
and it follows from Assumption 3 (or 4) that f¯i
¯p(x) = 0. Therefore, based on the definition of gψ,k(χ), we
know that gψ,k(χ) = 0 if χ = Mk(ψ). This proves (i).
Next, for any χ ∈ [mk(ψ), Mk(ψ)), we still use the same ¯p and ¯i as those in the proof of Claim A(i). We
choose x¯iko = Mko(ψ), ∀ko ∈ {1, . . . , k − 1, k + 1, . . . , d} and xjk = Mk(ψ), ∀k ∈ D, for all j ∈ N¯i(¯p). Note
that x¯ik = χ < Mk(ψ). In such a case, H(C¯i
to (M1(ψ), M2(ψ), . . . , Md(ψ)). It then follows from Assumption 3 that f¯i
Assumption 4 that f¯i
¯p(x) > 0. This verifies that gψ,k(χ) > 0, ∀χ ∈ [mk(ψ), Mk(ψ)). This proves (ii).
¯p(x) ≥ γ(Mk(ψ)− χ) > 0 or from
¯p(x)) is a line from point (M1(ψ), . . . , Mk−1(ψ), χ, Mk+1(ψ), . . . , Md(ψ))
Finally, it follows from Lemma 12 that gik
p (xik, y) is
locally Lipschitz with respect to xik, ∀k ∈ D, ∀i ∈ V and ∀p ∈ P. Then, it follows from Theorem 1.14
of [20] that gik
p (xik) is (globally) Lipschitz continuous with respect to xik on [mk(ψ), Mk(ψ)]. From the
p (xik) : [mk(ψ), Mk(ψ)] → R, xik 7→ maxy∈Mik f ik
first property of gψ,k(χ), it follows that gψ,k(Mk(ψ)) = 0. Therefore, based on Lemma 11, it follows that
gψ,k(χ) is Lipschitz continuous with respect to χ on [mk(ψ), Mk(ψ)]. This proves (iii) and the claim holds.
(Step II). In this step, we construct and investigate the nonlinear function hH0,k(·), which is derived by
gψ,k(·) with the argument ϕ = χ − Mk(ψ) measuring the difference between xik and the upper boundary
Mk(ψ). Define
hH0,k(ϕ) : [ak − ak, 0] → R, ϕ 7→
gψ,k(ϕ + Mk(ψ));
if ϕ ∈ [mk(ψ) − Mk(ψ), 0]
gψ,k(mk(ψ));
if ϕ ∈ [ak − ak, mk(ψ) − Mk(ψ)),
(9)
where ak = mk(x(t0)) and ak = Mk(x(t0)) are constants determined by H0. Obviously, hH0,k(ϕ) is
continuous. We make the following claim.
Claim B: (i) hH0,k(ϕ) is Lipschitz continuous with respect to ϕ on [ak − ak, 0], where the Lipschitz
constant is denoted by L∗1 and L∗1 is related to the initial bounded set H0; (ii) hH0,k(ϕ) > 0 if ϕ ∈ [ak−ak, 0);
(iii) hH0,k(ϕ) = 0 if ϕ = 0.
Note that hH0,k(ϕ) = gψ,k(ϕ + Mk(ψ)) is compact on the compact set [mk(ψ) − Mk(ψ), 0]. It follows
that hH0,k(ϕ) is Lipschitz continuous with respect to ϕ on the compact set [ak − ak, 0]. This shows that
(i) holds and properties (ii) and (iii) follow directly from the definition of hH0,k(ϕ).
(Step III). In this step, we take advantage of gψ,k(χ) and hH0,k(ϕ) to show that xik will be always strictly
less than the upper bound Mk(ψ) as long as it is initially strictly less than Mk(ψ).
Suppose xik(t2) ≤ Mk(ψ) − ε at some t2 ≥ t1 and let T ∗ > 0. Based on the definition of gψ,k(χ), it
χ = gψ,k(χ) with
σ(t)(x(t)) ≤ gψ,k(xik(t)), ∀t ≥ t2. Let χ(t) be the solution of
follows that xik(t) = f ik
initial condition χ(t2) = xik(t2). Based on the Comparison Lemma (Lemma 3.4 of [16]), it follows that
xik(t) ≤ χ(t), ∀t ≥ t2.
Note that ϕ = χ−Mk(ψ) and ϕ = gψ,k(χ) = hH0,k(ϕ). It follows from the first property of hH0,k(ϕ) that
hH0,k(ϕ) − hH0,k(0) ≤ L∗1ϕ, ∀ϕ ∈ [ak − ak, 0]. This shows that hH0,k(ϕ) ≤ −L∗1ϕ based on the second
15
Meng et al. Multi-agent Systems with Compasses
Figure 6: Illustration of Lemma 6
and the third properties of hH0,k(ϕ). Thus, the solution of
∀t ≥ t2 based on the Comparison Lemma.
ϕ = hH0,k(ϕ) satisfies ϕ(t) ≤ e−L∗
1(t−t2)ϕ(t2),
Therefore, xik(t) ≤ χ(t) = ϕ(t) + Mk(ψ) ≤ e−L∗
1(t−t2)(χ(t2) − Mk(ψ)) + Mk(ψ) ≤ e−L∗
1 T ∗
(xik(t2) −
(cid:3)
Mk(ψ)) + Mk(ψ) ≤ Mk(ψ) − e−L∗
1T ∗
ε for all t ∈ [t2, t2 + T ∗].
The following lemma is symmetric to Lemma 4. The proof can be obtained using the proof of Lemma
4 under the transformation zi = −xi, i = 1, . . . , n and it is therefore omitted.
Lemma 5 Let Assumptions 1, 2, and 3 or Assumptions 1, 2, and 4 hold. Also assume that Gσ(t) is
uniformly jointly quasi-strongly connected. Fix any k ∈ D. For any (t1, x(t1)) ∈ R × Hn
0 , any ε > 0, and
2 T ∗
any T ∗ > 0, if xik(t2) ≥ mk(x(t1)) + ε at some t2 ≥ t1, then xik(t2) ≥ mk(x(t1)) + δ, where δ = e−L∗
for all t ∈ [t2, t2 + T ∗], where L∗2 is a positive constant related to H0.
ε
5.3 "Boundary" agents
In the following lemma, we show that any agent that is attracted by an "interior" agent will become an
"interior" agent after a finite time period. Figure 6 illustrates Lemma 6.
Lemma 6 Let Assumptions 1 and 2 hold and assume that Gσ(t) is uniformly jointly quasi-strongly con-
0 , any δ1 > 0 and any T ∗ > 0, assume that there is an
nected. Fix any k ∈ D. For any (t1, x(t1)) ∈ R × Hn
arc (j, i) and a time t2 ≥ t1 such that j ∈ Ni(σ(t)), and xjk(t) ≤ Mk(x(t1)) − δ1 for all t ∈ [t2, t2 + τd].
Then, there exists a t3 ∈ [t1, t2 + τd] such that xik(t) ≤ Mk(x(t1)) − δ2, for all t ∈ [t3, t3 + T ∗]. Here,
if Assumption 3 is satisfied, δ2 = e−L∗
1 related
, δ1} for some positive constants L∗1 and L+
1 T ∗
min{ γτdδ1
1 τd+1
L+
16
Meng et al. Multi-agent Systems with Compasses
to H0. If Assumption 4 is satisfied, δ2 = e−L∗
positive-definite function υ(·) both related to H0.
1T ∗
υ(δ1) for some positive constant L∗1 and a continuous
L+
1 τd+1
Proof. We first show that there exists t3 ∈ [t1, t2 + τd] such that xik(t3) ≤ Mk(x(t1)) − ε, where
, δ1} given Assumption 3 satisfied or ε = υH0(δ1) given Assumption 4 satisfied. This is
ε (C(x(t1))) and an axis-aligned hyperrectangle Hk
ε (C(x)) = {y ∈ H(C(x)) : yk ≤ Mk(x) − ε}. Obviously, B is compact convex set. Suppose
ε = min{ γτdδ1
equivalent to show that kxi(t3)kB = 0, where B := Hk
defined as Hk
kxi(t3)kB 6= 0. It then follows that 0 < kxi(t)kB ≤ ε for all t ∈ [t1, t2 + τd].
ε
Considering the time interval t ∈ [t2, t2 + τd], we define x(t) = [x11, . . . , x1d, x21, . . . , x2d, . . . ,
xn1, . . . , xnd], xik(t) = Mk(x(t1)) for given i and k, and xioko(t) = xioko(t) for io ∈ V \{i} and ko ∈ D\{k}.
The rest of the proof will be divided into three steps.
p (x) − f ik
p (x(t)) is uniformly locally Lipschitz with respect to x and compact
0 , ∀i ∈ V, ∀p ∈ P based on Assumption 2 and Lemma 3. Therefore, there exists a positive constant
1 ε, ∀p ∈ P, and
(Step I). It has been shown that f ik
on Hn
L+
1 related to H0 such that f ik
∀x, x ∈ Hn
0 .
(Step II - Assumption 3). In this step, we show that the derivative of kxi(t)kB along the solution of (2) has
a lower bound. For any p∗ ∈ P such that there is an arc (j, i) where j ∈ Ni(p∗), and xjk ≤ Mk(x(t1)) − δ1
during t ∈ [t2, t2 + τd], it follows from Assumption 3 of f i
p∗(x))) and xik(t) = Mk(x(t1))
that
1 kx(t) − x(t)k ≤ L+
p∗(x) ∈ Tγ(xi,H(Ci
p (x) ≤ f ik
p (x) ≤ L+
p (x) − f ik
p∗(x) ≥ γDk(H(co{xi, xj : j ∈ Ni(p∗)})) ≥ γDk(H(co{xi, xj})) ≥ γδ1,
f ik
(10)
where the first inequality is based on Assumption 3 by noting that xi ∈ rbkH(co{xi, xj : j ∈ Ni(p∗)}),
and rbkH(co{xi, xj : j ∈ Ni(p∗)}) is the facet of H(co{xi, xj : j ∈ Ni(p∗)}) perpendicular to −→rk . This
together with the preceding deduction f ik
0 , implies that
1 ε for any p∗ ∈ P such that there is an arc (j, i) where j ∈ Ni(p∗),
p∗(x) ≥ f ik
f ik
and xjk ≤ Mk(x(t1))− δ1 during t ∈ [t2, t2 + τd]. Note that ε = min{ γτdδ1
, δ1} is chosen sufficiently small
at the beginning of the proof such that γδ1 − L+
1 ε, ∀p ∈ P, and ∀x, x ∈ Hn
1 ε ≥ γδ1 − L+
p (x) ≤ L+
p (x) − f ik
p∗ (x) − L+
1 ε is positive.
1 τd+1
L+
Therefore, based on the assumptions of Lemma 6, it follows that for all t ∈ [t2, t2 + τd],
σ(t)(x(t)) ≥ γδ1 − L+
1 ε,
D+kxi(t)kB = hsgn(xi(t) − PB(xi(t))), f i
σ(t)(x(t))i = f ik
(11)
where the componentwise sign function sgn(·) is defined as sgn(z) = [sgn(z1), sgn(z2), . . . , sgn(zd)] for a
vector z = [z1, z2, . . . , zd] and sgn(z1) is the sign function: sgn(z1) = 1 if z1 > 0, sgn(z1) = 0 if z1 = 0, and
sgn(z1) = −1 if z1 < 0. Note that sgn(xi − PB(xi)) = −→rk whenever kxikB > 0.
(Step II - Assumption 4). Fix (t1, x(t1)) ∈ R×Hn
H(ψ)×···×H(ψ), where H(ψ) = [m1(ψ), M1(ψ)]×··· × [md(ψ), Md(ψ)], and Ho
0 . Denote ψ = x(t1) and Mik = H(ψ)×. . . H(ψ)×Ho
k(ψ)×
k(ψ) = [m1(ψ), M1(ψ)]×
17
Meng et al. Multi-agent Systems with Compasses
··· × [mk−1(ψ), Mk−1(ψ)] × [mk+1(ψ), Mk+1(ψ)] × ··· × [md(ψ), Md(ψ)]. Define
dψ,k(δ1) = inf
p∈P{min
i∈V { min
y∈Uψ{f ik
p (Mk(ψ), y)}}},
(12)
where Uψ(i, k, p, δ1) = {y ∈ Mik : ∃j ∈ Ni(p) such that xjk ≤ Mk(ψ) − δ1}. Based on the relative interior
condition of Assumption 4, we know that dψ,k(δ1) > 0 for δ1 > 0.
For any p∗ ∈ P such that there is an arc (j, i), where j ∈ Ni(p∗), and xjk ≤ Mk(x(t1)) − δ1, we know
p∗(x(t)) ≥ dψ,k(δ1). This together with the
0 , implies that for all t ∈ [t2, t2 + τd],
from the definition of dψ,k(·) that for all t ∈ [t2, t2 + τd], f ik
preceding deduction f ik
1 ε, ∀p ∈ P, and ∀x, x ∈ Hn
p (x) ≤ L+
p (x)−f ik
D+kxi(t)kB = f ik
σ(t)(x(t)) ≥ dψ,k(δ1) − L+
1 ε.
(13)
(14)
Before moving on, we define υH0,k(δ1) : [0, ak − ak] → [0,∞),
δ1 7→
1 +1 o ;
minnδ1, τddψ,k(δ1)
minnMk(ψ) − mk(ψ), τddψ,k(Mk(ψ)−mk (ψ))
τdL+
τdL+
1 +1
if δ1 ∈ [0, Mk(ψ) − mk(ψ)],
o ;
if δ1 ∈ (Mk(ψ) − mk(ψ), ak − ak],
where ak = mk(x(t0)) and ak = Mk(x(t0)) are constants determined by H0. Obviously, υH0,k(δ1) is a
continuous positive-definite function since υH0,k(δ1) = 0 for δ1 = 0, and υH0,k(δ1) > 0 for δ1 > 0. Also
note that υH0,k(δ1) ≤ δ1, for all δ1 ∈ [0, ak − ak] based on the definition of υH0,k and this fact will be used
in the proof of Proposition 1.
(Step III). In this step, we show that there exists a t3 ∈ [t1, t2 + τd] such that xik(t3) ≤ Mk(x(t1)) − ε and
conclude the proof by using Lemma 4.
Define ε = min{ γτdδ1
1 τd+1
L+
, δ1} for Assumption 3 and ε = υH0,k(δ1) ≤ τddψ,k(δ1)
τdL+
1 +1
that (γδ1 − L+
know that f ik
1 ε)τd ≥ ε for Assumption 3 and (dψ,k(δ1) − L+
σ(t)(x(t)) ≥ ε
σ(t)(x(t)) does not change sign and f ik
τd
for Assumption 4. It follows
1 ε)τd ≥ ε for Assumption 4. Since ε > 0, we
for t ∈ [t2, t2 + τd]. Moreover,
kxi(t2 + τd)kB − kxi(t2)kB =Z t2+τd
t2
D+kxi(τ )kBdτ ≥ τd
ε
τd
= ε.
(15)
This contradicts the assumption that 0 < kxi(t)kB ≤ ε for all t ∈ [t1, t2 + τd]. Thus, there exists a
t3 ∈ [t1, t2 + τd] such that xik(t3) ≤ Mk(x(t1)) − ε.
Finally, based on Lemma 4, we obtain xik(t) ≤ Mk(x(t1)) − δ2 for all t ∈ [t3, T ∗], where δ2 = e−L∗
1T ∗
ε.
(cid:3)
This completes the proof of the lemma.
The following lemma is symmetric to Lemma 6.
Lemma 7 Let Assumptions 1 and 2 hold and assume that Gσ(t) is uniformly jointly quasi-strongly con-
0 , any δ1 > 0 and any T ∗ > 0, assume that there is
nected. Fix any k ∈ D. For any (t1, x(t1)) ∈ R × Hn
an arc (j, i) and a time t2 ≥ t1 such that j ∈ Ni(σ(t)), and xjk(t) ≥ mk(x(t1)) + δ1. Then, there exists
18
Meng et al. Multi-agent Systems with Compasses
a t3 ∈ [t1, t2 + τd] such that xik(t) ≥ mk(x(t1)) + δ2, for all t ∈ [t3, t3 + T ∗]. Here, if Assumption 3 is
satisfied, δ2 = e−L∗
2 related to H0. If Assumption
L+
4 is satisfied, δ2 = e−L∗
υ(δ1) for some positive constant L∗2 and a continuous positive-definite function
υ(·) both related to H0.
, δ1} for some positive constants L∗2 and L+
2T ∗
2T ∗
min{ γτdδ1
2 τd+1
5.4 Proof of Theorem 1
The necessity proof follows a similar argument as the proof of Theorem 3.8 of [19]. It is therefore omitted.
We focus on the sufficiency and first give an outline of how the lemmas on invariant set, "interior" agents,
and "boundary" agents are used to prove Theorem 1.
The sufficiency proof is outlined as follows. We first use Lemma 3 to show that point-wise uniform
agreement is achieved on S0. We then focus on agreement attraction. A common Lyapunov function
is constructed and Lemma 3 is used to show that this Lyapunov function is nonincreasing. When the
Lyapunov function is not equal to zero initially, we know that there exists at least one agent not on
the upper boundary or not on the lower boundary at the initial time. Then, we apply Lemma 4 or 5 to
show that this "interior" agent will not become a "boundary" agent afterwards. Based on the fact that
the interaction graph is uniformly jointly quasi-strongly connected, we show that another agent will be
attracted by this "interior" agent at a certain time instant. Using Lemma 6 or 7, we know that this agent
will become an "interior" agent and will not go back to the boundary. Repeating this process, no agents
will stay on the boundary after certain time. This shows that the Lyapunov function is strictly shrinking,
which verifies the desired theorem.
Choose any η ∈ J and any ε > 0, where J = {x ∈ S n
0 : x1 = x2 = ··· = xn}. We define Aa(η) =
{x ∈ S n
0 : kx − ηk∞ ≤ a}. It is obvious from Lemma 3 that Aa(η) is an invariant set since a hypercube
is a special case of a hyperrectangle. Therefore, by setting δ = ε√n , we know that kx(t0) − ηk ≤ δ ⇒
kx(t) − ηk ≤ ε, ∀t ≥ t0. This shows that point-wise uniform agreement is achieved on S0.
Now define V (x) = ρ(H(C(x))), where ρ(H(C(x))) denotes the maximum side length of the hyperrect-
angle H(C(x)). Clearly, it follows from Lemma 3 that V (x) is nonincreasing along (2) and xi(t) ∈ H0,
∀i ∈ V, ∀t ≥ t0. We next prove the sufficiency of Theorem 1 by showing that V (x) is strictly shrinking
over suitable time intervals.
Since Gσ(t) is uniformly jointly quasi-strongly connected, there is a T > 0 such that the union graph
G([t0, t0 + T ]) is quasi-strongly connected. Define T1 = T + 2τd, where τd is the dwell time. Denote
κ1 = t0 + τd, κ2 = t0 + T1 + τd, . . . , κn2 = t0 + (n2 − 1)T1 + τd. Thus, there exists a node i0 ∈ V such
that i0 has a path to every other nodes jointly on time interval [κli, κli + T ], where i = 1, 2, . . . , n and
1 ≤ l1 ≤ l2 ≤ ··· ≤ ln ≤ n2. Denote T = n2T1. We divide the rest of the proof into three steps.
19
Meng et al. Multi-agent Systems with Compasses
(Step I). Consider the time interval [t0, t0 + T ] and k = 1. In this step, we show that an agent that does
More specifically, define ε1 = M1(x(t0))−m1(x(t0))
not belong to the interior set will become an "interior" agent due to the attraction of "interior" agent i0.
. It is trivial to show that M1(x(t)) = m1(x(t)), ∀t ≥ t0
when M1(x(t0)) = m1(x(t0)) based on Definition 5. Therefore, we assume that M1(x(t0)) 6= m1(x(t0))
without loss of generality. Split the node set into two disjoint subsets V1 = {j xj1(t0) ≤ M1(x(t0)) − ε1}
and V 1 = {jj /∈ V1}.
2
Assume that i0 ∈ V1. This implies that xi01(t0) ≤ M1(x(t0)) − ε1. It follows from Lemma 4 that
xi01(t) ≤ M1(x(t0))− δ1, ∀t ∈ [t0, t0 + T ], where δ1 = e−L∗
1T ε1. Considering the time interval [κl1, κl1 + T ],
we can show that there is an arc (i1, j1) ∈ V1 × V 1 such that i1 is a neighbor of j1 (i1 might be equal or
not to i0) because otherwise there is no arc (i1, j1) for any i1 ∈ V1 and j1 ∈ V 1 (which contradicts the fact
that i0 ∈ V1 has a path to every other nodes jointly on time interval [κl1, κl1 + T ]). Therefore, there exists
a time τ ∈ [κl1, κl1 + T ] = [t0 + (l1 − 1)T + τd, t0 + l1T − τd] such that j1 ∈ Ni(σ(τ )). Based on Assumption
1, it follows that there is time interval [τ 1, τ 1 + τd] ⊂ [t0 + (l1 − 1)T, t0 + l1T ] such that j1 ∈ Ni(σ(τ )), for
all t ∈ [τ 1, τ 1 + τd].
Also note that i1 ∈ V1 implies that xi11(t0) ≤ M1(x(t0)) − ε1. This shows that xi11(t) ≤ M1(x(t0)) −
δ1, ∀t ∈ [t0, t0 + T ] based on Lemma 4. Therefore, it follows from Lemma 6 that there exists a t2 ∈
[t0, τ 1 + τd] such that xj11(t2) ≤ M1(x(t0)) − ε2 and xj11(t) ≤ M1(x(t0)) − δ2, ∀t ∈ [t2, t2 + T ], where
, δ1o. To this end, we have shown that at least two
ε2 = minn γτdδ1
, δ1o and δ2 = e−L∗
1T minn γτdδ1
agents are not on the upper boundary at t0 + l1T .
(Step II). In this step, we show that the side length of the hyperrectangle H(C(x)) parallel to the kth axis
−→rk at t0 + T is strictly less than that at t0.
1 τd+1
1 τd+1
L+
L+
We can now redefine two disjoint subsets V2 = {j xj1(t0) ≤ M1(x(t0)) − ε2} and V 2 = {jj /∈ V2}. It
then follows that V2 has at least two nodes by noting that ε2 ≤ ε1. By repeating the above analysis, we
can show that xi1(t) ≤ M1(x(t0)) − δn, ∀i ∈ V, ∀t ∈ [tn, tn + T ] by noting that δn ≤ δn−1 ≤ ··· ≤ δ1,
where tn ∈ [t0, τ n + τd] ⊆ [t0 + (ln − 1)T1, t0 + lnT1], δn = e−nL∗
1T minn (γτd)n−1
1 τd+1)n−1 , 1o ε1.
Instead, if i0 ∈ V 1, or what is equivalent, xi01(t0) ≥ m1(x(t0)) + ε1, we can similarly show that
xi1(t) ≥ m1(x(t0)) + δn, ∀i ∈ V, ∀t ∈ [tn, tn + T ] using Lemmas 5 and 7, where tn ∈ [t0, τ n + τd] ⊆
[t0 + (ln − 1)T1, t0 + lnT1], δn = e−nL∗
Therefore, it follows that D1(H(x(t0 + T ))) ≤ D1(H(x(t0))) − βD1(H(x(t0))), and β is specified as
β = e−nL∗T minn (γτd)n−1
(Step III) In this step, we show that ρ(H(C(x))) at t0 + dT is strictly less than at t0 and thus prove the
theorem by showing that V is strictly shrinking.
2o, L∗ = max{L∗1, L∗2}, and L+ = max{L+
2T minn (γτd)n−1
2 τd+1)n−1 , 1o ε1.
2(L+τd+1)n−1 , 1
1 , L+
2 }.
(L+
(L+
We consider the time interval [t0 + T , t0 + 2T ] and k = 2. Following similar analysis as of Step I and
20
Meng et al. Multi-agent Systems with Compasses
Step II, we can show that D2(H(x(t0 + 2T ))) ≤ D2(H(x(t0))) − βD2(H(x(t0))).
By repeating the above analysis, it follows that V (x(t0 + dT )) − V (x(t0)) ≤ −β(V (x(t0))).
Then, letting N be the smallest positive integer such that t ≤ t0 + N dT , we know that
V (x(t)) ≤ (1 − β)N−1V (x(t0)) ≤
1
1 − β
t−t0
dT V (x(t0)) =
(1 − β)
1
1 − β
e−β∗(t−t0)V (x(t0)),
(16)
ln 1
1−β . Denote H(S0) as the supporting hyperrectangle of S0. Since x(t0) ∈ Hn
where β∗ = 1
0 ⊆ Hn(S0),
dT
0 . By choosing k = 1
it follows that the above inequality holds for any x(t0) ∈ Hn(S0) or any x(t0) ∈ S n
1−β
and λ = β∗, we have that exponential agreement attraction is achieved on S0. This proves the desired
theorem.
(cid:3)
5.5 Proof of Proposition 1
The necessity proof follows a similar argument as the proof of Theorem 3.8 of [19] and the proof of point-
wise uniform agreement is similar to the one of Theorem 1. We focus on the proof of agreement attraction
and use a similar analysis as in the proof of Theorem 1.
Using the same Lyapunov function V (x) = ρ(H(C(x))) as in the proof of Theorem 1, we first show that
xi01(t0) ≤ M1(x(t0))− ε1 and xi01(t) ≤ M1(x(t0))− δ1, ∀t ∈ [t0, t0 + T ], where ε1 = M1(x(t0))−m1(x(t0))
and
δ1 = e−L∗
1T ε1. Then, we have another agent i1 ∈ V1 satisfying xi11(t0) ≤ M1(x(t0)) − ε1. This shows that
xi11(t) ≤ M1(x(t0))−δ1, ∀t ∈ [t0, t0 +T ] based on Lemma 4. Therefore, it follows from Lemma 6 that there
exists t2 ∈ [t0, τ 1 + τd] such that xj11(t2) ≤ M1(x(t0)) − ε2 and xj11(t) ≤ M1(x(t0)) − δ2, ∀t ∈ [t2, t2 + T ],
where ε2 = υH0,k(δ1) and δ2 = e−L∗
1T υH0,k(δ1).
2
Then, we define two disjoint subsets V2 = {j xj1(t0) ≤ M1(x(t0)) − ε2} and V 2 = {jj /∈ V2}. It
follows that V2 has at least two nodes. Note that υH0,k(δ1) ≤ δ1 for all its definition domain. By repeating
the above analysis, we can show that xi1(t) ≤ M1(x(t0)) − δn, ∀i ∈ V, ∀t ∈ [tn, tn + T ] by noting
that δn ≤ δn−1 ≤ ··· ≤ δ1, where tn ∈ [t0, τ n + τd] ⊆ [t0 + (ln − 1)T1, t0 + lnT1], δn(D1(H(x(t0)))) =
ς ◦ υH0,k ◦ . . . υH0,k ◦ ς( ·2 ), a continuous positive-definite function ς(·) is defined as ς(x) = e−L∗
1T x, and
D1(H(x(t0))) = M1(x(t0))−m1(x(t0)). It is obvious that δn(D1(H(x(t0)))) is a continuous positive-definite
function.
Instead, if i0 ∈ V 1, or what is equivalent, xi01(t0) ≥ m1(x(t0)) + ε1, we can similarly show that
xi1(t) ≥ m1(x(t0))+δn, ∀i ∈ V, ∀t ∈ [tn, tn +T ] using Lemmas 5 and 7, where tn ∈ [t0, τ n +τd] ⊆ [t0 +(ln−
1)T1, t0 +lnT1], a continuous positive-definite function δn(D1(H(x(t0)))) = ς◦υH0◦. . . υH0◦ς( ·2 ), and ς(·) is
defined as ς(x) = e−L∗
2T x. Therefore, it follows that D1(H(x(t0 + T ))) ≤ D1(H(x(t0)))− δ∗(D1(H(x(t0)))),
where δ∗(x) = min{δn(x), δn(x)} is a continuous positive-definite function.
Then, following Lemma 4.3 of [16], there exists a class K function Υ(D1(H(x(t0)))) defined on [0, ak−ak]
satisfying Υ(D1(H(x(t0)))) ≤ δ∗(D1(H(x(t0)))), ∀D1(H(x(t0))) ∈ [0, ak− ak], where a continuous function
21
Meng et al. Multi-agent Systems with Compasses
Υ : [0, b) → [0,∞) is said to belong to class K if it is strictly increasing and Υ(0) = 0. Therefore, it follows
that D1(H(x(t0 + T ))) ≤ D1(H(x(t0))) − Υ(D1(H(x(t0)))), ∀i ∈ V, ∀t ∈ [tn, tn + T ].
We next consider the time interval [t0 + T , t0 + 2T ]. Following the previous analysis, we can show that
D2(H(x(t0 + 2T ))) ≤ D2(H(x(t0))) − Υ(D2(H(x(t0)))).
By repeating the above analysis, it follows that V (x(t0 + dT )) − V (x(t0)) ≤ −Υ(V (x(t0))).
Then, let N be the smallest positive integer such that t ≤ t0 + N dT . It then follows that
V (x(t)) − V (x(t0)) ≤ −Υ(V (x(t0))) − ··· − Υ(V (x(t0 + (N − 1)dT ))) ≤ −N Υ(V (x(t0))).
(17)
Therefore, for any ε > 0, there exists a sufficiently large N such that V (x(t)) ≤ 2ε√n , ∀t ≥ t0 + N dT . This
shows that there exists η ∈ J such that kx(t) − ηk∞ ≤ ε√n , ∀t ≥ t0 + N dT . This implies kx(t) − ηk ≤ ε,
∀t ≥ t0 + N dT , which shows that uniformly agreement attraction is achieved on S0 and proves the
proposition.
(cid:3)
Remark 2 (Extension to global convergence) The convergence is semi-global since the selections of
K class function Υ, and parameters λ and k depend on that the initial common space is given in advance
and compact, i.e., the assumption that S0 is compact is necessary to guarantee uniformly asymptotic or
exponential agreement. On the other hand, if Assumption 2 is changed to "uniformly globally Lipschitz",
we obtain a global convergence result.
6 Cooperative -- antagonistic Multi-agent Systems
In this section, we focus on
cooperative -- antagonistic multi-agent systems and prove Theorem 2 using a contradiction argument, with
the help of a series of preliminary lemmas. Note that since every agent admits a continuous trajectory, we
only need to prove that all the agents' componentwise absolute values reach an agreement.
6.1
Invariant set
In this section, we construct an invariant set for the dynamics under the cooperative -- antagonistic network.
For all k ∈ D, define M†k(x(t)) = maxi∈V xik(t). In addition, define an origin-symmetric supporting
hyperrectangle H(bC(x)) ⊂ Rd as H(bC(x)) := [−M†1 (x), M†1 (x)] × ··· × [−M†d(x), M†d (x)]. The origin-
symmetric supporting hyperrectangle formed by the initial states of all agents is given by bHn
i∈V xid(t0)(cid:3).
i∈V xi1(t0)(cid:3) × ··· ×(cid:2) − max
i∈V xid(t0), max
bH0 =(cid:2) − max
i∈V xi1(t0), max
0 , where
(18)
22
Meng et al. Multi-agent Systems with Compasses
Introduce the state transformation yik = x2
ik, for all i ∈ V, and for all k ∈ D. The analysis will be
carried out on yik, instead of xik to avoid non-smoothness. The following lemma establishes an invariant
set for system (2).
0 is an invariant set, i.e., xi(t) ∈ bH0,
Lemma 8 Let Assumptions 1, 2 and 5 hold. Then, for system (2), bHn
∀i ∈ V, ∀t ≥ t0.
Proof. Let yk = maxi∈V yik, for all k ∈ D. We first show that D+yk ≤ 0, for all k ∈ D. It follows
σ(t)(x), ∀i ∈ V, ∀k ∈ D. Let bV(t) = {i ∈ V : yik(xi(t)) = yk(x(t))} be the
from (1) that yik = 2xikf ik
set of indices where the maximum is reached at t. It then follows from Lemma 2 that for all k ∈ D,
D+yk = 2 maxi∈ bV(t) xikf ik
σ(t)(x). Consider any x(t0) ∈ Hn
0 and any initial time t0. It follows from Definition
5 and Lemma 1 that f i
∀i ∈ V, ∀p ∈ P. Based on Definition
p(x) ∈ Tγ(xi,H(C
p (x) ≥ 0 for xik = −√yk ≤ 0. This shows that
0 , D+yk ≤ 0.
ik(t0), ∀i ∈ V, ∀k ∈ D, which shows that − maxi∈V xik(t0) ≤ xik(t) ≤
p (x) ≤ 0 for i ∈ bV = {i ∈ V : yik = yk}. It follows that for all k ∈ D, and x ∈ bHn
p (x) ≤ 0 for xik = √yk ≥ 0 and f ik
p(x))) ⊆ T (xi,H(bC(x))),
ik(t) ≤ maxi∈V x2
5, it follows that f ik
i
xikf ik
Therefore, x2
maxi∈V xik(t0), ∀i ∈ V, ∀k ∈ D, ∀t ≥ t0. This implies that bHn
0 is an invariant set.
(cid:3)
6.2 "Interior" agents
In the following lemma, we show that the projection of the state on any axis is strictly less than a certain
upper bound as long as it is initially strictly less than this upper bound. The lemma relies on the technical
Lemmas 11 and 13, which can be found in the appendices.
Lemma 9 Let Assumptions 1, 2, and 5 hold and assume that Gσ(t) is uniformly jointly strongly connected.
Fix any k ∈ D. For any (t1, x(t1)) ∈ R × bHn
0 , any ε > 0 and any T ∗ > 0, if yik(t2) ≤ y∗ − ε at some
t2 ≥ t1, where y∗ ≥ yk(x(t1)) is a constant, then yik(t) ≤ y∗− δ for all t ∈ [t2, t2 + T ∗], where δ = e−L∗T ∗
ε,
and L∗ is a positive constant related to bH0.
Proof. Similar to the proof of Lemma 4, we consider any (t1, x(t1)) ∈ R × bHn
k(ψ) × bH(ψ) × ··· × bH(ψ), where bH(ψ) = [−M†1 (ψ), M†1 (ψ)] × ··· ×
and Mik = bH(ψ) × ··· × bH(ψ) × bHo
[−M†d (ψ), M†d (ψ)], and bHo
× [−M†k−1(ψ), M†k−1(ψ)] × [−M†k+1(ψ), M†k+1(ψ)] × ··· × [−M†d(ψ), M†d (ψ)]. Again, for clarity we divide
k(ψ) = [−M†1 (ψ), M†1 (ψ)] × . . .
0 , and let ψ = x(t1)
the rest of the proof into three steps.
(Step I). Define the following function
gψ,k(χ) : [−M†k (ψ), M†k (ψ)] → R, χ → sup
p∈P{max
i∈V { max
y∈Mik{xikf ik
p (xik, y) : xik = χ}}}.
(19)
23
Meng et al. Multi-agent Systems with Compasses
Obviously, gψ,k is continuous. In this step, we establish some useful properties of gψ,k based on Lemmas
11 and 13. We make the following claim.
Claim A: (i) gψ,k(χ) = 0 if χ = ±M†k (ψ); (ii) gψ,k(χ) > 0 if χ ∈ (−M†k(ψ), M†k (ψ)); (iii) gψ,k(χ) is
Lipschitz continuous with respect to χ on [−M†k (ψ), M†k (ψ)].
The first and second properties of Claim A can be obtained following a similar analysis to the proof of
p : [−M†k (ψ), M†k (ψ)] → R,
Lemma 4. For the third property of Claim A, it follows from Lemma 13 that gik
xik 7→ maxy∈Mik xikf ik
p (xik, y) is Lipschitz continuous with respect to xik, ∀k ∈ D, ∀i ∈ V, and ∀p ∈ P.
Also note that gψ,k(M†k (ψ)) = 0. Then, it follows from Lemma 11 that gψ,k(χ) is Lipschitz continuous
with respect to χ on [−M†k (ψ), M†k (ψ)].
(Step II). In this step, we construct another nonlinear function h bH0,k(·) based on the definition of gψ,k(·).
From the definitions of gψ,k(χ), it follows that yik(t) = 2xikf ik
σ(t)(x(t)) ≤ 2gψ,k(xik(t)), ∀t ≥ t2. It also
follows from the properties of gψ,k(χ) that there exists a Lipschitz constant L1 such that gψ,k(χ) =
gψ,k(χ) − gψ,k(M†k (ψ)) ≤ L1χ − M†k(ψ) = L1(M†k (ψ) − χ), ∀χ ∈ [−M†k(ψ), M†k (ψ)] and gψ,k(χ) =
gψ,k(χ)− gψ,k(−M†k (ψ)) ≤ L1χ + M†k(ψ) = L1(M†k (ψ) + χ), ∀χ ∈ [−M†k (ψ), M†k (ψ)], where L1 is related
Therefore, for the case of xik ≥ 0, we have that yik(t) ≤ 2L1(M†k (ψ)−xik) = 2L1(M†k (ψ)−pyik(t)), For
the case of xik < 0, we have that yik(t) ≤ 2L1(M†k (ψ) + xik) = 2L1(M†k (ψ) −pyik(t)). Overall, it follows
that yik(t) ≤ 2L1(M†k (ψ)−pyik(t)), ∀t ≥ t2. Let φ(t) be the solution of φ = hψ,k(φ) with initial condition
φ(t2) = yik(t2), where hψ,k : [0, yk(ψ)] → R, φ 7→ 2L1(M†k (ψ) − √φ). It follows from the Comparison
Lemma that yik(t) ≤ φ(t), ∀t ≥ t2.
to ψ.
Next, by letting ϕ = yk(ψ) − φ and ak = M†k (x(t0)), we define the following function
h bH0,k(ϕ) : [0, (ak)2] → R, ϕ 7→
hψ,k(yk(ψ) − ϕ);
hψ,k(0);
if ϕ ∈ (yk(ψ), (ak)2].
if ϕ ∈ [0, yk(ψ)],
(20)
We have the following claim by easily checking the definition of h bH0,k(ϕ).
Claim B: (i) h bH0,k(ϕ) is Lipschitz continuous with respect to ϕ on [0, (ak)2]; (ii) h bH0,k(ϕ) = 0 if ϕ = 0;
(iii) h bH0,k(ϕ) > 0 if ϕ ∈ (0, (ak)2].
(Step III). In this step, we take advantage of the function h bH0,k(·) to show that yik will be always strictly
less than the upper bound y∗ as long as it is initially strictly less than y∗.
Consider any T ∗ > 0 and t ∈ [t2, t2 + T ∗]. It follows from the first property of h bH0,k(ϕ) that there exists
a constant L∗ related to bH0 such that h bH0,k(ϕ) − h bH0,k(0) ≤ L∗ϕ, ∀ϕ ∈ [0, (ak)2]. From the second and
third properties of h bH0,k(ϕ), it follows that h bH0,k(ϕ) ≤ L∗ϕ, ∀ϕ ∈ [0, (ak)2] and ϕ = − φ = −hψ,k(φ) =
−h bH0,k(ϕ), ∀ϕ ∈ [0, yk(ψ)]. It follows from the Comparison Lemma that the solution of
ϕ = −h bH0,k(ϕ)
24
Meng et al. Multi-agent Systems with Compasses
satisfies ϕ(t) ≥ e−L∗(t−t2)ϕ(t2), ∀t ≥ t2 since −h bH0,k(ϕ) ≥ −L∗ϕ.
Therefore, yik(t) ≤ φ(t) = yk(ψ) − ϕ(t) ≤ yk(ψ) − e−L∗(t−t2)(yk(ψ) − φ(t2)) ≤ yk(ψ) − e−L∗T ∗
(yk(ψ) −
(y∗ − yik(t2)) + (yk(ψ) −
ε for all t ∈ [t2, t2 + T ∗] since y∗ ≥ yk(ψ). This proves the lemma by letting
(y∗ + yk(ψ) − y∗ − yik(t2)) = y∗ − e−L∗T ∗
yik(t2)) = y∗ + yk(ψ) − y∗ − e−L∗T ∗
y∗)(1 − e−L∗T ∗
δ = e−L∗T ∗
ε.
) ≤ y∗ − e−L∗T ∗
(cid:3)
6.3 "Boundary" agents
In the following lemma, we show that any agent that is attracted by an agent strictly inside the upper
bound is drawn strictly inside that bound. This lemma relies on Lemma 14, which can be found in the
Appendices.
γτdδ
Lemma 10 Let Assumptions 1, 2, and 5 hold and assume that Gσ(t) is uniformly jointly strongly con-
nected. Fix any k ∈ D. For any (t1, x(t1)) ∈ R × bHn
0 and any δ > 0, assume that there is an arc (j, i) and
a time t2 ≥ t1 such that j ∈ Ni(σ(t)), and yjk(t) ≤ y∗ − δ for all t ∈ [t2, t2 + τd], where y∗ ≥ yk(x(t1)) is
a constant. Then, there exists a t3 ∈ [t1, t2 + τd] such that yik(t3) ≤ y∗ − ε, where ε =
2(L+τd+γτd+1) and
L+ is a constant related to bH0.
Proof. We prove this lemma by contradiction. Suppose that there does not exist a t3 ∈ [t1, t2 + τd]
such that xik(t3) ≤ √y∗ − ε1, where ε1 =
2(L+τd+γτd+1)√y∗ is a positive constant. Then it follows that
√y∗ − ε1 < xik(t) ≤ M†k (x(t1)) for all t ∈ [t1, t2 + τd].
We focus on the time interval t ∈ [t2, t2 + τd]. Define x(t) by replacing xik(t) in x(t) with xik(t) =
p (x(t)) is uniformly locally Lipschitz with respect to x and
0 , for all i ∈ V, and all p ∈ P. By noting that M†k(x(t1))− ε1 ≤ √y∗− ε1 < xik(t), it follows
p (x) ≤
p (x) ≤ f ik
p (x) − f ik
p (x) − f ik
maxi∈V{xik(t)} = M†k(x(t)). We know that f ik
compact on bHn
that there exists a positive constant L+ related to bH0 such that f ik
L+kx(t) − x(t)k ≤ L+ε1, ∀p ∈ P, and ∀x, x ∈ bHn
It follows from yjk(t) ≤ y∗ − δ that √y∗ − xjk(t) ≥ δ
an arc (j, i) with j ∈ Ni(p∗) and √y∗ − xjk(t) ≥ δ
p∗(x)(cid:12)(cid:12)(cid:12) ≥ γDk(H(co{xi, xjsgnij
(cid:12)(cid:12)(cid:12)f ik
L+ε1 > γ(cid:16) δ
2√y∗ − ε1(cid:17) − L+ε1. Choose ε1 sufficiently small, especially, ε1 =
γ(cid:16) δ
every y∗ > 0. It follows that γ(cid:16) δ
p∗ : j ∈ Ni(p∗)})) ≥ γDk(H(co{xi, xjsgnij
2√y∗ − ε1(cid:19) .
p∗(x(t)) ≥ f ik
2√y∗ > ε1 based on the definition of ε1. Therefore, we know that f ik
2√y∗ − ε1(cid:17) − L+ε1. It then follows that for all t ∈ [t2, t2 + τd], D+xik(t) = f ik
p∗})) > γ(cid:18) δ
2√y∗ , it follows from Assumption 5 that
p∗(x(t)) −
σ(t)(x(t)) >
2(L+τd+γτd+1)√y∗ . Such ε1 exists for
2√y∗ . Therefore, for any p∗ ∈ P such that there is
. Therefore, we know that
Note that
(21)
γτdδ
0 .
δ
2√y∗ − ε1(cid:17) − L+ε1 > ε1
xik(t2 + τd) − xik(t2) =Z t2+τd
τd
t2
γτdδ
(cid:12)(cid:12)D+xik(τ )(cid:12)(cid:12) dτ > τd
ε1
τd
= ε1.
25
(22)
Meng et al. Multi-agent Systems with Compasses
This contradicts the assumption that √y∗− ε1 < xik(t) ≤ M†k(x(t1)) for all t ∈ [t2, t2 + τd]. It then follows
that yik(t3) ≤ y∗ − ε, where ε = √y∗ε1 =
2(L+τd+γτd+1) .
γτdδ
(cid:3)
6.4 Proof of Theorem 2
Unlike the contraction analysis of a common Lyapunov function given in the proof of Theorem 1, we use
a contradiction argument for the proof of Theorem 2.
According to the proof of Lemma 8, we know that D+yk ≤ 0 and yk ≥ 0, for all k ∈ D. Therefore, yk(t),
k ∈ D is monotonically decreasing and bounded from below by zero. This implies that for any initial time
t0 and initial state x(t0), there exists a constant y∗k, k ∈ D such that limt→∞ yk(t) = y∗k, ∀k ∈ D. Define
ik = lim supt→∞ yik(t) and ℓik = lim inf t→∞ yik(t), for all i ∈ V, and k ∈ D. Clearly, 0 ≤ ℓik ≤ ik ≤ y∗k.
We know that the componentwise absolute values of all the agents converges to the same if and only if
ik = ℓik = y∗k, ∀i ∈ V, ∀k ∈ D. The desired conclusion holds trivially if y∗k = 0, k ∈ D. Therefore, we
assume that y∗k > 0 for some k ∈ D without loss of generality.
Suppose that there exists a node i1 ∈ V such that 0 ≤ ℓi1k < i1k ≤ y∗k. Based on the fact that
limt→∞ yk(t) = y∗k, it follows that for any ε > 0, there exists a bt(ε) > t0 such that y∗k − ε ≤ yk(t) ≤ y∗k +
t ≥bt(ε). Take α1k =q 1
2 (ℓi1k + i1k). Therefore, there exists a time t1 ≥bt(ε) such that xi1k(t1) = α1k
based on the definitions of i1k and ℓi1k and continuousness of xi1k(t). This shows that
ε,
i1k(t1) = i1k − (i1k − α2
x2
1k) ≤ y∗k + ε − (i1k − α2
1k) = y∗k + ε − ε1,
(23)
where ε1 = i1k − α2
1k > 0 and the first inequality is based on the definition of i1k.
Since Gσ(t) is uniformly jointly strongly connected, there is a T > 0 such that the union graph G([t1, t1 +
T ]) is jointly strongly connected. Define T1 = T + 2τd, where τd is the dwell time. Denote κ1 = t1 + τd,
κ2 = t1 + T1 + τd, . . . , κn = t1 + (n − 1)T1 + τd. For each node i ∈ V, i has a path to every other nodes
jointly on time interval [κl, κl + T ], where l = 1, 2, . . . , n. Denote T = nT1.
Consider time interval [t1, t1 + T ]. Based on the fact that yk(x(t1)) ≤ y∗k + ε and considering y∗k + ε as
the role of y∗ in Lemma 9, it follows that yik(t) ≤ y∗k + ε − δ1, ∀t ∈ [t1, t1 + T ], where δ1 = e−L∗T ε1.
Since for each node i ∈ V, i has a path to every other nodes jointly on time interval [κl, κl + T ], where
l = 1, 2, . . . , n, there exists i2 ∈ V such that i1 is a neighbor of i2 during the time interval [κ1, κ1 +T ]. Based
i2k(t2) ≤ y∗k +ε−ε2,
on Lemma 10, it follows that there exists t2 ∈ [t1, τ 1 +τd] ⊂ [t1 +T, t1 +2T ] such that x2
i2k(t) ≤ y∗k + ε − δ2, ∀t ∈ [t2, t1 + T ], where
where ε2 =
δ2 = e−L∗T ε2. By repeating the above analysis, we can show that yik(t) ≤ y∗k + ε − δn, ∀t ∈ [tn, t1 + T ],
∀i ∈ V, where tn ∈ [t1, τ n + τd] ⊂ [t1 + (n − 1)T, t1 + nT ], and δn can be iteratively obtained as δn =
e−nL∗T
2(L+τd+γτd+1) δ1. This further implies that x2
2n−1(L+τd+γτd+1)n−1 . This is indeed true because δi ≤ δi−1, ∀i = 2, 3, . . . , n.
γn−1τ n−1
γτd
d
26
Meng et al. Multi-agent Systems with Compasses
This shows that yk(t1 + T ) = maxi∈V yik ≤ y∗k + ε − δn, which indicates a contradiction for sufficiently
small ε satisfying ε < δn/2. Therefore, ik = ℓik = y∗k, ∀i ∈ V, ∀k ∈ D. This proves that limt→∞(xik(t) −
py∗k) = 0, ∀i ∈ V and ∀k ∈ D, which shows the componentwise absolute values of all the agents converges
to the same values and the theorem holds.
(cid:3)
7 Conclusions
Agreement protocols for nonlinear multi-agent dynamics over cooperative or cooperative -- antagonistic
networks were investigated. A class of nonlinear control laws were introduced based on relaxed convexity
conditions. The price to pay was that each agent must have access to the orientations of a shared coordinate
system, similar to a magnetic compass. Each agent specified a local supporting hyperrectangle with the
help of the shared reference directions and the relative state measurements, and then a strict tangent cone
was determined. Under mild conditions on the nonlinear dynamics and the interaction graph, we proved
that for cooperative networks, exponential state agreement is achieved if and only if the interaction graph
is uniformly jointly quasi-strongly connected. For cooperative -- antagonistic networks, the componentwise
absolute values of all the agents converge to the same values if the time-varying interaction graph is
uniformly jointly strongly connected. The results generalize existing studies on agreement seeking of multi-
agent systems. Future works include higher-order agent dynamics, convergence conditions for bipartite
agreement, and the study on the case of mismatched shared reference directions.
References
[1] C. Altafini. Dynamics of opinion forming in structurally balanced social networks. PloS One,
7(6):e38135, 2012.
[2] C. Altafini. Consensus problems on networks with antagonistic interactions. IEEE Transactions on
Automatic Control, 58(4):935 -- 946, 2013.
[3] J.-P. Aubin. Viability Theory. Birkhauser Boton, Boston, 1991.
[4] D. Bauso, L. Giarre, and R. Pesenti. Non-linear protocols for optimal distributed consensus in
networks of dynamic agents. Systems & Control Letters, 55(11):918 -- 928, 2006.
[5] V. D. Blondel, J. M. Hendrickx, A. Olshevsky, and J. N. Tsitsiklis. Convergence in multiagent
coordination, consensus, and flocking.
In 44th IEEE Conference on Decision and Control, pages
2996 -- 3000, 2005.
27
Meng et al. Multi-agent Systems with Compasses
[6] M. Cao, A. S. Morse, and B. D. O. Anderson. Agreeing asynchronously.
IEEE Transactions on
Automatic Control, 53(8):1826 -- 1838, 2008.
[7] M. Cao, A. S. Morse, and B. D. O. Anderson. Reaching a consensus in a dynamically changing
environment: convergence rates, measurement delays, and asynchronous events. SIAM Journal on
Control and Optimization, 47(2):601 -- 623, 2008.
[8] J. Cort´es, S. Mart´ınez, and F. Bullo. Robust rendezvous for mobile autonomous agents via proximity
graphs in arbitrary dimensions. IEEE Transactions on Automatic Control, 51(8):1289 -- 1298, 2006.
[9] J. M. Danskin. The theory of max-min, with applications. SIAM Journal on Applied Mathematics,
14(4):641 -- 664, 1966.
[10] D. Easley and J. Kleinberg. Networks, Crowds, and Markets. Reasoning About a Highly Connected
World. Cambridge Univ. Press, Cambridge, 2010.
[11] A. F. Filippov. Differential Equations with Discontinuous Righthand Sides. Norwell, MA: Kluwer,
1988.
[12] C. Godsil and G. Royle. Algebraic Graph Theory. New York: Springer-Verlag, 2001.
[13] J. Haverinen and A. Kemppainen. Global indoor self-localization based on the ambient magnetic
field. Robotics and Autonomous Systems, 57(10):1028 -- 1035, 2009.
[14] J. M. Hendrickx and J. N. Tsitsiklis. Convergence of type-symmetric and cut-balanced consensus
seeking systems. IEEE Transactions on Automatic Control, 58(1):214 -- 218, 2013.
[15] A. Jadbabaie, J. Lin, and A. S. Morse. Coordination of groups of mobile autonomous agents using
nearest neighbor rules. IEEE Transactions on Automatic Control, 48(6):988 -- 1001, 2003.
[16] H. K. Khalil. Nonlinear Systems, Third Edition. Englewood Cliffs, New Jersey: Prentice-Hall, 2002.
[17] Z. Lin. Coupled dynamic systems: From structure towards stability and stabilizability. Ph. D. disser-
tation, University of Toronto, Toronto, 2006.
[18] Z. Lin, M. Broucke, and B. Francis. Local control strategies for groups of mobile autonomous agents.
IEEE Transactions on Automatic Control, 49(4):622 -- 629, 2004.
[19] Z. Lin, B. Francis, and M. Maggiore. State agreement for continuous-time coupled nonlinear systems.
SIAM Journal on Control and Optimization, 46(1):288 -- 307, 2007.
[20] N. G. Markley. Principles of Differential Equations. Wiley-Interscience, first edition, 2004.
28
Meng et al. Multi-agent Systems with Compasses
[21] I. Matei and J. S. Baras. The asymptotic consensus problem on convex metric spaces. IEEE Trans-
actions on Automatic Control. to appear.
[22] I. Matei, J. S. Baras, and C. Somarakis. Convergence results for the linear consensus problem under
markovian random graphs. SIAM Journal on Control and Optimization, 51(2):1574 -- 1591, 2013.
[23] Z. Meng, G. Shi, and K. H. Johansson. Multi-agent systems with compasses: cooperative and
cooperative-antagonistic networks. In Proceedings of 33rd Chinese Control Conference, pages 1430 --
1437, Nanjing, China, 2014.
[24] L. Moreau. Stability of continuous-time distributed consensus algorithms. In IEEE Conference on
Decision and Control, pages 3998 -- 4003, Atlantis, Bahamas, 2004.
[25] L. Moreau. Stability of multi-agent systems with time-dependent communication links. IEEE Trans-
actions on Automatic Control, 50(2):169 -- 182, 2005.
[26] R. Olfati-Saber, J. A. Fax, and R. M. Murray. Consensus and cooperation in networked multi-agent
systems. Proceedings of the IEEE, 95(1):215 -- 233, 2007.
[27] R. Olfati-Saber and R. M. Murray. Consensus problems in networks of agents with switching topology
and time-delays. IEEE Transactions on Automatic Control, 49(9):1520 -- 1533, 2004.
[28] A. Olshevsky and J. N. Tsitsiklis. Convergence speed in distributed consensus and averaging. SIAM
Journal on Control and Optimization, 48(1):33 -- 55, 2009.
[29] W. Ren and R. W. Beard. Consensus seeking in multiagent systems under dynamically changing
interaction topologies. IEEE Transactions on Automatic Control, 50(5):655 -- 661, 2005.
[30] G. Shi and Y. Hong. Global target aggregation and state agreement of nonlinear multi-agent systems
with switching topologies. Automatica, 45(5):1165 -- 1175, 2009.
[31] G. Shi and K. H. Johansson. Robust consensus for continuous-time multi-agent dynamics. SIAM
Journal on Control and Optimization, 51(5):3673 -- 3691, 2013.
[32] V. Y. Skvortzov, H. K. Lee, S. W. Bang, and Y. B. Lee. Application of electronic compass for mobile
robot in an indoor environment. In 2007 IEEE International Conference on Robotics and Automation,
pages 2963 -- 2970, Roma, Italy, 2007.
[33] A. M. Stoneham, E. M. Gauger, K. Porfyrakis, S. C. Benjamin, and B. W. Lovett. A new type of
radical-pair-based model for magnetoreception. Biophysical Journal, 102(5):961 -- 968, 2012.
29
Meng et al. Multi-agent Systems with Compasses
[34] H. G. Tanner, A. Jadbabaie, and G. J. Pappas. Flocking in fixed and switching networks. IEEE
Transactions on Automatic Control, 52(5):863 -- 868, 2007.
[35] J. N. Tsitsiklis, D. Bertsekas, and M. Athans. Distributed asynchronous deterministic and stochastic
gradient optimization algorithms. IEEE Transactions on Automatic Control, 31(9):803 -- 812, 1986.
[36] T. Vicsek, A. Czir´ok, E. Ben-Jacob, I. Cohen, and O. Schochet. Novel type of phase transitions in a
system of self-driven particles. Physical Review Letters, 75(6):1226 -- 1229, 1995.
[37] S. Wasserman and K. Faust. Social Network Analysis: methods and applications. Cambridge Univ.
Press, Cambridge, 1994.
Appendices
Note that a function h(·) is called Lipschitz continuous on a set U if there exists a constant LU such
that kh(a) − h(b)k ≤ LUka − bk for all a, b ∈ U .
Lemma 11 Suppose Assumption 2 holds, i.e., fp, p ∈ P, is uniformly locally Lipschitz. Assume that there
exists a point z0 ∈ Rdn such that supp∈P fp(z0) (or inf p∈P fp(z0)) is finite. Then g(x) := supp∈P fp(x) (or
inf p∈P fp(x)) is well defined and is Lipschitz continuous on every compact set U .
Proof. Let U be a given compact set. Define Uz0 = co({z0}∪U ). Based on Theorem 1.14 of [20], a locally
Lipschitz function is Lipschitz continuous on every compact subset. Plugging in the fact that fp, p ∈ P is
> 0 such that kfp(a) − fp(b)k ≤ LUz0ka − bk for all a, b ∈ Uz0
uniformly locally Lipschitz, there is LUz0
and p ∈ P. It becomes straightforward that g(x) is finite at every point in Uz0 and LUz0
is a Lipschitz
constant of g on Uz0. Therefore, the lemma holds.
(cid:3)
The following lemma is originally from [17] and restated here.
Lemma 12 Suppose that f (x1, y) : R×M → R is locally Lipschitz with respect to [x1, y]T, where M ⊂ Rq
is compact. Then g(x1) = maxy∈M f (x1, y) is locally Lipschitz.
Lemma 13 Suppose that f (x1, y) : M1 × M → R is locally Lipschitz with respect to [x1, y]T, where
M1 ⊂ R and M ⊂ Rq are compact. Then g : M1 → R, x1 7→ maxy∈M x1f (x1, y) is Lipschitz continuous
with respect to x1 on M1.
Proof. Because f (x1, y) is locally Lipschitz with respect to [x1, y]T and M1 and M are compact, it
follows that f (x1, y) is Lipschitz continuous with respect to [x1, y]T. Therefore, there exists a constant L
such that kf (x1, y) − f (x1, y)k ≤ Lkx1 − x1k, ∀x1, x1 ∈ M1, ∀y ∈ M. Also, since f (x1, y) is continuous
and the continuous function on the compact set is compact, there exist constants Lx and Lf such that
Lx = maxx1∈M1 kx1k and Lf = maxx1∈M1,y∈M kf (x1, y)k.
30
Meng et al. Multi-agent Systems with Compasses
Let yx and yx be the points satisfying g(x1) = maxy∈M{x1f (x1, y)} = x1f (x1, yx) and g(x1) =
maxy∈M{x1f (x1, y)} = x1f (x1, yx). It is trivial to show that x1f (x1, yx) ≥ x1f (x1, yx) and x1f (x1, yx) ≥
x1f (x1, yx). Therefore, there exists ex = (1− λ)x1 + λx1, where 0 ≤ λ ≤ 1 such that exf (ex, yx) = exf (ex, yx).
Thus, kg(x1)−g(x1)k = kx1f (x1, yx)−exf (ex, yx)+exf (ex, yx)−x1f (x1, yx)k ≤ kx1f (x1, yx)−x1f (ex, yx)k+
kx1f (ex, yx) −exf (ex, yx)k + kexf (ex, yx) −exf (x1, yx)k + kexf (x1, yx) − x1f (x1, yx)k. It then follows that
kg(x1) − g(x1)k ≤ Lkx1kkx1 −exk + kf (ex, yx)kkx1 −exk + Lkexkkx1 −exk + kf (x1, yx)kkx1 −exk
≤ (LLx + Lf )kx1 −exk + (LLx + Lf )kx1 −exk
= (LLx + Lf )kx1 − x1k.
(24)
(cid:3)
Therefore, g(x1) is Lipschitz continuous with respect to x1 on M1.
Lemma 14 Suppose that f (x) : M → R is locally Lipschitz with respect to x, where M ⊂ Rq is compact.
Then g(x) : M → R, x 7→ x1f (x) is Lipschitz continuous with respect to x on M, where x1 denotes an
element of x.
Proof. Because f (x) is locally Lipschitz with respect to x and M is compact, it follows that f (x) is
Lipschitz continuous with respect to x. Therefore, there exists a constant L such that kf (x) − f (x)k ≤
Lkx − xk, ∀x, x ∈ M. Also, since f (x) is continuous and the continuous function on the compact set is
still compact, there exist constants Lx and Lf such that Lx = maxx∈M kxk and Lf = maxx∈M kf (x)k.
It then follows that ∀x, x ∈ M, kg(x)−g(x)k = kx1f (x)−x1f (x)k ≤ LLxkx−xk+Lfkx−xk = (LLx+
Lf )kx − xk. Therefore, g(x) is Lipschitz continuous with respect to x on M.
(cid:3)
31
|
1503.00237 | 1 | 1503 | 2015-03-01T08:33:28 | Task Allocation in Robotic Swarms: Explicit Communication Based Approaches | [
"cs.MA",
"cs.AI",
"cs.RO"
] | In this paper we study multi robot cooperative task allocation issue in a situation where a swarm of robots is deployed in a confined unknown environment where the number of colored spots which represent tasks and the ratios of them are unknown. The robots should cover this spots as far as possible to do cleaning and sampling actions desirably. It means that they should discover the spots cooperatively and spread proportional to the spots area and avoid from remaining idle. We proposed 4 self-organized distributed methods which are called hybrid methods for coping with this scenario. In two different experiments the performance of the methods is analyzed. We compared them with each other and investigated their scalability and robustness in term of single point of failure. | cs.MA | cs | Task Allocation in Robotic Swarms: Explicit
Communication Based Approaches
Aryo Jamshidpey1 and Mohsen Afsharchi2
1 Institute for Advanced Studies in Basic Sciences
[email protected]
2 Department of Computer Science, University of Zanjan
[email protected]
Abstract. In this paper we study multi robot cooperative task alloca-
tion issue in a situation where a swarm of robots is deployed in a confined
unknown environment where the number of colored spots which repre-
sent tasks and the ratios of them are unknown. The robots should cover
this spots as far as possible to do cleaning and sampling actions desir-
ably. It means that they should discover the spots cooperatively and
spread proportional to the spots area and avoid from remaining idle. We
proposed 4 self-organized distributed methods which are called hybrid
methods for coping with this scenario. In two different experiments the
performance of the methods is analyzed. We compared them with each
other and investigated their scalability and robustness in term of single
point of failure.
1 Introduction
Swarm robotics is a branch of robotic science which is inspired by social in-
sects and other nature colonies that show complex behavior although they have
simple members. Defining the roles of robots in society is one of the most im-
portant problems for simulating such behaviors. The action of assigning tasks
to agents for performing is called task allocation. Tasks are dependent to global
mission. If robots perform their tasks effectively this mission is performed ef-
fectively too. From a control architectural perspective Burger [3] distinguishes
between Heteronomous, Autonomous and Hybrid methods in task allocation. In
this paper, we introduce a practical scenario for the issue of task allocation in
swarm robotics and 4 hybrid methods for solving it in unknown environments
which, the number, locations and ratios of tasks are unknown to robots.
Market-based mechanism is one of the main approaches that tackle the task
allocation problem. TraderBots is one of the works in this subject that is pre-
sented by Dias [6]. In TraderBots the robots bid on tasks on the basis of cost and
it is given to a bidder with lowest cost. A comprehensive study of market-based
multi-robot coordination can be found in [7]. Most solutions in self-organized task
allocation is threshold-based that are inspired by models initially proposed to de-
scribe the behavior of insect societies [1]. In this case we can mention Krieger and
5
1
0
2
r
a
M
1
]
A
M
.
s
c
[
1
v
7
3
2
0
0
.
3
0
5
1
:
v
i
X
r
a
2
Aryo Jamshidpey and Mohsen Afsharchi
Billeter work [9] which benefits from a simple threshold-based model for task allo-
cation in a foraging scenario.Labella et al. [10] and Lui et al. [11,12] proposed two
probabilistic task allocation approaches which use adaptive thresholds.Brutschy
et al. in[2] presented a task allocation strategy in which robots specialize to per-
form tasks in the environment in a self-organized. Jones and Mataric [8] intro-
duced an adaptive distributed autonomous task allocation method for identical
robots. In this work a task allocation is called desirable in which the ratio of
robots that doing the same kind of task equal with the ratio of that task in the
environment. Dahl et al. [4] proposed a method that controls the group dynamics
of task allocation. In this work each robot can choose between two separated for-
aging cycles. Nouyan et al [13] presented autonomous rule-based task allocation
method in which robots attempting to identify and transfer a food to the nest
by using a set of rules and forming a chain in a self-organized way. Dasgupta [5]
presented a communication-based method for task allocation. Each task needs
multiple robots to be done. Robots can only partially complete tasks and one
after the other contribute to progressing them. Our proposed practical scenario
like Dasgupta's one is about unknown environments. The discussion part is ded-
icated for comparing these scenarios and their solutions and also stating their
differences.
2 Problem Definition
This scenario involves a colony of identical robots with limited energy levels that
are rechargeable and an environment full of obstacles and colored spots which
represent types of tasks.The individuals are unaware of the size of the population
and the distribution of other robots.At any moment, each robot is able to do
only one of the forage for green or forage for black subtasks.Depending on the
area of the spots, the number of robots to do cleaning and sampling actions in
them varies. Obviously it is not necessary to fill the whole capacity of spots with
robots. Even a robot is able to do cleaning and sampling actions on its own but
it takes much time and less desirable.In abstract the scenario can be defined
in terms of finding more colored spots with minimal energy waste. One of the
causes of this waste is unnecessary robot turns in the environment.Also there
are some other reasons for energy waste such as maximum spreading of robots
in different spots proportional to their area, avoiding robots from collision with
obstacles and finally preventing active robots from remaining idle.
3 Methods
In all proposed methods the robots are initially in random places. In each method
the energy level of each robot is divided into three parts. First part is for foraging.
Second part is to do cleaning and sampling actions and the third part is dedicated
for returning to the charging station, either nest or any other specified location.
All methods are organized based on transferring messages and all messages have
the same structure. Each message may have several rows that each of them
Task Allocation in Robotic Swarms
3
presents a distinct spots information. Information of each spot consists of 10
features which are as follows: A row is occupied or not, that is shown by 1 or
0 similarly. X, Y and Z coordinate of the current position of the robot in the
desired environment, which is calculated via GPS. The total capacity of the
existing spots (Number of robots required to do cleaning and sampling actions
in spots, which vary depending on the area of the discovered spot). The current
number of robots deployed in the desired spot. The number of robots needed
to complete the spot capacity. The number of hops (In order to estimate the
number of robots that have been informed of the discovered spot and to identify
the spots which expose to saturation and starvation). Time elapsed from the
beginning of the running of the code and finally color of the discovered spot
which are conventionally denoted by numbers (for example in our simple scenario
black and green are denoted by 0 and 1 respectively).
Message updating procedure is the same in all of proposed methods. Every
robot has a message that contains information about the spots, called private
message. This message is empty at first and then updated via occurrence of two
different events. First when a robot finds a non-observed spot for the first time,
and second when it receives a message from one of its neighbors:
1.when a robot explores a non-seen spot for the first time, it starts to calculate
the center of spot and also its area, computes its capacity based on the area and
calculate other features of message based on a pre-defined rule. It should be
considered that if a robot entered a spot under the guidance of another robot,
it would subtract the number of required robot field by one, add one unit to the
number of existing robots field and then set the current time as the row time
field.
2. In this situation two different tasks may exist for the receiver to do, one
is to add non existing rows to its message. The order of the updated message
is the same as sender's one and in every new row, hop count will be increased
by one. The other task is to replace existing rows according to the time field. If
the row associated with a specific spot that exists in both private and received
messages has greater time field in the received message, then it will be replaced
in the private message.
3.1 Static communication based method
This method is a hybrid method combining the autonomous and distributed
methods [3]. At the beginning, one of the two subtasks of exploring for green
or black spot is assigned to each robot which is called worker statically (With a
probability of 0.5). Static means that the assigned task will not change unless
the robot runs out of its searching energy.Each robot moves in the environment
by random walk and prevents collision with other robots, obstacles and walls
by the help of its distance computing sensors. Each robot updates its private
message periodically and floods it to every other robot in the coverage area of
its radio frequency transmitter. By this process, messages will propagate among
the robots (either deployed or searcher robots). If a robot could not find a match
(a spot with the same color of its associated subtask color) before running out
4
Aryo Jamshidpey and Mohsen Afsharchi
its searching energy, it would go to one of the spots in its private message. By
having this policy, our goals for preventing idle robots existence, maximum spot
coverage and also preventing spot starvation will be guaranteed in a desirable
level.
The use of desirable word is due to the energy limitation and also the heuristic
sense of the scenario. Therefore we proposed a method for trap prevention by
partitioning robot energy and then searching the environment for the best spot
while some amount of energy exists and also the robot reaches the best possible
spot (the first seen spot by a robot is not necessarily the best spot for it, so it
will search for a suitable spot until it runs out of searching energy). At the end
the robot reaches the decision step that is as follow:
Appropriate spot selection decision making. One of the advantages of the
proposed method is the way it decides to walk to the most appropriate spot.
As the searching energy of one robot reaches its threshold, the robot starts the
decision making step. At this time the robot should sort its private message
based on three fields; color, hop count and its current distance from the spots.
At first this sort is done based on color field, so that spots with the same color
as the robot current state will be placed at the top. Now the sorted list has two
parts, one for the same colors as the subtask color and another for opposite colors
to it. Then these lists are sorted based on the hop field. Each sorted list then will
be categorized according to sets of 5 hops (number of hops per category should
be set based on the spots area and count in the environment). The reason for
using this parameter is to prevent spot starvation and saturation. When a robot
finds out that the hop count of a spot is large, it estimates that at most one less
than the hop count robots are aware and can reach the spot before it. Hence the
robot considers the spot may get saturated. Robots prefer to go to spots with
low hop number to prevent starvation. In the third step the sorted list based on
color and hop count will be further sorted based on Euclidean distance. So in
each hop category, spots are sorted based on their distance from the robot.
If a robot in its decision step observes a spot with the same color of its
assigned color while transferring to its appropriate spot, it will explore the spots
features. If the spot is suitable for the robot and if saturation will not occur,
current spot will be accepted by the robot and necessary updates will be done. It
is possible that before a robot reaches to its highest priority spot, the capacity of
that becomes full. In this case the robot will be aware of this occurrence by the
messages received from other deployed robots in that spot. It will leave the spot
and will begin to make another decision from its private list. We can consider
an integer threshold in such cases. Robots will try to make decision until the
threshold. If a robot cannot find a suitable spot in its decision step before the
threshold, it will return to home or the nearest charge station to be recharged
and then starts to search again. The state diagram of the robots controller while
using this method is shown in figure 1.
Task Allocation in Robotic Swarms
5
Fig. 1. Method1 and Method 2 (by considering the dark green state which is shown
by dashed border) state diagram.
3.2 Dynamic communication based method
This method (figure 1) is similar to the first method in a way that it supports
dynamic task allocation in such a way that the robot will change its target color
probabilistically after a time step. For example consider that a robot has 4 spots
in its private list after 100 iterations containing 1 black and 3 green. Then the
robot will set its target color to black by probability and also will set it to
green by probability . This is why we expect this method to be better than
the previous one, because in this method the searching time for each robot to
find the appropriate spot may be decreased. if the robots are not distributed
uniformly in the environment at the beginning, it is possible that some spots
are not discovered after a small time steps (100 time steps). This is due to their
large distances from the initial places of the robots and also attitude changing
mechanism of the robots.
3.3 Decentralized Chapar Method
In this method we have some radio turrets called Chapar stations which are used
for radio communications and also we assume two groups of robots; workers (as
defined in the previously explained methods) and Chapars that transfer messages
between workers and Chapar stations. "Chapar Khaneh" or "Chapar-Khaneh" is
a term in Persian, meaning the "house of courier" as "Chapar" means "courier",
referring to the postal service used during the Achaemenid era [14]. Here we
used Chapar station instead of Chapar-khaneh.
High speed robots with simple structure are considered as Chapars. Chapars
flood their updated private message that is modified by some workers to the area
of their radio frequency coverage. Once a Chapar realizes a new row in its private
message (showing that a new spot has been discovered) it quickly goes to the
nearest Chapar station and sends its private message to it and also updates the
6
Aryo Jamshidpey and Mohsen Afsharchi
Fig. 2. Left: Method 4 State Diagram, Right: Method 3 State dDiagram.
message based on the content of the messages sent by the Chapar stations. In
addition each Chapar goes to the nearest Chapar station periodically (e.g. each
100 time steps) to update its private message and access to the most recently
information about the status of the spots.
Chapar stations are also in the coverage of each other and so they replicate
messages to keep the whole system up to date. In the simplest variation of this
model, there could be only one Chapar station whit limited coverage area. To
achieve high performance with the lowest cost, this method needs to coordinate
Chapar stations in a manner that their communication radiuses cover each other
sequentially. Although this method has a higher message transfer speed with
respect to the first and second methods, but it needs radio frequency transmitters
with higher coverage area and also in large environments it needs more Chapar
stations. Nevertheless, this method can perform fine even if Chapar stations
are not in the coverage area of each other. In this situation the messages may
not be similar in all Chapar stations but we can assume the environment as
some sub-environments each with a single Chapar station that can transform
messages with high speed. In a timely manner the information of one area may
be transferred to another area by Chapars. The state diagram of the Chapars
controller while using this method is shown in figure 2.
3.4 Centralized Chapar Method
This method (figure 2) is similar to the decentralized one in which there is
only one Chapar station that covers the entire environment. In this, method
Chapars have a single task to transfer messages from robots to the Chapar
station and they do it once they realize a new row in their private messages.
When the Chapar station receives a message that is not similar to its private
message, it updates the private message and sends it to all robots. To prevent
the Chapar station from single point of failure, in addition to message updating
by Chapars, they should transfer message in the environment quickly. In spite
of the centralized method, each Chapars only goes to the Chapar station when
Task Allocation in Robotic Swarms
7
it encounters a new spot in its private message. It should be reminded that the
robots used in the third and fourth methods, have the same behavior as the
robots that were used for one of the first or second method (optionally) and as
explained before, their behavior are the same as one of them.
4 Simulations
We have used e-puck robots in simulations which are extended by color detection
Infrared sensors, positioning module, compass and limited-range radio waves
emitter and receiver. Since the purpose of this article is to involve a wide range of
robots and the use of simpler hardware, we considered them without any camera.
In this way the methods can show their power in using of blind robots. All
experiments have been implemented in a 3m x 3m square environment enclosed
with walls by using of Webots as robotic simulation software. In two general
experiments, performance of the four proposed methods is evaluated individually
before and after energy consumption and in both of them 10 robots which are
called workers with IDs from 1 to 10 are used. Initially foraging mode of the
robots with IDs from 1 to 5 is adjusted to green and the robots with IDs from
6 to 10 is adjusted to black.
Further more, the speed of each method is determined by its foraging(searching)
energy threshold, hence setting the threshold is very important. It should not be
so low that the robot does not have enough time for foraging and also it should
not be so high that robots use their whole energy without any success or much
of it which in this case its performance will be reduced when it deploys in a
spot. Some factors such as area of environment, ratios of tasks, density of tasks
and the number of robots can help us to determine an appropriate value for this
parameter. In all of our experiments, the energy threshold level is considered as
250 iterates of each robots control code.
For simplicity, the details of cleaning and sampling operations are ignored,
the colored spots are considered as 30cm x 30cm squares and finally the length
of each robots communication radius is considered larger than the diameter of
each colored square. In both experiments, for each 300 square centimeters of
each spot one worker is sufficient for covering it desirably, which means that all
spots are covered desirably with 3 workers. Indeed as mentioned previously, with
less number of workers spot covering is also possible, but with lower speed.
4.1 First experiment: performance evaluation of proposed methods
before the threshold energy
Since the third and fourth methods use the worker robot which its controller is
that of the first or second method, it is not necessary to compare the performance
of all methods before foraging energy consumption (before the threshold).So we
have compared only the performance of the first and second methods before the
threshold. For this purpose four environments covered by green and black spots
and also containing obstacles are considered. The first environment has 3 green
8
Aryo Jamshidpey and Mohsen Afsharchi
Fig. 3. Right: Average number of successful robots before the threshold. Left:Average
number of discovered spots.
spots and 3 black ones, the second has 4 green spots and 2 black ones, the third
includes 5 green spots and 1 black ones and finally the fourth contains only 6
green spots. In each of the four areas, both the first and second methods are
tested 10 times separately. The average number of successful robots before the
energy threshold for the fist and second methods is shown in figure 3 (right).
It can be seen that, except for the first environment in which the average
number of successful robots before the threshold are equal for both methods,
in other environments, the average number of successful robots in the second
method is higher than the first one. This disparity grows by moving from the
first environment to the fourth and its reason is the changing attitude mechanism
which is used by second method's robots during their foraging operation. As
a result this leads to increasing in the number of robots which their attitude
changes when the number of green spots rise and the number of black ones
falls respectively. Subsequently this process will result in forming approximate
stability in the number of successful robots before the threshold. As it is shown
in figure 3 (right), we can conclude that in unknown environments where the
number of colored spots (black and green in our example) and the ratios of them
are unknown, the second method is more successful than the first one in terms
of the robots' attempts in finding spots by themselves before energy threshold.
In the next step the average number of green spots that have been found by
workers(by both the first and the second methods) before the threshold is shown
in figure 3 (left). In this figure the obtained curve from the second method is
steeper than the first methods one. Its primary reason is increasing the number
of green spots and decreasing the black ones which results in increasing the
probability of finding new green spots in both methods. But the reason that the
second methods curve is more steeper, is increasing of the number of workers
which search for green spots during the search time. As mentioned before this
is because of changing the robots attitudes during foraging operations. Figure 3
(left) shows that in unknown environments where the number of colored spots
(black and green in our example) and their ratios are unknown, the second
Task Allocation in Robotic Swarms
9
method is more successful than the first one in spot finding before the energy
threshold.
Figure 4 (right) shows the average number of robots deployed in the green
spots before the end of the foraging energy in both the first and second methods.
It can be observed that the steepness of the second methods curve is ascending
linear but the steepness of the first methods curve is sub linear. In the first
method the maximum number of robots in green spots is 5 because only 5
robots have green initial foraging modes and there is no any changing attitude
mechanism before threshold. But in the second method there is changing attitude
mechanism and so the maximum number of robots in green spots might be 10
and this means the whole colony. We can conclude that in unknown environments
where the number of colored spots (black and green in our example) and the
ratios of them are unknown, adaptability has a significant positive impact on
the performance of robots. As it can be observed, the second method is more
successful than the first one in the average number of robots which have deployed
in the green spots before the threshold. To sum up, from the above results in
unknown environments with the features which are mentioned above, the second
method is more efficient than the first one before the energy threshold.
4.2 Second experiment: performance evaluation of proposed
methods after the threshold energy
We use an environment consisting of 3 green spots and 3 black ones for evaluat-
ing the performance of the methods after foraging energy consumption. In this
area, all proposed methods are separately tested 10 times with random initial
distribution of robots. In the third and fourth methods, in addition to 10 workers,
another 3 Chapar robots that are faster than the workers are used too. It should
be mentioned about Chapar station that the third method is equipped with 3
Chapar stations which their communication radius cover each other sequentially
and the fourth method is equipped with one of them, which is omniscient. Figure
4 (left) shows the results of the second experiment in abstract. The absorption
percentage is the percentage of successfulness of finding spots by robots after
the threshold by applying the decision making mechanism.
As expected, the fourth method has the highest absorption percentage which
means 100%. This is due to the use of global message transferring system. The
third method is in second place with 87.09% and after it the first and the second
methods with approximate absorption 76% are both in third place. It should be
reminded that both of the first and second methods have the same communi-
cation mechanism. Higher speed in communicating will lead to making a better
task selection based on their colors, distances and number of hops by unsuccess-
ful workers. It results in a better robot distribution that reduces saturation and
starvation as far as possible. It also causes more unsuccessful robots attract to
the spots.
10
Aryo Jamshidpey and Mohsen Afsharchi
5 Discussion
Most studies in swarm robotic define their own test scenario, which is then
used to build a concrete swarm robotic system capable of solving the problem.
This leads to a huge amount of differently designed global missions and as a
result to many different solutions which are hard to compare[3]. Thus in most of
the proposed methods in this area, researchers have only introduced their own
methods and refrained from comparing with other methods. Our scenario also
possesses different features, goals and finally distinct global foraging mission
compared to previous scenarios in task allocation field. Accordingly applying
current approaches in our scenario and consequently comparing them with each
other is so difficult and in most of the times is impossible, except for changing the
scenario which in turn leads to changing both the problem and the solutions. As
pointed out before, Dasgupta's method is practical for unknown environments
with this difference that its global mission is different from what have been
proposed here. However our proposed methods have distinct advantageous over
Dasgupta's.
The proposed methods have the least waste time for robots as apposed to
that of Dasgupta in which, robots might be idle in environment for a long time.
These methods have been designed for the energy constrained scenario compared
to Dasgupta's. Consequently the priority of discovering new spots is higher than
accomplishing a task and then continuing unlimited foraging. Further more in
contrast with Dasgupta's method(which robots may be in idle mode for a long
time) our methods are close to optimal in the sense of idle mode.
On the other hand, our approaches are very practical for scenarios which
detecting a task should be done in a limited time. However in Dasgupta's ap-
proach, since after detecting a task other neighbor robots quit foraging and wait
for accomplishing the task sequentially, the probability of identifying other tasks
in a limited time will decrease. Moreover the proposed methods in this paper are
practical for blind robots while Dasgupta's method is practical for robots with
cameras which ignoring use of them obviously reduces cost in swarm robotics.
Also there is no more need to apply sophisticated techniques of machine vision
in order to determine starvation (which may have some errors).
5.1 Scalability and Robustness in term of single point of failure
In this section, we will analyze the scalability and robustness of the proposed
methods with respect to their efficiency. If by adding or removing robots the
performance of a method drops off, we will call it unscalable. Accordingly, both
the first and second methods are scalable because both are distributed, au-
tonomous and based on the local communication. So Adding or removing robots
will maintain their effectiveness. The decentralized Chapar method also has scal-
ability property. This is due to using of the limited range Chapar station, the
worker robots and the Chapar robots that are distributed and behave locally.
But the centralized Chapar method, due to using of omniscient Chapar station
with respect to its expected efficiency does not have scalability property.
Task Allocation in Robotic Swarms
11
Fig. 4. Left:Results for the second experiment.Right:Average number of robots de-
ployed in green spots.
With respect to robustness, the first and second methods are completely
robust against single point of failure because they behave in a distributed and
autonomous manner. If a robot fails outside a spot, others will consider it as an
obstacle. If it fails inside a spot and before announcing the center of it, there is
no problem because it looks like the situation in which the spot is not discovered
yet. But if it fails after the center announcement, it causes only decreasing in
speed of the operations in the spot, because they can be carried out by other
active robots on the spot yet.
The third method is less robust. The strength of the method for worker
robots is such as the first and second methods. In the case of Chapar robots
failures, there will be not any problem because in the worst case the speed of
communication will be reduced and other robots largely compensate this loss.
But about Chapar station as we have mentioned previously in describing the
method to benefit the high-speed informing relative to the cost, it is necessary
that their communication radius cover each other sequentially. Thus, if one of
Chapar stations fails, the connection between two parts of the environment will
be lost. Of course this problem can be solved by putting more than two Cha-
par stations in their each other communication ranges, but in this way costs
will increase. It can be said that this method is robust against single point of
failure. But this robustness is less than the first two methods (with respect to
maintaining the efficiency of the method). Centralized Chapar method has the
lowest robustness than the previous three methods because this method is only
have a wide range Chapar station. So if this Chapar station fails for any reason,
the efficiency of the method will be reduced so much.
6 Conclusions
In this paper a new practical scenario in swarm robotics is presented which is
about task allocation in unknown environments. Here we consider that there
12
Aryo Jamshidpey and Mohsen Afsharchi
is limited source of energy for each Robot. It is pointed out that energy man-
agement in the form of a 3 level structure is essential and four self-organized
threshold-based methods are proposed for solving the scenario.
Moreover, in two general experiments, the performance of them is analyzed.
From the results of simulations we can conclude that the second method is
more efficient in comparison to the first one before the threshold and so the
performance of the third and the fourth methods will increase by applying it
as their worker robot's algorithm. However, since the methods are using similar
communication mechanisms, they have almost the same performance after the
threshold.
As a result, from performance point of view, the fourth method has the
highest performance, followed by the third method which in turn, has higher
rank than the two others. The second method also is better than the first one
in this criteria. On the other hand, from scalability and robustness perspective,
both first and second methods have higher rank than the two others and further
more the third method has higher rank than the fourth.
References
1. Bonabeau, E., Dorigo, M., Theraulaz, G. (1999). Swarm intelligence: From natural
to artificial systems: Oxford university press.
2. Brutschy, A., Tran, N. L., Baiboun, N., Frison, M., Pini, G., Roli, A., Birattari,
M. 2012. Costs and benefits of behavioral specialization. Robotics and autonomous
systems, 60(11), 1408-1420.
3. Burger, M. 2012. Mechanisms for Task Allocation in Swarm Robotics (Doctoral
dissertation, Diploma thesis, Ludwig-Maximilians-Universitt Mnchen).
4. Dahl, T. S., Matari, M., Sukhatme, G. S. 2009. Multi-robot task allocation through
vacancy chain scheduling. Robotics and Autonomous Systems, 57(6), 674-687.
5. Dasgupta, P. 2011. Multi-robot task allocation for performing cooperative forag-
ing tasks in an initially unknown environment. In Innovations in Defence Support
Systems-2 (pp. 5-20). Springer Berlin Heidelberg.
6. Dias, M. B. 2004. Traderbots: A new paradigm for robust and efficient multirobot
coordination in dynamic environments (Doctoral dissertation, Carnegie Mellon Uni-
versity).
7. Dias, M. B., Zlot, R., Kalra, N., Stentz, A. 2006. Market-based multirobot coordi-
nation: A survey and analysis. Proceedings of the IEEE, 94(7), 1257-1270.
8. Jones, C., Mataric, M. J. 2003. Adaptive division of labor in large-scale minimalist
multi-robot systems. In Intelligent Robots and Systems, 2003.IROS 2003. Proceed-
ings. 2003 IEEE/RSJ International Conference on (Vol. 2, pp. 1969-1974). IEEE.
Integration. Technical report, Global Grid Forum (2002)
9. Krieger, M. J., Billeter, J. B. 2000. The call of duty: Self-organised task allocation
in a population of up to twelve mobile robots. Robotics and Autonomous Systems,
30(1), 65-84.
10. Labella, T. H. 2007. Division of labour in groups of robots (Doctoral dissertation,
Ph. D. thesis, Universite Libre de Bruxelles).
11. Liu, W., Winfield, A., Sa, J., Chen, J., Dou, L. 2007. Strategies for energy opti-
mization in a swarm of foraging robots. In Swarm robotics (pp. 14-26). Springer
Berlin Heidelberg.
Task Allocation in Robotic Swarms
13
12. Liu, W., Winfield, A. F., Sa, J., Chen, J.,Dou, L. 2007. Towards energy optimiza-
tion: Emergent task allocation in a swarm of foraging robots. Adaptive Behavior,
15(3), 289-305.
13. Nouyan, S., Gro, R., Bonani, M., Mondada, F., Dorigo, M. 2009. Teamwork in self-
organized robot colonies. Evolutionary Computation, IEEE Transactions on, 13(4),
695-711.
14. Wikipedia, Chapr Khaneh, http://www.en.wikipedia.org/wiki/Chapar_Khaneh
|
1309.3197 | 2 | 1309 | 2013-10-22T13:39:51 | Inducing Honest Reporting Without Observing Outcomes: An Application to the Peer-Review Process | [
"cs.MA",
"cs.AI",
"cs.DL",
"math.ST",
"math.ST"
] | When eliciting opinions from a group of experts, traditional devices used to promote honest reporting assume that there is an observable future outcome. In practice, however, this assumption is not always reasonable. In this paper, we propose a scoring method built on strictly proper scoring rules to induce honest reporting without assuming observable outcomes. Our method provides scores based on pairwise comparisons between the reports made by each pair of experts in the group. For ease of exposition, we introduce our scoring method by illustrating its application to the peer-review process. In order to do so, we start by modeling the peer-review process using a Bayesian model where the uncertainty regarding the quality of the manuscript is taken into account. Thereafter, we introduce our scoring method to evaluate the reported reviews. Under the assumptions that reviewers are Bayesian decision-makers and that they cannot influence the reviews of other reviewers, we show that risk-neutral reviewers strictly maximize their expected scores by honestly disclosing their reviews. We also show how the group's scores can be used to find a consensual review. Experimental results show that encouraging honest reporting through the proposed scoring method creates more accurate reviews than the traditional peer-review process. | cs.MA | cs |
Inducing Honest Reporting Without Observing Outcomes:
An Application to the Peer-Review Process
Arthur Carvalho
University of Waterloo
[email protected]
Stanko Dimitrov
University of Waterloo
[email protected]
Kate Larson
University of Waterloo
[email protected]
May 11, 2014
Abstract
When eliciting opinions from a group of experts, traditional devices used to promote hon-
est reporting assume that there is an observable future outcome. In practice, however, this as-
sumption is not always reasonable. In this paper, we propose a scoring method built on strictly
proper scoring rules to induce honest reporting without assuming observable outcomes. Our
method provides scores based on pairwise comparisons between the reports made by each
pair of experts in the group. For ease of exposition, we introduce our scoring method by illus-
trating its application to the peer-review process. In order to do so, we start by modeling the
peer-review process using a Bayesian model where the uncertainty regarding the quality of
the manuscript is taken into account. Thereafter, we introduce our scoring method to evaluate
the reported reviews. Under the assumptions that reviewers are Bayesian decision-makers and
that they cannot influence the reviews of other reviewers, we show that risk-neutral reviewers
strictly maximize their expected scores by honestly disclosing their reviews. We also show
how the group’s scores can be used to find a consensual review. Experimental results show
that encouraging honest reporting through the proposed scoring method creates more accurate
reviews than the traditional peer-review process.
1 Introduction
In the absence of a well-chosen incentive structure, experts are not necessarily honest when re-
porting their opinions. For example, when reporting subjective probabilities, experts who have a
reputation to protect might tend to produce forecasts near the most likely group consensus, whereas
experts who have a reputation to build might tend to overstate the probabilities of outcomes they
feel will be understated in a possible consensus [Nakazono, 2013]. Hence, an important question
when eliciting experts’ opinions is how to incentivize honest reporting.
Proper scoring rules [Winkler and Murphy, 1968] are traditional devices that incentivize hon-
est reporting of subjective probabilities, i.e., experts maximize their expected scores by honestly
reporting their opinions. However, proper scoring rules rely on the assumption that there is an ob-
servable future outcome, which is not always a reasonable assumption. For example, when market
analysts provide sales forecasts on a potential new product, there is no guarantee that the product
will ever be produced. Hence, the actual number of sales may never be observed.
In this paper, we propose a scoring method for promoting honest reporting amongst a group
of experts when future outcomes are unobservable.
In particular, we are interested in settings
where experts observe signals from a multinomial distribution with an unknown parameter. Honest
reporting then means that experts report exactly the signals that they observed. Our scoring method
is built on proper scoring rules. However, different than what is traditionally assumed in the proper
1
scoring rules literature, our method does not assume that there is an observable future outcome.
Instead, scores are determined based on pairwise comparisons between experts’ reported opinions.
The proposed method may be used in a variety of settings, e.g., strategic planning, reputation
systems, peer review, etc. When applied to strategic planning, the proposed method may induce
honest evaluation of different strategic plans. A strategic plan is a systematic and coordinated
way to develop a direction and a course for an organization, which includes a plan to allocate the
organization’s resources [Argenti, 1968]. After a candidate strategic plan is discarded, it becomes
nearly impossible to observe what would be the consequences of that plan because strategic plans
are long-term in nature. Hence, a method to incentivize honest evaluations of candidate strategic
plans cannot assume that the result of a strategic plan is observable in the future.
Our method can also be applied to reputation systems to elicit honest feedback. In reputation
systems, individuals rate a product/service after experiencing it, e.g., customer product reviews on
Amazon.com are one such reputation system. Due to the subjective nature of this task, incentives
for honest feedback should not be based on the assumption that an absolute rating exists.
For ease of exposition, we introduce our scoring method by illustrating its application to a
domain where traditionally there are no observable outcomes: the peer-review process. Peer re-
view is a process in which an expert’s output is scrutinized by a number of other experts with
relevant expertise in order to ensure quality control and/or to provide credibility. Peer review is
commonly used when there is no objective way to measure the output’s quality, i.e., when qual-
ity is a subjective matter. Peer review has been widely used in several professional fields, e.g.,
accounting [AICPA: American Institute of CPAs, 2012], law [LSC: Legal Services Commission,
2005], health care [Dans, 1993], etc.
Currently, a popular application of the peer-review process is in online education. Recent years
have seen a surge of massive online open courses, i.e., free online academic courses aimed at large-
scale participation. Some of these courses have attracted tens of thousands of students [Pappano,
2012]. One of the biggest challenges faced by online educators brought by this massive number
of students is the grading process since the available resources (personnel, time, etc.) is often
insufficient. Auto-grading by computers is not always feasible, e.g., courses whose assignments
consist of essay-style questions and/or questions that do not have clear right/wrong answers. Peer
review has been used by some companies like Coursera1 as a way to overcome this issue.
For simplicity’s sake, we focus on peer review as used in modern scientific communication.
The process, as we consider in this paper, can be described as follows: when a manuscript first
arrives at the editorial office of an academic journal, it is first examined by the editor, who might
reject the manuscript immediately because either it is out-of-scope or because it is of unacceptable
quality. Manuscripts that pass this first stage are then sent out to experts with relevant expertise
who are usually asked to classify the manuscript as publishable immediately, publishable after
some revisions, or not publishable at all. Traditionally, the manuscript’s authors do not know the
reviewers’ identities, but the reviewers may or may not know the identity of the authors.
In other words, peer review can be seen as a decision-making process where the reviewers
serve as cognitive inputs that help a decision maker (chair, editor, course instructor, etc.) judge
the quality of a peer’s output. A crucial point in this process is that it greatly depends on the
reviewers’ honesty.
In the canonical peer-review process, reviewers have no direct incentives
for honestly reporting their reviews. Several potential problems have been discussed in different
research areas, e.g., bias against female authors, authors from minor institutions, and non-native
English writers [Bornmann et al., 2007, Wenneras and Wold, 1997, Primack and Marrs, 2008,
Newcombe and Bouton, 2009].
In order to illustrate the application of our method to peer review, we start by modeling the
peer-review process as a Bayesian model so as to take the uncertainty regarding the quality of
1http://www.coursera.org/
2
the manuscript into account. We then introduce our scoring method to evaluate reported reviews.
We assume that the scores received by reviewers are somehow coupled with relevant incentives,
be they social-psychological, such as praise or visibility, or material rewards through prizes or
money. Hence, we naturally assume that reviewers seek to maximize their expected scores and
that there are no external incentives. We show that reviewers strictly maximize their expected
scores by honestly disclosing their reviews under the additional assumptions that they are Bayesian
decision-makers and that they cannot influence the reviews of other reviewers.
Honesty is intrinsically related to accuracy in our peer-review model: as the number of honest
reviews increases, the distribution of the reported reviews converges to the probability distribution
that represents the quality of the manuscript. We performed peer-review experiments to validate
the model and to test the efficiency of the proposed scoring method. Our experimental results cor-
roborate our theoretical model by showing that the act of encouraging honest reporting through the
proposed scoring method creates more accurate reviews than the traditional peer-review process,
where reviewers have no direct incentives for expressing their true reviews.
In addition to our method for inducing honest reporting, we also propose a method to aggregate
opinions that uses information from experts’ scores. Our aggregation method is general in a sense
that it can be used in any decision-making setting where experts report probability distributions
over the outcomes of a discrete random variable. The proposed method works as if the experts
were continuously updating their opinions in order to accommodate the expertise of others. Each
updated opinion takes the form of a linear opinion pool, where the weight that an expert assigns to
a peer’s opinion is inversely related to the distance between their opinions. In other words, experts
are assumed to prefer opinions that are close to their own opinions, where closeness is defined
by an underlying proper scoring rule. We provide conditions under which consensus is achieved
under our aggregation method and discuss a behavioral foundation of it. Using data from our peer-
review experiments, we find that the consensual review resulting from the proposed aggregation
method is consistently more accurate than the canonical average review.
2 Related Work
In recent years, two prominent methods to induce honest reporting without the assumption of
observable future outcomes were proposed: the Bayesian truth serum (BTS) method [Prelec, 2004]
and the peer-prediction method [Miller et al., 2005].
The BTS method works on a single multiple-choice question with a finite number of alterna-
tives. Each expert is requested to endorse the answer mostly likely to be true and to predict the
empirical distribution of the endorsed answers. Experts are evaluated by the accuracy of their pre-
dictions as well as how surprisingly common their answers are. The surprisingly common criterion
exploits the false consensus effect to promote truthfulness, i.e., the general tendency of experts to
overestimate the degree of agreement that the others have with them.
The score received by an expert from the BTS method has two major components. The first
one, called the information score, evaluates the answer endorsed by the expert according to the
log-ratio of its actual-to-predicted endorsement frequencies. The second component, called the
prediction score, is a penalty proportional to the relative entropy between the empirical distribu-
tion of answers and the expert’s prediction of that distribution. Under the BTS scoring method,
collective honest reporting is a Bayes-Nash equilibrium.
The BTS method has been used to promote honest reporting in many different domains, e.g.,
when sharing rewards amongst a set of experts [Carvalho and Larson, 2011] and in policy anal-
ysis [Weiss, 2009]. However, the BTS method has two major drawbacks. First, it requires the
population of experts to be large. Second, besides reporting their opinions, experts must also
make predictions about how their peers will report their opinions. While the artificial intelligence
3
community has recently addressed the former issue [Witkowski and Parkes, 2012, Radanovic and
Faltings, 2013], the latter issue is still an intrinsic requirement for using the BTS method.
The drawbacks of the BTS method are not shared by the peer-prediction method [Miller et al.,
2005]. In the peer-prediction method, a number of experts experience a product and rate its quality.
A mechanism then collects the ratings and makes payments based on those ratings. The peer-
prediction method makes use of the stochastic correlation between the signals observed by the
experts from the product to achieve a Bayes-Nash equilibrium where every expert reports honestly.
A major problem with the peer-prediction method is that it depends on historical data. For
example, when applied to a peer-review setting, after a reviewer i reports his review, say ri, the
mechanism then estimates reviewer i’s prediction of the review reported by another reviewer j,
P (rjri), which is then evaluated and rewarded using a proper scoring rule and reviewer j’s actual
reported review. The mechanism needs to have a history of previously reported reviews for com-
puting P (rjri), which is not always a reasonable assumption, e.g., when the evaluation criteria
may change from review to review and when the peer-review process is being used for the first
time. In other words, the peer-prediction method is prone to cold-start problems.
Carvalho and Larson [2012] addressed this issue by making the extra assumption that experts
have uninformative prior knowledge about the distribution of the observed signals. Given this
assumption, honest reporting is induced by simply making pairwise comparisons between reported
opinions and rewarding agreements. In this paper, we extend the method by Carvalho and Larson
[2012] in several ways. First, we show that the assumption of uninformative priors is unnecessary
as long as experts have common prior distributions and this fact is common knowledge. Moreover,
we provide stronger conditions with respect to the underlying proper scoring rule under which
pairwise comparisons induce honest reporting.
Another contribution of our work is a method to aggregate the reported opinions into a sin-
gle consensual opinion. Over the years, both behavioral and mathematical methods have been
proposed to establish consensus [Clemen and Winkler, 1999]. Behavioral methods attempt to
generate agreement through interaction and exchange of knowledge. Ideally, the sharing of infor-
mation leads to a consensus. However, behavioral methods usually provide no conditions under
which experts can be expected to reach an agreement. On the other hand, mathematical aggre-
gation methods consist of processes or analytical models that operate on the reported opinions in
order to produce a single aggregate opinion. DeGroot [1974] proposed a model which describes
how a group of experts can reach agreement on a consensual opinion by pooling their individual
opinions. A drawback of DeGroot’s method is that it requires each expert to explicitly assign
weights to the opinions of other experts. In this paper, we propose a method to set these weights
directly which takes the scores received by the experts into account. We also provide a behavioral
interpretation of the proposed aggregation method.
A related method for finding consensus was proposed by Carvalho and Larson [2013]. Under
the assumption that experts prefer probability distributions close to their own distributions, where
closeness is measured by the root-mean-square deviation, the authors showed that a consensus
is always achieved. Moreover, if risk-neutral experts are rewarded using the quadratic scoring
rule, then the assumption that experts prefer probability distributions that are close to their own
distributions follows naturally. The approach in this paper is more general because the underlying
proper scoring rule can be any bounded proper scoring rule.
From an empirical perspective, we investigate the efficiency of both our scoring method and
our method for finding consensus in a peer-review experiment. Formal experiments involving
peer review are still relatively scarce. Even though the application of the peer-review process to
scientific communication can be traced back almost 300 years, it was not until the early 1990s that
research on this matter became more intensive and formalized [van Rooyen, 2001]. Scientists in
the biomedical domain have been in the forefront of research on the peer-review process due to
4
the fact that dependable quality-controlled information can literally be a matter of life and death
in this research field.
In particular, the staff of the renowned BMJ, formerly British Medical
Journal, have been studying the merits and limitations of peer review over a number of years
[Lock, 1985, Godlee et al., 2003]. Most of their work has focused on defining and evaluating
review quality [van Rooyen et al., 1999], and examining the effect of specific interventions on the
quality of the resulting reviews [van Rooyen, 2001].
One mechanism used to prevent bias in the peer-review process is called double-blind review,
which consists of hiding both authors and reviewers’ identities. Indeed, it has been reported that
such a practice reduces bias against female authors [Budden et al., 2008]. However, it can be
argued that knowing the authors’ identities makes it easier for the reviewers to compare the new
manuscript with previously published papers, and it also encourages the reviewers to disclose con-
flicts of interest. Another argument that undermines the benefits of double-blind reviewing is that
the authorship of the manuscript is often obvious to a knowledgeable reader from the context, e.g.,
self-referencing, research topic, writing style, working paper repositories, seminars, etc. [Falagas
et al., 2006, Justice et al., 1998, Yankauer, 1991]. Furthermore, this mechanism does not prevent
against certain types of bias, e.g., when a reviewer rejects new evidence or new knowledge because
it contradicts established norms, beliefs or paradigms.
Some work has focused on the calibration aspect of peer review. Roos et al. [2011] proposed a
maximum likelihood method for calibrating reviews by estimating both the bias of each reviewer
and the unknown ideal score of the manuscript. Bias is treated as the general rigor of a reviewer
across all his reviews. Hence, Roos et al.’s method does not attempt to prevent bias by rewarding
honest reporting. Instead, it adjusts reviews a posteriori so that they can be globally comparable.
Instead of calibrating reviews a posteriori, Robinson [2001] suggested to “calibrate” review-
ers a priori. Reviewers are first asked to review short texts that have gold-standard reviews, i.e.,
reviews of high quality provided by experts with relevant expertise. Thereafter, they receive cali-
bration scores, which are later used as weighting factors to determine how well their future reviews
will be considered. This approach, however, does not guarantee that reviewers will report honestly
after the calibration phase, when gold-standard reviews are no longer available.
To the best of our knowledge, our peer-review experiments are the first to investigate the use of
incentives for honest reporting in a peer-review task. When objective verification is not possible,
as in the peer-review process, economic measures may be used to encourage experts to honestly
disclose their opinions. The proposed scoring method does so by making pairwise comparisons
between reported reviews and rewarding agreements.
Rewarding experts based on pairwise comparisons has been empirically proven to be an ef-
fective incentive technique in other domains. Shaw et al. [2011] measured the effectiveness of a
collection of social and financial incentive schemes for motivating experts to conduct a qualitative
content analysis task. The authors found that treatment conditions that provided financial incen-
tives and asked experts to prospectively think about the responses of their peers produced more
accurate responses. Huang and Fu [2013] showed that informing the experts that their rewards will
be based on how similar their responses are to other experts’ responses produces more accurate
responses than telling the experts that their rewards will be based on how similar their responses
are to gold-standard responses. Our work adds to the existing body of literature by theoretically
and empirically showing that pairwise comparisons make the peer-review process more accurate.
5
3 The Basic Model
In our proposed peer-review process, a manuscript is reviewed by a set of reviewers N = {1, . . . , n},
with n ≥ 2. The quality of the manuscript is represented by a multinomial distribution2 Ω with
unknown parameter ω = (ω0, . . . , ωv), where v ∈ N+ represents the best evaluation score that the
manuscript can receive and ωk is the probability assigned to the evaluation score being equal to k.
Each reviewer is modeled as possessing a privately observed draw (signal) from Ω. Hence,
our model captures the uncertainty of the reviewers regarding the quality of the manuscript. We
extend the model to multiple observed signals in Section 5. We denote the honest review of each
reviewer i ∈ N by ti ∼ Ω, where ti ∈ {0, . . . , v}. Honest reviews are independent and identically
distributed, i.e., P (titj) = P (ti). We say that reviewer i is reporting honestly when his reported
review ri is equal to his honest review, i.e., ri = ti.
Reviews are elicited and aggregated by a trusted entity referred to as the center3, which is also
responsible for rewarding the reviewers. Let si be reviewer i’s review score after he reports ri.
We discuss how si is determined in Section 4. Review scores are somehow coupled with relevant
incentives, be they social-psychological, such as praise or visibility, or material rewards through
prizes or money. We make four major assumptions in our model:
1. Autonomy: Reviewers cannot influence other reviewers’ reviews, i.e., they do not know each
other’s identity and they are not allowed to communicate to each other during the reviewing
process.
2. Risk Neutrality: Reviewers behave so as to maximize their expected review scores.
3. Dirichlet Priors: There exists a common prior distribution over ω, i.e., P (ω). We assume
that this prior is a Dirichlet distribution and this is common knowledge.
4. Rationality: After observing ti, every reviewer i ∈ N updates his belief by applying Bayes’
rule to the common prior, i.e., P (ωti).
The first assumption describes how peer review is traditionally done in practice. The sec-
ond assumption means that reviewers are self-interested and no external incentives exist for each
reviewer. The third assumption means that reviewers have common prior knowledge about the
quality of the manuscript, a natural assumption in the peer-review process. We discuss the formal
meaning of such an assumption in the following subsection. The fourth assumption implies that
the posterior distributions are consistent with Bayesian updating, i.e.:
P (ωti) =
P (tiω)P (ω)
P (ti)
The last three assumptions imply that reviewers are Bayesian decision-makers. We note that
different modeling choices could have been used, e.g., models based on games of incomplete
information. Unlike our model, an incomplete-information game is often used when experts do not
know each other’s beliefs. To find strategic equilibria in such incomplete-information models, one
would need information about experts’ beliefs about each other’s private information. A Bayesian
structure could be used to model each expert’s beliefs about the others, and it would permit the
calculation of experts’ expected scores, which are maximized at equilibrium. However, the natural
autonomy assumption makes such a Bayesian structure unrealistic.
2We use the term multinomial distribution to refer to the generalization of the Bernoulli distribution for discrete
random variables with any constant number of outcomes. The parameter of this distribution is a probability vector that
specifies the probability of each possible outcome.
3We refer to a single reviewer as “he” and to the center as “she”.
6
3.1 Dirichlet Distributions
An important assumption in our model is that reviewers have Dirichlet priors over distributions of
evaluation scores. The Dirichlet distribution can be seen as a continuous distribution over param-
eter vectors of a multinomial distribution. Since ω is the unknown parameter of the multinomial
distribution that describes the quality of the manuscript, then it is natural to consider a Dirichlet
distribution as a prior for ω. Given a vector of positive integers, α = (α0, . . . , αv), that determines
the shape of the Dirichlet distribution, the probability density function of the Dirichlet distribution
over ω is:
where:
P (ωα) =
1
β(α)
v
Yk=0
ωαk−1
k
(1)
β(α) = Qv
(Pv
k=0(αk − 1)!
k=0 αk − 1)!
Figure 1 shows the above probability density when v = 2 for some parameter vectors α.
k=0 αk. The
probability vector E[ωα] = (E[ω0α], . . . , E[ωvα]) is called the expected distribution regarding
ω.
For the Dirichlet distribution in (1), the expected value of ωj is E[ωjα] = αi/Pv
An interesting property of the Dirichlet distribution is that it is the conjugate prior of the
multinomial distribution [Bernardo and Smith, 1994], i.e., the posterior distribution P (ωα, ti)
is itself a Dirichlet distribution. This relationship is often used in Bayesian statistics to estimate
hidden parameters of multinomial distributions. To illustrate this point, suppose that reviewer i
observes the signal ti = x, for x ∈ {0, . . . , v}. After applying Bayes’ rule, reviewer i’s posterior
distribution is P (ωα, ti = x) = P (ω(α0, α1, . . . , αx + 1, . . . αv)). Consequently, the new
expected distribution is:
, . . . ,
αx + 1
k=0 αk
1 +Pv
αv
k=0 αk(cid:19) (2)
1 +Pv
E[ωα, ti = x] =(cid:18)
α0
k=0 αk
,
1 +Pv
1 +Pv
α1
k=0 αk
, . . . ,
We call the probability vector in (2) reviewer i’s posterior predictive distribution regarding
ω because it provides the distribution of future outcomes given the observed data ti. With this
perspective, we regard the values α0, . . . , αv as “pseudo-counts” from “pseudo-data”, where each
αk can be interpreted as the number of times that the ωk-probability event has been observed
before.
Throughout this paper, we assume that reviewers have common prior Dirichlet distributions
and this fact is common knowledge, i.e., the value of α is initially the same for all reviewers. A
practical interpretation of this assumption is that reviewers have common prior knowledge about
the quality of the manuscript, i.e., reviewers have a common expectation regarding the quality of
arriving manuscripts.
By using Dirichlet distributions as priors, belief updating can be expressed as an updating
of the parameters of the prior distribution4. Furthermore, the assumption of common knowledge
4We note that other priors could have been used. However, the inference process would not necessarily be analyti-
cally tractable. In general, tractability can be obtained through conjugate distributions. Hence, another modeling choice
is to consider that evaluation scores follow a normal distribution with unknown parameters. Assuming exchangeability,
we can then use either the normal-gamma distribution or the normal-scaled inverse gamma distribution as the conjugate
prior [Bernardo and Smith, 1994]. The major drawback with this approach is that continuous evaluation scores might
bring extra complexity to the reviewing process.
7
Figure 1: Probability densities of Dirichlet distributions when v = 2 for different parameter
vectors. Left: α = (1, 1, 1). Center: α = (2, 1, 1). Right: α = (2, 2, 2).
allows the center to estimate reviewers’ posterior distributions based solely on their reported re-
views, a point which is explored by our proposed scoring method. Due to its attractive theoretical
properties, the Dirichlet distribution has been used to model uncertainty in a variety of different
scenarios, e.g, when experts are sharing a reward based on peer evaluations [Carvalho and Larson,
2012] and when experts are grouped based on their individual differences [Navarro et al., 2006].
4 Scoring Method
In this section, we propose a scoring method to induce honest reporting of reviews. The proposed
method is built on proper scoring rules [Winkler and Murphy, 1968].
4.1 Proper Scoring Rules
Consider an uncertain quantity with possible outcomes o0, . . . , ov, and a probability vector z =
(z0, . . . , zv), where zk is the probability value associated with the occurrence of outcome ok. A
scoring rule R(z, e) is a function that provides a score for the assessment z upon observing the
outcome oe, for e ∈ {0, . . . , v}. A scoring rule is called strictly proper when an expert receives his
maximum expected score if and only if his stated assessment z corresponds to his true assessment
q = (q0, . . . , qv) [Winkler and Murphy, 1968]. The expected score of z at q for a real-valued
scoring rule R(z, e) is:
Eq [R(z, e)] =
qe R(z, e)
v
Xe=0
8
Proper scoring rules have been used as a tool to promote honest reporting in a variety of do-
mains, e.g., when sharing rewards amongst a set of experts based on peer evaluations [Carvalho
and Larson, 2010, 2012], to incentivize experts to accurately estimate their own efforts to accom-
plish a task [Bacon et al., 2012], in prediction markets [Hanson, 2003], in weather forecasting
[Gneiting and Raftery, 2007], etc. Some of the best known strictly proper scoring rules, together
with their scoring ranges, are:
logarithmic: R(z, e) = log ze
(−∞, 0]
v
quadratic: R(z, e) = 2ze −
z2
k
[−1, 1]
(3)
spherical: R(z, e) =
[0, 1]
Xk=0
ze
k=0 z2
k
qPv
All the above scoring rules are symmetric, i.e., R((z0, . . . , zv), e) = R((zπ0, . . . , zπv ), πe),
for all probability vectors z = (z0, . . . , zv), for all permutations π on v + 1 elements, and for
all outcomes indexed by e ∈ {0, . . . , v}. We say that a scoring rule is bounded if R(z, e) ∈ R,
for all probability vectors z and e ∈ {0, . . . , v}. For example, the logarithmic scoring rule is
not bounded because it might return −∞ whenever the probability vector z contains an element
equal to zero, whereas both the quadratic and spherical scoring rules are always bounded. A
well-known property of strictly proper scoring rules is that they are still strictly proper under
positive affine transformations [Gneiting and Raftery, 2007], i.e., argmaxz
Eq [γR(z, e) + λ] =
argmaxz
Eq [R(z, e)] = q, for a strictly proper scoring rule R, γ > 0, and λ ∈ R.
Proposition 1. If R(z, e) is a strictly proper scoring rule, then a positive affine transformation of
R, i.e., γR(z, e) + λ, for γ > 0 and λ ∈ R, is also strictly proper.
4.2 Review Scores
If we knew a priori reviewers’ honest reviews, we could then compare the honest reviews to
the reported reviews and reward agreement. However, due to the subjective nature of the peer-
review process, we are facing a situation where this objective truth is practically unknowable.
Our solution is to induce honest reporting through pairwise comparisons of reported reviews.
The first step towards computing each reviewer i’s review score is to estimate his posterior pre-
dictive distribution E[ωα, ti] shown in (2) based on his reported review ri. Let E[ωα, ri] =
(E[ω0α, ri], . . . , E[ωvα, ri]) be such an estimation, where:
E[ωkα, ri] =(
αk+1
1+Pv
x=0 αx
αk
1+Pv
x=0 αx
if ri = k,
otherwise.
(4)
Recall that the elements of reviewer i’s true posterior predictive distribution are defined as:
E [ωkα, ti] =(
αk+1
1+Pv
x=0 αx
αk
1+Pv
x=0 αx
if ti = k,
otherwise.
Clearly, E [ωkα, ri] = E [ωkα, ti] if and only if reviewer i is reporting honestly, i.e., when
he reports ri = ti. The review score of reviewer i is determined as follows:
(γR (E [ωα, ri] , rj) + λ)
si =Xj6=i
9
(5)
where γ and λ are constants, for γ > 0 and λ ∈ R, and R is a strictly proper scoring rule. Scoring
rules require an observable outcome, or a “reality”, in order to score an assessment. Intuitively,
we consider each review reported by every reviewer other than reviewer i as an observed outcome,
i.e., the evaluation score deserved by the manuscript, and then we score reviewer i’s estimated
posterior predictive distribution in (4) as an assessment of that value.
Proposition 2. Each reviewer i ∈ N strictly maximizes his expected review score if and only if
ri = ti.
Proof. Let Θi = E [ωα, ti] and Φi = E [ωα, ri]. By the autonomy assumption, reviewers
cannot affect their peers’ reviews. Hence, we can restrict ourselves to show that each reviewer
i ∈ N strictly maximizes EΘi [γR (Φi, rj) + λ], for j 6= i, if and only if ri = ti.
(If part) Since R is a strictly proper scoring rule, from Proposition 1 we have that:
arg max
Φi
EΘi [γR (Φi, rj) + λ] = Θi
If ri = ti, then by construction Φi = Θi, i.e., the estimated posterior predictive distribution
in (4) is equal to the true posterior predictive distribution in (2). Consequently, honest reporting
strictly maximizes reviewers’ expected review scores.
(Only-if part). Using a similar argument, given that R is a strictly proper scoring rule, from
Proposition 1 we have that:
arg max
Φi
EΘi [γR (Φi, rj) + λ] = Θi
By construction, Φi = Θi if and only if ri = ti (see equations (2) and (4)). Thus, reviewers’
expected review scores are strictly maximized only when reviewers are honest.
Another way to interpret the above result is to imagine that each reviewer is betting on the
review deserved by the manuscript. Since the most relevant information available to him is the
observed signal, then the strategy that maximizes his expected review score is to bet on that signal,
i.e., to bet on his honest review. When this happens, the true posterior predictive distribution in
(2) is equal to the estimated posterior predictive distribution in (4) and, consequently, the expected
score resulting from a strictly proper scoring rule is strictly maximized when the expectation is
taken with respect to the true posterior predictive distribution.
It is important to observe that by incentivizing honest reporting, the scoring function in (5)
also incentivizes accuracy since honest reviews are draws from the distribution that represents the
true quality of the manuscript. In other words, the center is indirectly observing these draws when
reviewers report honestly. Consequently, due to the law of large numbers, the distribution of the
reported reviews converges to the distribution that represents the true quality of the manuscript as
the number of honestly reported reviews increases. Our experimental results in Section 7 show
that there indeed exists a strong correlation between honesty and accuracy.
Different interpretations of the scoring method in (5) arises depending on the underlying
strictly proper scoring rule and the hyperparameter α. In the following subsections, we discuss
two different interpretations: 1) when R is a symmetric and bounded strictly proper scoring rule
and reviewers’ prior distributions are non-informative; and 2) when R is a strictly proper scoring
rule sensitive to distance.
4.3 Rewarding Agreement
Assume that reviewers’ prior distributions are non-informative, i.e., all the elements making up
the hyperparameter α have the same value. This happens when reviewers have no relevant prior
10
knowledge about the quality of the manuscript. Consequently, the elements of reviewers’ true and
estimated posterior predictive distributions can take on only two possible values (see equations (2)
and (4) for α0 = α1 = · · · = αv ).
Moreover, if R is a symmetric scoring rule, then the term R (E [ωα, ri] , rj) in (5) can
take on only two possible values because a permutation of elements with similar values does
not change the score of a symmetric scoring rule. When R is also strictly proper, it means that
R (E [ωα, ri] , rj) = δmax, when ri = rj, and R (E [ωα, ri] , rj) = δmin, when ri 6= rj, where
δmax > δmin. Consequently, each term of the summation in (5) can be written as:
γR (E [ωα, ri] , rj) + λ =(cid:26) γδmax + λ if ri = rj,
γδmin + λ otherwise.
When R is also bounded, we can then set γ =
, and the
above values become, respectively, 1 and 0. Hence, the resulting review scores do not depend on
parameters of the model. Moreover, we obtain an intuitive interpretation of the scoring method in
(5): whenever two reported reviews are equal to each other, the underlying reviewers are rewarded
by one payoff unit. Thus, in practice, our scoring method works by simply comparing reported
reviews and rewarding agreements whenever R is a symmetric and bounded strictly proper scoring
rule and reviewers have no informative prior knowledge about the quality of the manuscript.
δmax−δmin
1
and λ = −δmin
δmax−δmin
Another interesting point is that the center can reward different agreements in different ways,
i.e., reviewers are not necessarily equally valued. For example, if the center knows a priori that
a particular reviewer j is reliable (respectively, unreliable), then she can increase (respectively,
decrease) the reward of reviewers whose reviews are in agreement with reviewer j’s reported
review. Formally, this means that for different reviewers i and j, the center can use different
values for γ and λ in (5). Proposition 2 is not affected by this as long as γ > 0, λ ∈ R, and
their values are independent of the reported reviews. Hence, by having a few reliable reviewers,
this approach might help to eliminate the hypothetical scenario where a set of reviewers learn over
time to report similar reviews. A similar idea was proposed by Jurca and Faltings [2009] to prevent
collusions in reputation systems.
4.4 Strictly Proper Scoring Rules Sensitive to Distance
Pairwise comparisons, as defined in the previous subsection, might work well for small values of
v, the best evaluation score that the manuscript can receive, but it can be too restrictive and, to
some degree, unfair when the best evaluation score is high. For example, when v = 10 and the
review used as the observed outcome is also equal to 10, a reported review equal to 9 seems to be
more accurate than a reported review equal to 1. One effective way to deal with these issues is by
using strictly proper scoring rules in (5) that are sensitive to distance.
Using the notation of Section 4.1, recall that z = (z0, . . . , zv) is some reported probability
distribution. Given that the outcomes are ordered, we denote the cumulative probabilities by capital
letter: Zk = Pj≤k zj. We first define the notion of distance between two probability vectors as
proposed by Stael von Holstein [1970]. We say that a probability vector z′ is more distant from
the jth outcome than a probability vector z 6= z′ if:
Z ′
Z ′
k ≥ Zk, for k = 0, . . . , j − 1
k ≤ Zk, for k = j, . . . , v
Intuitively, the above definition means that z can be obtained from z′ by successively moving
probability mass towards the jth outcome from other outcomes [Stael von Holstein, 1970]. A
scoring rule R is said to be sensitive to distance if R(z, j) > R(z′, j) whenever z′ is more distant
11
0.2
0
−0.2
−0.4
e
r
o
c
S
−0.6
−0.8
−1
−1.2
−1.4
−1.6
0
j = 0
j = 1
j = 2
j = 3
j = 4
1
2
Reported Review
3
4
Figure 2: Scores returned by R (E [ωα, ri] , j) for different reported reviews when v = 4, R is the
RPS rule, and α = (1, 1, 1, 1, 1). Each line represents a different value for j (observed outcome).
from z for all j. Epstein [1969] introduced the ranked probability score (RPS), a strictly proper
scoring rule that is sensitive to distance. Using the formulation of Epstein’s result proposed by
Murphy [1970], we have for a probability vector z and an observed outcome j ∈ {0, . . . , v}:
j−1
v
RP S(z, j) = −
Z 2
k −
(1 − Zk)2
(6)
Xk=0
Xk=j
Figure 2 illustrates the scores returned by (6) for different reported reviews and values for j
when reviewers’ prior distributions are non-informative. When using RPS as the strictly proper
scoring rule in (5), reviewers are rewarded based on how close their reported reviews are to the
reviews taken as observed outcomes. For example, when the review used as the observed outcome
is equal to 0 (see the dotted line with squares in Figure 2), the returned score monotonically
decreases as the reported review increases. Since RPS is strictly proper, Proposition 2 is still
valid for any hyperparameter α, i.e., each reviewer strictly maximizes his expected review score
by reporting honestly. The scoring range of RPS is [−v, 0]. Hence, review scores are always
non-negative when using γ = 1 and λ = v in (5).
4.5 Numerical Example
Consider four reviewers (n = 4) and the best evaluation score being equal to four (v = 4). Suppose
that reviewers have non-informative Dirichlet priors with α = (1, 1, 1, 1, 1), and that reviewers
1, 2, 3, and 4 report, respectively, r1 = 0, r2 = 0, r3 = 1, and r4 = 4. From (4), the resulting
estimated posterior predictive distributions are, respectively, E[ωα, r1 = 0] = (cid:0) 2
E[ωα, r2 = 0] = (cid:0) 2
(cid:0) 1
6(cid:1),
6(cid:1), and E[ωα, r4 = 4] =
6(cid:1). In what follows, we illustrate the scores returned by (5) when using a symmetric
6 , 1
6 , 1
6 , 2
6 , 2
6 , 1
6 , 1
6 , 1
and bounded strictly proper scoring rule and when using RPS.
6(cid:1), E[ωα, r3 = 1] = (cid:0) 1
6 , 1
6 , 1
6 , 1
6 , 1
6 , 1
6 , 1
6 , 1
6 , 1
6 , 1
12
4.5.1 Rewarding Agreements
Assume that R in (5) is the quadratic scoring rule shown in (3), which in turn is symmetric,
bounded, and strictly proper. Consequently, as discussed in Section 4.3, the term γR (E[ωα, ri], rj )+
λ in (5) can take on only two values:
γ(cid:18) 4
γ(cid:18) 2
v+2(cid:17)2
v+2 −(cid:16) 2
v+2(cid:17)2
v+2 −(cid:16) 2
−Pv−1
−Pv−1
e=0(cid:16) 1
e=0(cid:16) 1
v+2(cid:17)2(cid:19) + λ if ri = rj,
v+2(cid:17)2(cid:19) + λ otherwise.
1
δmax−δmin
Hence, by setting γ =
2v+4 , the above values are
equal to, respectively, 1 and 0. Using the scoring method in (5), we obtain the following review
scores: s1 = s2 = 1 and s3 = s4 = 0. That is, the review scores received by reviewers 1 and 2
are similar due to the fact that r1 = r2. Reviewer 3 and 4’s review scores are equal to 0 because
there is no match between their reported reviews and others’ reported reviews.
and λ = −δmin
= v+2
2
= −v
δmax−δmin
4.5.2 Taking Distance into Account
Now, assume that R in (5) is the RPS rule shown in (6). In order to ensure non-negative review
scores, let γ = 1 and λ = v = 4 . Using the scoring method in (5), we obtain the following review
scores: s1 = s2 = (−0.8333γ + λ)+ (−0.5γ + λ)+ (−1.5γ + λ) = 9.1667, s3 = 2·(−1.0833γ +
λ) + (−1.4167γ + λ) = 8.4167, and s4 = 2 · (−1.5γ + λ) + (−0.8333γ + λ) = 8.1667. The
review score of reviewer 4 is the lowest because his reported review is the most different review,
i.e., it has the largest distance between it and all of the other reviews.
5 Multiple Criteria
In our basic model, reviewers observe only one signal from the distribution that represents the
quality of the manuscript. However, manuscripts are often evaluated under multiple criteria, e.g.,
relevance, clarity, originality, etc., meaning that in practice reviewers might observe multiple sig-
nals and report multiple evaluation scores. Under the assumption that these signals are indepen-
dent, each reported evaluation score can be scored individually using the same scoring method
proposed in the previous section. Clearly, Proposition 2 is still valid, i.e., honest reporting still
strictly maximizes reviewers’ expected review scores.
The lack of relationship between different criteria is not always a reasonable assumption. A
modeling choice that takes the relationship between observed signals into account, which is also
consistent with our basic model, is to assume that the quality of the manuscript is still represented
by a multinomial distribution, but now reviewers may observe several signals from that distribu-
tion. Formally, let ρ ∈ N+ be the number of draws from the distribution that represents the quality
of the manuscript, where each signal represents an evaluation score related to a criterion. Instead
of a single number, each reviewer i’s private information is now a vector: ti = (ti,1, . . . , ti,ρ),
where ti,k ∈ {0, . . . , v}, for k ∈ {1, . . . , ρ}. The basic assumptions (autonomy, risk neutrality,
Dirichlet priors, and rationality) are still the same. For ease of exposition, we denote reviewer i’s
(ρ)
true posterior predictive distribution in this section by Θ
i = E [ωα, ti]. Under this new model,
each reviewer i’s posterior predictive distribution is now defined as:
Θ
(ρ)
i =(cid:18) α0 +Pρ
ρ +Pv
k=1 H(0, ti,k)
x=0 αx
k=1 H(1, ti,k)
, . . . ,
x=0 αx
,
α1 +Pρ
ρ +Pv
13
k=1 H(v, ti,k)
x=0 αx
αv +Pρ
ρ +Pv
(7)
(cid:19)
where H(x, y) is an indicator function:
H(x, y) =(cid:26) 1 if x = y,
0 otherwise.
Assuming that each reported review is a vector of ρ evaluations scores, i.e., ri = (ri,1, . . . , ri,ρ),
where ri,k ∈ {0, . . . , v}, for i ∈ N and k ∈ {1, . . . , ρ}, the center estimates each reviewer i’s pos-
terior predictive distribution by applying Bayes’ rule to the common prior. The resulting estimated
posterior predictive distribution E [ωα, ri], referred to as Φ
for ease of exposition, is:
(ρ)
i
Thereafter, the center rewards Φ
by using a strictly proper scoring rule R and other review-
k=1 H(1, ri,k)
, . . . ,
x=0 αx
αv +Pρ
ρ +Pv
k=1 H(v, ri,k)
x=0 αx
(cid:19) (8)
Φ
(ρ)
i =(cid:18) α0 +Pρ
ρ +Pv
k=1 H(0, ri,k)
x=0 αx
,
α1 +Pρ
ρ +Pv
(ρ)
i
ers’ reported reviews as observed outcomes:
si =Xj6=i(cid:16)γR(cid:16)Φ
(ρ)
i
, G(rj )(cid:17) + λ(cid:17)
(9)
where G is some function used by the center to summarize each reviewer j’s reported review
in a single number, and whose image is equal to the set {0, . . . , v}. For example, G can be a
function that returns the median or the mode of the reported evaluation scores. Honest reporting,
i.e., ri = ti, maximizes reviewers’ expected review scores under this setting.
Proposition 3. When observing and reporting multiple signals, each reviewer i ∈ N maximizes
his expected review score when ri = ti.
Proof. Due to the autonomy assumption, we restrict ourselves to show that each reviewer i ∈ N
maximizes E
proper scoring rule, from Proposition 1 we have that:
, G(rj )(cid:17) + λi, for j 6= i, when ri = ti. Given that R is a strictly
i hγR(cid:16)Φ
(ρ)
i
(ρ)
Θ
arg max
E
Φ
(ρ)
i
Θ
(ρ)
i hγR(cid:16)Φ
(ρ)
i
, G(rj )(cid:17) + λi = Θ
(ρ)
i
When ri = ti, we have by construction that Φ
(ρ)
(ρ)
i = Θ
i
(see equations (7) and (8)). Thus,
reviewers’ expected review scores are maximized when reviewers report honestly.
When observing and reporting multiple evaluation scores, a reviewer can weakly maximize
his expected review score by reporting a review different than his true review as long as the es-
timated posterior predictive distributions are the same. For example, when reviewer i reports
ri = (1, 2, 3), the resulting estimated posterior predictive distribution is the same as when he re-
ports ri = (3, 1, 2), and, consequently, reviewer i receives the same review score in both cases.
This implies that the scoring method in (9) is more suitable to a peer-review process where all
criteria are equally weighted since honest reporting weakly maximizes expected review scores.
5.1 Summarizing Signals when Prior Distributions are Non-Informative
When reviewers report multiple evaluation scores, the intuitive interpretation of review scores as
rewards for agreements that arises when using symmetric and bounded strictly proper scoring rules
(see Section 4.3) is lost because the elements of the estimated posterior predictive distribution in
(8) can take on more than two different values.
14
A different approach that preserves the aforementioned intuitive interpretation when reviewers’
prior distributions are non-informative is to ask the reviewers to summarize their observed signals
into a single value before reporting it, instead of the center doing it on their behalf. Hence, each
reviewer i is now reporting honestly when ri = G(ti), where G is some function suggested by
the center whose image is equal to the set {0, . . . , v}. This new model can be interpreted as if
the reviewers were reviewing the manuscript under several criteria and reporting the manuscript’s
overall evaluation score by reporting the value G(ti).
Since reviewers are reporting only one value, we can use the original scoring method in
(5) to promote honest reporting. We prove below that for any symmetric and bounded strictly
proper scoring rule, honest reporting strictly maximizes reviewers’ expected review scores un-
der the scoring method in (5) if and only if G is the mode of the observed signals, i.e., when
k=1 H(x, ti,k). Ties between observed signals are broken randomly.
Proposition 4. When observing multiple signals and reporting ri = G(ti), each reviewer i ∈
N with non-informative prior strictly maximizes his expected review score under the scoring
method in (5), for a symmetric and bounded strictly proper scoring rule R, if and only if ri =
G(ti) = arg maxx∈{0,...,v}Pρ
arg maxx∈{0,...,v}Pρ
k=1 H(x, ti,k).
Proof. Recall that since each reviewer i ∈ N observes multiple signals, his true posterior predic-
(ρ)
tive distribution is equal to E [ωα, ti] = Θ
i = (θ0, θ1, . . . , θv) as shown in (7). Due to Proposi-
tion 1 and since reviewers cannot affect their peers’ reviews because of the autonomy assumption,
we restrict ourselves to show that each reviewer i ∈ N maximizes E
(1)
i = E [ωα, ri = G(ti)].
Let z ∈ {0, . . . , v} be the most common signal observed by reviewer i. Hence, reviewer i’s
subjective probability associated with z is greater than his subjective probability associated with
any other signal y ∈ {0, . . . , v}, i.e., θi,z > θi,y.
j 6= i, if and only if ri = arg maxx∈{0,...,v}Pρ
k=1 H(x, ti,k), where Φ
, rj(cid:17)i, for
i hR(cid:16)Φ
(1)
i
(ρ)
Θ
(If part) Given that R is a symmetric and strictly proper scoring rule and that each reviewer
(1)
i
two possible values: δmax, if ri = rj, and δmin otherwise (see discussion in Section 4.3). When
k=1 H(x, ti,k) = z, reviewer i’s expected review score is
, rj(cid:17) can take on only
is reporting only one evaluation score, the resulting score from R(cid:16)Φ
reporting ri = arg maxx∈{0,...,v}Pρ
θi,zδmax +Py6=z θi,yδmin. Given that θi,z > θi,y, for any y 6= z, and δmax > δmin, this ex-
pected review score is maximized. Thus, reporting ri = arg maxx∈{0,...,v}Pρ
(Only-if part) Recall that all the elements making up the hyperparameter α have the same
(1)
i = (φi,0, . . . , φi,v) be
value because reviewers’ prior distributions are non-informative. Let Φ
reviewer i’s estimated posterior predictive distribution computed according to the original scoring
maximizes reviewer i’s expected review score.
k=1 H(x, ti,k) = z
method in (5) when reviewer i is reporting ri = arg maxx∈{0,...,v}Pρ
αk+1
k=1 H(x, ti,k) = z, i.e.:
φi,k =(
1+Pv
x=0 αx
αk
1+Pv
x=0 αx
= αk+1
αk
=
(v+1)·αk +1
(v+1)·αk +1
if k = z,
otherwise.
For contradiction’s sake, suppose that reviewer i maximizes his expected review score by
i = ( φi,0, . . . , φi,v) be reviewer i’s
misreporting his review and reporting ri = y 6= z. Let Φ
estimated posterior predictive distribution when he is misreporting his review, i.e.:
(1)
φi,k =(
αk+1
1+Pv
x=0 αx
αk
1+Pv
x=0 αx
= αk+1
αk
=
(v+1)·αk +1
(v+1)·αk +1
if k = y,
otherwise.
15
As discussed in Section 4.3, the term R(cid:16)Φ
ever R is a symmetric scoring rule. Consequently, R(cid:16) Φ
consequence of our assumption that reviewer i maximizes his expected review score by misre-
porting his review is that E
symmetric and bounded proper scoring rule, this inequality becomes:
, rj(cid:17)i ≥ E
i hR(cid:16) Φ
, rj(cid:17) can take on only two possible values when-
, k(cid:17) for k 6= z, y. A
, rj(cid:17)i. Assuming that R is a
, k(cid:17) = R(cid:16)Φ
i hR(cid:16)Φ
(1)
i
(1)
i
(1)
i
(1)
i
(1)
i
(ρ)
(ρ)
Θ
Θ
v
v
(1)
i
(1)
i
(1)
i
(1)
i
(1)
i
(1)
i
(1)
i
(1)
i
(1)
i
(1)
i
(1)
i
(1)
i
(1)
i
=⇒
=⇒
Xk=0
, k(cid:17)
θi,zR(cid:16) Φ
θi,kR(cid:16)Φ
θi,kR(cid:16) Φ
Xk=0
, z(cid:17) + θi,yR(cid:16) Φ
, k(cid:17) ≥
, y(cid:17) ≥ θi,zR(cid:16)Φ
R(cid:16)Φ
θi,y ≥ θi,z
R(cid:16) Φ
The second line follows from the fact that R(cid:16) Φ
, z(cid:17) + θi,yR(cid:16)Φ
, z(cid:17) − R(cid:16) Φ
, y(cid:17) − R(cid:16)Φ
, k(cid:17) = R(cid:16)Φ
, y(cid:17)
, z(cid:17)
, y(cid:17)
, k(cid:17) for k 6= z, y. Re-
, y(cid:17) = δmax, and
, y(cid:17) = δmin. Consequently, we obtain that θi,y ≥ θi,z. As we stated
, rj(cid:17)i, i.e., reviewer i maximizes his
i hR(cid:16) Φ
, z(cid:17) = R(cid:16) Φ
garding the last line, we have by construction that R(cid:16)Φ
R(cid:16) Φ
, z(cid:17) = R(cid:16)Φ
before, since z is the most common signal observed by reviewer i, then θi,z > θi,y. Thus, we have
a contradiction. So, E
, rj(cid:17)i < E
i hR(cid:16)Φ
expected review score only if he reports ri = arg maxx∈{0,...,v}Pρ
In other words, the above proposition says that each reviewer should report the evaluation score
most likely to be deserved by the manuscript when their prior distributions are non-informative and
they are rewarded according to the scoring method in (5). Any other evaluation score has a lower
associated subjective probability and, consequently, reporting it results in a lower expected review
score. To summarize, Proposition 4 implies that the scoring method proposed in (5) induces honest
reporting by rewarding agreements whenever reviewers’ prior distributions are non-informative
and the center is interested in the mode of each reviewer’s observed signals. It is noteworthy that
Proposition 4 does not assume that the center knows a priori the number of observed signals ρ,
thus providing more flexibility for practical applications of our method.
k=1 H(x, ti,k) = z.
(1)
i
(1)
i
(ρ)
Θ
(1)
i
(1)
i
(1)
i
(ρ)
Θ
6 Finding a Consensual Review
After reviewers report their reviews and receive their review scores, there is still the question of
how the center will use the reported reviews in making a suitable decision. Since reviewers are not
always in agreement, belief aggregation methods must be used to combine the reported reviews
into a single representative review. The traditional average method is not necessarily the best
approach since unreliable reviewers might have a big impact on the aggregate review. Moreover,
a consensual review is desirable because it represents a review that is acceptable by all.
In this section, we propose an adaptation of a classical mathematical method to find a consen-
sual review. Intuitively, it works as if reviewers were constantly updating their reviews in order
to aggregate knowledge from others. The scoring concepts introduced in previous sections are
incorporated by the reviewers when updating their reviews. In what follows, for the sake of gener-
ality, we assume that reviewers evaluate the manuscript under ρ ∈ N+ criteria, i.e., each reviewer
i observes ρ signals from the underlying distribution that represents the quality of the manuscript
16
and report a vector ri = (ri,1, . . . , ri,ρ) of evaluation scores, where ri,k ∈ {0, . . . , v} for all k.
The center then estimates reviewers i’s posterior predictive distribution E [ωα, ri], referred to as
for ease of exposition, as in (8). We relax our basic model by allowing the evaluation scores
Φ
in the aggregate review to take on any real value between 0 and the best evaluation score v.
(ρ)
i
6.1 DeGroot’s Model
DeGroot [1974] proposed a model that describes how a group might reach a consensus by pooling
their individual opinions. When applying this model to a peer-review setting, each reviewer i is
first informed of others’ reported reviews. In order to accommodate the information and expertise
of the rest of the group, reviewer i then updates his own review as follows:
n
r
(1)
i =
wi,jrj
Xj=1
this update. It is assumed that wi,j ≥ 0, for every reviewer i and j, and Pn
where wi,j is a weight that reviewer i assigns to reviewer j’s reported review when he carries out
j=1 wi,j = 1. In this
way, each updated review takes the form of a linear combination of reported reviews, also known
as a linear opinion pool. The weights must be chosen on the basis of the relative importance that
reviewers assign to their peers’ reviews. The whole updating process can be written in a more
general form using matrix notation: R(1) = WR(0), where:
W =
w1,1 w1,2
w2,1 w2,2
...
...
wn,1 wn,2
· · · w1,n
· · · w2,n
...
.. .
· · · wn,n
and R(0) =
r1
r2
...
rn
=
r1,1
r2,1
...
rn,1
r1,2
r2,2
...
rn,2
· · ·
· · ·
. . .
· · ·
r1,ρ
r2,ρ
...
rn,ρ
Since all the original reviews have changed, the reviewers might wish to update their new
reviews in the same way as they did before. If there is no basis for the reviewers to change their
assigned weights, the whole updating process after t revisions can then be represented as follows:
R(t) = WR(t−1) = WtR(0)
(10)
Let r
i,1, . . . , r(t)
(t)
i = (cid:16)r(t)
i,ρ(cid:17) be reviewer i’s review after t revisions, i.e., it denotes the ith row
(t)
j , for every reviewer
(t)
i = r
of the matrix R(t). We say that a consensus is reached if and only if r
i and j, when t → ∞.
6.2 Review Scores as Weights
The original method proposed by DeGroot [1974] does not encourage honesty in a sense that
reviewers can assign weights to their peers’ reviews however they wish so as long as the weights
are consistent with the construction previously defined. Furthermore, it requires the disclosure of
reported reviews to the whole group when reviewers are weighting others’ reviews, a fact which
might be troublesome when the reviews are of a sensitive nature.
A possible way to circumvent the aforementioned problems is to derive weights from the
original reported reviews by taking into account review scores. In particular, we assume the weight
that a reviewer assigns to a peer’s review is directly related to how close their estimated posterior
predictive distributions are, where closeness is defined by an underlying proper scoring rule. We
provide behavioral foundations for such an assumption in the following subsection. Formally, the
weight that reviewer i assigns to reviewer j’s reported review is computed as follows:
17
wi,j =
(11)
E
Φ
j=1
Pn
(ρ)
(ρ)
j
i hγR(cid:16)Φ
i hγR(cid:16)Φ
, e(cid:17) + λi
, e(cid:17) + λi
(ρ)
j
(ρ)
Φ
E
E
that is, the weight wi,j is proportional to the expected review score that reviewer i would receive if
he had reported the review reported by reviewer j, where the expectation is taken with respect to re-
viewer i’s estimated posterior predictive distribution. Consequently, the weight that each reviewer
indirectly assigns to his own review is always the highest because R is a strictly proper scoring rule,
i.e., arg max
0, for every reviewer i and j. As long as R is bounded, this assumption can be met by appropriately
j=1 wi,j = 1
i hγR(cid:16)Φ
setting the value of λ. Consequently, 0 < wi,j < 1, for every i, j ∈ N. Moreover,Pn
because the denominator of the fraction in (11) normalizes the weights so they sum to one.
In the interest of reaching a consensus, DeGroot’s method in (10) is applied to the original
reported reviews using the weights as defined in (11). We show that a consensus is always reached
under this proposed method whenever the review scores are positive.
, e(cid:17) + λi = Φ
i hγR(cid:16)Φ
, e(cid:17) + λi >
. We assume that E
(ρ)
j
(ρ)
i
(ρ)
j
(ρ)
j
(ρ)
(ρ)
Φ
Φ
Φ
(t)
i = r
(t)
j
Proposition 5. If E
when t → ∞.
Φ
(ρ)
i hγR(cid:16)Φ
(ρ)
j
, e(cid:17) + λi > 0, for every reviewer i, j ∈ N , then r
i hγR(cid:16)Φ
(ρ)
j
Φ
(ρ)
, e(cid:17) + λi > 0, for every reviewer i and j,
Proof. Due to the assumption that E
all the elements of the matrix W in (10) are strictly greater than zero and strictly less than one.
Moreover, the sum of the elements in any row is equal to one. Consequently, W can be regarded
as a n × n stochastic matrix, or a one-step transition probability matrix of a Markov chain with
n states and stationary probabilities. Furthermore, the underlying Markov chain is aperiodic and
irreducible. Therefore, a standard limit theorem of Markov chains applies in this setting, namely
given an aperiodic and irreducible Markov chain with transition probability matrix W, every row
of the matrix Wt converges to the same probability vector when t → ∞ [Ross, 1995].
(t)
(0)
j
(t−1)
j
(t−2)
k
j=1 βj r
j=1 wi,jr
k=1 wj,kr
Recall that r
= Pn
i = Pn
j=1 wi,jPn
= · · · = Pn
,
where β = (β1, β2, . . . , βn) is a probability vector that incorporates all the previous weights. This
equality implies that the consensual review can be represented as an instance of the linear opinion
pool. Hence, an interpretation of the proposed method is that reviewers reach a consensus regard-
ing the weights in (10). When β = (1/n, 1/n, . . . , 1/n) in the above equality, the underlying
linear opinion pool becomes the average of the reported evaluation scores. A drawback with an
averaging approach is that it does not take into account the scoring concepts introduced in the pre-
vious sections, a fact which might favor unreliable reviewers. Moreover, disparate reviews might
have a big impact on the resulting aggregate review. On the other hand, under our approach to find
β, reviewers weight down reviews far from their own reviews, which implies that the proposed
method might be less influenced by disparate reviews. A numerical example in subsection 6.4
illustrates this point. The experimental results discussed in Section 7 show that our method to find
a consensual review is consistently more accurate than the traditional average method.
6.3 Behavioral Foundation
The major assumption regarding our method for finding a consensual review is that reviewers
assign weights according to (11). An interesting interpretation of (11) arises when the proper
scoring rule R is effective with respect to a metric M. Formally, given a metric M that assigns a
real number to any pair of probability vectors, which can be seen as the shortest distance between
18
the two probability vectors, we say that a scoring rule R is effective with respect to M if the
following relation holds for all probability vectors Φ
[Friedman, 1983]:
, and Φ
, Φ
(ρ)
i
(ρ)
j
(ρ)
k
M(cid:16)Φ
(ρ)
i
, Φ
(ρ)
j (cid:17) < M(cid:16)Φ
(ρ)
i
, Φ
(ρ)
k (cid:17) ⇐⇒ E
Φ
(ρ)
i hγR(cid:16)Φ
(ρ)
j
, e(cid:17) + λi > E
Φ
(ρ)
i hγR(cid:16)Φ
(ρ)
k , e(cid:17) + λi
Thus, when R is effective with respect to a metric M, the higher the weight one reviewer
assigns to a peer’s review in (11), the closer their estimated posterior predictive distributions are
according to the metric M. In other words, when using effective scoring rules, reviewers naturally
prefer reviews close to their own reported reviews, and the weight that each reviewer assigns to
his own review is always the highest one. Hence, in spirit, the resulting learning model in (10) can
be seen as a model of anchoring [Tversky and Kahneman, 1974] in a sense that the review of a
reviewer is an “anchor”, and subsequent updates are biased towards reviews close to the anchor.
Friedman [1983] discussed some examples of effective scoring rules. For example, the quadratic
scoring rule in (3) is effective with respect to the root-mean-square deviation, the spherical scoring
rule is effective with respect to a renormalized L2-metric, whereas the logarithmic scoring rule is
not effective with respect to any metric [Nau, 1985].
6.4 Numerical Example
Consider a peer-review process where the best evaluation score is four (v = 4), three reviewers
(n = 3) observe three signals (ρ = 3), and they report the following reviews: r1 = (0, 1, 3),
r2 = (0, 2, 3), and r3 = (4, 4, 4). Consequently, the matrix R(0) in (10) is:
R(0) =
0 1 3
0 2 3
4 4 4
Consider the hyperparameter α = (1, 1, 1, 1, 1). Hence, the estimated posterior predictive
(3)
distributions are Φ
3 =
(1/8, 1/8, 1/8, 1/8, 4/8). Assume that R in (11) is the quadratic scoring rule in (3), and let γ = 1
and λ = 1 in order for the resulting expected values in (11) to be always positive. We obtain:
(3)
2 = (2/8, 1/8, 2/8, 2/8, 1/8), and Φ
(3)
1 = (2/8, 2/8, 1/8, 2/8, 1/8), Φ
W =
0.3545 0.3455 0.3000
0.3455 0.3545 0.3000
0.3158 0.3158 0.3684
Focusing on the main diagonal of W, we notice that each reviewer always assigns the highest
weight to his own review. From the first row of W, we can see that reviewer 1 assigns a high
weight to his review and to reviewer 2’s review, and a lower weight to reviewer 3’s review. This
happens because reviewer 3’s review is very distant from the others’ reported reviews. We can
draw similar conclusions from the other rows. We then obtain the following weights when carrying
out DeGroot’s method with the weights calculated according to (11):
lim
t→∞
Wt =
0.3390 0.3390 0.3220
0.3390 0.3390 0.3220
0.3390 0.3390 0.3220
and, consequently, the consensual review is represented by any row of the matrix limt→∞ WtR(0),
which results in the vector (1.288, 2.305, 3.322). It is worthwhile to discuss an interesting point
regarding the above example. The aggregate review would be (1.333, 2.333, 3.333) if it was equal
19
to the average of the reported reviews. Hence, reviewer 3’s review would have more impact on
the aggregate review because the evaluation scores in the average review are all greater than the
corresponding evaluation scores in the consensual review. In our proposed method, the influence
of reviewer 3 on the aggregate review is diluted because his review is very different from the
others’ reviews. More formally, reviewer 3’s estimated posterior predictive distribution is very
distant from the others’ estimated posterior predictive distributions when measured according to
the root-mean-square deviation, the metric associated with the quadratic scoring rule.
7 Experiments
In this section, we describe a peer-review experiment designed to test the efficacy of both the
proposed scoring method and the proposed aggregation method.
In the following subsections,
we discuss Amazon’s Mechanical Turk, the platform used in our experiments, the experimental
design, and our results.
7.1 Amazon’s Mechanical Turk
Amazon’s Mechanical Turk5 (AMT) is an online labor market originally developed for human
computation tasks, i.e., tasks that are relatively easy for human beings, but nonetheless challeng-
ing or even currently impossible for computers, e.g., audio transcription, filtering adult content,
extracting data from images, etc. Several studies have shown that AMT can effectively be used as
a means of collecting valid data in these settings [Snow et al., 2008, Marge et al., 2010].
More recently, AMT has also been used as a platform for conducting behavioral experiments
[Mason and Suri, 2012]. One of the advantages that it offers to researchers is the access to a large,
diverse, and stable pool of people willing to participate in the experiments for relatively low pay,
thus simplifying the recruitment process and allowing a faster iteration between developing theory
and executing experiments. Furthermore, AMT provides an easy-to-use built-in mechanism to pay
workers that greatly reduces the difficulties of compensating individuals for their participation in
the experiments, and a built-in reputation system that helps requesters distinguish between good
and bad workers and, consequently, to ensure data quality. Numerous studies have shown that
results of behavioral studies conducted on AMT are comparable to results obtained in other online
domains as well as in offline settings [Buhrmester et al., 2011, Horton et al., 2011], thus providing
evidence that AMT is a valid means of collecting behavioral data.
7.2 Experimental Design
We designed a task on AMT that required workers, henceforth referred to as reviewers, to review 3
short texts under three different criteria: Grammar, Clarity, and Relevance. The first two texts were
extracts from published poems, but with some original words intentionally replaced by misspelled
words. The third text contained random words presented in a semi-structured way. All the details
regarding the texts are included in the appendix. For each text, three questions were presented to
the reviewers, each one having three possible responses ordered in decreasing negativity order:
• Grammar: does the text contain misspellings, syntax errors, etc.?
– A lot of grammar mistakes
– A few grammar mistakes
– No grammar mistakes
5http://www.mturk.com
20
• Clarity: does the text, as a whole, make any sense?
– The text does not make sense
– The text makes some sense
– The text makes perfect sense
• Relevance: could the text be part of a poem related to love?
– The text cannot be part of a love poem
– The text might be part of a love poem
– The text is definitely part of a love poem
Words with subjective meaning were intentionally used so as to simulate the subjective nature
of the evaluation scores in a review, e.g., “a lot”, “a few”, etc. Each individual response was
translated into an evaluation score inside the set {0, 1, 2}. The most negative response received
the score 0, the middle response received the score 1, and the most positive response received the
score 2. Thus, each reviewer reported a vector of 9 evaluation scores (3 texts times 3 criteria).
We recruited 150 reviewers on AMT, all of them residing in the United States of America
and older than 18 years old. They were required to accomplish the task in at most 20 minutes.
Reviewers were split into 3 groups of equal size. After accomplishing the task, every reviewer in
every group received a payment of 20 cents. A study done by Ipeirotis [2010] showed that more
than 90% of the tasks on AMT have a baseline payment less than $0.10, and 70% of the tasks have
a baseline payment less than $0.05. Thus, our baseline payment was much higher than the average
payment from other jobs posted to the AMT marketplace.
Each reviewer was randomly assigned into one of the three groups. Reviewers in two of the
groups, the treatment groups, could earn an additional bonus of up to 10 cents. Reviewers in the
first treatment group, referred to as the Bonus Group (BG), were informed that their bonuses would
be proportional to the number of reviews similar to their reported reviews. Reviewers in the second
treatment group, the Bonus and Information Group (BIG), received similar information, but they
also received a short summary of some theoretical results presented in this paper:
“A group of researchers from the University of Waterloo (Canada) formally showed
that the best strategy to maximize your expected bonus in this setting is by being
honest, i.e., by considering each question thoroughly and deciding the best answers
according to your personal opinion”.
Members of the third group, the Control Group (CG), neither received extra explanations nor
bonuses. Their reported reviews were used as the control condition. Bonuses were computed by
rewarding agreements as described in Section 4.3. Due to the one-shot nature of this peer-review
task, we assumed that Dirichlet priors were non-informative with hyperparameter α = (1, 1, 1).
For each reported evaluation score, there could be at most 49 similar reported evaluation scores
because each group had 50 members. We then used the formula 10
to calculate the
reward for an individual evaluation score. Given that each reviewer reported 9 evaluation scores,
if the evaluation scores reported by all members of a group were the same, then all group members
would received the maximum bonus of 10 cents. The provided bonuses can be seen as review
scores. Our primary objective when performing this experiment was to empirically investigate the
extent to which providing review scores affects the quality of the reported reviews.
9 × #agreements
49
21
7.3 Gold-Standard Evaluation Scores
Since the source and original content of each text were known a priori, i.e., before the experiments
were conducted, we were able to derive gold-standard reviews for each text. In order to avoid
confirmation bias6, we asked five professors and tutors from the English and Literature Department
at the University of Waterloo to provide their reviews for each text. We set the gold-standard
evaluation score for each criterion in a text as the median of the evaluation scores reported by
the professors and tutors. Coincidentally, each median value was also the mode of the underlying
evaluation scores. All the evaluation scores reported by the professors and tutors as well as the
respective gold-standard evaluation scores are in the appendix.
7.4 Hypotheses
Our first research question was whether or not providing review scores through pairwise compar-
isons makes the reported reviews more accurate, i.e., closer to the gold-standard reviews. Based
on our theoretical results, our hypothesis was:
Hypothesis 1. The average accuracy of group BIG is greater than the average accuracy of group
BG, which in turn is greater than the average accuracy of group CG.
In other words, the resulting reviews would be on average more accurate when reviewers re-
ceived review scores, and the extra explanation regrading the theory behind the scoring method
would provide more credibility to it, thus making the reviews more accurate. Regarding the result-
ing bonuses, since honest reporting maximizes reviewers’ expected review scores in our model,
our second hypothesis was:
Hypothesis 2. The average bonus received by members of group BIG is greater than the average
bonus received by members of group BG, which in turn is greater than the average bonus received
by members of group CG.
In order to test whether or not Hypothesis 2 was true, we used the bonus the members of group
CG would have received had they received any bonus. It is important to note that Hypothesis 1
was measured by comparing how close the reported reviews were to the gold-standard reviews,
whereas Hypothesis 2 was measured by making pairwise comparisons between reported reviews:
the higher the number of agreements, the greater the resulting bonus.
Another metric used to compare groups’ performance was the task completion time. The
amount of time spent by reviewers on the reviewing task can be seen as a proxy for the effort
they exerted to complete the task. Regarding this metric, we expected reviewers who received
review scores to be more cautious when completing their tasks. Moreover, the extra explanation
regrading the theory behind the scoring method would provide more credibility to it, thus making
the members of group BIG work harder on the task. Hence, our third hypothesis was:
Hypothesis 3. The average task completion time of group BIG is greater than the average task
completion time of group BG, which in turn is greater than the average task completion time of
group CG.
Finally, we believed that the consensual review, computed as described in Section 6, would be
more accurate than the average review since disparate reviews are less likely to have a big influence
on the consensual review than on the average review. Hence, our fourth hypothesis was:
Hypothesis 4. The average accuracy of the consensual review is greater than the average accu-
racy of the average review.
6The tendency to interpret information in a way that confirms one’s preconceptions [Plous, 1993].
22
Table 1: Accuracy of each group on individual criteria. The average of the absolute difference
between the reported evaluation scores and the corresponding gold-standard evaluation scores
is shown below each group. For each criterion, the lowest average is highlighted in bold. The
standard deviations are in parenthesis. One-tailed p-values resulting from rank-sum tests are
shown in the last three columns. Given the notation A-B, the null hypothesis is that the outcome
measures resulting from groups A and B are equivalent, and the alternative hypothesis is that the
outcome measure resulting from group A is less than the outcome measure resulting from group B.
BG
BIG
CG
BIG-BG BIG-CG BG-CG
p-values
0.5000
(0.5051)
0.8200
(0.6606)
0.2200
(0.5067)
0.4400
(0.5014)
0.5000
(0.6468)
0.4400
(0.5014)
0.7600
(0.8466)
0.1400
(0.4046)
0.1200
(0.4352)
0.3200
(0.4712)
0.6200
(0.6024)
0.2000
(0.4518)
0.3600
(0.4849)
0.3800
(0.6024)
0.6400
(0.4849)
0.7800
(0.8640)
0.0000
(0.0000)
0.1000
(0.3642)
0.4400
(0.5014)
0.8600
(0.7287)
0.3000
(0.5803)
0.3800
(0.4903)
0.5400
(0.6131)
0.6600
(0.4785)
1.0200
(0.8449)
0.1600
(0.3703)
0.2000
(0.4949)
0.035**
0.110
0.726
0.065*
0.052*
0.413
0.484
0.213
0.230
0.209
0.420
0.729
0.155
0.067*
0.325
0.977
0.419
0.014**
0.539
0.077*
0.061*
0.006**
0.002**
0.301
0.491
0.112
0.122
Grammar
Text 1
Clarity
Relevance
Grammar
Text 2
Clarity
Relevance
Grammar
Text 3
Clarity
Relevance
* p ≤ 0.1
** p ≤ 0.05
7.5 Experimental Results
7.5.1 Accuracy on Individual Criteria
In our first analysis, we computed the absolute difference between each reported evaluation score
and the corresponding gold-standard evaluation score. Thus, the outcome measure was an integer
with a value between zero and two, and the closer this value was to zero, the better the resulting
accuracy. Table 1 shows the average accuracy of each group on individual criteria.
Focusing first on the groups BG and BIG, the group BIG is the most accurate group on all
criteria, except for the criterion Relevance in Text 2 and the criterion Grammar in Text 3. This
result is statistically significant with p-value ≤ 0.1 in three out of the seven cases in which BIG is
more accurate than BG. In two out of these three statistically significant cases, this result is also
statistically significant with p-value ≤ 0.05. BG is more accurate than BIG in only two criteria.
This result is only statistically significant for the criterion Relevance in Text 2 (p-value ≤ 0.05).
The group CG, the control condition that involved no incentives beyond the baseline compen-
sation offered for completing the task, never outperforms both BG and BIG at the same time, and
23
Table 2: Aggregate accuracy of each group. The average of the sum of the absolute difference
between the reported evaluation scores and the corresponding gold-standard evaluation scores is
shown below each group. For each text and for the whole task, the lowest average is highlighted
in bold. The standard deviations are in parenthesis. One-tailed p-values resulting from rank-sum
tests are given in the last three columns. Given the notation A-B, the null hypothesis is that the
outcome measures resulting from groups A and B are equivalent, and the alternative hypothesis is
that the outcome measure resulting from group A is less than the outcome measure resulting from
group B.
p-values
BG
BIG
CG
BIG-BG BIG-CG BG-CG
1.5400
(1.1287)
1.3800
(1.0669)
1.0200
(1.1865)
3.9400
(2.2352)
1.1400
(1.0304)
1.3800
(0.9666)
0.8800
(0.9179)
3.4000
(1.6903)
1.6000
(1.4142)
1.5800
(0.9916)
1.3800
(1.1933)
4.5600
(2.1301)
0.043**
0.085*
0.588
0.547
0.163
0.148
0.394
0.020**
0.052*
0.110
0.002**
0.064*
Text 1
Text 2
Text 3
Overall
* p ≤ 0.1
** p ≤ 0.05
it is the less accurate group in seven out of nine criteria. In two (respectively, four) occasions, CG
is statistically significantly less accurate than BG (respectively BIG) with p-value ≤ 0.1.
Giving these results, we conclude that Hypothesis 1 is true for individual criteria, i.e., the
resulting reviews are on average more accurate when using review scores, and the extra explana-
tion regrading the theory behind the scoring method seems to provide more credibility to it, thus
improving the accuracy of the reported reviews.
7.5.2 Aggregate Accuracy
We also computed the aggregate accuracy of each group for each text as well as for the whole
task. In the former case, the outcome measure was the sum of the absolute difference between
each reported evaluation score for a given text and the corresponding gold-standard evaluation
score. For example, given (0, 1, 2) as the reported evaluation scores for Text 1, and (1, 2, 2) as the
corresponding gold-standard evaluation scores, the outcome measure for Text 1 would be 0 − 1 +
1 − 2 + 2 − 2 = 2. For the whole task, we summed the absolute differences across all criteria
and texts. Table 2 shows the aggregate accuracy of each group.
For every single text as well as for the overall task, members of the group CG report less
accurate reviews than members of the group BG and the group BIG. For the group BG, this result
is statistically significant for Text 3 and for the overall task (p-value ≤ 0.1). For the group BIG,
this result is statistically significant for Text 1 (p-value ≤ 0.1), Text 3 (p-value ≤ 0.05), and for the
whole task (p-value ≤ 0.05). Thus, the experimental results suggest that providing review scores
produces a significant improvement in quality over the control condition. Moreover, providing
an extra explanation about the theory behind the scoring method improves the final quality of
the reviews because, on average, the reviews from group BIG are more accurate than the reviews
from group BG. This result is statistically significant for Text 1 (p-value ≤ 0.05). Therefore, we
conclude that Hypothesis 1 is also true on the aggregate level.
24
Table 3: Average bonus and completion time per group. The highest average values are high-
lighted in bold. The standard deviations are in parenthesis. One-tailed p-values resulting from
rank-sum tests are given in the last three columns. Given the notation A-B, the null hypothesis is
that the outcome measures resulting from groups A and B are equivalent, and the alternative hy-
pothesis is that the outcome measure resulting from group A is greater than the outcome measure
resulting from group B.
p-values
BG
0.053
(0.0086)
178.66
BIG
0.058
(0.0073)
215.90
CG
BIG-BG
BIG-CG
BG-CG
0.050
(0.0078)
196.36
< 0.0005** <0.0005**
0.0025**
0.0232**
0.0257**
0.4208
(87.4495)
(127.7471)
(149.0788)
Bonus
Time
* p ≤ 0.1
** p ≤ 0.05
7.5.3 Bonus
The average bonus per group is shown in the first row of Table 3. From it, we conclude that
Hypothesis 2 is true, i.e., the average bonus received by members of BIG is greater than the average
bonus received by members of BG, which in turn is greater than the average bonus hypothetically
received by members of CG. All these results are statistically significant with p-value ≤ 0.05. In
other words, providing review scores and informing reviewers about the theory behind the scoring
method do indeed increase the number of reported reviews that are similar.
Interestingly, there is a strong negative correlation between bonuses and the aggregate absolute
error for the whole task shown in the fourth row of Table 2, even though the former is computed
by making pairwise comparisons between reported reviews, whereas the latter is computed by
comparing reported reviews with gold-standard reviews. The Pearson correlation coefficients for
BG, BIG, and CG are, respectively, −0.73, −0.79, and −0.72. This result implies that there exists
a strong positive correlation between honest reporting and accuracy in this task, a fact which is in
agreement with our theoretical model.
7.5.4 Completion Time
The average completion time per group is shown in the second row of Table 3. We start by noting
that Hypothesis 3 is not true. Surprisingly, the average time spent on the task by members of the
group BG is statistically equivalent to the average time spent by members of the group CG since
the null hypothesis cannot be rejected. The average completion time by members of the group
BIG is the highest one amongst the three groups, and this result is statistically significant with
p-value ≤ 0.05. A possible explanation for this result is that reviewers work on the reviewing task
more seriously by taking more time to complete it when they receive a brief explanation regarding
some theoretical results of the proposed scoring method, whereas they could be quickly guessing
how their peers would review the texts when the extra explanation about the theoretical results is
not provided.
It is noteworthy that even though the average values might suggest that spending more time
reviewing the texts results in higher bonuses and lower overall absolute errors, we do not find any
significant correlation between these variables at an individual level.
25
Table 4: Accuracy of the average review (AVG) and the consensual review (CR) per group. The
average of the absolute difference between the aggregate evaluation scores and the corresponding
gold-standard evaluation scores is shown per group and criteria. For each criterion, the lowest
average absolute difference in each group is highlighted in bold. The standard deviations are in
parenthesis. A total of 1000 bootstrap resamples were used.
Grammar
Text 1 Clarity
Relevance
Grammar
Text 2 Clarity
Relevance
Grammar
Text 3 Clarity
Relevance
BG
BIG
CG
AVG
CR
AVG
CR
AVG
CR
0.2622
(0.0920)
0.8219
(0.0903)
0.2188
(0.0676)
0.1643
(0.0819)
0.4965
(0.0879)
0.3590
(0.0804)
0.7598
(0.1204)
0.1379
(0.0565)
0.1197
(0.0619)
0.2781
(0.1015)
0.8159
(0.0963)
0.1462
(0.0536)
0.1667
(0.0855)
0.4314
(0.0970)
0.3508
(0.0933)
0.6976
(0.1473)
0.0859
(0.0400)
0.0699
(0.0400)
0.1238
(0.0680)
0.6211
(0.0850)
0.2020
(0.0622)
0.0754
(0.0571)
0.3812
(0.0858)
0.4360
(0.0948)
0.7792
(0.1222)
0.0000
(0.0000)
0.1019
(0.0521)
0.1086
(0.0631)
0.6078
(0.0987)
0.1382
(0.0512)
0.0698
(0.0541)
0.3036
(0.0860)
0.4957
(0.1061)
0.7198
(0.1505)
0.0000
(0.0000)
0.0597
(0.0335)
0.1285
(0.0800)
0.8633
(0.1031)
0.2996
(0.0783)
0.0716
(0.545)
0.5405
(0.0857)
0.4996
(0.0909)
1.0231
(0.1161)
0.1615
(0.0522)
0.2022
(0.0696)
0.1307
(0.0829)
0.8477
(0.1156)
0.2156
(0.0696)
0.0679
(0.0531)
0.5022
(0.0987)
0.5642
(0.0999)
1.0288
(0.1455)
0.1115
(0.0453)
0.1320
(0.0537)
7.5.5 Consensus
Lastly, we tested the accuracy of the method proposed in Section 6 to find a consensual review.
We compared the resulting consensual review with the average review by using a bootstrapping
technique. For each group of reviewers, we randomly resampled with replacement reviews from
the original dataset so as to obtain bootstrap resamples. The size of each bootstrap resample was
equal to the size of the original dataset, i.e., each bootstrap resample contained 50 data points (the
original number of reviewers), each one consisting of 9 evaluation scores.
For each bootstrap resample, we aggregated evaluation scores individually using both the pro-
posed method for finding a consensual review and the average method. For each evaluation score,
the weight that each reviewer i assigned to reviewer j’s reported evaluation score was computed
according to equation (11). The proper scoring rule R and the constants γ and λ were set so as to
reward agreement as in Section 4.3. Given that the best evaluation score in this task was v = 2 and
α = (1, 1, 1), each element of a reviewer’s estimated posterior predictive distribution in (4) could
take on only two values: 0.25 and 0.5. Consequently, the numerator in (11) could take on only two
values: 0.5, if reviewer i and j’s reported evaluation scores were the same, and 0.25 otherwise.
After aggregating evaluation scores, we computed the accuracy of each aggregation method.
The outcome measure was the absolute difference between each aggregate evaluation score and
the corresponding gold standard score. Thus, the outcome measure was an integer with a value
26
between zero and two, and the closer this value was to zero, the better the resulting accuracy.
Table 4 shows the average accuracy by group resulting from a total of 1000 bootstrap resamples.
Table 4 shows that consensual evaluation scores are more accurate than average evaluation
scores in 20 out of 27 cases, and equally accurate in one case. It comes as no surprise that con-
sensual evaluation scores are more accurate in groups where review scores were provided since
these groups reported more accurate reviews and their reported reviews were more similar, as
previously discussed. We performed a statistical analysis to investigate whether or not these dif-
ferences in accuracy are statistically significant. Since we used the same bootstrap resamples for
both aggregation methods, the Wilcoxon signed-rank test was used. The null hypothesis was that
the outcome measures resulting from both aggregation methods are equivalent. The alternative
hypothesis was that the outcome measure resulting from the consensual method was less than the
outcome measure resulting from the average method, which implies that the former is more ac-
curate than the latter. All the resulting 27 p-values are extremely small (cid:0)< 10−10(cid:1). Therefore,
we conclude that Hypothesis 4 is indeed true, i.e., the proposed method for finding a consensual
review is, on average, more accurate than the average approach in this experiment. As discussed
in Section 6, we believe this result happens because disparate reported reviews are less likely to
have a big influence on the consensual review than on the average review.
8 Conclusion
We proposed a scoring method built on strictly proper scoring rules that induces honest reporting
when outcomes are not observable. We illustrated the mechanics behind our scoring method by
applying it to the peer-review process. In order to do so, we modeled the peer-review process
using a Bayesian model where the uncertainty regarding the quality of the manuscript is taken into
account. The main assumptions in our model are that reviewers cannot be influenced by other
reviewers, and reviewers are Bayesian decision-makers.
We then showed how our scoring method can be used to evaluate reported reviews and to
encourage honest reporting by risk-neutral reviewers. The proposed method assigns scores based
on how close reported reviews are, where closeness is defined by an underlying proper scoring rule.
Under the aforementioned assumptions, we showed that risk-neutral reviewers strictly maximize
their expected scores by honestly disclosing their reviews. We also proposed an extension of
our model and scoring method to scenarios where reviewers evaluate a manuscript under several
criteria. We discussed how honest reporting is related to accuracy in our model: when reviewers
report honestly, the distribution of reported reviews convergences to the distribution that represents
the quality of the manuscript as the number of reported reviews increases.
Since all reviews are not always in agreement, we suggested an adaptation of the method
proposed by DeGroot [1974] to find a consensual review. Intuitively, the proposed method works
as if the reviewers were going through several rounds of discussion, where in each round they are
informed about others’ reported reviews, and they update their own reviews using our predefined
method in order to reach a consensus. Formally, each updated review is a convex combination of
reported reviews, where review scores are used as part of the weights that reviewers assign to their
peers’ reviews. We showed that the resulting method always converges to a consensual review
when reviewers’ expected review scores are positive, and we provided behavioral foundations for
the aggregation method.
We tested the efficacy of both the proposed scoring method and the proposed aggregation
method on a peer-review experiment using Amazon’s Mechanical Turk. Our experimental results
corroborated the relationship between honest reporting and accuracy in our model. We empiri-
cally showed that providing review scores through pairwise comparisons results in more accurate
reviews than the traditional peer-review process, where reviewers have no direct incentives for ex-
27
pressing their true reviews. Moreover, reviewers tended to agree more with each other when they
received review scores. In addition, our method for finding a consensual review outperformed the
traditional average method in our peer-review experiments.
For ease of exposition, our discussion on peer review was focused on scientific communica-
tion. However, our model and scoring method are readily applied to most peer-review settings,
e.g., academic courses, clinical peer review, etc. Moreover, our proposed method to incentivize
honest reporting is readily applied to different domains. For example, our method can be used to
incentivize honest feedback in reputation systems, where individuals rate a product/service after
experiencing it, and to induce honest evaluation of different strategic plans in an organization’s
strategic planning process. The proposed aggregation method is also general in a sense that it can
be applied to any decision analysis process where experts express their opinions through probabil-
ity distributions over a set of exhaustive and mutually exclusive outcomes.
Given the positive results obtained in our peer-review experiments, an interesting open ques-
tion is whether or not the methods proposed in this paper would perform as well in other domains,
such as in the aforementioned reputation systems and strategic planning in organizations. Another
question worth contemplating is whether or not incentives other than from the received scores play
a role in our scoring method. For example, one can conjecture that altruism may play an important
role in our scoring method. In our peer-review experiments, the performance of the reviewers not
only affect their own review scores, but also the review scores of their peers. In other words, if
reviewers do not put enough effort into reporting high-quality reviews, not only might they re-
ceive low review scores, but other reviews evaluated based on those erroneous reviews might also
receive low review scores. Thus, an interesting future work is to investigate whether or not ex-
perts, in general, have an altruistic motive to put more effort into the underlying task in order to
maximize the potential payoffs of their peers.
Acknowledgments
The authors thank Carol Acton, Katherine Acheson, Stefan Rehm, Susan Gow, and Veronica
Austen for providing gold-standard reviews for our experiments.
Appendix
In this appendix, we describe the texts used in our experiments as well as the gold-standard reviews
reported by five professors and tutors from the English and Literature Department at the University
of Waterloo, henceforth referred to as the experts.
Text 1
An excerpt from the “Sonnet XVII” by Neruda [2007]. Intentionally misspelled words are high-
lighted in bold.
“I do not love you as if you was salt-rose, or topaz,
or the arrown of carnations that spread fire:
I love you as certain dark things are loved,
secretly, between the shadown and the soul”
Table 5 shows the evaluation scores reported by the experts. The gold-standard evaluation
score for each criterion is the median/mode of the reported evaluation scores.
28
Table 5: Evaluation scores reported by the experts for Text 1.
Criterion
Expert 1 Expert 2 Expert 3 Expert 4 Expert 5 Median/Mode
Grammar
Clarity
Relevance
1
2
2
0
2
2
1
2
2
0
1
2
1
2
2
1
2
2
Text 2
An excerpt from “The Cow” by Taylor et al. [2010]. Intentionally misspelled words are highlighted
in bold.
“THANK you, prety cow, that made
Plesant milk to soak my bread,
Every day and every night,
Warm, and fresh, and sweet, and white.”
Table 6 shows the evaluation scores reported by the experts. The gold-standard evaluation
score for each criterion is the median/mode of the reported evaluation scores.
Table 6: Evaluation scores reported by the experts for Text 2.
Criterion
Expert 1 Expert 2 Expert 3 Expert 4 Expert 5 Median/Mode
Grammar
Clarity
Relevance
1
2
1
1
2
0
1
2
0
1
1
1
1
2
1
1
2
1
Text 3
Random words in a semi-structured way. Each line starts with a noun followed by a verb in a
wrong verb form. All the words in the same line start with a similar letter in order to mimic a
poetic writing style.
“Baby bet binary boundaries bubbles
Carlos cease CIA conditionally curve
Daniel deny disease domino dumb
Faust fest fierce forced furbished”
Table 7 shows the evaluation scores reported by the experts. The gold-standard evaluation
score for each criterion is the median/mode of the reported evaluation scores.
Table 7: Evaluation scores reported by the experts for Text 3.
Criterion
Expert 1 Expert 2 Expert 3 Expert 4 Expert 5 Median/Mode
Grammar
Clarity
Relevance
0
0
0
1
0
1
0
0
0
0
0
0
0
0
0
0
0
0
29
References
AICPA: American Institute of CPAs. Peer Review Program Manual. 2012. Retrieved from
http://www.aicpa.org/InterestAreas/PeerReview.
J. Argenti. Corporate Planning: a Practical Guide. Number 2. Routledge, 1968.
D. F. Bacon, Y. Chen, I. Kash, D. C. Parkes, M. Rao, and M. Sridharan. Predicting Your Own
Effort. In Proceedings of the 11th International Conference on Autonomous Agents and Multi-
agent Systems, pages 695–702, 2012.
J. M. Bernardo and A. F. M. Smith. Bayesian Theory. John Wiley & Sons, 1994.
L. Bornmann, R. Mutz, and H. D. Daniel. Gender Differences in Grant Peer Review: A Meta-
Analysis. Journal of Informetrics, 1(3):226 – 238, 2007.
A. E. Budden, T. Tregenza, L. W. Aarssen, J. Koricheva, R. Leimu, and C. J. Lortie. Double-Blind
Review Favours Increased Tepresentation of Female Authors. Trends in Ecology and Evolution,
23(1):4–6, 2008.
M. D. Buhrmester, T. Kwang, and S. D. Gosling. Amazon’s Mechanical Turk: A New Source of
Inexpensive, Yet High-Quality, Data? Perspectives on Psychological Science, 6(1):3–5, 2011.
A. Carvalho and K. Larson. Sharing a Reward Based on Peer Evaluations.
In Proceedings of
the 9th International Conference on Autonomous Agents and Multiagent Systems, pages 1455–
1456, 2010.
A. Carvalho and K. Larson. A Truth Serum for Sharing Rewards.
In Proceedings of the 10th
International Conference on Autonomous Agents and Multiagent Systems, pages 635–642, 2011.
A. Carvalho and K. Larson. Sharing Rewards Among Strangers Based on Peer Evaluations. De-
cision Analysis, 9(3):253–273, 2012.
A. Carvalho and K. Larson. A Consensual Linear Opinion Pool.
In Proceedings of the 23rd
International Joint Conference on Artificial Intelligence, pages 2518–2524, 2013.
R. T. Clemen and R. L. Winkler. Combining Probability Distributions From Experts in Risk
Analysis. Risk Analysis, 19:187–203, 1999.
P. E. Dans. Clinical Peer Review: Burnishing a Tarnished Icon. Annals of Internal Medicine, 118
(7):566–568, 1993.
M. H. DeGroot. Reaching a Consensus. Journal of the American Statistical Association, 69(345):
118–121, 1974.
E. S. Epstein. A Scoring System for Probability Forecasts of Ranked Categories. Journal of
Applied Meteorology, 8(6):985–987, 1969.
M. E. Falagas, G. M. Zouglakis, and P. K. Kavvadia. How Masked Is the Masked Peer Review of
Abstracts Submitted to International Medical? Mayo Clinic Proceedings, 81(5):705, 2006.
D. Friedman. Effective Scoring Rules for Probabilistic Forecasts. Management Science, 29(4):
447–454, 1983.
T. Gneiting and A. E. Raftery. Strictly Proper Scoring Rules, Prediction, and Estimation. Journal
of the American Statistical Association, 102(477):359–378, 2007.
30
F. Godlee, T. Jefferson, M. Callaham, J. Clarke, D. Altman, H. Bastian, C. Bingham, and J. Deeks.
Peer Review in Health Sciences. BMJ books London, 2003.
R. Hanson. Combinatorial Information Market Design. Information Systems Frontiers, 5(1):107–
119, 2003.
J. J. Horton, D. G. Rand, and R. J. Zeckhauser. The Online Laboratory: Conducting Experiments
in a Real Labor Market. Experimental Economics, 14(3):399–425, 2011.
S.-W. Huang and W.-T. Fu. Enhancing Reliability Using Peer Consistency Evaluation in Human
In Proceedings of the 2013 Conference on Computer Supported Cooperative
Computation.
Work, pages 639–648, 2013.
P. G. Ipeirotis. Analyzing the Amazon Mechanical Turk Marketplace. XRDS Crossroads: The
ACM Magazine for Students, 17(2):16–21, 2010.
R. Jurca and B. Faltings. Mechanisms for Making Crowds Truthful. Journal of Artificial Intelli-
gence Research, 34:209–253, 2009.
A. C. Justice, M. K. Cho, M. A. Winker, J. A. Berlin, D. Rennie, and The PEER Investigators.
Does Masking Author Identity Improve Peer Review Quality?: A Randomized Controlled Trial.
Journal of the American Medical Association, 280(3):240–242, 1998.
S. Lock. A Difficult Balance: Editorial Peer Review in Medicine. Nuffield Provincial Hospitals
Trust, 1985.
LSC: Legal Services Commission.
Independent Peer Review.
2005.
Retrieved from
http://www.legalservices.gov.uk/civil/how/mq_peerreview.asp.
M. Marge, S. Banerjee, and A. I. Rudnicky. Using the Amazon Mechanical Turk for Transcription
of Spoken Language. In Proceedings of the 2010 IEEE International Conference on Acoustics
Speech and Signal Processing, pages 5270–5273, 2010.
W. Mason and S. Suri. Conducting Behavioral Research on Amazon’s Mechanical Turk. Behavior
Research Methods, 44(1):1–23, 2012.
N. Miller, P. Resnick, and R. Zeckhauser. Eliciting Informative Feedback: The Peer-Prediction
Method. Management Science, 51(9):1359–1373, 2005.
A. H. Murphy. A Note on the Ranked Probability Score. Journal of Applied Meteorology, 10(1):
155–156, 1970.
Y. Nakazono. Strategic Behavior of Federal Open Market Committee Board Members: Evidence
from Members’ Forecasts. Journal of Economic Behavior & Organization, 93:62–70, 2013.
R. F. Nau. Should Scoring Rules Be “Effective”? Management Science, 31(5):527–535, 1985.
D. J. Navarro, T. L. Griffiths, M. Steyvers, and M. D. Lee. Modeling Individual Differences with
Dirichlet Processes. Journal of Mathematical Psychology, 50(2):101–122, 2006.
P. Neruda. 100 Love Sonnets. Exile, Bilingual edition, 2007.
N. S. Newcombe and M. E. Bouton. Masked Reviews Are Not Fairer Reviews. Perspectives on
Psychological Science, 4(1):62–64, 2009.
L. Pappano. The Year of the MOOC. New York Times, page ED26, November 4th, 2012.
31
S. Plous. The Psychology of Judgment and Decision Making. Mcgraw-Hill Book Company, 1993.
D. Prelec. A Bayesian Truth Serum for Subjective Data. Science, 306(5695):462–466, 2004.
R. B. Primack and R. Marrs. Bias in the Review Process. Biological Conservation, 141(12):
2919–2920, 2008.
G. Radanovic and B. Faltings. A Robust Bayesian Truth Serum for Non-Binary Signals.
In
Proceedings of the 27th AAAI Conference on Artificial Intelligence, 2013.
R. Robinson. Calibrated Peer Review. The American Biology Teacher, 63(7):474–480, 2001.
M. Roos, J. Rothe, and B. Scheuermann. How to Calibrate the Scores of Biased Reviewers by
Quadratic Programming. In Proceedings of the Twenty-Fifth Conference on Artificial Intelli-
gence, pages 255–260, 2011.
S. M. Ross. Stochastic Processes (Wiley Series in Probability and Statistics). Wiley, 2 edition,
1995.
A. D. Shaw, J. J. Horton, and D. L. Chen. Designing Incentives for Inexpert Human Raters. In
Proceedings of the ACM 2011 Conference on Computer Supported Cooperative Work, pages
275–284, 2011.
R. Snow, B. O’Connor, D. Jurafsky, and A. Y. Ng. Cheap and Fast—But is it Good? Evaluating
In Proceedings of the Conference on
Non-Expert Annotations for Natural Language Tasks.
Empirical Methods in Natural Language Processing, pages 254–263, 2008.
C.-A. S. Stael von Holstein. A Family of Strictly Proper Scoring Rules Which Are Sensitive to
Distance. Journal of Applied Meteorology, 9(3):360–364, 1970.
J. Taylor, A. Taylor, and K. Greenaway. Little Ann and Other Poems. Nabu Press, 2010.
A. Tversky and D. Kahneman. Judgment under Uncertainty: Heuristics and Biases. Science, 185
(4157):1124–1131, 1974.
S. van Rooyen. The Evaluation of Peer-Review Quality. Learned Publishing, 14(2):85–91, 2001.
S. van Rooyen, N. Black, and F. Godlee. Development of the Review Quality Instrument (RQI) for
Assessing Peer Reviews of Manuscripts. Journal of Clinical Epidemiology, 52(7):625 – 629,
1999.
R. R. J. Weiss. Optimally Aggregating Elicited Expertise: A Proposed Application of the Bayesian
Truth Serum for Policy Analysis. PhD thesis, Massachusetts Institute of Technology, 2009.
C. Wenneras and A. Wold. Nepotism and Sexism in Peer-Review. Nature, 387:341–343, 1997.
R. L. Winkler and A. H. Murphy. “Good” Probability Assessors. Journal of Applied Meteorology,
7(5):751–758, 1968.
J. Witkowski and D. C. Parkes. A Robust Bayesian Truth Serum for Small Populations. In Pro-
ceedings of the 26th AAAI Conference on Artificial Intelligence, 2012.
A. Yankauer. How Blind is Blind Review? American Journal of Public Health, 81(7):843–845,
1991.
32
|
1003.3784 | 1 | 1003 | 2010-03-19T12:31:55 | Simulating Customer Experience and Word Of Mouth in Retail - A Case Study | [
"cs.MA",
"cs.CE"
] | Agents offer a new and exciting way of understanding the world of work. In this paper we describe the development of agent-based simulation models, designed to help to understand the relationship between people management practices and retail performance. We report on the current development of our simulation models which includes new features concerning the evolution of customers over time. To test the features we have conducted a series of experiments dealing with customer pool sizes, standard and noise reduction modes, and the spread of customers' word of mouth. To validate and evaluate our model, we introduce new performance measure specific to retail operations. We show that by varying different parameters in our model we can simulate a range of customer experiences leading to significant differences in performance measures. Ultimately, we are interested in better understanding the impact of changes in staff behavior due to changes in store management practices. Our multi-disciplinary research team draws upon expertise from work psychologists and computer scientists. Despite the fact we are working within a relatively novel and complex domain, it is clear that intelligent agents offer potential for fostering sustainable organizational capabilities in the future. | cs.MA | cs | Simulating Customer Experience and Word-Of-Mouth in
Retail - A Case Study
Peer-Olaf Siebers
Uwe Aickelin
University of Nottingham, School of Computer Science
Nottingham, NG8 1BB, UK
[email protected]
Helen Celia
Chris W. Clegg
University of Leeds, Centre for Organisational Strategy, Learning & Change (LUBS)
Leeds, LS2 9JT, UK
Agents offer a new and exciting way of understanding the world of work. In this paper
we describe the development of agent-based simulation models, designed to help to
understand
the relationship between people management practices and retail
performance. We report on the current development of our simulation models which
includes new features concerning the evolution of customers over time. To test the
features we have conducted a series of experiments dealing with customer pool sizes,
standard and noise reduction modes, and the spread of customers’ word of mouth. To
validate and evaluate our model, we introduce new performance measure specific to
retail operations. We show that by varying different parameters in our model we can
simulate a range of customer experiences leading to significant differences in
performance measures. Ultimately, we are interested in better understanding the
impact of changes in staff behavior due to changes in store management practices.
Our multi-disciplinary research team draws upon expertise from work psychologists and
computer scientists. Despite the fact we are working within a relatively novel and
complex domain, it is clear that intelligent agents offer potential for fostering
sustainable organizational capabilities in the future.
Keywords: agent-based modeling, agent-based simulation, retail performance,
management practices, shopping behavior, customer satisfaction, word of mouth
1. Introduction
The retail sector has been identified as one of the biggest contributors to the productivity gap, whereby the
productivity of the UK lags behind that of France, Germany and the USA [1, 2]. A recent report into UK
productivity asserted that, ‘...the key to productivity remains what happens inside the firm and this is
something of a ‘black box’…’ [3]. A recent literature review of management practices and organizational
productivity concluded that management practices are multidimensional constructs that generally do not
demonstrate a straightforward relationship with productivity variables [4], and that both management
practices and productivity measures must be context specific to be (respectively) effective and meaningful.
Many attempts have been made to link management practices to an organization’s productivity and
performance (for a review, see [5]), however research findings have been so far been mixed, creating the
opportunity for the application of different techniques to advance our understanding.
Simulation can be used to analyze the operation of dynamic and stochastic systems showing their
development over time. There are many different types of simulation, each of which has its specific field of
application. Agent-Based Simulation (ABS) is particularly useful when complex interactions between
system entities exist such as autonomous decision making or proactive behavior. Agent-Based Modeling
1
(ABM) shows how micro-level processes affect macro level outcomes; macro level behavior is not
explicitly modeled, it emerges from the micro-decisions made by the individual entities [6].
There has been a fair amount of modeling and simulation of operational management practices, but people
management practices have often been neglected although research suggests that they crucially impact
upon an organization’s performance [7]. One reason for this relates to the key component of people
management practices, an organization’s people, who may often be unpredictable in their individual
behavior. Previous research into retail productivity has typically focused on consumer behavior and
efficiency evaluation (e.g. [8, 9]), and we seek to build on this work and address the neglected area of
people management practices in retail [10].
The overall aim of our project is to investigate the link between different management practices and
productivity. This strand of work focuses on simulating various in-store scenarios grounded in empirical
case studies with a leading UK retailer. In this paper we aim to understand and predict how Agent-Based
Modeling and Simulation (ABMS) can assess and optimize the impact of people management practices on
customer satisfaction and Word-Of-Mouth (WOM) in relation to the performance of a service-oriented
retail department. To achieve this aim we have adopted a case study approach using applied research
methods to collect both qualitative and quantitative data. In summary, we have worked with a leading UK
retail organization to conduct four weeks’ of informal participant observations in four departments across
two retail stores, forty semi-structured interviews with employees including a sixty-three-item
questionnaire on the effectiveness of retail management practices, and drawn upon a variety of established
information sources internal to the company. This approach has enabled us to acquire a valid and reliable
understanding of how the real system operates, revealing insights into the working of the system as well as
the behavior of and interactions between the different individuals and their complementary roles within the
retail department. Using this knowledge and data, we have applied ABM to devise a functional
representation of the case study departments. By executing the developed ABS models we can run
experiments to investigate the effects of different management scenarios.
So far we have only studied the impact of people management practices (e.g. training and empowerment)
on a customer base that is not influenced by any external or internal stimuli, and hence does not evolve [11,
12]. In order to be able to investigate the impact of management practices on customer satisfaction in a
more realistic way we need to consider the cues that stimulate customers to respond to these practices.
Therefore our focus is currently on building the capabilities to model customer evolution as a consequence
of the implementation of management practices. Consumer decision making, and consequently changes in
the behavior of customers over time, are driven by an integration of each consumer’s cognitive and
affective skills [13]. At any given point in time a customer’s behavior, as the product of an individual’s
cognitions, emotions, and attitudes, may be attributable to an external social cue such as a friend’s
recommendation or in-store stimuli [14], or an internal cue such as memory of one’s own previous
shopping experiences [15]. Changing customer requirements may in turn alter what makes a successful
management practice (because these are context specific, and customers are a key component of any retail
context). In order to enable such studies we enhanced our original Management Practices Simulation
(ManPraSim) model and introduced some new features.
In this paper we discuss the key features we have implemented in order to allow the investigation of these
kinds of behavioral dynamics. What we are learning here about modeling human behavior has implications
for modeling any complex system that involves many human interactions and where the people function
with some degree of autonomy.
2. Related Work
When investigating the behavior of complex systems the choice of an appropriate modeling technique is
very important [16]. To inform the choice of modeling technique, the relevant literature spanning the fields
of Economics, Social Science, Psychology, Retail, Marketing, OR, Artificial Intelligence, and Computer
Science has been reviewed. Within these fields a wide variety of approaches are used which can be
classified into three main categories: analytical methods, heuristic methods, and simulation. Often a
2
combination of these are used within a single model (e.g. [17, 18]. After a thorough investigation of the
relevant literature we have identified simulation as being the most appropriate approach for our purposes.
Simulation introduces the possibility of a new way of thinking about social and economic processes, based
on ideas about the emergence of complex behavior from relatively simple activities [19]. The purpose of
simulation is either to better understand the operation of a target system, or to make predictions about a
target system’s performance [20]. It allows the testing and evaluation of a theory, and investigation of its
implications. Whereas analytical models typically aim to explain correlations between variables measured
at one single point in time, simulation models are concerned with the development of a system over time
[21]. They allow us to study the transient conditions during the process, along the way to the eventual
outcome [22]. The outcome of simulation study is the acquisition of more knowledge about the dynamic
behavior of a system, i.e. the state changes of the model as time advances [23]. There are many different
approaches to OR simulation, amongst them Discrete-Event Simulation (DES), System Dynamics (SD),
and ABS, which is sometimes also referred to as individual-based simulation [24]. The choice of the most
suitable approach depends on the issues investigated, the input data available, the required level of analysis,
and the type of answers that are sought [16].
Although computer simulation has been used widely since the 1960s, ABMS only became popular in the
early 1990s [25]. It is described by [26] as a mindset as much as a technology: ‘It is the perfect way to view
things and understand them by the behavior of their smallest components’. In agent-based models a
complex system is represented by a collection of agents that are programmed to follow simple behavioral
rules. Agents can interact with each other and with their environment to produce complex collective
behavioral patterns. The main characteristics of agents are their autonomy and their ability to take flexible
action in reaction to their environment, both determined by motivations generated from their internal states.
They are designed to mimic the attributes and behaviors of their real-world counterparts.
ABS is still a relatively new simulation technique and its principal application has been in academic
research. There are, however, a wide range of existing application domains that are making use of the agent
paradigm and developing agent-based systems, for example in software technology, robotics, and complex
systems, and an ever increasing number of computer games use the ABMS approach. [27] draw a
distinction between two central Multi-Agent System (MAS) paradigms: multi-agent decision systems and
multi-agent simulation systems. In multi-agent decision systems, agents participating in the system must
make joint decisions as a group. Mechanisms for joint decision-making can be based on economic
mechanisms, such as an auction, or alternative mechanisms, such as argumentation. Multi-agent simulation
systems are used as a model to simulate some real-world domain. The typical application is in domains
which involve many different components, interacting in diverse and complex ways and where the system-
level properties are not readily inferred from the properties of the components. ABMS is extensively used
by the game and film industry to develop realistic simulations of individual characters and societies. It is
used in computer games, for example The SIMS™ [28], or in films when diverse heterogeneous characters
animations are required, for example the Orcs in Lord of the Rings™ [29].
Due to the characteristics of the agents, the ABMS approach (which is often implemented as a process
interaction DES) appears to be more suitable than the event scheduling modeling approach (which is
typically associated with the term DES) when it comes to modeling human-centered systems. This is due to
the fact that it supports the modeling of autonomous behavior. ABMS seems to promote a natural form of
modeling these systems [22]. There is a structural correspondence between the real system and the model
representation, which makes them more intuitive and easier to understand than for example a system of
differential equations as used in SD. [30] emphasizes that one of the key strengths of ABMS is that the
system as a whole is not constrained to exhibit any particular behavior as the system properties emerge
from its constituent agent interactions. Consequently, assumptions of linearity, equilibrium and so on, are
not needed.
On the other hand, some difficulties have been linked to use of ABMS. One disadvantage that is often
mentioned is the high demand in computational power compared to other simulation techniques, most
notably in that all of the interactions between agents and between the agent and the environment have to be
considered during the simulation run. However, rapid growth in affordable computer power makes this
3
problem less significant [31]. There is consensus in the literature that it is difficult to evaluate agent-based
models, because of the heterogeneity of the agents and because the behavior of the system emerges from
the interactions between the individual entities. [32] argues that for ‘intellective models’ (e.g. models that
illustrate the relative impact of basic explanatory mechanisms) validation is somewhat less critical and the
most important thing is to maintain a balance between keeping a model simple and maintaining veridicality
(the extent to which a knowledge structure accurately reflects the information environment it represents).
More recently some attempts have been made to develop a common approach to assuring the credibility
(verification and validation) of ABS models (see for example [33 - 35].
A two stage approach for empirical validation has been proposed by [36]. The first stage comprises micro-
validation of the behavior of the individual agents and the authors recommend this is conducted with
reference to real data on individual behavior. The second stage covers macro-validation of the aggregate or
emergent behavior of the model when individual agents interact and is advised to be conducted with
reference to aggregate time series data. Further, [36] remark that at the macro level only qualitative
validation judgments may be possible. Also, problems often occur through the lack of adequate empirical
data. [37] state that most quantitative research has concentrated on ‘variable and correlation’ models that do
not cohere well with process-based simulation that is inherent in agent-based models. Finally, [37] point
out the danger that people new to ABMS may expect too much from the models, particularly regarding
their predictive ability. To mitigate this problem it is important to be clear with individuals about what this
modeling technique can really offer, in order to guide realistic expectations.
3. Model Design and Data Collection
Before building a simulation model one needs to understand the particular problem domain [38]. In order to
gain this understanding we have conducted some case studies. What we have learned during these case
studies is reflected in the conceptual models presented in this chapter. Furthermore we explain how we
intend to use the data we have gathered during our case studies. Throughout the rest of the paper we will
use the term 'actor' to refer to a person in the real system, whereas the term 'agent' will be reserved for their
counterparts in the simulation model.
3.1 Knowledge Gathering
Case studies were undertaken in four departments across two branches of a leading UK retailer. The case
study work involved extensive data collection techniques, spanning: participant observation, semi-
structured interviews with team members, management and personnel, completion of survey questionnaires
and the analysis of company data and reports (for further information, see [39]). Research findings were
consolidated and fed back (via report and presentation) to employees with extensive experience and
knowledge of the four departments in order to validate our understanding and conclusions. This approach
has enabled us to acquire a valid and reliable understanding of how the real system operates, revealing
insights into the working of the system as well as the behavior of and interactions between the different
actors within it.
In order to make sure that our results regarding the application of management practices are applicable for a
wide variety of departments we have chosen two types of case study departments which are substantially
different not only in their way of operating but also their customer type split and staff setup. We collected
our data in the Audio & Television (A&TV) and the WomensWear (WW) departments of the two case
study branches.
The key differences between these two department types can be summarized as follows. The average
customer service time in A&TV is significantly longer, and the average purchase is significantly more
expensive than in WW. The likelihood of a customer seeking help in A&TV is also much higher than in
WW. Out of customers who have received advice, those in WW have a higher likelihood of making a
purchase (indeed customers’ questions tend to be very specific to a desired purchase) than in A&TV.
Considering customer types, A&TV tends to attract more solution demanders and service seekers, whereas
WW customers tend to be shopping enthusiasts. Finally, it is important to note that the conversion rate (the
likelihood of customers making a purchase) is higher in WW than in A&TV.
4
3.2 Conceptual Modeling
A conceptual model captures only the essential and relevant characteristics of a system. It is formulated
from the initial problem statement, informal user requirements, and data and knowledge gathered from
analysis of previous development models [23]. We have used the knowledge gained from the case studies
to inform our conceptual models of the system to be investigated, the actors within the system, and their
behavioral changes due to certain stimuli.
3.2.1 Main Concepts for the Simulation Model
Our initial ideas for the simulation model and its components are display below in Figure 1. Here we can
see a bird’s eye view of a shopping centre with customers (red dots) visiting a range of shops. Based on this
conceptual overview, we determined that we required three types of agents (customers, sales staff and
managers), each with a different set of relevant attributes. Global parameters can influence any aspect of
the system. The core of our conceptual simulation model consists of an ABS model with a user interface to
allow some form of user interaction (change of parameters) before and during runtime. Regarding system
outputs, we aim to find some emergent behavior on a macro level. Visual representation of the simulated
system and its actors allows us to monitor and better understand the interactions of entities within the
system. Coupled with the standard DES performance measures, we can then identify bottlenecks to assist
with optimization of the modeled system.
<Insert Figure 1 somewhere here>
3.2.2 Concepts for the Agents
We have used state charts for the conceptual design of our agents. State charts show the different states an
entity can be in and define the events that cause a transition from one state to another. This is exactly the
information we need in order to represent our agents at a later stage within the simulation environment. We
have found this form of graphical representation a useful part of the agent design process because it is
easier for an expert in the real system (who is not an expert in ABMS) to quickly take on board the model
conceptualization and provide useful validation of the model structure and content.
Designing and building a model is to some extent subjective, and the modeler has to selectively simplify
and abstract from the real scenario to create a useful model [40]. A model is always a restricted copy of the
real system, and an effective model consists of only the most important components of the real system. In
our case, the case studies indicated that the key system components take the form of the behaviors of an
actor and the triggers that initiate a change from one behavior to another. We have developed state charts
for all of the agents in our simulation model. Figure 2 shows as an example the conceptual template model
of a customer agent. The transition rules have been omitted to keep the chart comprehensible. They are
explained in detail in the Section 3.3.
<Insert Figure 2 somewhere here>
3.2.3 Concepts for a Novel Performance Measure
We have introduced a customer satisfaction level index as a novel performance measure using satisfaction
weightings. This new measure is required because existing indices such as queuing times or service times
are less useful in modeling services than manufacturing activities. In essence, purely quantitative measures
fail to capture the quality of service, which is arguably the most important potential trade-off with retail
productivity. The inevitable trade-off between quality and quantity is particularly salient when customers
and staff come face-to-face and therefore we consider this measure of quality in conjunction with others of
quantity.
Historically customer satisfaction has been defined and measured in terms of customer satisfaction with a
purchased product [41]. The development of more sophisticated measures has moved on to incorporate
customers’ evaluations of the overall relationship with the retail organization, and a key part of this is the
service interaction. Indeed, empirical evidence suggests that quality is more important for customer
5
satisfaction than price or value-for-money [42], and extensive anecdotal evidence indicates that customer-
staff service interactions are an important determinant of quality as perceived by the customer.
The index allows customer service satisfaction to be recorded throughout the simulated lifetime. The idea is
that certain situations can have a bigger impact on customer satisfaction than others, and therefore weights
can be assigned to events to account for this. Satisfaction indices do not change the likelihood that a
customer revisits the department, and although this may at first appear counter-initiative, empirical
evidence supports the notion that regardless of a customer’s changing shopping intentions he or she will
tend to repeat shopping habits [43]. Applied in conjunction with an ABS approach, we expect to observe
interactions with individual customer differences; variations which have been empirically linked to
differences in customer satisfaction (e.g. [44]). This helps the analyst to find out to what extent customers
underwent a positive or negative shopping experience and it also allows the analyst to put emphasis on
different operational aspects and try out the impact of different strategies.
3.2.4 Concepts for Modeling Customer Evolution
There are two different ways in which we consider customer evolution: external stimulation attributable to
the WOM and internal stimulation triggered by memory of one’s own previous shopping experiences (this
is still work in progress). Sharing information with other individuals (referred to as WOM), significantly
affects the performance of retail businesses [45]. An important source of WOM results from customer
experiences of retail outlets, and a customer’s judgment about whether or not the experience left them
feeling satisfied (or dissatisfied). We incorporate WOM in our simulation model by using the number of
satisfied customers at the end of the day to calculate the number of additional customers visiting on the
next day. The calculation takes into account that only a fraction of people act upon received WOM.
Our concept for representing internal stimulation comprises the exertion of influence on picking certain
customer types more often than others. An enthusiastic shopper with a high satisfaction score is much more
likely to go shopping more frequently than a disinterested shopper. Therefore, we have introduced some
constraints (e.g. out of all customers picked 50% have to be enthusiastic shoppers, 30% normal shoppers,
and 20% disinterested shoppers, or, customers with a higher satisfaction score are more likely to be picked
to revisit the department). [15] identified different types of internal states and environmental stimuli which
act as consumer cues for triggering impulse buying. Internal cues include respondents’ positive and
negative feeling states, and environmental cues include atmospheric cues in retail settings, marketer-
controlled cues, and marketing mix stimuli. When modeling internal stimulation we specifically examine
the impact of a consumer’s memory of his or her own shopping experience and the impact on department
performance measures.
3.3 Empirical Data
Often agents are based on analytical models or heuristics and, in the absence of adequate empirical data,
theoretical models are employed. However, we use frequency distributions to model state change delays
and probability distributions to model decision making processes because statistical distributions are the
best way in which we can represent the numerical data we have gathered during our case study work. In
this way a population is created with individual differences between agents, mirroring the variability of
attitudes and behaviors of their real human counterparts.
The frequency distributions are modeled as triangular distributions defining the time that an event lasts,
using the minimum, mode, and maximum duration and these figures are based on our own observations and
expert estimates in the absence of objective numerical data.
The probability distributions are partly based on company data (e.g. the rate at which each shopping visit
results in a purchase) and partly on informed estimates (e.g. the patience of customers before they leave a
queue). Table 1 and 2 show some of the distributions we have defined for our simulation models. We also
gathered some company data about work team numbers and work team composition, varying opening hours
and peak times, along with other operational details.
Table 1. Sample frequency distribution values
6
event
someone makes a purchase after browsing
someone requires help
someone makes a purchase after getting help
probability it occurs
0.37
0.38
0.56
Table 2. Sample probability values
situation
leave browse state after …
leave help state after …
leave pay queue (no patience) after …
m in mode max
15
7
1
30
15
3
5
12
20
4. Implementation
4.1 Implementation of the Main Concepts
Our ManPraSim model has been implemented in AnyLogic™ (version 5.5) which is a Java™ based multi-
paradigm simulation software [46]. During the implementation we have applied the knowledge, experience
and data accumulated through our case study work. Within the simulation model we can represent the
following actors: customers, service staff (with different levels of expertise) and different types of
managers. Figure 3 shows a screenshot of the customer and staff agent logic in AnyLogic™ as it has been
implemented in the latest version of our ManPraSim model (v4). Boxes represent states, arrows transitions,
arrows with a dot on top entry points, circles with a B inside branches, and numbers satisfaction weights.
<Insert Figure 3 somewhere here>
At the beginning of each simulation run the main customer pool is created which represents a population of
potential customers who visit the simulated department on an unspecified number of occasions. Once the
simulation has started customers are chosen at a specified rate (customer arrival rate) and released into the
simulated department. Currently two different customer types are implemented: customers who want to buy
something and customers who require a refund. If a refund is granted, a customer decides whether his or
her goal changes to leaving the department straight away, or to making a new purchase. The customer agent
template consists of four main blocks which all use a very similar logic. In each block, in the first instance,
customers try to obtain service directly from an employee and if they cannot obtain it (i.e. no suitable staff
member is available) he or she has to queue. The customer is then either served as soon as the suitable staff
member becomes available, or leaves the queue if they do not want to wait any longer (an autonomous
decision). A complex queuing system has been implemented to support different queuing rules. Once
customers have finished their shopping (either successfully or not) they leave the simulated department and
are returned back to the main customer pool where he or she rests until they are picked again.
While the customer is in the department a satisfaction score is calculated by summing the satisfaction
weights attached to the transitions that take place during the customer’s visit. For example, a customer
starts browsing and then requires some help. If he or she obtains help immediately his or her satisfaction
score goes up (+2) and after he or she received the help the score goes up again (+4). He or she then moves
to the till. If he or she has to wait for help and then leaves the queue because he or she is fed up waiting his
or her score goes down (-2). Upon leaving the department he or she will end up in this example with an
overall satisfaction score of +4 due to the good and prompt advisory service. The actual customer
satisfaction weights shown in Figure 3 were derived based on our experience during the data collection
period and validated via interviews with the store management staff.
In comparison to the customer agent state chart, the staff agent state chart is relatively simple. Whenever a
customer requests a service and the staff member is available and has the right level of expertise for the
task requested, the staff member commences this activity until the customer releases the staff member.
Whereas the customer is the active component of the simulation model, the staff member is currently
passive, simply reacting to requests from the customer (although both are technically implemented as active
objects).
7
4.2 Key Features
There are some additional key features that the simulation model possesses which we describe in the
following two sections. First we provide an overview of some important features which have already been
implemented in an older version of our simulation model (ManPraSim model v2) but are still relevant to
modeling the evolution of customers. This sets the scene for the subsequent description of the new features
we have implemented in the latest two versions of our simulation model (ManPraSim model v3 + v4).
4.2.1 Key Features of the ManPraSim Model v2
In the ManPraSim model v2 we introduced realistic footfall, customer types, a finite population of
customers, and a quick exit of customers when the department is closing. In this paper we only provide an
overview of these features because they are described in more detail elsewhere (see [47]).
Realistic footfall (introduced in v2): There are certain peak times where a relatively high number of
customers are in the department and consequently the demands placed on staff members are greater. In the
ManPraSim model v2 we have implemented hourly fluctuations through the addition of realistic footfall
(based on some automatically recorded sales transaction data) reflecting different patterns (peaks and
troughs) of customer footfall during the day and across different days of the week. In addition we can
model the varying opening hours on different days of the week.
Customer types (introduced in v2): In real life customers display certain shopping behaviors which can
be categorized. Hence we enhance the realism of our agents’ behavior in the ManPraSim modelv2 by
introducing customer types to create a heterogeneous customer base, thereby allowing us to test customer
populations closer to what we would find in reality. Customer types have been introduced based on three
identified by the case study organization’s own market research (shopping enthusiasts, solution demanders,
service seekers) and have been expanded by the addition of two further types (disinterested shoppers, and
internet shoppers who are customers that only seek advice but are likely to buy only from the cheapest
source i.e. the internet). The three customer types have been identified by the case study organization as the
customers who make biggest contribution to their business, in terms of both value and frequency of sales.
In order to avoid artificially inflating the amount of sales that we model we have introduced the two
additional types which use services but do not tend to make purchases. The definition of each type is based
on the customer’s likelihood to perform a certain action, classified as either: low, moderate, or high. The
definitions can be found in Table 3.
Table 3. Definitions for each type of customer
Customer type
Shopping enthusiast
Solution demander
Service seeker
Disinterested shopper
Internet shopper
buy
high
high
moderate
low
low
Likelihood to
wait
ask for help
moderate
moderate
low
low
high
high
low
low
high
high
ask for refund
low
low
low
high
low
Distribution adaptation (introduced in v2): In the ManPraSim model v2 we have two algorithms which
have been developed to imitate the influence of the customer type attributes mentioned above on customer
behavior. They have been implemented as methods that are invoked when defining the state change delays
modeled by triangular frequency distributions, and when supporting decision making modeled by
probability distributions. Basically the methods define new threshold values for the distributions based on
the likelihood values mentioned above. Program 1 shows an example of the pseudo code for the probability
distribution threshold correction algorithm. If the customer is a shopping enthusiast and is about to make
the decision whether to make a purchase or to leave the department directly (see Figure 3, customer state
chart, second branch after leaving the browse state) a corrected threshold value (probability) for this
decision is calculated. For this calculation the original threshold of 0.37 (see Table 2) is taken into account
and, for a shopping enthusiast where there is a high likelihood to buy (see Table 3), the corrected threshold
value is calculated as follows: 0.37+0.37/2 = 0.56. Consequently the likelihood that a shopping enthusiast
precedes to the checkout rather than leaving the department without making any purchase has risen by
18.5%.
8
Program 1. Pseudo code for the probability distribution threshold correction algorithm
for
(
each
threshold
to
be
corrected
)
do
{
}
if
OT
(
<
lim)5.0
it
=
OT
2/
else
(lim
it
1
−=
OT
2/)
if
likelihood
(
=
)0
CT
=
OT
−
lim
it
if
likelihood
(
=
)1
CT
=
OT
if
likelihood
(
=
)2
CT
=
OT
+
lim
it
where
:
OT
=
original
threshold
CT
=
corrected
threshold
likelihood
0:
=
low
1;
=
mod
erate
2;
=
high
Finite customer population (introduced in v2): A key aspect to consider is that the most interesting
system outcomes evolve over time and many of the goals of the retail company (e.g. service standards) are
planned strategically over the long-term. In the ManPraSim model v2 we have therefore introduced a finite
population of customers (main customer pool) where each customer agent is assigned certain characteristics
based on the customer types mentioned above. The customer type split in the main customer pool can be
defined via an initialization file before the execution of the simulation. The shopping experience of each
visit (satisfaction index) is stored in the long term memory of the agent after he or she has left the
department. In this way the service a customer experiences can be evaluated over the complete simulated
time span.
Quick exit at closing time (introduced in v2): In the ManPraSim model v2 we have added transitions that
emulate the behavior of customers when the store is closing. These transitions result in an immediate exit
of each customer for his or her current state (i.e. the equivalent to a customer running out of shopping time
and promptly exiting the store). Not all customer states have these additional transitions because it is for
example very unlikely that a customer will leave the store immediately when they are already queuing to
pay. Advanced model development means that now the simulated department empties within a ten to
fifteen minute period, which conforms to what we have observed in the real system.
4.2.2 Key Features of the ManPraSim Models v3 + v4
In the ManPraSim model v3 we have introduced a staff pool with an additional staff type, a new operation
mode to support sensitivity analyses and the first implementation of customers’ WOM featuring a static
main customer pool. Furthermore, we have created some new performance measures that allow us to
measure and record the shopping experience of individual visits to the department as well as the daily
performance of the department. Finally, in the ManPraSim model v4 we have introduced the second
implementation of customers’ WOM featuring a dynamic main customer pool.
Staff pool and additional staff types (introduced in v3): Retail trends reflect that shops are now open for
longer hours over more days of the week, and our case study organization is no exception. To accurately
incorporate this source of system variability, we have introduced a staff pool in the ManPraSim model v3
to allow different staffing on different days of the week. The simulation uses Full Timers (FT) to cover all
staff shifts required during weekdays. Additional staff who are required to cover busy weekend shifts are
modeled by Part Timers (PT). The maximum number of staff required of each type is calculated during the
simulation initialization. A staff pool is then created to include weekday FT staff of different types, and the
required generic PT to fill the gaps left in the staff shifts which need to be covered. At the beginning of
each day the simulation checks how many workers are required and picks the required amount of staff out
of the pool at random. The selection process is ordered as follows: FT first and then PT, if required. PT
workers have been defined as a generic staff type and can take over any required role. We have tried to
model a staff rota with more complex constraints, for example FT staff working five days followed by two
days off, however this has as yet proved unsuccessful. Therefore the currently modeled shifts do not
incorporate days off work for FT staff.
9
Noise reduction mode (introduced in v3): In the ManPraSim model v3 a noise reduction mode has been
implemented which allows us to conduct a sensitivity analysis with constant customer arrival rates,
constant staffing throughout the week and constant opening hours. We have used the average values of real
world case study data to define the constant values. This has resulted in different values for the different
case study department types. As this is a simulation model we cannot take out all the stochasticity, but this
way at least we can reduce the system noise to clearly see the impact of the parameter under investigation.
When we progress to reintroduce the system noise, the knowledge we have accumulated when
experimenting in noise reduction mode helps us to better understand patterns in systems outcomes, and be
better able to attribute causation to the introduction of a particular variable (bearing in mind that in the end
we are particularly interested in patterns between variables when they are interacting with one another and
not in isolation).
Word of mouth (introduced in v3+v4): We have developed two different strategies for modeling WOM
(which have been implemented in the ManPraSim model v3 (static main customer pool) and in v4
(dynamic main customer pool). Both strategies use the same algorithm to calculate the additional customers
attracted to the department through positive WOM and those lost customers attributable to negative WOM.
They differ in the way they pick these customers. In the first case we have used a static main customer pool
which is defined with the customer split at the beginning of the simulation run. During the simulation run,
the population of the main customer pool stays constant and all customers in the pool are available to be
randomly picked to go shopping. In the second case we allow the main customer pool size to change; rather
than picking customers from the existing pool we create new customers and add them to the main customer
pool. When the main customer pool grows or declines the customer arrival rate is also adjusted, i.e. if the
pool grows by 10% due to positive WOM so does the customer arrival rate and vice versa for negative
growth.
The algorithm to calculate the number of additional new customers and the lost customers is the same for
both strategies. We count the number of customers from the previous day who were satisfied and those who
were dissatisfied with the service provided during their shopping visit(s). Satisfied customers are more
likely to recommend shopping in the department to others whereas dissatisfied customers are more likely to
advise others not to visit. The adoption rate (i.e. the success rate of convincing others to commit to either
action) depends on the proportion of people who act upon the received WOM (the adoption fraction) and
how many contacts a customer has (the contact rate). The equation behind this calculation is shown below
in Equation 1.
Equation 1. Calculation of adoption rate
n
additional
customers(
d)
=
(n
satisfied(
d
1)
−
−
n
dissatisfi
ed(d
1)
−
*)
adoption
fraction
*
contact
rate
where
:
d
=
current
day
1d
=−
y
previousda
n
=
number
Kof
At the beginning of each trading day we create a daily customer pool that contains randomly chosen
customers from the main customer pool according to the required number of customers defined by the
customer arrival rates for the day which might differ throughout the day (e.g. considering peak times).
For the first strategy (static customer pool) we simply pick the core number of customers (defined by the
original customer arrival rates) plus an additional number of customers which is calculated through
Equation 1. These customers are also selected from the main customer pool at random. If the number is
negative we release customers from our daily customer pool back into the main customer pool. If we have
to release all of our customers (due to customer dissatisfaction, which may result from bad service due to a
large number of customers visiting on the previous day) the simulation terminates. This means that in a
sense that the store is closed for good because it cannot recover from this situation in the current
implementation.
10
The second strategy (dynamic customer pool) is slightly more complex. Here we expand or decrease the
main customer pool by the number of additional or lost customers (respectively) calculated at the beginning
of each trading day. This differs from the static strategy because we do not use the existing customers to
model direct WOM influence (i.e. the ones resulting from the service satisfaction of the previous day). This
seems to be closer to reality because the WOM in most cases carries positive messages and therefore
attracts new visitors rather than motivating existing customers to come more often. Negative WOM
dissuades potential customers from visiting the department in the first place. Our daily customer pool is
created considering the hourly customer arrival rates (derived from our case study) as well as the actual size
of the main customer pool (see Equation 2).
Equation 2. Calculation of core customers per day
core
customers
per
day
=
dynamic
pool
size
*
known
customers
per
day
static
pool
size
where
:
customers
per
day
daily
pool
not
including
WOM
additional
customers
customer
=
study
per
day
derived
from
hourly
customer
rate
case
study
data
arrival
customers
case
=
dynamic
pool
size
actual
main
pool
size
=
pool
size
starting
main
pool
size
static
=
Once the daily pool size has been established, customers are chosen from the main customer pool according
to the requested customer split and customer pool size. Then additional customers are created as new
agents. The type of each new customer is determined at random. They are created with a positive
satisfaction score of +1 because they have heard only positive things about the department and therefore
will already have a positive attitude toward the shop (otherwise they would not have been attracted to it).
Through these additional (or lost) agents the daily customer pool size can expand (or contract).
If the negative WOM causes an overall reduction in customers then we choose customers at random from
the daily customer pool. Whether or not a particular customer is permanently removed from the main
customer pool is determined as follows, depending on the satisfaction score of the chosen customer. If he or
she has a positive satisfaction score then the score is neutralized and the customer is returned to the daily
customer pool (i.e. he or she can come back for further shopping visits but the shop must start to satisfy the
customer’s needs for good service to secure further visits from the customer). If he or she has a neutral or
negative score he or she is permanently eliminated from the simulation (i.e. he or she will not come back
for any more shopping trips). In the second case the main customer pool size will shrink. If the negative
WOM results in more agents being deleted than there are customers available in the daily customer pool the
simulation will terminate (and the department cannot recover from this in the current implementation).
For both strategies, when it reaches shop closing time all customers from the daily customer pool are
released back into the main customer pool where they are available for the next day. For the second
strategy (dynamic customer pool) it is very likely that the main pool size will then change due to WOM-
triggered additions or losses of customers whereas for the first strategy (static customer pool) the main pool
size remains constant.
New performance measures: With the introduction of a finite population (represented by our customer
pool) we have had to rethink the way in which we collect statistics about the satisfaction of customers.
Previously, the life span of a customer has been a single visit to the department. At the end of his or her
visit, the individual’s satisfaction score (direction and value) has been recorded. Now the life span of a
customer lasts the full runtime of the simulation and he or she can be picked several times to visit the
department during that period. Our previous performance measures now collect different information:
satisfaction scores considering customers’ satisfaction history. These measures do not reflect individuals’
satisfaction with the current service experience but instead the satisfaction with the overall service
experience during the lifetime of the agent. Furthermore, they are biased to some extent in that an
indifferent rating quickly shifts into satisfaction or dissatisfaction (arguably this is realistic because most
people tend to make a judgment one way or the other).
11
Whilst the above is still a valuable piece of information we would also like to know how current service is
perceived by each customer. For this reason we have introduced a new set of performance measures to
record the experience of each customer’s individual visit (referred to as Customer Satisfaction Measure –
Experienced Per Visit or CSM-EPV). These are the same measures as before but on a day-to-day basis they
are not anchored by the customer’s previous experiences. We also examine the sum of these ‘per visit’
scores across the lifetime of all customers (referred to as Customer Satisfaction Measure – Accumulated
Historical Data or CSM-AHD).
Another new measure tracks the satisfaction growth for customers’ current and overall service experience.
With the incorporation of varying customer arrival rates, opening hours and staffing we have brought in a
set of performance measures that capture the impact of these variations on a daily basis. These measures
are particularly useful for optimizing departmental performance throughout the week. We also record the
satisfaction growth per each individual customer visit. At the end of the simulation run the simulation
model produces a frequency distribution which informs us about how satisfied or dissatisfied individual
customers have been with the service provided. Furthermore, all forms of customer queue (cashier, normal
help, expert help, and refund decision) are now monitored through new performance measures that record
how many people have been queuing in a specific queue, and how many of these lost their patience and left
the queue prematurely. This measure helps us to understand individual customers’ needs because it tells us
what individual customers think about the service provided. Finally, we have added some methods for
writing all parameters and performance measures into files to support documentation and analysis of the
experiments.
4.3 Model Validation
Validation ensures that the model meets its intended requirements in terms of the methods employed and
the results obtained. In order to test the operation of the ManPraSim model and ascertain face validity we
have completed several experiments.
We have completed validation exercises on the micro and macro level, as proposed by [36]. Micro
simulation comprises tracing an individual entity through the system by building a trajectory of an
individual’s behavior throughout the runtime. We have conducted this test for our two different agent types
(customer and staff agents) considering all of the different roles these can take. Furthermore we have
validated who triggers which process and for what reason. We have then extensively tested the underlying
queuing system. On the macro level we have tried to establish simulation model performance outputs that
are sound. It has turned out that conducting the experiments with the input data we collected during our
case studies did not provide us with a satisfactory match to the performance output data of the real system.
We identified the staffing setup used in the simulation models as the root cause of the problems. The data
we use here have been derived from real staff rotas. On paper these real rotas suggested that all workers are
engaged in exactly the same (one) type of work throughout the day but we know from working with, and
observing workers in, the case study organization that in reality each role includes a variety of activities.
Staff members in the real organization allocate their time proactively between competing tasks such as
customer service, stock replenishment, and processing purchases. Proactive behavior refers to the
individual staff members’ self-started, long term oriented, and persistent service behavior which goes
beyond explicit job demands [48].
So far our simulation models incorporate only one type of work per staff member. For example, the A&TV
staff rota indicates that only one dedicated cashier works on weekdays. When we have attempted to model
this arrangement, customer queues have become extremely long, and the majority of customers ended up
losing their patience and leaving the department prematurely with a high level of dissatisfaction. In the real
system we observed other staff members working flexibly to meet the customer demand, and if the queue
of customers grew beyond a certain point then one or two would step in and open up further tills to take
customers’ money before they became dissatisfied with waiting. Furthermore, we observed that a service
staff member, when advising a customer, would often continue to close the sale (e.g. filling in guarantee
forms and receiving payment from the customer) rather than asking the customer to queue at the till for a
cashier whilst moving on to the next customer.
12
This means that currently our abstraction level is too high and we do not model the real system in an
appropriate way. We hope to be able to fix this in a later version. For now we do not consider this to be a
big problem so long as we are aware of it. We model as an exercise to gain insights into key variables and
their causes and effects and to construct reasonable arguments as to why events can or cannot occur based
on the model; we model for insights, not precise numbers.
In our experiments we have modulated the staffing levels to allow us to observe the effects of changing key
variables but we have tried to maintain the main characteristic differences between the departments (i.e.,
we still use more staff in the WW department compared to the A&TV department, only the amount has
changed).
5. Experiments
The purpose of the experiments described below is to further test the behavior of the simulation models as
they become increasingly sophisticated, rather than to investigate management practices per se. We have
defined a set of standard settings (including all probabilities, staffing levels and the customer type split) for
each department type which we use as a basis for all our experiments. The standard settings exclude the
main customer pool sizes for the different departments which are determined in the first experiment and
added to the set of standard settings for subsequent experiments. For the experiments that involved only a
static main customer pool the run length has been 10 weeks. For the experiments that involved a dynamic
main customer pool or both types the run length has been 52 weeks. We have conducted 20 replications (in
most cases) to allow the application of rigorous statistical tests.
5.1 Comparing Customer Pool Sizes
The first experiment is a sensitivity analysis. We want to find out what impact the customer pool size has
on the simulation results and which of our performance measures are affected by it. For this experiment we
have used our new noise reduction mode (described in Section 4.2.2). It allows us to focus our attention on
the impact of the variable to be investigated. We have run the experiments separately for both case study
department types using the standard settings and a pool size ranging from 2,000 to 10,000 customers in
increments of 2,000. We will interpret the results in terms of customer-related performance measures,
which can be separated out between the standard measures which are defined explicitly in terms of at which
stage of their visit a customer leaves the department, and those related to customer satisfaction and
dissatisfaction.
Hypothesis 1: We predict that varying the customer pool size will not significantly change standard
customer measures nor those customer satisfaction measures related measured in terms of experience per
visit (CSM-EPV).
Hypothesis 2: We predict that the customer satisfaction measures which accumulate historical data (CSM-
AHD) will result in significantly more customers being categorised as either ‘satisfied’ or ‘dissatisfied’
when compared to the number of customers in these categories for the customer satisfaction measure CSM-
EPV.
Hypothesis 3: We predict that the customer pool size will significantly impact on all CSM-AHD measures,
specifically the greater the customer pool size, the higher the count of neutral customers, and the lower the
count of satisfied and dissatisfied customers.
Our results in percentage terms (see Table 4) appear to provide support for all hypotheses. In order to
rigorously test our hypotheses, statistical analyses were applied to the raw customer counts as follows. To
investigate Hypothesis 1, a series of one-way between groups ANOVAs were conducted separately for
A&TV and WW. Levene’s test for homogeneity of variances was violated by CSM-EPV for satisfied
customers in A&TV only, therefore a more stringent significance value was set for this variable (p<.01).
Given that 8 simultaneous comparisons were to be drawn, a Bonferroni adjustment was made to the alpha
level, tightening the significance levels to p<.00625 (from p<.05) and p<.00125 (from p<.01). For A&TV,
no significant differences were found in the standard performance measures or CSM-EPV between
13
different customer pool sizes. For WW, no significant differences were found apart from the number of
customer leaving before receiving normal help (p=.0059). Inspecting mean differences revealed that the
mean customer count with a customer pool of 8,000 was higher than for 4,000, 6,000, and 10,000
customers. However, upon examination of supporting data, no single paired comparison was significantly
different. Across customer pools, the mean customer count varied between just 4.6 and 7.5 customers
leaving before receiving normal help, and so we can explain this pattern in terms of the relative infrequency
of this event and conclude that the difference is of little practical significance. This leads us to conclude
that overall the evidence supports Hypothesis 1. We predicted this pattern because customer decisions are
driven by customer types and the proportional mix of each type is kept constant throughout the experiment.
To test Hypothesis 2, a series of independent samples T-tests were conducted to evaluate the differences
between the two methods of measuring customer satisfaction. For A&TV, a significantly higher count of
customers were categorized as satisfied on CSM-AHD (M=18,031.18, SD=824.11) as compared to their
counterparts on the CSM-EPV measure (M=15,071.12, SD=108.47), t(102.43)=35.61, p<.000 (equal
variances not assumed). The same pattern was reflected in a significantly higher count of dissatisfied
customers (M=17,134.13, SD=895.06) on CSM-AHD as compared to CSM-EPV (M=11,404.65,
SD=221.34), t(111.06)=62.14, p<.000 (equal variances not assumed). The effect sizes are very large in both
cases, yielding .86 and .95 respectively.
For WW, a significantly higher count of customers were categorized as satisfied on CSM-AHD
(M=54,161.66, SD=3,559.94) as compared to on CSM-EPV (M=33,508.33, SD=82.76), t(99.11)=58.00,
p<.000 (equal variances not assumed). The inverse occurred for the count of dissatisfied customers,
whereby a smaller number were counted on CSM-AHD (M=3,447.49, SD=1,049.66) than CSM-EPV
(M=4,626.00, SD=128.59), t(101.97)=-11.14, p<.000 (equal variances not assumed). The effect size was
very large for A&TV at .94, and medium-to-large at .39 for WW.
Overall as expected CSM-AHD generally results in a significantly higher count of satisfied and dissatisfied
customers than CSM-EPV. This phenomenon has been discussed in Section 4.2.2. The evidence for A&TV
unequivocally supports this hypothesis, whereas it is mixed for WW. The surprisingly relatively low count
of dissatisfied of CSM-AHD in WW recurs in evaluation of the next hypothesis (see below).
Table 4. Descriptive statistics for Experiment 1 (all to 2 d.p.)
A&TV
Customer pool size
Customers …
… leaving after making a purchase
… leaving before receiving normal help
… leaving before receiving expert help
… leaving whilst waiting to pay
… leaving before f inding anything
… leaving satisf ied (accumulated historical data)
… leaving neutral (accumulated historical data)
… leaving dissatisf ied (accumulated historical data)
… leaving satisf ied (experience per visit)
… leaving neutral (experience per visit)
… leaving dissatisf ied (experience per visit)
Customer pool size
Customers …
… leaving after making a purchase
… leaving before receiving normal help
… leaving before receiving expert help
… leaving whilst waiting to pay
… leaving before f inding anything
… leaving satisf ied (accumulated historical data)
… leaving neutral (accumulated historical data)
… leaving dissatisf ied (accumulated historical data)
… leaving satisf ied (experience per visit)
… leaving neutral (experience per visit)
… leaving dissatisf ied (experience per visit)
2,000
4,000
6,000
8,000
10,000
Mean SD
Mean SD
Mean SD
Mean SD
Mean SD
29.5% 0.1% 29.5% 0.1% 29.6% 0.1% 29.5% 0.1% 29.4% 0.1%
2.7% 0.2% 2.7% 0.2% 2.8% 0.2% 2.7% 0.2% 2.8% 0.2%
1.1% 0.1% 1.1% 0.1% 1.1% 0.0% 1.1% 0.0% 1.1% 0.0%
17.5% 0.3% 17.4% 0.3% 17.3% 0.4% 17.4% 0.3% 17.4% 0.3%
49.3% 0.4% 49.3% 0.4% 49.3% 0.3% 49.3% 0.3% 49.3% 0.3%
46.5% 1.9% 45.3% 1.2% 43.8% 0.8% 42.9% 0.6% 42.0% 0.9%
8.7% 0.2% 12.1% 0.3% 14.6% 0.2% 16.5% 0.2% 18.1% 0.3%
44.8% 2.2% 42.5% 1.4% 41.6% 1.1% 40.6% 1.0% 39.9% 1.1%
36.8% 0.3% 36.9% 0.2% 36.9% 0.2% 36.8% 0.2% 36.7% 0.4%
35.3% 0.3% 35.3% 0.3% 35.3% 0.3% 35.2% 0.3% 35.2% 0.2%
27.9% 0.6% 27.8% 0.5% 27.8% 0.6% 27.9% 0.5% 28.0% 0.6%
WW
2,000
4,000
6,000
8,000
10,000
Mean SD
Mean SD
Mean SD
Mean SD
Mean SD
46.5% 0.1% 46.5% 0.1% 46.5% 0.1% 46.6% 0.1% 46.5% 0.1%
0.0% 0.0% 0.0% 0.0% 0.0% 0.0% 0.0% 0.0% 0.0% 0.0%
0.1% 0.0% 0.1% 0.0% 0.1% 0.0% 0.1% 0.0% 0.1% 0.0%
10.0% 0.2% 10.0% 0.3% 10.0% 0.3% 10.0% 0.2% 10.0% 0.2%
43.4% 0.3% 43.4% 0.3% 43.3% 0.3% 43.3% 0.2% 43.3% 0.2%
93.4% 0.3% 88.3% 0.3% 84.0% 0.3% 80.7% 0.3% 78.0% 0.3%
3.9% 0.1% 7.2% 0.2% 10.2% 0.2% 12.6% 0.2% 14.7% 0.2%
2.7% 0.2% 4.5% 0.3% 5.8% 0.2% 6.7% 0.3% 7.3% 0.3%
52.4% 0.2% 52.5% 0.1% 52.5% 0.1% 52.5% 0.1% 52.5% 0.1%
40.3% 0.3% 40.3% 0.2% 40.2% 0.3% 40.2% 0.2% 40.2% 0.2%
7.3% 0.2% 7.2% 0.3% 7.2% 0.2% 7.2% 0.2% 7.3% 0.2%
14
To investigate Hypothesis 3, a series of one-way between groups ANOVAs were conducted. Levene’s test
for homogeneity of variances was violated by CSM-AHD for satisfied and dissatisfied customers in A&TV
and only dissatisfied customers in WW, therefore a more stringent significance value was set for these
variables (p<.01). Further to this a Bonferroni adjustment was implemented because of the multiple
comparisons, tightening the significance value to p< .0167 (from p<.05) and p<.0033 (from p<.01).
Separately for A&TV and WW, all 3 ANOVAs for each CSM-AHD variable exhibited significant
differences (p<.000). Examining mean differences for A&TV: for satisfied customers, significant
differences were present between all paired pool sizes except for between 2,000 and 4,000; 6,000 and
8,000; and 8,000 and 10,000. The mean customer count uniformly decreased as the customer pool size
increased, with significant differences focused on comparisons between paired customer pool sizes with a
greater size differential. For neutral customers, all paired comparisons were significantly different (p<.000),
and examination of mean differences reveals a uniformly increasing trend in the customer count as the
customer pool size increases. For dissatisfied customers, significant differences persisted (at p<.0033)
between the following pairs: 2,000 and all other pool sizes; 4,000 and 8,000; and 4,000 and 10,000. As
customer pool size increased, the count of dissatisfied customers uniformly decreased.
Looking at mean differences for WW: for satisfied customers, all paired comparisons were significantly
different (p<.000), and an examination of mean differences revealed a uniformly decreasing trend in the
count of satisfied customers as customer pool size increases. For neutral customers, again all paired
comparisons exhibited significant differences (p<.000), and this time the mean customer counts revealed a
uniformly increasing trend as customer pool size increases. Finally, for dissatisfied customers, all paired
comparisons were significantly different (p<.000), and the mean customer counts behaved according to a
uniformly increasing trend as customer pool size increases. These results follow a similar pattern to that
presented in A&TV, apart from the increasing number of dissatisfied customers. We expect that this
finding can be explained in terms of an accumulation of the impact of a number of subtle differences in the
ability of the department to cope with greatly increased numbers of customers (which one-by-one did not
produce significant effects, see evaluation of Hypothesis 1).
Looking at the percentages presented in Table 4, we can see that the bigger the customer pool size the more
the CSM-AHD values tend to the CSM-EPV values. This can be explained by the fact that with a larger
population the likelihood that a specific customer enters the department repeatedly (and therefore
accumulates some historical data) reduces. If we sufficiently increase the customer population we expect
both customer satisfaction measures to show similar results because the majority of customers are only
picked once during the simulation runtime and therefore most customers will enter the department with a
neutral satisfaction score rather than with an accumulated score. In summary for Hypothesis 3 we can
conclude that the evidence largely supports our prediction, with the exception of dissatisfied customer
counts in WW for which we have presented an explanation.
The results for Experiment 1 demonstrate that it is therefore important to select and maintain one customer
pool size to ensure that all performance measures are providing comparable information for different
experiments. Our case study organization does not collect or hold data on customer pool size so we have
instead calculated a suitable value based on the average numbers of customers who visit the department per
day (585 for A&TV and 915 for WW) and an estimate of customers’ average inter-arrival time (two weeks
for A&TV and one week for WW). These values have been estimated considering the standard customer
type split for the corresponding department as well as customer demand for the items sold in that
department. They do not necessarily apply to other customer type splits. Using these values we have
calculated an appropriate customer pool size for each department (8,000 for A&TV and 6,500 for WW).
We use these customer pool sizes for all subsequent experiments.
5.2 Comparing Normal and Noise Reduction Mode
In our second experiment we want to investigate the importance of considering hourly differences in
customer arrival rates and daily differences in staffing and opening hours (normal mode). These features
have been added to investigate hypotheses related to the real performance of the case study departments
and specific patterns that occur on a day-to-day basis. Modeling this level of detail can be problematic
15
when we conduct a sensitivity analysis where we want to be able to attribute causation to the introduction
of a particular variable. For this kind of experiment we prefer to control some of the system noise to clearly
see the impact of the parameter under investigation (noise reduction mode).
Hypothesis 4: We predict that the standard customer performance measures will not significantly differ
across the two modes.
Hypothesis 5: We predict the two modes will produce significantly different values when looking at the
daily performance measures on a day-to-day basis (rather than using averages).
<Insert Figure 4 somewhere here>
Table 5. Descriptive statistics for Experiment 2 (all to 2 d.p.)
Adoption fraction
Customers …
V
T
&
A
W
W
Overall customer count [per day]
… leaving after making a purchase [runtime]
… leaving before receiving normal help [runtime]
… leaving before receiving expert help [runtime]
… leaving whilst waiting to pay [runtime]
… leaving before finding anything [runtime]
Overall customer count [per day]
… leaving after making a purchase
… leaving before receiving normal help
… leaving before receiving expert help
… leaving whilst waiting to pay
… leaving before finding anything
T-Test
AF = 1
AF = 0.5
AF = 0
t-value p-value Eta 2
Mean
Mean
Mean
SD
SD
SD
-7.10
0.00
0.04
29.09
609.38
8.27
601.09
6.04
584.17
0.00
0.99
-0.01
50.29
46.75 12,063.05
36.97 12,094.30
12,062.95
0.14
0.00
-21.39
99.01
1,706.55
63.92
1,343.30
67.36
1,133.80
0.00
0.87
0.17
463.55
457.00
464.65
22.27
18.25
18.47
0.02
0.00
-16.05
7,048.70 105.59
7,633.60 124.13
7,520.30 116.47
0.00
0.00
-12.25
20,182.00 134.56 20,661.65 145.08 20,789.75 176.33
-65.00
0.00
0.66
910.58
6.25
1,093.24
22.44
1,224.79
39.98
0.03
0.00
-39.43
45.29
31.34 30,256.45
44.48 30,097.55
29,696.75
0.81
0.00
-19.66
17.71
84.60
7.24
29.55
3.30
5.40
0.67
0.00
83.60
-22.68
9.04
130.75
12.48
170.40
14.53
0.68
0.00
6,291.95 165.73 13,148.10 200.16 18,050.20 164.96 -224.88
27,662.80 166.79 33,120.80 198.49 37,173.90 196.79 -164.89
0.00
0.30
Looking at Figure 4 it is clear that there is very little variation between the two different operation modes
across the range of standard performance measures. Examining the descriptives (see Table 5), in most cases
the runtime performance measures in both modes are approximately the same with a small number of
exceptions. Contrary to hypothesis 4, in WW approximately 25% more customers leave whilst waiting to
pay in the normal mode (which consequently influences both customer satisfaction measures), as opposed
to the noise reduction mode. This apparent cashier bottleneck appears to be exacerbated by any
combination of the three factors which are held constant in noise reduction mode. Further analysis is
required to isolate the precise cause. We can also see that, as predicted, the smaller the values the more they
differ (on an absolute basis) between the two modes as they are accumulated from a smaller number of
events and therefore the influence of different random number streams is more apparent.
<Insert Figure 5 somewhere here>
Examining the daily measures on a day-to-day basis for A&TV in Figure 5, we can observe clear
differentiation between the number of customers and transactions across weekdays, Saturdays and Sundays
in normal mode whereas the noise reduction mode, as expected, shows no clear patterns. This additional
information can be very useful for optimizing the system. For example, we have the lowest number of
transactions on Sundays (day 1, 8, etc.) although we do not have the lowest number of customers on this
day, therefore we must have a problem with the optimizing the staffing arrangement on Sundays, because
on average more customers leave the shop on Sundays without buying anything, despite the fact that the
probability of this remains the same for all days of the week.
Overall the experiment has shown that it is legitimate to use the noise reduction mode within the scope of a
sensitivity analysis to test the impact of a specific factor on system behavior. It is only when we are
interested in specific features that are not available in noise reduction mode (e.g. when we want to study
differences between particular days of the week or when we need to obtain quantitative data to optimize a
real system) that we need to choose the normal mode.
5.3 Evaluation the Implementation of WOM
16
In the first part of this experiment we want to investigate how customer satisfaction can be influenced by
using different ways of representing inter-linkages within a customer population. We compare increasingly
sophisticated forms of implementing WOM. Firstly we have used a static customer pool where customer
shopping behavior is random (i.e. not influenced by customer’s word of mouth). Secondly, we have
introduced a static customer pool where shopping behavior is influenced by word of mouth. Finally, we
employ a dynamic customer pool to allow us to investigate growth (or reduction) in the size of the overall
customer pool (or customer base).
We have chosen a runtime of 52 weeks because we expect to see model developments further into the
model runtime, in particular for the dynamic WOM implementation. For this experiment we have used our
new noise reduction mode (described in Section 4.2.2) and the following WOM settings: an adoption
fraction of 0.5 and contact rate of 2. We expect there to be a link between customers’ shopping behavior
and customer satisfaction scores, moderated by the type of retail department (i.e. an interaction effect).
Specifically, we predict that:
Hypothesis 6: In the dynamic conditions, customer pool size will increase during the simulation run for
each department up to a maximum value, and maintain this level for the run duration.
Hypothesis 7: Average daily customer numbers will be significantly different for each of the 6 WOM
conditions. In particular, we predict that WW will experience a higher number of customer visits than
A&TV, the more advanced the WOM implementation the higher the number of customer visits, and we
expect to observe a positive moderating effect whereby an interaction between the two can explain further
increases in average daily customer numbers.
Hypothesis 8: Within each department the average number of satisfied customers will significantly
decrease, whereas the average number of dissatisfied customers will significantly increase (both CSM-
EPV), with the sophistication of the WOM implementation.
The results are presented in multiple forms to allow detailed analysis. Figures 6 to 9 show the results for a
single simulation run on a day to day basis, which are integral to revealing day-to-day fluctuations. Due to
concerns about the quality of presentation, this will be restricted to the first 26 weeks of each simulation
run. The authors have examined graphs for the full runtime period and variables’ trends continued as would
be expected based on the first 26 weeks. Table 6 shows the descriptive statistics of the average results of
the experiment; tabulated values are daily averages across all replications.
Regarding Hypothesis 6, Figure 6 clearly displays that under dynamic conditions the customer pool size
grows over the early stages of the simulation until it reaches a maximum value and then stabilizes around
this level (for averages see Table 6). Interestingly, the graph displays that WW reaches a notably higher
value than A&TV, which we can understand in terms of the tighter staffing constraints in A&TV restricting
the availability of staff to serve customers (and hence constrain the growth of the customer population). In
WW, the growth in customer numbers can be alikened to the diffusion of customers’ word-of-mouth in the
real world; as the numbers grow, the rate of growth also increases. In contrast, the growth in customer
numbers triggered by WOM in A&TV has a steadily slowing rate of growth, which may be related to the
department’s limited capacity to satisfy growing customer numbers.
Table 6. Descriptive statistics for Experiment 3 (all to 2 d.p.)
17
A&TV
static pool, no WOM
Mean
SD
62,679.65
4,727.70
2,245.15
37,010.95
88.11
105.62
34.55
195.20
static pool, WOM
Mean
SD
63,224.00
10,760.25
2,635.05
47,887.25
69.60
134.67
58.72
270.52
dynam ic pool, WOM
Mean
SD
63,711.70
25,787.85
2,969.45
57,511.75
98.50
273.77
55.50
426.80
105,929.80
311.08
119,330.35
268.35
144,318.30
153,231.20
17,211.90
73,393.80
76,344.00
122,440.55
45,052.35
243,836.90
30.50
722.13
240.75
803.15
171.84
333.06
232.58
286.48
5.28
124,970.40
24,612.60
144,716.05
69,782.75
156,304.80
68,211.50
294,299.05
3.03
629.55
971.28
267.97
851.11
130.40
640.76
213.43
750.04
0.70
165,413.55
13,501.05
33,678.65
81,322.90
100,754.15
30,516.20
212,593.25
657.24
209.10
740.80
219.71
430.03
205.27
447.40
5.16
26.80
WW
static pool, no WOM
Mean
SD
152,433.10
0.40
112.15
26,591.25
131.28
0.60
11.87
400.65
static pool, WOM
Mean
SD
156,100.00
2.40
217.80
83,259.55
83.91
1.93
13.26
361.07
dynam ic pool, WOM
Mean
SD
159,585.35
17,590.80
1,870.45
199,493.30
91.58
600.72
35.82
1,027.04
152,807.05
318,549.55
8,495.55
4,898.85
164,114.20
146,188.90
21,640.85
331,943.95
51.10
432.68
629.39
159.34
275.81
151.98
435.49
342.18
601.55
7.23
204,547.10
409,429.25
12,185.85
22,511.75
180,283.15
196,015.65
67,828.05
444,126.85
68.50
601.35
896.42
144.87
686.50
183.70
594.29
277.59
616.05
7.27
373,335.45
1,121.25
382,430.25
41,828.45
2,072.47
571.67
327,616.65
1,494.42
175,356.25
405,963.70
404.53
1,179.03
170,555.40
309.05
751,875.35
1,296.40
5.87
0.48
Customer pool type
Customers …
… leaving after making a purchase
… leaving before receiving normal help
… leaving before receiving expert help
… leaving whilst waiting to pay
… leaving before f inding anything
… leaving satisf ied (accumulated historical data)
… leaving neutral (accumulated historical data)
… leaving dissatisfied (accumulated historical data)
… leaving satisf ied (experience per visit)
… leaving neutral (experience per visit)
… leaving dissatisfied (experience per visit)
Overall no. of customers
Average no. of visits per customer
Customer pool type
Customers …
… leaving after making a purchase
… leaving before receiving normal help
… leaving before receiving expert help
… leaving whilst waiting to pay
… leaving before f inding anything
… leaving satisf ied (accumulated historical data)
… leaving neutral (accumulated historical data)
… leaving dissatisfied (accumulated historical data)
… leaving satisf ied (experience per visit)
… leaving neutral (experience per visit)
… leaving dissatisfied (experience per visit)
Overall no. of customers
Average no. of visits per customer
A two-way between groups ANOVA was conducted to test Hypothesis 7. Levene’s test for homogeneity of
variances was violated, and so we introduced a more stringent significance level (p<.01). The ANOVA
revealed a statistically significant main effect for department type [F(1,114)=3,698,165, p=.000] and WOM
implementation [F(2,114)=1,226,034, p=.000]. The effect sizes were extremely high in both cases (partial
eta-squared = 1.00). Examining mean differences by department type, WW’s customer count was
significantly higher than for A&TV. Tukey’s post-hoc comparisons were applied to the WOM
implementation variable, and all paired comparisons were significant. Results indicated that the more
sophisticated the WOM implementation, the higher the customer count. There was also a significant
interaction effect between the two independent variables [F(2,114)=572858.8, p=.000] with a very high
effect size (partial eta-squared = 1.00). This finding suggests that department type moderates the effect of
the WOM implementation, resulting in increasingly higher customer counts for WW (as compared to
A&TV) with increases in the sophistication of WOM implementation. These results provide support for
Hypothesis 7.
Differences in the daily count of customers visiting the department are presented in Figure 7. We expected
these relationships because WW has an inherently greater capacity to serve an increased number of
customers using the same amount of resources due to the relatively low service requirement of the average
WW customer. Although A&TV has some scope to increase its customer base, customer requirements for
advice and attention constraint the department’s ability to deal with an increased volume of customers. In
terms of different WOM implementations, the more sophisticated the implementation, the more
opportunities that customers have to spread the word and encourage other customers to visit. Consequently
we expected that more sophisticated versions would continue to grow customer numbers, and the
interaction with department type builds on the arguments already put forward.
It appears that the restricted availability of staff to serve customers is preventing a commensurate increase
in sales. Key bottlenecks occur in A&TV with the provision of normal help and cashier availability to take
payment, and the bottlenecks in WW occur with the same variables and also the provision of expert help
(see Table 6). All of these bottlenecks result in a significant rise in customers who leave without finding
anything to buy in either department.
<Insert Figure 6 somewhere here>
18
<Insert Figure 7 somewhere here>
Daily differences in the daily count of CSM-EPV satisfied and dissatisfied customers visiting the
department are presented in Figures 8 and 9. A series of one-way between-groups ANOVAs were used to
test Hypothesis 8 and evaluate the impact of different WOM implementations on average measures of
CSM-EPV. A Bernoulli correction was applied to tighten the significance value to p<.025. For A&TV,
tests revealed a statistically significant difference between the three WOM implementations for the number
of satisfied customers [F(2, 59)=21,201.95, p<.000] and the number of dissatisfied customers [F(2,
59)=152,952.60, p<.000]. The effect sizes, calculated using eta-squared, were both very high at 1.00.
Tukey’s post-hoc comparisons identified significant differences between every single paired comparison in
the directions predicted (p<.000).
For WW, Levene’s test for homogeneity of variances was violated for satisfied customers, and so the p-
value for this variable was further restricted to p<.005. The ANOVA indicated a statistically significant
difference between the three WOM implementations for the number of satisfied customers [F(2,
59)=18,689.89, p<.000] and the number of dissatisfied customers [F(2, 59)=1,203,536, p<.000]. The effect
sizes were very high (eta-squared 1.00 for both). Tukey’s post hoc tests revealed significant differences
between all paired comparisons (p<.000). All were in the predicted direction, with the exception of a large
increase in the number of satisfied customers between the first and second implementations of WOM. This
exception may be attributable to some slack in the WW staffing being taken up as the level of WOM
sophistication (and hence potential customer pool) increased. However, with further WOM developments
(dynamic customer pool) the staffing constraints start to take effect and the number of satisfied customers
decreases. Looking at Figure 8, it is clear that on a day-to-day basis there are great fluctuations in customer
satisfaction. In Figure 9, again much day-to-day variation can be seen, and the significant increase in the
average number of dissatisfied customers in the dynamic WW model can be clearly observed.
In general, Hypothesis 8 has been supported, in that evidence suggests that the average number of satisfied
customers (CSM-EPV) will decrease with a more sophisticated WOM implementation, and that the number
of dissatisfied customers will increase (CSM-EPV). The exceptional behavior of the count of satisfied
customers in WW has been explained in terms of slack in the staffing of the department, and with further
increases to customer number we would expect the corresponding decrease in the number of satisfied
customers to continue.
<Insert Figure 8 somewhere here>
<Insert Figure 9 somewhere here>
In the second part of the experiment we want to explore daily fluctuations in customer numbers. We want
to find out if there is a set threshold value for WOM, beyond which we would on the next day create an
empty department (and hence cause its permanent closure). This could be triggered by the great variation in
daily fluctuations, whereby a very high amount of satisfied customers causes an overwhelming volume of
customers on the subsequent day. This could result in crucially high levels of dissatisfaction and result in
no customers visiting the department on the day after.
For this experiment we have used our new noise reduction mode (described in Section 4.2.2). We vary the
adoption fraction using a step interval of 0.2 whilst keeping the contact rate constant at 5. The high contact
rate value has been selected to reach the upper boundary of customer numbers in a reasonable amount of
trials.
Hypothesis 9: We predict that the higher the WOM adoption fraction, the greater the increase and
corresponding subsequent decrease in the number of customer visits. We expect this relationship to be
linked to a reduction in satisfaction per customer. We hypothesize that this pattern will vary over time
because the impact of WOM will vary on a daily basis.
19
Hypothesis 10: We predict that there is a threshold upon which the daily number of customers shrinks to 0
and consequently the department ceases trading. We expect that this threshold will occur at an earlier stage
for A&TV than WW.
Given that we are looking at daily differences, it is important to examine what is going on graphically.
Therefore hypotheses will be tested through evaluation of simulation output in terms of daily fluctuations.
Comparing average values dampens this variability which we are interested in (due to model stochasticity),
and so we will be assess hypotheses using figures and not statistical tests.
Figure 10 presents the customer count relating to different adoption fractions across WW and A&TV (static
model). Comparing the two departments, a greater increase in customer numbers can be seen between
experimental conditions in WW than in A&TV as the customer pool grows, which is to be expected. This is
because in addition to the customer service limitations of A&TV, the starting customer pool size in WW is
23% greater than that of A&TV.
Assessing Hypothesis 9, Figures 10 (and also Figures 11 and 12) suggests that the higher the adoption
fraction the greater the day-to-day fluctuations in customer numbers. Each individual line tends to vary a
roughly equal amount above and below its middle, adding weight to the hypothesis that each increase in
customer numbers is accompanied by a subsequent decrease. Further evidence supporting this hypothesis
is covered in assessment of Hypothesis 10.
Evaluating Hypothesis 10, we can see in Figures 10, 11 and 12 that the results for A&TV suggest that it is
not able to meet the increased customer demands which the highest adoption fraction (0.6) places on it. The
overall shapes of the extreme cases (adoption fraction 0.6) behave in a pronounced cyclic manner for both
static and dynamic WOM implementations, with relatively large customer peaks and troughs compared to
the other adoption fractions in A&TV. Due to a day with no customers, the A&TV department ceases
business. This does appear to be caused by a sharp increase in one day’s customers triggering a sharp
decrease in the following day’s customer numbers. We predicted this relationship because the department’s
staffing resources remain the same regardless of customer pool growth, and therefore when the daily
customer pool grows, the same amount of staffing resources are shared between a larger group of
customers. The lower adoption fractions (0.2 and 0.4) result in a relatively restricted variation in customer
numbers after approximately 6 weeks in the static implementation, and 15 weeks in the dynamic
implementation. It is interesting to compare adoption fractions of 0.4 and 0.6 for the static model because
the 0.6 model only attracts a few more customers to trigger its downfall, whereas 0.4 recovers from this
near-miss.
Looking at WW in Figures 10 and 11, there are great variations in customer numbers in particular for the
highest adoption fraction (0.6) where we can see areas of pronounced oscillating peaks and troughs
alternating with less pronounced areas of daily fluctuations. For the dynamic model (Figure 12) at 50 weeks
this adoption fraction results in no customers. Given the large amount of variation in customer numbers
throughout this simulation, it is not surprising that this phenomenon occurs. Also as observed for A&TV,
all adoption fractions produce phases of relatively intense variation in customer numbers alternate with
relatively stable phases.
The figures presented support Hypothesis 10 in principle. A&TV the static WOM implementation resulted
in zero customers at week 3, whereas in WW the dynamic WOM implementation resulted in zero
customers at week 50. This provides some supports the prediction that this would happen at an earlier stage
in A&TV than in WW. Further experimentation (not documented here) investigated for each department
types we could not finish the simulation run for an adoption fraction value of 0.6 (dynamic pool). This
work identified that the boundary adoption fraction to allow the experiment to finish (with the complete
runtime of 52 weeks) occurred for the static implementation with a value of up to 0.500 for A&TV, and
0.791 for WW. The higher threshold for WW concords with what we have seen in daily differences. For
the dynamic implementation, the adoption fraction can have a value of up to 0.485 for A&TV and up to
0.599 for WW. Any adoption fraction values beyond these result in a premature termination of the
department, due to no customers.
20
In summary, we can conclude that comparing and contrasting different implementations of WOM can
provide fruitful insights into department performance. The current models help us to better understand
system outcomes where there is a finite staffing resource in a particular department, and the initial customer
demands are already ensuring there is little slack in the system (NB we observed this to a greater extent
with A&TV than for WW). Investigating a different scenario such as when a retailer has the investment to
introduce further resource with increasing customer demand would require a different configuration.
It is clear that the current implementation of a dynamic customer pool results in WOM only directly
affecting the growth or decline of the customer pool population on the following day. This means that the
behavior of customer count variable results in an unbelievable variation in day-to-day customer figures. In
the real world we would expect word of mouth to impact on an individual’s behavior with a short delay,
perhaps of a couple of days, or until the next opportunity that individual has to visit the department. Not
everyone runs to the shop immediately when he or she has received a recommendation, (NB we do not
consider that some customers can only shop on certain days of the week, or at certain times of the day), and
even if this did happen it is unlikely that a customer passing on WOM would recommend the department to
everyone immediately. There is a real delay in the spread of the WOM. Our findings so far suggest that it
would be better modeled using a positively skewed distribution showing a large immediate effect and also
an ongoing subtler effect which would be strong the more that WOM has accumulated. We will test this in
the next version of our simulation model.
<Insert Figure 10 somewhere here>
<Insert Figure 11 somewhere here>
<Insert Figure 12 somewhere here>
6. Conclusion
We have presented the conceptual design, implementation and operation of simulation models to help
inform the way we which we can understand the impact of people management practices on retail
performance. As far as we are aware this is the first time researchers have tried to use an agent-based
approach to simulate people management practices such as training and empowerment. Although our
simulation model uses specific case studies as source of information, we believe that the general model
could be adapted to other retail companies and areas of management practices that have a lot of human
interaction.
To respond to our key research questions, we have modeled and simulated customer satisfaction and the
effects of WOM diffusion on customer satisfaction. We have compared and analyzed data resulting from
two contrasting methods of modeling customer satisfaction: CSM-AHD and CSM-EPV. Likewise, we have
adopted a two-pronged approach to customers’ WOM and present comparative analysis of different
strategies to implement the WOM (using a static and a dynamic main customer pool). The evaluation of
daily trends has proved particularly valuable in understanding what causes a department to run out of
customers, and further model development is planned to implement a different approach to this.
In this paper we have focused in particular on the capabilities required to model customer evolution as a
consequence of the implementation of people management practices. We have discussed conceptual ideas
about how to consider external and internal stimuli and have presented an implementation of WOM as one
form of external stimuli. We are still testing and calibrating the new features we have implemented. The
validation experiments so far have shown that we need to improve our simulation model in order to be able
to model the real system in an appropriate way. In particular our current abstraction level with regards to
how staff spend their time is much too high. If we want to use real staffing data we need to model how staff
allocate their tasks between competing activities rather than focusing on one type of work (i.e. make our
staff members proactive). We have already modeled one form of proactive staff behavior (empowerment)
but that was only for specific experiments, e.g. (1) a normal sales staff member decides by himself or
herself whether to stay or not to stay with a customer when additional expert advice is given which allows
them to learn on the job if they wish to do so, or (2) an expert staff member helps out in the provision of
21
normal advice if no customer requires expert help (see [11]). Further development such as self-initiated till
manning needs to be implemented in order to mimic the behavior of the staff members in the real system in
a more appropriate way.
In addition to continuing to validate our current simulation model we have also planned to experiment with
different strategies of modeling customer evolution. We plan to implement and test our conceptual ideas
regarding customers’ memory of their own shopping experiences (internal stimuli). Furthermore, we have
planned to enhance the flexibility of staff members (i.e. empower them) to allow them to respond to
customer demand. This will help to solve the staffing problem we have discussed above. In the long term
we want to develop our simulation model to support testing the impact of team work related management
practices. This looks like an interesting but challenging task because we first need to come up with a way
to represent the effects of team work. Furthermore, we would like to enhance the capabilities of our agents,
giving them skills in reasoning, negotiation, and co-operation.
In conclusion, we can say that the new features appear promising and we are convinced they have already
improved our insights into the operation of the departments within a department store. In particular the new
performance measures we collect on a daily basis will be very useful in future for balancing the provision
of customer services throughout the week.
Overall, we believe that researchers should become more involved in this multi-disciplinary kind of work
to gain new insights into the behavior of organizations. In our view, the main benefit from adopting this
approach is the improved understanding of and debate about a problem domain. The very nature of the
methods involved forces researchers to be explicit about the rules underlying behavior and to think in new
ways about them. As a result, we have brought work psychology and agent-based modeling closer together
to form a new and exciting research area.
7. Acknowledgements
This work is part of an IDEAS Factory Network Project funded by the UK government through the
Engineering and Physical Sciences Research Council (EPSRC) under grant EP/D503949/1. We would also
like to thank the reviewers for their fruitful comments on earlier drafts of this article.
8. References
[1] Department of Trade and Industry. 2003. UK productivity and competitiveness indicators. DTI
Economics Paper No. 6. London, UK: DTI. http://www.berr.gov.uk/files/file14767.pdf
[2] Reynolds, J., E. Howard, D. Dragun, B. Rosewell, and P. Ormerod. 2005. Assessing the productivity of
the UK retail sector. International Review of Retail, Distribution and Consumer Research 15(3):237-
280.
[3] Delbridge, R., P. Edwards, J. Forth, P. Miskell, and J. Payne. 2006. The organisation of productivity:
Re-thinking skills and work organisation. London, UK: Advanced Institute of Management Research.
http://www.aimresearch.org/publications/orgprod.pdf.
[4] Siebers, P.O. et al. 2008. The role of management practices in closing the productivity gap. AIM
Working Paper Series 065. London, UK: Advanced
Institute of Management Research.
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1309605.
[5] Wall, T.D. and S.J. Wood. 2005. Romance of human resource management and business performance
and the case for big science. Human Relations 58(5):429-462.
[6] Pourdehnad, J., K. Maani, and H. Sedehi. 2002. System dynamics and intelligent agent-based
simulation: Where is the synergy? In Proceedings of the 20th International Conference of the System
Dynamics Society, Palermo, Italy.
[7] Birdi, K. et al. 2008. The impact of human resource and operational management practices on company
productivity: A longitudinal study. Personnel Psychology (in press).
22
[8] Patel, S. and A. Schlijper. 2004. Models of consumer behaviour. 49th European Study Group with
Industry (ESGI 2004), Oxford, UK.
[9] Nicholson, M., I. Clarke, and M. Blakemore. 2002. One brand, three ways to shop: Situational variables
and multichannel consumer behaviour. International Review of Retail, Distribution and Consumer
Research 12:131-148.
[10] Keh, H.T., S. Chu, and J. Xu. 2006. Efficiency, effectiveness and productivity of marketing in
services. European Journal of Operational Research 170(1):265-276.
[11] Siebers, P.O., U. Aickelin, H. Celia, and C. Clegg. 2007a. A multi-agent simulation of retail
management practices. In Proceedings of the Summer Computer Simulation Conference (SCSC 2007),
San Diego, USA, pp 959-966.
[12] Siebers, P.O., U. Aickelin, H. Celia, and C. Clegg. 2007b. Using intelligent agents to understand
management practices and retail productivity. In Proceedings of the Winter Simulation Conference
(WSC 2007), Washington DC, USA, pp 2212-2220.
[13] Hansen, T. 2005. Perspectives on consumer decision making: An integrated approach. Journal of
Consumer Behaviour 4(6):420-437.
[14] Tai, S.H.C. and A.M.C. Fung. 1997. Application of an environmental psychology model to in-store
buying behaviour. International Review of Retail, Distribution and Consumer Research 7(4):311-337.
[15] Youn, S. and R.J. Faber. 2000. Impulse buying: Its relation to personality traits and cues. Advances in
Consumer Research 27(1):179-185.
[16] Robinson, S. 2004. Simulation: The practice of model development and use. Chichester, UK: John
Wiley & Sons
[17] Greasley, A. 2005. Using DEA and simulation in guiding operating units to improved performance.
Journal of the Operational Research Society 56(6):727-731.
[18] Schwaiger, A. and B. Stahmer. 2003. SimMarket: Multi-agent based customer simulation and decision
support for category management. In Applying Agents for Engineering of Industrial Automation
Systems, edited by M. Shillo et al., LNAI 2831. Berlin: Springer.
[19] Simon, H.A. 1996. The sciences of the artificial (3rd Ed.). Cambridge, MA: MIT Press.
[20] Gilbert, N. and K.G. Troitzsch. 1999. Simulation for the social scientist. Open University Press, UK:
Buckinghamshire.
[21] Law, A.M., and W.D. Kelton. 1991. Simulation modeling and analysis (2nd Ed.). New York, NY:
McGraw-Hill
[22] North, M.J. and C.M. Macal. 2007. Managing business complexity: discovering strategic solutions
with agent-based modeling and simulation. New York, NY: Oxford University Press.
[23] Garrido, J.M. 2001. Object-oriented discrete-event simulation with java: A practical introduction.
New York, NY: Kluwer Academic Publishers
[24] Borshchev, A. and A. Filippov. 2004. From system dynamics and discrete event to practical agent
based modeling: reasons, techniques, tools. In Proceedings of the 22nd International Conference of the
System Dynamics Society, Oxford, UK.
[25] Epstein, J.M. and R. Axtell. 1996. Growing artificial societies: Social science from the bottom up.
Cambridge, MA: MIT Press.
[26] Jeffrey, R. 2008. Expert voice:
Icosystem's Eric Bonabeau on agent-based modeling.
http://www.cioinsight.com/article2/0,3959,1124316,00.asp.
[27] Luck, M., P. McBurney, O. Shehory, and S. Willmott. 2005. Agent technology: Computing as
interaction (a roadmap for agent based computing). Liverpool, UK: AgentLink.
23
[28] ZDNet. 2000. ZDNet Complexity Digest 2000.10: The Sims and agent based modeling.
http://www.comdig.com/index.php?id_issue=2000.10.
[29] BBC. 2008. BBC h2g2: Computer animation. http://www.bbc.co.uk/dna/h2g2/A342 1045/.
[30] Hood, L. 1998. Agent-based modeling. In Conference Proceedings: Greenhouse Beyond Kyoto,
Issues, Opportunities and Challenges, Canberra, Australia.
[31] Macal, C.M. and M.J. North. 2007. Agent-based modeling and simulation: Desktop ABMS, In
Proceedings of the Winter Simulation Conference (WSC 2007), Washington, USA, pp95-106.
[32] Carley, K.M. 1996. Validating computational models. CASOS Working Paper. Pittsburgh, PA:
Carnegie Mellon University.
[33] Fagiolo, G., P. Windrum, and A. Moneta. 2006. Empirical validation of agent-based models: A critical
survey. LEM Working Paper 2006/14. Pisa, Italy: Sant’Anna School of Advanced Studies.
[34] Leombruni, R., M. Richiardi, N.J. Saam, and M. Sonnessa. 2006. A common protocol for agent-based
social simulation. Journal of Artificial Societies and Social Simulation 9(1):15.
[35] Midgley D.F., R.E. Marks, and D. Kunchamwar. 2007. The building and assurance of agent-based
models: An example and challenge to the field. Journal of Business Research 60(8):884-893.
[36] Moss, S. and B. Edmonds. 2005. Sociology and simulation: Statistical and quantitative cross-
validation. American Journal of Sociology 110(4):1095-1131.
[37] Twomey, P. and R. Cadman. 2002. Agent-based modelling of customer behaviour in the telecoms and
media markets. info 4:56-63.
[38] Chick, S.E. 2006. Six ways to improve a simulation analysis. Journal of Simulation 1:21-28.
[39] Celia, H. 2007. Retail management practices and performance: On the shop floor. Master Thesis.
University of the West of England.
[40] Shannon, R.E. 1975. Systems simulation: The art and science. Englewood Cliffs, NJ: Prentice-Hall.
[41] Yi, Y. 1990. A critical review of consumer satisfaction, In Review of Marketing, edited by V.A.
Zeithaml. Chicago, IL: American Marketing Association.
[42] Fornell, C., M.D. Johnson, E.W. Anderson, J. Cha, and B.E. Bryant. 1996. The American customer
satisfaction index: Nature, purpose, and findings. Journal of Marketing 60(4):7-18.
[43] Ji, M.F. and W. Wood. 2007. Purchase and consumption habits: Not necessarily what you intend.
Journal of Consumer Psychology 17(4):261-276.
[44] Simon, F. and J.C. Usunier. 2007. Cognitive, demographic and situational determinants of service
customer preference for personnel-in-contact over self-service technology’. International Journal of
Research in Marketing 24(2):163-173.
[45] Marsden, P., A. Samson, and N. Upton. 2005. The economics of buzz - word of mouth drives business
growth
finds
LSE
study.
http://www.lse.ac.uk/collections/pressAndInformationOffice/newsAndEvents/archives/2005/Word_of
Mouth.htm.
[46] XJ Technologies. 2008. Official AnyLogic website. http://www.xjtek .com/.
[47] Siebers, P.O., U. Aickelin, H. Celia, and C. Clegg. 2007c. Understanding retail productivity by
simulating management practices. In Proceedings of the EUROSIM Congress on Modelling and
Simulation (EUROSIM 2007), Ljubljana, Slovenia.
[48] Rank, J., J.M. Carsten, J. Unger, and P.E. Spector. 2007. Proactive customer service performance -
relationships with individual, task, and leadership variables. Journal of Human Performance
20(4):363-390
24
Peer-Olaf Siebers is a research fellow in computer science at The University of Nottingham (UK), where
he works in the Intelligent Modelling & Analysis Group.
Uwe Aickelin is a full Professor at The University of Nottingham (UK), where he leads the Intelligent
Modelling & Analysis Group.
Helen Celia is a visiting researcher at the Centre for Organisational Strategy, Learning & Change at Leeds
University Business School (UK).
Chris W. Clegg is Professor of Organisational Psychology and Director of the Centre for Socio-Technical
Systems Design at Leeds University Business School (UK).
25
Figures:
Figure 1. Initial ideas for the simulation model and its components
Figure 2. Conceptual model of our customer agents (transition rules have been omitted for
clarity)
26
Figure 3. Customer (left) and staff (right) agent logic implementation in AnyLogic™
27
t
n
u
o
C
r
e
m
o
t
s
u
C
35000
30000
25000
20000
15000
10000
5000
0
e
s
a
h
c
r
u
p
r
e
t
f
A
p
l
e
h
l
a
m
r
o
N
p
l
e
h
t
r
e
p
x
E
A&TV
y
a
p
o
t
g
n
i
t
i
a
W
g
n
i
d
n
i
f
e
r
o
f
e
B
g
n
i
h
t
y
n
a
e
s
a
h
c
r
u
p
r
e
t
f
A
p
l
e
h
l
a
m
r
o
N
Performance Measure
Noise Reduction Mode Normal Mode
p
l
e
h
t
r
e
p
x
E
WW
y
a
p
o
t
g
n
i
t
i
a
W
g
n
i
d
n
i
f
e
r
o
f
e
B
g
n
i
h
t
y
n
a
Figure 4. Average performance measures, by department and operation mode.
s
r
e
m
o
t
s
u
c
f
o
r
e
b
m
u
n
1200
1000
800
600
400
200
0
1 2 3 4 5 6 7 8 9
0
1
1
1
2
1
3
1
4
1
5
1
6
1
7
1
8
1
9
1
0
2
1
2
2
2
3
2
4
2
5
2
6
2
7
2
8
2
9
2
0
3
1
3
2
3
3
3
4
3
5
3
6
3
7
3
8
3
9
3
0
4
1
4
2
4
3
4
4
4
5
4
6
4
7
4
8
4
9
4
0
5
1
5
2
5
3
5
4
5
5
5
6
5
7
5
8
5
9
5
0
6
1
6
2
6
3
6
4
6
5
6
6
6
7
6
8
6
9
6
0
7
day
Noise reduction mode: overal l customers
Noise reduction mode: transactions
Normal mode: overall customers
Normal mode: transactions
Figure 5. Daily customer count and number of transactions in A&TV.
28
l
o
o
p
n
i
s
r
e
m
o
t
s
u
c
f
o
r
e
b
m
u
n
16000
14000
12000
10000
8000
6000
4000
2000
0
1
k
e
e
W
n
i
g
e
B
2
k
e
e
W
n
i
g
e
B
3
k
e
e
W
n
i
g
e
B
4
k
e
e
W
n
i
g
e
B
5
k
e
e
W
n
i
g
e
B
6
k
e
e
W
n
i
g
e
B
7
k
e
e
W
n
i
g
e
B
8
k
e
e
W
n
i
g
e
B
9
k
e
e
W
n
i
g
e
B
0
1
k
e
e
W
n
i
g
e
B
1
1
k
e
e
W
n
i
g
e
B
2
1
k
e
e
W
n
i
g
e
B
3
1
k
e
e
W
n
i
g
e
B
4
1
k
e
e
W
n
i
g
e
B
5
1
k
e
e
W
n
i
g
e
B
6
1
k
e
e
W
n
i
g
e
B
7
1
k
e
e
W
n
i
g
e
B
8
1
k
e
e
W
n
i
g
e
B
9
1
k
e
e
W
n
i
g
e
B
0
2
k
e
e
W
n
i
g
e
B
1
2
k
e
e
W
n
i
g
e
B
2
2
k
e
e
W
n
i
g
e
B
3
2
k
e
e
W
n
i
g
e
B
4
2
k
e
e
W
n
i
g
e
B
5
2
k
e
e
W
n
i
g
e
B
6
2
k
e
e
W
n
i
g
e
B
time [days (only the first 26 weeks shown due to space restrictions)]
A&TV; static pool; no WOM
A&TV; static pool; WOM
A&TV; dynamic pool; WOM
WW ; static pool; no WOM
WW ; static pool; WOM
WW ; dynamic pool; WOM
Figure 6. Customer pool growth over time.
]
y
a
d
r
e
p
[
s
r
e
m
o
t
s
u
c
2400
2200
2000
1800
1600
1400
1200
1000
800
600
400
200
0
1
k
e
e
W
n
i
g
e
B
2
k
e
e
W
n
i
g
e
B
3
k
e
e
W
n
i
g
e
B
4
k
e
e
W
n
i
g
e
B
5
k
e
e
W
n
i
g
e
B
6
k
e
e
W
n
i
g
e
B
7
k
e
e
W
n
i
g
e
B
8
k
e
e
W
n
i
g
e
B
9
k
e
e
W
n
i
g
e
B
0
1
k
e
e
W
n
i
g
e
B
1
1
k
e
e
W
n
i
g
e
B
2
1
k
e
e
W
n
i
g
e
B
3
1
k
e
e
W
n
i
g
e
B
4
1
k
e
e
W
n
i
g
e
B
5
1
k
e
e
W
n
i
g
e
B
6
1
k
e
e
W
n
i
g
e
B
7
1
k
e
e
W
n
i
g
e
B
8
1
k
e
e
W
n
i
g
e
B
9
1
k
e
e
W
n
i
g
e
B
0
2
k
e
e
W
n
i
g
e
B
1
2
k
e
e
W
n
i
g
e
B
2
2
k
e
e
W
n
i
g
e
B
3
2
k
e
e
W
n
i
g
e
B
4
2
k
e
e
W
n
i
g
e
B
5
2
k
e
e
W
n
i
g
e
B
6
2
k
e
e
W
n
i
g
e
B
time [days (only the first 26 weeks shown due to space restrictions)]
A&TV; static pool; no WOM
A&TV; static pool; WOM
A&TV; dynamic pool; WOM
WW ; static pool; no WOM
WW ; static pool; WOM
WW ; dynamic pool; WOM
Figure 7. Daily count of customers entering the department.
29
]
y
a
d
r
e
p
[
s
r
e
m
o
t
s
u
c
600
500
400
300
200
100
0
1
k
e
e
W
n
i
g
e
B
2
k
e
e
W
n
i
g
e
B
3
k
e
e
W
n
i
g
e
B
4
k
e
e
W
n
i
g
e
B
5
k
e
e
W
n
i
g
e
B
6
k
e
e
W
n
i
g
e
B
7
k
e
e
W
n
i
g
e
B
8
k
e
e
W
n
i
g
e
B
9
k
e
e
W
n
i
g
e
B
0
1
k
e
e
W
n
i
g
e
B
1
1
k
e
e
W
n
i
g
e
B
2
1
k
e
e
W
n
i
g
e
B
3
1
k
e
e
W
n
i
g
e
B
4
1
k
e
e
W
n
i
g
e
B
5
1
k
e
e
W
n
i
g
e
B
6
1
k
e
e
W
n
i
g
e
B
7
1
k
e
e
W
n
i
g
e
B
8
1
k
e
e
W
n
i
g
e
B
9
1
k
e
e
W
n
i
g
e
B
0
2
k
e
e
W
n
i
g
e
B
1
2
k
e
e
W
n
i
g
e
B
2
2
k
e
e
W
n
i
g
e
B
3
2
k
e
e
W
n
i
g
e
B
4
2
k
e
e
W
n
i
g
e
B
5
2
k
e
e
W
n
i
g
e
B
6
2
k
e
e
W
n
i
g
e
B
time [days (only the first 26 weeks shown due to space restrictions)]
A&TV; static pool; no WOM
A&TV; static pool; WOM
A&TV; dynamic pool; WOM
WW ; static pool; no WOM
WW ; static pool; WOM
WW ; dynamic pool; WOM
Figure 8. Daily count of satisfied customers CSM-EPV.
]
y
a
d
r
e
p
[
s
r
e
m
o
t
s
u
c
600
500
400
300
200
100
0
1
k
e
e
W
n
i
g
e
B
2
k
e
e
W
n
i
g
e
B
3
k
e
e
W
n
i
g
e
B
4
k
e
e
W
n
i
g
e
B
5
k
e
e
W
n
i
g
e
B
6
k
e
e
W
n
i
g
e
B
7
k
e
e
W
n
i
g
e
B
8
k
e
e
W
n
i
g
e
B
9
k
e
e
W
n
i
g
e
B
0
1
k
e
e
W
n
i
g
e
B
1
1
k
e
e
W
n
i
g
e
B
2
1
k
e
e
W
n
i
g
e
B
3
1
k
e
e
W
n
i
g
e
B
4
1
k
e
e
W
n
i
g
e
B
5
1
k
e
e
W
n
i
g
e
B
6
1
k
e
e
W
n
i
g
e
B
7
1
k
e
e
W
n
i
g
e
B
8
1
k
e
e
W
n
i
g
e
B
9
1
k
e
e
W
n
i
g
e
B
0
2
k
e
e
W
n
i
g
e
B
1
2
k
e
e
W
n
i
g
e
B
2
2
k
e
e
W
n
i
g
e
B
3
2
k
e
e
W
n
i
g
e
B
4
2
k
e
e
W
n
i
g
e
B
5
2
k
e
e
W
n
i
g
e
B
6
2
k
e
e
W
n
i
g
e
B
time [days (only the first 26 weeks shown due to space restrictions)]
A&TV; static pool; no WOM
A&TV; static pool; WOM
A&TV; dynamic pool; WOM
WW ; static pool; no WOM
WW ; static pool; WOM
WW ; dynamic pool; WOM
Figure 9. Daily count of dissatisfied customers CSM-EPV.
30
]
y
a
d
r
e
p
[
s
r
e
m
o
t
s
u
c
3600
3400
3200
3000
2800
2600
2400
2200
2000
1800
1600
1400
1200
1000
800
600
400
200
0
1
k
e
e
W
n
i
g
e
B
2
k
e
e
W
n
i
g
e
B
3
k
e
e
W
n
i
g
e
B
4
k
e
e
W
n
i
g
e
B
5
k
e
e
W
n
i
g
e
B
6
k
e
e
W
n
i
g
e
B
7
k
e
e
W
n
i
g
e
B
8
k
e
e
W
n
i
g
e
B
9
k
e
e
W
n
i
g
e
B
0
1
k
e
e
W
n
i
g
e
B
1
1
k
e
e
W
n
i
g
e
B
2
1
k
e
e
W
n
i
g
e
B
3
1
k
e
e
W
n
i
g
e
B
4
1
k
e
e
W
n
i
g
e
B
5
1
k
e
e
W
n
i
g
e
B
6
1
k
e
e
W
n
i
g
e
B
7
1
k
e
e
W
n
i
g
e
B
8
1
k
e
e
W
n
i
g
e
B
9
1
k
e
e
W
n
i
g
e
B
0
2
k
e
e
W
n
i
g
e
B
1
2
k
e
e
W
n
i
g
e
B
2
2
k
e
e
W
n
i
g
e
B
3
2
k
e
e
W
n
i
g
e
B
4
2
k
e
e
W
n
i
g
e
B
5
2
k
e
e
W
n
i
g
e
B
6
2
k
e
e
W
n
i
g
e
B
time [days (only the first 26 weeks shown due to space restrictions)]
A&TV af=0.2
A&TV af=0.4
A&TV af=0.6
WW af=0.2
WW af=0.4
WW af=0.6
WW af=0.8
Figure 10. Static pool - daily customer count.
]
y
a
d
r
e
p
[
s
r
e
m
o
t
s
u
c
3600
3400
3200
3000
2800
2600
2400
2200
2000
1800
1600
1400
1200
1000
800
600
400
200
0
1
k
e
e
W
n
i
g
e
B
2
k
e
e
W
n
i
g
e
B
3
k
e
e
W
n
i
g
e
B
4
k
e
e
W
n
i
g
e
B
5
k
e
e
W
n
i
g
e
B
6
k
e
e
W
n
i
g
e
B
7
k
e
e
W
n
i
g
e
B
8
k
e
e
W
n
i
g
e
B
9
k
e
e
W
n
i
g
e
B
0
1
k
e
e
W
n
i
g
e
B
1
1
k
e
e
W
n
i
g
e
B
2
1
k
e
e
W
n
i
g
e
B
3
1
k
e
e
W
n
i
g
e
B
4
1
k
e
e
W
n
i
g
e
B
5
1
k
e
e
W
n
i
g
e
B
6
1
k
e
e
W
n
i
g
e
B
7
1
k
e
e
W
n
i
g
e
B
8
1
k
e
e
W
n
i
g
e
B
9
1
k
e
e
W
n
i
g
e
B
0
2
k
e
e
W
n
i
g
e
B
1
2
k
e
e
W
n
i
g
e
B
2
2
k
e
e
W
n
i
g
e
B
3
2
k
e
e
W
n
i
g
e
B
4
2
k
e
e
W
n
i
g
e
B
5
2
k
e
e
W
n
i
g
e
B
6
2
k
e
e
W
n
i
g
e
B
time [days (only the first 26 shown due to space restriction)]
A&TV af=0.2
A&TV af=0.4
A&TV af=0.6
WW af=0.2
WW af=0.4
WW af=0.6
Figure 11. Dynamic pool - daily customer count.
31
l
o
o
p
n
i
s
r
e
m
o
t
s
u
c
f
o
r
e
b
m
u
n
18000
17000
16000
15000
14000
13000
12000
11000
10000
9000
8000
7000
6000
1
k
e
e
W
n
i
g
e
B
2
k
e
e
W
n
i
g
e
B
3
k
e
e
W
n
i
g
e
B
4
k
e
e
W
n
i
g
e
B
5
k
e
e
W
n
i
g
e
B
6
k
e
e
W
n
i
g
e
B
7
k
e
e
W
n
i
g
e
B
8
k
e
e
W
n
i
g
e
B
9
k
e
e
W
n
i
g
e
B
0
1
k
e
e
W
n
i
g
e
B
1
1
k
e
e
W
n
i
g
e
B
2
1
k
e
e
W
n
i
g
e
B
3
1
k
e
e
W
n
i
g
e
B
4
1
k
e
e
W
n
i
g
e
B
5
1
k
e
e
W
n
i
g
e
B
6
1
k
e
e
W
n
i
g
e
B
7
1
k
e
e
W
n
i
g
e
B
8
1
k
e
e
W
n
i
g
e
B
9
1
k
e
e
W
n
i
g
e
B
0
2
k
e
e
W
n
i
g
e
B
1
2
k
e
e
W
n
i
g
e
B
2
2
k
e
e
W
n
i
g
e
B
3
2
k
e
e
W
n
i
g
e
B
4
2
k
e
e
W
n
i
g
e
B
5
2
k
e
e
W
n
i
g
e
B
6
2
k
e
e
W
n
i
g
e
B
time [days (only the first 26 weeks shown due to space restrictions)]
A&TV af=0.2
A&TV af=0.4
A&TV af=0.6
WW af=0.2
WW af=0.4
WW af=0.6
Figure 12. Dynamic pool - customer pool size.
32
|
1712.00190 | 1 | 1712 | 2017-12-01T04:44:14 | Modeling the Multiple Sclerosis Brain Disease Using Agents: What Works and What Doesn't? | [
"cs.MA",
"cs.SE",
"cs.SI",
"nlin.AO",
"q-bio.NC"
] | The human brain is one of the most complex living structures in the known Universe. It consists of billions of neurons and synapses. Due to its intrinsic complexity, it can be a formidable task to accurately depict brain's structure and functionality. In the past, numerous studies have been conducted on modeling brain disease, structure, and functionality. Some of these studies have employed Agent-based approaches including multiagent-based simulation models as well as brain complex networks. While these models have all been developed using agent-based computing, however, to our best knowledge, none of them have employed the use of Agent-Oriented Software Engineering (AOSE) methodologies in developing the brain or disease model. This is a problem because without due process, developed models can miss out on important requirements. AOSE has the unique capability of merging concepts from multiagent systems, agent-based modeling, artificial intelligence, besides concepts from distributed systems. AOSE involves the various tested software engineering principles in various phases of the model development ranging from analysis, design, implementation, and testing phases. In this paper, we employ the use of three different AOSE methodologies for modeling the Multiple Sclerosis brain disease namely GAIA, TROPOS, and MASE. After developing the models, we further employ the use of Exploratory Agent-based Modeling (EABM) to develop an actual model replicating previous results as a proof of concept. The key objective of this study is to demonstrate and explore the viability and effectiveness of AOSE methodologies in the development of complex brain structure and cognitive process models. Our key finding include demonstration that AOSE methodologies can be considerably helpful in modeling various living complex systems, in general, and the human brain, in particular. | cs.MA | cs | Modeling the Multiple Sclerosis Brain Disease Using
Agents: What Works and What Doesn't?
Ayesha Muqaddas
Muaz A. Niazi*
*Corresponding author
Department of Computer Science,
COMSATS Institute of IT,
Islamabad, Pakistan
[email protected]
Abstract:
The human brain is one of the most complex living structures in the known Universe. It consists of
billions of neurons and synapses. Due to its intrinsic complexity, it can be a formidable task to accurately
depict brain's structure and functionality. In the past, numerous studies have been conducted on modeling
brain disease, structure, and functionality. Some of these studies have employed Agent-based approaches
including multiagent-based simulation models as well as brain complex networks. While these models
have all been developed using agent-based computing, however, to our best knowledge, none of them
have employed the use of Agent-Oriented Software Engineering (AOSE) methodologies in developing
the brain or disease model. This is a problem because without due process, developed models can miss
out on important requirements. AOSE has the unique capability of merging concepts from multiagent
systems, agent-based modeling, artificial intelligence, besides concepts from distributed systems. AOSE
involves the various tested software engineering principles in various phases of the model development
ranging from analysis, design, implementation, and testing phases. In this paper, we employ the use of
three different AOSE methodologies for modeling the Multiple Sclerosis brain disease – namely GAIA,
TROPOS, and MASE. After developing the models, we further employ the use of Exploratory Agent-
based Modeling (EABM) to develop an actual model replicating previous results as a proof of concept.
The key objective of this study is to demonstrate and explore the viability and effectiveness of AOSE
methodologies in the development of complex brain structure and cognitive process models. Our key
finding include demonstration that AOSE methodologies can be considerably helpful in modeling various
living complex systems, in general, and the human brain, in particular.
1. Introduction:
Cai et al. note that the human brain can be considered as one of the most complex living structures of the
known world [1]. Forstmann and Wagenmakers note the complexity of the brain because of its
composition of billions of neurons, synapsis, blood vessels, glial cells, neural stem cells, and layered
tissues [2]. For many decades, researchers have been attempting to model the human brain. These studies
have been conducted primarily to understand the structure, function, connection, dynamics of neurons and
overall brain at multiple spatial-temporal scales. Understanding and modeling the brain is extremely
important because common brain diseases such as multiple sclerosis, dementia, cancer, Alzheimer, and
epilepsy are often caused by a minor distraction of neurons or severe injury.
Due to the its inherent complexity, it is formidable to effectively model and depict brain's structure and
functionality at all scales. Numerous studies have previously been conducted on brain disease, structure,
and functionality modeling by applying ABM (Agent-Based Modeling), MAS (Multi-Agent systems) and
Complex Networks (CN). Few of them have modeled the overall brain structure or functions simply
while others have modeled the brain disease. According to researchers' best knowledge, there is no single
research that could claim that their findings are complete and absolutely flawless. These studies achieved
beneficial results for disease cure and prevention, brain structure and function understanding. However,
these marvelous systems have flaws, as these models are developed by using Agent-Oriented technology,
without following any AO methodology. To our best knowledge, none of them have used AO
methodologies for modeling brain, brain disease, function, and structure.
AOSE (Agent-Oriented Software Engineering) combines MAS, ABM, AI, and distributed systems, and
demands the application of AI and software engineering principles in the analysis, design, and
implementation phases of a software systems development process. AOSE technology has the broad
capability of autonomy, proactivity, reactivity, robustness, and social ability. Due to these capabilities
nowadays, AOSE is becoming popular in the development of the distributed and complex application
(such as e-commerce, healthcare systems, and social systems). Lucena and Nunes and R. Cunha et al,.
state in their study that, AOSE promises to deal with complex and distributed systems[3][4]. For 2000,
researchers are making a great effort to produce AOSE techniques for agent-based systems for the
guidance of design, development and maintenance process. Now at present, this is a mature technology
and has methodologies, architectures, methods, and developmental tools.
As system engineering methodologies focus on technical issues of system development. AOSE
methodologies guide step by step development of agent modeling from system requirement to system
implementation. When developers jump into system development without any guided methodology, then
they ignore the most important aspect of the system to be implemented. Moreover, developers need the
high-level expertise of system development, and they face difficulties throughout the development
process, and the ongoing project takes more time, which ultimately leads to cost exceeding without any
remarkable achievement. To overcome all these mentioned problems we are proposing an idea to follow
AOSE methodologies in brain modeling scenarios. Because of neurons in the brain interact in a
heterogeneous way, that's why we should use AOSE.
We will model MAS of Multiple Sclerosis disease by following AOSE methodologies GAIA, TROPOS,
and MaSE. After applying these methodologies, we will model exploratory agent based model as a proof
of concept. The Multiple Sclerosis ( MS) is considered as an inflammatory, autoimmune and
demyelination disease of central nervous as stated in articles [5] [6] [7] [8]. In this disease myelin sheath
on axonal part of neuron destroys with time. This destruction became an important cause of
neurodegeneration which results in impaired muscular performance [9]. It can significant cause of
physical and mental disabilities, irreversible neurologic deficits, including paralysis, muscle weakness,
ataxia tremor, spasticity, cognitive impairment, body balance disorder, vision loss, double vision, vertigo,
pain, fatigue, and depression [10].The dark side of this disease is it is becoming the main cause of
neurological disability in young adults[11] that's why intensive research is needed on this disease to save
youngsters life. The autoimmune system plays an important role in the disease progression and the body's
own immunity assaults the myelin sheath causing injury. However, a satisfactory explanation for the
origins and mechanism for MS is lacking in the literature.
In our work, we are taking MS disease as a case study for simulation system development. This case
study is presented by Pennisi et al in the article [12]. First of all, we will develop the MS disease model
by AOSE methodologies GAIA V.2, TROPOS, MaSE then, we will perform a comparative analysis of
these methodologies to find out which methodology is best in a specific scenario. The purpose of AOSE
methodologies implementation and comparison is to explore, if agent-based modeling with AOSE
methodologies is a suitable paradigm for modeling human brains structure, cognitive process, and disease.
And what kind of data would be needed for the sake of validation without spending a considerable
amount of time on these models. Moreover, we will evaluate does the AOSE technology have worth in
brain modeling. Our findings will prove that the AOSE methodologies are mature enough, that easily can
implement the complex real system of any domain without any remarkable background knowledge.
2. Related Work:
The ever-growing use of agent-oriented technology demonstrates that it is used in almost every field of
science. In this section, we will briefly present the well-known brain models, who have used agent
oriented-technology However, the analysis of literature unveils that, the wide use of agent technology in
modeling the human brain, leads the idea to use AOSE methodologies, that could aid the development
team throughout the system development project. Such as in early requirement analysis phase, design,
development and deployment phases. The AOSE methodologies work same like conventional software
engineering methodologies, which have proved that methodologies are fundamentally needed for
traditional software projects.
Y. Mansury and T. S. Deisboeck have proposed agent-based model for Spatial-temporal progression of
tumor cells, according to environmental heterogeneities in mechanical confinement toxic metabolites.
Results reveal that tumor cells follow each other along preform pathways. However, this model can be
extended to other cancers by incorporating real data[13].
C. A. Athale and T. S. D. Ã, have developed an agent-based system, to simulate progression dynamics of
the tumor. This model integrates Transforming Growth Factor α (TGFα) and induces EGFR gene-protein
interaction network. Results show the progression rate of tumor cells according to Spatio-temporal and
progression speed up when increasing EGFR density per cell [14].
Y.mansuray and .S. Deisboeck have generated a 2D agent-based system, that performs a simulation of
two different gene expression, which are Tenascin C and Proliferating-Cell-Nuclear-Antigen for brain
tumor progression. Moreover, this model investigates the effect of an environmental factor in gene
expression changes. The results reveal that Tenascin C plays a crucial role in the migration of Glioma cell
phenotype, and the expression of Proliferating-Cell-Nuclear-Antigen is responsible for proliferating
behavior of tumor cell [15].
Y.Mansury and T.S.Deisboeck have proposed a 2D agent-based system, to examine the ongoing
progressive performance of multiple tumor cells in human brain. The results demonstrate that these
dangerous tumor cells proliferate and migrate on an adaptive grid lattice. And there is acorrelation among
the progression dimension of the tumor and the velocity of tumor expansion[16].
Zhang et al. have developed a 3D multi-scale agent-based system, to perform a simulation of the cancer
cell decision process. The results reveal that tumor cells do not only oscillate between migration and
proliferation area, besides this these dangerous cells directly disturb the entire SpatioTemporal expansion
patterns of brain area which is affected by cancer[17].
Zhang et al. have proposed a hybrid agent-based model that predict severe cancer areas in the brain. This
model simulates cancer cells, either active or inactive cluster [18].
Germond et al. have proposed a multi-agent model, with remarkable features of deformation and edge
detector. This model performs segmentation on MRI data and clearly shows each dynamic dimension of a
scanned brain. When the results compared with real brain image then a real brain phantom is
reported[19].
Richard et al have advocated multi-agent framework for brain MR image segmentation. That focus on
radiometry tissue interpretation. This framework performs segmentation on a complete volume in less
than 5 min with about 0.84% accuracy[20].
Vital-Lopez et al. have developed a 3D mathematical agent-based system, that performs a simulation of
tumor progression as a collective behavior of individual tumor cells. The simulation results conclude that
vascular network damage is one of the main reasons for tumor growth and invasiveness[21].
Soc,R has proposed an agent-based model for action selection in autonomous systems. He incorporated
biological details in this Agent-Based system, in order to generate a set of predictions for decision
selection. This research concludes that agent-based technology has the broader implication of action
selection mechanism for both natural and artificial sciences related systems[22].
Signaling et al. have expanded their already proposed 3D Agent-Based and multi-scale system to perform
simulation on the brain tumor. Which examine the simplified progression of Glioma pathway. Moreover,
intracranial pressure is introduced to examine the influence of clonal heterogeneity on the human tumor
growth. This research concludes that the brain regions that are near to blood vessels and are affected by
tumor cells, these regions are the best nutrient source for tumor[23].
The scientist of Health Agent project González-Vélez et al have proposed an Agent-Based decision
support model, for the detection and the diagnosis of brain tumor classifications. This study determines
that now prediction of tumor classification is more accurate and optimize because reasoned argument is
performed among intelligent agents[24].
Zhang et al., have developed ABM for cancer simulation according to multiple dynamic scales in space-
time. This model proposes an idea of incorporating macroscopic expression patterns and microscopic cell
behavior with molecular pathway dynamics. The results show that at the same time this 3D model
efficiently model five different cancer cell clones[25].
Zhang et al., have proposed a Multiscale Agent-Based Model system to perform the simulation of
Glioblastoma Multiforme cancer. This simulation model considers the progression and proliferation of
cancer in the real time. The results conclude that this model is 30 times faster than the previous models.
Because this model's extracellular matrix have large fine grids[26].
Haroun et al., have proposed a simulation model, based on multi-agents for brain MRI segmentation. The
results show a global and local view of te image and these images are more clear than the other
competitive models result. This research also demonstrates that an appropriate quantity of agents in the
simulation is important to improve the segmentation quality of MRI images[27].
Pennisi et al., have proposed an ABM to formulate medication for MS disease and to reveal the
mechanism of distraction and new potential formulation of the blood-brain barrier (BBB). The results
suggest that vitamin D is effective for blood blockage [12].
Koutkias and Jaulent have developed ABM for Pharmacovigilance to detect complete potential signals
associated with drugs and adverse effects. This model enables clinicians to detect timely and accurate
drug signals effect[28].
Leistritz et al. have proposed an agent-based framework for agents, that have Belief, Desire, and Intention
capabilities. As a result, this model satisfies a key integration challenge, of coupling time stepped ABM
with event-based BDI systems[29].
Barrah has developed a MAS for magnetic resonance imaging (MRI) with a median filter to decrease
computational time and save data details. The proposed FRFCM with MAS is fastidious, accurate and
take less computational time[30].
Pennisi et al., have developed ABM for RRMS (Relapsing Remitting Multiple Sclerosis) disease. The
outcome results show that the occurrence of genetic disposition in neurons is one cause of MS disease.
However, the main cause is a breakdown of peripheral tolerance mechanism.[31].
MAS ABM
✓
S.E
✓
✓
✓
AOSE
Ref
[13]
Title
"The impact of ''search precision'' in
an agent-based tumor model"
Author Year
Mansury and
Deisboeck
2003
[14]
"The effects of EGF-receptor density
on multiscale tumor growth patterns"
Athale and Ã
2006
Journal
Journal
Theoretical
biology
Journal
Theoretical
Biology
of
of
"Simulating the time series of selected
gene expression profile in an agent –
based tumor model"
"Simulating
patterns of malignant brain tumors"
'structure-function'
Mansury and
Deisboeck
Mansury and
Deisboeck
2004
Physica D
2004
Physica A
[15]
[16]
[17]
"Development of a three-dimensional
multiscale agent-based tumor model:
interaction
Simulating gene-protein
profiles,
and
multicellular patterns in brain cancer"
phenotypes
cell
2007
Zhang,
Athale
Deisboeck
and
Journal
Theoretical
Biology
of
✓
[18]
"Multi-scale, multi-resolution brain
cancer modeling"
2009
Zhang, Chen
and
Deisboeck
[19]
cooperative
framework
"A
segmentation of MRI brain scans"
or
Germond et
al.,
2000
MATHEMATICS
AND
COMPUTERS IN
SIMULATION
Artificial
Intelligence
Medicine
in
✓
✓
[20]
"Automated segmentation of human
brain MR images using a multi-agent
approach"
Richard,
Dojat
Garbay,
and
[21]
"Modeling the Effect of Chemotaxis on
Glioblastoma Tumor Progression"
Vital-lopez,
Armaou and
Hutnik,
2004
2011
Artificial
Intelligence
Medicine
in
American Institute
of
Chemical
Engineers
"Introduction. Modeling natural action
selection"
Brain
"Simulating
Tumor
Heterogeneity with a Multiscale Agent-
Based Model
: Linking molecular
signatures, phenotypes and expansion
rate"
Soc,R
2007
The royal society
2009
Signaling,
Bias
Rate
and
Mathematical and
Computer
Modeling
"HealthAgents: distributed multi-agent
brain tumor diagnosis and prognosis"
González-
Vélez et al
2009
"Multiscale
modeling"
agent-based
cancer
Zhang et al.,
2009
a multiscale, multi-
tumor
"Developing
resolution agent-based brain
model by graphic processing"
Zhang et al.,
2011
Applied
Intelligence
Journal
Mathematical
Biology
Theoretical
Biology
Medical
Modelling
of
and
[22]
[23]
[24]
[25]
[26]
[27]
[12]
✓
✓
✓
✓
✓
✓
✓
"A Massive Multi-Agent System for
Brain MRI Segmentation"
Haroun
al.,
et
2005
Massively Multi-
Agent Systems
✓
"Agent-based modeling of the effects of
potential treatments over the blood–
brain barrier in multiple sclerosis"
Pennisi,
Marzio, et al
2015
Journal
immunological
methods
of
✓
[28]
"A multi-agent system for integrated
detection of pharmacovigilance signals"
[29]
"Time-variant modeling
processes"
of brain
[30]
"MAS based on a Fast and Robust
FCM Algorithm for MR Brain Image
Segmentation"
Koutkias, V,
and Jaulent,
M. C
Leistritz, L.,
Schiecke, K.,
Astolfi, L.,
and Witte, H.
Barrah, H. et
al.
2016
2016
2016
[31]
"Agent based modeling of Treg-Teff
cross regulation in relapsing-remitting
multiple sclerosis"
M. Pennisi et
al.
2013
Journal of medical
systems
Proceedings of the
IEEE
✓
✓
of
. International
Journal
Advanced
Computer Science
& Applications
BMC
Bioinformatics
✓
✓
3. Material and Methods
This section describes in detail the case study of multiple sclerosis (MS) disease and the implementation
of the MS model by using AOSE methodologies like Gaia V.2, Tropos, and MASE. According to our
best knowledge that AOSE methodology has never been used in any biological model. First time we tried
to model biological problem, according to well defined agent methodologies. To do this, here we are
copying same rules and regulations that are used to model other systems in engineering field. We
implemented MS model in Net-Logo environment. This model is already implemented by Pennisi et al. in
[12].
3.1. Case study:
MS is one of the central nervous system diseases. In which myelin sheath from the axonal part of the
neurons in the brain and spinal cord is removed and the communication between neurons is
disconnected.In this disease, different factors and cells are involved. The overall mechanism of MS
disease is given below.
The thymus gland is a lymphoid organ that produces T-cells (T-reg and T-eff). The T-reg and T-eff both
cells have two states, "active and resting". EBV (virus) is an external factor that latent infection. EBV
cause activation of both T-eff and T-reg. The active T-eff (A.T-eff) attacks the myelin of axons and cause
the neural communication damage and in return duplicate itself. A.T-eff produce one cytokine against one
attack. Active T-reg (A.T-reg) try to catch A.T-eff and suppress it. In return, A.t-reg receive a positive
feedback and will duplicate. After the attack of A.T-eff the amount of myelin in BWM will be lowered. If
the damaged portion still has any amount of myelin then it is recoverable. If myelin amount reaches zero,
then it is unrecoverable. A.T-eff produce cytokines after damage myelin. Cytokine attacks BBB and
damages it. The damaged BBB allows other T-cells and virus to enter into the brain. The main purpose of
the BBB is blocked and bounce back to all T-reg, A.T-reg, T-eff, A.T-eff, Virus, Cytokines.
At the start of the simulation, all agents are introduced in the model in the resting state. The agents are
considered as brain cells. All agents have life counter that decrement by one at every step of the agent. If
the life counter of agent reaches to zero, then that agent will be removed from the simulation
automatically. In running simulation, all agents will move randomly in the environment (actually brain)
and new agents will be introduced at random time.
3.2. GAIA V.2:
The original GAIA methodology was presented by Wooldridge in 2000, It was the first complete AOSE
methodology developed for large-scale real-world applications [32]. GAIA V.2 focuses on two main
development phases of a system, analysis phase, and development phase. Moreover, these models are
considered as a guideline for developing the real models of the to-be-developed complex system.
This methodology is applied to ABM and MAS modeling after requirements are gathered and specified.
After adoption of Gaia methodology for complex systems development, researchers realize that it is easy
to use and implement. However, it is not much suitable for complex systems design [33]. Because
modeling notations are poor for expressing complex problems, such as complex and multiphase
interaction protocols. Moreover, Gaia has a deficiency of requirement phase, environment model, and
does not provide an appropriate domain knowledge. To overcome these limitations Zambonelli, Jennings
and Wooldridge proposed Gaia V.2 agent methodology in [34]. In our MS model we are using Gaia V.2,
same like Gaia it has two development phases 1) analysis and 2) design as shown in the following picture.
Figure 1: GAIA V.2 methodology [35]
3.2.1 Analysis Phase:
Generally, the analysis phase emphasizes on understanding what the MAS and ABM system will have to
be as their properties or specifications (without reference to any implementation detail). The output of the
analysis phase became the base input for the design phase. In actual, in this phase analyst decide about the
functional and non-functional characteristics of the to-be-system. The output of this phase is five basic
models such as 1) sub-organizations, 2) environmental model, 3) preliminary role model, 4) preliminary
interaction model, and 5) organizational rules model.
1) System Sub-Organizations
This model tries to identify all the involved organizations, and used a fruitful way to categorize the whole
system into loosely coupled sub-organizations. The identification of sub-organization is easy if
1) The Sub-organizations are already identified through system specifications.
2) The system itself mimics the overall structure of the real world, in which multiple organizations
interact.
3) Apply the modularity technique. This technique splits the overall complexity of the to-be-system
into a set of smaller and more manageable components.
According to our experience, the sub-organizations of the developing system can be found easily, when
we divide the overall system into portions. And each portion exhibit a specific behavior and they interact
with each other to achieve a subgoal. Any portion of the system which performs any task or interacts with
other to perform a specific task, then we can take it as a sub-organization.
Sub-organizations
Description
T-eff
T-reg
Virus
A.T-eff
A.T-reg
Cytokines
BWM
BBB
The goal to achieve is to "become active" by catching the virus. It will interact
with the virus for activation and BBB to enter into the brain.
The goal to achieve is to "become active" by catching the virus. It will interact
with the virus for activation and BBB to enter into the brain.
The goal to achieve is to "enter into the brain" and make " T-reg and T-eff
active". It interacts with T-reg, T-eff to make them active and BBB to enter into
the brain.
The goal to achieve is to "attack on myelin" to damage brain, "duplicate itself"
and "produce cytokines". It interacts with BBB to enter into the brain.
The goal to achieve is to "attack on " A.T-eff to kill them and "duplicate itself".
It interacts with A.T-eff to kill them and interact with BBB to enter into the
brain.
The goal to achieve is "attack on BBB" to damage it. It interacts with only BBB.
The goal to achieve is "recover damaged myelin" in the brain to maintain neural
communication.
The goal to achieve is "stop the entrance" of T-eff, T-reg, A.T-eff. A.T-
reg,virus, Cytokine into the Brain.
Table 1: Sub-Organizations and their goals
In our's MS disease model, we identified eight sub-organizations T-reg, T-eff, virus, A.T-eff, A.T-reg,
Cytokines, BBB and BWM as showed in table 1. After identification of sub-organizations, we divided
them into two main groups by arranging roles into groups with logical or physical similarities as Silva has
done in his work [35]. The first group is brain organs and the second one is neuron cells. The Brain organ
group consist of two types of agents (BBB, and BWM). On the other hand cell group contain EBV ,T-reg,
T-eff, A.T-reg, A.T-eff and Cytokines. According to AOSE term, in general, we would call "agents" to all
neuron cells and brain organs. The agents in the second group (neuron cells) are tightly connected and
they also interact with the second group (brain organ) agents. Although GAIA is lenient with complex
systems development, however, due to the lack of requirement analysis phase, the accurate identification
of sub-organizations is not feasible from GAIA, as it also lacks of established hierarchy model and
organizational structure[35] [36].
2) Environment Model
The environmental model describes the real world in which the system operates with all its variables,
resources, and uncertainties. There is not a single easy way, to provide a general modeling abstraction and
the general modeling techniques for the development of the system environment. Since the environments
of the applications are divergent in nature because in most cases systems suffers from compatibility issues
with the technology. As Passos stated in his study that the development of the environmental model is a
separate one type of agent-oriented methodology [37]. That's why we can not model complete
environmental model of any system.
Figure 2 Environmental Model of MS disease simulation
The environment of our model is Netlogo development tool and resources are Netlogo's buttons, sliders,
plots, switches eg. We divide this model into two environments, static and dynamic according to Gaia
methodology. The static part of our model is buttons, sliders, switches that do not change frequently. And
the dynamic part is disply monitor in which agents move randomly in environment to perform complex
operation and to access resources. The discription of the environmental model of MS disease is given in
below table.
Environment Resources
Description
Display Screen
Buttons
Sliders
Switches
Plots
Agents
The screen shows all the time movement of agents and changing in the
model. It also displays what is going on among agents.
The buttons stop or start the simulation and initialize special characteristics
of agents, as creation or deletion agents etc.
Sliders assign special values to agents in the start or during the simulation to
observe effects of changes.
Switches on/off characteristics of agents in simulation.
The Plot shows the behavior of agent interaction.
Agents representative of characters of one type that are involved in the
Patches
simulation to perform a specific task.
The patches are also representative of agents of another type that are
involved in the simulation to perform a specific task.
Table 2: Description of Environmental Model
3) Preliminary Role Model
A role model provides an abstraction of the agent with a set of its expected behavior[34]. The final goal of
the analysis phase is not to identify the all involving entities and model them into the real system
organization. The main purpose is to identify the active roles and their interaction with others roles at a
very abstract level. Particularly, the role abstraction leads to the identification of basic specifications for
the developing system, to achieve its main goal. As well as the important interactions that are required for
the completion of system's specification. However, this type of identification can be performed without
knowing that, what the actual structure of the developing system will be. There is a chance to identify
some characteristics that will remain same independently throughout the organizational structure. This
identification can be more beneficial if the analysis phase carefully models the system specifications in
terms of involved characters and their responsibilities at a very beginning stage. In our model, we
identified 8 roles T-reg, T-eff, A.T-reg, A.T-eff, Virus, BBB, Cytokines and BWM (Brain White Matter)
which are shown in figure 2.
4) Preliminary Interaction or protocol Model
The interaction model identifies all dependencies which show the relationship among roles by defining
the protocol[37]. Protocols are a request for resources or to complete a task, that a role does to interact
with other roles. In protocol development, more focus is on the purpose of interaction and the nature of
interaction, than to the type of message exchange and sequence of execution steps. A standard protocol
model of GAIA V.2 consists of these points:
1) Protocol title/name: The protocol name is a description of the roles interaction nature. For
example, it specifies that a request is for resource share or to assign a task.
2) Initiator: The role who starts the conversation.
3) Partner: that role will be partner which responds to initiator during conversation.
4) Input: The information used by the initiator role as a reason to initiate the protocol.
5) The final action that will take the responder role. It can be an information, resource or a request
for anything.
6) Description: The description explains the whole scenario of protocol processing in detail. e.g
which roles will involve and what will be their intentions and what will be the consequences.
In MS disease system five protocols are identified. That are Attack, Catch, Produce, MakeActive, and
stop. At the end, the general model of preliminary interaction and role express the overall scenario of
protocols among the roles of MS disease. The interaction model is also called a protocol model. In the
below tables, all protocols are described in detail.
Protocol Name: catch
Initiator:
T-reg
Partner:
Virus
Input:
Information about
virus existence
Description:
When any T-reg knows, that there is virus
around it then, it tries to catch the virus to
become active
Output:
A.T-reg
Table 3: T-reg's Protocol
Protocol Name: catch
Initiator:
T-eff
Partner:
Virus
Input:
Information about
virus existence
Description:
When any T-eff knows, that there is virus
around it then, it tries to catch the virus to
become active
Output:
A.T-eff
Table 4: T-eff's Protocol
Protocol Name: makeActive
Initiator:
Virus
Partner:
T-reg, T-eff
Description:
When any virus knows, that there is T-reg, T-
eff around it. Then, virus tries to catch the T-
reg, T-eff to make it active
Input:
Information about
T-reg, T-eff
existence
Output:
A.T-reg
Table 5: Virus's Protocol
Protocol Name: Attack
Initiator:
A.T-eff
Partner:
BWM
Description:
When any A.T-eff finds, that there is myelin
in the brain, then it attacks on myelin and
damage it.
Input:
Information about
myelin existence
Output:
Damaged myelin
Table 6:A.T-eff's Protocol
Protocol Name: Attack
Initiator:
A.T-reg
Partner:
A.T-eff
Input:
Information about
A.T-eff existence
Description:
When any A.T-reg finds, that there is A.T-eff
in brain then, it attacks on A.T-eff and kill it.
Output:
A.T-eff killed
Table 7: A.T-reg's Protocol
Protocol Name: Attack
Initiator:
Cytokine
Partner:
BBB
Input:
Information about
BBB existence
Description:
When any Cytokine finds, that there BBB,
then Cytokine attacks on BBB and damage it.
Output:
Damaged BBB
Table 8: Cytokine's Protocol
Protocol Name: Produce
Initiator:
A.T-reg
Partner:
A.T-eff
Input:
Information about
A.T-eff existence
Description:
When any A.T-reg finds, that there is A.T-eff
in brain then, it kills A.T-eff and produce
itself duplicate.
Output:
A.T-reg
Table 9: A.T-reg's Protocol
Protocol Name: Produce
Initiator:
A.T-eff
Partner:
Cytokine
Input:
Information about
myelin existence
Description:
When any A.T-eff finds, that there is myelin
in the brain, then it attacks on myelin and
duplicate itself.
Output:
A.T-reg
Table 10A.T-eff's Protocol
Protocol Name: Stop
Initiator:
BBB
Partner:
T-reg, T-eff, Virus,
A.T-reg, A.T-eff,
Cytokines,
Input:
Information about
enterance of cells
into brain
Description:
When ever BBB knows that any cell is trying
to enter into brain then BBB stop its
entrance.
Output:
A.T-reg
Table 11:BBB's Protocol
Figure 3: Preliminary Role and Interaction Model of MS
This is a combined figure of the preliminary role and their interaction model of MS disease.
In this figure, there are all identified role and protocols. T-reg and T-eff roles interact with the virus by
using catch protocol. These both roles aim is to become active by catching the virus. In general, the
protocol defines the purpose of communication among agents. In the same way, the virus role interacts
with T-reg and T-eff by using "makeActive" protocol to make them active. A.T-reg (Active T-reg) and
A.T-eff (Active T-eff) are active agents of T-reg and T-eff community. A.T-eff interacts with BWM by
using "attack" protocol. The "attack" protocol is used to damage the BWM. A.T-eff also interact with
Cytokine by using "produce" protocol. A.T-reg role interacts with A.T-eff by using "attack" protocol. The
purpose of this protocol or communication is to kill the A.T-eff role to stop its dangerous activities in the
brain. In the same way, the Cytokine interacts with BBB by using "attack" protocol to damage BBB. The
BBB role interacts with almost all other roles except BWM by using "stop" protocol. The purpose of this
protocol is to stop all other roles, to entering the brain.
5) Organizational Rules
The organizational rules define whether a new agent can be added into the organization. If new agents
added then what would be their position in the organization and which type of behavior would be
expected from the added agents. In simple words, the organizational rule defines the overall responsibility
of the concerned organization in an abstract way. There are two types of organizational rule:
(1) Liveness: The liveness rules take concern about the evolution of system dynamics according to time.
It also takes concern about that a specific agent will play a specific role and allow the agent to play next
task if it has played the previous role. Same like roles, a specific protocol may execute only after the
execution of the other specific protocol. Moreover, liveness organizational rule decides that which role
would be played by which agent.
(2) Safety: The safety rules consider all unexpected events that can occur during processing of a specific
task. These events are considered as time-independent events. To overcome all the unexpected faults, the
organization rule force to apply the concept that a single role must play by a distinct entity or agent and
two concurrent tasks should not be played by a single entity.
By following these conditions, in our MS disease system sub-organizations define their rules separately.
Organization Name: T-eff
Liveness: This role would become active if only it catches a virus, or it would transform from T-eff
to A.T-eff if only virus attacks on it.
Safety: Only this agent can transform from T-eff to A.T-eff agent.
Table 12: T-eff Organizational Rules
Organization Name: T-reg
Liveness: This role would become active if only it catches a virus, or it would transform from T-reg
to A.T-reg if only virus attacks on it.
Safety: Only this agent can transform from T-reg to A.T-reg agent.
Table 13: T-reg Organizational Rules
Organization Name: Virus
Liveness: This agent can enter into the brain if BBB is broken.
Safety: Only this agent trigger the MS disease.
Table 14: Virus's Organizational Rules
Organization Name: A.T-eff
Liveness: This agent can damage myelin if the only virus makes it active.
Safety: Only this agent can damage the myelin.
Table 15: A.T-eff Organizational Rules
Organization Name: A.T-reg
Liveness: This agent can kill the A.T-eff if only it is active.
Safety: Only this agent can kill the dangerous agent A.T-eff.
Table 16:A.T-reg Organizational Rules
Organization Name: Cytokine
Liveness: These agents born after myelin damage.
Safety: Only these agents can damage BBB.
Table 17: Cytokine's Organizational Rules
Organization Name: BBB
Liveness: This agent stops the other agent who tries to enter into the brain.
Safety: This agent stops all agents to enter into the brain and recover damaged BBB.
Table 18: BBB Organizational Rules
Organization Name: BWM
Liveness: This agent recovers myelin after myelin damage occurs.
Safety: This agent recovers myelin for neural communication.
Table 19: BWM's Organizational Rules
3.2.2. Design Phase
The design phase is a much important phase in system engineering, where the final decisions take about
what will be the specifications of the developed system, what will be the operational environment. The
main purpose of this phase is to transform the analysis models into low-level design models. Low-level
design models are abstract level models which can be easily implemented in the development phase.
This phase is also important in this way that, it identifies missing and conflicting requirements and helps
developers when system specifications should be considered mature to develop a complex system. The
design phase of Gaia V.2 is divided into two sub design phases, first one is architectural design and the
second one is detailed design.
1. Architectural Design
1.1 Organizational structure
The selection of organizational structure of a system is a very crucial decision in ABM and MAS
development since, it affects all subsequent phases. The one important benefit of an organizational
structure is, it organizes roles as a topology, which is easily understandable by inexperienced persons.
And the other main objective of this structure is to explicate the inter-role relationship type among
roles/agents. In general, there are three types of relationships:
I.
II.
III.
In the control relationship, one role has authority over the other role, in this relationship a role
can partially or fully control the action of the other role.
The peer relationship defines that, in the organization, the involved roles have equal status.
In the dependency relationship, one role depends on the other role for resources or
knowledge, which is compulsory for its accomplishment.
However, the organizational structure same like sub-organizations model does not accurately be
implemented, because there is no fixed hierarchical structure exists. The MS disease system is
implementing the generic architectural model by considering whole MS circumstances as a hierarchy, and
dependency between agents as a control structure. In our model the organizational structure manifest
roles, sub-organizations and the relations and association between them.
Figure 4: GAIA's Organizational Structure
The MS model defines brain organs (BBB, BWM), T-cells, Cytokines, and virus as sub-organizations.
The arrows show organization's communication with other organizations. This communication can be
direct organizations' communication or with the role of other organizations. One organization can
communicate with the roles of other organizations.
IN MS model T-cells, Virus, BWM, and BBB are sub-organizations because they all are different in
structure and nature. T-reg and T-eff cells belong to the same cell category because they are produced by
the same body organ. That's why they belong to the same sub-organization. However, after activation,
they behave differently according to their builtin nature. In the same way, BBB organization
communicates with all others organizations' agents to stop their entrance into the brain. Further, A.T-reg
develops hierarchy structure. In this structure, A.T-reg is organized according to its goals. A.T-eff also
develops a hierarchy structure. Which, is organized according to roles.
1.2 Role and interaction model
The design phase transforms the preliminary role model and the role interaction model into absolute
detailed role and interaction model to form an organizational structure. Which clearly defines the roles of
each agent and interaction type among them. To construct detailed role and interaction model a developer
should consider these mentioned instructions:
Identify the new roles and organizations which was not identified by analysis phase.
I.
II. Developers should identify all the possible activities in which a role can be involved, as
well as classify role's safety and liveness responsibilities contribute to overall
organizational rules.
Identify all the possible protocols, needed by the developing system. As well as classify
which roles will be involved in the relationship to complete the protocol execution.
III.
IV. Moreover, developers should identify the protocols for the organizational level
relationship.
In short, for absolute role model, we identify the complete role's activities and services. And for the
absolute interaction model, we identify and model interaction of all roles involved.
Figure 5: Role and Iteraction Model
In this model, we defined roles with their responsibilities, services, and protocols. The difference between
preliminary phase models and detailed design models is, in the design phase, we identify all possible and
complete information about the roles characteristics and protocols.
As already defined that 8 MS disease roles and two types of agents are identified. BBB and myelin belong
to brain organ type and virus, T-cells belong to cells agent type. T-cells (T-reg and T-eff) belong to the
same community of cells, but they react to brain according to their built-in nature. In other words, some
of T-cells became dangerous as T-eff and some became part of immune system T-reg. The T-reg role is
responsible to catch viruses to get active. The active T-reg (A.T-reg) support immune system by killing
dangerous Active T-eff (A.Teff) cells and it produce duplicate A.Treg cell. The duplicate T-cell perform
functionality same like original T-cell. Virus role is responsible for T-reg and T-eff cells activation. The
virus searches T-cells and try to attack them after that it died. A.T-eff role is responsible to attack myelin
and damage it. It also duplicates A.T-eff and produces cytokines. Cytokine roles, responsibility is to
attack the BBB to damage it and allow viruses and all other agents to move toward the brain. BBB role
belongs to brain organ agent type and is responsible to block unwanted molecules and cells to enter into
the brain. It also manages to allow wanted molecules (water, glucose, and water) and cells, T-reg to enter
into the brain to protect the brain. BWM or myelin is responsible to maintain communication between
neuron cells and if any damage occurs, then regrow myelin to maintain communication.
In this MS model, there are five types of protocols "stop, catch, attack, produce, and makeActive". BBB
initiates stop protocol to stop the virus, T-reg, T-eff, A.T-reg, A.T-eff, Cytokine, to enter the brain. Virus
initiates "makeActive" protocol with T-reg, T-eff to make them active. T-reg and T-eff agents initiate
catch protocol with a virus to get active. A.T-reg agent initiates "attack" protocol with A.T-eff agent to
stop their unhealthy activities. On the other side, A.T-eff initiate "attack" protocol for demyelinate BWM.
Cytokines initiate "attack" protocol with BBB to destroy the BBB. Moreover, "produce" protocol is
initiated by A.T-reg, A.T-eff to produce their duplicates. The "produce" protocol is also initiated by BBB
and BWM to recover themselves.
2. Detailed Design Phase
2.1 Agent Model
In the detailed design phase, developers are more experienced about the developing system. This phase
helps developers to identify the actual role model and the actual interaction model which in return will
assist the developers in the implementation phase. The Agent model captures all agent types and agent's
roles that will be implemented in the system. This phase implements agent model same like class model
in UML. As Castro and Oliveira state that GAIA does not provide modeling notations for agent modeling.
It simply suggests to adopting UML class diagram in article[38]. Zambonelli, Jennings and Wooldridge
states in article [34], according to GAIA "An agent is a software that plays a set of roles of a certain
type". Thus the agent model carefully identifies, what type of agent classes should be involved to play the
specific roles and how many instances should be in each class of the actual system.
2.2 Service Model
The service model identifies all the possible services associated with each agent class and consistently
with the roles. The service model can be applied in both cases: 1) the static assignment of roles to agent
classes, 2) the assignment of dynamic roles to agent classes[34]. The service is a function of the
considered agent, and it is derived from the agent's protocols, liveness and responsibilities, and the
activities of the role that each agent implements. This fig is representing service and agent model.
Services express what agents are contributing for the beneficial of the overall models working.
In our MS disease model, we are combining agent and role model in a single model.
Figure 6: Agent and Service Model
In the MS disease model, there are two types of agents patches and turtles. The patches represent to brain
organ (BBB, BWM) and turtles represent to T-Cells (T-eff, T-reg, A.T-reg, A.T-eff), Virus, Cytokines. In
figure 6, all agents are defined with precise services.
3.3 TROPOS
The TROPOS is an agent-oriented software engineering methodology, which was proposed by Castro et
al. in 2002. The name was derived from a Greek word "trope" which means that it is easily adaptable and
modifiable[39]. The complete methodology and its implementation proposed for Media shop in the article
[40]. The principle aims to propose this methodology was to overcome the semantic gap between the
operational environment and the developed system. Since the structured and object-oriented software
development methodologies only have the programming concepts, not organizational ones [40].
Basically, this methodology was founded on two features [41]:
1. This methodology was developed according to the agent's concept and the mentalistic notions of
the agent such as goal, plan, and resource. Then these notions help the developers throughout the
development process of the system.
2. This methodology introduces legitimate requirement specifications to give a crucial role to
requirement analysis phase.
This methodology adopts ⅈ* model, which was proposed by Yu in [42]. The i* model explicitly describes
to the actor(can be role, position, and agent), actor dependencies and goals as primitive concepts for all
models which will be developed in different phases of software development. Tropos more specifically
covers four phases of software development 1) Early Requirement Analysis, 2) LateRequirement
Analysis, 3) Architectural Design and 4) Detailed design. And in somehow way it also supports
implementation phase [43][44][39].
3.3.1 Early Requirements
In the early requirement analysis phase, the developers focus on the identification of the problem domain.
After the identification of problem, they study the existing organizational setting where the system to-be
operated. The Study reveals that the core intention of requirement analysis phase is, derive a set of
functional and nonfunctional requirements for the system to-be[40][43]. Both the early and late
requirement phases share the same methodological and conceptual approach. The early requirement
analysis phase analyzes and identifies the involved stakeholders and their intentions The stakeholders of
the system to-be is modeled as social actors or agents, that depend on one another for plans to be
performed, goals to be achieved, and resources to be shared. In MS disease model the stakeholders are
cells who participate in disease cause. And the agent's intentions are modeled as the goals to be achieved.
In this phase, we will implement i* model, that consist of 1) strategic dependency model as actor diagram
and 2) strategic rationale model. The rational model supports and describes the reason to fulfill its goals
and to make a relationship with the other agents. The outcome of this phase is an organizational model. The
organizational model includes all the involving actors, their dependency relationship with other actors and
their particular goals[40]. However, the ultimate goal of this phase is to clearly understand the
environment and context of the organization, where the system to-be will perform[41].
In the depth of modeling, Tropos depend on ⅈ* notations as described in below.
Figure 7: Notation Diagram
Actor: An actor is a representative of physical entity or position in the organization, a software entity, a
social role. Who is responsible for goals to be achieved, resources to be shared, and tasks to be performed.
Goal: Dam and Winikoff states that goals represent actor's strategic interest in [45]. There are two types
of goal: hard goal and soft goal. The hard goal represents functional requirement or specification of the
system. However, soft goal have no clear definition for deciding whether they are achieved or not.
Plan: A strategy that is adopted to fulfill a specific goal or soft goal.
Resource: Resources are something such as physical or informational entity, which required for agent to
fulfill specific tasks.
AND/OR Decomposition: The AND decomposition divides the main goal or task into more than one
sub goal. In this case, all sub goals must be achieved to fulfill the root goal. In the OR decomposition, the
main goal is divided into other alternative ways. In this case, the root goal can be achieved by any sub
goal's completion.
Mean-end Analysis: In mean-end relationship a mean (in term of goal, resource, and plan) completely
satisfy the root goal.
Social Dependency: The social dependency is an agreement between two actors: the depender and the
dependee, to achieve their common goal. Their common goal is called the dependum.
In TROPOS implementation, we are considering each neural cell and brain organ as an agent.
Figure 8: Actor Diagram
In the early requirement analysis phase of TROPOS, we identified 8 actors T-reg,T-eff, Virus, A.T-reg
(active T-reg), A.T-eff (active T-eff), BBB (Blood Brain Barrier), BWM (Brain White Matter or myelin)
and cytokine. Each role has its own goals, soft goals, resources, and plans. Actor T-reg has a goal "catch
virus" and "get active" to perform its responsibility such as protect myelin by killing A.T-eff cells. To
achieve goals T-reg depends on the virus. If it detects any virus in the brain, then it became active. As
actors can depend on other actors by soft goals, resources and plans. The T-eff also depend on virus to
complete its goal which is "catch the virus" and "become active". The Virus agent depends on T-eff and
T-reg agents to make them active without knowledge that T-ref will slow down damage rate. A.T-reg has
goals attack injurious agents as A.T-eff and kill them and in return produce A.T-reg. To fulfill its goals, it
depends on A.T-eff agent. And the soft goal is to increase the amount of T-reg agents to slow down
damage rate. A.T-eff's goals are "attack on myelin" to damage brain as well as "produce A.T-eff and
cytokines". To achieve its all goals it depends on BWM. After the attack on myelin then, it is able to
produce A.T-eff and Cytokines. Its soft goal is increase brain damage rate by producing more A.T-eff and
Cytokines. In fact, these agents play injurious activities in the brain. The BBB's goals are "stop agents
entering into brain" and "repair damage part of the BBB". The intention and goal of BBB is to protect the
brain by blocking all minacious agents.To fulfill goal this agent depends on all agents except BWM. The
BWM agents' goal is to repair damaged brain by regrowing myelin. Its soft goal is cover axons to
maintain neural communication between neurons. The Cytokine agents have a threatening behavior for
BBB. It depends on BBB to achieve goal, its goals are "damage BBB" and "allow all minacious agents to
enter into brain".
Rational models
The strategic rational model is a balloon like circle contain on four types of nodes task, goal, resource,
soft goal, and two types of links task decomposition link and mean-end link. The rational model captures
how an agent makes plan to fulfill its root goal and how it makes relation with other agents to fulfill the
system's goal.
Figure 9: T-eff Rationale model Figure 10:T-eff Rationale model
The goal of T-eff agent is to become active to perform its fundamental activities. For this, it plans either
active by catching a virus or be exposed to the virus. OR decomposition represent to an option to fulfill a
single aim and these options positively effect the plan. As a consequence plan positively supports the
main goal. This is the same scenario in the case of T-reg agent.
Figure 11 Virus Rationale Model Figure 12: A.T-reg Rationale Model
In Rationale model virus have goals made T-cells active and damage brain. To achieve damage the brain
goal, it has two options, either make more T-eff active or make less T-reg active. These options provide
alternative ways to fulfill a single goal. The Active T-Reg goal has a negative effect on soft goal and plan.
In A.T-Reg Rationale Model the soft goal of the agent is to support the immune system. This goal is
achieved by OR decomposition of killing A.T-eff or producing A.T-reg agents. The plan to kill A.T-eff
can succeed by producing more A.T-reg agents or by searching more A.T-eff agents.
Figure 13: T-eff Rationale Model
The overall objective of A.T-eff is to damage the brain. To achieve this goal A.T-eff agent set a hard goal
attack on myelin (BWM). For this goal this agent plans for increase damage rate by producing more
A.T-eff and cytokine agents. The Plan is decomposed into two goals. These goals have a positive effect
on the plan.
Figure 14: BBB Rationale Model
The main objective of the BBB is to protect brain from minacious molecules and cells. To achieve this
goal this agent set a hard goal to stop entrance of minacious cells into the brain. To fulfill this goal, it
plans to enter only T-helper cells T-reg and block T-eff, virus and dangerous molecules.
Figure 15: BWM (Myelin) Rationale Model
BWM or myelin maintains neural communication between neurons that would be its soft goal. To fulfill
its duty It regrows myelin if any damage occurs.
Figure 16: Cytokine Rationale Model
Cytokines are produced from A.T-eff agents. So they have the same goal as T-eff have "damage brain".
But they achieve this goal from another way by damage BBB. To achieve this goal cytokine try to reach
at BBB and hit it.
3.3.2 Late Requirements
In this phase, the developers identify all possible specifications of the system to-be and its operational
environment. The output of this phase is the final specifications of the system, in the form of functional
and nonfunctional requirement. This phase introduces the operational view of the system as an actor
model. To iterate, the conceptual model of the system to-be is extended by introducing system actor in the
overall system model and shows the dependency relationship between system actor and the other involved
actors. These dependencies show the main reason of interaction of system agent with the other involved
agents[43].
As Bertolini et al. state that, the system actor has the same features, which the other social actors have, in
terms of social dependency and goals to analyze[46]. The addition of system actor helps the developers to
recheck and conform that all involved actors and their dependencies are identified and the system actor
can be more than one actor. To summarize that, the actual system actor comes into a picture of one or
more actors, who helps the other actors to fulfill their goals.
In MS disease case MS is the system actor which describes the overall phenomena, how this disease
appear and how other actors contribute to proliferate this disease.
Figure 17: System Rationale Diagram
The system model controls overall system's environment and the involvement of actors. To iterate,
system actor is responsible for the entire behavior of the system. The behavior of system actor is, how it
responds and fulfill the requirements of other actors and the users of the system. In MS model the user
actor will be, who will run the simulation against particular factors or agents attributes. The hard goal of
the MS system actor is to show an accurate simulation of MS disease. This simulation shows, the varying
behavior of agents, for example, it shows at which point, which agents interact, how they interact, the
reason of agent's interaction and what was the effect of their interaction. To achieve this goal MS actor
plan for behavior space and plot. This plan uses behavior space as a resource. Actually, system actor
shows how and why other actors depend on it. The other hard goal of this system actor is to show a
simulation of varying scenario. Many other sub-goals (like show myelin recovery, show agent's
interaction, show agent's movement, show interaction b/w agents and BBB, show interaction b/w agents
and BWM) participate to complete this goal. System actor also plans for this goal and plan succeed by
Buttons, sliders, and switches. The soft goals are increasing understandability and usability.
Understandability support users to operate the whole system easily understand the output results of the
simulation.
3.3.3 Architectural Design
The architectural design phase expresses the overall architecture of the developing system. In architecture
sub-system or agents are connected by data flow, control flow, or other dependencies[40]. In actual, this
phase is an extended version of the actor diagram. In which each actor is introduced in detail according to
its dependencies with the other actors.
Moreover, the architectural design phase performs a mapping on the system actors, and the outcome is a
set of software agents. And each agent is characterized according to its specific abilities[43]. The system
architecture helps the designers to understand how system components work together and how to
constitute a relatively small, intellectually manageable model of system structure. The main objective of
this phase is, to make a check that either all involved agents are identified? If new agent is identify then it
should be incorporated in the system and also identify its control interconnections in the form of
dependencies.
In MS disease model, new actors are not identified in architectural design phase; however the overall
organizational structure is presented. This model includes rational diagram of each actor and the
dependency between actors through goal, soft goal, plans, and resources.
Create rationale diagram of each agent and link them to show architectural design.
3.3.4 Detailed design
The detailed design phase further elaborates the architectural design and the behavior of its interconnected
components[40]. The main concern of this phase is, actively deals the requirement specification
document, and all the involved agents at micro and macro level. Bresciani and Perini suggest that mostly
we use AUML activity diagram during detailed design for representing capabilities, plans and interaction
of agents in the article [43].
Activity diagram captures the dynamic process of the overall system and each involving agent. The agent
dynamics are the behavior of participating agents in the protocol and internal plans to achieve a specific
goal. For capability modeling, the UML's activity diagram assist to model the capability from the stand
point of a specific agent. For this purpose, the external events stars up the starting state of the activity
diagram, action state models plan, transition arcs model finishing condition of action state and interaction,
and the beliefs are models as object. Furthermore, for the plan and interaction modeling, the AUML's
sequence diagram can be exploited.
Figure 18: Activity Diagram
The activity diagram shows the general scenario of the MS disease model. In our developed model the
start button is "go" button which act as external event to start the simulation. When users, press start
button, then simulation starts. Go button checks the condition either BBB is broken, then agents are
allowed to go into the brain. In brain T-cells (T-reg, and T-eff) search for viruses. If they find a virus in
their radius, then they change their state from inactive to active else they search for viruses. In the same
way, virus search for T-cells to make them active and die. In the case of A.T-reg, it searches for A.T-eff.
If it finds any A.T-eff agents in its radius, then it kills them and produces a duplicate of A.T-reg agent.
The A.T-eff agents search for BWM, if they find BWM then, they damage BWM and produce duplicate
of A.T-eff, Cytokines and at the end they die . The cytokine agent moves randomly and if it finds BBB
then it damages BBB and die. The BBB agent checks a condition that if it is damaged, then allow agents
to move towards brain otherwise block them. And with time BBB try to recover from damage. The BWM
checks a condition if any A.T-eff attacks on myelin then it became damaged and checks another condition
if the damaged portion is recoverable then recovered otherwise remain damaged. The damaged portion
shows the severity of MS in the model.
3.4 MaSE
At the very first time, MaSE methodology was proposed by Deloach in 1999 in the article [47] and after
that, the improved version of MaSE methodology was proposed by Deloach, Matson and Li in 2003 for
the development of a team of rescue robots which are autonomous, heterogeneous searcher, and rescuer
[48]. Several attempts have been made at creating methodologies and their tools for building autonomous,
heterogeneous, distributed and complex dynamic systems. However, mostly the proposed methodologies
and their tools have focused on either the agent architecture, or the methodology lack of sufficient details
to adequately support the designing of complex systems[49].
The significant purpose of the development of this methodology was, MaSE should be independent of
any particular agent-based system architecture, specific agent architecture, programming language, and
precise agent communication framework. Then the developed methodology proved that, the MaSE
seemed a good fit for the cooperative robotic systems[48].
The main objective of this methodology is, guide a system developer throughout the system development
process, by following the set of interrelated system model[48][50]. The previous research on intelligent
agent has focused, on the structure and the capabilities development of an individual agent. Now,
researchers have realized that to solve the complex system's problems, agents coordination is mandatory
for the heterogeneous environment.
The one another constructive aspect of this methodology is, it has its own developmental tool
"agentTool". Same as the MaSE methodology, the agentTool is also independet of the particular agent
architecture, the agent's programming language, and the agent communication language. The analysis and
design phases perform a transformation that shows how to derive new models from the existing models.
The MaSE is implemented after gathering requirements, which further divided into sub-goals as defined
in the article[49][51][50].
Figure 19: MaSE Methodology Models [49].
3.4.1 Analysis Phase:
The analysis phase is further divided into three precise phases, such as
1. Capturing Goals:
This phase develops a goal hierarchy of the system to-be, in which each goal has system level objectives.
The developers take system requirements and organize them into a sequential set of system goals. Simply,
The developers collect all the requirement and set them into hierarchy of basic goals of the system to-be.
We developed the goal hierarchy model of MS disease case study, as researchers implemented MaSE in
different scenarios. [48][49]. Goals must be identified through initial system context, which gives a
starting point to the analyst for system analysis.
Figure 20: Goal Diagram
The figure 20 shows that, the main goal of the MS disease model is to simulate the severity of disease.
This cental goal is further decomposed into sub-goals. However, each goal should always be defined as a
system level goal.
2. Applying Use Cases:
This phase develops Use Cases and sequence diagram. The use cases of a developing system explain the
complete scenario that a system would perform in the real operating environment. To put it simply, a use
case of a system explains the sequence of all working events that must be performed by the developed
system, these events may be its failure and hanging events. For the development of a flawless system, the
analyst should develop enough use case which covers every possible event that can occur in the system by
using different data and event scenario.
The sequence diagram helps the developer to understand the overall system scenario and find out all
involved agents with their communication paths. Moreover, the sequence diagrams provide assistance in
capturing the use cases of the system. Furthermore, these use cases would use later in the analysis phase,
in which a particular role would be assigned to a specific goal. In general, a single sequence diagram is
considered as a representative of each use case.
Figure 21: Sequence Diagram
In the sequence diagram, normally roles are represented by rectangular boxes which are placed at the top
place of the diagram and the connecting arrows of the roles represent to ongoing events among the roles.
And the time is assumed as a sequence of events from the top of the sequence diagram to the bottom.
In MS disease' sequence diagram we identified nine agents. To precisely represent the sequence, we used
BBB two time as an agent. If the BBB is broken then, it informs to T-Cells and virus. When virus finds T-
cells around then it makes them active. An A.T-eff damage the BWM and in return produce Cytokine and
duplicate A.T-eff. When A.T-reg finds an A.T-eff in around then it attacks and kills. In return A.T-reg
duplicate itself. In the case of damage, BWM and BBB recover themselves. Cytokine search BBB and
damage it.
3. Refining Roles:
The main objective of refining role model is, transform the structured goals and sequence diagram into
the final rules of the system to-be. Furthermore, these roles provide a foundation the agent class model
and became system goals during the design phase. Refining role is one of the important steps of the MaE
methodology because, the system goals would be satisfied with the only one way, if every single goal is
considered as an identical role, and every role is played by an identical agent class. This phase develops
concurrent tasks and goal hierarchy models. In general, the transformation of goals to roles is a one-to-
one mapping. However, a single role may have multiple goals.
Figure 22: Refined Role Model
In the MS disease model we identified eight roles, which are shown in rectangle boxes. According to
Agent definition we select those entities as an agent who have some responsibilities or activities to fulfill
the system requirement. All selected roles have multiple goals as shown in figure 22.
3.4.2 Design Phase:
1. Creating Agent Classes:
This phase develops agent class diagram, which consists of agent classes and the conversation between
them. The agent class model clearly depicts the overall organization of agents. Additionally, the agent is
an actual instance of an agent class, and class is a template for a single type of agent in the system.
Additionally, the agent is an actual instance of the agent class, and class is just a template for a single type
of active role in the system to-be. In this phase, the agent classes are developed in terms of the roles, that
must be played. And the conversation is developed as protocols, in which they must participate.
Figure 23: Agent classes Interaction
2. Constructing Conversation:
This phase develops conversation diagram of each software agent. The MaSE conversation model defines
the conversation of two software agents as a coordination protocol[1][2]. In a conversational event, two
agent classes participate, one is an initiator and the second is the responder. The actual purpose of the
conversational model is to define the purpose and the detail of the conversation. When a software agent
wants to communicate with the other agent then it sends the initiator message to the partner agent to start
the communication.
When the responder agent received a conversation request, then it compares it with all its permitted
conversations. If it finds a match, then it performs the required task that can be a request of resource, data
share, or a coordination request. Otherwise, the responder agent assumes that the conversation message is
a request to start a new conversation. In this case, the responder compares the request with all its possible
conversations in which this agent can participate and all the agents' with whom it can make the
conversation. If it finds a match, it begins a new conversation.
Figure 24: T-reg Conversation model. This conversation take place between T-reg and Virus.
Figure 25: T-eff conversational model with Virus.
Figure 26: A-T-eff Conversational Model
Figure 27:A.T-reg Conersational Model
Figure 28: Virus makes conversation with T-cells to make them active.
Figure 29: BWM makes conversation with itself.
Figure 30: BBB's conversational Model.
Figure 31: Cytokines Conversational Model.
3. Assembling Agent Classes:
This phase develops the architecture diagram of agent software by integrating different agent classes
into a single model. This development phase is accomplished by accomplishing two sub-steps: 1) by
defining the agent architecture, 2) by defining the all components that makeup the agent architecture
Figure 32: Assembling agent classes.
4. System Design:
Generally, this phase develops the deployment diagrams. This phase receives the agent classes of each
involved agents and introduces them as actual agents of the system to-be. And go through a data flow
diagram to demonstrate the location and control flow of each agent.
Moreover, this final step of MaSE performs the configuration on the involved agents and their
responsibilities by developing deployment diagrams. Which shows, the total numbers of agents, their
location and agent's type within the system.
4. Comparative Analysis
As biological researchers have no clear idea about engineering methodologies. And the other problem is,
at present, more than two dozen AOSE methodologies exist. Therefore, the process of choosing the right
methodology for their specific problem agonize them. To escape from this tension they just model their
problem without any guided methodology. So this hastens development create some serious problems
such as missing essential information about the problem, the wrong decision of choosing development
tool, the doubt on systems authenticity. To overcome all these mentioned nervousness, in this work, we
applied three well known AOSE methodologies: GIA, TROPOS, and MASE on MS brain model. In this
work we performed a comparative analysis of these methodologies to analyze that, which methodology is
more suitable for biological models development.
For comparative analysis, we used a framework that focuses on four major facets of methodologies: 1)
notations and modeling techniques, 2) concept and properties, 3) development process and 4) pragmatics.
To be very clear, that our work would not attempt to state that which the right methodology is. Rather, it
examines the existing methodologies to advise researchers to choose right methodology according to their
specific scenario. A lot of comparative analysis has been done in literature as shown in the below table.
Ref Paper Title
Author
Journal
Year
I.F
2017
Compared
methodologies
[52]
"Multi-agent approach
automated registration"
for cancer
Sanislav et
al
Control Engineering and
Applied Informatics
2010
0.695
[53]
"A Methodology to Evaluate Agent
Oriented
Engineering
Techniques"
Software
Lin et al.
[54]
"A framework for the evaluation of
agent-oriented methodologies"
Abdelaziz,
Elammari
and
Unland
[55]
"A comparative analysis of i* agent-
oriented modelling techniques"
Grau et al.
[56]
"Agent-Oriented Methodologies
Towards a Challenge Exemplar"
-
Yu
and
Cysneiros
[57]
"On the evaluation of agent oriented
modeling methods"
[56]
Proceedings of the 40th
International
Hawaii
Conference
on System
Sciences
4th
Innovations'07:
International Conference
on
in
Information Technology,
IIT
Innovations
In Proceedings of The
Eighteenth
International
Conference on Software
Engineering
and
Knowledge
Engineering
(SEKE'06)
Proceedings
of
the International Bi-
Conference Workshop on
Agent-Oriented
Information Systems
2007
2008
2006
2002
Proceedings
Oriented
Workshop
of Agent
Methodology
2002
[58]
"ASPECS:
An
software process
complex systems"
agent-oriented
for engineering
Cossentin
o et al
Autonomous Agents and
Multi-Agent Systems
2010
2.103
"A COMPARISON OF THREE
AGENT-ORIENTED
SOFTWARE
DEVELOPMENT
METHODOLOGIES : MASE , GAIA
, AND TROPOS"
Jia et al.
In Information,
Computing, and
Telecommunication,
2009. YC-ICT'09. IEEE
Youth Conference on
2009.
2009
"Evaluating how agent methodologies
support
the
normative environment through the
development process"
specification of
the
Garcia et
al.
Autonomous Agents and
Multi-Agent Systems
2015
2.103
[33]
[59]
[60] "METHODOLOGIES
AND F.
Springer
Science
\& 2009
1. GAIA
2. PASSI
3.
4. MASE
INGENIAS
1. Tropos
2. GAIA
3. MASE
1. GAIA
2. MASE
3. HLIM
1. Tropos
2. GBM
3. ATM
4. BPD
5. RiSD
6. PriM
just
They
question
to
methodology
proposed
evaluate
They just proposed terms
for
methodology
evaluation
1. PASSI
2.
INGENIAS
3. ANEMONA
4. GAIA
5. ROADMAP
6. TROPOS
7. PROMETHEUS
8. ADELFE
9. ASPECS
1. GAIA
2. TROPOS
3. MASE
1. OMASE
2. OPERA
3. TROPOS
4. GORMAS
1. GAIA
SOFTWARE ENGINEERING FOR
AGENT SYSTEMS"
Bergenti,
Federico
and
Gleizes,
Marie-
Pierre and
Zambonell
i
Business Media
2. TROPOS
3. MaSE
4.1 The Proposed Evaluation framework
The structure of the proposed analysis framework is taken from the study [60] however, the evaluation
attributes are taken from different literature. The framework is divided into four subparts. 1) concept and
properties, 2) Notations and Modeling Techniques, 3) Development Process, 4) Pragmatics. The proposed
evaluation framework is based on feature analysis attributes. These attributes evaluate feature of each
examined methodology from different aspects. Before implementing the evaluation framework on
methodologies, first of all, we will discuss in brief the main objective of each section of the framework.
4.1.1 Concepts and properties
The "Concepts and Properties" evaluation criteria are important for agent-oriented methodology
evaluation. "A concept is an abstraction or a notion derived from a specific instance within a problem
domain". And the property represents a special characteristic or capability of an agent. This facet is
concerned with the question whether a methodology addresses the basic notions such as concepts and
properties of agents in MAS or ABM. In the following, there are concepts and properties according to
which methodologies should be evaluated.
[52]
[53]
[54]
[55]
[56]
[57]
[58]
[33]
[59]
[60] Gaia V.2
TROPOS
MaSE
✓
✓
✓ ✓ ✓
✓ ✓
✓
✓
✓ ✓
✓
✓ ✓
✓ ✓ ✓
✓
✓
✓ ✓ ✓
✓
✓ ✓
✓ ✓
✓ ✓ ✓
✓
✓ ✓ ✓ ✓
✓ ✓ ✓
✓ ✓
✓
✓
✓ ✓ ✓ ✓
✓
✓
✓
✓
✓
✓
✓ ✓
✓
✓ ✓ ✓ ✓
✓
✓
✓
✓
✓ ✓ ✓
✓
✓ ✓ ✓
✓
✓ ✓ ✓
✓
✓ ✓ ✓
✓
✓ ✓
✓
✓ ✓ ✓
✓
✓ ✓
✓
✓ ✓ ✓
✓ ✓
✓ ✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
and
Concepts
properties
Autonomy
Adaptability
Agent Abstraction
Belief
Communication
Concurrency
Collaboration
Cooperation
Desire
Problem
Decomposition
Events
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
Multiple Interest
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
Intention
System
Guidance
Interface
Pro-activity
Protocol
Organization
Message
Reactivity
Role
Tasks
Norms
Society
Soci-ality
Service
Agent- Oriented
5. Results and Discussion
In this section we present ……
1. Autonomy: The ability of an agent to perform its tasks without any supervision.
In GAIA analysis phase, each role has some responsibilities, and they are independent to perform their
responsibilities. In the design phase roles are replaced with agents. So autonomy is expressed in the way
that roles encapsulate its functionality.
The requirement analysis phase of TROPOS defines the autonomy through actor's individual goals, the
association between agents, and their plans. In the requirement analysis phase, the agent's autonomy is
expressed by its goal and plan to achieve goals. In the architectural design, the autonomy is stated by
elaborating actors agenda for achieving the system goal. In the detail design phase, the activity diagram,
which expresses autonomy.
In the analysis phase of MaSE, autonomy is expressed by tasks. And agents are responsible to execute
their tasks on its own responsibility. In the design phase autonomy is expressed through agent classes, in
which roles encapsulate their functionality. And this functionality is internal states of agents that not
affected by the environment. The autonomy is followed by each phase of each methodology, therefore;
we can say that autonomy is high in these three methodologies.
2. Adaptability: The ability of an agent or methodology to deal with the variety of computing
environments, and adjust itself according to changing settings.
In GAIA the adaptability is expressed by environmental model. That deal with its internal states and
expresses how other agents and environment effect on it. In TROPOS, activity diagram express the
adaptability and deals with the variety of computing environments, and changing settings. The MaSE
methodology does not support adaptability. The environmental model of GAIA does not explicitly define
the negative or alternate responses to change, however, the activity diagram in TROPOS explicitly
explains both worse and better responses to change. In that way, adaptation is stronger in TROPOS as
compare to GAIA.
3. Agent Abstraction: The ability of a methodology to describe agents using high-level abstraction.
In GAIA, the preliminary role model support agent abstraction by extraction roles from requirement
specification document. And In the design phase the agent model expresses the agent abstraction
property. In TROPOS the actor model in the early requirement analysis phase and the architectural design
phase define the actor abstraction property. In MaSE the role model in the analysis phase and, agent
classes in the design phase expresses the agent abstraction property. Almost all phases of each
methodology support to agent abstraction, therefore agent abstraction is strong in these three
methodologies.
4. Belief: The belief is a faith of an agent, which believes that it is always true about the world.
GAIA does not have a belief. The goals of the actor in TROPOS express the belief concept. In MaSE
methodology, belief is expressed by goals, tasks, and states. MaSE strongly support belief property as
compare to TROPOS and GAIA.
5. Communication:
The interaction model in the analysis and design phase of GAIA defines communication. The activity
diagram explicitly expresses the communication in TROPOS. In MaSE methodology conversation model
defines communication. Due to activity diagram and conversation model the communication is strong in
TROPOS and MASE as compared to GAIA.
6. Concurrency:
In GAIA the service model, in the detailed design phase support concurrency. The activity diagram in the
detailed design phase of TROPOS defines concurrency. In MaSE the role model in the refining role
model explicitly explains concurrency.
7. Collaboration: An agent has methods to cooperate with other agents to achieve goals.
In GAIA's analysis and design phase, the interaction model expresses collaboration between agents. In
the detailed design phase of the TROPOS sequence diagram defines collaboration between agents. The
sequence diagram in the analysis phase and a conversation model in the design phase of MaSE express
collaboration between agents. Due to sequence diagram, collaboration is more precise and strong in
TROPOS and MaSE as compare to GAIA.
8. Cooperation: The cooperation is a collaborative activity with one objective, but it is distributed
among several actors. In cooperation, each agent performs actions according to the shared objectives.
The organizational structure of GAIA expresses the cooperation of agents. The architectural design in
TROPOS expresses cooperation of agents to perform a specific task. The agent class model in the design
phase of MaSE expresses the cooperation of agents. Due to the class diagram, cooperation is strongest in
MaSE as compared to GAIA and TROPOS.
9. Desire: A goal of an agent to be achieved.
GAIA does not support Desire property of the agents. The goal of the agent in TROPOS expresses the
desire of the agent. The goal, task models and state in the conversation model of MaSE express the desire
of agents. Desire is much stronger in the MaSE methodology after that TROPOS have strong desire
property. And GAIA does not have desire property.
10. Problem Decomposition: The ability of a methodology to divide the large problem into smaller and
more manageable parts. Basically, this property tackle complexity.
The analysis phase, architectural design, and detailed design phases of GAIA support problem
decomposition property. The earlier requirement, late requirement, architectural design and detailed
design phases of TROPOS support problem decomposition property. The analysis and design phases of
MaSE support problem decomposition property. The problem decomposition is stronger in these three
methodologies since each phase of these methodologies is divided into subparts. The division of phases
helps to decompose and understand complex problems.
11. Events: The ability of a methodology to control event triggering. The events trigger the interaction
and agents become responsible for a new goal.
In GAIA the analysis phase, the sub-organization model interacts with the environmental model, role
model, and interaction model. And these models interact with the organizational rules model. The
interaction generates events in models to interact with other models to perform a required task. The same
event phenomena happen in the design phase. In this way, GAIA expresses event generation property. In
TROPOS early requirement or any other phase does not interact with late requirement phase and with
others phases. Since TROPOS phases do not generate events or interaction, that's why this methodology
does not express an event concept. MaSE methodology's phases interact with other phases and models in
a phase interact with each other, this interaction expresses an event concept. Only TROPOS does not
support to event concept.
12. Multiple Interests: At a time, an agent may have multiple tasks such as co-operate with other agents,
be independent, or help the other agents to achieve a goal in the environment.
GAIA does not support this concept. TROPOS express this concept through goals, plans, and resources.
Since, TROPOS agents interact with other agents through goals, plans, and resources. Since they have
multiple interests to achieve their goals or to interact with other agents. The MaSE methodology does not
support multiple interests concept. Only TROPOS have a strong concept of multiple interests.
13. Intention: A fact that represents the way of realizing a desire, sometimes referred to as a plan.
The GAIA does not support intention concept. The agents of TROPOS express intention through its
plans. The goals, task, and states in a conversation model of MaSE express the intention concept. The
Intention is stronger in MaSE since three different models of MaSE express this concept. After the MaSE
intention is strong in TROPOS.
14. System Interface Guidance:
The GAIA does not support interface to the external world. The TROPOS methodology does not offer an
interface for the external world. The MaSE methodology does not support or offer an interface for the
external world. These three methodologies lack an interface to the external world. This flaw should
improve in all these methodologies.
15. Pro-activity: The ability of an agent and methodology to pursue new goals.
The service model in the detailed design phase of GAIA expresses pro-activeness. The plans of an agent
to achieve a goal express the pro-activeness in TROPOS. Any phase of MaSE methodology does not
support pro-activeness. The pro-activity is high in GAIA and TROPOS and MaSE lack of this property.
16. Protocol: A set of messages that defines the purpose and detail of a particular interaction among the
agents.
The role and interaction model in the architectural design phase and agent and service model in the detail
design phase of GAIA explicitly define protocol concept. The sequence diagram in the detailed design
phase of TROPOS somehow defines protocols, however; this methodology does not clearly define this
concept. The conversation model in the analysis phase and a conversation model in the design phase of
MaSE explicitly expresses protocol concept. GAIA and MaSE methodologies strongly support protocol
concept. On the other side, TROPOS does not express this concept explicitly. TROPOS lack conversation
model.
17. Organization: A group of agents working together to achieve a common purpose. An organization
consists of roles that characterize the agents, which are members of the organization.
The Sub-organization model in the analysis phase and the organizational structure model in the design
phase of GAIA express organization concept. The architectural design phase of TROPOS expresses
organization concept. The agent architecture model in the detailed design phase of MaSE expresses
organization concept. GAIA strongly expresses an organization model as compared to TROPOS and
MaSE.
18. MESSAGE: The message is a request for making conversation between agents for resources and task
completion.
The protocols in the interaction model, agent model and services model of GAIA express this concept.
The activity diagram in TROPOS expresses message concept explicitly. The conversation model in the
MaSE defines message concept. The message concept is defined by all these methodologies.
19. Reactivity: The ability of an agent and methodology to respond to changes in environment on time.
The responsibilities of a role in the role model and agent model show liveness. This liveness expresses
reactivity in GAIA. The state change in activity diagram and sequence diagram of TROPOS methodology
expresses reactivity. The conversation model and sequence diagram in MaSE express reactivity. All these
methodologies somehow meet the requirement of reactivity. There is no explicit or clear model to support
reactivity.
20. Role: An abstract level description of the agent's function, its services or its specific identification
within a group.
The role models in the analysis and design phases of GAIA define the role concept explicitly. TROPOS
does not express role concept. The role model in the analysis phase of MaSE expresses the role concept.
The role concept is strong in the GAIA methodology as compared to MASE. In TROPOS role abstraction
concept is weak.
21. Task: A precise piece of work that is assigned to the agent of the system to be in the form of its
function.
Task represents to agent responsibilities. In GAIA the role model and service model express task concept.
In TROPOS methodology the task concept represents to a capability of the agent. And capability is
expressed by activity diagram. The concurrent task model in MaSE expresses a task concept explicitly. In
MaSE the task concept is stronger as compared to TROPOS and GAIA.
22. Norms: A set of rules that characterize a society and the agents of this society are bound to follow all
the mentioned norms.
GAIA: The norms defined by the organizational rules model in the analysis phase of GAIA. The norms
are defined by the organizational structure in TROPOS. The agent architecture in the design phase
expresses norm concept in MaSE. In GAIA norm concept is stronger as compared to TROPOSE and
MaSE methodology.
23. Society: A collection of agents and organizations that collaborates to promote their individual goals.
The organizational rules and organizational structure models define society in GAIA. The organizational
structure in TROPOS somehow way defines society. The agent architecture in MaSE somehow defines
society. GAIA methodology has a strong society's concept as compared to TROPOS and MaSE.
24. Sociality: The capability of an agent to communicate with the other agents of the system by sending
and receiving messages and cooperate with them to perform a specific task.
In GAIA the sociality is expressed within the interaction model that defines the communication links
among agent types. In TROPOS the sociality is expressed by the system model in the late requirement
phase. The sociality is somehow expressed by agent architecture in MaSE. All methodologies weakly
support sociality concept.
25. Service: The service is a "knowledge level analogue" of an agent's operation to achieve a specific
goal.
The service is expressed by service model in the detailed design phase of GAIA. The TROPOS
methodology does not support service concept. The MaSE methodology does not support service concept.
Only GAIA methodology explicitly expresses service feature.
26. Agent-Oriented: The agent-oriented features focus on whether the methodology addresses Agent-
based features during the analysis and design.
GAIA methodology somehow defines all attributes of an agent such as pro-activity, autonomy, reactivity,
and sociality so, it is an agent-oriented methodology. The TROPOS methodology somehow defines all
attributes of an agent such as pro-activity, autonomy, reactivity, and sociality so, it is an agent-oriented
methodology. The MaSE methodology somehow defines all attributes of an agent such as pro-activity,
autonomy, reactivity, and sociality so, it is an agent oriented methodology. All these methodologies are
agent-oriented.
4.1.2 Notations and modeling techniques
Notations are a set of symbols that technically represent agents and their functional goal in a system to-be.
These modeling techniques collectively build a precise model that represents developing system at
different levels of abstraction and express their different facets such as structural and behavioral sides.
This section deals with the properties of notions which a modeling methodology should have. The list of
properties is given below:
[52]
[53]
[54]
[55]
[56]
[57]
[58]
[33]
[59]
[60] GAIA V.2
TROPOS MaSE
and
Notation
Mdeling
Technique
✓ ✓
✓
✓
Agent Attributes
✓ ✓
✓ ✓
✓
✓
✓ ✓ ✓
✓
✓
✓
✓ ✓ ✓
✓ ✓
✓ ✓
✓
✓
✓ ✓
✓ ✓
✓ ✓
✓
✓
✓
✓ ✓
✓ ✓ ✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
Accessibility
Analyze-ability
Complexity
Management
Dynamic Structure
Expressiveness
Consistency
Open system
Execute-ability
Unambiguity
Consistency
Trace-ability
Preciseness
System View
Modularity
1. Agent Attributes: The ability of a methodology that concern about the description of the agent's parts
that make up the internal structure.
The internal structure of the agent is strong in the GAIA as the role model of the analysis phase
transforms to agent model in the design phase. This strength is due to that every agent plays a specific
role and is independent in making decisions. In TROPOS the actor diagram of the requirement phase
transforms to the activity diagram in the design phase. So in this sense, the internal structure of an agent is
strong in TROPOS. In MaSE the role model transforms to agent model in the design phase. All these
methodologies explicitly manifest agent attribute for system development.
2. Accessibility: The ability of a methodology that assist the developers to easily adapt it, understand it
and implement it.
All GAIA models and the phase distribution are simple and understandable. Engineers can use easily
these models and can develop complex systems. Gaia does not support accessibility when developers
transform its models to the overall system model. The notation understandability and modeling in
TROPOS is easy. However, the transformation of models from rational models to activity diagram and
sequence diagram is difficult. Same like GAIA, MaSE methodology has simple models that can be
understood by developers easily, but the transformation of these models into the overall system model is a
difficult task. All these methodologies in some way are accessible; however, some improvement is
required in this area.
3. Analyze-ability: The capability of a methodology to check the internal consistency of each agent. And
also point out the unclear aspects of models and agents.
GAIA does not deal with the analyze-ability. TROPOS check analyze-ability of models through the agent
plan, resource, and goals. However, the analyze-ability compromise between rational models and
architectural structure. The MaSE methodology provides analyze-ability within models through the
transformation of models from the analysis phase to design phase. However, analyze-ability compromise
when transforms activity diagram into a sequence diagram. All these methodologies need a development
in this area.
4. Complexity Management: An ability of the agent-oriented methodology to deal with the different
levels of complexity. For example, sometimes only high-level requirements are needed while in the
other situation more details are required. In this case, the agent oriented methodology should provide
all level information.
GAIA gives somehow favor to manage complexity by giving different levels of abstraction by different
models. However, it does not have a hierarchical structure to manage system's complexity. The TROPOS
controls complexity by goal model in the early requirement phase, but it cannot control the details within
it. The hierarchical structure somehow controls complexity. The MaSE methodology provides an
abstraction of almost every concept of the goal, agent, conversation model, in this way it controls a
limited extent of complexity. However, it does not have any hierarchy model to control complexity and
detail of complex tasks. Generally, GAIA and MaSE are suffering from this deficiency. TROPOS is
somehow better on this property.
5. Dynamic Structure: The ability of a methodology to provide support for the dynamic structural
reconfiguration of the system.
The GAIA does not deal with a dynamic structure. The TROPOS somehow deal with the dynamic
structure of activity diagram. The MaSE does not deal with the dynamic structure. The future work should
be done on the dynamic structure feature of all methodologies.
6. Expressiveness: The ability of a methodology of presenting system concepts such as system structure,
encapsulated knowledge of models, ontology structure, data flow, control flow, and concurrent
activities of the involving agents.
Due to the generic structure, GAIA can handle and model a large variety of systems. However, the system
structure of the system to-be is not presented explicitly. Usually, TROPOS helps to develop BDI (Belief,
Desire, and Interaction) systems. However, the system structure of the system to-be is not presented
explicitly. The MaSE methodology explicitly describes the system structure by using an agent
architecture and system design diagrams. However, the encapsulated knowledge of the system is not
presented explicitly. All methodologies express expressiveness in a limited way.
7. Consistency: The ability of methodology to maintain the quality of a system throughout the
development process.
Each model in the GAIA explicitly defines each concept clearly, means that agent model, role model,
environmental model, service model. There is no chance of ambiguity between models. In TROPOS the
rational model and the architectural design confuse the developers due to ambiguity. However, in detail
design phase it controls this lack through activity diagram. The MaSE explicitly express consistency
within each model through control flow and data flow. Moreover, each model clearly defines a single
concept such as goal model, role model, and agent model, etc. Each methodology tries to be consistent in
some way. However, MaSE strongly expresses the consistency as compared to GAIA and TROPOS. On
the second number, GAIA is stronger in consistency than TROPOS.
8. Open System: The ability of a methodology to add or remove new agents in the development system.
The GAIA methodology completely supports open system property because this methodology has
separate models for each concept. New agents, roles, and protocols, etc easily can be removed or add into
the system. TROPOS methodology does not support to open system property due to activity and sequence
diagrams. Same like GAIA, MaSE explicitly supports to open system property. GAIA and MaSE are
strong, according to this aspect.
9. Execute-ability: The ability of the agent-oriented methodology, to provide the facility of performing a
simulation to validate the system specification. Or at least generate a prototype of the overall system
to-be.
GAIA does not deal with the execute-ability issue. TROPOS dealt with the execute-ability by using
JACK. The MaSE methodology has a developmental tool "agentTool" which support partially to code
generation. MaSE methodology is stronger as compared to the GAIA, and TROPOS, according to this
aspect.
10. Unambiguity:
As GAIA has clear models for each concept, so in this way, it tries to overcome this issue. In TROPOS
the architectural design and rationale models lead to ambiguity and create confusion for developer's
understanding. Same like GAIA, MaSE has clear models for each concept. MaSE and GAIA
methodologies have less ambiguity as compared to TROPOS.
11. Trace-ability: The ability of a methodology to handle the main concept of the system to-be throughout
the system development.
The models in GAIA's analysis phase become input for models in the design phase. In this way we can
say it maintain trace-ability throughout the development phases. Same like GAIA, the TRPOS
methodology also maintains trace-ability. The models in the analysis phase of MaSE become the base for
the design phase models. Each mode can be traced by its base model. All these methodologies in
somehow way fulfill the trace-ability aspect.
12. Preciseness: The ability of the methodology to handle the ambiguity throughout the system
development. It assists the developers in avoiding the misinterpretation in system development.
Each model has a clear meaning and interpretation in GAIA methodology. This edge makes GAIA
accurate. As the TROPOS base on i* model that has clear notation and meaning of each symbol. Thus, it
prevents users from misinterpretation. Same like GAIA, MaSE model, symbols, and notations have a
clear meaning and interpretation. This advantage makes the MaSE accurate and prevent the developers
from misinterpretation. All these methodologies are precise.
13. System View: The ability of a methodology to provide a microscopic system oriented model, to
understand the whole working scenario of the developing system.
GAIA does not promote system view feature. Since, this methodology has a deficiency of hierarchical
model and overall system model. In TROPOS the activity diagram demonstrates the general view of the
system model. In MaSE, agent classes depict a vague concept of system view. Only TROPOS has
somehow clear abstraction of system view.
14. Modularity: The ability of a methodology to develop a system in an iterative way. That allows adding
new requirements without affecting the existing specifications.
GAIA is modular, due to its models (agent, service and, role). The changing in the role does not affect the
whole system. This change only influences the internal structure of an agent or role. Within the TROPOS
modularity is fully supported. Same like GAIA, MaSE support modularity because of models (task, agent,
goal). TROPOS strongly support modularity as compared to GAIA and MaSE.
4.1.3 Development Process
A development process is a step by step guideline for developing a system from scratch. This process
consists of a series of actions, functions, and models, that when performed, then the outcome is an
operational computerized system. Basically, this section of evaluation framework deals with the different
facets of system development process. The terminologies for checking the developing process are given
in the below table:
[52]
[53]
[54]
[55]
[56]
[57]
[58]
[33]
[59]
[60] GAIA V.2 TROPOS MaSE
✓ ✓
✓
✓
✓ ✓ ✓
✓
✓ ✓ ✓
✓
✓ ✓ ✓
✓
✓
✓
✓
✓ ✓ ✓
✓ ✓
✓
✓
✓ ✓ ✓
✓ ✓ ✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓ ✓ ✓
✓ ✓ ✓
✓
✓
✓
Development
Process
Architecture
Design
Requirement
Norms
Legal Document
System Design
Development Life
Cycle
Development
Context
Implementation
SDLC coverage
Development
Approach
System
Specification
Project
Management
guideline
Verification
Validation
and
✓ ✓ ✓
Quality Assurance
1. Architecture Design: The ability of a methodology to facilitate design by using patterns or modules.
GAIA provides almost all modules of a system such as interaction, role, environmental, service, agent
models and also provides an architectural design of developing system. The architectural design phase of
TROPOS explicates the overall system's global architecture in terms of sub-systems, interconnected
through data and control flow. The MaSE have all architectural bricksin the orm of models such as agent
model, goal model, role model, conversation model and task model. The agent architecture model
represents the architectural design of the whole system. All these methodologies have architecture design
property for system development.
2. Requirement Norm: The ability of a methodology to identify organization's norm during
requirement analysis.
GAIA does not support the system requirement. This methodology performs development process after
requirement specification. During early and late requirement analysis phases of TROPOS, this
methodology identifies and formalize norms for the system to be developed. Same like GAIA, the MaSE
methodology have analysis and design phase. It does not support system requirement analysis phase.
Only TROPOS has a strong feature of building system norms.
3. System Design: The ability of a methodology to introduce the normative environment of the system
as an integral part of the development phase.
GAIA does not support system design. TROPOS does not support system design. MaSE expresses
system design through deployment diagrams. More work is required in the system design phase of all
methodologies.
4. SDLS Coverage: The ability of an agent-oriented methodology to include elements of software
development.
GAIA covers only two main phases of the development process such as analysis and design phase. This
coverage is not sufficient for developing an outstanding system. The TROPOS methodology covers
almost all phases of the development cycle. However, it does not deal with the testing stage. MaSE covers
development cycle from analysis to implementation phase. However, its goal model, use cases and
sequence diagrams in somehow manners support requirement phase. MaSE does not support only to
testing phase. Only GAIA methodology has a deficiency of DLC coverage.
5. Development Context: The ability of a methodology to be remolded according to users need such as
creating new software, reverse engineering, re-engineering systems by using reusability or creating
new system property.
GAIA has the ability of creating new software, designing and re-engineering systems by using reusability
propert or creating from scratch. It does not address implementation phase and does not support classical
reverse engineering . The TROPOS methodology can be used for creating software systems from scratch
and for prototyping, re-engineering and designing systems by using reusability property. However,
TROPOS does not support reverse engineering. Because when going from one stage to the next stage,
then several concepts undergo significant changes. The MaSE can be used in creating new systems,
designing systems from scratch and re-engineering with reuseability property. However, MaSE does not
support reverse engineering. All methodologies are incapable of reverse engineering.
6.
Implementation Guidance: The capability of a methodology to deal with coding issues, quality,
performance, libraries and debugging.
GAIA does not support implementation phase. TROPOS has implementation guidance property as it
suggests to use JACK toolkit since it easily maps a BDI architecture. The MaSE methodology has a
graphical agentTool, which is a fully human-interactive tool and guides each step of MaSE development.
The agentTool have the ability for automatic verification of inter-agent communication, semi-automated
design, and code generation for multiple MAS framework. These all methodologies are strong in
implementation guidance property except GAIA.
7. Development Approach: The attribute of a methodology to guide system development in a specific
way, such as top-down, bottom-up, mix.
GAIA follows a top-down development approach. TROPOS follows a top-down development approach.
MaSE follows a top-down development approach. All these three methodologies follow a top-down
approach.
8. System Specification: The ability of a methodology to accurately interpret the problem from
specification document. And confirm that this is the right problem to be solved.
The analysis phase of GAIA, manifest the requirement specification of the system in the form of sub-
organizations, role model, interaction model, and organizational rules. The actor model in the early
requirement analysis phase of TROPOS embodies the requirement of the system. In the analysis phase
the MaSE express system specification in the form of goal model, use cases, sequence diagram, roles and
task model. All these methodologies identify and specify system specifications.
9. Project Management guideline: The ability of a methodology to effectively and efficiently guide all
aspects of a project from conception through completion.
This issue is not dealt with in the GAIA. The TROPOS has lack to deal with project management issues.
This issue is not dealt with in the MaSE. ALL these methodologies are unable to deal with the project
management issues.
10. Verification and Validation: The ability of a methodology to provide a way for formal verification
and validation.
GAIA performs verification and validation during the transformation of preliminary roles to role model.
In TROPOS, there is no coverage checking with respect to the initial requirement. However, TROPOS
extension "formal TROPOS" can be used for verification and validation. MaSE performs verification
over its models by checking consistency, deadlocks and unused elements between the stages. ALL these
methodologies have no specific verification and validation method. However, TROPOS overcome this
lack by TROPOS formal method. GAIA and MaSE overcome this lack of transformation of models.
11. Quality Assurance: The ability of a methodology that ensures that the developed software meets
and compiles with defined or standardize quality specifications.
This issue is not dealt with GAIA. This issue is not dealt with TROPOS. This issue is not dealt with
MaSE. All methodologies have lack quality assurance property.
4.1.4 Pragmatics
The pragmatics of a methodology, determine the industrial success of a methodology. Pragmatics
determine that a methodology is applicable in the industry for developing complex and distributed
systems. Moreover, this section determines that is the considered methodology have the ability of project
management and determine that the considered methodology can be adapted within the organization
according to the organizational budget and experience. The pragmatics checking terminologies are given
below in the table.
[54]
[33]
[59]
[60] GAIA V.2
[55]
[56]
[53]
[52]
✓ ✓
✓ ✓ ✓
[57]
[58]
✓
TROPOS MaSE
✓
✓
✓
Pragmatics
Tools Available
Required Expetries
✓ ✓
✓ ✓ ✓
✓ ✓
✓
✓ ✓ ✓ ✓
✓ ✓ ✓
✓ ✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
Modeling
suitability
Domain
Applicability
Scalability
Resources
Language
Suitability
1. Tools available: The ability of a methodology to guide about available tools and tools ready to use.
The GAIA methodology does not provide any automated Tool. TROPOS provides several automated
tools for animation, model checking, and reasoning. The famous one is JACK tool. The MaSE
methodology has agentTool, which represents the behavior of internal components of agents and
protocols. All these methodologies are somehow strong on this property except GAIA.
2. Required expertise: The ability of a methodology, be as simple as possible that users don't require
any background knowledge.
The GAIA required a strong background knowledge of logic and temporal logic. These logics reduce its
accessibility. Since many developers do not know or do not want to get familiar with logic. TROPOS
does not require strong background knowledge. Since, its modeling notations are very simple. Same like
GAIA, the MaSE methodology requires a strong background knowledge of logic and temporal logic.
TROPOS is easy to develop at the first time as compared to MaSE and TROPOS.
3. Modeling Suitability: The ability of a methodology, consisting of a specific architecture.
The GAIA methodology has no specific modeling architecture. So, designers have no need of
architectural information for development. TROPOS has BDI architecture, So designers have to explicitly
describe beliefs, desires, and intentions. MaSE has no specific architecture, So designers have no need of
architectural information for development. Only TROPOS methodology has architecture, and developers
need to search if their system has BDI properties then they use this methodology.
4. Domain Applicability: The ability of a methodology to be suitable for a variety of domains.
GAIA is suitable for dynamic-open (where the agents are not known) and dynamic-close (where the
agents are known) systems. However, this methodology is not suitable for developing applications with
dynamic characteristics such as goals generation. Generally, TROPOS is suitable for developing
componentized systems like e-business applications and BDI based systems. MaSE can be used for
various types of agents and systems. Only TROPOS and MaSE support to dynamic characteristics in
complex system development.
5. Scalability: The ability of a methodology to be adjusted to dealt with various application sizes.
GAIA has a simple structure, that's why it can be fitted in different sizes of applications. TROPOS does
not provide information for subsets and supersets. So, developers have no idea of exact size must be to
avoid complexity. MaSE also does not provide information for subsets and supersets. Thus, developers
have no idea of exact size must be to avoid complexity. GAIA has strong scalability characteristics as
compared to TROPOS and MaSE.
6. Resources: The ability of a methodology to be mature enough that, publish material, tools and
training groups are easy to find.
The GAIA methodology does not provide any automated Tool. However, published papers describe the
implementation of this methodology in detail. The TROPOS's Tools and published material are available.
It fully supports system development from scratch. The MaSE Tools, web site, and various published
studies are available. It fully supports system development from scratch. MaSE and TROPOS are well
built in resources as compared to GAIA.
7. Language Suitability: The ability of a methodology to be coupled with a particular implementation
language or a specific architecture.
As GAIA does not have any specific architecture and language. And it does not refer to the
implementation issues. Thus, the specifications made using GAIA can be implemented in any language.
As TROPOS based on the BDI concept, so its implementation will be biased towards BDI direction.
MaSe does not target to any specific architecture, language, and a specific framework. MaSE and GAIA
are more independent from any language suitability than the TROPOS.
Exploratory Agent Based Modeling (EABM):
Cognitive Agent-Based Computing (CABC) is a unified framework, proposed by Niazi and Hussain in
the article [61] for modeling the complex systems of agents. This framework has four levels for
developing complex systems. Exploratory Agent-Based Modeling (EABM) is the second level of CABC
framework. The EABM guides the researchers to develop a proof of concept model of the developed
system with the goal of performing multiple simulations for improving understanding about a particular
real-world complex system [62].
Breeds:
There are two types of breed.
1. T-Cells of immune system
a) Regulatory T-Cells (T-reg)
b) Effectors T-Cells (T-eff)
c) Active Regulatory T-Cells (A.T-reg)
d) Active Effectory T-Cells (A.T-eff)
e) External environmental virus (virus)
f) Cytokines
2. Brain organs
a. Blood Brain Barrier BBB
b. Brain White Matter (Myelin)
a) T-reg
This agent search for the virus, if virus found, then it changes its state from inactive T-reg to active A.T-
reg.
1. Move randomly
2. Search virus
3. Transform from T-reg to A.T-reg
b) T-eff
This agent search for the virus, if virus found, then it changes its state from inactive T-eff to Active A.T-
eff.
1. Move randomly
2. Search virus
3. Transform from T-eff to A.T-eff
c) A.T-reg
When a virus attacks any inactive regulatory cell or inactive regulatory cell became successful to catch
the virus , then T-reg regulatory cell changes its state from inactive to active A.T-reg and its color turns
from black to blue. When A.T-reg blue agent finds any active Effector A.T-eff in radius, then it kills
effector cell and does these jobs.
1. Move randomly
2. Kills active Effector T-cells
3. Gain energy
4. Duplicate A.T-reg
d) Effector T-Cells
When a virus attacks any Inactive Effector T-Cell T-eff or T-eff cell became successful to catch the virus,
then effector cell changes its state from resting T-eff to active A.-eff and color turns from white to red.
Active effector T-cell perform these tasks;
1. Move randomly
2. Search Myelin
3. Eat myelin
4. Gain energy
5. Duplicate A.T-eff
6. Produce Cytokines
e) Virus
The virus agent search for T-Cells T-reg and T-eff. If the virus finds any T-cell in its radius, then it makes
them active. It performs the following tasks.
1. Move randomly
2. Search T-Cells
3. Make T-Cells active
f) Cytokines
Cytokines search for BBB. If they become successful to find the BBB then they attack BBB and damage
it. After the attack, it died. It performs the following tasks.
1. Move randomly
2. Search BBB
3. Damage BBB
4. Die
2. Brain organs
a) Blood Brain Barrier BBB
BBB is a brain organ that stops all unwanted minerals, molecules, and cells to enter into the brain. If any
cell tries to enter the brain, then it bounces back that cell. If the BBB is damaged, then it repairs BBB. It
performs the following tasks:
1. Stop cells' entrance into the brain
2. Repair damaged BBB
b) Brain White Matter (Myelin)
Myelin covers the axonal part of the neuron cells and maintains communication between two neurons. If
any damaged occur due to effectory cells attack, then it repairs the myelin to maintain communication. It
performs the following tasks:
1. Maintain communication
2. Repair myelin
Global Variables:
Global variables are accessible anywhere in the simulation code and store particular value for agents
during the one continued simulation experiment. There are four preferred global variables.
1. The recoverable brain patches (recoverable)
2. The unrecoverable brain patches (unrecoverable)
3. The total myelin in each brain patch (initmyelin)
4. The total energy of each agent (total)
Besides these variables, there are many other input variables in the user interface which can be adjusted
by the user manually or else by using behavior space.
Procedures:
1. Setup
2. Setup-world
3. Reproduce-Tregs
4. reproduce-effectors
5. grow-myelin
6. eat-myelin
7. go
8. move
9. death
10. count-virus
11. count-Tegg
12. count-effectors
13. bounce
14. display-labels
15. catch-effectors
16. count unrecoverable
17. display label
18. do-ploting
Figure 33: These are various configurable values for the simulation
1. Setup:
First of all setup functions clears all variable, agents and environment of the simulation. This is important
because we need to run multiple simulations on a specific hypothesis. This procedure divides simulation
environment into three types of patches 1) Blood / LYMPHATIC system, 2) Brain axonal area and 3)
Blood Brain Barrier. After creating patches, the next step is to create three types of agents (regulatory,
effectors, viruses).
Create-Tregs:
This function creates regulatory T-cells T-reg according to its input variable and sets its attributes. The
input variable is adjustable from 1 to 2000 numbers. Finally, this procedure adjusts regulatory cells xy-
coordinate in simulation environment.
Create-effectors:
This function creates effectors T-cells T-eff according to its input variable and sets its attributes. The
input variable is adjustable from 1 to 2000 numbers. Finally, this setup procedure adjusts effector cells
xy-coordinate in simulation environment.
Create-viruses:
This function creates an external environmental virus, according to its input variable and sets its
attributes. The input variable is adjustable from 1 to 100 numbers. Finally, setup procedure adjusts virus
cells xy-coordinate on simulation environment.
At the end, setup function calls the display-labels function. The detailed description of each function
follows along with their function.
2. Setup-world:
This function divides 51*51 grid into patches of size 9. 0 to 13 y-coordinate patches are declared as blood
portion and from 13 to 15 y-coordinate are declared as BBB portion. 15 to 35 y-coordinates represent
brains white portion. 35 to 37 again represent BBB and 38 to 50 represent a blood portion of the brain.
Figure 34: model view after pressing the setup button
3. Reproduce-Tregs:
This procedure reproduces regulatory T-cell according to probability. If random float of 100 is less than
reg-reproduce the input variable, then it checks a condition. If the number of turtles on a single patch is
less than the patch density, then it cuts down turtle energy by half and produces another regulatory T-cell.
Otherwise, move forward according to move function.
4. Reproduce-effectors:
This procedure calculates the probability of reproduction of effector T-cells. If an effector successfully
eats myelin and causes axonal damage then, it will be simulated to duplicate. And the duplication is
modeled as a stochastic Bernoulli process. The duplication probability p is calculated for every
duplication process according to the following law:
P = effector-dupl × myelin2
/ init-mye2 × mean-Tregs / Treg-here + mean-Treg
Where myelin indicates the quantity of myelin in the current patch, effector-dupl is a duplication constant
representing the maximum duplication rate of Teff, mean-Treg is a given threshold and Treg-here is the
number of Tregs in a given radius Treg-radius. The term myelin2
/ init-mye2 gives higher probabilities to
duplicate if the patch has higher quantities of myelin, where the term mean-Tregs / Treg-here + mean-
Treg is used to model the down-regulation of Teff duplication rates by Treg actions.
5. Grow-myelin:
Each patch with color gray shows myelin amount. Initially, this procedure sets each patch myelin to 100.
For each time when an active effector eats myelin then, that's patched myelin amount decreased by -5 and
then this procedure again check condition if the myelin amount reaches to zero then, that patch color turns
to black. After each attack, the patch color turns from gray to black. After that, this black patch recovers
myelin according to rec-mye input variable.
6. Eat-myelin:
This procedure sets a condition that if any active A.T-eff is on any patch with color gray and the patch
myelin amount is greater than the eat-myelin input variable then minus -5 from that's patched myelin
amount. If myelin amount reaches zero then turn patch color from gray to red.
7. Go:
First of all, this procedure calculates the total number of unrecoverable brain patches. Unrecoverable
patches are those whose myelin amount reaches to 0 and their color turn from gray to black. After that, it
calculates myelin of each patch and subtract it from the total myelin amount and assign the total myelin
amount to each patch, which amount it has at this simulation time. This procedure also calculates the total
number of recoverable patches. If any patch has some amount of myelin then it can recover from multiple
sclerosis. Recoverable patches are calculated by subtracting unrecoverable patches from the total number
of patches.
I.
II.
III.
Create regulatory: This procedure creates regulatory T-cells according to a specific probability.
The probability to create a regulatory T-Cells is, if random float of 1 is less than 10/365 then
create a regulatory T-Cells according to the slider value.
Create effectors: This procedure calculates specific probability to create an effector T-cells. If
random float of 1 is less than 10/365 then create an effector T-cells according to the slider value.
Create viruses: This procedure also creates external environmental viruses, according to a specific
probability. The probability to create viruses is if random float of 1 is less than 10/365 then create
regulatory T-cells according to the slider value.
After creation agents, this procedure asks effectors call bounce and move function. After that, this
procedure asks active effectors eat myelin and produce 1 cytokine against one myelin attack. It also
instructs inactive effectors that try for activation. If any virus is in radius, then they change their state to
active else move forward and try to catch the virus.
After creation cytokines, this procedure instructs cytokines that if they are at patch with color green they
change the patch color to red. Means if any cytokine collides with the blood brain barrier then barrier
destroy and that patch start countdown. When the countdown reaches 0 then they again became a barrier.
Go function ask regulatory T-cells call to move and bounce function. They also instruct that if regulatory
cells are active then catch effectors and produce one another regulatory cell or else try to catch virus to
make himself active.
At the end, his function asks viruses call move, bounce and death function. And instruct patches call
grow-myelin function.
8. Move:
This procedure decreases turtle's energy at every single step and sets turtle heading random 360. After
that it forces turtle to take the next random step.
9. Death:
This procedure order to each turtle if its energy level is zero, then it must be die at any place in the
simulation environment.
10. Count-virus:
This procedure reports total number of virus for every moment in the running simulation.
11. Count-Teg:
This procedure reports a total number of active regulatory T-cells with the color blue for every moment in
the running simulation.
12. Count-effectors:
This procedure reports the total number of active effector T-cells with the color red for every moment in
the running simulation.
13. Bounce:
This procedure ask all turtles if the next move patch's color is green, then bounce back and set heading
random 360. This green patch is a blood Brain Barrier which blocks turtle's movement.
14. Display-labels:
This procedure asks turtles if the energy level switch is on then, they display their current energy level
during the current simulation experiment.
15. Catch-effectors:
This procedure asks active regulatory T-cell if any active effector T-cell in its radius, then kill him and
breed one regulatory T-cell. If there is no one effector in radius, then try to catch effectors with the color
red.
16. Count unrecoverable
This procedure counts all patches with color black. These black color patches show to damaged brain that
is unrecoverable from multiple sclerosis disease.
17. Display label
This procedure displays the current value of each patch and agent during running a simulation.
Figure 35: model view during simulation
Parameters
Init-Treg-n
Treg-life
Treg-repro
Treg-radius
Init-Teff-n
Teff-life
Teff-repro
Init-virus-n
V-energy
v-radius
Mimicry
Myseed
Simulation 1 Simulation 2 Simulation 3 Simulation 4 Simulation 5 Simulation 6
100
60
25%
3
100
60
25%
100
20
3
1.0
100
50
30
12 %
2
100
60
25%
100
20
3
1.0
100
100
60
25%
3
50
30
12%
100
20
3
1.0
100
100
60
25%
3
100
60
25%
100
20
3
1.0
100
50
30
12
2
100
60
25%
100
20
3
1.0
100
100
60
25%
3
100
60
25%
50
10
2
1.0
100
off
off
100
2
1.5
2
off
off
100
2
1.5
2
Show-enegy off
Disable-Treg off
100
Init-mye
Ate-mye
2
1.5
Rec-mye
Mye-rgrow-
2
time
BBB-coun-
down
Cytokine-
energy
Cytokine-n
Hill1
Hill2
Patch-
density
Table 20: values of all variables during simulation
50
25
50
25
1
2
1
3
1
2
1
3
off
off
100
5
1.5
0
50
25
1
2
1
3
off
off
100
5
1.5
0
50
25
1
2
1
3
off
off
100
2
1.5
2
50
12
1
2
1
1
50
25
1
2
1
3
First simulation:
In this simulation the T-regulatory and T-effectors production and the initial birth ratio are same. In this
case brain, axonal damage and brain recovery time are almost same. Sometimes T-effectors strongly
attack brain axonal, at this time brains immune system gives quick response to damage and regulatory
cells control T-effectors progression.
2nd simulation:
In this simulation, T-effectors cell production. Reproduction and initial number rate are strong. Less T-
regulatory strength shows weak immune system. In which recovery cells and immune cells are weak or
they are in very small amount. In this case, T-effectors strongly attack brain axonal area and cause severe
brain damage. Most of the time this damage is unrecoverable and growing with time.
3rd simulation:
This simulation is adjusted according to the strong immune system. In which T-regulatory cells are more
active than T-effector cells ant they give a quick response to external and internal disease attack. In this
simulation, T-regulatory sells swiftly controls T-effectors activity without any significant brain damage.
4th simulation (slow recovery time)
This simulation shows very slow healing power in patients. This simulation is adjusted as T-regulatory
and T-effector cells production and reproduction ratio are same. When an effector attack on axonal then
this damage goes to severe damage because of very slow recovery time. This type of brain is an easy
target for disease. The brain damage rate increase, alternatively recovery process leads to slow.
5th simulation (weak immune system)
This simulation is adjusted as when an active T-effector attack on axonal it would be a severe damage and
the production and reproduction of regulatory cells is half of the effector cells. This simulation shows a
rapid damage rate and rapid decline in brain recovery time. At the end, most of the brain damage and
became unrecoverable. This sign is a high severity of the disease.
6th simulation ()
This simulation is adjusted as low virus attack on the immune system and the immune system have low
cytokine energy. Cytokines support the immune system by decreasing activity of opposing cells. When T-
effector cells attack axonal then T-effector cells give quick a response to effectors by controlling their
activities. But alternatively, their produced cytokines have low energy. This case leads to increasing
damage rate and decreasing recovery time.
6. Conclusion:
In this study, we developed a simulation model for MS disease by using AOSE methodologies. The
novelty of our work is proposing an idea that, develop biological models with the help of AOSE
methodologies, that provide developer support in the analysis, design, and implementation phase. After
development, we have evaluated AOSE methodologies utilizing a framework that examines the various
facets of a methodology. The proposed framework consists of four phases. The analysis of methodologies
shows that although methodologies are mature, that can be used to develop biological or any other
complex system, however, there are still open issues because methodologies do not provide a solid rule
for agent identification from the requirement document and do not guide the transformation of roles to
agents. In general, some software engineering issues such as quality assurance, cost estimation, and
project management guidelines are not supported by any of the methodology. Besides all these
limitations, AOSE methodologies have shown the potential for the development of the MS disease model.
Moreover, this framework and comparison results can be utilized for selecting a methodology for
developing an agent-based application.
Reference
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
S. Cai, W. Chen, D. Liu, M. Tang, and X. Chen, "Complex network analysis of brain functional
connectivity under a multi-step cognitive task," Physica A, vol. 466, pp. 663–671, 2017.
B. U. Forstmann and E. J. Wagenmakers, "An introduction to model-based cognitive
neuroscience," An Introd. to Model. Cogn. Neurosci., no. August, pp. 1–354, 2015.
R. Cunha, D. Adamatti, and C. Billa, "Agent Oriented Software Engineering: A Comparative
Study between methodologies that support the Development of Multi-Agent Systems," Proc. 7th
Int. Conf. Manag. Comput. Collect. Intell. Digit. Ecosyst., pp. 48–52, 2015.
C. Lucena and I. Nunes, "Contributions to the emergence and consolidation of Agent-oriented
Software Engineering," J. Syst. Softw., vol. 86, no. 4, pp. 890–904, 2013.
V. Kannan, N. A. Kiani, F. Piehl, and J. Tegner, "A minimal unified model of disease trajectories
captures hallmarks of multiple sclerosis," Math. Biosci., vol. 289, pp. 1504–1514, 2017.
J. Komatsu, K. Sakai, M. Nakada, K. Iwasa, and M. Yamada, "A long spinal cord lesion in a
patient with biopsy proven multiple sclerosis," Neuropathology, vol. 32, no. 3, p. 338, 2012.
S. Afraei et al., "Therapeutic effects of D-aspartate in a mouse model of multiple sclerosis," J.
Food Drug Anal., vol. 25, no. 3, pp. 699–708, 2017.
T. Zrzavy, S. Hametner, I. Wimmer, O. Butovsky, H. L. Weiner, and H. Lassmann, "Loss of
'homeostatic' microglia and patterns of their activation in active multiple sclerosis," Brain, vol.
140, no. 7, pp. 1900–1913, 2017.
D. J. Arpin, E. Heinrichs-Graham, J. E. Gehringer, R. Zabad, T. W. Wilson, and M. J. Kurz,
"Altered sensorimotor cortical oscillations in individuals with multiple sclerosis suggests a faulty
internal model," Hum. Brain Mapp., vol. 38, no. 8, pp. 4009–4018, 2017.
[10] F. Halabchi, Z. Alizadeh, M. A. Sahraian, and M. Abolhasani, "Exercise prescription for patients
with multiple sclerosis; potential benefits and practical recommendations," BMC Neurol., vol. 17,
pp. 1–11, 2017.
[11] P. Sowa, G. O. Nygaard, A. Bjørnerud, E. G. Celius, H. F. Harbo, and M. K. Beyer, "Magnetic
resonance imaging perfusion is associated with disease severity and activity in multiple sclerosis,"
Neuroradiology, vol. 59, no. 7, pp. 655–664, 2017.
[12] M. Pennisi, G. Russo, S. Motta, and F. Pappalardo, "Agent based modeling of the effects of
potential treatments over the blood-brain barrier in multiple sclerosis," J. Immunol. Methods, vol.
427, pp. 6–12, 2015.
[13] Y. Mansury and T. S. Deisboeck, "The impact of '" search precision "' in an agent-based tumor
model," J. Theoratical bBology, vol. 224, pp. 325–337, 2003.
[14] C. A. Athale and T. S. D. Ã, "The effects of EGF-receptor density on multiscale tumor growth
patterns," J. Theoratical Biol., vol. 238, pp. 771–779, 2006.
[15] Y. Mansury and T. S. Deisboeck, "Simulating the time series of a selected gene expression profile
in an agent-based tumor model," Phys. D, vol. 196, pp. 193–204, 2004.
[16] Y. Mansury and T. S. Deisboeck, "Simulating ' structure – function ' patterns of malignant brain
tumors," Physica A, vol. 331, pp. 219–232, 2004.
[17] L. Zhang, C. A. Athale, and T. S. Deisboeck, "Development of a three-dimensional multiscale
agent-based tumor model : Simulating gene-protein interaction profiles , cell phenotypes and
multicellular patterns in brain cancer," J. Theoratical Biol., vol. 244, pp. 96–107, 2007.
[18] L. Zhang, L. L. Chen, and T. S. Deisboeck, "Multi-scale, multi-resolution brain cancer modeling,"
Math. Comput. Simul., vol. 79, pp. 2021–2035, 2009.
[19] L. Germond, M. Dojat, C. Taylor, and C. Garbay, "A cooperative framework for segmentation of
MRI brain scans," Artif. Intell. Med., vol. 20, no. 1, pp. 77–93, 2000.
[20] N. Richard, M. Dojat, and C. Garbay, "Automated segmentation of human brain MR images using
a multi-agent approach," Artif. Intell. Med., vol. 30, pp. 153–175, 2004.
[21] F. G. Vital-lopez, A. Armaou, and M. Hutnik, "Modeling the Effect of Chemotaxis on
Glioblastoma Tumor Progression," Am. Inst. Chem. Eng., vol. 57, no. 3, 2011.
[22] R. Soc, "Introduction . Modelling natural action selection," R. Soc., no. April, pp. 1521–1529,
2007.
[23] L. C. Signaling, M. Bias, and E. Rate, "Simulating Brain Tumor Heterogeneity with a Multiscale
Agent-Based Model :Linking molecular signatures, phenotypes and expansion rate," Math.
Comput. Model., vol. 49, no. 1–2, pp. 307–319, 2009.
[24] H. González-Vélez et al., "HealthAgents: Distributed multi-agent brain tumor diagnosis and
prognosis," Appl. Intell., vol. 30, no. 3, pp. 191–202, 2009.
[25] L. Zhang, Z. Wang, J. A. Sagotsky, and T. S. Deisboeck, "Multiscale agent-based cancer
modeling," J. Math. Biol., vol. 58, no. 4–5, pp. 545–559, 2009.
[26] L. Zhang et al., "Developing a multiscale , multi-resolution agent- based brain tumor model by
graphics processing units," Theor. Biol. Med. Model., vol. 8, no. 1, p. 46, 2011.
[27] R. Haroun, F. Boumghar, S. Hassas, L. Hamami, and C. B. University-lyon, "A Massive Multi- A
gent System for Brain MRI Segmentation," Massively Multi-Agent Syst., vol. 3446, pp. 174–186,
2005.
[28] V. Koutkias and M. C. Jaulent, "A Multiagent System for Integrated Detection of
Pharmacovigilance Signals," J. Med. Syst., vol. 40, no. 2, p. 37, 2016.
[29] L. Leistritz, K. Schiecke, L. Astolfi, and H. Witte, "Time-Variant Modelling of Brain Processes,"
Proc. IEEE, vol. 104, no. 2, pp. 262–281, 2016.
[30] H. Barrah, "MAS based on a Fast and Robust FCM Algorithm for MR Brain Image
Segmentation," vol. 7, no. 7, pp. 191–196, 2016.
[31] M. Pennisi, A.-M. Rajput, L. Toldo, and F. Pappalardo, "Agent based modeling of Treg-Teff cross
regulation in relapsing-remitting multiple sclerosis," BMC Bioinformatics, vol. 14, no. Suppl 16, p.
S9, 2013.
[32] M. Wooldridge, N. R. Jennings, and D. Kinny, "The Gaia Methodology for AgentOriented
Analysis and Design. Autonomous Agents and Multi-Agent Systems 3(3): 285–312," pp. 285–
312, 2000.
[33] Y. C. H. H. C. Jia, "A COMPARISON OF THREE AGENT-ORIENTED SOFTWARE
DEVELOPMENT METHODOLOGIES : MASE , GAIA , AND TROPOS Yubo Jia , Chengwei
Huang , Hao Cai School of Information and Electronics , Zhejiang Sci-Tech University ,
Hangzhou Zhejiang 310018 , China , software_wei@1," pp. 106–109, 2009.
[34] F. Zambonelli, N. R. Jennings, and M. Wooldridge, "Developing Multiagent Systems: The Gaia
Methodology," ACM Trans. Softw. Eng. Methodol., vol. 12, no. 3, pp. 317–370, 2003.
[35] D. C. Silva, R. A. M. Braga, L. P. Reis, and E. Oliveira, "Designing a meta-model for a generic
robotic agent system using Gaia methodology," Inf. Sci. (Ny)., vol. 195, pp. 190–210, 2012.
[36] D. C. Silva, R. A. M. Braga, L. P. Reis, and E. Oliveira, "A generic model for a robotic agent
system using GAIA methodology: Two distinct implementations," 2010 IEEE Conf. Robot.
Autom. Mechatronics, RAM 2010, pp. 280–285, 2010.
[37] L. S. Passos, R. J. F. Rossetti, and J. Gabriel, "An Agent Methodology for Processes, the
Environment, and Services," Adv. Artif. Transp. Syst. Simul., pp. 37–53, 2014.
[38] A. Castro and E. Oliveira, "The rationale behind the development of an airline operations control
centre using Gaia-based methodology," Int. J. Agent-Oriented Softw. Eng., vol. 2, no. 3, p. 350,
2008.
J. Vilela, R. Ramos, and J. Castro, "Mastem: A mathematics tutoring multi-agent system," CEUR
Workshop Proc., vol. 1005, 2013.
J. Castro, M. Kolp, and J. Mylopoulos, "Towards requirements-driven information systems
engineering: The Tropos project," Inf. Syst., vol. 27, no. 6, pp. 365–389, 2002.
[39]
[40]
[41] P. Giorgini, J. Mylopoulos, and R. Sebastiani, "Goal-oriented requirements analysis and reasoning
in the Tropos methodology," Eng. Appl. Artif. Intell., vol. 18, no. 2, pp. 159–171, 2005.
[42] E. S. K. Yu, "Towards modelling and reasoning support for early-phase\nrequirements
engineering," Proc. ISRE '97 3rd IEEE Int. Symp. Requir. Eng., pp. 226–235, 1997.
[43] P. Bresciani and A. Perini, "Tropos : An Agent-Oriented Software Development Methodology,"
pp. 203–236, 2004.
[44] S. A. DeLoach, L. Padgham, A. Perini, A. Susi, and J. Thangarajah, "Using three AOSE toolkits to
develop a sample design," Int. J. Agent-Oriented Softw. Eng., vol. 3, no. 4, pp. 416–476, 2009.
[45] H. K. Dam and M. Winikoff, "Towards a next-generation AOSE methodology," Sci. Comput.
Program., vol. 78, no. 6, pp. 684–694, 2013.
[46] D. Bertolini, A. Perini, A. Susi, and H. Mouratidis, "The Tropos visual modeling language. A
MOF 1.4 compliant meta-model.," Second Agentlink Iii Tech. Forum, no. January, 2005.
[47] S. A. Deloach, "Multiagent Systems Engineering: A Methodology and Language for Designing
Agent Systems," Aois'99, 1999.
[48] S. A. Deloach, E. T. Matson, and Y. Li, "EXPLOITING AGENT ORIENTED SOFTWARE
ENGINEERING IN COOPERATIVE ROBOTICS SEARCH AND RESCUE," Syst. Eng., vol. 17,
no. 5, pp. 1–19, 2003.
[49] S. DeLoach, "Analysis and Design using MaSE and agentTool," Proc. 12 Midwest Artif. Intell.
Cogn. Sci. Conf. (MAICS 2001), Miami Univ. Oxford, Ohio, no. Maics, pp. 1–7, 2001.
[50] DELOACH et al., "MULTIAGENT SYSTEM ENGINEERING," Int. J. Softw. Eng. Knowl. Eng.,
vol. 11, no. 3, pp. 231–258, 2001.
[51] A. K. Pandey and R. Pandey, "Role of Multi Agent System Methodology in," 2015 2nd Int. Conf.
Comput. Sustain. Glob. Dev., pp. 438–441, 2015.
[52] T. Sanislav, D. Cǎpǎţnǎ, A. Stoian, and I. Stoian, "Multiagent approach for cancer automated
registration," Control Eng. Appl. Informatics, vol. 12, no. 3, pp. 41–46, 2010.
[53] C. Lin, K. M. Kavi, F. T. Sheldon, K. M. Daley, and R. K. Abercrombie, "A Methodology to
Evaluate Agent Oriented Software Engineering Techniques University of North Texas," pp. 1–10,
2007.
[54] T. Abdelaziz, M. Elammari, and R. Unland, "A framework for the evaluation of agent-oriented
methodologies," Innov. 4th Int. Conf. Innov. Inf. Technol. IIT, pp. 491–495, 2008.
[55] G. Grau, C. Cares, and X. Franch, "A Comparative Analysis of i*Agent-Oriented Modelling
Techniques," 18th Int. Conf. Softw. Eng. Knowl. Eng., pp. 657–663, 2006.
[56] E. Yu and L. M. Cysneiros, "Agent-Oriented Methodologies - Towards a Challenge Exemplar,"
pp. 1–13, 2002.
[57] L. Cernuzzi, G. Rossi, and L. Plata, "On the evaluation of agent oriented modeling methods,"
Proc. Agent Oriented Methodol. Work., pp. 21–30, 2002.
[58] M. Cossentino, N. Gaud, V. Hilaire, S. Galland, and A. Koukam, "ASPECS: An agent-oriented
software process for engineering complex systems," Auton. Agent. Multi. Agent. Syst., vol. 20, no.
2, pp. 260–304, 2010.
[59] E. Garcia, S. Miles, M. Luck, and A. Giret, "Evaluating how agent methodologies support the
specification of the normative environment through the development process," Auton. Agent.
Multi. Agent. Syst., vol. 29, no. 6, pp. 1041–1060, 2015.
[60] F. Bergenti, Federico and Gleizes, Marie-Pierre and Zambonelli, METHODOLOGIES AND
SOFTWARE ENGINEERING FOR AGENT SYSTEMS. 2009.
[61] M. A. Niazi, "Towards A Novel Unified Framework for Developing Formal, Network and
Validated Agent-Based Simulation Models of Complex Adaptive Systems," 2017.
[62] M. A. Niazi, "Emergence of a snake-like structure in mobile distributed agents: An exploratory
agent-based modeling approach," Sci. World J., vol. 2014, 2014.
|
1008.4115 | 1 | 1008 | 2010-08-24T19:24:24 | Noise in Naming Games, partial synchronization and community detection in social networks | [
"cs.MA",
"cs.SI"
] | The Naming Games (NG) are agent-based models for agreement dynamics, peer pressure and herding in social networks, and protocol selection in autonomous ad-hoc sensor networks. By introducing a small noise term to the NG, the resulting Markov Chain model called Noisy Naming Games (NNG) are ergodic, in which all partial consensus states are recurrent. By using Gibbs-Markov equivalence we show how to get the NNG's stationary distribution in terms of the local specification of a related Markov Random Field (MRF). By ordering the partially-synchronized states according to their Gibbs energy, taken here to be a good measure of social tension, this method offers an enhanced method for community-detection in social interaction data. We show how the lowest Gibbs energy multi-name states separate and display the hidden community structures within a social network. | cs.MA | cs |
Noise in Naming Games, partial synchronization and community detection in social
networks
Weituo Zhang1 and Chjan C. Lim1
1Mathematical Sciences, RPI, 110 8th St., Troy, NY, 12180
The Naming Games (NG) are agent-based models for agreement dynamics, peer pressure and
herding in social networks, and protocol selection in autonomous ad-hoc sensor networks. By intro-
ducing a small noise term to the NG, the resulting Markov Chain model called Noisy Naming Games
(NNG) are ergodic, in which all partial consensus states are recurrent. By using Gibbs-Markov equiv-
alence we show how to get the NNG's stationary distribution in terms of the local specification of
a related Markov Random Field (MRF). By ordering the partially-synchronized states according to
their Gibbs energy, taken here to be a good measure of social tension, this method offers an enhanced
method for community-detection in social interaction data. We show how the lowest Gibbs energy
multi-name states separate and display the hidden community structures within a social network.
PACS numbers: 89.65.Ef, 05.65.+b, 02.50.Ga
Keywords: Naming Game , Social network , Noise in Markov Chain
I.
INTRODUCTION
The possibility of using the Naming Game (NG)[5, 11],
a family of agent-based models, for modeling agreement
dynamics, leader election and the effects of peer pres-
sure in social networks [4, 6, 9], protocol and security
key selection in encrypted communication in autonomous
sensor networks[10], vocabulary selection in linguistics
[19, 22] and the role of herding in market crashes in finan-
cial networks have recently attracted great interest in the
scientific community. Formation of opinions and agree-
ment dynamics in complex financial and social networks
are relevant examples of collective / cooperative behav-
iors that are driven by the individual's innate propensity
to imitate and hence herd in the absence of reliable infor-
mation or when there is information asymmetry. Finite-
size effects and the underlying network's topology such
as scale-free [2] and small world [3], have significant im-
pact on the expected time to consensus (single-name or
total-synchrony state) and other related critical expo-
nents.
Indeed simulations showed departure from the
values obtained by classical scaling arguments based on
the emergence of the giant cluster in percolation theory
[1, 20, 21] and on the dynamical theory of coarsening in
high-q Pott's models [13, 14, 17, 23, 24], highlighting the
need for more simulation studies and also Markov Chain
analysis [7].
A recent application of the Naming Games is to find
hidden communities in social networks [16, 17], [31]. The
main objectives of this paper are to sharpen the commu-
nity detection capability of the original Naming Games
by the explicit and purposeful addition of rare noise
events, and to analyze rigorously the consequences of
adding this noise. Community structure is extremely
difficult to define and uncover and remains one of the
outstanding open problems in network science. Amongst
existing methods, the most powerful algorithms are based
on the notion of modularity [32] which provides an order-
ing of the closeness between the given network's commu-
nity structure and a large family of motifs or partitions.
The optimization problem involved in finding the motif
with the largest modularity grows rapidly with the size
of the network. While several working heuristic methods
have been proposed, they are not better than a spectral
method based on the eigenvectors of a Laplacian-like ma-
trix [32]. This procedure of splitting the network into two
parts is repeated in a binary tree way until the subgraphs
are indivisible.
In particular, direct simulated-annealing of the modu-
larity optimization problem will be computationally ex-
pensive, just as other Monte-Carlo methods applied to
the original Naming Games have yielded good results
only after costly long simulations [18].
In this article
we indicate how Monte-Carlo methods and other impor-
tance sampling algorithms can be numerically efficient on
the Noisy Naming Games but not on the original Naming
Games. Comparing the Noisy Naming Game method to
the modularity optimization procedure, it is worthwhile
noting that these two methods start from opposite ends
of the community structure: the modularity - binary tree
method finds first, the optimal division of the whole net-
work into two parts but the Noisy Naming Games, begin-
ning from random initial sublists of the allowed words,
first finds the (last) optimal division into small communi-
ties. The modularity increases as the binary tree method
proceeds towards the indivisible units but the Gibbs po-
tential decreases as the Noisy Naming Game proceeds
towards the low-lying states near to its ground state of
total consensus. In this way, the Noisy Naming Games
are complementary to the modularity based spectral bi-
nary tree method. If one is looking for the finer divisions
of the network into small communities then the Noisy
Naming Games will find them provably faster than other
methods including the modularity-based methods.
But before the Naming Games can provide an applica-
ble procedure for community detection, three problems
need to be addressed. The first is the transient nature of
its multi-name partial consensus states that correspond
to possible community structures. The second concerns
the existence and computability of a stationary measure
that can be used -- like the notion of modularity -- to rank
the community test-patterns in the form of multi-name
partial consensus states. The third issue concerns the
computational efficiency of the Naming Games viewed
herein as an inverse method for finding communities in
networks. It turns out that these problems can be over-
come by adding rare noise events to the standard stochas-
tic framework provided by the Markov chain model of
the original Naming games. Unlike the original Naming
Games which have been compared to q-Potts models [24],
the Noisy version introduced here is more closely related
to spin-glass models with an additional layer of random-
ness [35]. As is well-known certain aspects of informa-
tion processing and combinatorial optimization (such as
the graph-partitioning problem that is closely related to
community detection) can be addressed from the vantage
point of the spin-glass framework.
In many instances,
the ground-state of the spin-glass model provides infor-
mation for the optimization problem. But computing or
finding the ground-state is often an NP-hard problem,
of an equivalent degree of difficulty as the optimization
problem itself. The spin-glass framework offers the alter-
native path -- often seen to work well in explicit posi-
tive usage of noise to solve hard deterministic problems
-- of exploiting not only the inherent spin entropy of the
model (when the interactions are quenched) but also the
additional randomness and corresponding entropy arising
from the ensemble of quenched interactions for which the
replica method [35] is designed to average over. We ex-
ploit these relationships in discussing each of these three
issues in formulating an efficient procedure based on the
Noisy Naming Games for finding community structures.
First, because the total consensus states of the orig-
inal Naming Games are the only absorbing states, the
detection of communities or partial consensus states is
complicated by their transient nature. Meta-stable states
representing multi-names or partial consensus configura-
tions arise in the original Naming Games on networks
with strong community-structure but have been shown
numerically to evolve into other partial-synchrony states
after an initial phase [16, 17], according to a time hierar-
chy in general. Complete agreement on leader selection
or total consensus occurs on time-scales that are rela-
tively short after a long meta-stable stage, with negative
consequences on the design of algorithms for detection
of hidden communities, for example, in social networks
with Small World topologies [29], [31]. Related results
on the synchronization of dynamical networks and dis-
crete time maps on networks that highlight the roles of
the network topology and the coupling weights have been
discovered [26], [30]. In other significant contexts such as
the modeling of brain functions by coupled oscillators on
a network, the transient nature of partially synchronous
states play significant positive roles.
The first issue that has to be solved is to find a version
of the Naming Games where all partial consensus states
are recurrent. This can be done if we come up with a ver-
2
sion of the Naming Games which is an ergodic Markov
chain. A nice property of ergodic Markov chains is the
existence and uniqueness of an invariant measure with
positive weights on all the recurrent states. Then the
next issue in designing an efficient procedure for commu-
nity detection starting from the original Naming Games
is finding a closed-form expression for this invariant mea-
sure and proving that given the network topology (such
as neighborhood structure) and a reasonably small set of
allowed words in the original game, this invariant mea-
sure ranks the partial consensus states in an averaged
sense (macrostates) incorporating all entropic contribu-
tions in the Noisy Naming Games. One key property of
this invariant measure is the free energy gaps between
the low-lying states near the ground-state -- larger gaps
lead to better resolution of the community structure. We
show by exact calculations on small cliques that the in-
variant measure of the Noisy Naming Game inherits this
property from its closed-form Gibbs potential. Although
the large-scale implementation of the Monte-Carlo sim-
ulation of the Noisy Naming Game on a real world so-
cial network remains to be done, our small-scale testing
of this method on computer-generated randomized net-
works of about 60 nodes allow us to infer that the method
is computationally efficient. In the context herein, rig-
orous results stating new conditions for the existence
and rank-ordering of recurrent multi-names or partial-
consensus states in the Naming Games are useful in view
of potential applications to detecting hidden communi-
ties in interaction data such as Twitter and Facebook.
In this article, we show that a class of arbitrarily small
noisy perturbations of the Naming Games, called Noisy
Naming Games (NNG), satisfies these conditions. The
main results here are analytical ones: First, the Noisy
Naming Games differing from the NG by arbitrarily small
stochastic perturbation, has a unique invariant distribu-
tion with positive weights for partial consensus states.
Second, we construct the NNG's invariant distribution as
the Gibbs potential of a related Markov Random Field
(NNGGS) called the Noisy Naming Game with saturated
training from its local specification. Third, we show the
Gibbs energy (which is taken to be a reasonably efficient
measure of social tension in this article) provides an or-
dering of the recurrent multi-name or partial-consensus
states of the NNG whereby the lowest energy and thus
most probable ones, also have single-name or single-color
cliques. This last result has significant impact on the de-
tection of (hidden) community structure in a social net-
work by Monte-Carlo simulations. After the initial equili-
bration process, the fraction of time spent by the Monte-
Carlo simulator in any given partial-consensus state is
proportional to the probability it is assigned by the Gibbs
invariant measure. Thus, besides identifying the low-
lying Gibbs energy states which are the most indicative of
underlying community structure - near-cliques or tightly
connected clusters have a common single-name or color --
the simulation when run long enough will also provide an
ordering of these states. We will show with explicit calcu-
lations on simple examples, that the exact Gibbs energy
of the multi-name states not only orders them but have
the essential property of significant energy gaps between
the low-lying states.
In brief, the introduction of additional randomness
in the form of rare noisy events to the original Nam-
ing Games provides the key to successfully enhancing
community-detection through the existence and rank-
ordering of a large family of stable partial-consensus
states where tightly-connected clusters in the network
show up as single-named or single-colored subgraphs
in the social network. Moreover, these partial consen-
sus states can be found and ranked by simulating the
Noisy Naming Games using an equivalent Gibbs sampler
method which was used to produce the figures in the
last section. In contrast to the generic need to avoid or
prevent noise in most technological systems, the precise
and explicit use of noise to achieve a positive aim in this
project has few precedents. Significant examples are the
classical Parrondo games and the Brownian Ratchet [25].
II. MARKOV CHAIN MODEL
We construct a Markov chain model for the NG [5]
where a transition consists of the change of local state
at only one site in the network and the set Name of all
allowed words is fixed at the outset. It is easier to an-
alyze by the Gibbs Sampler method than the usual NG
to which it is equivalent. Consider a network based on a
connected graph containing N sites S = {si}. The neigh-
borhood structure of the network is given by {Nsi}si∈S.
Each site si will have a word list chosen from the finite
set N ame = {A, B, C...}. Set Γ = {γk}, which consists
of all non-empty subsets γk of N ame, represents all pos-
sible "word lists" of a site. The configuration function
X(si) : S → Γ mapping each site to its word list gives
the local state of si. A configuration restricted to a subset
of sites Σ ⊂ S is denoted by X(Σ). Therefore the net-
work state G- a word list assigned to each site- is given
by the configuration G = {X(si)}si∈S = X(S). In the
Naming Game (NG), we change the state of the network
G as follows:
1. In this step we randomly choose a site si ∈ S as a
"listener", with probability q(si).
2. Next, choose a site sj ∈ Nsi with equal probabil-
ity as a "speaker". The "speaker" will randomly
choose a word W from its word list with equal prob-
ability and send it to the "listener". The latter will
change its state X(si) into X ′(si) by the following
way:
X ′(si) =(X(si) ∪ {W } W /∈ X(si)
W ∈ X(si)
{W }
We call step (2) the local transition step and the pro-
cess (1),(2) together comprises a transition between G =
3
{X(si), X(sj)}sj ∈S\{si} and its neighboring state G′ =
{X ′(si), X(sj)}sj ∈S\{si}. The global transition proba-
bility P (G, G′) of the NG depends on the probability
for choosing si and the local transition probability from
state X0(si) to X ′(si) under neighborhood configuration
X0(Nsi ) is P (G, G′) = q(si)P (X0(si), X ′(si)X0(Nsi )).
By randomly choosing an initial state G0 ∈ ΓS and
applying steps (1) and (2) in each time period, we ob-
tain a homogeneous Markov chain of the Naming Game
{G0, G1...Gn...}, where the transition matrix from Gn to
Gn+1 is given by the formula above.
Next, we show that any invariant measure of this
Markov chain is a linear combination of 1GW where 1
is the indicator function and GW are the "single-name
states" in which every site has only W in its word list.
Let Gγk for γk ∈ Γ be the set of network states that sat-
isfies the conditionSsi∈S X(si) = γk. It is clear from the
NG Markov chain above that single-name states are the
only absorbing ones.
To proceed, every network state G ∈ Gγk with γk ≥ 2 is
accessible to at least one absorbing state GW , i.e. it will
have a path {G, G1, G2...Gn, GW } with nonzero probabil-
ity p = (G, G1)P (G1, G2)...P (Gn, GW ). Since this prob-
ability p should be counted in the probability of leaving
the state G and never returning to it, any state G which
is not absorbing is transient.
In an invariant measure
of a Markov chain, the weight of any transient state is
zero; thus, the only states with positive weights in an in-
variant measure of the NG Markov chain are the single-
name states GW (W ∈ N ame). Since 1GW itself is al-
ways an invariant measure, any invariant measure of the
Naming Game is a linear combination of 1GW over all
W ∈ N ame. In other words, the Naming Game Markov
Chain, starting from any initial state will eventually go
to a single-name state.
III. NOISY NAMING GAMES (NNG)
In view of the above Markov chain analysis, we need
to perturb the original Naming Game to enhance its
community-detection capabilities. It turns out that the
class Noisy Naming Game (NNG) of arbitrarily small
random perturbations of NG, given next, has the required
key property of persistent multi-name steady states. In
each step in the NNG Markov chain, the listener has a
very small probability ǫ to receive a noise word rather
than the speaker's message where the noise word is a
random word chosen uniformly from N ame, and a prob-
ability of 1 − ǫ of proceeding as in the original NG. Then
given two arbitrary network states, one can construct a
path from one to the other with nonzero probability by
forcing the network to receive a sequence of noise words
as required. In this way, the NNG Markov chain is forced
to be communicative and therefore ergodic, by arbitrarily
small ǫ. On the other hand, since ǫ is arbitrarily small,
the event of receiving a noise word rarely happens. So the
noise will essentially change the long term behavior but
can be ignored in finite time. From the NNG Markov
chain's ergodicity, its invariant measure is positive and
unique up to a scalar multiple; hence the first main re-
sult:
Result : The NNG has a unique invariant probabil-
ity distribution π(G) > 0 directly related to its global
transition probability P (G, G′). Moreover, each multi-
name state Gm is recurrent and has positive weight, i.e.,
π(Gm) > 0.
transition step (2)
In both the original NG and the NNG, the lo-
is given by X0(si) →
cal
X ′(si) with corresponding local transition probability
P (X0(si), X ′(si)X0(Nsi ))1X(Nsi )=X0(Nsi ). By repeat-
ing the NNG's local transition step (2) many times
at fixed site si ∈ S with the same neighborhood
state X0(Nsi ), we generate a sequence of local states
{X0(si), X ′(si), ..., X (n)(si)},
such that the marginal
probability distribution of X (n)(si) converges to a l ocal
conditional probability distribution fi(XX0(N (si)) as n
goes to infinity. Thus, fi(XX0(N (si)) over all si ∈ S
is a well-defined limiting distribution of a local Markov
chain with one site and fixed neighborhood state.
To calculate the NNG's invariant distribution, we first
construct a related Markov chain (NNGGS) verified to be
a Gibbs Sampler for a Markov Random Field [7]. Keep-
ing step (1) the same, the NNGGS replaces the local
transition step (2) in the NNG by a "training step":
(2') X0(si) → X ∗(si) which is the value of a random
variable distributed according to the local conditional dis-
tribution fi(X ∗X0(N (si)).
The local training step (2') is thus equivalent to repeat-
ing the NGG's local transition step (2) infinite number
of times at fixed site with the same neighborhood state.
Its global transition probability is given by
′
P
(G, G′) = q(si)fi(X
′
(si)X0(N (si))1X(Nsi )=X0(Nsi )
Since only the local state at a single random site is
changed according to a local specification, the NNGGS
is indeed a Gibbs Sampler on a Markov Random Field
(MRF) with local specification given by the family
fi(XX(N (si)) for si ∈ S [7]. Here, the NNGGS is more
an indirect analytical method to derive the stationary
distribution of the NNG in closed form than a method
for numerical simulation of the NNG, for which there are
better Markov chain Monte-Carlo methods [15].
IV.
STATIONARY DISTRIBUTION OF THE
GIBBS SAMPLER
Using the Gibbs-Markov equivalence [7], we construct
in terms of the NNGGS's local specification, a Gibbs po-
tential which is the stationary distribution π
(G) of the
(G, G′), the NNGGS
NNGGS. In other words, under P
generates a Markov chain of realized states and a distri-
bution, that converge to π
(G). First, we need to assign a
0 local state for each site. Then 0(E) for E ⊂ S denotes
′
′
′
4
the 0 configuration state where all sites in E are at the 0
local state. The choice of the 0 local state is not unique --
for convenience we choose the whole word-list γ = N ame
as the 0 local state. For a clique L ⊂ S of the network
graph, let x(L) be a certain configuration on L. Then
the clique potential of this configuration is[12]:
V (x(L)) = − XE⊂L
(−1)L−E ln[F (x(E)0(N (E)))].
Here the summation is over al, subsets of the clique L, the
neighborhood of a subset E = {sii = 1, ..., M } is defined
given by:
by N (E) = Ssi⊂E N (si) \E and F (x(E)0(N (E))) is
Yi=1
fi(x(si)X(s1, ..., si−1), 0(si+1, ..., sM ), 0(N (E)))
fi(0(si)X(s1, ..., si−1), 0(si+1, ..., sM ), 0(N (E)))
M
Then the Gibbs potential is given by the sum (over all
cliques in the network graph) of clique potentials:
H(x) = XL⊂S
V (x(L)).
The stationary distribution of the NNGGS is thus:
′
π
(x) = Z −1 exp(−H(x)).
where Z = PG exp(−H(G))) is the Gibbs partition
function[7]. It remains to show that π
the NNG, that is, π
is invariant under
= π.
′
′
V.
INVARIANT DISTRIBUTION OF THE NNG
′
By the existence and uniqueness of the invariant dis-
tribution of the NNG, any distribution that is invariant
under the NNG must be equal to π(G). Here, we ver-
ify that the Gibbs distribution π
(G) of the NNGGS
is invariant under the NNG, thence the explicit con-
struction of π(G) as the second main result. We will
do this by showing and using detailed balance sev-
eral times. Consider a chosen network state G0 =
{X0(s1), ..., X0(si), ...X0(sN )} and any neighboring net-
work state Gik = {X(s1), ..., X(si), ...X(sN )} where all
but site si have the same local states as G0 and the dif-
fering local state is the word list γk ∈ Γ. By detailed
balance of the NNGGS:
π′(G0)q(si)fi(γkX0(N (si))) = π′(Gik)q(si)fi(X0(si)X0(N (si))).
In terms of the global transition probability P (G, G′) of
the NNG, the change of measure under a single step of
the NNG ∆π′(G0) is
[P (Gik, G0)π′(Gik) − P (G0, Gik)π′(G0)]
Xi Xk
= Xi
−P (X0(si), γkX0(N (si)))π′(Gik)i
q(si)Xk hP (γk, X0(si)X0(N (si)))π′(G0)
where the internal sum is taken over all word lists γk ∈ Γ.
Each term of the internal sum is zero by the NNG's local
detailed balance at fixed site si because P (·, ·X0(N (si)))
is the local transition probability of the NNG condi-
tioned on fixed neighborhood state X0(N (si)), and the
quotient π′(Gik)/π′(G0) has been shown to equal the
quotient fi(γkX0(N (si)))/fi(X0(si)X0(N (si))) where
fi(·X0(N (si))) are the values of the local specification
at site si of the NNGGS. In other words, the NNGGS'
local specification, by construction (repeating the local
transition step (2) in the NNG at fixed site si, under
the same neighborhood state X0(N (si))), is the station-
ary distribution of an auxillary Markov chain consisting
of varying local states at the single site si and a fixed
boundary state at the sites in N (si). We deduce that
∆π′(G0) = 0, i.e. the Gibbs distribution π
(G) of the
NNGGS is also the invariant distribution of the NNG.
′
VI. CLIQUE POTENTIALS AND
COMMUNITY STRUCTURE - ANALYSIS
The first example concerns a 2-clique as in figure 1.
With the local 0 state chosen to be N ame = {A, B}, and
applying the above expression for F (x(E)0(N (E))) in
terms of the local specification which are in turn calcu-
lated using the stationary distribution of the correspond-
ing local Markov chains (each with one site), we derived,
in the vanishing noise limit, the probabilities tabulated
below. This table gives a 2-clique potential for all pos-
sible configurations with its neighborhood fixed at the
local 0 state, after using the natural symmetry in the
problem. It shows this 2-clique has lowest energy when
the two sites has the same single name.
AB
AB
A
A
FIG. 1: 2-Clique
AB
AB
x(L)
A-AB
A-A
A-B
F (x(L)0(N (L)))
1
2
0.5
V (x(L))
0
-0.6931
0.6931
A more interesting example in the following graph has
two 3-cliques and a 2-clique that bridges them. Using the
above procedure (and labeling the sites starting from the
site on the bridge, e.g. B-A-AB means the site on the
bridge has word list B), we calculate the clique potential
for the 3-clique and tabulate its values below.
5
A
A
B
B
A
B
FIG. 2: Example 2
TABLE I: Clique Potential for 3-Clique
x(L)
A-A-A
AB-A-A
B-A-A
F (x(L)0(N (L)))
15
3
3/5
V (x(L))
-2.7080
-1.0986
-0.5108
In this way, we calculate the Gibbs potential for each
network state and show that multi-name states are or-
dered by their Gibbs energy which we take to be a good
measure of social tension in a particular state. After the
single-name ground state, the state in figure 2 has the sec-
ond lowest energy. Significantly, as the third main result
and primary focus of this letter, the naming or coloring
that reveals the underlying cliques in the graph also has
the least energy amongst all multi-name states for given
community (clique) structure in a network. Moreover, it
is a local minimum, i.e. any one-step change of this con-
figuration will increase its energy: H(AAA − BBB) =
−4.7230 and H(AAA − ABB) = −2.8904. These lowest
energy multi-name states are therefore the most likely
ones to be found by simulated annealing of the NNG.
This is consistent with the results on meta-stable states
in [18], but have the advantage, in the NNG, of being
persistent (recurrent), thence, enhancing its community-
detection capability over the original NG.
VII. STATIONARY PROBABILITY
DISTRIBUTIONS OF THE NNG ON SMALL
RANDOMIZED NETWORKS - SIMULATIONS
We conclude with a brief discussion of the method used
to compute the invariant probability distributions of the
NNG on a family of small randomized networks consist-
ing of 60 nodes - these network graphs are computer gen-
erated. Using a total word list of cardinality two, we show
that the NNG efficiently finds the 40:20 splits into com-
munity structures where two of the communities or sub-
graphs (by design of about 20 nodes each) have one name
/ color and the remaining subgraph of 20 nodes have the
second name / color In addition, it also produces an in-
variant measure which, after discounting highest values
achieved naturally at the total consensus or single-name
states at the 0 and 60-nodes peaks, gives relative weights
on the meta-stable states that provide information on
community structure. For example, we refer to the sym-
metric 20 and 40 - nodes peaks in the following figures.
About 100 million steps of the NNG was used to produce
the invariant measure depicted.
FIG. 3: Blue triangle for A, red circle for B and black square
for AB
x 106
Stationary Measure
T
14
12
10
8
6
4
2
0
given by:
6
pA(si) = ǫ
pB(si) = ǫ
2 + (1 − ǫ) #{sj ∈N (si)X(sj )=A}+ 1
2 + (1 − ǫ) #{sj ∈N (si)X(sj)=B}+ 1
#{sj ∈N (si)}
2 #{sj∈N (si)X(sj )=AB}
2 #{sj∈N (si)X(sj )=AB}
#{sj ∈N (si)}
Given the noise level ǫ is arbitrarily small, we can take
the limit ǫ → 0:
pA(si) = #{sj ∈N (si)X(sj )=A}+ 1
#{sj ∈N (si)}
2 #{sj ∈N (si)X(sj )=AB}
pB(si) = #{sj ∈N (si)X(sj )=B}+ 1
#{sj ∈N (si)}
2 #{sj ∈N (si)X(sj )=AB}
Leaving aside the transitions involving a single-name
state, that is, as long as one only considers the transi-
tion between two multi-name states, taking this limit is
valid. From detailed balance we get
fi(Ax(N (si)))pB(si) = fi(ABx(N (si)))pA(si)
fi(ABx(N (si)))pB(si) = fi(Bx(N (si)))pA(si)
from which we find the local specification:
fi(Ax(N (si))) = p2
A(si)/Zl(si)
fi(Bx(N (si))) = p2
B(si)/Zl(si)
fi(ABx(N (si))) = pA(si)pB(si)/Zl(si)
Zl(si) = p2
A(si) + p2
B(si) + pA(si)pB(si)
10
20
30
40
50
60
Number of nodes in group A (blue triangle)
2. Properties of F (x(E)0(N (E)))
FIG. 4: Invariant measure for NNG
By definition,
F (x(E)0(N (E))) is given by:
fi(x(si)X(s1,...,si−1),0(si+1,...,sM ),0(N (E)))
fi(0(si)X(s1,...,si−1),0(si+1,...,sM ),0(N (E)))
Several facts will help us to simplify this formula.
i=1
QM
[Gibbs potential from local specification]
1. Local specification
In general, it's not easy to calculate the invariant mea-
sure of a local Markov chain, namely, its local specifica-
tion fi(X(si)X(N (si))). However for small cliques and
when there are only a small number of allowed words
such as two in the three local states (A, B, AB) in the
above examples, the transition in the Markov chain is
totally decided by the message that si received from its
neighbors. Let pA(si),pB(si) be the probability for si to
receive A, B respectively. Their values can be calculated
from the neighborhood condition X(N (si)); more pre-
cisely the number of neighbors in state A, B and AB, are
1. In each factor of the above product, the condi-
tionals in the numerator and denominator are
the same. So if x(si) = 0(si), the factor is 1.
Therefore only the sites not in 0 state counts in
the product. A direct consequence of this fact is
F (0(E)0(N (E))) = 1.
2. For any 1-Clique in this example:
F (AB(si)0(N (si))) = 1 according to the last para-
graph, and
F (A(si)0(N (si))) =
fi(A0(N (E)))
fi(AB0(N (E)))
=
pA(si)
pB(si)
= 1.
Similarly F (B(si)0(N (si))) = 1, thus, the func-
tion F on any 1-Clique has 0 value.
From A-B symmetry and graph symmetry, we can get
other function values from these results.
7
3. Consider the clique E = {s1, ..., sM } and its
two distinguished configurations which only dif-
fer at one site sm. By relabeling the sites we
can write the two configurations as X(E) =
{x(s1), ..., x(sm−1), x(sm), 0(sm+1), ..., 0(sM )} and
Y (E) = {x(s1), ..., x(sm−1), y(sm), 0(sm+1), ..., 0(sM )}.
In the ratio F (Y (E)0(N (E)))/F (X(E)0(N (E))),
the factors for 0 states do not appear and the
factors for s1, ..., sm−1 cancel.
So we have the
recursive relationship:
F (Y (E)0(N (E)))
F (X(E)0(N (E))) = fm(y(sm)X(s1,...,sm−1),0(sm+1,...,sM ),0(N (E)))
fm(x(sm)X(s1,...,sm−1),0(sm+1,...,sM ),0(N (E))) .
Using this relationship we calculate the function
value of F recursively.
5. Gibbs Potential
3.
2-Clique
In the example above, the network have one 2-Clique
and two similar 3-Cliques. We need to calculate the func-
tion value of F for certain configurations on the given
Cliques. In the following calculations, pA(si) and pB(si)
are always calculated according to the current neighbor
configuration. For the 2-Clique shown in Figure 1, we
have
The 3-Clique in Figure 2 has three 2-Cliques and three
1-Cliques embedded in it. Adding them, calling the sum
"net clique potential" for the 3-Clique "L", and using the
fact that the terms for 2-Cliques cancel, the result turns
out to be: Vnet(L) = − ln(F (LN (L))).
Finally, the total Gibbs potential includes the clique po-
tential of the 2-Clique and the net clique potential of two
3-Cliques,
F (AB − AB0(N (E)))
= F (0(E)0(N (E))) = 1
F (A − AB0(N (E)))
= f1(A0(s2),0(N (E)))
f1(AB0(s2),0(N (E)))
= pA(s1)
pB (s1) = 1
F (A − A0(N (E)))
= F (A − AB0(N (E))) f2(AA(s1),0(N (E)))
f2(ABA(s1),0(N (E)))
= pA(s2)
pB (s2) = 2
F (A − B0(N (E)))
= F (A − AB0(N (E))) f2(BA(s1),0(N (E)))
f2(ABA(s1),0(N (E)))
= pB (s2)
pA(s2) = 1
2 .
4.
3-Clique
For the 3-Clique on the left in Figure 2,
F (AB − AB − AB0(N (E))) = F (0(E)0(N (E))) = 1
F (AB − AB − A)0(N (E)))
f3(AB0(s1,s2),0(N (E))) = pA(s3)
F (AB − A − A)0(N (E)))
pB (s3) = 1
= f3(A0(s1,s2),0(N (E)))
= F (AB − AB − A0(N (E))) f2(A0(s1),A(s3),0(N (E)))
f2(AB0(s1),A(s3),0(N (E)))
= pA(s2)
pB (s2) = 3
F (A − A − A)0(N (E)))
= F (AB − A − A0(N (E))) f1(AA(s2,s3),0(N (E)))
f1(ABA(s2,s3),0(N (E)))
= 3 pA(s1)
pB (s1) = 15
F (B − A − A)0(N (E)))
= F (AB − A − A0(N (E))) f1(BA(s2,s3),0(N (E)))
f1(ABA(s2,s3),0(N (E)))
H(AAA − BBB)
= V (A − B) + Vnet(A − A − A) + Vnet(B − B − B)
= −{ln(F (A − B0(N (E)))) + 2 ln(F (A − A − A0(N (E)))}
= −4.7230
H(AAA − ABB)
= V (A − A) + Vnet(A − A − A) + Vnet(A − B − B)
= −{ln(F (A − A0(N (E)))) + ln(F (A − A − A0(N (E)))
+ ln(F (A − B − B0(N (E)))}
= −2.8904
Acknowledgments: Research was sponsored by the
Army Research Laboratory and was accomplished under
Cooperative Agreement Number W911NF-09-2-0053 to
the Social Cognitive Networks Acad Res Center at RPI.
= 3 pB (s1)
pA(s1) = 3
5
8
[1] R. Albert and A-L. Barabasi, Statistical Mechanics of
Complex Networks, Rev. Mod. Phys., 74, 47-97, 2002.
[18] Qiming Lu. PhD thesis, R.P.I., NY, 2009.
[19] F.A. Matsen and M.A. Nowak. Proc. Natl. Acad. Sci.
[2] R. Albert H. Jeong and A-L. Barabasi Nature, 401, 130,
U.S.A., 101(18053), 2004.
1999.
[3] D. Watts and S. Strogatz, Nature, 393, 440, 1998.
[4] D. Angluin. In Proceedings of the 12th ACM Symposium
on Theory of Computing, page 82-93, New York, 1980.
ACM.
[20] R. Meester and R. Roy. Continuum Percolation. Cam-
bridge University Press, Cambridge, England, 1996.
[21] M. Penrose, Random Geometric Graphs. Oxford Univer-
sity Press, New York, 2003.
[22] M.A. Nowak and N.L. Komarova. Science, 291(114),
[5] A. Baronchelli, M. Felici, E. Caglioti, V. Loreto, and L.
2001.
Steels J. Stat. Mech.: Theory Exp., (P06014), 2006
[6] E. Ben-Naim, L. Frachebourg, and P. L. Krapivsky. Phys.
[23] C. Roland and M. Grant. Phys. Rev. B, 41(4663), 1990.
[24] H.E. Stanley, Intro to Phase transitions and Critical phe-
Rev. E, 53(3078), 1996.
nomena, Oxford U. Press, 1982.
[7] P. Bremaud. Markov chains: Gibbs fields, Monte Carlo
[25] Y. Li, A. Allison, D. Abbott, H.E. Stanley, PRL, 91(22),
simulation, and queues. Springer, 1999.
220601-1, 2003.
[8] G. Casella and E. I. George. The American Stat., 46(3),
[26] C. Zhou, A.E. Motter and J. Kurths Phys. Rev. Lett., 96,
1992.
034101, 2006. 164101, 2006.
[9] C. Castellano, V. Loreto, A. Barrat, F. Cecconi, and D.
[27] A. Arenas, A. Diaz-Guilera, C.J. Perez-Vicente Phys.
Parisi. Phys. Rev. E, 71(066107), 2005.
Rev. Lett., 96, 114102, 2006.
[10] T. C. Collier and C. E. Taylor. J. Parallel Distrib. Com-
[28] M. Chavez, D.U. Hwang, A. Amann, H.G.E. Hentschel
put., 64(866), 2004.
and S. Boccaletti Phys. Rev. Lett., 94, 218701 ,2005.
[11] L. Dall'Asta, A. Baronchelli, A. Barrat, and V. Loreto.
[29] L. Amaral, A. Scala, M. Barthelemy and H.E. Stanley,
Phys. Rev. E, 74(036105), 2006.
[12] G. R. Grimmett. Bull. London Math. Soc., 5, 1973.
[13] K. K. Kaski, J. Nieminen, and J. D. Gunton. Phys. Rev.
Proc. Natl. Acad. Sci. U.S.A., 97(21), 11149, 2000.
[30] D. J. D. Earn and S. A. Levin, Proc. Natl. Acad. Sci.
U.S.A., 103 , 11, 2006.
B, 31(2998), 1985.
[31] M. Girvan and M. E. J. Newman Proc. Natl. Acad. Sci.
[14] S. Kumar, J. D. Gunton, and K. K. Kaski. Phys. Rev. B,
U.S.A. 99, 12, 2002.
35(8517), 1987.
[32] M. E. J. Newman Proc. Natl. Acad. Sci. U.S.A. 103,
[15] C. Lim and J. Nebus, Vorticity, Stat Mech and Monte-
8577, 2006.
Carlo simulations, Springer-Verlag 2006.
[33] S.Chauhan, M.Girvan and E. Ott, arXiv:0911.2735v1,
[16] Q. Lu, G. Korniss, and B.K. Szymanski, The Naming
Game in social networks: community formation and con-
sensus engineering, J. Economic Interaction and Coordi-
nation, 4, 221-235 (2009).
2009.
[34] M. Thattai and A. Oudenaarden Proc. Natl. Acad. Sci.
U.S.A. 98,15,2001.
[35] H. Nishimori, Stat Phys of Spin-Glass and Info processing
[17] Q. Lu, G. Korniss and, and B. K. Szymanski. Phys. Rev.
: an Intro., Oxford U. Press.
E, 77(016111), 2008.
|
1009.2997 | 1 | 1009 | 2010-09-15T18:55:48 | Sensor Scheduling for Energy-Efficient Target Tracking in Sensor Networks | [
"cs.MA"
] | In this paper we study the problem of tracking an object moving randomly through a network of wireless sensors. Our objective is to devise strategies for scheduling the sensors to optimize the tradeoff between tracking performance and energy consumption. We cast the scheduling problem as a Partially Observable Markov Decision Process (POMDP), where the control actions correspond to the set of sensors to activate at each time step. Using a bottom-up approach, we consider different sensing, motion and cost models with increasing levels of difficulty. At the first level, the sensing regions of the different sensors do not overlap and the target is only observed within the sensing range of an active sensor. Then, we consider sensors with overlapping sensing range such that the tracking error, and hence the actions of the different sensors, are tightly coupled. Finally, we consider scenarios wherein the target locations and sensors' observations assume values on continuous spaces. Exact solutions are generally intractable even for the simplest models due to the dimensionality of the information and action spaces. Hence, we devise approximate solution techniques, and in some cases derive lower bounds on the optimal tradeoff curves. The generated scheduling policies, albeit suboptimal, often provide close-to-optimal energy-tracking tradeoffs. | cs.MA | cs |
Sensor Scheduling for Energy-Efficient Target
1
Tracking in Sensor Networks
George K. Atia, Member, IEEE, Venugopal V. Veeravalli, Fellow, IEEE, and
Jason A. Fuemmeler Member, IEEE
Abstract
In this paper we study the problem of tracking an object moving randomly through a network of
wireless sensors. Our objective is to devise strategies for scheduling the sensors to optimize the tradeoff
between tracking performance and energy consumption. We cast the scheduling problem as a Partially
Observable Markov Decision Process (POMDP), where the control actions correspond to the set of
sensors to activate at each time step. Using a bottom-up approach, we consider different sensing, motion
and cost models with increasing levels of difficulty. At the first level, the sensing regions of the different
sensors do not overlap and the target is only observed within the sensing range of an active sensor. Then,
we consider sensors with overlapping sensing range such that the tracking error, and hence the actions
of the different sensors, are tightly coupled. Finally, we consider scenarios wherein the target locations
and sensors' observations assume values on continuous spaces. Exact solutions are generally intractable
even for the simplest models due to the dimensionality of the information and action spaces. Hence,
we devise approximate solution techniques, and in some cases derive lower bounds on the optimal
tradeoff curves. The generated scheduling policies, albeit suboptimal, often provide close-to-optimal
energy-tracking tradeoffs.
I. INTRODUCTION
In large networks of inexpensive sensors with small batteries, the sensor nodes are required to operate
on limited energy budgets. Sensor management can prolong the lifetime of a sensor network and conserve
This work was funded in part by a grant from the Motorola corporation, a U.S. Army Research Office MURI grant W911NF-
06-1-0094 through a subcontract from Brown University at the University of Illinois, a NSF Graduate Research Fellowship, and
by a Vodafone Fellowship.
This work was done at the Coordinated Science Laboratory (CSL), University of Illinois at Urbana Champaign, Urbana
IL, and was submitted in part
in June 2010 to the Asilomar conference on Signals, Systems, and Computers. Emails:
{atia1,vvv,fuemmele}@illinois.edu
DRAFT
scarce energy resources. However, inefficient management could result in severe performance degradation.
In this paper, we consider a network of n sensors tracking a single object. The sensors can be turned
on or off at consecutive time steps and the goal is to select the subset of sensors to activate at each time
step. This problem is challenging due to the inherent tradeoff between the value of information in the
sensor measurements and the energy cost, combined with the combinatorial complexity of the decision
space.
In previous work [1], two of the authors considered approximate strategies for sensor sleeping, where
the sensors are put to sleep to save energy and decisions are made concerning their sleep duration (in
time slots). Once in a sleep mode, a sensor would only wake up after its own sleep timer expires. Here,
we consider a scheduling variant of the problem which can be thought of as a sleeping problem with an
external wake-up mechanism, i.e., sensors can be woken up by external means (e.g. a low-power wake-up
radio). At time k, the permissible control actions for an n-sensor scheduling problem are n-dimensional
binary vectors, i.e., vectors in {0, 1}n (corresponding to set sensor nodes to activate at each time step),
for the sleeping problem (corresponding to the sleep durations of awake
in contrast to vectors in N
na(k)
0
sensors), where N0 is the set of non-negative integers and na(k) the number of awake sensors at time
k. While this does not address the combinatorial nature of the control space, the simpler structure of the
control space for the scheduling problem enables efficient approximate solution methodologies for the
more realistic models that we study in this paper.
A significant body of related research work considers sensor management for tasking sensors in
dynamically evolving environments. Castanon [2] has developed an approximate dynamic programming
approach for dynamic scheduling of multi-mode sensor resources for the classification of a large number of
unknown objects. The goal is to achieve an accurate classification of each object at the end of a fixed finite
horizon by assigning different sensor modes to different objects subject to periodic or total resource usage
constraints. Mode allocation strategies are computed based on Lagrangian relaxation for an approximate
optimization problem wherein sample-path resource constraints are replaced by expected value constraints.
In the context of sensor scheduling for target tracking, information-based approaches [3], [4] have been
developed for optimizing tracking performance subject to an explicit constraint on communication costs
in a decentralized setting. Williams et al. [3] also adopt a Lagrangian relaxation approach to solve a
constrained dynamic program over a rolling horizon. There, the combinatorial complexity of the decision
space is avoided by first selecting one leader node, followed by greedy sensor subset selection. Other
related work on sensor scheduling include leader-based distributed tracking schemes [5], [6], where at
any time instant there is only one sensor active, namely, the leader sensor which changes dynamically
2
as a function of the object state, while the rest of the network is idle.
While previous work focused on developing distributed implementations of efficient sensor scheduling
strategies, our goal here is to study the fundamental theory of sensor scheduling for tracking and
surveillance applications. Specifically, to explicitly study the fundamental tradeoff between tracking
performance and energy expenditure, we define a unified objective function combining tracking and
energy costs trading-off the complexity of per-stage costs to better capture the inherent energy-tracking
tradeoff. We adopt a bottom-up approach where we consider a range of sensing, motion and cost models
with increasing levels of difficulty and devise suboptimal scheduling policies to balance the tradeoff
between energy expenditure and tracking performance. In some cases we are also able to derive lower
bounds on the optimal energy-tracking tradeoff.
Due to noise and model uncertainties, natural limitations of the measurement devices, or incomplete
data about the surroundings, we need to design scheduling policies when the system's state is only partially
observable to the controller. Partially-Observable Markov Decision Processes (POMDPs) provide a natural
framework for addressing sequential decision problems where the goal is to find a policy (strategy) for
selecting actions based on the information available to the controller while addressing both short-term and
long-term benefits and costs. Solving POMDPs optimally is generally intractable. For example, the value
function for a POMDP with a finite state space depends on information states consisting of conditional
probability vectors of dimension equal to the number of states. This has led to a number of POMDP
approximations and we refer the reader to Monahan [7] and Hauskrecht [8] for excellent surveys on
approximate methods for stochastic dynamic programming. Usually, no single approximation can be
prescribed for all POMDPs, rather approximations can be judiciously used to exploit specific problem
structures. In this paper, we use a subset of these approximate solution techniques, including reduced-
uncertainty and point-based approximations [9] -- [12]. The former assumes that more information would be
available to the controller at future time steps, and the latter solves a reduced optimization problem based
on a relatively small subset of sampled beliefs about the object's state. We devise different approaches to
deal with the aforementioned computational complexity of the decision space. In one approach, instead
of solving one large combinatorial problem, we solve a set of simpler subproblems based on the intuition
gained from a simplistic sensing model. In another approach, we iteratively sample control actions from
a reduced control space based on the sparsity of a reachable belief set combined with point-based value
updates.
The remainder of this paper is organized as follows. In Section II, we describe the tracking problem
and define the sensing, transition and cost models, as well as the optimization problem, for each of the
3
considered models. In Section III we describe approximate strategies to generate suboptimal scheduling
policies. In Section IV, we present some experimental results, and finally, in Section V, we provide some
concluding remarks.
II. SCHEDULING PROBLEM
In the following we consider different models with increasing level of difficulty. Depending on the
structure of the model, we devise approximate methods to address the associated difficulties and generate
efficient scheduling policies. For notation, vectors are denoted by bold lower-case letters. Superscript T
denotes transposition and the indicator function is written as 1I{.}.
A. Simple sensing, observation and cost models
In this model, the network is divided into n distinct cells, one for each sensor. In other words, each cell
corresponds to the sensing range of one particular sensor and sensors' ranges do not overlap. A Markov
chain with an (n + 1)× (n + 1) probability transition matrix P describes the motion of the target through
the field of interest. The extra state is for an absorbing termination state of the Markov chain which is
reached when the object leaves the network. It is further assumed that all information about the object
trajectory is stored at some central unit and is used to determine the scheduling actions for the different
sensors.
We let uk,ℓ denote the action for sensor ℓ at time k; uk,ℓ = 1 if sensor ℓ is activated at time k + 1 and
0 if the decision is to turn it off. The action vector at time k, denoted uk, is a binary vector of size n× 1,
one decision per sensor. In this simplistic model, we assume that the target is perfectly observable within
the cell of an awake sensor or if it reaches the terminal state τ , otherwise it is unobservable. Thus, the
observation sk at time k is defined according to:
bk,
ε,
τ,
if bk 6= τ and uk−1,bk = 1;
if bk 6= τ and uk−1,bk = 0;
if bk = τ .
(1)
sk =
where ε stands for erasure. The observation model in (1) induces a well-defined probabilistic observation
model p(skbk, uk−1) such that the current observation depends on that actual target location and the
scheduling action for the n sensors.
At each time step, the incurred cost is the sum of the energy and the tracking costs. An energy cost
of c ∈ (0, 1] per unit time is incurred for every active sensor and a tracking cost of 1 for each time unit
that the object is not observed. Once state τ is reached the problem terminates and no further cost is
4
incurred. In other words, τ is an absorbing cost-free state; all n states are transient so that τ is the only
recurrence class of the Markov chain. Hence,
g(bk, uk−1) = 1I{bk 6= τ} 1I{uk−1,bk = 0} +
c1I{uk−1,ℓ = 1}!
(2)
n
Xℓ=1
The parameter c is thus used to tradeoff energy consumption and tracking errors.
B. Overlapping sensors with discrete observations models
In this model, we continue to use a discrete model for the target transition but we redefine a new
sensing model and cost structure to account for the fact that sensors could have overlapping visibility
regions. Within that model we further consider simple and probabilistic sensing.
1) Overlapping sensors with simple sensing: In this case, the target is perfectly observed within the
visibility region of any active sensor. Denote by Rℓ the set of locations in the visibility region of sensor
ℓ and by Bi the set of sensors that observe location i. The observation at time k is as follows:
bk,
ε,
τ,
if bk 6= τ and ∃j ∈ Bbk : uk−1,j = 1;
if bk 6= τ and uk−1,j = 0, ∀j ∈ Bbk;
if bk = τ .
(3)
sk =
Therefore, a tracking error is incurred if none of the sensors observing the current target location is
active. Redefining the cost structure for this model:
g(bk, uk−1) = 1I{bk 6= τ} 1I{uk−1,j = 0,∀j ∈ Bbk} +
c1I{uk−1,ℓ = 1}!
(4)
n
Xℓ=1
2) Overlapping sesnors with probabilistic sensing: By probabilistic sensing we account for observation
uncertainty even if the target is within the visibility region of one or more active sensors. We assume,
where
p(skbk,∃j ∈ Bbk : uk−1,j = 1) =
Rj(cid:15) [i /∈Bbk ,
R = \j∈Bbk ,
1−q
uk−1,j=1
uk−1,i=1
Ri.
sk = bk;
q,
R−1, sk = i, ∀i ∈ R
(5)
That is, the observation is uniformly distributed over the remaining locations (other than the true target
location) that belong to the visibility regions of the set of awake sensors monitoring the true location
bk. If the true target location does not belong to the visibility region of an awake sensor, we naturally
exclude the visibility region of that sensor since no measurement is received from such a sensor. When
5
R is a singleton {bk}, we set q = 1. A tracking error is incurred if the target is not directly observed
and the uncertainty in the target location cannot be resolved.
C. Continuous observation, continuous state and arbitrary cost models
In this class of models, the object sensing model allows for an arbitrary distribution for the observations
given the current object location. Tracking cost is modeled as an arbitrary distance measure between the
actual and the estimated object location. If we denote the set of possible object locations B, we have
B = m + 1. Note that, in contrast to the simplistic model in II-A, m is different from n since object
locations are arbitrary and we no longer assume one location corresponds to the sensing range of one
particular sensor. The (m + 1)-th state again corresponds to a termination state. Furthermore, the target
can be moving on a continuous state space in which case m is ∞.
If the state space is discrete, then conditioned on the object state bk at time k, bk+1 has a probability
mass function that is given by the bk-th row of the transition matrix P . If the state space is continuous,
P is a kernel such that P (x,Y) is the probability that the next object location is in the set Y ⊂ B given
the current object location is x. For simplicity of exposition, we focus on discrete state spaces. Also, we
omit indexing time whenever the time evolution is well-understood to avoid cumbersome notation. We
consider the following observation model for illustration; however, our approach is fairly general:
n
p(sb, u) =
Yi=1( 1
√2π
exp −
1
2(cid:18)si −
10
(b − pi)2 + 1(cid:19)2! 1I{ui = 1} + δ(si − ε)1I{ui = 0})
(6)
where s is an n× 1 continuous observation vector with the i-th entry, si, representing the observation of
sensor i, pi, i = 1, . . . , n, is the position of the i-th sensor, b is the target state, and ε stands for erasure.
δ(.) is the Dirac Delta function. In (6), the observation of an active sensor is Gaussian with a mean
received signal strength inversely proportional to the square of the distance between the sensor and the
actual target location. The observation of an inactive sensor is just an erasure.
The estimated target location (given the entire history) is denoted by b. We define the tracking error
through an arbitrary bounded distance function d(b, b) between the actual and the estimated object
locations, which can be the Hamming distance d(b, b) = 1I{b 6= b} or the Euclidean distance for discrete
and continuous state spaces, respectively. The control at each time step is the tuple (bk, uk). Since b does
not affect the state evolution, the optimal value for bk is the value that minimizes the tracking cost over
a single time step given history up to time k, i.e.,
bk = arg min
b
E[d(bk, bk)Ik]
(7)
6
where, Ik denotes the information state, i.e., the total information available to the central controller at
time k which is given by
In the case of Hamming cost, it follows that b is simply the MAP decision, i.e., b = arg maxb pk(b).
Ik = {s0, s1 . . . , sk, u0, u1 . . . , uk−1}
D. Optimal scheduling policy
The design of an optimal scheduling policy depends on the history up to time k, i.e., the information
state Ik. However, the posterior probability distribution, pk = Pr[bkIk], of the target's state given Ik is
a sufficient statistic for this class of partially observable processes. The distribution pk, also known as
belief, summarizes all the information needed for optimal control. The sufficient statistic itself forms a
Markov process whose evolution can be obtained through Bayes' rule updates 1. For example, the belief
update equation for the simplistic model in Section II-A can be written as:
eτ ,
ebk+1,
[pkP ]{j:uk,j=0} ,
if sk+1 = τ ;
if uk,bk+1 = 1;
if uk,bk+1 = 0.
(8)
pk+1 =
where ei is a row vector with a 1 at the i-th entry and 0 elsewhere. The vector [pkP ]S is the probability
vector formed by setting the i-th entry [pkP ]i of the vector pkP to zero, ∀i /∈ S, and then normalizing
the vector into a probability distribution. The set {j : uk,j = 0} signifies the set of deactivated sensors.
In other words, the updated belief for the model in II-A, is a point mass distribution concentrated at τ
if the object exits the network, and concentrated at bk+1 if the object is observed. When the object is
unobservable, we eliminate the probability mass at all sensors that are awake, since the object cannot be
at these locations, and normalize. The multi-valued function in (8), and equivalent Bayes' updates for
the other models, define a transformation pk+1 = φ(pk, sk+1, uk), mapping the current belief pk, the
current control vector uk, and the future observation sk+1, to a future belief.
The policy uk = µk(Ik) is defined as a mapping from information states Ik to control actions uk. The
goal is to design a policy that minimizes the expected sum of costs J, where,
J(I0, µ0, µ1, . . .) = E" ∞
Xk=1
g(bk)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)
I0# .
(9)
1Equivalently, for a continuous state space, a sufficient statistic would be pk(X ) = Pr[bk ∈ X Ik]. The updated belief pk+1
can be computed using standard Bayesian non-linear filtering as the posterior measure resulting from prior measure pP and
observation sk+1.
7
J is well-defined since g is upper bounded by cn + 1 (regardless of the model) and the expected time
till the object exits the network is finite. Note that the termination is inevitable, thus the objective is to
reach the termination state with minimal expected cost. Hence, the scheduling policy is the solution of
the minimization problem,
J ∗ = min
µ0,µ1,...
J(I0, µ0, µ1, . . .)
(10)
This POMDP problem falls within the class of infinite horizon stochastic shortest path problems.
Noting that the termination state is observable, cost-free and absorbing, and that every policy is proper2,
a stationary policy µ∗(.), i.e., one which does not depend on k, is optimal in the class of all history-
dependent policies and pk is a sufficient statistic for control [13], i.e., u∗
k = µ∗(pk), is defined through
a time-invariant mapping from the belief space to the action space. J can be written in terms of the
sufficient statistic and the optimal policy can be obtained from the solution of the Bellman equation:
J(p) = min
u∈{0,1}n
E[g(b′, u)p, u] +Xs
p(sp, u)J(φ(p, s, u))
(11)
such that J(eτ ) = 0, where J(.) is the value function for the POMDP, and the expectation is taken
over the future state b′ which is distributed according to pP . Note that we removed the time dependence
due to the aforementioned time invariance property. For continuous observations, summation over s is
replaced by an integration.
III. APPROXIMATE SOLUTIONS AND LOWER BOUNDS
There are a number of algorithms for solving POMDPs exactly [14] -- [16]. These algorithms rely on the
powerful result of Sondik that the optimal value function for any POMDP can be approximated arbitrarily
closely using a set of hyper-planes (α-vectors) defined over the belief simplex [14]. This fact is the basis
for exact value iteration based algorithms, such as the Witness algorithm [17] for computing the value
function. The result is a value function parameterized by a number of hyper-planes (or vectors) whereby
the belief space is partitioned into a finite number of regions. Each vector minimizes the value function
over a certain region of the belief space and has a control action associated with it, which is the optimal
control for beliefs in its region.
To clarify, in value iteration we generally start with some initial estimate for J ∗ and repeatedly apply
the transformation defined by the right hand side of Bellman equation (11) until the sequence of cost
2A proper policy is a policy that leads to the termination state with probability one regardless of the initial state. In our
problem, the scheduling policy does not affect the target motion and all policies are proper in the sense that there is a positive
probability that the target will reach the termination state after a finite number of stages.
8
functions converges. Let {α
after k iterations, where J (k) is the total number of hyper-planes, and α
in the belief space, represents the value of executing the k-step policy associated with the i-th vector
denote the set of vectors parameterizing the value function J (k)
(b), which is a hyperplane
(k)
i
(k)
i }J (k)
i=1
starting from a state b. Hence, the value of executing the i-th hyperplane policy starting from a belief
state p is simply the dot product of αi and p:
J (k)
i
(p) =Xb
p(b)α
(k)
i
(b) = p · α
(k)
i
.
Therefore, the value of the optimal k-step policy starting at p is simply the minimum dot product over
all hyperplanes, i.e.,
J ∗(k)(p) = min
{α(k)
i }
(k)
i
p · α
.
Hence, J ∗(k)(p) is piecewise linear and concave. Some of the vectors (also known as policy trees)
may be dominated by others in the sense that they are not optimal at any region in the belief simplex.
Thus, many exact algorithms devise pruning mechanisms whereby a parsimonious representation with a
minimal set of non-dominated hyper-planes is maintained [7].
Even though the aforementioned linearity/concavity property makes the policy search a great deal
simpler, the exact computation is generally intractable except for relatively small problems. The two
major difficulties for exact computation arise from the exponential growth of the vectors with the planning
horizon and with the number of observations, and the inefficiencies related to identification of such vectors
and subsequently pruning them. Namely, the number of hyper-planes grows double exponentially such
that after k steps the number of hyperplanes is O(cid:16)USk(cid:17), where U and S denote the cardinality of
the control and observation spaces, respectively. Equivalently, the number of hyperplanes per iteration
grows as:
This has led to a number of approximations and suboptimal solutions techniques trading off solution
J (k+1) = O(cid:16)UJ (k)S(cid:17) .
quality for speed.
Remark III.1. The intractability of the optimal solution for our problem is primarily due to the following
reasons:
(i) The cost function is minimized over the simplex of probability distributions, i.e., the (m − 1)-
dimensional belief simplex for m-state discrete state-space models, and the space of probability
density functions for continuous state-space models.
9
(ii) The exponential explosion of the action space with the number of sensors (2n actions).
(iii) The exponential growth of the α-vectors with the planning horizon and with the number of obser-
vations, especially for continuous observation models.
A. Approximate solutions
In this section, we outline our approximate solution methodologies for the different models introduced
in Section II. First, we consider approximations where it is assumed that more information becomes
available to the controller at future time steps. Policies based on the assumption that uncertainty in the
current belief state will be gone after the next action were first introduced within the artificial intelligence
community and known as QMDP policies
assumption, our sensor scheduling problem decomposes into n simpler subproblems, one subproblem
[10], [17]. We show that under an observable-after-control
per sensor, for the simplistic model of II-A. These subproblems can then be solved exactly using policy
iteration [13]. Furthermore, in this case, the QMDP solution gives us a lower bound on the optimal
tracking-energy tradeoff. Unfortunately, this natural decomposition does not extend to the other class of
models due to the inherent coupling of their tracking errors. However, based on intuition gained from
the simplistic model, we artificially decouple the scheduling problem for those models and individually
learn the tracking costs corresponding to each subproblem under the aforementioned QMDP assumption.
This approach combines QMDP with reinforcement learning [18].
Second, we develop sensor scheduling strategies based on point-based approximations. Despite the
fact that the generated QMDP based policies perform reasonably well, generally the resulting policies
would not take actions to gain information (an effect of the observable-after-control assumption), leading
to situations wherein the belief state does not get updated appropriately. Furthermore, while decoupling
the scheduling problem provides close-to optimal performance for uncoupled or lightly-coupled sensing
and tracking models (see Section IV), it might come at the expense of reduction in solution quality for
more realistic or heavily-coupled models. To that end, we develop point-based approximate scheduling
policies. While our previous approach reduced complexity via decoupling and learning, the key idea here
is to optimize the value function only for a small set of reachable beliefs P and not over the entire
belief simplex. Point-based methods have shown great potential for solving large scale POMDPs mostly
for robotic applications [8], [9], [11], [19]. Pineau et al. [9] proposed point-based value iteration (PBVI)
which performs point-based backups only at a discrete set of reachable belief points, that can be actually
encountered by interacting with the environment. Developing a class of point-based algorithms, which
mostly differ in the way the subset of belief points is chosen and the execution order of the backup
10
Belief point (p)
Reduce
scheduling
control space
U(p)
Point-based
update
new policy
Aggregated
measurements
weights
Aggregate
multi-dimensional
sensor
measurements
past policy
Fig. 1: Structure of the point-based scheduling approximation
operations over the selected belief points, has been the focus of recent algorithm-development research
targeting large scale POMDPs. Perseus [11] is one such randomized point-based algorithm that maintains
a fixed set of belief points. There, backup speedups can be obtained by exploiting the key observation
that a single backup may improve the value of many belief points simultaneously. These algorithms were
designed to deal with large state spaces, yet, two extra difficulties in the scheduling problem arise from
the size of the action space 2n (for all models) and the observation space (for the models in Sections II-C).
Regarding the dimensionality of the action space, we devise a strategy to sample actions based on the
support of the beliefs and the sparse structure of the transition models. Intuitively speaking, an object can
only move from one side of the network to the other side within time constraints rendering exponentially
many scheduling actions irrational at certain times. Hence, instead of performing full updates including
2n actions, we perform the minimization over a reduced control space U (p) for every p ∈ P (see Section
III-C1). When dealing with continuous or large observations, we combine that with a methodology that
aggregates observations and uses aggregate observations for value iteration updates (Section III-C2). At
the core of the algorithm we use Perseus [11], a variant of PBVI [9], whereby value iteration updates
are not carried out for every sampled belief. Instead, the values for many belief points are improved
simultaneously in one update. Fig. 1 depicts the structure of our point-based approximation, combining
control space reduction and observation aggregation with point-based updates.
B. QMDP based scheduling policies
Next, we consider our first class of policies based on the QMDP reduced future uncertainty assumption.
First, we consider the simplistic model in Section II-A, then we use the intuition we developed from this
model to devise similar policies for the other models. Since the POMDP is a stochastic shortest path
problem with an absorbing cost-free termination state, and the expected termination time is finite, the
11
cost-to-go function for a given belief can be written as the minimum of the dot product of the belief
vector and a set of hyper-planes (α vectors):
J(p) = min
= min
αi(b)p(b)
{αi}Xb
u∈{0,1}n( n
[pP ]i 1I{ui = 0} +
Xi=1
αi Xb′
+ Xs∈{1...n,ε}
min
n
c1I{uℓ = 1}!
Xℓ=1
p(su, b′)Xb
p(b′b)p(b)αi(b′))
(12)
where {αi} is the set of hyperplanes constituting the value function J. In essence, the complexity of the
Bellman equation (12) stems from the evolution of the belief pk in (8). We can see why (12) is hard
to analyze if we further divide the second term in the summation into two terms depending on whether
there is observability or there is an erasure,
J(p) = min
u∈{0,1}n( n
[pP ]i 1I{ui = 0} +
Xi=1
+Xb′
1I{ub′ = 1}[pP ]b′ min
{αi}
n
Xℓ=1
c1I{uℓ = 1}!
{αi}Xb′
αi(b′) + min
1I{ub′ = 0}[pP ]b′ αi(b′)).
(13)
To further clarify we observe that:
n
n
p(su, p)J(p1) =
1I{ui = 1}[pP ]iJ(ei) +
1I{ui = 0}[pP ]iJ([pP ]{j:uj=0})
(14)
Xs
Xi=1
Xi=1
and the minimization problem is coupled across the sensors as the second term in (14), which is due
to non-observability, depends on the action vector u. The action of one sensor affects belief evolution
therefore coupling the problem across sensors. Now, if we make the assumption that perfect observations
would be available to the controller after taking a scheduling action, we obtain an approximate surrogate
function which can be used to generate a suboptimal scheduling policy. Namely, we replace p(su, b′) =
δ(s − b′) in (12). We get
J(p) = min
u∈{0,1}n( n
Xi=1
u∈{0,1}n( n
Xi=1
= min
[pP ]i 1I{ui = 0} +
[pP ]i 1I{ui = 0} +
n
n
Xℓ=1
Xℓ=1
c1I{uℓ = 1}! +Xb′
c1I{uℓ = 1}! +Xb′
[pP ]b′ min αi · eb′)
[pP ]b′J(eb′)).
(15)
The terms in the summation in (15) only depend on the control action for each sensor. Furthermore,
the belief evolution is independent of the scheduling action, wherefore the approximate recursion in (15)
decomposes into separable terms, one per sensor. Hence, the value function and the scheduling policy for
12
sensor ℓ, under the observable-after-control assumption, can be obtained from the solution of per-sensor
Bellman equation:
J (ℓ)(p) = min
uℓ∈{0,1}( n
Xi=1
[pP ]i 1I{ui = 0} +
n
Xℓ=1
c1I{uℓ = 1}! +Xb′
[pP ]b′J (ℓ)(eb′)).
(16)
The POMDP problem is now decomposed into n separate simpler subproblems such that the total cost
function is the sum of the per-sensor cost function while the overall scheduling policy is the per-sensor
policies applied in parallel. Each subproblem can be easily solved using standard policy iteration [13]
with a simple minimization over a binary control action.
Fundamentally, for the simplistic model, we were able to decompose the problem into n simpler
subproblems due to the separability of the tracking cost into per-sensor costs. Note that the problem is
still coupled due to the belief evolution in (8) yet that coupling is resolved under the observable-after-
control assumption.
While separability holds for the simplistic model, this is not the case for the other models. Hence, we
devise a strategy where we artificially decouple the problem into n simpler subproblems. To this end,
we perform Monte Carlo simulations to determine appropriate values for the per-sensor tracking cost
corresponding to each subproblem. For example, consider the continuous observation model of Section
II-C. For simplicity of exposition, assume a discrete state space model with m possible object locations.
In this case, we define a surrogate value function for the ℓ-th subproblem as follows:
J ℓ(p) = min
u (1I{u = 0}
m
m
p(i)T (i, ℓ)+1I{u = 1}
c[pP ]i +
Xi=1
m
[pP ]iJ ℓ(ei)) ℓ = 1, . . . , n (17)
Xi=1
Xi=1
where T (i, ℓ) captures the contribution of the ℓ-th sensor to the total tracking error when the target's
previous state is i and is obtained via Monte Carlo simulations. Namely, the expected tracking cost can
be evaluated by repeatedly simulating our system from time k − 1 to time k while changing the state of
the ℓ-th sensor. Similarly, (17) can be generalized for continuous state spaces.
Even though the QMDP assumption leads to a separable problem and provides a lower bound on the
optimal energy-tracking tradeoff for the simplistic model as we elaborate in Section III-D, the resulting
scheduling policies are myopic, unlike the sleeping policies in [1]. This follows from the fact that under an
observable-after-control assumption, the future cost term is independent of the control vector u. Therefore,
we consider more efficient, albeit more difficult, point-based approximations in the next section.
C. Point-based approximate policies
In the previous section, we described QMDP based policies, whereby issues (i) and (iii) in Remark III.1
are resolved since we only needed to solve the underlying Markov Decision Process to describe the full
13
approximate surrogate function. Decoupling the problem into one-per-sensor subproblems (naturally or
artificially) further enabled us to address issue (ii). Yet, we just argued in Sections III-A and III-B that the
resulting scheduling policies are myopic and generally do not take control actions to gain information.
To that end, we develop point-based approximate scheduling policies. Instead of reducing complexity
via artificial decoupling and learning, the key idea here is to optimize the value function only for
specific reachable sampled beliefs and not over the entire belief simplex (addressing issue (i) in Remark
III.1). Such techniques have shown great potential for solving large scale POMDPs while significantly
reducing complexity. Due to the large size of the control space, we also devise strategies to sample
actions exploiting the sparsity of the beliefs and the problem structure (to address issue (ii)). Moreover,
observation aggregation is used for continuous observation models. Furthermore, since Perseus updates
are not carried out for every sampled belief and multiple belief points are improved simultaneously, the
number of α vectors grows modestly with the number of iterations. This addresses issue (iii) in Remark
III.1.
For completeness we first briefly outline the steps of Perseus and refer the reader to [11], [12] for
further details. Later, we discuss specific variations to the algorithm to address the dimensionality of the
action and the observation spaces.
One iteration of Perseus
1) Sample a set of belief points P. We obtain these beliefs by simulating the target motion through
the field taking random actions and generating observation according to the observation models in
(1), (3), (5), and (6)
2) Sample a belief point p ∈ P at random and compute the backup using (18a) and (18b),
α = arg min
{αp
u}u∈U
p
u
p · α
where
α
p
u = g(b, u) +Xs
p(su, p) min
α(k)
i
φ(p, u, s) · α
(k)
i
(18a)
(18b)
3) If Pb p(b)α(b) ≤ J (k)(p) then add new α to J (k+1) otherwise keep old hyperplane
4) If {p ∈ P : Jk+1(p) > J (k)(p)} = ∅, i.e., the empty set, iteration is complete otherwise repeat from
step 1
Fig.2 illustrates the progress of one iteration of Perseus. The x-axis represents the belief space with
circles representing the sampled belief set P = {p1, . . . , p7}. The y-axis is the value function at
consecutive iterations, i.e. J k−1 (solid lines) and J k (dashed lines). The figure displays the α vectors and
14
(a)
(b)
(c)
(d)
(e)
Fig. 2: One iteration of Perseus illustrating the progress of the algorithm. The x-axis represents the
belief space with circles representing the sampled belief set P = {p1, . . . , p7}. The y-axis is the value
function at consecutive iterations, i.e. J k−1 and J k. Solid lines represent the hyper-planes in the (k−1)-th
iteration and dashed lines represent the newly added hyper-planes during the k-th iteration. (a) The initial
value function J k−1; (b) p1 is randomly selected and a new α vector is added to J k. This update step
only happens to improve p1. Dark circles represent belief points which did not yet improve; (c) p3 is
sampled and a new hyperplane is added which improves the value for p2 through p6; (d) Only p7 did
not improve, thus p7 is sampled and a new hyperplane is added to J (k); (e) All belief points improved,
J (k) is computed, the iteration ends.
different steps illustrating the progress of the algorithm. The algorithm selects a belief point at random
and updates the value function for that belief. Then a new update is carried out for a belief point randomly
selected from the set of remaining beliefs, i.e., beliefs which did not improve in the previous step. The
algorithm repeats till all belief points are updated. Solid lines represent the hyper-planes in the (k− 1)-th
iteration and dashed lines represent the newly added hyper-planes during the k-th iteration. In a way, the
Perseus updates in POMDPs are the counterpart of asynchronous dynamic programming for MDPs [13]
since the order of backup of the belief points is arbitrary and does not require full sweeps over the entire
sampled belief set.
15
1) Sampling actions based on the support of the belief: Note that the update equation (18) involves
a minimization over all control actions in U. Even though one iteration of the algorithm is linear in
the cardinality U of the control space, U itself is exponential in the number of sensors rendering the
minimization infeasible for a relatively large sensor network.
The idea here is to exploit the structure of the scheduling/tracking problem. Since the target transition
model is naturally sparse, we predict relatively small uncertainty regions for the target state at future time
steps. More specifically, for every belief point in P, we use prior information about the target transition
model to project the future state of the target. This is particularly useful when the current belief vector
is sparse leading to more restricted uncertainty regions. Subsequently, we restrict our attention to a
significant subset of sensors, that is, sensors of relevance to the particulars of the uncertainty region.
Hence, we only consider scheduling actions involving scheduling different combinations of a reduced
number of sensors which considerably reduces the control space for every belief in P. If the number
of significant sensors is still large, we randomly sample actions from the reduced control space. Note
that the same intuition extends to more complex motion models wherein information about target speed,
maneuver, and acceleration can be factored in to define the future uncertainty regions. Hence, instead of
performing full updates including 2n actions, we perform the minimization over a reduced control space
for every p ∈ P. Specifically, we redefine the point update equation as:
α = arg min
{αp
u}u∈U(p)
p
u
p · α
(19)
where U (p) designates the reduced control space for the belief vector p.
Note that, future iterations of the algorithm involving a particular belief point, ensure sufficient sampling
to relevant control actions in the reduced control space. This approach is well suited to Perseus wherein
the value for every belief point is guaranteed to improve over consecutive stages of the algorithm. It
is worth mentioning that the observation and the cost models need to be computed on the fly for each
sampled control action during the algorithm implementation.
2) Observation aggregation: The point update equation (18) involves back-projecting all hyper-planes
in the current iteration one step from the future and returning the vector that minimizes the value of
the belief. Since this involves computing a cross sum by enumerating all possible combinations of
alpha vectors for the different observations, a number of vectors which is exponential in the number
of the observations is generated at each stage. The recursion has to be redefined to address continuous
observation models. Looking carefully at (18), it is not hard to see that if different observations map
16
to the same minimizing hyperplane, then they can be aggregated [20]. Hence, if we can partition the
observation space into regions that map to the same hyperplane (possibly non contiguous), the continuous
model is reduced to a corresponding discrete model. Integration is replaced by a summation over these
partitions and the weighing probabilities are obtained by integrating the conditional density over these
partitions. This is clarified in the following:
Zs
min
αi Xb′
p(su, b′)Xb
p(b′b)p(b)αj(b′) ds
p(b′b)p(b)αi(b′) ds =Xj ZSjXb′
=Xj Xb′
=Xj Xb′
p(su, b′)Xb
[pP ]b′ αj(b′)ZSj
[pP ]b′ Pr[Sju, b′]αj(b′).
p(su, b′) ds
To find the regions of aggregate observations, we need to solve for the boundaries, i.e., for each pair
(20)
(21)
(22)
(23)
(24)
(i, j) of α vectors we need to solve for s:
αi · φ(p, u, s) = αj · φ(p, u, s)
Hence, we need to solve:
where φ(p, u, s) = p1(b′) ∝Pb p(b)p(sb′, u)p(b′b)
(αi(b′) − αj(b′))[pP ]b′ exp(−
1
Xb′
After solving for the boundaries, we can readily define the regions:
2 Xi:ui=1
(si −
10
(b′ − pi)2 + 1
)2) = 0
Sj ∗ = {sj∗ = arg max
j
αj · φ(p, u, s)}
Now the update step is simply:
J(p) = g(p, u
where
[pP ]b′ Pr[Sju
∗, b′]αj(b′)
∗) +Xj Xb′
∗, b′] =Zs∈Sj
Pr[Sju
∗, b′)ds.
p(su
Finding a closed form analytical solution for (22) is not feasible. Instead, we use Monte-Carlo simulations
to solve for the boundaries and get estimates of the weighing probabilities by sampling observations from
p(su, b′) for different combinations of actions and target states.
17
D. Lower bounds
We are able to derive lower bounds on the energy-tracking tradeoff for the simple as well as the
continuous Gaussian observation models. For the simple model, the QMDP value function is itself a lower
bound on the expected total cost since more information is available to the controller at future time steps
given the reduced uncertainty assumption. To further clarify, observe that if we interchange the order of
minimization and summation in the last term of (13), we obtain a lower bound on the optimal cost to go
function. Hence, a lower bound can be obtained from the solution of the following equation:
1I{ub′ = 0}[pP ]b′ min
{αi}
αi(b′))
[pP ]b′ min αi · eb′)
[pP ]b′J(eb′))
(25)
J(p) = min
Xℓ=1
1I{ub′ = 1}[pP ]b′ min
u∈{0,1}n( n
[pP ]i 1I{ui = 0} +
Xi=1
+Xb′
u∈{0,1}n( n
[pP ]i 1I{ui = 0} +
Xi=1
u∈{0,1}n( n
[pP ]i 1I{ui = 0} +
Xi=1
Xℓ=1
Xℓ=1
c1I{uℓ = 1}!
αi(b′) +Xb′
c1I{uℓ = 1}! +Xb′
c1I{uℓ = 1}! +Xb′
{αi}
n
n
n
= min
= min
Interchanging the order of the summation and minimization corresponds to a fully observable state after
the next scheduling action, i.e., that the future belief is eb′. Hence, the QMDP value function is a lower
bound on the cost function of the original problem.
Unfortunately, this is only true for the simplistic model and does not extend to the coupled models
since the factored tracking cost in (17) need not be a lower bound on the true tracking cost.
To obtain a lower bound on the optimal energy-tracking tradeoff for such models, we combine the
observable-after-control assumption with a decomposable lower bound on the tracking cost which we
derive next. Consider the continuous observation model with discrete state space. Given the current
belief pk and a control vector uk the expected tracking cost can be written as:
E[d(bk+1, bk+1)pk, uk] =
=
m
m
Xj=1
Xi=1
Pr[bk+1 6= jpk, uk, bk+1 = j] Pr[bk+1 = jpk, uk]
pk(i)
m
Xj=1
p(bk+1 = jbk = i) Pr[bk+1 6= jpk, uk, bk+1 = j]
(26)
Defining
P (EHj) , Pr[bk+1 6= jpk, uk, bk+1 = j]
18
which is a conditional error probability for a multiple hypothesis testing problem with m hypotheses,
each corresponding to a different mean vector contaminated with white Gaussian noise. Conditioned on
Hj the observation model is:
Hj : s(ℓ) = (mj(ℓ) + w(ℓ))1I{uk,ℓ = 0} + ε1I{uk,ℓ > 0}
(27)
where s(ℓ) is the ℓ-th entry of an n×1 vector s denoting the received signal strength at the n sensors, mj
is the mean received signal strength when the target is at state j (j-th hypothesis), and w is a zero mean
white Gaussian Noise, i.e. w ∼ N (0, σ2I). According to (27), sensor ℓ gets a Gaussian observation,
which depends on the future target location, if activated at the next time step, and an erasure, otherwise.
Since the current belief is pk, the prior for the j-th hypothesis is πj = [pkP ]j. The error event E can
be written as the union of pairwise error regions as
where
p(EHj) = Pr[∪k6=jζkj]
ζkj = {s : Lkj(s) >
πj
πk }
(28)
is the region of observations for which the k-th hypothesis Hk is more likely than the j-th hypothesis
Hj and where
denotes the likelihood ratio for Hk and Hj. Using standard analysis for likelihood ratio tests [21], [22],
it is not difficult to show that:
(29)
Lkj ,
f (sHk)
f (sHj)
p(ζkjHj) = Q dkj
2
+
ln πj
πk
dkj !
∆mkj
∆mT
kj
σ2
kj =
where, d2
, ∆mkj = mk − mj, and Q(.) is the normal distribution Q-function. The
quantity dkj plays the role of distance between the two hypothesis and hence depends on the difference
of their corresponding mean vectors and the noise variance σ2. Note that, for different values of k and
j, ζkj are not generally disjoint but allow us to lower bound the error probability in terms of pairwise
error probabilities, namely, a lower bound can be written as:
p(EHj) ≥ max
k6=j
p(ζkjHj).
(30)
19
And we can readily lower bound the expected tracking error:
m
m
E[d(bk+1, bk+1)pk, uk] ≥
=
pk(i)
pk(i)
m
Xi=1
Xi=1
m
Xj=1
Xj=1
p(bk+1 = jbk = i) max
k6=j
p(bk+1 = jbk = i) max
k6=j
p(ζkjHj)
Q dkj
2
+
ln πj
πk
dkj !
(31)
Next we separate out the effect of each sensor on the tracking error:
E[d(bk+1, bk+1)pk, uk] ≥ 1I{uk,ℓ = 1}E[d(bk+1, bk+1)pk, uk = 1]
+ 1I{uk,ℓ = 0}E[d(bk+1, bk+1)pk, uk,i = 0 ∀i 6= ℓ]
for every ℓ
(32)
where 1 is the vector of all ones designating that all sensors will be active at the next time slot. The
inequality in (32) follows from the fact that if we separate out the effect of the ℓ-th sensor we get a better
tracking performance when all the remaining sensors are awake. Since this holds for every ℓ, a lower
bound on the expected tracking error can be written as a convex combination of all sensors contributions:
E[d(bk+1, bk+1)pk, uk] ≥
n
Xℓ=1
λℓ(pk)n1I{uk,ℓ = 1}E[d(bk+1, bk+1)pk, uk = 1]
+ 1I{uk,ℓ = 0}E[d(bk+1, bk+1)pk, uk,i = 0 ∀i 6= ℓ]o
(33)
Let 1−ℓ denote a vector of length n with all entries equal to one except for the ℓ-th entry being zero.
where, Pℓ λℓ(pk) = 1.
Then replacing from (31),
n
E[d(bk+1, bk+1)pk, uk] ≥
λℓ(pk)(1I{uk,ℓ = 1}
+1I{uk,ℓ > 0}
Xℓ=1
m
m
pk(i)
pk(i)
m
Xi=1
Xi=1
m
Xj=1
Xj=1
p(bk+1 = jbk = i) max
k6=j
p(bk+1 = jbk = i) max
k6=j
+
2
Q dkj(1)
Q dkj(1−ℓ)
2
ln πj
πk
dkj(1)!
dkj(1−ℓ)!) (34)
ln πj
πk
+
To simplify notation, we define the following 2 quantities:
T1(p; i, ℓ) ,
T (p; i, ℓ) ,
m
k6=j
Xj=1
Xj=1
p(bk+1 = jbk = i) max
Q
p(bk+1 = jbk = i) max
Q
k6=j
m
dkj(1)
2
dkj(1−ℓ)
2
+
+
ln [pP ]j
[pP ]k
dkj(1)
dkj(1−ℓ)
ln [pP ]j
[pP ]k
20
J (ℓ)(p)
J(p) =Xℓ
uℓ∈{0,1} 1I{uℓ = 1} Xb
+ 1I{uℓ = 0}Xb
p(b)λℓT (p; b, ℓ) +
m
[pP ]i!
Xi=1
[pP ]iJ (ℓ)(ei)!
Xi=1
m
(35)
(36)
Intuitively, T1(p; i, ℓ) represents the contribution of sensor ℓ to the total expected tracking cost when the
underlying state is i, the belief is p, and when all sensors are awake. On the other hand T (p; i, ℓ) is the
ℓ-th sensor contribution when it is inactive and all the other sensors are awake.
Now if we assume that the target will be perfectly observable after taking the scheduling action, a lower
bound on the total cost can be readily obtained from the solution of the following Bellman equation:
where
J (ℓ)(p) = min
p(b)λℓT1(p; b, ℓ) + c
Note that if we can solve the equation above for p = ei for all i ∈ {1, . . . , m}, then it is straightforward
to find the solution for all other values of p. We therefore focus on specifying the value function at those
points. Since this is the case, we further simplify our notation and use T (i, ℓ) and λ(i, ℓ) as shorthand
for T (ei; i, ℓ) and λℓ(ei), respectively. We can see that a lower bound on the value function of sensor ℓ
can be obtained as a solution to the following minimization problem over u:
m
m
J (ℓ)(eb) = min(λ(b, ℓ)T (b, ℓ); λ(b, ℓ)T1(b, ℓ) + c
[ebP ]i) +
Xi=1
Xi=1
[ebP ]iJ (ℓ)(ei)
(37)
Equation (37) together with (35) define a lower bound on the total expected cost. To further tighten
the bound we can now optimize over a matrix Λ for every value of c, where Λ(c) is an m × n matrix
with the (i, ℓ) entry equal to λ(i, ℓ), i.e., Λ(c) = {λ(i, ℓ)}. Hence
Xi=1
Xℓ=1 min(λ(b, ℓ)T (b, ℓ); λ(b, ℓ)T1(b, ℓ) + c
[ebP ]iJ (ℓ)(ei)! (38)
[ebP ]i) +
J(eb) = max
Λ(c)
Xi=1
m
m
n
subject to
Λ1n = 1m
where 1m is a column vector of all ones of length m.
The inner recursion can be solved to obtain a closed form solution for J (ℓ)(eb) as:
J ℓ(eb) =
∞
m
Xj=0
Xi=1
minn[ebP j]iλ(i, ℓ)T1(i, ℓ) + c
[ebP j+1]k ; [ebP j]iλ(i, ℓ)T (i, ℓ)o
(39)
m
Xk=1
Since the problem is only constrained across the different sensors, we obtain a lower bound from the
solution of the following optimization problem,
m
Xi=1
max
λ(i,ℓ)
n
∞
Xℓ=1
Xj=0
[ebP j]i min λ(i, ℓ)T1(i, ℓ) + c
[eiP ]k ; λ(i, ℓ)T (i, ℓ)!
m
Xk=1
(40)
21
subject to
n
We observe that for every i we are maximizing a concave piecewise linear function in λ(i, ℓ). We pose
λ(i, ℓ) = 1 ∀i = 1, . . . , m.
Xℓ=1
an equivalent convex optimization problem by realizing that the minimum of a set of concave functions
is also concave. Since affine functions are concave, we can apply the technique here. Since the problem
is unconstrained across the i dimension we focus on solving the max-min problem for a fixed i. The
final solution can then be obtained by summing the objective function for m subproblems.
For each ℓ = 1, . . . , n add a variable tℓ to the optimization problem. Also for every ℓ append 2
constraints to the optimization problem. The constraints state the minimization over uℓ implicitly, by
k=1[eiP ]k ≥ tℓ and λ(i, ℓ)T (i, ℓ) ≥ tℓ. The modified problem is
requiring that λ(i, ℓ)T1(i, ℓ) + cPm
therefore:
n
maximizeλ(i,ℓ),tℓ;ℓ=1,...,n
subject to
n
Xℓ=1
Xl=1
tℓ,
λ(i, ℓ) ≤ 1,
m
λ(i, ℓ)T1(i, ℓ) + c
Xk=1
λ(i, ℓ)T (i, ℓ) ≥ tℓ,
(41)
[eiP ]k ≥ tℓ,
ℓ = 1, . . . , n.
which can be readily solved using standard convex optimization techniques [23].
IV. RESULTS AND SIMULATIONS
In this section, we show experimental results illustrating the performance of the proposed scheduling
policies for the different models considered in this paper. In each simulation run, the object was initially
placed at the center of the network and the simulation run concluded when the object reached the
absorbing state τ . We perform Monte Carlo runs to compute the average tracking and energy costs for
different values of the energy parameter c. For the planning phase in case of point-based policies, beliefs
are sampled by simulating multiple object trajectories through the sensor network. Each trajectory starts
from a random state sampled from the initial belief, picking actions at random, until the target leaves
the network.
First, we consider the simple model in Section II-A with a linear network of 41 sensors. Figure 3(a)
shows the tradeoff curve between the number of active sensors per unit time and the tracking error
per unit time using the point-based and the QMDP policies. The figure also shows a lower bound on
22
Tradeoff between the number of awake sensors and tracking cost (simplistic model)
1
Point−based
QMDP
LB
s
r
o
r
r
e
i
g
n
k
c
a
r
T
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0
0
0.5
1
1.5
2.5
2
3
Sensors awake
3.5
4
4.5
5
50
40
30
20
10
s
f
e
i
l
e
b
l
l
a
r
o
f
l
e
u
a
v
g
v
A
0
0
30
25
20
15
10
5
0
0
l
s
e
n
a
p
r
e
p
y
h
f
o
r
e
b
m
u
n
500
1000 1500 2000 2500
time
t
s
o
c
g
v
A
24
22
20
18
16
14
0
800
600
400
200
s
e
g
n
a
h
c
y
c
i
l
o
P
500
1000 1500 2000 2500
time
500
1000 1500 2000 2500
0
0
500
1000 1500 2000 2500
time
200 beliefs, 16 sampled actions
time
(a) Energy-tracking tradeoff
(b) Convergence results
Fig. 3: Simplistic model
Fig. 4: A sensor network with overlapping sensing ranges (12 sensors and 20 object locations). An edge
connects a sensor to a given location if this location falls within the sensing range of that sensor.
the optimal performance (see Section III-D). It is clear that both policies lead to tradeoffs that closely
approach the lower bound. The QMDP policy gets even closer to the lower bound at small tracking errors
since the observable-after-control assumption is more meaningful in this regime. In Fig. 3(b) we show
convergence results for the point-based algorithm with reduced control space minimization. The top left
subplot displays the convergence of the sum cost of all the belief points in P; the top right shows the
expected cost averaged over many trajectories; the bottom left subplot shows the number of hyper-planes
constituting the value function as a function of time; the bottom right subplot shows the number of
policy changes versus time, i.e., the number of belief points for which the optimal action changed over
2 consecutive iterations of the algorithm.
Figure 5 displays the tradeoff curves for the network in Fig. 4 with a probabilistic observation model.
The network is composed of 12 sensors and 20 object locations with the shown connectivity such that the
23
1
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
e
m
T
i
t
i
n
U
r
e
p
t
s
o
C
Q
MDP
Point−based
1
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
e
m
T
i
t
i
n
U
r
e
p
s
r
o
r
r
i
E
g
n
k
c
a
r
T
0
0.1
0.2
c
0.3
0.4
0.5
0
0
1
Fig. 5: Overlap model
4
Sensors Awake per Unit Time
2
3
5
observation range for the different sensors overlap. Since the tracking error for this model is inherently
coupled across sensors, the global point-based policy clearly outperforms the learning-based QMDP policy.
Next, we consider a network of 10 sensors where object locations are located on integers from 1 to
21. The observation for each sensor is continuous as in (6). For every object state and every scheduling
action in the reduced control space, we sample 50 observations to construct estimates of the weight
probabilities and compute the aggregate observation boundaries. Up to 32 actions are sampled from the
reduced control space. In this setup, the belief set consists of 500 sampled belief vectors and we assume a
Hamming error cost. Fig. 6 shows the performance of the different policies for the continuous observation
model. It is shown that the point-based scheduling policy outperforms the QMDP policy. We further show
a lower bound on the optimal performance tradeoff. The lower bound is loose especially in the high
tracking error regime since the derived bound on per-sensor tracking errors assumes all other sensors are
awake. However, we can exactly compute the saturation point for the optimal scheduling policy since
every policy has to eventually meet the all-asleep performance curve, shown in Fig. 6a, when the energy
cost per sensor is high. At that point, all sensors are inactive and hence the target estimate can only be
based on prior information.
V. CONCLUSIONS
In this paper we studied the problem of tracking an object moving randomly through a dense network
of wireless sensors. We devised approximate strategies for scheduling the sensors to optimize the tradeoff
24
e
m
i
t
t
i
n
u
r
e
p
t
s
o
c
l
t
a
o
T
1
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0
0
Total cost versus c (continuous observation model)
Lower bound
Q
MDP
Point−based
All asleep
0.05
0.1
0.15
0.2
0.25
0.3
0.35
0.4
0.45
0.5
Energy cost per sensor (c)
e
m
i
t
t
i
n
u
r
e
p
t
s
o
c
i
g
n
k
c
a
r
T
1
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0
0
Tradeoff between number of awake sensors and tracking cost (continuous observation model)
Lower bound
Q
Point−based
MDP
1
2
3
4
5
6
7
8
9
10
Average number of awake sensors
(a)
(b)
Fig. 6: Continuous observation model: (a) Total cost versus energy cost per sensor, (b) Energy-tracking
tradeoff
between tracking performance and energy consumption for a wide range of models. First, we proposed
policies that rely on an observable-after-control assumption (QMDP policies). Key to this solution is
the decoupling of the optimization problem into per-sensor subproblems combined with simulation-
based learning of individual tracking costs for each subproblem. Second, we developed point-based
sensor scheduling strategies which optimize the value function over a small set of reachable beliefs
within the belief simplex. Based on the belief support and the sparsity of the transition models, we
developed a methodology to sample actions from reduced control spaces. This was combined with
observation aggregation to address the complexity of the observation space for continuous observations
models. In some cases we derived lower bounds on the optimal tradeoff curves. While being suboptimal,
the generated scheduling policies often provide close-to-optimal energy-tracking tradeoffs. Developing
distributed scheduling strategies when no central controller is available is an area for future research.
Another interesting challenge is when the statistics for object movement are unknown or partially known.
[1] J. A. Fuemmeler and V. V. Veeravalli, "Smart sleeping policies for energy efficient tracking in sensor networks," IEEE
Trans. Signal Processing, vol. 56, no. 5, pp. 2091 -- 2101, May 2008.
REFERENCES
25
[2] David A. Castanon, "Approximate dynamic programming for sensor management," in 36th conference on decision and
control (CDC), 1997, pp. 1202 -- 1207.
[3] Jason L. Williams, John W. Fisher, and Alan S. Willsky,
"Approximate dynamic programming for communication
constrained sensor network management," IEEE Transactions on Signal Processing, vol. 55, 2007.
[4] C. Kreucherm, K. Kastella, and A. Hero, "Sensor management using an active sensing approach," IEEE Transactions on
Signal Processing, vol. 85, no. 3, pp. 607 -- 624, March 2005.
[5] Juan Liu, Reich, and Feng Zhao, "Collaborative in-network processing for target tracking," Journal on Applied Signal
Processing, vol. 4, pp. 378 -- 391, 2002.
[6] Ying He and Edwin K.P. Chong, "Sensor scheduling for target tracking: A monte carlo sampling approach," Digital Signal
Processing, vol. 16, no. 5, pp. 533 -- 545, 2006, Special Issue on DASP 2005.
[7] G.E. Monahan, "A survey of partially observable markov decision processes: theory, models, and algorithms," Management
Science, vol. 28, pp. 1 -- 16, 1982.
[8] M. Hauskrecht, "Value-function approximations for partially observable markov decision processes," Journal of Artificial
Intelligence Research (JAIR), vol. 13, pp. 33 -- 94, 2000.
[9] J. Pineau, G. Gordon, and S. Thrun, "Point-based value iteration: An anytime algorithm for POMDPs," in the International
Joint Conference on Artificial Intelligence (IJCAI), 2003, pp. 1025 -- 1032.
[10] M. L. Littman, A. R. Cassandra, and L. P. Kaelbling, "Learning policies for partially observable environments: scaling
up," in Twelfth International Conference on Machine Learning, 1995, pp. 362 -- 370.
[11] M. T. J. Spaan and N. Vlassis, "Perseus: Randomized point-based value iteration for POMDPs," Journal of Artificial
Intelligence Research (JAIR), vol. 24, pp. 195 -- 220, 2005.
[12] J. M. Porta, N. Vlassis, M. T. J. Spaan, and P. Poupart, "Point-based value iteration for continuous POMDPs," Journal of
Machine Learning Research, vol. 7, pp. 2329 -- 2367, 2006.
[13] Dimitri P. Bertsekas, Dynamic programming and optimal control, Athena Scientific, 2001.
[14] E. J. Sondik, The Optimal Control of Partially Observable Markov Processes, Ph.D. thesis, Stanford University, 1971.
[15] H. T. Cheng, Algorithms for partially observable Markov decision processes, Ph.D. thesis, University of British Columbia,
1988.
[16] L. P. Kaelbling, M. L. Littman, and A. R. Cassandra, "Planning and acting in partially observable stochastic domains,"
Artificial Intelligence, vol. 101, pp. 99 -- 134, 1998.
[17] A. Cassandra, M. L. Littman, and N. L. Zhang,
"Incremental pruning: A simple, fast, exact algorithm for partially
observable markov decision processes," in Thirteenth Annual Conference on Uncertainty in Artificial Intelligence. 1997,
pp. 54 -- 61, Morgan Kaufmann.
[18] L. P. Kaelbling, M. L. Littman, and A. Moore, "Reinforcement learning: A survey," Journal of Artificial Intelligence
Research, vol. 4, pp. 237 -- 285, 1996.
[19] N. Roy and G. Gordon, "Exponential family PCA for belief compression in POMDPs," In Advances in Neural Information
Processing Systems, vol. 15, 1995.
[20] Jesse Hoey and Pascal Poupart, "Solving pomdps with continuous or large discrete observation spaces," in IJCAI'05:
Proceedings of the 19th international joint conference on Artificial intelligence, San Francisco, CA, USA, 2005, pp.
1332 -- 1338, Morgan Kaufmann Publishers Inc.
[21] H. Vincent Poor, An Introduction to Signal Detection and Estimation (2nd ed.), Springer-Verlag New York, Inc., New
York, NY, USA, 1994.
26
[22] Bernard C. Levy, Principles of Signal Detection and Parameter Estimation, Springer Publishing Company, Incorporated,
2008.
[23] Stephen Boyd and Lieven Vandenberghe, Convex Optimization, Cambridge University Press, New York, NY, USA, 2004.
27
|
1205.0561 | 7 | 1205 | 2013-11-15T14:44:00 | Multi-level agent-based modeling - A literature survey | [
"cs.MA"
] | During last decade, multi-level agent-based modeling has received significant and dramatically increasing interest. In this article we present a comprehensive and structured review of literature on the subject. We present the main theoretical contributions and application domains of this concept, with an emphasis on social, flow, biological and biomedical models. | cs.MA | cs |
Multi-level agent-based modeling
A literature survey
Gildas Morvan
http://www.lgi2a.univ- artois.fr/~morvan/
gildas.morvan@univ- artois.fr
Univ Lille Nord de France, F-59000 Lille, France
UArtois, LGI2A, F-62400, Béthune, France
January 7, 2014
1
Absract
During last decade, multi-level agent-based modeling has received significant and dra-
matically increasing interest. In this article we conduct a comprehensive and struc-
tured review of literature on this emerging research domain that aims at extending
the classical agent-based modeling paradigm to overcome some of its limitations. We
present the main theoretical contributions and applications with an emphasis on
social, flow, biological and biomedical models.
Main acronyms used in this paper
ABM According to the context, Agent-Based Model or Agent-Based Modeling
DEVS Discrete Event System Specification
EBM Equation-Based Model
ML -ABM According to the context, Multi-Level Agent-Based Model or Multi-
Level Agent-Based Modeling
Contents
Introduction
1
. . . . . . . . . . . . . . . . . . . . . . . . .
1.1 Agent-based modeling
1.2 Multi-level agent-based modeling . . . . . . . . . . . . . . . . . . . .
1.3 Terminology issues . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.4 Bibliography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2 Theoretical issues
2.1 Meta-models, simulation engines and platforms . . . . . . . . . . . .
2.2 Observation, detection and agentification of emergent phenomena
.
2.3 Representation of aggregated entities . . . . . . . . . . . . . . . . . .
3 Application domains
3.1
Social simulation . . . . . . . . . . . . . . . . . . . . . . . . . . . .
3.2 Flow modeling . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
3.3 Biological and biomedical models
. . . . . . . . . . . . . . . . . . .
3.4 Ecology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
4 Discussion
4.1 Level integration . . . . . . . . . . . . . . . . . . . . . . . . . . . .
4.2 Multi-level technical tools
. . . . . . . . . . . . . . . . . . . . . . .
5 Conclusion
References
3
3
3
4
5
6
6
8
9
10
11
12
14
16
18
18
19
20
20
2
1
Introduction
1.1 Agent-based modeling
Agent-based modeling (ABM) is a computational modeling paradigm that allow to
simulate the interactions of autonomous agents in an environment.
It has been
widely used to study complex systems in various domains (Epstein, 2006; Ferber,
1999; Gilbert, 2007; Railsback and Grimm, 2011; Resnick, 1994; Treuil et al., 2008).
However, it suffers from important known limitations that reduce its scope (Dro-
goul et al., 2003; Scerri et al., 2010). First, ABM is purely bottom-up: a microscopic
knowledge, i.e., related to system components, is used to construct models while a
macroscopic knowledge, i.e., related to global system properties, is used to validate
models.Therefore, it is not straightforward to explicitly introduce bidirectional rela-
tions between these two points of view in the general case. It becomes even harder
when different spatial or temporal scales or domains of interest are involved in a same
simulation. Moreover, agent-based models do not scale easily and generally require
large computational resources since many agents are simulated. Finally, most agent-
based simulation platforms lack tools to reify complex singular emergent properties:
human observation often remains the most efficient way to capture multi-level pat-
tern formation or crowd behavior.
1.2 Multi-level agent-based modeling
1.2.1 Definitions
The works surveyed in this paper aim at extending the classical ABM paradigm to
overcome these limitations. While they can be very different (in terms of goals,
technical approaches or application domains), these woks share a common idea: in-
troducing more levels of description in agent-based models. Therefore, we group
them under a common term: Multi-Level Agent-based Modeling (ML -ABM). In the
following we propose definitions of the concepts of level and multi-level agent-based
model that seem broad enough to encompass the different surveyed approaches (see
section 1.3).
Definition 1 A level is a point of view on a system, integrated in a model as a specific
abstraction.
The name refers to the familiar expressions levels of organization, observation,
analysis, etc.
Definition 2 A multi-level agent-based model integrates heterogenous (agent-based)
models, representing complementary points of view, so called levels, of the same sys-
tem.
In this definition, three concepts are highlighted and should themselves be de-
fined formally.
Definition 3 Integration means that the ABMs within a ML-ABM can interact and
share entities such as environments and agents.
Definition 4 Heterogeneity means that the ABMs integrated in a ML-ABM can be based
on different modeling paradigms (differential equations, cellular automata, etc.), use dif-
ferent time representation (discrete events, step-wise) and represent processes at different
spatio-temporal scales.
3
Definition 5 Points of view are complementary for a given problem since they can
not be taken in isolation to address it.
This idea is very important in the literature on complex systems (Morin, 1992).
Indeed, as Müller and Aubert (2011) note, "the global behavior of a complex system
cannot be understood without letting a set of points of view interact".
1.2.2 Types of problems solved using multi-level agent-based approaches
ML -ABM is mainly used to solve three types of modeling problems:
• the modeling of cross-level interactions, e.g., an explicit top-down feedback
control,
• the coupling of heterogeneous models,
• the (dynamic) adaptation of the level of detail of simulations, e.g., to save
computational resources or use the best available model in a given context.
In the first case, the different points of view always co-exist, as they integrate interde-
pendent models, while in the last ones, levels are (de)activated at run-time according
to the context, as they represent independent models designed for specific situations.
For instance, in flow hybrid models areas with simple topologies are handled
with an equation-based model (EBM) while others are handled with an ABM.
1.3 Terminology issues
Different terms have been used to describe what we call here a level: e.g., perspective,
interaction, layer or view (Desmeulles et al., 2009; Parunak et al., 2009; Torii et al.,
2005; White, 2007). Some are domain-specific; thus, in the flow modeling domain,
when two levels with static relations are considered, models are often described as
hybrid as shown in the section 3.2 (Burghout et al., 2005; El hmam et al., 2008,
2006a,b,c; Marino et al., 2011; Mathieu et al., 2007a; Nguyen et al., 2012b; Rejniak
and Anderson, 2011; Wakeland et al., 2007).
The term multi-scale — or multi-resolution (Jeschke and Uhrmacher, 2008; Zhang
et al., 2009a, 2011) — is often used but has a more restrictive meaning as it focuses
on the spatial and temporal extents of levels and not on their interactions and orga-
nization. Gil-Quijano et al. (2012, p. 622–623) pointed that the term multi-scale can
be misleading and advocated for using multi-level instead. Let take as an example the
Simpop3 model, described by their authors as multi-scale (Pumain and Louail, 2009).
Two levels are considered: the city level, representing the internal dynamics of a city,
and the system of cities level, representing the interactions between cities. However,
the idea of scale does not fit to describe the relation between them: one can easily
figure a city bigger (in terms of population, spatial extent, economic exchanges, etc.)
than a system of cities. In contrast, the idea of levels of organization in interaction
seems more appropriate. Furthermore, to extend the definitions 1 and 2 such mod-
els could be more precisely denoted as nested or hierarchical multi-level agent-based
models.
4
1.4 Bibliography
During last decade, ML -ABM has received significant and dramatically increasing
interest (fig. 1). In this article we present a comprehensive and structured review of
literature on the subject1 .
Another survey on the subject has been previously conducted by Gil-Quijano
et al. and published in different versions2 . While the present article aims at providing
an overview of the literature, Gil-Quijano et al. performed a comparative study of
three models (Gil-Quijano et al., 2008; Lepagnot and Hutzler, 2009) and (Pumain
and Louail, 2009). A similar survey, comparing four models, can be found in Vo
(2012, p. 28–34).
s
n
o
i
t
a
c
i
l
b
u
p
per year
cumulated
160
140
120
100
80
60
40
20
0
1996 2000 2004 2008 2012
year
s
n
o
i
t
a
t
i
c
per year
cumulated
1200
1000
800
600
400
200
0
1996 2000 2004 2008 2012
year
(a) publications
(b) citations
10
2006
2012
2011
.
.
.
8
6
4
s
n
o
i
t
a
c
i
l
b
u
p
/
s
n
o
i
t
a
t
i
c
s
n
o
i
t
a
t
i
c
(cid:80)
1200
1000
800
600
400
200
(cid:80) publications
0
40
80
120
160
(d) (cid:80) citations vs. (cid:80) publications
Figure 1: Bibliographical statistics on ML -ABM computed from author’s biblio-
graphic database and google scholar data on the Nov. 15, 2013
(c) ratio of citations to publications
2008
year
2010
2012
The paper is structured as follows. Section 2 introduces the main theoretical
contributions and section 3 presents the different application domains of ML -ABM,
with an emphasis on social, flow, biological and biomedical models. In section 4,
some issues about ML -ABM are discussed. Finally, the remaining sections conclude
1The bibliographic database is available at the following URL: http://www.lgi2a.univ- artois.
fr/~morvan/Gildas_Morvan/ML- ABM_files/mlbib.bib.
2This work was first published in french (Gil-Quijano et al., 2009), then extended (Gil-Quijano et al.,
2010),(Louail, 2010, p. 185–204) and finally translated into english (Gil-Quijano et al., 2012)
5
this paper by an analysis of the benefits, drawbacks and current limitations of the
existing approaches.
2 Theoretical issues
In the surveyed literature, three main theoretical issues have been addressed so far:
• the definition and implementation of meta-models and simulation engines,
• the detection and reification of emergent phenomena,
• and the definition of generic representations for aggregated entities.
They are described in the following sections.
2.1 Meta-models, simulation engines and platforms
Many meta-models and simulation engines dedicated to ML -ABM have been pro-
posed in the literature. They are are briefly presented in the following, in a chrono-
logical order.
Approaches based on DEVS have also been included (Zeigler et al., 2000). Indeed,
DEVS, as a generic event-based simulation framework, has been extended to support
ABM (Duboz, 2004; Duboz et al., 2003; Müller, 2009). A comprehensive survey of
the literature on multi-level DEVS extensions can be found in Duhail (2013).
GEAMAS (Marcenac et al., 1998a,b; Marcenac and Giroux, 1998) (GEneric Ar-
chitecture for MultiAgent Simulation) is a pioneering ML -ABM framework inte-
grating three levels of description (micro, meso, macro). Micro and macro levels
represent respectively agent and system points of view while the meso (or middle)
level represents an aggregation of agents in a specific context. Communication be-
tween levels is asynchronous. GEAMAS-NG is a newer version of the framework
providing tools to detect and reify emergent phenomena (David et al., 2011).
tMans3 (Scheutz et al., 2005) is a multi-scale agent-based meta-model and plat-
form. Unfortunately, the project seems to have died in the bud.
ML -DEVS (Steiniger et al., 2012; Uhrmacher et al., 2007) is an extension of
DEVS that allows the simulation of multi-scale models (and not only coupled models
in which the behavior of a model is determined by the behaviors of its sub-models).
Two types of relation between levels are defined: information propagation and event
activation. However, ML -DEVS focuses on multi-scale modeling and therefore, only
supports pure hierarchies of models: interaction graphs are viewed as trees (Maus et al.,
2008).
CRIO (Gaud, 2007; Gaud et al., 2008a,b) (Capacity Role Interaction Organiza-
tion) is an organizational meta-model dedicated to ML -ABM based on the concept
of holon (Koestler, 1967, 1978). It has been used to develop multi-scale simulations
of pedestrian flows (cf. section 3.2).
SPARK4 (Solovyev et al., 2010) (Simple Platform for Agent-based Representation
of Knowledge) is a framework for multi-scale ABM, dedicated to biomedical research.
Scerri et al. proposed a technical architecture to distribute the simulation of
complex agent-based models (Scerri et al., 2010). This approach aims at integrating
3 http://tmans.sourceforge.net/
4 http://www.pitt.edu/~cirm/spark/
6
multiple ABMs in a single simulation, each ABM representing a specific aspect of the
problem. In their article, authors focus on the management of time in such simula-
tions. Therefore, the proposed platform provides two main technical services that
ensure the consistency of simulations: (1) a time manager that ensures that integrated
ABMs advance in time in a consistent way and (2) a conflict resolver that manages the
problematic interactions between agents and shared data (such as the environment).
Authors evaluate their approach on a modified version of Repast5 and show it can
scale large-scale models easily.
IRM4MLS6 (Morvan and Jolly, 2012; Morvan et al., 2011) (Influence Reaction
Model for Multi-Level Simulation) is a multi-level extension of IRM4S (Influence
Reaction Model for Simulation) (Michel, 2007), an ABM meta-model based on the
Influence Reaction model which views action as a two step process: (1) agents pro-
duce "influences", i.e., individual decisions, according to their internal state and per-
ceptions, (2) the system "reacts", i.e., computes the consequences of influences, ac-
cording to the state of the world (Ferber and Müller, 1996). The relations of per-
ception and influence between levels are specified with digraphs. IRM4MLS relies
on a generic vision of multi-level modeling (see section 1). Therefore, interactions
between levels are not constrained. It has been applied to simulate and control intel-
ligent transportation systems composed of autonomous intelligent vehicles (Morvan
et al., 2012, 2009; Soyez et al., 2013, 2011) (see section 3.2).
ML -Rules (Maus et al., 2011) is a rule-based multi-scale modeling language ded-
icated to cell biological systems. Rules, describing system dynamics, are described
in a similar way as in chemical reaction equations. ML -Rules has been implemented
within the simulation framework JAMES II7 . This approach does not refer explicitly
to ABM; however, multi-level rule-based languages seem a promising way to engineer
complex individual-based models.
Müller et al. developed an approach that consists in decomposing a problem
according to the complementary points of view involved in the modeling (Müller
and Aubert, 2011; Müller and Diallo, 2012; Müller et al., 2011). For instance in
their case study the problem is the relation between residential and scholar segrega-
tion. Three points of view are considered: the geographer, the sociologist and the
economist. Then, independent conceptual agent-based models are defined for each
point of view. As models share agents and concepts, the conceptual models can-
not be merged without some processing. Indeed, a same concept can have different
meanings according to the point of view. To solve this issue, Müller et al. adapt
a technique described in the modular ontology literature: defining bridge rules that
explicit the relations between concepts.
PADAWAN (Picault and Mathieu, 2011) (Pattern for Accurate Design of Agent
Worlds in Agent Nests) is a multi-scale ABM meta-model based on a compact ma-
tricial representation of interactions, leading to a simple and elegant simulation
framework. This representation is based on the meta-model of IODA (Interaction-
Oriented Design of Agent simulations) dedicated to classical (1-level) ABM (Kubera
et al., 2008).
GAMA8 (Drogoul et al., 2013; Taillandier et al., 2010, 2012) is an ABM plat-
form with a dedicated modeling language, GAML, that offers multi-level capabili-
ties. Moreover, it includes a framework (a set of predefined GAML commands) to
5 http://repast.sourceforge.net
6 http://www.lgi2a.univ- artois.fr/~morvan/Gildas_Morvan/IRM4MLS.html
7 http://www.jamesii.org
8 http://code.google.com/p/gama- platform/
7
Figure 2: The Seck and Honig (2012) approach
It is certainly the most advanced
agentify emerging structures (Vo et al., 2012b).
platform, from an end-user point of view, that integrates a multi-level approach. The
multi-scale meta-model focuses on the notion of situated agent and therefore, top class
abstractions include geometry and topology of simulated entities (Vo et al., 2012a).
The notion of level does not appear explicitly but the concept of species defines at-
tributes and behaviors of a class of same type agents and the multi-scale structure of
the model, i.e., how species can be nested within each other.
Seck and Honig developed an extension of DEVS that allows the simulation of
multi-level (i.e., non hierarchically coupled) models (Seck and Honig, 2012). The
coupling between levels is done through regular DEVS models, named bridge mod-
els (fig. 2).
AA4MM (Camus et al., 2013, 2012; Siebert, 2011; Siebert et al., 2010) (Agent and
Artifact for Multi-Modeling) is a multi-modeling (or model coupling) meta-model
applied to ML -ABM. Levels are reified by agents that interact trough artifacts. This
meta-model extends existing ones, see e.g., Bonneaud (2008); Bonneaud et al. (2007),
distributing the scheduling between levels.
2.2 Observation, detection and agentification of emergent phe-
nomena
An important issue concerning ML -ABM is to observe, detect and possibly reify (or
more precisely agentity) phenomena emerging from agent interactions. Of course,
the question is not to detect any emergent phenomenon but those of interest, in
order to e.g., adapt the level of detail of simulations, model cross-level interactions or
observe multi-level behaviors.
8
Multi-perspectivemodellingofcomplexphenomenaFig.1ModellingsimplephenomenaFig.2ModellingcomplexphenomenathroughmultipleperspectivesNowifthephenomenawetrytomodelarecomplex,areductionistformalsys-temcanonlybepartiallysuccessfulindescribingthenaturalsystem(Agazzi1991;Mikulecky2001).Bydescribinganaturalsystemasacollectionofperspectives,though,whereeachperspectiveisassociatedwithauniqueformalsystem(havingauniquedecomposition)asshowninFig.2,wecanmodelasysteminaninher-ently‘richer’waybyhavingmultiplenon-isomorphicdecompositionsthatmayin-fluenceeachother.Suchmulti-perspectivemodelscanindeedcapturethetanglednessofthesystemsthatresultwhenweobservetheworldfromdifferentperspectives.AsMorinputsit(Morin1990),“wemustfoundtheideaofacomplexsystemonanon-hierarchicalconceptofthewhole”(Morin1990).Inasimilarway,Levins(2006)pro-posestherobustnessmethodology,which,inasortoftriangulation,invitestoanalyzeandmodelsystemswithmultipleconceptuallyindependenttools,thusimprovingac-curacyofthemodelsbyrelatingtheoutcomesobtainedfromdifferentperspectives.Therelationbetweencomplexityandmultipleperspectiveshasbeenacknowl-edgedbyvariousauthors.Kaufmannhasstatedthatthenumberofpossibletheo-Very different approaches have been proposed to solve this problem. The first
ones were of course exploratory. Therefore, they rely on dedicated methods related
to specific models. Newer works focus on generic methodologies and frameworks.
They are briefly presented in a chronological order.
2.2.1 Dedicated clustering methods
The pioneering RIVAGE project (Servat, 2000; Servat et al., 1998a,b) aimed "at mod-
eling runoff, erosion and infiltration on heterogeneous soil surfaces" (Servat et al.,
1998a, p. 184). At the microscopic level, water is viewed as a set of interacting water-
balls. An indicator characterizes waterball movements to detect two types of remark-
able situations: straight trajectories (corresponding to the formation of ravines) and
stationary particles (corresponding to the formation of ponds). Close agents sharing
such properties are aggregated in ravine or pond macroscopic agents.
Bertelle et al. (2002); Tranouez (2005); Tranouez et al. (2001, 2006); Tranouez
and Dutot (2009); Tranouez et al. (2003) aimed at changing the level of detail of
fluid flow simulations using the vortex method (Leonard, 1980). The goal was, as
in the RIVAGE model, to detect complex structures, i.e., clusters of particles shar-
ing common properties, and aggregate them. However, the detection of emergent
phenomena relies on graph-based clustering methods. Moncion et al. (2010) used a
similar approach to detect aggregations of agents in flocking simulations.
Gil-Quijano (2007); Gil-Quijano and Piron (2007) and Gil-Quijano et al. (2008)
used various clustering algorithms such as self-organizing maps, K-Means and particle
swarm algorithms, to detect group formations.
2.2.2 Generic frameworks
Chen (2009, 2013); Chen et al. (2010); Chen and Hardoon (2010); Chen et al. (2008a,b,
2009) proposed a formalism, named complex event types to describe multi-level behav-
iors in ABMs. "Conceptually, complex events are a configuration of simple events
where each component event can be located in a region or point in a hyperspace
that includes time, physical space and any other dimensions" (Chen et al., 2008b, p.
4). Using this approach, it is then possible to formally define and observe complex
phenomena at different levels.
David and Courdier (2008, 2009) developed a conceptual and technical frame-
work to handle emergence reification. It is implemented in the GEAMAS-NG plat-
form (cf. GEAMAS paragraph in the previous section) and has been used in a popu-
lation model of the Reunion Island, to detect and reify new urban areas (David et al.,
2012, 2011).
A similar framework has been integrated in the GAMA platform (see GAMA
paragraph in the previous section). It includes various clustering methods developed
in the literature (Vo et al., 2012b).
SimAnalyzer is a general-purpose tool, to detect and describe group dynamics in
simulations (Caillou and Gil-Quijano, 2012; Caillou et al., 2012).
2.3 Representation of aggregated entities
While developing generic representations for aggregated entities (also called group
abstractions) seems an important issue, to the best of our knowledge a few publica-
tions are available on the subject. The common idea in these works is to delegate
9
the computation of agent behavioral functions to less detailed agents, representing
groups of aggregated agents, in other levels in order to reduce the complexity of
interaction computing.
Sharpanskykh and Treur (2011a,b) proposed two approaches to group abstrac-
tion dedicated to models where agent state are represented by variables taking values
in {0, 1} or [0, 1]:
• weighting averaging: an aggregated state of a group is estimated by averaging
agent states, with a weighting factor related to the strength of influence of an
agent in the group (the stronger, the more important).
• invariant-based abstraction: this approach consists in determining an invariant
in a group of agents, i.e., a property that does not change in time and using it
as a conservation law.
Sharpanskykh and Treur applied these methods to a collective decision making model
of social diffusion. They performed a comparative study of the methods, focusing
on computational efficiency and approximation error.
Parunak (2012) introduced the notion of pheromone field (refering to the concept
of mean field in statistical physics) that "gives the probability of encountering an
agent of the type represented by the field at a given location" (Parunak, 2012, p.
115). In this approach, agents act according to their perceptions of pheromone fields
(but not of agents).
Navarro et al. (2012) proposed a generic approach based on the notion of meso-
scopic representation: agents sharing common properties (related to their physical
or mental states) delegate the computation of behavioral functions to a mesoscopic
agent. Authors developed this approach to reduce the computational cost of simula-
tions while guaranteeing accurate results.
3 Application domains
ML -ABM has been used in various fields such as
• biomedical research
– cancer modeling (Andasari et al., 2012; Brown et al., 2011; Deisboeck and
Stamatakos, 2010; Lepagnot and Hutzler, 2009; Olsen and Siegelmann,
2013; Paiva et al., 2009; Rejniak and Anderson, 2011; Sun et al., 2012;
Wang et al., 2013, 2008; Wang and Deisboeck, 2008; Wang et al., 2007;
Zhang et al., 2007, 2009a, 2011, 2009b),
– inflammation modeling (An, 2008; An et al., 2013; An and Wilensky,
2009; Kim et al., 2012; Scheff et al., 2012; Vodovotz et al., 2008; Wakeland
et al., 2007),
– arterial adaptation (Hayenga et al., 2011; Thorne et al., 2011),
– stent design (Tahir et al., 2011),
– vascular tissue engineering (Zahedmanesh and Lally, 2012),
– bone remodeling (Cacciagrano et al., 2010),
10
• flow modeling of walking (and running) (Gaud et al., 2008a; Navarro et al.,
2011; Nguyen et al., 2011, 2012b; Xi and Son, 2012), driving (Bourrel, 2003;
Bourrel and Henn., 2002; Bourrel and Lesort, 2003; Burghout et al., 2005;
El hmam et al., 2008, 2006a,b,c; Espié et al., 2006; Magne et al., 2000; Mam-
mar and Haj-Salem, 2006; Morvan et al., 2012, 2009; Poschinger et al., 2002;
Sewall et al., 2011; Soyez et al., 2013, 2011; Wedde and Senge, 2012) or stream-
ing (Servat et al., 1998a,b; Tranouez et al., 2006) agents,
• biology (Adra et al., 2010; Biggs and Papin, 2013; Christley et al., 2007a,b;
Jeschke and Uhrmacher, 2008; Marino et al., 2011; Montagna et al., 2010a,b;
Seal et al., 2011; Shimoni et al., 2011; Smallwood et al., 2010; Smallwood and
Holcombe, 2006; Stiegelmeyer et al., 2013; Sun et al., 2009),
• social simulation (Conte et al., 2007; Conte and Castelfranchi, 1996; Das-
calu et al., 2009, 2011; Gil-Quijano et al., 2008; Hassoumi et al., 2012; Laper-
rière, 2012; Louail, 2010; North et al., 2010; Ozik et al., 2008; Parry and
Bithell, 2012; Pumain and Louail, 2009; Sawyer, 2001, 2003; Schaller et al.,
2012; Schillo et al., 2001; Seck and Honig, 2012; Squazzoni, 2008),
• ecology (Belem, 2009; Belem and Müller, 2009; Belem and Müller, 2013; Cheong
et al., 2012; Duboz, 2004; Duboz et al., 2003; Le et al., 2011; Marilleau et al.,
2008; Morvan et al., 2008, 2009; Prévost et al., 2004; Ratzé et al., 2007; Roun-
sevell et al., 2012; Schmidt et al., 2011; Seidl et al., 2012, 2010; Semeniuk et al.,
2011; Vincenot et al., 2011),
• military simulation (Mathieu et al., 2007a,b; Parunak et al., 2009).
An interesting comparative analysis of three of these models can be found in Gil-
Quijano et al. (2009, 2010); Gil-Quijano et al. (2012) and Louail (2010, p. 185–204).
3.1 Social simulation
Social simulation is defined by Squazzoni (2008, p. 4) as "the study of social out-
comes, let us say a macro regularity, by means of computer simulation where agents’
behavior, interactions among agents and the environment are explicitly modeled to
explore those micro-based assumptions that explain the macro regularity of interest".
Major social theories developed in the second half of the twentieth century, e.g.,
structuration (Giddens, 1987) and habitus (Bourdieu, 1994) theories9 , share a common
ambition: solving the micro/macro (so called agency/structure) problem that can
be summarized by the following question: To understand social systems, should we
observe agent interactions (micro level) or structures emerging from these interactions
(macro level)? Such theories tend to consider altogether agent positions in the social
space (objective facts) and goals (subjective facts) to explain their beliefs and actions.
Their answer to the previous question could be: social systems can only be understood
by considering simultaneously agent interactions and structures in which they occur :
social structures
social practices
agent interactions.
9These theories are described by some sociologists as hybrid (Sawyer, 2001).
11
A key concept used by social theorists and modelers to understand downward (or
top-down) causation in social systems, i.e., how social structures influence agents, is
reflexivity. It can be defined as the "regular exercise of the mental ability, shared by all
normal people, to consider themselves in relation to their (social) contexts and vice
versa" (Archer, 2007, p. 4). Thus, social systems differ from other types of systems,
by the reflexive control that agents have on their actions: "The reflexive capacities of
the human actor are characteristically involved in a continuous manner with the flow
of day-to-day conduct in the contexts of social activity" (Giddens, 1987, p. 22). Two
very different approaches, both from technical and methodological perspectives, can
be considered to simulate systems composed of reflexive agents:
• a purely emergentist approach, only based on the cognitive capabilities of
agents to represent and consider themselves in relation to the structures emerg-
ing from their interactions — e.g., Conte and Paolucci (2002); Gilbert (2002),
• a multi-level approach based on the cognitive capabilities of agents and the
dynamic reification of interactions between social structures and agents, i.e.,
processes that underlie social practices — e.g., Gil-Quijano et al. (2009); Pumain
et al. (2009).
According to Giddens (1987), two forms of reflexivity can be distinguished: practical
(agents are not conscious of their reflexive capabilities, and therefore, are not able to
resonate about them) and discursive (agents are conscious of their reflexive capabili-
ties) reflexivity. These two forms are respectively related to the ideas of immergence
in which agent interactions produce emergent properties that modify the way they
produce them (Conte et al., 2007) and second order emergence in which agent interac-
tions produce emergent properties that are recognized (incorporated) by agents and
influence their actions (Gilbert, 2002).
ML -ABM can also be viewed as a way to link independent social theories (and
therefore concepts) defined at different levels (fig. 3) (Sawyer, 2001, 2003; Seck and
Honig, 2012). Thus, Seck and Honig (2012) proposed a model of social conflicts
integrating agent behaviors and social laws. Gil-Quijano (2007); Gil-Quijano et al.
(2007, 2008) developed a multi-scale model of intra-urban mobility. The microscopic
level represents households and housing-units, the mesoscopic one, groups of micro-
agents and urban-sectors and the macroscopic one, the city itself. A clustering algo-
rithm is applied to detect and reify groups of households and housing-units. Pumain
and Louail (2009) developed Simpop3, a multi-scale model based on two previously
developed single-scale models: Simpop nano, simulating the internal dynamics of a
city and Simpop2, simulating city interactions.
Readers interested in a more comprehensive presentation of these questions may
refer to Sawyer (2003); Schillo et al. (2001); Squazzoni (2008) and Raub et al. (2011) .
3.2 Flow modeling
A flow of moving agents can be observed at different scales. Thus, in traffic modeling,
three levels are generally considered: the micro, meso and macro levels, representing
respectively the interactions between vehicles, groups of vehicles sharing common
properties (such as a common destination or a common localisation) and flows of
vehicles. Each approach is useful in a given context: micro and meso models allow
to simulate road networks with complex topologies such as urban area, while macro
12
macrosociology
large-scale social structures
mesosociology
community
organization
microsociology
agent
Figure 3: ML -ABM in social simulation as a link between concepts defined at differ-
ent levels
models allow to develop control strategies to prevent congestion in highways. How-
ever, to simulate large-scale road networks, it can be interesting to integrate these
different representations (fig. 4). The main problem is to determine an appropriate
coupling between the different representations, i.e., that preserves the consistency of
simulations (Davis and Hillestad, 1993).
simulated entities
control strategies
macro
flow of vehicles
ramp metering
meso
group of vehicles
variable-message panels
micro
vehicle
vehicle instrumentation
Figure 4: ML -ABM and control in traffic simulation
3.2.1 Micro-macro models
An interesting comparison of existing micro-macro traffic models can be found in El
hmam (2006, p. 31–44) (table 1). The coupling methods rely on the following idea:
creating a virtual section which is both macro and micro at level connections. This
virtual section is used as a buffer to generate appropriate micro or macro data ac-
cording to the type of connection. On this basis, El hmam (2006); El hmam et al.
(2008, 2006a,b,c) proposed a generic coupling method between agent-based micro-
scopic models and widely used macroscopic models such as LWR, ARZ and Payne.
While micro-macro flow models were essentially developed in the traffic domain,
other applications such as crowd simulation emerged in recent years (Nguyen et al.,
2011, 2012b).
However, all the surveyed hybrid models share the same limitation: connections
between levels are fixed a priori and cannot be changed at runtime. Therefore, to
13
be able to observe some emerging phenomena such as congestion formation or to
find the exact location of a jam in a large macro section, a dynamic hybrid modeling
approach is needed (Sewall et al., 2011).
model
Magne et al. (2000)
Poschinger et al. (2002)
Bourrel and Lesort (2003)
Mammar and Haj-Salem (2006)
Espié et al. (2006)
El hmam (2006)
Sewall et al. (2011)
micro model
SITRA-B+
IDM
optimal velocity
ARCHISM
generic ABM
macro model
SIMRES
Payne
LWR
ARZ
SSMT
LWR, ARZ, Payne
ARZ
Table 1: Main micro-macro traffic flow models, adapted from El hmam (2006, p. 42)
3.2.2 Micro-meso models
This kind of models is often used to reduce the complexity of agent interactions.
Agents sharing common properties can be aggregated to form up a higher level
(mesoscopic) agent and then, save computer resources or describe group dynamics
such as in the already mentioned RIVAGE (Servat, 2000; Servat et al., 1998a,b) and
DS (David et al., 2011) models (cf. section 2.2). Conversely, mesoscopic agents can
be broken up into lower level agents if related structures vanish.
Morvan et al. (2012, 2009) introduced an multi-level approach to solve the dead-
lock problem in field-driven autonomous intelligent vehicle systems. These sys-
tems generally rely on self-organization to achieve their goals, but AIVs can remain
trapped into dead-locks. When such a situation is detected (using a similar approach
than Servat (2000); Servat et al. (1998a,b)), it is agentified to solve the problem using
hierarchical control.
Flacher et al. (2012); Navarro et al. (2012, 2013, 2011) proposed an innovative
framework for such models: (de)aggregation functions rely not only on the observ-
able state of simulations (the environment) but also on the internal state of agents. It
has been applied to pedestrian flow simulation. The proximity between agent states
(external and internal) is computed by an affinity function.
Soyez et al. (2013, 2011) extended this framework on the basis of IRM4MLS.
Agents are "cut" into a a set of physical parts (bodies), situated in different levels,
and a non-situated part (mind) (see fig. 5). Therefore, these different parts can be
(de)aggregated independently. This approach has been applied to dynamically adapt
the level of detail in a port operations simulator.
3.3 Biological and biomedical models
A biological system can be considered at different levels of organization:
... → molecule → cell → tissue → organ → ... ,
that basically correspond to the segmentation of biological research into specialized
communities:
... → molecular biology → cell biology → histology → physiology → ... .
14
conceptualAgent
environment
1
spiritAgent
1
1
1
1..n
1..n
0..n
bodyAgent
1
1
0..n
0..n
1
level
Figure 5: Mind/bodies separation in the Soyez et al. (2013) model
Each research area has developed its own ontologies and models to describe the
same reality observed at different levels. However, this reductionist approach fails
when addressing complex issues (Schnell et al., 2007). Thus, it has been shown that
living systems are co-produced by processes at different levels of organization (Mat-
urana and Varela, 1980). Therefore, an explanatory model of such systems should
account for the interactions between levels.
3.3.1 Cell biology
At least two levels are explicitly represented in cell biology models: the macroscopic
one, representing the extracellular environment and the interactions between cells,
and the microscopic one, representing the intracellular environment and the inter-
actions between cell components such as signaling pathways and gene regulatory
networks. A major modeling issue is that these two levels continuously influence
each other. It leaded to the development of multi-scale models.
Montagna et al. (2010a,b) developed a model of morphogenesis in biological sys-
tems, in particular for the Drosophila Melanogaster species. Maus et al. (2011) pro-
posed a model of Schizosaccharomyces pombe (a species of yeast) cell division and
mating type switching based on the ML -Rules approach (cf. section 2.1).
3.3.2 Cancer modeling
Cancer is a complex spatialized multi-scale process, starting from genetic mutations
and potentially leading to metastasis. Moreover, it has multi-scale (from from genetic
to environmental) causes. Therefore, it can be studied from various perspectives
from the intracellular (molecular) to the population levels.
ML -ABM is a promising paradigm to model cancer development (Wang and Deis-
boeck, 2008). Indeed, as Schnell et al. (2007, p. 140) note, "a multi-scale model would
allow us to explore the effect of combination therapies, approaches that attempt to
stop cancer in its tracks by barricading multiple pathways. Most present models,
focusing on processes at a single scale, cannot provide this comprehensive view."
Zhang et al. developed an ML -ABM of a brain tumor named Glioblastoma Multi-
forme (GBM) (Zhang et al., 2007, 2009a, 2011, 2009b). This model explicitly defines
the relations between scales and uses different modeling approaches: ordinary dif-
ferential equations (ODE) at the intracellular level, discrete rules typically found in
ABM at the cellular level and partial differential equations (PDE) at the tissue level
(see fig. 6).
Moreover, this model also relies on a multi-resolution approach: heterogenous
clusters, i.e., composed of migrating and proliferating cells are simulated at a high
15
resolution while homogenous clusters of dead cells are simulated at a lower resolu-
tion. In short, "more computational resource is allocated to heterogenous regions of
the cancer and less to homogenous regions" (Zhang et al., 2011, p. 6). This model
has been implemented on graphics processing units (GPU), leading to an efficient
parallel simulator (Zhang et al., 2011).
tissue
cellular
tissue evolution (PDE)
diffusion of the chemoattractants
cell — cell interactions (discrete rules)
cell’s phenotype
intracellular
gene — protein interactions (ODE)
r
o
t
p
e
c
e
r
y
a
w
h
t
a
p
s
’
l
l
e
c
Figure 6: ML -ABM in brain tumor modeling (Zhang et al., 2007, 2009a, 2011, 2009b)
Sun et al. (2012) also developed a brain tumor ML -ABM available as a MATLAB
library called ABM-TKI10 . It is based on a 4 level architecture (tissue, microenviron-
mental, cellular, modelcular).
Lepagnot and Hutzler (2009) model the growth of avascular tumors to study the
impact of PAI-1 molecules on metastasis. To deal with the problem complexity (a
tumor may be composed of millions of cells) two levels are introduced: the cell and
the tumor’s core levels (fig. 7). Indeed, such cancers are generally structured as a ker-
nel of necrosed or quiescent cells surrounded by living tumor cells. As necrosed and
quiescent cells are mostly inactive, tumor’s core is reified as a single upper-level agent,
interacting with cells and PAI-1 molecules at its boundary. A more comprehensive
analysis of this model can be found in Gil-Quijano et al. (2012).
meso
tumor’s core
micro
cell
PAI-1 molecules
Figure 7: ML -ABM in avascular tumor growth modeling (Lepagnot and Hutzler,
2009)
3.4 Ecology
Ecologists study processes that can have very different spatio-temporal dynamics.
Then, characterizing their interactions is a complicated problem and traditional
bottom-up or top-down approaches do not seem relevant: ABMs tend to be too
10 https://sites.google.com/site/agentbasedtumormodeling/home
16
complex, requiring a lot of computational resources11 while EBMs cannot deal with
complex heterogenous environments (Shnerb et al., 2000).
Ecological systems are generally described as hierarchies (Müller et al., 2005;
Ratzé et al., 2007). Thus the hierarchy theory is "a view of ecological systems, which
takes the scales of observation explicitly into account and which tries to conceptual-
ize the phenomena at their proper scale" (Ratzé et al., 2007, p. 14). ML -ABM seems
a interesting way to implement this concept. Different modeling issues in Ecology
have been solved by ML -ABM.
Duboz (2004); Duboz et al. (2003) proposed the scale transfer approach to link
microscopic and macroscopic models: the state of the system is computed by an
ABM and is used to parametrize an EBM describing population dynamics. This
EBM can then be used to parametrize the ABM environment (fig. 8).
emergent computation
ABM
EBM
environment parametrization
Figure 8: The scale transfer approach (Duboz, 2004; Duboz et al., 2003)
Marilleau et al. (2008) introduced a efficient method to represent complex soils,
named APSF (Agent, Pores, Solid and fractal). Traditionally, the environment is
viewed as a regular grid, discretized into cells. A cell can represent a pore, i.e., a part
of a soil cavity, a solid or a fractal. The idea is that a cell is not necessarily an atomic
element describing an homogenous area but can be fractal, i.e., composed of smaller
pore, solid or fractal cells with a self similar structure. Fractal cells are instantiated
at run time, generating finer representations of the environment when it is needed.
Thus, this approach based on self-generation allows to represent complex multi-scale
environments at a minimal computational cost. It has been used in the SWORM
(Simulated WORMS) model that studies the relation between earthworm activity
and soil structure (Blanchart et al., 2009; Laville et al., 2012).
Diptera larvae have a complex gregarious behavior that lead to the formation of
large groups in which individuals regulate the temperature to optimize their devel-
opment speed. This phenomenon can be described by a mesoscopic equation-based
model (knowing the mass of the group and and the external temperature), while the
crowding behavior of larvae can be modeled by an ABM. Moreover, the thermal
dynamics of the cadaver can be modeled by a Cellular Automaton (CA). Morvan
et al. (2008, 2009) integrated these different models in a ML -ABM to perform more
accurate forensic entomology expertises. In this model, the EBM is parametrized ac-
cording to the ABM state. It computes the increase of temperature caused by Diptera
interactions at the group level and send it to the CA model that is used as an envi-
ronment for the ABM (fig. 9). The environment can thus be viewed as an artifact,
used to synchronize the different models.
11An interesting solution to this problem is to reduce the complexity of agent interactions using esti-
mation algorithms such as the fast multipole method (Razavi et al., 2011).
17
meso
thermal dynamics (CA)
maggot mass effect (EBM)
micro
Diptera larvae (ABM)
Figure 9: Levels of organization in a ML -ABM of necrophagous Diptera develop-
ment (Morvan et al., 2008, 2009)
4 Discussion
In this section two issues are discussed:
• the different forms of level integration,
• the use of ML -ABM to solve technical problems.
4.1 Level integration
In the introduction, ML -ABM has been defined as integrating heterogenous ABMs
in a single model. Following the approach of Michel et al. (2003) on interaction, one
can distinguish at least two forms of integration:
• weak integration: levels share objects, e.g., environment properties, but not
agents,
• strong integration: levels share objects and agents.
Weak integration can be regarded as a form of multi-modeling (or model cou-
pling) where levels represent different models interacting through shared variables
called artifacts (Camus et al., 2012; Seck and Honig, 2012; Siebert et al., 2010).
Weaker forms of integration are not regarded as multi-level modeling. Thus, in
the SWARM platform (Minar et al., 1996), integration can be described as bottom-up
or isotropic (information flows in one direction). An agent is designed as a russian
doll and its behavior at a given level depends on the lower ones.
An simple example of strong integration is given by Picault and Mathieu (2011,
p. 334): "a membrane protein, which has an end inside the cell, and the other end
outside".
In the meta-models presented in section 2.1, IRM4MLS and PADAWAN are,
to the best of our knowledge, the only ones able to simulate strongly integrated
levels. It is not surprising as they are based on formal interaction models (respectively
IRM4S and IODA) that differentiate between agent influences and level reaction and
therefore, are able to represent strong interaction (Michel et al., 2003). In short,
agents are strongly interacting if the interaction output depends on the influences of
each agent. Thus, STRIPS-like action models (i.e., that view action as a change of
the state of the world), used in most of agent-based simulation platforms, are unable
to represent such interactions. Yet, (Michel et al., 2003) showed that modeling a
strong interaction as a weak one leads to arbitrary implementation choices and result
interpretation issues.
18
In ML -ABM, the problem is similar since levels can be seen are strongly interact-
ing entities. Thus, we can conclude that a modeling formalism capable of represent-
ing strong interaction12 can be extended to a multi-level one.
4.2 Multi-level technical tools
Although considering cross-level interactions is usually related to the application
domain as shown previously in this article, it can also be viewed as a technical tool:
• an ABM (microscopic level) can be used to parametrize an equation based
model (macroscopic level) (Duboz, 2004; Duboz et al., 2003; Nguyen et al.,
2012a),
• levels can be created at run-time by other levels to generate fractal environ-
ments (Marilleau et al., 2008),
• a mesoscopic level can be viewed as a controller (in the control theory mean-
ing) of group-related properties (Morvan and Jolly, 2012).
• automated observation and analysis tools can be introduced at levels not ex-
plicitly present in the model to detect and study (multi-level) emergent phe-
nomena13 (cf. section 2.2). However, reified emergent phenomena cannot be
considered as model entities since they are not re-injected in the simulation (see
fig. 10),
• a radical interpretation of ML -ABM is the concept of multi-future (Parunak
et al., 2010; Parunak and Brueckner, 2010). The possible trajectories of agent
actions are computed by "ghosts" as a pheromone field and agents act according
to it, selecting the most probable one.
As these ideas are domain-independent, they could be implemented as a generic
library, providing such services to a classical ABM or ML -ABM framework or plat-
form.
Inputs
Simulation
emergent phenomena
Detection
n
o
i
t
a
c
fi
i
t
n
e
g
A
Visualization tools
Figure 10: Two main uses of detected emergent phenomena: visualization or re-
injection in the simulation as agents
12 Some authors described these approaches as "interaction-based modeling", by opposition to the
term "individual-based modeling", as that they focus on interactions rather than on individual behav-
iors (Desmeulles et al., 2009; Kubera et al., 2008).
13 Indeed, as An (2008, p. 4) notes about ABM, "since the models rely on an ill-defined principle of
’emergence’ in order to transcend the epistemological boundaries represented by the multiple hierarchies
of system organization, their behavior is difficult to characterize analytically".
19
5 Conclusion
An important challenge for the scientific community is to find ways to deal with
the complexity of natural and artificial complex systems. This issue led to the devel-
opment of dedicated modeling paradigms and engineering principles that focus on
interaction and organization. We strongly believe that such techniques will play an
important role in the future.
In this article, we conducted a comprehensive analysis of the bibliography avail-
able on one of them: multi-level agent-based modeling.
As we shown, many papers focus on the application of this technique and then,
are published in domain-related journals and conferences. However, a dedicated
venue for theoretical or methodological papers is lacking. Such forum would al-
low to unify the vocabulary and concept definitions, discuss the main issues of this
approach and more generally, share ideas with the interested communities.
Acknowledgments
I am particularly grateful to my col-
leagues Shahin Gelareh, Yoann Kubera
and Jean-Baptiste Soyez for their help
and support. I also would like to thank
Chih-Chun Chen,
Jean-Pierre Müller
and Sebastian Senge for suggesting new
entries in the bibliographical database.
Belem, M. and Müller, J.-P. (2009). Toward a conceptual
framework for multi-points of view analysis in com-
plex system modeling: Orea model.
In 7th Interna-
tional Conference on Practical Applications of Agents and
Multi-Agent Systems (PAAMS 2009), volume 55 of Ad-
vances in Intelligent and Soft Computing, pages 548–556.
Springer.
Belem, M. and Müller, J.-P. (2013). An organizational
model for multi-scale and multi-formalism simulation:
Application in carbon dynamics simulation in west-
african savanna. Simulation Modelling Practice and The-
ory, 32:83–98.
References
Adra, S., Sun, T., MacNeil, S., Holcombe, M., and Small-
wood, R. (2010). Development of a three dimensional
multiscale computational model of the human epider-
mis. PloS one, 5(1):e8511.
An, G. (2008). Introduction of an agent-based multi-scale
modular architecture for dynamic knowledge represen-
tation of acute inflammation. Theoretical Biology and
Medical Modelling, 5(11).
An, G., Wandling, M., and Christley, S. (2013). Agent-
based modeling approaches to multi-scale systems bi-
ology: An example agent-based model of acute pul-
monary inflammation. In Systems Biology - Integrative
Biology and Simulation Tools, pages 429–461. Springer.
An, G. and Wilensky, U. (2009). Artificial life models in
software.
In From Artificial Life to In Silico Medicine:
NetLogo as a Means of Translational Knowledge Represen-
tation in Biomedical Research, pages 183–212. Springer.
Andasari, V., Roper, R., and ans M.A.J. Chaplain, M. S.
(2012).
Integrating intracellular dynamics using com-
pucell3d and bionetsolver: Applications to multiscale
modelling of cancer cell growth and invasion. PLoS
ONE, 7(3):e33726.
Archer, M. (2007). Making our Way through the World: Hu-
man Reflexivity and Social Mobility. Cambridge Univer-
sity Press.
Bertelle, C., Jay, V., Lerebourg, S., Olivier, D., and
Tranouez, P. (2002). Dynamic clustering for auto-
organized structures in complex fluid flows.
In ESS
2002 Conference.
Biggs, M. B. and Papin, J. A. (2013). Novel multiscale mod-
eling tool applied to pseudomonas aeruginosa biofilm
formation. PloS one, 8(10):e78011.
Blanchart, E., Marilleau, N., Chotte, J., Drogoul, A.,
Perrier, E., and Cambier, C. (2009).
SWORM: an
agent-based model to simulate the effect of earthworms
on soil structure. European Journal of Soil Science,
60(1):13–21.
Bonneaud, S. (2008). Des agents-modèles pour la modélisa-
tion et la simulation de systèmes complexes: application
à l’écosystémique des pêches. PhD thesis, Université de
Bretagne occidentale, Brest.
Bonneaud, S., Redou, P., and Chevaillier, P. (2007). Pat-
tern oriented agent-based multi-modeling of exploited
ecosystems.
In Proceedings of the 6th EUROSIM
congress.
Bourdieu, P. (1994). Raisons pratiques:
sur la théorie de
l’action, volume 331 of Points. Éditions du Seuil.
Bourrel, E. (2003). Modélisation dynamique de l’écoulement
du trafic routier : du macroscopique au microscopique.
PhD thesis, Institut National des Sciences Appliquées
de Lyon, Lyon.
Belem, M. (2009). A conceptual model for multipoints of
view analysis of complex systems. Application to the analy-
sis of the carbon dynamics of village territories of the West
African savannas. PhD thesis, AgroParisTech.
Bourrel, E. and Henn., V. (2002). Mixing micro and macro
representations of traffic flow: a first theoretical step.
Proceedings of the 9th Meeting of the Euro Working Group
on Transportation.
20
Bourrel, E. and Lesort, J. (2003). Mixing micro and macro
representations of traffic flow: a hybrid model based
on the LWR theory. 82th Annual Meeting of the Trans-
portation Research Board.
Brown, M., Bowring, E., Epstein, S., Jhaveri, M., Mah-
eswaran, R., Mallick, P., Mumenthaler, S., Povinelli,
M., and Tambe, M. (2011). Applying multi-agent tech-
niques to cancer modeling. In Sixth Annual Workshop
on Multiagent Sequential Decision Making in Uncertain
Domains (MSDM-2011).
Burghout, W., Koutsopoulos, H., and Andreasson, I.
(2005). Hybrid mesoscopic-microscopic traffic simu-
lation. Transportation Research Record: Journal of the
Transportation Research Board, 1934(1):218–255.
Cacciagrano, D., Corradini, F., and Merelli, E. (2010).
Bone remodelling: A complex automata-based model
running in bioshape. Cellular Automata, pages 116–
127.
Caillou, P. and Gil-Quijano, J. (2012). Simanalyzer : Au-
tomated description of groups dynamics in agent-based
simulations. In Proc. of 11th Int. Conf. on Autonomous
Agents and Multiagent Systems (AAMAS 2012).
Caillou, P., Gil-Quijano, J., and Zhou, X. (2012). Auto-
mated observation of multi-agent based simulations: a
statistical analysis approach. to appear in Studia Infor-
matica Universalis, 10(3):62–86.
Camus, B., Bourjot, C., and Chevrier, V. (2013). Multi-
level modeling as a society of interacting models.
In
SpringSim’13, ADS Symposium-Spring Simulation Multi-
Conference, Agent-Directed Simulation Symposium-2013,
volume 1, pages 15–22.
Camus, B., Siebert, J., Bourjot, C., and Chevrier, V. (2012).
Modélisation multi-niveaux dans AA4MM.
In Actes
des 20èmes Journées Francophones sur les Systèmes Multi-
Agents ( JFSMA).
Chen, C. (2009). Complex Event Types for Agent-Based Sim-
ulation. PhD thesis, University College London.
Chen, C. (2013). A theoretical framework for con-
ducting multi-level studies of complex social systems
with agent-based models and empirical data. CoRR,
abs/1302.4774.
Chen, C., Clack, C., and Nagl, S. (2010). Identifying multi-
level emergent behaviors in agent-directed simulations
using complex event type specifications. Simulation,
86(1):41–51.
Chen, C. and Hardoon, D. (2010). Learning from multi-
level behaviours in agent-based simulations: a systems
biology application.
Journal of Simulation, 4(3):196–
203.
Chen, C., Nagl, S., and Clack, C. (2008a). A method for
validating and discovering associations between multi-
level emergent behaviours in agent-based simulations.
In N.T. Nguyen, G.S. Jo, R. H. and Jain, L., editors,
Agent and Multi-Agent Systems: Technologies and Appli-
cations, volume 4953 of Lecture Notes in Computer Sci-
ence, pages 1–10. Springer.
Chen, C., Nagl, S., and Clack, C. (2008b). Multi-level be-
haviours in agent-based simulation: colonic crypt cell
populations. In Proceedings of the Seventh International
Conference on Complex Systems.
Chen, C., Nagl, S., and Clack, C. (2009). A formal-
ism for multi-level emergent behaviours in designed
component-based systems and agent-based simulations.
In Aziz-Alaoui, M. and Bertelle, C., editors, From
System Complexity to Emergent Properties, volume 12
of Understanding Complex Systems, pages 101–114.
Springer.
Cheong, S., Brown, D., Kok, K., and Lopez-Carr, D.
(2012). Mixed methods in land change research: to-
wards integration. Transactions of the Institute of British
Geographers, 37(1):8–12.
Christley, S., Newman, S. A., and Alber, M. S. (2007a).
Agent-based model for developmental pattern forma-
tion with multiscale dynamics and varying cell geome-
try. In Mathematical Modeling of Biological Systems, vol-
ume 1, pages 149–161. Springer.
Christley, S., Zhu, X., Newman, S. A., and Alber, M. S.
(2007b). Multiscale agent-based simulation for chon-
drogenic pattern formation in vitro. Cybernetics and
Systems: An International Journal, 38(7):707–727.
Conte, R., Andrighetto, G., Campennì, M., and Paolucci,
M. (2007). Emergent and immergent effects in com-
plex social systems. In Proceedings of AAAI Symposium,
Social and Organizational Aspects of Intelligence, Wash-
ington DC.
Conte, R. and Castelfranchi, C. (1996). Simulating multi-
agent interdependencies. a two-way approach to the
micro-macro link.
In Social Science Microsimulation,
pages 394–415. Springer.
Conte, R. and Paolucci, M. (2002). Reputation in Artificial
Societies. Kluwer Academic Publishers.
Dascalu, M., Gheorghe, S., and Zafiu, A. (2009). Multi-
level simulator for artificial societies. Romanian Journal
of Information Science and Technology, 12(4):466–484.
Dascalu, M., Stefan, G., Zafiu, A., and Plavitu, A. (2011).
Applications of multilevel cellular automata in epi-
demiology. In Proceedings of the 13th WSEAS interna-
tional conference on Automatic control, modelling & sim-
ulation, pages 439–444. World Scientific and Engineer-
ing Academy and Society (WSEAS).
David, D. and Courdier, R. (2008). Emergence as meta-
knowledge: refining simulation models through emer-
gence reification. In Proceedings of ESM’2008, Le Havre,
France, pages 25–27.
David, D. and Courdier, R. (2009). See emergence as a
metaknowledge. a way to reify emergent phenomena in
multiagent simulations? In Proceedings of ICAART’09,
pages 564–569, Porto, Portugal.
David, D., Gangat, Y., Payet, D., and Courdier, R. (2012).
Reification of emergent urban areas in a land-use sim-
ulation model in reunion island.
In ECAI workshop
on Intelligent Agents in Urban Simulations and Smart
Cities (IAUSSC2012), pp. 28-32, Montpellier, pages 28–
32, Montpellier, France.
David, D., Payet, D., and Courdier, R. (2011). Réifica-
tion de zones urbaines émergentes dans un modèle sim-
ulant l’évolution de la population à la réunion. In Actes
des 19èmes Journées Francophones sur les Systèmes Multi-
Agents ( JFSMA’11), pages 63–72, Valenciennes, France.
Cépaduès.
21
Davis, P. K. and Hillestad, R. (1993). Families of models
that cross levels of resolution: issues for design, calibra-
tion and management. In Proceedings of the 25th confer-
ence on Winter simulation, WSC ’93, pages 1003–1012,
New York, NY, USA. ACM.
Deisboeck, T. and Stamatakos, G. (2010). Multiscale cancer
modeling, volume 34. CRC Press.
Desmeulles, G., Bonneaud, S., Redou, P., Rodin, V., and
Tisseau, J. (2009). In virtuo experiments based on the
multi-interaction system framework: the réiscop meta-
model. Computer Modeling in Engineering and Sciences,
47(3):299–329.
Drogoul, A., Amouroux, E., Caillou, P., Gaudou, B., Grig-
nard, A., Marilleau, N., Taillandier, P., Vavasseur, M.,
Vo, D.-A., and Zucker, J.-D. (2013). GAMA: A spa-
tially explicit, multi-level, agent-based modeling and
simulation platform. In Advances on Practical Applica-
tions of Agents and Multi-Agent Systems, pages 271–274.
Springer.
Drogoul, A., Vanbergue, D., and Meurisse, T. (2003).
Multi-agent based simulation: Where are the agents?
In Sichman, J., Bousquet, F., and Davidsson, P., editors,
Multi-Agent-Based Simulation II, volume 2581 of Lecture
Notes in Computer Science, pages 1–15. Springer.
Duboz, R. (2004). Intégration de modèles hétèrogenes pour la
modélisation et la simulation de systèmes complexes. PhD
thesis, Université du Littoral.
Duboz, R., Ramat, É., and Preux, P. (2003). Scale transfer
modeling: using emergent computation for coupling
an ordinary differential equation system with a reac-
tive agent model. Systems Analysis Modelling Simula-
tion, 43(6):793–814.
Duhail, N. (2013). DEVS et ses extensions pour des simula-
tions multi-modèles en interaction multi-échelles. Mas-
ter’s thesis, Université de Rennes 1 — Telecom Bre-
tagne.
El hmam, M. (2006). Contribution à la modélisation et à la
simulation hybride du flux de trafic. PhD thesis, Univer-
sité d’Artois.
El hmam, M., Abouaissa, H., and Jolly, D. (2008). Con-
tribution à la modélisation et la simulation du flux de
trafic: approche hybride basée sur les systèmes multi-
agents. Actes INRETS, pages 93–111.
El hmam, M., Abouaissa, H., Jolly, D., and Benasser, A.
(2006a). Macro-micro simulation of traffic flow.
In
Proceedings of the12th IFAC Symposium on Information
Control Problems in Manufacturing (INCOM06), pages
351–356, Saint Etienne FRANCE.
El hmam, M., Abouaissa, H., Jolly, D., and Benasser, A.
(2006b). Simulation hybride de flux de trafic basée sur
les systèmes multi-agents. In 6e Conférence Francophone
de MOdélisation et SIMulation-MOSIM.
El hmam, M., Jolly, D., Abouaissa, H., and Benasser, A.
(2006c). Modélisation hybride du flux de trafic. Revue
électronique Sciences et Technologies de l’Automatique.
Epstein, J. (2006). Generative social science: Studies in agent-
based computational modeling. Princeton University
Press.
Espié, S., Gattuso, D., and Galante, F. (2006). Hybrid traf-
fic model coupling macro- and behavioral microsimula-
tion. In 85th Annual Meeting of Transportation Research
Board, Washington D.C.
Ferber, J. (1999). Multi-Agent Systems: An Introduction
to Distributed Artificial Intelligence. Addison-Wesley
Longman Publishing Co., Inc.
Ferber, J. and Müller, J.-P. (1996). Influences and reaction:
a model of situated multiagent systems. In 2nd Inter-
national Conference on Multi-agent systems (ICMAS’96),
pages 72–79.
Flacher, F., Navarro, L., and Corruble, V. (2012). Multi-
agent simulation system. European Patent EP2518711,
Thalès S.A.
Gaud, N. (2007).
Systèmes multi-agent holoniques : De
l’analyse à l’implantation. Méta-modèle, méthodologie, et
simulation multi-niveaux. PhD thesis, Université de
Technologie de Belfort-Montbéliard.
Gaud, N., Galland, S., Gechter, F., Hilaire, V., and
Koukam, A. (2008a). Holonic multilevel simulation of
complex systems : Application to real-time pedestrians
simulation in virtual urban environment. Simulation
Modelling Practice and Theory, 16:1659–1676.
Gaud, N., Galland, S., and Koukam, A. (2008b). Towards a
multilevel simulation approach based on holonic mul-
tiagent systems. In UKSIM, pages 180–185, Cambridge,
UK.
Giddens, A. (1987). La constitution de la société: éléments de
la théorie de la structuration. Presses Universitaires de
France.
Gil-Quijano, J. (2007). Modèles d’auto-organisation pour
l’émergence de formes urbaines à partir de comportements
individuels à Bogota. PhD thesis, Université Paris VI.
Gil-Quijano, J., Hutzler, G., and Louail, T. (2009). De
la cellule biologique à la cellule urbaine : retour sur
trois expériences de modélisation multi-échelles à base
d’agents. In Actes des 17èmes Journées Francophones sur
les Systèmes Multi-Agents ( JFSMA’09).
Gil-Quijano, J., Hutzler, G., and Louail, T.
(2010).
Accroche-toi au niveau,
j’enlève l’échelle: Éléments
d’analyse des aspects multiniveaux dans la simula-
tion à base d’agents. Revue d’Intelligence Artificielle,
24(5):625–648.
Gil-Quijano, J., Louail, T., and Hutzler, G. (2012). From
biological to urban cells: Lessons from three multi-
level agent-based models.
In Desai, N., Liu, A., and
Winikoff, M., editors, Principles and Practice of Multi-
Agent Systems, volume 7057 of Lecture Notes in Com-
puter Science, pages 620–635. Springer.
Gil-Quijano, J. and Piron, M. (2007). Formation au-
tomatique de groupes d’agents sociaux par techniques
d’apprentissage non supervise. In Actes de EGC’07 Ate-
lier Fouille de Données et Algorithmes Biomimétiques.
(2007).
Gil-Quijano, J., Piron, M., and Drogoul, A.
Vers une simulation multi-agent de groupes d’individus
résidentielles
les mobilités
pour modéliser
intra-
urbaines.
géomatique,
Revue
internationale de
17(2):161–181.
Gil-Quijano, J., Piron, M., and Drogoul, A. (2008). Social
Simulation: Technologies, Advances and New Discover-
ies, chapter Mechanisms of Automated Formation and
Evolution of Social-Groups: A Multi-Agent System to
Model the Intra-Urban Mobilities of Bogota City. IGI
Global.
22
Gilbert, N. (2002). Varieties of emergence. In Agent 2002
Conference: Social agents: ecology, exchange, and evolu-
tion, Chicago.
Gilbert, N. (2007). Agent-Based Models. Number 153 in
Quantitative Applications in the Social Sciences. Sage
Publications.
Hassoumi,
I., Lang, C., Marilleau, N., Temani, M.,
Ghedira, K., and Zucker, J. D. (2012). Toward a
spatially-centered approach to integrate heterogeneous
and multi-scales urban component models. In Advances
on Practical Applications of Agents and Multi-Agent Sys-
tems, volume 155 of Advances in Intelligent and Soft
Computing Volume, pages 81–86. Springer.
Hayenga, H., Thorne, B., Peirce, S., and Humphrey,
J. (2011). Ensuring congruency in multiscale mod-
eling:
towards linking agent based and continuum
biomechanical models of arterial adaptation. Annals
of biomedical engineering, pages 1–14.
Jeschke, M. and Uhrmacher, A. (2008). Multi-resolution
spatial simulation for molecular crowding.
In Proc.
of the Winter Simulation Conference, pages 1384–1392.
IEEE.
Kim, M., Christley, S., Alverdy, J., Liu, D., and An, G.
(2012). A multi-scale agent-based model of necrotizing
enterocolitis integrating oxidative stress, inflammation,
and microvascular thrombosis. Journal of Surgical Re-
search, 172(2):196.
Koestler, A. (1967). The Ghost in the Machine. Hutchinson.
Koestler, A. (1978). Janus: A summing up. Random House.
Kubera, Y., Mathieu, P., and Picault, S. (2008). Interaction-
oriented agent simulations: From theory to implemen-
tation. In Proc. of the18th European Conf. on Artificial
Intelligence (ECAI’08), pages 383–387.
Laperrière, V. (2012). Un cadre de modélisation dy-
namique multiniveau pour la peste bubonique des
hautes terres de madagascar. Bulletin de l’Association
de géographes français, 89(2):278–288.
Laville, G., Mazouzi, K., Lang, C., Marilleau, N., and
Philippe, L. (2012). Using gpu for multi-agent multi-
scale simulations. In Distributed Computing and Arti-
ficial Intelligence, volume 151 of Advances in Intelligent
and Soft Computing, pages 197–204. Springer.
Le, Q., Seidl, R., and Scholz, R. (2011). Feedback loops
and types of adaptation in the modelling of land-use
decisions in an agent-based simulation. Environmental
Modelling & Software.
Leonard, A. (1980). Vortex methods for flow simulation.
Journal of Computational Physics, 37(3):289–335.
Mammar, S.and Lebacque, J. and Haj-Salem, H. (2006).
Hybrid model based on second-order traffic model.
85th Annual Meeting of Transportation Research Board,
1(06-2160).
Marcenac, P., Courdier, R., and Calderoni, S. (1998a). To-
wards a toolkit to study emergence in complex systems
simulations.
http://personnel.univ- reunion.
fr/courdier/pdfs/int_iea1998_MC98.pdf.
Marcenac, P., Courdier, R., Calderoni, S., and Soulie,
J. (1998b). Towards an emergence machine for com-
plex systems simulations. In Tasks and Methods in Ap-
plied Artificial Intelligence, volume 416, pages 785–794.
Springer.
Marcenac, P. and Giroux, S. (1998). Geamas: A generic
architecture for agent-oriented simulations of complex
processes. Applied Intelligence, 8(3):247–267.
Marilleau, N., Cambier, C., Drogoul, A., Chotte, J., Per-
rier, E., and Blanchart, E. (2008). Multiscale mas mod-
elling to simulate the soil environment: Application to
soil ecology. Simulation Modelling Practice and Theory,
16(7):736–745.
Marino, S., El-Kebir, M., and Kirschner, D. (2011). A hy-
brid multi-compartment model of granuloma forma-
tion and t cell priming in tuberculosis. Journal of Theo-
retical Biology.
Mathieu,
J., Mahoney, P., Boiney, L.,
James,
J.,
and White, B.
Hubbard, R.,
(2007a).
Hy-
brid systems dynamic, petri net, and agent-based
modeling of
the air and space operations cen-
ter. http://www.mitre.org/work/tech_papers/
tech_papers_07/07_0455/07_0455.pdf.
J., Mahoney, P.,
Mathieu,
J., Melhuish,
J.,
James,
and White, B.
Boiney, L.,
Multi-
(2007b).
scale modeling of
center.
air operations
the
http://www.mitre.org/work/tech_papers/
tech_papers_07/06_1497/06_1497.pdf.
Maturana, H. R. and Varela, F. J. (1980). Autopoiesis and
Cognition The Realization of the Living, volume 42 of
Boston Studies in the Philosophy of Science.
Springer
Berlin Heidelberg.
Maus, C., John, M., Röhl, M., and Uhrmacher, A. (2008).
Hierarchical modeling for computational biology.
In
Bernardo, M., Degano, P., and Zavattaro, G., editors,
Formal Methods for Computational Systems Biology, vol-
ume 5016 of Lecture Notes in Computer Science, pages
81–124. Springer.
Maus, C., Rybacki, S., and Uhrmacher, A. (2011). Rule-
based multi-level modeling of cell biological systems.
BMC systems biology, 5(1):166–186.
Lepagnot, J. and Hutzler, G. (2009). A multiscale agent-
based model for the simulation of avascular tumour
growth.
Journal of Biological Physics and Chemistry,
9(1):17–25.
Michel, F.
the influ-
The IRM4S model:
(2007).
ence/reaction principle for multiagent based simula-
tion. In Proc. of 6th Int. Conf. on Autonomous Agents
and Multiagent Systems (AAMAS 2007), pages 1–3.
Louail, T. (2010). Comparer les morphogénèses urbaines
en Europe et aux États-Unis par la simulation à base
d’agents – Approches multi-niveaux et environnements de
simulation spatiale. PhD thesis, Université d’Evry-Val
d’Essonne.
Michel, F., Gouaïch, A., and Ferber, J. (2003). Weak in-
teraction and strong interaction in agent based simu-
lations.
In Multi-Agent-Based Simulation III, volume
2927 of Lecture Notes in Computer Science, pages 43–56.
Springer.
Magne, L., Rabut, S., and Gabard, J. (2000). Towards an
hybrid macro-micro traffic flow simulation model. Pro-
ceedings of the INFORMS Salt Lake City String 2000 Con-
ference.
Minar, N., Burkhart, R., Langton, C., and Askenazi, M.
(1996). The swarm simulation system: A toolkit for
building multi-agent simulations. Technical Report 96-
06-042, Santa Fe Institute.
23
Moncion, T., Amar, P., and Hutzler, G. (2010). Automatic
characterization of emergent phenomena in complex
systems.
Journal of Biological Physics and Chemistry,
10:16–23.
Montagna, S., Donati, N., and Omicini, A. (2010a).
An agent-based model for the pattern formation in
drosophila melanogaster. Artificial Life XII, pages 110–
117.
Montagna, S., Omicini, A., and Ricci, A. (2010b). A multi-
scale agent-based model of morphogenesis in biological
systems. In Omicini, A. and Viroli, M., editors, Pro-
ceedings of 11 ◦ Workshop nazionale "Dagli Oggetti agli
Agenti" WOA 2010, Rimini, Italy.
Morin, E. (1992). Method: Towards a Study of Humankind,
volume 1. Peter Lang Pub Inc.
Morvan, G., Dupont, D., Soyez, J.-B., and Merzouki, R.
(2012). Engineering hierarchical complex systems: an
agent-based approach – the case of flexible manufactur-
ing systems. In Service Orientation in Holonic and Multi
Agent Manufacturing Control, volume 402 of Studies in
Computational Intelligence. Springer.
Morvan, G. and Jolly, D. (2012). Multi-level agent-based
modeling with the Influence Reaction principle. CoRR,
abs/1204.0634.
Morvan, G., Jolly, D., Veremme, A., Dupont, D., and
Charabidze, D. (2008). Vers une méthode de modéli-
sation multi-niveaux.
In Actes de la 7ème Conférence
de Modélisation et Simulation MOSIM, Paris, France, vol-
ume 1, pages 167–174.
Morvan, G., Veremme, A., and Dupont, D.
(2011).
IRM4MLS: the influence reaction model for multi-level
simulation.
In Bosse, T., Geller, A., and Jonker, C.,
editors, Multi-Agent-Based Simulation XI, volume 6532
of Lecture Notes in Artificial Intelligence, pages 16–27.
Springer.
Morvan, G., Veremme, A., Dupont, D., and Jolly, D.
(2009). Modélisation et conception multiniveau de sys-
tèmes complexes : stratégie d’agentification des organi-
sations. Journal Européen des Systèmes Automatisés, 43(4-
5):381–406.
Müller, J.-P. (2009). Towards a formal semantics of event-
based multi-agent simulations. In David, N. and Sich-
man, J., editors, Multi-Agent-Based Simulation IX, vol-
ume 5269 of Lecture Notes in Computer Science, pages
110–126. Springer.
Müller, J.-P. and Aubert, S. (2011). L’ontologie pour con-
struire une représentation multi-niveau de et par les
systèmes sociaux.
In Rencontres interdisciplinaires de
Rochebrune sur les systèmes complexes naturels et artifi-
ciels.
Müller, J.-P. and Diallo, A. (2012). Vers une méthode
multi-point de vue de modélisation multi-agent.
In
Actes des 20èmes Journées Francophones sur les Systèmes
Multi-Agents, pages 33–42. Cepadues Editions.
Müller, J.-P., Diallo, A., François, J.-C., Sanders, L.,
Waldeck, R., and Mathian, H. (2011). Building ontolo-
gies from a variety of points of view. In Proceedings of
the 7th European Social Simulation Association Confer-
ence.
Müller, J.-P., Ratzé, C., Gillet, F., and Stoffel, K. (2005).
Modeling and simulating hierarchies using an agent-
based approach. In Proceedings of the MODSIM 2005 In-
ternational Congress on Modelling and Simulation, pages
1631–1638.
Navarro, L., Corruble, V., Flacher, F., and Zucker, J.-D.
(2012). Mesoscopic level: A new representation level
for large scale agent-based simulations. In SIMUL 2012,
The Fourth International Conference on Advances in Sys-
tem Simulation, pages 68–73.
Navarro, L., Corruble, V., and Zucker, J.-D. (2013). A
flexible approach to multi-level agent-based simulation
with the mesoscopic representation.
In Proc. of 12th
Int. Conf. on Autonomous Agents and Multiagent Systems
(AAMAS 2013).
Navarro, L., Flacher, F., and Corruble, V. (2011). Dynamic
level of detail for large scale agent-based urban simula-
tions. In Proc. of 10th Int. Conf. on Autonomous Agents
and Multiagent Systems (AAMAS 2011), pages 701–708.
Nguyen, N., Taillandier, P., Drogoul, A., and Auger, P.
(2012a).
Inferring equation-based models from agent-
based models: a case study in competition dynamics.
In Principles and Practice of Multi-Agent Systems, volume
7455 of Lecture Notes in Artificial Intelligence, pages
413–427. Springer.
Nguyen, T., Zucker, J.-D., Nguyen, D., Drogoul, A.,
and Vo, A. (2011). Hybrid equation-based and agent-
based modeling of crowd evacuation on road network.
In Eighth International Conference on Complex Systems
(ICSS), pages 558–570.
Nguyen, T., Zucker, J.-D., Nguyen, D., Drogoul, A., and
Vo, A. (2012b). A hybrid macro-micro pedestrians
evacuation model to speed up simulation in road net-
works.
In Dechesne, F., Hattori, H., ter Mors, A.,
Such, J., Weyns, D., and Dignum, F., editors, Advanced
Agent Technology, volume 7068 of Lecture Notes in Com-
puter Science, pages 371–383. Springer.
North, M., Macal, C., Aubin, J., Thimmapuram, P., Bra-
gen, M., Hahn, J., Karr, J., Brigham, N., Lacy, M., and
Hampton, D. (2010). Multiscale agent-based consumer
market modeling. Complexity, 15(5):37–47.
Olsen, M. M. and Siegelmann, H. T. (2013). Multiscale
agent-based model of tumor angiogenesis. In Interna-
tional Conference on Computational Science, ICCS 2013,
volume 18 of Procedia Computer Science, pages 1026–
1035. Elsevier.
Ozik, J., Sallach, D. L., and Macal, C. M. (2008). Model-
ing dynamic multiscale social processes in agent-based
models. IEEE Intelligent Systems, 23(4):36–42.
Paiva, L., Binny, C., Ferreira Jr., S., and Martins, M.
(2009). A multiscale mathematical model for oncolytic
virotherapy. Cancer Research, 69:1205–1211.
Parry, H. and Bithell, M. (2012). Agent-based models of geo-
graphical systems, chapter Large scale agent-based mod-
elling: A review and guidelines for model scaling, pages
271–308. Springer.
Parunak, H. (2012). Between agents and mean fields.
In Multi-Agent-Based Simulation XII, volume 7124 of
Lecture Notes in Artificial Intelligence, pages 113–126.
Springer.
Parunak, H., Bisson, R., and Brueckner, S. (2010). Agent
interaction, multiple perspectives, and swarming simu-
lation. In Proc. of 9th Int. Conf. on Autonomous Agents
and Multiagent Systems (AAMAS 2010), pages 549–556.
24
Parunak, H. and Brueckner, S. (2010). Multi-perspective,
multi-future modeling and model analysis. In Proceed-
ings of ICCDM, Miami, FL.
Sawyer, R. (2003). Artificial societies, multiagent systems
and the micro-macro link in sociological theory. Socio-
logical Methods & Research, 31(3):325–363.
Parunak, H., Sauter, J., and Crossman, J. (2009). Multi-
layer simulation for analyzing IED threats. In Technolo-
gies for Homeland Security, 2009. HST’09. IEEE Confer-
ence on, pages 323–330. IEEE.
Picault, S. and Mathieu, P. (2011). An interaction-oriented
model for multi-scale simulation.
In Walsh, T., ed-
itor, Twenty-Second International Joint Conference on
Artificial Intelligence, pages 332–337, Barcelona, Spain.
AAAI Press.
Poschinger, A., Kates, R., and Keller, H. (2002). Coupling
of concurrent macroscopic and microscopic traffic flow
models using hybrid stochastic and deterministic disag-
gregation. Transportation and Traffic Theory for the 21st
century.
Prévost, G., Tranouez, P., Lerebourg, S., Bertelle, C., and
Olivier, D. (2004). Ecosystem complexity described
with ontological tool for a multi-scale, multi-model ap-
proaches in distributed environment. In Jordan Inter-
national Conference on Computer Sciences and Engineer-
ing, Al-Salt, Jordan.
Pumain, D. and Louail, T. (2009). Interaction des ontolo-
gies informatique et géographique pour simuler les dy-
namiques multiscalaires.
In XVIèmes rencontres inter-
disciplinaires de Rochebrune, Ontologies et dynamique des
systèmes complexes, perspectives interdisciplinaires.
Pumain, D., Sanders, L., Bretagnolle, A., Glisse, B., and
Mathian, H. (2009). The future of urban systems: Ex-
ploratory models. In Lane, D., Pumain, D., der Leeuw,
S. V., and West, G., editors, Complexity Perspectives in
Innovation and Social Change, volume 7 of Methodos Se-
ries, pages 331–360. Springer.
Railsback, S. and Grimm, V. (2011). Agent-Based and
Individual-Based Modeling: A Practical Introduction.
Princeton University Press.
Ratzé, C., Gillet, F., Müller, J.-P., and Stoffel, K. (2007).
Simulation modelling of ecological hierarchies in con-
structive dynamical systems. Ecological Complexity,
4(1–2):13–25.
Raub, W., Buskens, V., and van Assen, M. A. (2011).
Micro-macro links and microfoundations in sociology.
The Journal of Mathematical Sociology, 35(1-3):1–25.
Razavi, S., Gaud, N., Mozayani, N., and Koukam, A.
(2011). Multi-agent based simulations using fast mul-
tipole method: application to large scale simulations of
flocking dynamical systems. Artificial Intelligence Re-
view, 35(1):53–72.
Rejniak, K. and Anderson, A. (2011). Hybrid models of
tumor growth. Wiley Interdisciplinary Reviews: Systems
Biology and Medicine, 3(1):115–125.
Resnick, M. (1994). Turtles, termites, and traffic jams: Ex-
plorations in massively parallel microworlds. Mit Press.
Rounsevell, M., Pedroli, B., Erb, K., Gramberger, M.,
Busck, A., Haberl, H., Kristensen, S., Kuemmerle, T.,
Lavorel, S., Lindner, M., et al. (2012). Challenges for
land system science. Land Use Policy.
Sawyer, R. (2001). Simulating emergence and downward
causation in small groups.
In Multi-agent-based simu-
lation, Lecture Notes in Artificial Intelligence, pages
49–67. Springer.
Scerri, D., Drogoul, A., Hickmott, S., and Padgham, L.
(2010). An architecture for modular distributed simula-
tion with agent-based models. In Proc. of 9th Int. Conf.
on Autonomous Agents and Multiagent Systems (AAMAS
2010), pages 541–548. International Foundation for Au-
tonomous Agents and Multiagent Systems.
Schaller, N., Lazrak, E., Martin, P., Mari, J., Aubry, C.,
and Benoît, M. (2012). Combining farmers’ decision
rules and landscape stochastic regularities for landscape
modelling. Landscape Ecology, 27(3):1–14.
Scheff, J., Mavroudis, P., Foteinou, P., An, G., Calvano, S.,
Doyle, J., Dick, T., Lowry, S., Vodovotz, Y., and An-
droulakis, I. (2012). A multiscale modeling approach
to inflammation: A case study in human endotoxemia.
Journal of Computational Physics.
Scheutz, M., Madey, G., and Boyd, S. (2005).
tMANS -
the multi-scale agent-based networked simulation for
the study of multi-scale, multi-level biological and so-
cial phenomena. In Spring Simulation Multiconference.
Schillo, M., Fischer, K., and Klein, C. (2001). The micro-
macro link in DAI and sociology. In Multi-Agent Based
Simulation, volume 1979 of Lecture Notes in Artificial
Intelligence, pages 133–148. Springer.
Schmidt, S., Picioreanu, C., Craenen, B., Mackay, R.,
Kreft, J., and Theodoropoulos, G. (2011). A multi-
scale agent-based distributed simulation framework for
groundwater pollution management. In 15th Interna-
tional Symposium on Distributed Simulation and Real
Time Applications (DS-RT), pages 18–27. IEEE.
Schnell, S., Grima, R., and Maini, P. (2007). Multiscale
modeling in biology. new insights into cancer illustrate
how mathematical tools are enhancing the understand-
ing of life from the smallest scale to the grandest. Amer-
ican Scientist, 95(2):134–142.
Seal,
J., Zaborina, O., An, G., et al.
J., Alverdy,
(2011). Agent-based dynamic knowledge representa-
tion of pseudomonas aeruginosa virulence activation in
the stressed gut: Towards characterizing host-pathogen
interactions in gut-derived sepsis. Theoretical Biology
and Medical Modelling, 8(1):33.
Seck, M. and Honig, H. (2012). Multi-perspective mod-
elling of complex phenomena. Computational & Math-
ematical Organization Theory, 18(1):128–144.
Seidl, R., Rammer, W., Scheller, R., and Spies, T.
(2012). An individual-based process model to simulate
landscape-scale forest ecosystem dynamics. Ecological
Modelling, 231:87–100.
Seidl, R., Rammer, W., Scheller, R., Spies, T., and Lexer,
M. (2010). A mechanistic, individual-based approach
to modeling complexity and dynamics of forest ecosys-
tems across scales. The 95th ESA Annual Meeting.
Semeniuk, C., Musiani, M., and Marceau, D. (2011). Biodi-
versity, chapter Integrating Spatial Behavioral Ecology
in Agent-Based Models for Species Conservation, pages
3–26. InTech.
Servat, D. (2000). Modélisation de dynamiques de flux par
agents. Application aux processus de ruissellement, infil-
tration et érosion. PhD thesis, Université Paris VI.
25
Servat, D., Perrier, E., Treuil, J.-P., and Drogoul, A.
(1998a). When agents emerge from agents: Introduc-
ing multi-scale viewpoints in multi-agent simulations.
In Multi-Agent Systems and Agent-Based Simulation, vol-
ume 1534 of Lecture Notes in Computer Science, pages
183–198. Springer.
Soyez, J.-B., Morvan, G., Dupont, D., and Merzouki, R.
(2013). A methodology to engineer and validate dy-
namic multi-level multi-agent based simulations.
In
Multi-Agent-Based Simulation XIII, volume 7838 of Lec-
in Artificial Intelligence, pages 130–142.
ture Notes
Springer.
Servat, D., Pierrer, E., Treuil, J., and Drogoul, A. (1998b).
Towards virtual experiment laboratories : How multi-
agent simulations can cope with multiple scales of anal-
ysis and viewpoints. In Virtual Worlds, volume 1434
of Lecture Notes in Computer Science, pages 205–217.
Springer.
Sewall, J., Wilkie, D., and Lin, M. C. (2011). Interactive
hybrid simulation of large-scale traffic. ACM Trans-
action on Graphics (Proceedings of SIGGRAPH Asia),
30(6).
Sharpanskykh, A. and Treur, J. (2011a). Group abstrac-
tion for large-scale agent-based social diffusion models.
In International conference on Privacy, security, risk and
trust and international conference on social computing,
pages 830–837. IEEE.
Sharpanskykh, A. and Treur, J. (2011b). Group abstrac-
tion for large-scale agent-based social diffusion models
with unaffected agents.
In Agents in Principle, Agents
in Practice, volume 7047 of Lecture Notes in Artificial
Intelligence, pages 129–142. Springer.
Shimoni, Y., Nudelman, G., Hayot, F., and Sealfon, S.
(2011). Multi-scale stochastic simulation of diffusion-
coupled agents and its application to cell culture simu-
lation. PloS one, 6(12):e29298.
Shnerb, N., Louzoun, Y., Bettelheim, E., and Solomon,
S. (2000). The importance of being discrete: Life al-
ways wins on the surface. Proceedings of the National
Academy of Sciences, 97(19):10322–10324.
Siebert, J. (2011). Approche multi-agent pour la multi-
modélisation et le couplage de simulations. Application à
l’étude des influences entre le fonctionnement des réseaux
ambiants et le comportement de leurs utilisateurs. PhD
thesis, Université Henri Poincaré-Nancy I.
Siebert, J., Ciarletta, L., and Chevrier, V. (2010). Agents
and artefacts for multiple models co-evolution. build-
ing complex system simulation as a set of interacting
models. In Proc. of 9th Int. Conf. on Autonomous Agents
and Multiagent Systems (AAMAS 2010), pages 509–516.
Smallwood, R., Adra,
and Khodabakshi, G.
S.,
Multiscale, multi-paradigm modelling
(2010).
embedding development
of
in tissue be-
tissues:
haviour.
http://www.dcs.shef.ac.uk/~rod/
integrative_biology/Smallwood_Cellular_
dynamics_and_tissue_behaviour.pdf.
Smallwood, R. and Holcombe, M. (2006). The epithe-
liome project: multiscale agent-based modeling of ep-
ithelial cells.
In Biomedical Imaging: Nano to Macro,
2006. 3rd IEEE International Symposium on, pages 816–
819. IEEE.
Solovyev, A., Mikheev, M., Z., L., Dutta-Moscato, J.,
Ziraldo, C., An, G., Vodovotz, Y., and Mi, Q.
(2010). SPARK: A framework for multi-scale agent-
based biomedical modeling.
International Journal of
Agent Technologies and Systems, 2(3):18–30.
Soyez, J.-B., Morvan, G., Merzouki, R., Dupont, D., and
Kubiak, P. (2011). Multi-agent multi-level modeling – a
methodology to simulate complex systems. In Proceed-
ings of the 23rd European Modeling & Simulation Sympo-
sium.
Squazzoni, F. (2008). The micro-macro link in social sim-
ulation. Sociologica, 1.
Steiniger, A., Kruger, F., and Uhrmacher, A. M. (2012).
Modeling agents and their environment in multi-level-
DEVS.
In Proc. of the Winter Simulation Conference,
pages 1–12. IEEE.
Stiegelmeyer, S. M., Giddings, M. C., et al. (2013). Agent-
based modeling of competence phenotype switching in
bacillus subtilis. Theoretical Biology and Medical Mod-
elling, 10(1):23.
Sun, T., Adra, S., Smallwood, R., Holcombe, M., and Mac-
Neil, S. (2009). Exploring hypotheses of the actions of
tgf-β 1 in epidermal wound healing using a 3d computa-
tional multiscale model of the human epidermis. PloS
one, 4(12):e8515.
Sun, X., Zhang, L., Tan, H., Bao, J., Strouthos, C., and
Zhou, X. (2012). Multi-scale agent-based brain cancer
modeling and prediction of tki treatment response: In-
corporating egfr signaling pathway and angiogenesis.
BMC bioinformatics, 13(1):218.
Tahir, H., Hoekstra, A., Lorenz, E., Lawford, P., Hose, D.,
Gunn, J., and Evans, D. (2011). Multi-scale simulations
of the dynamics of in-stent restenosis: impact of stent
deployment and design. Interface Focus, 1(3):365–373.
Taillandier, P., Vo, D.-A., Amouroux, E., and Drogoul, A.
(2010). GAMA: bringing GIS and multi-level capabil-
ities to multi-agent simulation. In European Workshop
on Multi-Agent Systems.
Taillandier, P., Vo, D.-A., Amouroux, E., and Drogoul,
A. (2012). GAMA: A simulation platform that inte-
grates geographical information data, agent-based mod-
eling and multi-scale control. In Desai, N., Liu, A., and
Winikoff, M., editors, Principles and Practice of Multi-
Agent Systems, volume 7057 of Lecture Notes in Com-
puter Science, pages 242–258. Springer.
Thorne, B., Hayenga, H., Humphrey, J., and Peirce, S.
(2011). Toward a multi-scale computational model of
arterial adaptation in hypertension: verification of a
multi-cell agent based model. Frontiers in Physiology,
2.
Torii, D., Ishida, T., Bonneaud, S., and Drogoul, A. (2005).
Layering social interaction scenarios on environmental
simulation. In Multi-Agent and Multi-Agent-Based Simu-
lation, volume 3415 of Lecture Notes in Artificial Intelli-
gence, pages 78–88. Springer.
Tranouez, P. (2005). Contribution à la modélisation et à la
prise en compte informatique de niveaux de descriptions
multiples. Application aux écosystèmes aquatiques (Peni-
cillo haere, nam scalas aufero). PhD thesis, Université
du Havre.
Tranouez, P., Bertelle, C., and Olivier, D. (2001). Chang-
ing the level of description of a fluid flow in agent-based
simulation. In ESS Conference.
26
Tranouez, P., Bertelle, C., and Olivier, D. (2006). Emer-
gent properties in natural and artificial dynamical sys-
tems, chapter Changing levels of description in a fluid
flow simulation, pages 87–99. Springer.
Wang, Z., Birch, C., and Deisboeck, T. (2008). Cross-
scale sensitivity analysis of a non-small cell lung cancer
model: linking molecular signaling properties to cellu-
lar behavior. Biosystems, 92(3):249–258.
Tranouez, P. and Dutot, A. (2009). Different goals in mul-
tiscale simulations and how to reach them. In Complex
Systems and Self-organization Modelling, Understanding
Complex Systems, pages 29–39. Springer.
Wang, Z. and Deisboeck, T. (2008). Computational mod-
eling of brain tumors: discrete, continuum or hybrid?
Scientific Modeling and Simulation, 15(1):381–393.
Tranouez, P., Lerebourg, S., Bertelle, C., and Olivier, D.
(2003). Contribution à la représentation multi-échelle
des écosystèmes aquatiques. Technique et Science Infor-
matiques, 22(4):255–259.
Wang, Z., Zhang, L., Sagotsky, J., and Deisboeck, T.
(2007). Simulating non-small cell lung cancer with a
multiscale agent-based model. Theoretical Biology and
Medical Modelling, 4.
Treuil, J.-P., Drogoul, A., and Zucker, J.-D. (2008). Modéli-
sation et simulation à base d’agents. Dunod.
Uhrmacher, A. M., Ewald, R., John, M., Maus, C.,
Jeschke, M., and Biermann, S. (2007). Combining mi-
cro and macro-modeling in DEVS for computational
biology. In Proceedings of the 39th conference on Winter
simulation, pages 871–880.
Vincenot, C., Giannino, F., Rietkerk, M., Moriya, K., and
Mazzoleni, S. (2011). Theoretical considerations on the
combined use of system dynamics and individual-based
modeling in ecology. Ecological Modelling, 222(1):210–
218.
Vo, A. (2012). An operational architecture to handle mul-
tiple levels of representation in agent-based models. PhD
thesis, Université Paris VI.
Vo, D.-A., Drogoul, A., and Zucker, J.-D. (2012a). An
operational meta-model for handling multiple scales in
agent-based simulations. In International Conference on
Computing and Communication Technologies, Research,
Innovation, and Vision for the Future (RIVF), pages 1–6,
Ho Chi Minh City. IEEE.
Vo, D.-A., Drogoul, A., Zucker, J.-D., and Ho, T.-V.
(2012b). A modelling language to represent and spec-
ify emerging structures in agent-based model. In Desai,
N., Liu, A., and Winikoff, M., editors, Principles and
Practice of Multi-Agent Systems, volume 7057 of Lecture
Notes in Computer Science, pages 212–227. Springer.
Vodovotz, Y., Csete, M., Bartels, J., Chang, S., and An, G.
(2008). Translational systems biology of inflammation.
PLoS Comput Biol, 4(4):e1000014.
Wakeland, W., Macovsky, L., and An, G. (2007). A hybrid
simulation model for studying acute inflammatory re-
sponse. In Proceedings of the 2007 spring simulation mul-
ticonference, volume 2 of SpringSim ’07, pages 39–46.
Society for Computer Simulation International.
Wang, J., Zhang, L., Jing, C., Ye, G., Wu, H., Miao,
H., Wu, Y., and Zhou, X. (2013). Multi-scale agent-
based modeling on melanoma and its related angiogen-
esis analysis. Theoretical Biology and Medical Modelling,
10(1):41.
Wedde, H. and Senge, S. (2012).
2-way evaluation of
the distributed BeeJamA vehicle routing approach. In
Proceedings of the IEEE Intelligent Vehicles Symposium,
pages 205–210.
White, B. (2007). On interpreting scale (or view) and emer-
gence in complex systems engineering. In Systems Con-
ference, 2007 1st Annual IEEE, pages 1–7. IEEE.
Xi, H. and Son, Y.-J. (2012). Two-level modeling frame-
work for pedestrian route choice and walking behav-
iors. Simulation Modelling Practice and Theory, 22:28–
46.
Zahedmanesh, H. and Lally, C. (2012). A multiscale
mechanobiological modelling framework using agent-
based models and finite element analysis: application
to vascular tissue engineering. Biomechanics and Model-
ing in Mechanobiology, 11:363–377.
Zeigler, B., Kim, T., and Praehofer, H. (2000). Theory of
Modeling and Simulation. Academic Press, 2nd edition.
Zhang, L., Athale, C., and Deisboeck, T. (2007). Devel-
opment of a three-dimensional multiscale agent-based
tumor model: Simulating gene-protein interaction pro-
files, cell phenotypes and multicellular patterns in
brain cancer. Journal of Theoretical Biology, 244(1):96–
107.
Zhang, L., Chen, L., and Deisboeck, T. (2009a). Multi-
scale, multi-resolution brain cancer modeling. Mathe-
matics and computers in simulation, 79(7):2021–2035.
Zhang, L., Jiang, B., Wu, Y., Strouthos, C., Sun, P., Su, J.,
and Zhou, X. (2011). Developing a multiscale, multi-
resolution agent-based brain tumor model by graphics
processing units. Theoretical Biology and Medical Mod-
elling, 8(1):46.
Zhang, L., Wang, Z., Sagotsky, J., and Deisboeck, T.
(2009b). Multiscale agent-based cancer modeling. Jour-
nal of Mathematical Biology, 48(4–5):545–559.
27
|
1207.0405 | 1 | 1207 | 2012-07-02T14:34:05 | MITRA: A Meta-Model for Information Flow in Trust and Reputation Architectures | [
"cs.MA"
] | We propose MITRA, a meta-model for the information flow in (computational) trust and reputation architectures. On an abstract level, MITRA describes the information flow as it is inherent in prominent trust and reputation models from the literature. We use MITRA to provide a structured comparison of these models. This makes it possible to get a clear overview of the complex research area. Furthermore, by doing so, we identify interesting new approaches for trust and reputation modeling that so far have not been investigated. | cs.MA | cs |
MITRA: A Meta-Model for Information Flow in
Trust and Reputation Architectures
netRapid GmbH & Co. KG (http://www.netrapid.de/)
Eugen Staab
[email protected]
Guillaume Muller
Work partly done at:
Escola Polit´ecnica de Sao Paulo (http://www.pcs.usp.br/~lti/) and
Commissariat `a l'´Energie Atomique (http://www-list.cea.fr/)
[email protected]
August 12, 2010
Abstract
We propose MITRA, a meta-model for the information flow in
(computational) trust and reputation architectures. On an abstract
level, MITRA describes the information flow as it is inherent in promi-
nent trust and reputation models from the literature. We use MITRA
to provide a structured comparison of these models. This makes it
possible to get a clear overview of the complex research area. Further-
more, by doing so, we identify interesting new approaches for trust and
reputation modeling that so far have not been investigated.
Keywords: Computational Trust, Reputation Systems, Meta Model.
1 Introduction
Open and decentralized systems are vulnerable to buggy or malicious agents.
To make these systems robust against malfunction, agents need the ability
to assess the reliability and attitudes of other agents in order to choose
trustworthy interaction partners. To this end, a multitude of trust and
reputation models have been and still are being proposed in the literature.
In short, each such model generally defines all or some of the three following
processes: how evidence about the trustworthiness of an agent is gathered,
how this evidence is combined into a final assessment, and how this final
assessment is used in decision-making.
Currently, it is difficult to get an overview of what has been done in
the area, and what needs to be done. The main reasons for this are: that
the proposed trust and reputation models use no common terminology; that
1
they are not compatible in their basic structure; and that their respective
contributions are evaluated against different metrics. While not considering
the last point in this article, the first two questions motivate the introduction
of an abstract model that allows researchers to organize their models in a
unified way.
To this end, we propose MITRA, a meta-model for the information flow
in computational trust and reputation architectures. MITRA formalizes and
organizes the flow of information inside and between agents. More precisely,
it describes the top-level processes to gather evidence, and to combine it
with information exchanged with other agents. MITRA makes use of four
simple concepts of information processing, namely the observation, the eval-
uation, the fusion and the filtering of information, and abstracts away from
numerical computations. Although being an abstract model, MITRA cap-
tures important concepts used by existing trust and reputation models. This
way, MITRA provides a big-picture of the trust and reputation domain and
paves the way for a structured survey of the domain.
The model is useful for the community in at least four respects. First, it
serves as a terminological and structural framework to describe new models.
Secondly, it provides a means for researchers to classify and compare existing
approaches in this domain. In addition to this, MITRA helps to identify new
approaches to model trust and reputation, as we will show in this article.
Finally, it helps newcomers to get a concise overview on the structure of
computational models of trust and reputation.
The remainder of the article is organized as follows.
In Sect. 2, we
introduce basic concepts of trust and reputation modeling. We describe
the MITRA model in Sect. 3. Following this, in Sect. 4, we use MITRA
to classify existing models and identify what has not yet been done in the
research field of trust and reputation. Finally, we review related work in
Sect. 5 and we draw conclusions in Sect. 6.
2 Basic Concepts
In this section, we describe basic concepts and notations that are used in
this article.
2.1 Trust Beliefs/Intentions/Acts and Reputation
Following [MC01], we distinguish three concepts that are often confused in
the literature: the trust belief, the trust intention and the trust act. In the
same spirit as for the BDI architecture [Rao96], raw observations are at first
evaluated and then used to form trust beliefs, which in turn, are used to
build trust intentions. Finally, these intentions can be used as one criterion
in the decision-making process, eventually leading to a trust or distrust act.
Figure 1 provides a schematic view of the trust information chain.
2
observations (obs)
evaluations (eval )
trust beliefs (tb)
trust intentions (ti )
trust acts (ta)
Figure 1: Information Chain in Trust Reasoning.
A basic trust belief, which we denote with tbΓ
θ , reflects the view of an
individual agent θ on the trustworthiness of the agents Γ. In the common
case, the set of agents Γ contains only one agent. However, trust beliefs can
also reflect how an agent θ thinks about a group of agents (see also [Hal02,
FC08]); the agents belonging to the group Γ have to be similar in some regard
and so, experiences with any of them may to some extent be evidence for the
trustworthiness of the group as a whole. For example, consider several agents
being employed by a certain company; in such a situation, the agents can be
judged in their roles as employees of this company, and their characteristics
can be "generalized" to other agents in the same company [FC08].
There is a second type of trust beliefs, which is also called "reputation":
a collective assessment of a group of agents about other agents [MFT+08].
Here, the corresponding trust beliefs are the estimate by an individual of
what could be such a shared opinion of a group of agents Θ about other
agents Γ. We denote this collective trust believe by tbΓ
Θ.
Each trust belief is relating to a certain context, for which it is valid.
The context includes a particular task, and the environmental conditions,
under which the trustee is believed (or not) to successfully carry out this
task on behalf of the trustor. We will discuss this concept of context in
more detail later. Now, for given trustor(s) Θ, trustee(s) Γ and a certain
context, there can only be one unique trust belief. This makes sure that the
trustor cannot believe that trustee(s) Γ are at the same time trustworthy and
untrustworthy concerning a context. Nevertheless, the various kinds of trust
beliefs can still be contradictory. For example, an agent can believe that the
agents that belong to a certain group are usually untrustworthy, but that
a specific agent in this group is well known and believed to be trustworthy.
The reasoning about how to deal with such situations is typically what
occurs in another process, that does not fall into the scope of this paper.
While trust beliefs are solely estimates about the trustworthiness of other
agents, the process of forming trust intentions incorporates also strategic
3
considerations or characteristics of the trustee. For example, although a
trustee believes another agent to be trustworthy, he might still be very
pessimistic about relying on this agent. When forming trust intentions, an
agent actually transforms trust beliefs, which are based on the past behavior
of other agents, into its own intended future behavior towards them. This
typically corresponds to computing the "shadow of the future" [Axe84].
Trust intentions of an agent α towards an agent γ, derived from sets of trust
beliefs, are denoted by tiγ
α.
2.2 Acquisition of Evidence
Two types of information exist that can be used as input for a trust reasoning
process. An agent can make direct observations about and evaluations of
the behavior of other agents, and it can also receive messages from other
agents that contain observations, evaluations or trust beliefs.
2.2.1 Direct Observations and Evaluations
A trust belief about an agent γ is derived from information that provides
evidence for γ's trustworthiness. We call such evidence an evaluation (see
Fig. 1). An evaluation is a subjective interpretation of a set of direct ob-
servations about γ's behavior towards some other agent δ. In other words,
the process of evaluation decides whether the observations are evidence for
(cid:104)δ,γ(cid:105)
trustworthiness of γ. We write eval
to denote an evaluation that is done
α
by agent α concerning the behavior of agent γ towards agent δ. Analogously,
the direct observations made by α on an interaction between γ and δ are
(cid:104)δ,γ(cid:105)
denoted by obs
α
.
2.2.2 Communicated Evidence
Besides directly acquired information, an agent can use information received
by messages from other agents. We introduce the notation (x)α
[θ,...,β] for a
message x that is sent by agent β to agent α through a path of transmit-
ters β (direct sender to α), . . . , θ (initial sender). We call such a message
communicated evidence. To ensure the correctness of the indicated path, ei-
ther the final receiver can assess the correctness of this chain of transmitters
(e.g., by spot-checking agents on the path and asking them whether they
have sent the message as is), or mechanisms are put in place to prove that
the message has indeed taken the indicated path and which intermediary
has made which modifications (by means of cryptography, e.g., public-key
infrastructure and signing).
Direct observations that an agent makes on its own can only be incorrect
if the sensors with which the observations were made are faulty. Commu-
nicated evidence additionally can be wrong when the sender is dishonest or
incompetent.
4
2.3 Context and Uncertainty
Each observation, evaluation, trust belief or trust intention is in general only
valuable if two pieces of information are attached to it:
1. the context to which the information applies;
2. a measure of uncertainty of the information itself.
The concept of context is a vital part for evidence-based trust reasoning.
[MC96] give the example that "one would trust one's doctor to diagnose and
treat one's illness, but would generally not trust the doctor to fly one on a
commercial airplane". If some direct observations are made in a certain con-
text, then this context should be annotated also to the evaluations (and the
trust beliefs and trust intentions) that are based on these observations. As
a result, context annotations should be propagated through the information
chain shown in Fig. 1.
A measure of uncertainty is needed to express how uncertain a piece of in-
formation is believed to be. This is especially important when a trust model
incorporates communicated evidence that may be biased or wrong. Simi-
larly to the context information, uncertainty should be propagated through
the whole information chain.
3 The Meta-Model
In this section we present MITRA, illustrated in Fig. 2. This meta-model
organizes the different ways of how the information chain of Fig. 1 can
be realized in an agent α's trust model. The agent can send all pieces of
information that occur in this information chain (the square boxes in the
Figure) to other agents; for the sake of clarity, we did not illustrate such
actions in Fig. 2.
On the top level, MITRA divides the trust modeling process into four
consecutive sub-processes:
1. observation;
2. evaluation;
3. fusion;
4. decision-making.
Let us first exemplify these sub-processes from the perspective of an
agent α, which reasons about its trust in an agent γ. In the observation
process, agent α tries to collect any form of evidence it can get to assess γ's
trustworthiness. Agent α judges the direct observations (either its own or
the communicated ones) about γ's behavior in the evaluation process. In the
5
Figure 2: Structure of MITRA for an agent α. For the sake of clarity what
is not shown in this illustration: agent α can decide to send any piece of
information occurring in the illustration to other agents.
fusion process, α can use its own evaluations, and the filtered evaluations
received from other agents, to form its trust beliefs about γ and an image of
other agents' trust beliefs about γ. Finally, in the decision-making process,
α builds its trust intentions and applies them in the respective situations.
6
actuatorsAgent αderiving trust intentionsmaking decisionsevaluating (θ)OBSERVATIONEVALUATIONFUSIONDECISION MAKINGobservingevaluating (α)forming others'trust beliefs (θ)...decision-contextavailabilityforming owntrust beliefs (α)forming collectivetrust beliefs (Θ)sensorscommunicated evidencedirectobs.information flowprocesscredibility filterinformationLegendpersonality filtersubjectivity filterinfluenceBelow, we describe each sub-process in greater detail and then have a closer
look at the issue of context-sensitivity.
3.1 Observation
During observation, agent α uses its sensors to capture information about
other agents and the environment.
In network settings for instance, sen-
sors could be network cards, that can receive or overhear packets from the
network.
In the general case, the process of direct observation is subjec-
tive, since different agents may use sensors that differ in certain respects,
for instance in quality.
As mentioned earlier, information can result from direct observation of
the environment or be received as communicated evidence. For an observa-
tion obs
, α may be the same agent as δ; in this case, α observes its own
interaction with some other agent γ, otherwise α is observing the interac-
tions of other agents.
(cid:104)δ,γ(cid:105)
α
Because communicated evidence is received from other agents, α needs to
filter the information. Communicated evidence might be incorrect for differ-
ent reasons [CP02, BS08]. First, the communicator can intentionally provide
wrong information, i.e., lie. For instance, the communicator might want to
increase its own reputation or the reputation of an acquaintance; this is
usually called "misleading propaganda". It can also try to decrease the rep-
utation of another competing agent, which is usually called "defamation".
Secondly, the communicator can provide information that is not wrong but
leads the receiver intentionally to wrong conclusions. For instance, it can
hide information, give partial information or give out-of-context informa-
tion. Finally, the communicator can unwittingly communicate untrue facts.
Note that agent β, the last agent who sent the information, needs not to be
the originator of the information [CP02], and therefore might alter the infor-
mation if it is not signed. The credibility filter should take all these aspects
into account and filter the information according to how much the sources
of this information are intended to be trusted, more precisely, whether they
are decided to be trusted. In Figure 2, this is indicated by the "influence"-
arrows from "making decisions" to the credibility filters, which exactly try
to filter out information that does not seem to be credible.
3.2 Evaluation
During the process of evaluation, an agent evaluates sets of direct obser-
vations about the behavior of other agents. Such an evaluation estimates
whether the set of observations provides evidence for the agent in ques-
tion being trustworthy or untrustworthy. At this stage, it is not yet decided
whether an agent is actually believed to be trustworthy or not; sets of obser-
vations are only examined for their significance in respect to an agent's trust-
7
worthiness. In many models, this is done by comparing the actual behavior
of an agent to what its behavior was expected to be like. This expected be-
havior can, for instance, be determined by formal contracts [Sab02] or social
norms [COTZ00, VM10]. Various representations are used to describe eval-
uations: binary (e.g., [SS02]), more fine-grained discrete (e.g., {−1, 0, +1}
in eBay [eBa09]), or continuous assessments (e.g., [Sab02, HJS04, VM10]).
As the sets of norms and established (implicit) contracts can be subjec-
tive, an evaluation can be subjective too. Therefore, different agents might
contradictorily interpret the same observations as evidence for trustworthy
and untrustworthy behavior. This is evident in the case of eBay [eBa09]
where each human does the evaluation along his own criteria. As a con-
sequence, an agent can try to emulate how other agents would evaluate
observations, to eventually emulate their trust beliefs. Therefore, MITRA
contains two different ways of evaluation (see Fig. 2): using α's criteria,
which results in evaluations eval
; and the way α thinks θ would do the
.
evaluation, which results in eval
(cid:104)δ,γ(cid:105)
α
(cid:104)δ,γ(cid:105)
θ
For evaluation, it can be vital to know about the causality behind what
happened. Indeed, if the causal relationships are not clear to the evaluating
agent, it can wrongly evaluate a failure to be evidence for untrustworthiness,
although it is actually an excusable failure -- or vice versa [CF00, SE07].
3.3 Fusion
In a third step, the different evaluations are fused into trust beliefs. Trust
beliefs can be formed based on evaluations of individual agents or groups
of agents, and can be about individuals or groups. Figure 2 shows that an
agent α can fuse evaluations to get its own trust beliefs tbΓ
α; or to emulate
the trust modeling of another agent θ, in order to estimate this agent's θ's
trust beliefs tbΓ
received from
another agent β, it first needs to filter out the "incompatible" subjectivity
inherent in the evaluations: For evaluation, β may have applied criteria that
α does not agree with, or -- when α is emulating the trust beliefs of θ -- where
α thinks that θ would not agree with. In the figure, the check for the match
of the applied criteria, and the potential adjustment of the evaluations, is
named subjectivity filtering.
(cid:104)··· (cid:105)
θ . In any case, if α uses evaluations eval
β
The emulation of another agent θ's trust beliefs is for instance needed
when forming reputation, i.e., trust beliefs that a certain group of agents Θ
(with θ ∈ Θ) would associate to a given trustee. For this, also trust beliefs
received from other agents can be incorporated. A subjectivity filter should
not be applied to these received trust beliefs, because reputation reflects the
subjectivity of different agents. Still, a credibility filter is applied to avoid
a biased reputation estimate.
Furthermore, if an agent forms trust beliefs based on interactions where
itself was not involved, it has to account for the relation between the inter-
8
(cid:104)δ,γ(cid:105)
θ
acting agents. Assume, an agent α receives from another agent the evalua-
tion eval
, where all four agents α, θ, δ, and γ are distinct agents. If α
wants to reason about δ's trustworthiness towards itself, then it first needs
to apply a personality filter. Here, information is filtered out that contains
no evidence for the behavior of δ towards α, because it is specific for in-
teractions between δ and γ. For example, imagine that the evaluation is
about the behavior of a mother (δ) towards her child (γ), and she behaved
very trustworthy. Then this behavior does not say much about how the
mother will behave towards another unrelated person (e.g., α). This shows
that trustworthiness is directed, and that this direction has to be taken into
account in trust reasoning.
Whenever fusing sets of evaluations or trust beliefs into a single trust
belief, it is particularly important to account for the "correlated evidence"
problem [Pea88]. This problem arises when different evaluations or trust
beliefs are based on the same observed interactions of agents.
In other
words, the evidence expressed by the evaluations/trust beliefs "overlaps".
If the reasoning agent is not aware of this overlapping, certain parts of the
evidence will wrongly be amplified and the resulting trust belief be biased.
Many different approaches for fusing evaluations into trust beliefs (e.g.,
[WS07, TPJL06a, RRRJ07]), and trust beliefs into community models (e.g.,
[KSGM03, SFR99]) have been proposed in the literature. Most importantly,
each trust belief should incorporate the two properties mentioned in Sect.
2.3: the uncertainty, i.e., how strong the belief is, and in which context(s)
it applies.
3.4 Decision-Making
The last component in MITRA is the decision-making process, which con-
sists of two steps:
1. fix trust intentions based on trust beliefs;
2. apply the trust intentions to make the final decision to act (or not) in
trust.
In the first step, a set of individual and/or collective trust beliefs are used
to derive one or several trust intentions for different contexts. Trust beliefs
can, for instance, be aggregated into trust intentions by simply averaging
over them, or by taking the most "pessimistic" or "optimistic" trust belief,
etc. But also, it is possible to ignore available negative trust beliefs about
another agent γ, and to decide to act in trust with γ in order to give this
agent the opportunity to rethink its behavior [FC04]. This "advance" in
trust, which can in some cases be forgiveness, accounts for the dynamics of
trust such as "trust begets trust" [BE89].
9
A trust intention tiγ
α has to reflect two things:
in which situations α
actually intends to act in trust with γ (context), and how strong the intention
is (uncertainty). Trust intentions with these two properties can be used in
decision-making in the same way as other criteria. Although many trust
and reputation models from the literature do not separate the derivation
of trust intentions from the process of decision-making, we strongly argue
for a separation of the two processes. The reason is that the derivation of
trust intentions is specific to trust research, while a trust intention plays in
decision making the role of a context-sensitive criterion in the same way as
many other criteria (like availability of a potential partner). This problem is
however studied in depth in a research area called Multiple Criteria Decision
Making (MCDM) [Kal06] and is not specific to trust.
3.5 Context in MITRA
In general, everything that can impact the behavior of a trustee and is not
part of the trustee itself, is said to belong to the context [Dey00]. The more
of the available context information is considered by a trust and reputation
model, the better the final decision can be. We propose to arrange the
different facets of context into five classes:
1. time (points in time or time intervals);
2. external conditions:
(a) physical conditions,
(b) laws/norms,
(c) other agents nearby;
3. type of the delegated task;
4. contract;
5. information source.
The information source is the one that provides the information, on
which the reasoning is based, e.g., a sensor or another agent. This context
facet is a special case, because it is not linked to a trustee's behavior. It
is important though, since it allows an agent to have several trust beliefs
about the same trustee, based on different information sources.
Two different contexts can be distinguished: the one in which the in-
formation was taken, and the one in which a decision is made (decision
context). To fuse information that comes from different contexts, or use it
in decision-making for different contexts, an agent needs to know how simi-
lar the different contexts are. In the literature, many ways for representing
context information, and similarities between contexts, have been proposed.
10
[KR03] represent context relations in form of a weighted directed graph.
[S¸Y07] use ontologies and a set of rules to represent context information.
In a more general way, [RP07] represent context information as points in a
multi-dimensional space, where each dimension represents one characteris-
tic of the context (e.g., the point in time, the dollar exchange rate, etc.).
The distance between two points in the context space, which is determined
by some distance metric, states the similarity of the two contexts. These
approaches have in common that an agent was given some similarity metric
about different contexts in advance. MITRA does not assume that, and so,
if the similarity metric cannot be known in advance, an agent needs to learn
the metric.
At which stage information that belongs to different contexts is eventu-
ally fused, is up to the concrete model. However, since during this fusion
process some information is lost, it should be done as late as possible in
the information chain. As a consequence, that principle should generally be
used when processing information.
4 Organizing Existing Models
In this section, we exemplify how existing trust and reputation (T&R) mod-
els can be classified by means of MITRA. The approach we take here is to
investigate which types of data are used in the considered trust models. For
a small selection of trust models, this is shown in tables 1 and 2. Table 1 lists
types of data that belong to the observation process. Table 2 lists the re-
maining data types, i.e. those in the evaluation, fusion and decision-making
processes. A check-mark indicates whether a trust model accounts for the
respective kind of data. Still, not every model accounts for the context and
uncertainty of the processed information.
Additionally to this classification approach, T&R models can also be
described by specifying:
1. which filters are applied,
2. where uncertainty is considered, and
3. which facets of context are accounted for at which stage.
Since the focus of this article lies on the meta model MITRA itself, we
leave it to future work to provide an extensive and comprehensive classifica-
tion using MITRA. However, as it can already be seen in the resulting tables,
a clear picture emerges of what has been done (columns with check-marks)
and what needs to be done in the T&R modeling domain -- for example,
there is no model with no empty columns, i.e., that uses all available types
(cid:104)δ,γ(cid:105)
of information. Furthermore, the column eval
is always empty. None of
θ
11
]
.
.
.
,
β
α [
(cid:1)
ΓΘ
b
t
(cid:0)
]
.
.
.
,
β
α [
(cid:1)
Γθ
b
t
(cid:0)
d
b
(cid:88)
b
(cid:88)
b
(cid:88)
b
(cid:88)
b
(cid:88)
b
a
(cid:88)
b
(cid:88)
b
(cid:88)
b
(cid:88)
b
(cid:88)
b
(cid:88)
(cid:88)
θ
(cid:88)
c
(cid:88)
(cid:88)
(cid:88)
(cid:88)
(cid:88)
(cid:88)
(cid:88)
(cid:88)
(cid:88)
(cid:88)
]
.
.
.
,
β
α [
n
o
i
t
a
v
r
e
s
b
O
.
)
n
o
i
(cid:17)
t
a
(cid:105)
v
γ
,
r
δ
e
(cid:104)
s
b
O
(cid:16)
(
A
R
T
I
M
(cid:17)
h
(cid:105)
γ
t
,
i
δ
w
(cid:104)
n
o
(cid:16)
i
t
a
c
fi
i
s
s
a
l
C
:
1
e
l
b
a
T
l
a
v
e
]
.
.
.
,
β
α [
θ
s
b
o
>
γ
,
δ
<
α
s
b
o
(cid:88)
(cid:88)
(cid:88)
(cid:88)
(cid:88)
(cid:88)
(cid:88)
(cid:88)
(cid:88)
(cid:88)
(cid:88)
(cid:88)
a
(cid:88)
]
4
9
r
a
M
[
h
s
r
a
M
]
9
9
R
F
S
[
.
l
a
t
e
o
l
l
i
h
c
S
]
9
9
P
M
Z
[
]
9
9
P
M
Z
[
s
o
t
s
i
H
s
a
r
o
p
S
]
2
0
I
J
[
m
e
t
s
y
S
.
p
e
R
-
a
t
e
B
]
2
0
S
S
[
a
j
j
a
S
d
n
a
n
e
S
]
3
0
G
S
K
[
t
s
u
r
T
n
e
g
E
i
]
3
0
M
S
[
t
e
r
g
e
R
]
3
0
+
S
G
C
[
e
r
u
c
e
S
]
3
0
V
W
[
a
v
e
l
i
s
s
a
V
d
n
a
g
n
a
W
]
4
0
L
X
[
t
s
u
r
T
r
e
e
P
]
6
0
M
C
[
i
s
e
l
o
s
u
M
d
n
a
a
r
p
a
C
]
b
6
0
L
J
P
T
[
s
o
v
a
r
T
]
7
0
J
R
R
R
[
.
l
a
t
e
e
c
e
e
R
]
7
0
Y
S¸
[
m
u
l
o
Y
d
n
a
y
o
s
n
e
S¸
]
7
0
S
W
[
h
g
n
i
S
d
n
a
g
n
a
W
]
8
0
C
F
[
i
h
c
n
a
r
f
l
e
t
s
a
C
d
n
a
e
n
o
c
l
a
F
]
0
1
M
V
[
r
a
L
i
]
0
1
C
M
V
[
.
l
a
t
e
s
i
z
t
a
i
g
o
V
1
=
Γ
f
o
e
s
a
c
e
h
t
g
n
i
r
e
d
i
s
n
o
c
y
l
n
o
b
y
l
t
i
c
i
l
p
m
i
a
r
e
t
n
e
c
g
n
i
t
a
r
l
a
r
t
n
e
c
a
o
t
d
e
t
t
i
m
b
u
s
c
r
e
t
n
e
c
g
n
i
t
a
r
l
a
r
t
n
e
c
a
y
b
d
e
d
i
v
o
r
p
d
12
.
)
g
n
i
k
a
M
-
n
o
i
s
i
c
e
D
,
n
o
i
s
u
F
,
n
o
i
t
a
u
l
a
v
E
(
A
R
T
I
M
h
t
i
w
n
o
i
t
a
c
fi
i
s
s
a
l
C
:
2
e
l
b
a
T
γα
i
t
(cid:88)
(cid:88)
(cid:88)
(cid:88)
(cid:88)
(cid:88)
a
(cid:88)
a
(cid:88)
g
n
i
k
a
M
-
n
o
i
s
i
c
e
D
n
o
i
s
u
F
ΓΘ
b
t
Γθ
b
t
Γα
b
t
a
(cid:88)
a
(cid:88)
a
(cid:88)
b
a
(cid:88)
a
a
(cid:88)
(cid:88)
a
(cid:88)
a
(cid:88)
a
(cid:88)
a
a
a
a
a
a
a
a
a
(cid:88)
(cid:88)
(cid:88)
(cid:88)
(cid:88)
(cid:88)
(cid:88)
(cid:88)
(cid:88)
(cid:88)
a
a
(cid:88)
(cid:88)
(cid:105)
γ
,
δ
(cid:104)
θ
l
a
v
e
n
o
i
t
a
u
l
a
v
E
(cid:105)
γ
,
δ
(cid:104)
α
l
a
v
e
(cid:88)
(cid:88)
(cid:88)
(cid:88)
(cid:88)
(cid:88)
(cid:88)
(cid:88)
(cid:88)
(cid:88)
(cid:88)
(cid:88)
(cid:88)
(cid:88)
(cid:88)
(cid:88)
(cid:88)
]
4
9
r
a
M
[
h
s
r
a
M
]
9
9
R
F
S
[
.
l
a
t
e
o
l
l
i
h
c
S
]
9
9
P
M
Z
[
]
9
9
P
M
Z
[
s
o
t
s
i
H
s
a
r
o
p
S
]
2
0
I
J
[
m
e
t
s
y
S
.
p
e
R
-
a
t
e
B
]
2
0
S
S
[
a
j
j
a
S
d
n
a
n
e
S
]
3
0
G
S
K
[
t
s
u
r
T
n
e
g
E
i
]
3
0
M
S
[
t
e
r
g
e
R
]
3
0
+
S
G
C
[
e
r
u
c
e
S
]
3
0
V
W
[
a
v
e
l
i
s
s
a
V
d
n
a
g
n
a
W
]
4
0
L
X
[
t
s
u
r
T
r
e
e
P
]
6
0
M
C
[
i
s
e
l
o
s
u
M
d
n
a
a
r
p
a
C
]
b
6
0
L
J
P
T
[
s
o
v
a
r
T
]
7
0
J
R
R
R
[
.
l
a
t
e
e
c
e
e
R
]
7
0
Y
S¸
[
m
u
l
o
Y
d
n
a
y
o
s
n
e
S¸
]
7
0
S
W
[
h
g
n
i
S
d
n
a
g
n
a
W
]
8
0
C
F
[
i
h
c
n
a
r
f
l
e
t
s
a
C
d
n
a
e
n
o
c
l
a
F
]
0
1
M
V
[
r
a
L
i
]
0
1
C
M
V
[
.
l
a
t
e
s
i
z
t
a
i
g
o
V
r
e
t
n
e
c
g
n
i
t
a
r
l
a
r
t
n
e
c
y
b
d
e
m
r
o
f
r
e
p
n
o
i
t
a
t
u
p
m
o
c
b
1
=
Γ
f
o
e
s
a
c
e
h
t
g
n
i
r
e
d
i
s
n
o
c
y
l
n
o
a
13
the here considered trust models1 uses the intermediate step of simulating
the evaluation of another agent to eventually form a collective trust belief
(reputation). However, we believe that this is something what humans do
regularly; for example in form of questions like "What would my mother
think about his behavior?" or "How would my best friend judge this agent's
behavior?". This issue deserves more attention as it makes it possible to
evaluate the behavior of other agents in cases where an own opinion on
their behavior is lacking.
5 Related Work
Numerous survey or overview papers on trust and reputation models have
been published. Many works start with a basic classification and then
enumerate and describe existing models [SMS05, AG07, JIB07, RHJ04,
MHM02]. Opposed to that, we tried in our work to use a rigorous method-
ology for the organization of the state of the art: extract the core structure
of prominent trust and reputation models, in order to get clear and simple
differentiation criteria for the models of the literature.
[KBR05] proposed a generic trust model that integrates several existing
trust models. They show how to map each of these models to their model.
However, they focus on the fusion of evaluations, whereas we examined the
overall structure of trust and reputation modeling.
[CS05] define a functional ontology of reputation, that is used in different
systems [VCSB07, NBSV08] in order to help agents using different trust
and reputation models inter-operate. These approaches try to cope with a
situation where different models exist, whereas we try to propose a unified
meta-model of trust and reputation.
6 Conclusion
In this article, we presented MITRA, a meta-model for trust and reputation.
The model structures many essential concepts found in the literature on
evidence-based T&R models. The simple and generic structure of MITRA
makes it suitable both for experts to organize their models in a common
way, and for newcomers to easily enter the domain. Although there is the
possibility that a specific T&R model does not comply with MITRA, the
fact that the latter was derived from the study of many existing models
argues for its comprehensiveness, and we believe that its modularity should
make it simple to modify in order to encompass new elements.
Finally, by using MITRA, we classified existing T&R models from the
literature. This classification revealed which kinds of information are com-
1To our knowledge there is no such trust model in the literature.
14
monly used by these models, and which kinds of information are often ne-
glected. In this way, we found that none of the considered models actually
tries to emulate another agent's evaluation of a trustee; this emulation would
make it possible to form the reputation of an agent in a new way.
References
[AG07]
D. Artz and Y. Gil, A survey of trust in computer science and
the semantic web, Web Semant. 5 (2007), no. 2, 58 -- 71.
[Axe84]
R. Axelrod, The evolution of cooperation, Basic Books, 1984.
[BE89]
[BS08]
[CF00]
J. L. Bradach and R. G. Eccles, Price, authority, and trust:
From ideal types to plural forms, Annu. Rev. Sociol. 15 (1989),
97 -- 118.
P. Barreira-Avegliano and J. S. Sichman, Reputation based part-
nership formation: some experiments using the repart simulator,
Proc. of the Wksh. on Trust in Agent Societies (at AAMAS'08),
2008.
C. Castelfranchi and R. Falcone, Trust is much more than sub-
jective probability: Mental components and sources of trust,
Proc. of the 33rd Hawaii
Int. Conf. on System Sciences
(HICSS'00), 2000.
[CGS+03] V. Cahill, E. Gray, J.-M. Seigneur, C. D. Jensen, Y. Chen,
B. Shand, N. Dimmock, A. Twigg, J. Bacon, C. English,
W. Wagealla, S. Terzis, P. Nixon, G. di Marzo Serugendo,
C. Bryce, M. Carbone, K. Krukow, and M. Nielsen, Using trust
for secure collaboration in uncertain environments, IEEE Per-
vasive Computing 02 (2003), no. 3, 52 -- 61.
[CM06]
L. Capra and M. Musolesi, Autonomic trust prediction for per-
vasive systems, Proc. of the 20th Int. Conf. on Advanced Infor-
mation Networking and Applications (Vol. 2) (AINA'06), 2006,
pp. 481 -- 488.
[COTZ00] C. Castelfranchi, A. Omicini, R. Tolksdorf, and F. Zambonelli,
Engineering social order, Proc. of Engineering Societies in the
Agents World (ESAW'00), LNCS, vol. 1972, 2000, pp. 1 -- 18.
[CP02]
R. Conte and M. Paolucci, Reputation in artificial societies. so-
cial beliefs for social order, Kluwer Academic Publishers, 2002.
15
[CS05]
[Dey00]
[eBa09]
[FC04]
[FC08]
[Hal02]
[HJS04]
[JI02]
[JIB07]
[Kal06]
S. Casare and J. Sichman, Towards a functional ontology of rep-
utation, Proc. of Autonomous Agents and Multi-Agent Systems
(AAMAS'05), 2005, pp. 505 -- 511.
A. K. Dey, Providing architectural support for building context-
aware application, Ph.D. thesis, College of Computing, Georgia
Institute of Technology, 2000.
eBay, eBay auction website, accessed April, 15, 2009, http:
//www.ebay.com.
R. Falcone and C. Castelfranchi, Trust dynamics: How trust is
influenced by direct experiences and by trust itself, Proc. of Au-
tonomous Agents and Multi-Agent Systems (AAMAS'04), 2004,
pp. 740 -- 747.
Rino Falcone and Cristiano Castelfranchi, Generalizing trust:
Inferencing trustworthiness from categories, Trust in Agent So-
cieties, LNCS (LNAI), vol. 5396, 2008, pp. 65 -- 80.
David Hales, Group reputation supports beneficent norms, Jour-
nal of Artificial Societies and Social Simulation 5 (2002), no. 4.
T. D. Huynh, N. R. Jennings, and N. Shadbolt, FIRE: an in-
tegrated trust and reputation model for open multi-agent sys-
tems, Proc. of the 16th European Conf. on Artificial Intelligence
(ECAI'04), 2004.
A. Jøsang and R. Ismail, The beta reputation system, Proc. of
the 15th Bled Conf. on Electronic Commerce, 2002, pp. 324 -- 337.
A. Jøsang, R. Ismail, and C. Boyd, A survey of trust and repu-
tation systems for online service provision, Decis. Support Syst.
43 (2007), no. 2, 618 -- 644.
I. Kaliszewski, Soft computing for complex multiple criteria de-
cision making, International Series in Operations Research &
Management Science, vol. 85, Springer Verlag, 2006.
[KBR05] M. Kinateder, E. Baschny, and K. Rothermel, Towards a generic
trust model -- comparison of various trust update algorithms,
Proc. of the 3rd Int. Conf. on Trust Management (iTrust'05),
2005, pp. 177 -- 192.
[KR03]
M. Kinateder and K. Rothermel, Architecture and algorithms
for a distributed reputation system, Proc. of the 1st Int. Conf.
on Trust Management (iTrust'03), 2003, pp. 1 -- 16.
16
[KSG03]
S.D. Kamvar, M.T. Schlosser, and H. Garcia-Molina, The eigen-
trust algorithm for reputation management in p2p networks,
Proc. of the 12th Int. World Wide Web Conference, 2003,
pp. 640 -- 651.
[KSGM03] S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina, The
eigentrust algorithm for reputation management in p2p net-
works, Proc. of the 12th Int. World Wide Web Conf. (WWW'03),
2003, pp. 640 -- 651.
[Mar94]
[MC96]
[MC01]
S. P. Marsh, Formalising trust as a computational concept, Ph.D.
thesis, Department of Computing Science and Mathematics,
University of Stirling, 1994.
D.H. McKnight and N.L. Chervany, The meanings of trust, Tech.
report, University of Minnesota, 1996.
, Trust and distrust definitions: One bite at a time, Proc.
of the 4th Wksh. on Deception, Fraud, and Trust in Agent So-
cieties (at AAMAS'01), 2001, pp. 27 -- 54.
[MFT+08] G. A. Miller, C. Fellbaum, R. Tengi, P. Wakefield, H. Langone,
and B. R. Haskell, Wordnet 3.0, "reputation" definition #3,
Princeton University, accessed 12/08 2008.
[MHM02] L. Mui, A. Halberstadt, and M. Mohtashemi, Notions of repu-
tation in multi-agent systems: A review, Proc. of Autonomous
Agents and Multi-Agent Systems (AAMAS'02), 2002, pp. 280 --
287.
[NBSV08] L. G. Nardin, A. A. F. Brandao, J.S. Simao Sichman, and Lau-
rent Vercouter, A service-oriented architecture to support agent
reputation models interoperability, Proc. of WONTO'08, 2008.
[Pea88]
[Rao96]
J. Pearl, Probabilistic reasoning in intelligent systems: networks
of plausible inference, Morgan Kaufmann Publishers Inc., 1988.
A. S. Rao, AgentSpeak(L): BDI agents speak out in a logi-
cal computable language, Proc. of the 7th Wksh. on Modelling
Autonomous Agents in a Multi-Agent World (MAAMAW'96),
LNAI, 1996, pp. 42-55.
[RHJ04]
S. D. Ramchurn, T. D. Huynh, and N. R. Jennings, Trust in
multi-agent systems, Knowl. Eng. Rev. 19 (2004), no. 1, 1 -- 25.
[RP07]
M. Reh´ak and M. Pechoucek, Trust modeling with context repre-
sentation and generalized identities, Proc. of the 11th Int. Wksh.
on Cooperative Information Agents (CIA'07), 2007, pp. 298 -- 312.
17
[RRRJ07] Steven Reece, Stephen Roberts, Alex Rogers, and Nicholas R.
Jennings, A multi-dimensional trust model for heterogeneous
contract observations, Proc. of the 22nd Conf. on Artificial In-
telligence (AAAI'07), AAAI Press, 2007, pp. 128 -- 135.
[Sab02]
[SE07]
J. Sabater-Mir, Trust and reputation for agent societies, Ph.D.
thesis, Artificial Intelligence Research Institute, Universitat
Aut`onoma de Barcelona, Spain, 2002.
E. Staab and T. Engel, Formalizing excusableness of failures in
multi-agent systems, Proc. of the 10th Pacific Rim International
Wksh. on Multi-Agents (PRIMA'07), 2007, pp. 124 -- 135.
[SFR99] M. Schillo, P. Funk, and M. Rovatsos, Who can you trust:
Dealing with deception, Proc. of the 2nd Wksh. on Deception,
Fraud, and Trust in Agent Societies (at AA'99) (C. Castel-
franchi, Y. Tan, R. Falcone, and B. S. Firozabadi, eds.), May
1999, pp. 81 -- 94.
[SM03]
J. Sabater-Mir, Trust and reputation for agent societies, Ph.D.
thesis, Institut d'Investigaci´o en Intel·lig`encia Artificial, 2003.
[SMS05]
J. Sabater-Mir and C. Sierra, Review on computational trust and
reputation models, Artif. Intell. Rev. 24 (2005), no. 1, 33 -- 60.
[SS02]
[S¸Y07]
S. Sen and N. Sajja, Robustness of reputation-based trust:
boolean case, Proc. of Autonomous Agents and Multi-Agent Sys-
tems (AAMAS'02), 2002, pp. 288 -- 293.
M. S¸ensoy and P. Yolum, Ontology-based service representation
and selection, IEEE Trans. Knowl. Data Eng. 19 (2007), no. 8,
1102 -- 1115.
[TPJL06a] W. T. L. Teacy, J. Patel, N. R. Jennings, and M. Luck,
TRAVOS: Trust and reputation in the context of inaccurate in-
formation sources, Auton. Agents Multi-Agent Syst. 12 (2006),
no. 2, 183 -- 198.
[TPJL06b] W.T.L. Teacy, J. Patel, N.R. Jennings, and M. Luck, Travos:
Trust and reputation in the context of inaccurate information
sources, Auton. Agents Multi-Agent Syst. 12 (2006), no. 2, 183 --
198.
[VCSB07] L. Vercouter, S. J. Casare, J. S. Sichman, and A. A. F. S.
Brandao, An experience on reputation models interoperability
based on a functional ontology, Proc. of the 20th Int. Joint Conf.
on Artificial Intelligence (IJCAI'07), 2007, pp. 617 -- 622.
18
[VM10]
L. Vercouter and G. Muller, L.I.A.R.: Achieving social control
in open and decentralised multi-agent systems, Applied Artificial
Intelligence (2010).
[VMC10] George Vogiatzis, Ian MacGillivray, and Maria Chli, A prob-
abilistic model for trust and reputation, Proc. of 9th Int. Conf.
on Autonomous Agents and Multi-Agent Systems (AAMAS'10),
2010, pp. 225 -- 232.
[WS07]
[WV03]
Yonghong Wang and Munindar P. Singh, Formal trust model
for multiagent systems, Proc. of the 20th Int. Joint Conf. on
Artificial Intelligence (IJCAI'07), 2007, pp. 1551 -- 1556.
Yao Wang and Julita Vassileva, Bayesian network-based trust
model, Proceedings of the 2003 IEEE/WIC International Con-
ference on Web Intelligence (WI'03) (Washington, DC, USA),
IEEE Computer Society, 2003, p. 372.
[XL04]
Li Xiong and Ling Liu, Peertrust: Supporting reputation-
based trust for peer-to-peer electronic communities, IEEE Trans.
Knowl. Data Eng. 16 (2004), no. 7, 843 -- 857.
[ZMP99] G. Zacharia, A. Moukas, and P. Paes, Collaborative reputa-
tion mechanisms in electronic marketplaces, Proceedings of the
Thirty-second Annual Hawaii International Conference on Sys-
tem Sciences-Volume 8, IEEE Computer Society, 1999.
19
|
0705.3050 | 1 | 0705 | 2007-05-22T14:26:05 | A competitive multi-agent model of interbank payment systems | [
"cs.MA"
] | We develop a dynamic multi-agent model of an interbank payment system where banks choose their level of available funds on the basis of private payoff maximisation. The model consists of the repetition of a simultaneous move stage game with incomplete information, incomplete monitoring, and stochastic payoffs. Adaptation takes place with bayesian updating, with banks maximizing immediate payoffs. We carry out numerical simulations to solve the model and investigate two special scenarios: an operational incident and exogenous throughput guidelines for payment submission. We find that the demand for intraday credit is an S-shaped function of the cost ratio between intraday credit costs and the costs associated with delaying payments. We also find that the demand for liquidity is increased both under operational incidents and in the presence of effective throughput guidelines. | cs.MA | cs |
A competitive multi-agent model of interbank
payment systems
Marco Galbiati† and Kimmo Soramaki‡
14 May 2007
Abstract
We develop a dynamic multi-agent model of an interbank payment
system where banks choose their level of available funds on the basis of
private payoff maximisation. The model consists of the repetition of a
simultaneous move stage game with incomplete information, incomplete
monitoring, and stochastic payoffs. Adaptation takes place with bayesian
updating, with banks maximizing immediate payoffs. We carry out nu-
merical simulations to solve the model and investigate two special sce-
narios: an operational incident and exogenous throughput guidelines for
payment submission. We find that the demand for intraday credit is an
S-shaped function of the cost ratio between intraday credit costs and the
costs associated with delaying payments. We also find that the demand for
liquidity is increased both under operational incidents and in the presence
of effective throughput guidelines.
† Bank of England. E-mail: [email protected].
The views expressed in this paper are those of the authors, and not nec-
essarily those of the Bank of England.
‡ Helsinki Univ. of Technology. E-mail: [email protected].
The authors thank W. Beyeler, M. Manning, S. Millard, M. Willison
for important insights. Useful comments came from the participants of a
number of seminars: FS seminar (Bank of England, May 3, 2007), Central
Bank Policy Workshop (Basel, March 13, 2007), University of Liverpool,
Seimnar at the Computer Science Department (Liverpool, April 24, 2007).
The usual disclaimer applies.
1
1 Introduction
Virtually all economic activity is facilitated by transfers of claims towards public
or private financial institutions. The settlement of claims between banks takes to
a large extent place at the central bank, in central bank money. These interbank
payment systems transfer vast amounts of funds, and their smooth operation is
critical for the functioning of the whole financial system. In 2004, the annual
value of interbank payments made in the European TARGET was around $552
trillion, in the US Fedwire system $470 trillion, and in the UK CHAPS $59
trillion - tens of times the value of their respective gross domestic products (BIS
2006). These transfers originate from customer requests, and from the banks'
proprietary operations in e.g.
foreign exchange, securities and the interbank
money market. The sheer size of these transfers, and their centrality for the
functioning of a number of markets, make the mechanisms that regulate these
fluxes and the incentives that generate them interesting to policy makers and
regulators.
At present most payment systems work on a real-time gross settlement
(RTGS) or equivalent modality.
In RTGS payments are settled continuously
and individually throughout the day with immediate finality. To cover the pay-
ments banks generally use their reserve balances, access intraday credit from
the central bank or use incoming funds from payments from other banks. The
first two sources carry an (opportunity) cost which gives banks incentives to
economize on their use. We call these funds liquidity. The third source, on the
other hand, is dependent by the liquidity decisions of other banks. The less
liquidity a bank commits for settlement, the more dependent it is from incom-
ing payments - and may thus need to delay its own payments until these funds
arrive, causing the receivers of its payments to receive funds later. If also delays
are costly, each bank faces a trade-off between liquidity costs and delay costs.
Both aspects are dependent on the banks own liquidity decision, but the latter
is also dependent on the liquidity decisions by other banks.
This paper develops a dynamic model to study this trade-off. The model
consists of a sequence of independent settlement days where a set of homogenous
banks make payments to each other. Each of these days is a simultaneous-move
game (or a stage game) in which banks choose their level of liquidity for payment
processing. At the end of the day they receive a stochastic payoff determined
by the amount of liquidity they committed and delays they experienced. Due
to the nature of the settlement process, the payoff function is a random variable
unknown to the banks. In this context, a reasonable assumption is that banks
use heuristic, bounded-rational like rules to adapt their behaviour over time.
Hence, we simulate a learning process taking place over many days, until banks
settle down in equilibria. We are interested in the properties of the equilib-
ria in aggregate terms, i.e.
in the behaviour of the system as the product of
independent, single agents' private payoff maximization.
Given its game-theoretic approach, this paper is related to recent work by
Angelini (1998), Bech and Garratt (2003, 2006), Buckle and Campbell (2003)
and Willison (2004). These study various "liquidity management games" with
2
few (typically, two) agents and few (typically, three) periods. There, however,
the payoff function is common knowledge. Due to the complex mechanics taking
place in real payment systems this is likely to be unrealistic. Recent work
by Beyeler et al.
(2007) on the relationship between instruction arrival and
payment settlement in a similar setting shows that with low liquidity, payment
settlement gets coupled across the network and is governed by the dynamics
of the queue - and largely unpredictable when a large number of payments
are made. The present paper makes an effort to model this complexity; in a
similar spirit, it also considers a large number of banks, which settle payments
in a continuous-time day, and which interact over a long sequence of settlement
days.
Recently, a growing literature has used simulation techniques to investigate
the effects e.g. of failures in complex payment systems (see eg. BoE (2004),
Leinonen (2005), Devriese and Mitchell (2005)). These studies generally use
historical payment data and simulate banks' risk exposures under alternative
scenarios, or ways to improve liquidity efficiency of the systems. The shortcom-
ing of this approach has been that the behaviour of banks is not endogenously
determined. It is either assumed to remain unchanged or to change in a prede-
termined manner.
The present paper tries to overcome some of the shortcomings of both "game
theoretic" and "simulation" approaches by modelling banks as learning agents.
Agents who learn about each others' actions through repeated interaction is a
recurring theme in evolutionary game theory. In one strand of the literature1 the
agents know their payoff function, and learn about others' behaviour. They do
so playing the stage game repeatedly, while choosing their actions on the basis
of adaptive rules of the type "choose a best reply to the current strategy profile"
or "choose a best reply to the next expected strategy profile". Results obtained
in this strand cannot be immediately applied here: banks cannot choose best
replies as they do not know their payoff function. A second research line does
not require knowledge of the payoff function on the part of the learners; they
are instead of the kind "adopt more frequently an action that has produced
a high payoff in the past". The main results of this literature are about the
convergence (or non-convergence) of actions to equilibria of the stage game.
The approach adopted here is close to the latter. However, because the pay-
offs are calculated on the basis of a settlement algorithm, we cannot analytically
calculate the equilibria ex-ante, and then demonstrate convergence (or the lack
of it). Instead, we show convergence by means of simulations, inferring then
that the attraction points are equilibria of the stage game - in a sense that
we make precise. Because the payoff function is stochastic and unknown, the
problem of each optimizing bank lends itself to a heuristic approach. From this
perspective, our work bears strong links to the reinforcement learning litera-
ture2. From an individual agent's perspective it relates it relates to operations
research, where a typical problem is that of maximizing an unknown function.
1E.g. fictitious play, following Brown (1951)
2See Sutton and Barto (1998) for an overview. For Q-Learning, a common reinforcement
learning technique, see Watkins and Dayan (1992).
3
However, in our setting the environment is not static: through time, actions
yield different payoffs both because the payoff function is random, and because
the other agents change their behaviour.
The model is rich enough to investigate a number of policy issues; here, we
focus on the aggregate liquidity of the system. As a first result we derive a
liquidity demand function, relating total funds to the ratio of delay to liquidity
costs. This function is found to be increasing to the relative cost of delay,
and S-shaped. Then, we look at the effect of operational incidents affecting
random participants of the system. We find that banks would generally prefer
to commit more liquidity in case the disruption were known - except from the
extreme cases of very low and very high delay costs. Throughput guidelines
for payment submission are a common used by system-designers to reduce risk
in payment systems;3 we look at the effect of one such rule on liquidity usage
and find that at sufficiently low delay costs banks would increase their liquidity
holdings to contain delays. Finally, we explore some efficiency issues, namely
whether smaller systems are more or less liquidity efficient than large ones. We
find that a system with a smaller number of banks uses less liquidity for a given
level of payment activity.
The paper is organised as follows: Section 2 develops a formal description of
the model and the agents' learning process, and describes the payoff function.
Section 3 presents the results of the experiments and section 4 concludes.
2 Description of the model
2.1 Stage game and its repetition
The model consists of N agents indexed by i = 1...N , who repeatedly play a
stage game Γ = hA, π1, π2, ...πNi. Here A = {0, 1, ...K} is the (common) finite
action set for each agent, and πi : AN → F is i's outcome function, which
maps the set of action profiles into a set of payoff distribution functions. That
is, given the action profile a ∈ AN , agent i receives a stage-game payoff drawn
from a univariate distribution πi (a), whose shape depends on N parameters -
the stage game action profile. To keep the exposition uncluttered, we leave the
precise form of the outcome function πi (.) undefined at the stage. Details are
given in Section 3.1, where we also give a precise economic interpretation to the
abstract entities introduced here. Information in the game is incomplete as the
outcome function π (.) is unknown to the agents. Agents are risk-neutral, so
they care about the expected payoff. Hence, bank i will only be concerned with
its payoff functions fi (a) = E (πi (a)).
The stage game Γ is repeated through discrete time, running from t = 0 to
(potentially) infinity. The action profile chosen in stage game t is denoted by
a (t) = {a1 (t) , a2 (t) , ..., aN (t)}. A particular realization of the payoff vector
3A throughput guideline is a constraint imposed on banks' behaviour by the system regu-
lator; typically, it demands that certain percentages of the total daily payments be executed
by given deadlines within the day.
4
drawn from π (a (t)), is indicated by y (t) ∈ RN , which is therefore also called
the "game-t payoff".
Monitoring is incomplete. At the beginning of (stage-) game t, each agent i
knows the following: all its own previous choices and realized payoffs, and some
statistics of other's past choices a−i (k). A (observed) history (by i at time
i = {ai (k) , yi (k) , a−i (k)}k=0..t−1. Let us call H t the
t) is thus denoted by ht
set of all possible histories that i may observe up to t, and let us define H =
∪H t. Differently from the literature on repeated games, but more in line with
that on evolutionary game theory, we assume that agents aim at maximizing
immediate payoffs (instead of e.g. the discounted stream of payoffs). That
is, histories are essential to learn about payoffs and about others' actions, but
agents disregard strategic spillover effects between stage games. This seems a
sensible assumption here: the complexity of the environment makes it unlikely
that agents anticipate all interactions.4
2.2
Information, learning and strategies
Agent i faces two forms of uncertainty: uncertainty about the payoff function
given others' actions, and uncertainty about other's actions. The first element
gives to our model a flavour of decision theory, the second one is a game theory
issue.
2.2.1 Information
As time goes by and histories are updated, agents can be seen to accumulate
information. More formally, we posit that of the whole history observed up to t
each i retains some multi-dimensional statistics, say ℘i (t). These are the beliefs
about the state of the environment that i is learning, and it constitutes the basis
for the definition of strategies. Here, ℘i (t) is composed of two parts:
i (.) of the payoff function fi (a) = E [yi a ];5
i (.) of probabilities for other agents' actions in the next
stage game.
a) an "estimate" ef t
b) an "estimate" ept
a−i which correlates with a−i. Hence, we assume that the estimate ef t
Of a whole action profile a, i only observes its own action ai and a statistic
i (.) assigns
to each (ai, a−i) an expected payoff. As for the estimate b), each i is assumed
to maintain static expectations about others' actions. That is, i believes that
a−i is drawn from a time-invariant distribution, as if other agents were adopting
a constant mixed strategy. We adopt this assumption, a classic in evolutionary
game theory, because it is simple and because it yielded the same results as some
4In the realm of reinforcement learning, immediate payoff maximisation where actions are
associated with situations is referred after Barto, Sutton and Brouwer (1981) as associative
search.
5Risk-neutral players are only interested in the expected value of payoffs, so there is no
gain in assuming that ef instead maps actions into payoff probability distributions.
5
more sophisticated forms of beliefs.6 Because action profiles that generate the
i (.) also refers to a−i
instead of ai. In the simulation, we posit that a−i is the average action of the
"other" agents, which clearly takes values in [0, K]. So, approximating to the
i (a−i) is a vector with K entries, collecting the probabilities
same statistic a−i are indistinguishable to i, the estimate ept
nearest integer, ept
of any of the (other agents') average action being played.
2.2.2 Learning
The information stored in ef t
i (.) is updated as time goes by, according
to learning rules. A learning rule for agent i, denoted by Λi, assigns to each
observed history ht−1
i (.) and ept
an updated ℘i (t).
i
Define Ik (ai, a−i) as the indicator function equal to 1 if action profile (ai, a−i)
appears at time k and zero otherwise. We use the following learning rule:
i (ai, a−i) = Pk=0...t−1 yi (k) Ik (ai, a−i)
ef t
Pk=0...t−1 Ik (ai, a−i)
1 +Pk=1...t−1 Ik (a−i)
ept
i (a−i) =
t + K
(1)
(2)
In words, ef t
i (ai, a−i) is the average payoff obtained under action profile
(ai, a−i) up until time t excluded. Similarly, the components of the vector
i (a−i) are calculated according to the observed frequencies, starting from an
initial estimate 1/N . This is known as the "fictitious play" updating rule start-
ing from a uniform estimate; it corresponds to Bayesian updating of beliefs
about a constant, unknown distribution over the other agents' actions.7
ept
2.2.3 Strategies
A strategy for i is a map assigning to each ℘i(t) an action to be taken, i.e.
some ai (t). A particular strategy can be seen as motivated by some "rationale",
resting in turn on the basis of a learning process which we now describe.
Each i is risk-neutral and aims at maximizing the expected immediate payoff.
Because i believes that the opponents play a particular a−i with probability
i (a−i), its strategy dictates:
ai (t + 1) = arg max
= arg max
ai
Ehef t
ai Xa−i ef t
ii
i (ai, a−i)(cid:12)(cid:12)ept
i (ai, a−i)ept
i (a−i)
(3)
The fact that banks maximize their immediate payoff is only one of the
many possible preference specifications. Alternatively, agents might also be
6We explored in particular the possibility that players believe that the opponents' actions
follow a Markov process. In this case, the estimate under 2) is a transition matrix, containing
the probabilities of a particular a−i being played at t + 1, conditional on a = (ai, a−i) being
observed at t.
7See e.g. Fudenberg and Levine (1998) pg. 31 for details.
6
ept
0
1
2
t-2
t-1
t
t
Figure 1: Information, learning and strategies
taking into consideration future payoffs. In this case, however, optimal strate-
gies would be far more complex. Indeed, discounting expected future payoffs
would create an implicit trade-off between exploitation (the use of actions that
appear optimal in the light of the available information), and exploration (the
use of seemingly sub-optimal actions, which might appear such because of lack
of experimentation). Our preference specification severs this payoff-related link
between stage games, which nevertheless are interrelated because learning takes
place across them. This short-sighted maximization assumption is common in
the bounded-rationality and evolutionary game theory literature.8
Figure 1 illustrates the relationship between histories, information and strate-
gies. A history up to t− 2 is summarized in ℘i(t− 1). This, along with the new
data obtained in t − 1, is updated into ℘i (t) by the learning rule Λi. In turn
℘i (t), which is the information available at t, is mapped by a strategy si, to an
action ai (t).
It should be noted that in early repetitions of the stage game, ept
while ef t
i is heavily
influenced by the initial (arbitrary) estimate, for which we simply use 1/K,
i (.) is the average of a few observed payoffs only. Hence, strict adoption
of Eq. 3 would most likely yield, and possibly lock into, sub-optimal actions.
To avoid this, we suppose that agents first randomly choose a certain number of
actions to explore the environment, and then start making choices as in Eq. 3
- which we call "informed decisions". To ensure further exploration, each agent
also tries itself out at least once every a−i that it encounters. This models
8Fudenberg and Levine (1998) contains an authoritative review of models with myopic
agents. To quote only some of these seminal contributions, see i) the literature on Fictitious
Play by Brown (1951), Foster et al. (1998), and Krishna et al. (1998), ii) the literature on
learning and bounded rationality inc. Kandori et al. (1993), Young (1993), Ellison (2003),
and Blume (1993), iii) studies on Imitation and Social Learning by e.g. Schlag (1994).
7
learning from other agents.
These choices on the length of the "exploration phase" are evidently arbi-
trary; however, in the model there are clearly no exploration costs, so the length
of the exploration period can indeed be assumed exogenously. On the other
hand, some limit to exploration must be imposed, as the sheer size of the action
spaces inhibits a brute force approach, whereby i collects a very large sample
of all possible action profiles (and respective payoffs) before making informed
decisions.9
2.3 Specification of the payoff function
The model of learning about an unknown stochastic payoff function that is
determined party by the agent's own actions and partly by the actions of other
agents can lend itself to a number of applications. The specification of the payoff
function fi ties it to the problem of a payment system analyzed in this paper.
One possible specification of f could be a simple analytical function of the
players' actions. The problem would then become that of analyzing the lim-
iting behaviour of the learning rules and strategies, something that could be
done analytically, provided f is simple enough. However, in quest of increased
realism in payment system modelling we specify f via an algorithm represent-
ing a "settlement day" with a large number of daily payments. To understand
why realistic analytical functions are difficult to develop, consider the follow-
ing:
imagine first that banks have always enough liquidity to make payments
instantaneously. In this case payments flow undisturbed, delay costs are zero,
and only liquidity costs matter. Their calculation is trivial. However, if banks
commit less funds for settlement (as banks want to minimize costs), it becomes
more likely that the funds are at some point insufficient for banks to execute
payments immediately. As shown in Beyeler et al.. (2006), these liquidity short-
ages cause payments to occur in "cascades", whose length and frequency bears
no correlation with the instruction arrival process that regulates payment in-
structions as the settlement of payments becomes coupled across the network
when incoming funds allow the bank to release previously queued payment. As
a consequence, the flow of liquidity and thus delay times for individual banks
become largely unpredictable.
In the model ai represents any external funding decision by the bank. The
funds allow the bank to execute payment instructions, which the bank receives
throughout the day according to a random process. Banks have costs for both
committing liquidity for settlement, and from experiencing delays in payment
processing due to insufficient funds. The settlement day is modelled in contin-
uous time, with time indexed as t ∈ [0, T ].10 At any time interval dt, bank
9In the simulations, each i chooses among 40 possible actions, and 40 are the possible
average actions by the "others" (a−i). Thus, full exploration would require observing 402 =
1600 different action profiles (ai, a−i), each of which should be sampled enough times to obtain
a reliable estimate of f (.).
10In the previous section, t indicizes "days", but we feel there is no risk of confusion, as
Section 2 and the present are relatively independent.
8
1
i receives an instruction to pay 1 unit to any other bank j with probability
1
N −1 dt. Because there are N such banks i, and N − 1 "other" banks j, the
N
arrival of payment instructions in the whole system is a Poisson process with
parameter 1 so that, on the average day, T payment instructions are generated.
Payments are executed using available liquidity; i's available liquidity at
time t is defined as:
li (t) = ai +Z t
s=0
(yi (s) − xi (s)) ds
where xi (s) (viz. yi (s)) is the amount of i's sent (viz. received) payments
at time s. For simplicity, we assume that every i adopts the following payment
rule:11
at each t, execute instructions using First-in-First-out (FIFO) as long as li (t) > 0;
else, queue received instructions
(4)
We assume that a payment instruction received by bank at t and executed
at t′ carries a cost equal to
CD = κ
(t′ − t)
T
κ > 0
(5)
where κ is the "daily interest cost" of delaying payments. Similarly, liquidity
costs (e.g. opportunity cost of collateral) are linear:
CL = λai,
λ > 0
(6)
Finally, the stage game payoff is the sum of the costs in Eq. 5 and those
in Eq. 6, the former summed up over all i′s delayed payments.
3 Experiments
3.1 Parameters and equilibria
The continuous-time settlement day is modelled as a sequence of 104 time units
indexed t ∈ [0, 104]. Given that the arrival of payment instructions is a Poisson
process with parameter 1, on average banks receive a total of 104 payment
instructions per day. A sequence of days (stage games) is called a play. In the
simulations, we terminate a play when no bank changes its liquidity commitment
decision for 10 consecutive days (convergence). We run 30 plays for each set of
model parameters and find that convergence always occurs.
Banks start the adaptation process with random decisions for liquidity, and
gradually accumulate information on the shape of the payoff function. When
11The rule under (4) is evidently optimal for the cost specification given here. As banks
need to pay upfront for liquidity, they have no incentive to delay payments if liquidity is
available. Under other cost specifications (e.g. priced credit or heterogeneous payment delay
costs) this would, however, not be the case.
9
enough information has been collected, banks adopt the rule described in Eq.
3 for making decisions on liquidity to commit. A series of stage games is ended
in the simulations when no bank changes its collateral posting decision for 10
consecutive games. This means that at this point, no bank wishes to change its
action, given the information available and given other banks' actions.12
Suppose that the payoff function were known by the banks; given our spec-
ification of strategies, it would then be clear that the converged-to actions are
a Nash equilibrium of the stage game.13 We cannot quite draw the same con-
clusion in our setting: the payoff exploration is necessarily partial, so it might
be that some profitable actions were never tested enough to be recognized as
such. Hence, the equilibria converged to are only "partial"-Nash equilibria, or
Nash-equilibria conditional on the "partial" information that banks have about
the payoff function. However, as we discuss later, we observe a clear consistency
in learning. This suggests that the partiality of the information collected is suf-
ficient, and the equilibria reached are probably good approximations of the true
stage-game Nash equilibria.
The base system consists of 15 banks.
In section 3.2 we investigate the
impact of the system size. Banks choose their action, ai among forty different
levels, ranging from 0 to 80 in intervals of 2. The cost functions are as in Eq. 5
and Eq. 6. We normalize liquidity costs at λ = 1 and look at different values
of delay costs κ ranging from 1/8 to 512 in multiples of 4. We are interested in
the demand for liquidity (i.e. in the choices of ai) at different values of κ, and
in the resulting settlement delays and payoffs.
3.2 Base experiment
As expected, with low delay costs banks tend to commit low amounts of liquidity
(∼50 units) and delay payments instead, and at high cost of delay bank prefer
to commit plenty of liquidity (∼1044 units) in order to avoid expensive delays.
Figures 2 and 3 illustrate typical evolution of the simulations for two extreme
levels of delay costs. The sudden changes in liquidity correspond to the point
where banks start making informed decisions (see Section 2.2.3).
We find that convergence always occurs - on an aggregate level within a
narrow range. A priori, learning might be sensitive to initial observations, and
hence it might be subjected to drastic differences in the final "conclusions". The
consistency of the learning process is illustrated in Figure 4, where we plot the
different parameter specifications. Due to randomness - which makes histories
converged-to value of P ai (i.e. the total liquidity committed) across plays, for
necessarily different - the "learned" liquidity level P ai clearly differ, but they
do so within small ranges.
12While some changes in actions may occur due to the randomness of payoffs and learning,
these did not qualitatively change the results in simulations with longer convergence criteria.
13This simple property of Fictitious Play stems from the fact that, if for all t > t′ the action
profile is some constant a, then the estimates epi converge to the true value 1
N Σai. Strategies
prescribe playing a best reply to epi so, if a were not a Nash Equilibrium, sooner or later one
player would choose some a′
i 6= ai.
10
d
e
t
t
i
m
m
o
c
s
d
n
u
f
1200
1000
800
600
400
200
0
d
e
t
t
i
m
m
o
c
s
d
n
u
f
1
11
21
31
41
51
stage game
61
71
81
Figure 2: Total liquidity - low delay costs
1200
1000
800
600
400
200
0
1
51
101
151
201
stage game
251
301
Figure 3: Total liquidity - high delay costs
11
d
e
t
t
i
m
m
o
c
s
d
n
u
f
1200
1000
800
600
400
200
0
1
cost ratio
512
128
32
8
2
0.5
0.125
30
play
Figure 4: Total equilibrium liquidity across plays
It should be noted that while the system consistently "learns" the same level
of total liquidity, this can represent many configurations of single banks' liquidity
choices. Hence, our simulation don't show that always the same equilibrium
is reached; rather, that the equilibria that are reached are characterized by
a narrow span of total liquidity in the system. Given the symmetry of the
model, it is clear that for any equilibrium (i.e. any equilibrium profile of actions
(a1, a2...aN )), there are many other equilibria obtained via a permutation of
the actions between the players that yield to same total liquidity on the system
level.
Another interesting feature of the model is its ability to match a well known
empirical fact: a low ratio of available liquidity to daily payments ("netting
ratio"), which in turn implies high levels of liquidity recycling. Because the
system processes on average 10.000 payments a day, the above results imply
that the ratio in our simulation is between 0.5% and 10.4%. For comparison,
CHAPS Sterling's netting ratio is 15% (James 2004)14 and in Fedwire as low
as 2.2%.15 The real netting ratios are bound to be higher due to the fact that
payments in them are of varying sizes in contrast to the more fluid unit size
payments modelled here.
Figure 5 shows the equilibrium demand for intraday credit as a function of
the cost ratio. This function is S-shaped in the exponential delay cost scale, that
14Calculated as the ratio of collateral used for intraday credit to the value of payment
settled.
15in 2001.
Calculated as (balances + mean overdrafts) / total value.
Sources:
www.federalreserve.gov/paymentsystems/fedwire
12
1200
1000
800
600
400
200
0
1000
0.1
1
10
100
delay cost
s
d
n
u
f
r
o
f
d
n
a
m
e
d
Figure 5: Liquidity as a function of delay costs
is, it is relatively flat at both low and high levels of delay costs. At comparatively
low delay costs banks evidently commit little liquidity; hence the return for
increasing liquidity holdings are high, and so a little more liquidity suffices to
cope with increased delay costs. As a consequence, for low delay cost levels the
demand curve is flat. Consider now the situation with high delay costs. There,
the liquidity committed is high and returns to increasing liquidity are low, so
one might think that an increase in delay costs calls for high extra amounts
of liquidity. However, this is not the case, because gains from liquidity indeed
diminish above a certain level when all payments can be made promptly. Hence,
for high delay costs, liquidity demand is insensitive to further increases in delay
costs, and the demand curve is flat again. In between these two extremes, the
demand for liquidity increases exponentially with delay costs.
We find that delays in the system increase exponentially as banks reduce
the amount of liquidity when this is relatively expensive compared to delaying
payments. The phenomenon is known as "deadweight losses" (Angelini 1998) or
"gridlocks" (Bech and Soramaki 2002) in payment systems. Figure 6 shows the
relationship between system liquidity and payment delays. In intuitive terms,
the reason of this exponential pattern is the following. First, a bank that reduces
its liquidity holdings might have to delay its outgoing payments. Second, as a
consequence, the receivers of the delayed payments may in turn need to delay
their own payments, causing further downstream delays and so on. Hence, a
decrease of a unit of liquidity may cause multiple units to be delays. Third,
such a chain of delays - and hence this multiplicative effect - is more likely and
13
t
n
e
m
y
a
p
r
e
p
y
a
e
d
l
500
450
400
350
300
250
200
150
100
50
0
0
200
400
600
800
1000
1200
funds committed
Figure 6: Delays as a function of liquidity
longer, the lower the liquidity possessed by the banks. Thus the total effect of
liquidity reduction acts in a compounded (exponential) fashion.
An interesting question is how good the performance of the banks is in
absolute terms. To understand this we compare the payoffs received by the
banks through adaptation with two extreme strategies:
a) all banks delay all payments to the end of the day;
b) all banks commit enough liquidity to be able to process all payments
promptly.16
The comparison between the performance of these two pure strategies and
the learned strategy is shown in Figure 7. For any cost ratio, the adaptive
banks obtain better payoffs than any of the two extreme strategies - except for
the case with high liquidity costs when the costs are equal. Banks manage to
learn a convenient trade-off between delay and liquidity costs. On the contrary,
the strategy under a) becomes quickly very expensive as delay costs increase,
and the strategy under b) is exceedingly expensive when delays are not costly.
3.3
Impact of network size
In order to investigate the impact of system size on the results presented in the
previous section, we ran simulations varying the number of participants. To en-
sure comparability, we kept the number of payments constant across simulations
16In fact the liquidity committed in the simulation with the highest delay cost was used as
the scenario for prompt payment processing.
14
0.1
1
10
100
1000
a)
b)
funds committed
0.00
-0.02
-0.04
-0.06
-0.08
-0.10
-0.12
-0.14
-0.16
-0.18
-0.20
t
n
e
m
y
a
p
r
e
p
f
f
o
y
a
p
Figure 7: Comparison of strategies: a) min liquidity; b) min delays
and maintained the network complete.
We observe that liquidity demand increases with the system size, and the in-
crease is more pronounced the higher the delay costs. For example, the demand
function is unchanged at low delay cost while, for high delay costs, a 50-bank
system requires 215% the liquidity needed in a 15-bank system.
Similar results hold about delays. The relationship between liquidity com-
mitted and delays remains close to exponential irrespective of system size; how-
ever, larger systems experience more delays, for any level of initial liquidity (see
Figure 9).
An intuitive explanation of these phenomena could be the following. First,
note that if the number of participants is increased by a factor x (keeping
turnover constant), the volatility of the balance of each bank is multiplied by
a factor 1/x′ > 1/x - we show this in a moment. Second, suppose that i) the
optimal ai is proportional to the volatility of a bank's balance δ (i.e. ai = zδ)17
and that ii) banks post all the same amount of liquidity (i.e. ai = aj). It then
simply follows that the total amount of liquidity increases with the system's
size: (nx) z δ
x′ > nzδ (here nx is the number of banks in the larger system, and
δ
x′ the corresponding volatility of balances).
The key point is that, if the number of participants is increased (keeping
turnover constant), the volatility of banks balances rises more than proportion-
ally. To see why this is the case, consider the simplified but illustrative situation
17This is exactly the case if a bank chooses ai as to cover z "standard deviations" from the
average balance.
15
0.2500
0.2000
0.1500
0.1000
0.0500
0.0000
1000
0.1
1
10
100
2 banks
15 banks
5 banks
50 banks
10 banks
Figure 8: The effect of system size on the demand for liquidity
where liquidity is abundant, so there are no delays. In this case, a bank's net
position is the sum of a series of random perturbations (incoming and outgoing
payments), equally likely to affect it positively and negatively. In other words,
a bank's net position is a random walk, whose value after n perturbations av-
erages zero, with a standard deviation √n. By increasing the system size by
a factor x, the orders are distributed over more banks, so the average number
of perturbations for any given time interval is multiplied by 1/x < 1. Accord-
ingly, the standard deviation of the balances at the end of any time interval is
multiplied by 1/x′ =p1/x > 1/x.
3.4 Throughput guidelines
Some interbank payment systems have guidelines on payment submission jointly
agreed upon by the system participants18. The rationale for throughput guide-
lines is to induce early settlement in order to e.g. reduce operational risk or
perceived coordination failures among participant. For example, if a large chunk
of payments are settled late in the day, an operational incident would be more
severe as more payments could potentially remain unsettled before close of the
payment system and the financial markets where banks balance their end-of-day
liquidity positions.
18E.g. the FBE (Banking Federation of the European Union 1998) has set guidelines on
the timing of certain TARGET payments. In CHAPS Sterling, members must ensure that on
average (over a calendar month) 50% of its daily value of payments are made by 12 pm and
that 75%, by value, are made by 2.30 pm. (James 2004).
16
1200
1000
800
600
400
200
b)
a)
s
d
n
u
f
r
o
f
d
n
a
m
e
d
0.10
1.00
10.00
delay cost
100.00
0
1000.00
Figure 9: Impact of throughput guidelines (b) on liquidity
We simulate a particular realization of throughput guidelines by introducing
an additional penalty charge for delays that last longer than one tenth of the
settlement day (i.e. 1000 time units). The penalty charge is set to 64, in order
to sufficiently penalize non-compliance with the rules.
Figure 10 shows the impact of the throughput guidelines on the amount of
liquidity committed by the banks. When delay costs are high, banks already
commit enough liquidity to avoid long delays, so the throughput guidelines
have no effect. They do however, in the case of low delays costs, induce banks
to commit more liquidity. Not surprisingly, this comes at a cost to the banks,
which are forced away from their first-best choice. The increase in costs are
of the order of 70% at the lowest level of delay costs, and 20% at the second
lowest. The payoff comparison is shown in Figure 11.
3.5 Operational incident
Short term outages by banks in the payment system are rare in actual payment
systems, but do take place occasionally. In a typical scenario a participating
bank experiences problems connecting to the system due to temporal unavail-
ability of IT systems or telecommunication facilities. Due to the design of the
payment systems, a disconnected bank can in such situations generally still
receive payments to its account at the central bank, but cannot submit instruc-
tions to pay from its account. Unless other banks stop paying to the troubled
bank, it quickly becomes a liquidity sink, and the liquidity available for settling
17
0.10
1.00
delay cost
10.00
100.00
1000.00
0
b)
a)
f
f
o
y
a
p
-0.02
-0.04
-0.06
-0.08
-0.1
-0.12
-0.14
Figure 10: Impact of throughput guidelines (b) on payoffs
payments at other banks is reduced.19
In this set of simulations we ask the question of how much liquidity banks
would wish to commit in such a situation, i.e. what is the impact of an opera-
tional outage on the demand for intraday credit. The banks are assumed to be
unaware of the possible incident, and unable to discriminate among their coun-
terparts, so the intraday liquidity management rule under Eq. 4 is still adopted.
Under these assumptions, we simulated a scenario where a randomly selected
bank can receive, but cannot send payments for the first half of the settlement
day. On average, this means that up to T /2N = 10.000/(2 · 15) ≃ 333 liquidity
units cannot be used by other banks as a source of liquidity20. Depending on
the delay cost, this figure varies between 1900% and 30% of the average total
liquidity injected in the system at the beginning of the day (the first figure being
for the case when both delay cost and liquidity demand are low, and the second
for when costs liquidity demand are both high).
We found that the effect of operational incidents on the demand for liquidity
is highest at a relative delay/liquidity cost ratio of 2 - hence fairly low in the
range; at this point, the increase in intraday credit demand is 144 units, or
an increase of 85%.
It should be noted that banks do not compensate for
the full amount of liquidity "trapped" by the distressed bank, but prefer to
partly make up for that, and partly increase delays. For higher delay costs,
19see e.g. analysis on the impact of the 9/11 terrorist attacks in McAndrews and Potter
(2002), Lacker (2004), and Soramaki et al (2007)
20The shortage of liquidity equals the number of payment orders received by the distressed
bank, and not yet executed until the second half of the day.
18
1200
1000
800
600
400
200
0
1000
b)
a)
0.1
1
10
cost ratio
100
s
d
n
u
f
r
o
f
d
n
a
m
e
d
Figure 11: Liquidity - normal circumstances (a) and operational incidents (b)
delays remain approximately unchanged compared to the scenario without the
incident. Finally, when delay costs are lower than liquidity costs (i.e. for a cost
ratio <1), banks prefer to hold about the same amount of liquidity as without
the incident, and experience the delays caused by the reduced liquidity.
In
this case, the impact of an operational incident increases both the demand for
liquidity (but less than what was trapped) and delays - more so the one which
is less costly.
4 Summary and conclusions
In this paper we developed an agent-based, adaptive model of banks in a pay-
ment system. Our main focus is on the demand for intraday credit under alterna-
tive scenarios: i) a "benchmark" scenario, where payments flows are determined
by the initial liquidity, and by an exogenous arrival of payment instructions; ii)
a system where, in addition, throughput guidelines are exogenously imposed iii)
a system subject to operational incidents.
It is well known that the demand for intraday credit is generated by a trade-
off between the costs associated with delaying payments, and liquidity costs.
Simulating the model for different parameter values, we were able to draw with
some precision a liquidity demand function, which turns out to be is an S-shaped
function of the delay / liquidity cost ratio. We also looked at the costs expe-
rienced by the banks, as a function of the model's parameters. By the process
of individual payoff maximization, banks adjust their demand for liquidity up
19
b)
a)
0.1
1
10
100
funds committed
1800
1600
1400
1200
1000
800
600
400
200
t
n
e
m
y
a
p
r
e
p
y
a
e
d
l
0
1000
Figure 12: Delays as a function of cost ratio (b: incident)
(reducing delays) when delay costs increase, and down (increasing delays), when
they rise. Interestingly however, the absolute delay cost remains approximately
constant when the ratio delay/liquidity costs changes. As expected, the de-
mand for intraday credit is increased by an operational incident. However, this
effect is found to be important only if liquidity is costly compared to delaying
payments. Likewise, throughput guidelines increase the demand for intraday
credit - as banks try to avoid penalties for not adhering to them. In total this
reduces the payoffs of the banks. Nevertheless, throughput guidelines may be
beneficial when additional benefits that are not in the current model are taken
into account (among these, benefits related to reducing operational risk).
This model produces realistic behaviour, suggesting that it may be used to
investigate a wide array of issues in future applications. A number of extensions
are possible. First, alternative specifications for the instruction arrival process
may be applied (see e.g. Beyeler at al. (2006)). Alternatively, one could change
the assumptions on the banks' network: while the complete network assumption
implicitly adopted here fits well with e.g. the UK CHAPS system, an interesting
question is how other topologies such as a scale free network topology such as in
Fedwire (Soramaki et al.. 2007) would affect the results. Also, different individ-
ual preferences could be investigated. We assumed that banks are risk neutral
and interested in maximising their immediate payoffs; it would be interesting
to verify if the introduction of risk aversion and / or preferences over expected
stream of payoffs may change the results. Finally, more complex behaviour can
be easily studied within our model; for example, the "pay-as-much-as-you-can"
rule for queuing payments could be replaced by sender limits. Similarly, more
20
sophisticated strategies can be easily modelled, supposing e.g. that banks keep
constant their actions for a number of periods (to gather more data and explore
the environment), instead of exploiting after a fixed amount of time what seems
to be the best action.
References
[1] Angelini, P (1998), ''An Analysis of Competitive Externalities in Gross
Settlement Systems", Journal of Banking and Finance n. 22, pages 1-18.
[2] Bank for International Settlements (2006), Statistics on payment and
settlement systems in selected countries - Figures for 2005 - Preliminary
version. CPSS Publication No. 75.
[3] Barto, A G and Sutton, R S (1998), Reinforcement Learning: an
introduction. MIT Press, Cambridge, Massachusetts.
[4] Barto, A G, Sutton, R S and Brouwer, P S (1981), "Associative
search network: A reinforcement learning associative memory". Biological
Cybernetics, 40, pages 201-211.
[5] Bech, M L and Soramaki, K (2002), "Liquidity, gridlocks and bank
failures in large value payment systems". in E-money and payment systems
Review, Central Banking Publications. London.
[6] Bech, M L and Garratt, R (2003), "The intraday liquidity manage-
ment game", Journal of Economic Theory, vol. 109(2), pages 198-219.
[7] Bech, M L and Garratt, R (2006), "Illiquidity in the Interbank Pay-
ment System Following Wide-Scale Disruptions". Federal Rererve Bank of
New York Staff Report No. 239.
[8] Beyeler, W, Bech, M, Glass, R. and Soramaki K (2006), "Con-
gestion and Cascades in Payment Systems". Federal Reserve Bank of New
York Staff Report No. 259.
[9] Blume, L (1993), "The statistical mechanics of best-response strategy
revision". Games and Economic Behavior, 11, pages 111 -- 145.
[10] Brown, G W (1951), "Iterative Solutions of Games by Fictitious Play"
in Koopmans T C (Ed.), Activity Analysis of Production and Allocation,
New York: Wiley.
[11] Buckle, S and Campbell, E (2003), "Settlement bank behaviour in
real-time gross settlement payment system". Bank of England Working
paper No. 22.
[12] Devriese, J and Mitchell J (2006), "Liquidity Risk in Securities Set-
tlement", Journal of Banking and Finance, v. 30, iss. 6, pages 1807-1834.
21
[13] Ellison, G (1993), "Learning,
local
interaction, and coordination",
Econometrica, 61, pages 1047-1072.
[14] Foster, D P and Young H P (1998), "On the Nonconvergence of Fic-
titious Play in Coordination Games", Games and Economic Behavior, v.
25, iss. 1, pages 79-96.
[15] Fudenberg, D and Levine D K (1998), "The Theory of Learning in
Games". MIT Press., Cambridge, Massachusetts.
[16] James, K and Willison M. (2004), "Collateral Posting Decisions in
CHAPS Sterling", Bank of England Financial Stability Report, December
2006.
[17] Kandori. M, Mailath, G J and Rob, R (1993), "Learning, Mutation,
and Long Run Equilibria in Games", Econometrica, Vol. 61, No. 1. pages
29-56.
[18] Krishna, V and Sjostrom, T (1995), "On the Convergence of Fictitious
Play", Mathematics of Operations Research 23(2), pages 479 - 511.
[19] Lacker, J M (2004), "Payment system disruptions and the federal reserve
following September 11, 2001." Journal of Monetary Economics, Vol. 51,
No. 5, pages 935-965.
[20] McAndrews, J and Potter S M (2002), "The Liquidity Effects of the
Events of September 11, 2001", FRBNY Economic Policy Review, Vol. 8,
No. 2, pages 59-79.
[21] Soramaki, K, Bech, M L, Arnold, J, Glass R J and Beyeler, W
E (2006), "The Topology of Interbank Payment Flows". Physica A Vol.
379, pages 317-333.
[22] Schlag, K (1995), "Why Imitate, and if so, How? A Boundedly Rational
Approach to Multi-Armed Bandits", Journal of Economic Theory 78(1),
pages 130 -- 156.
[23] Watkins, C and Dayan P (1992), "Technical note: Q-learning", Ma-
chine Learning, 8(3/4), pages 279-292.
[24] Willison, M (2005), "Real-Time Gross Settlement and hybrid payments
systems: a comparison", Bank of England Working Paper No. 252.
[25] Young P (1993), "The evolution of conventions", Econometrica 61, pages
57-84.
22
|
1907.09110 | 1 | 1907 | 2019-07-22T03:17:19 | Strategic Voting Under Uncertainty About the Voting Method | [
"cs.MA",
"cs.GT"
] | Much of the theoretical work on strategic voting makes strong assumptions about what voters know about the voting situation. A strategizing voter is typically assumed to know how other voters will vote and to know the rules of the voting method. A growing body of literature explores strategic voting when there is uncertainty about how others will vote. In this paper, we study strategic voting when there is uncertainty about the voting method. We introduce three notions of manipulability for a set of voting methods: sure, safe, and expected manipulability. With the help of a computer program, we identify voting scenarios in which uncertainty about the voting method may reduce or even eliminate a voter's incentive to misrepresent her preferences. Thus, it may be in the interest of an election designer who wishes to reduce strategic voting to leave voters uncertain about which of several reasonable voting methods will be used to determine the winners of an election. | cs.MA | cs | Strategic Voting Under Uncertainty About the Voting Method∗
Wesley H. Holliday
Eric Pacuit
University of California, Berkeley
University of Maryland
[email protected]
[email protected]
Much of the theoretical work on strategic voting makes strong assumptions about what voters know
about the voting situation. A strategizing voter is typically assumed to know how other voters will
vote and to know the rules of the voting method. A growing body of literature explores strategic
voting when there is uncertainty about how others will vote. In this paper, we study strategic voting
when there is uncertainty about the voting method. We introduce three notions of manipulability
for a set of voting methods: sure, safe, and expected manipulability. With the help of a computer
program, we identify voting scenarios in which uncertainty about the voting method may reduce or
even eliminate a voter's incentive to misrepresent her preferences. Thus, it may be in the interest of
an election designer who wishes to reduce strategic voting to leave voters uncertain about which of
several reasonable voting methods will be used to determine the winners of an election.
1 Introduction
A well-known fact in the study of voting methods is that strategic voting cannot be avoided (see, e.g.,
[35, 21]). A voter has an incentive to vote strategically, or manipulate, if she will achieve a prefer-
able outcome by misrepresenting her true preferences about the candidates. There are two fundamental
results showing that every reasonable voting method is susceptible to strategic voting. The Gibbard-
Satterthwaite theorem [13, 32] shows that every voting method for three or more candidates that is reso-
lute (i.e., always elects a single winner), unanimous (i.e., never elects a candidate y if all voters rank an-
other candidate x above y), and non-dictatorial (i.e., does not always elect the favorite candidate of some
distinguished voter) can be manipulated. To study strategizing for irresolute voting methods, which may
select more than one candidate as a winner, additional assumptions are needed about the voters' rankings
of sets of candidates. The Duggan-Schwartz theorem [9] shows that every voting method -- whether res-
olute or irresolute -- for three or more candidates that is non-imposed (i.e., any candidate can be elected)
and has no nominator (i.e., no voter can always ensure that her top ranked candidate is among the set of
winners) can be manipulated by a optimist or pessimist, defined as a voter who compares sets of candi-
dates in terms of her highest (resp. lowest) ranked candidate in each set. Related results by Kelly [19],
Benoit [2], Feldman [11], and Gardenfors [12], among others, show that manipulation is unavoidable
under different assumptions about how to lift a voter's ranking of candidates to sets of candidates.
In the theorems mentioned above, a voter's decision to manipulate relies on strong assumptions about
what the voter knows about the voting situation. Two key assumptions are: (1) the strategizing voter
knows how the other voters in the population will vote or have voted; (2) the strategizing voter knows
and understands the rules of the voting method. There is a growing body of literature that explores
weakening assumption (1) [6, 27, 5, 22, 30, 36]. One reason voters may be uncertain about how other
voters will vote, even if they know other voters' true preferences, is because they think that other voters
might be voting strategically. There are sophisticated game-theoretic models that explore the implications
∗For helpful comments, we wish to thank Mikayla Kelley, the three anonymous referees for TARK, and an audience at the
Center for Human-Compatible AI's Interdisciplinary Insights Seminar on May 1, 2019.
L.S. Moss (Ed.): TARK 2019
EPTCS 297, 2019, pp. 252 -- 272, doi:10.4204/EPTCS.297.17
c(cid:13) Holliday and Pacuit
This work is licensed under the
Creative Commons Attribution License.
Holliday and Pacuit
253
of weakening assumption (1) for this reason (consult part II of [21] for an overview of this literature).
Whatever the reason, when voters have partial information about how other voters will vote, the decision
about whether to manipulate is more complicated, since voters are uncertain about which sets of winners
will result from their decision to manipulate. One natural assumption is that voters are risk averse and
only strategize when doing so cannot lead to a worse outcome (according to their true preferences) and
might lead to a better outcome [6] (cf. [30] for other assumptions about how voters decide to strategize).
The potentially negative aspects of strategic voting (see, e.g., [31, 7]) have motivated the search
for barriers against manipulation.1 One potential barrier, investigated mostly in the AI literature, is the
computational complexity of determining a profitable manipulation for a given voting method (see, e.g.,
[10, 7]).
In this paper, we will investigate another potential barrier against strategic voting: adding
uncertainty about the voting method that will be used to determine the set of winners. Thus, we weaken
assumption (2) above. Suppose that S is a set of voting methods. We assume that the voters know that
one of the methods from S will be used to select the winners, but they do not know which one -- hence
we call S the uncertainty set. To simplify the initial study, in this paper we assume that a strategizing
voter knows how the other voters will vote or have voted. This assumption is not unrealistic in certain
voting situations; for example, in a hiring committee meeting in which committee members are asked
to sequentially report their rankings of job candidates, the committee member last in the sequence will
already know how all the other members have ranked the candidates.
As in the situation where a voter has partial information about how other voters will vote, in the
situation where a voter has uncertainty about the voting method, the voter must take into account different
possible winning sets of candidates when deciding whether to strategize. Given a ranking of sets of
candidates, we consider three ways for a voter to solve this decision problem. From the most conservative
to the least conservative, the three types of manipulation are:
1. Sure manipulation: It is certain that submitting an insincere ranking will lead to a better outcome
no matter which voting method is used.
2. Safe manipulation: It is certain that submitting an insincere ranking will lead to an outcome that is
at least as good and might lead to a better outcome.2
3. Expected manipulation: Given a probability distribution on the set of voting methods, submitting
an insincere ranking is more likely to lead to a better outcome than to lead to a worse outcome.
We aim to find combinations of voting methods that reduce or even eliminate a voter's incentive to
strategize (given one of the above notions of manipulation and a ranking of sets of candidates). That is,
does uncertainty about the voting method reduce the chance that voters will strategize?
If so, it may be in the interest of an election designer who wishes to reduce strategic voting to
leave voters uncertain about which of several voting methods will be used to determine the winners of
an election. Though perhaps implausible in the case of a democratic political election, creating such
uncertainty does not seem an implausible choice by, e.g., the Chair of a hiring committee. Moreover, if
committee members judge each of the possible voting methods to be reasonable and also wish to reduce
strategic voting, they may well endorse the choice of the Chair to create such uncertainty.3
1It has been argued that strategic voting also has positive aspects (see, e.g., [8]). In this paper, we will not debate whether the
negative aspects outweigh the positive. Our point is about what barriers are available if one wishes to reduce strategic voting.
2In [17] and [34] the term 'safe manipulation' is used in a different sense and in a different context involving manipulation
by coalitions of voters.
3Naturally, the Chair should be required to fix the voting method to be used before seeing the votes, so that the Chair cannot
pick the voting method that produces his or her favored outcome based on the already submitted votes.
254
Strategic Voting Under Uncertainty About the Voting Method
Another way that voters may be uncertain about the outcome of an election is that a voting method
may use randomization to select the winners. A probabilistic voting method assigns a lottery over the set
of candidates to each collection of rankings of the candidates for the voters (see [4] for a recent survey
of results about probabilistic voting methods). Gibbard [14] noted that a random dictatorship is immune
to strategizing.4 Suppose that S is a set of dictatorships -- one for each voter. After the voters submit
their rankings, one of the dictatorships in S is chosen, and the candidate ranked first by the dictator is
selected as the winner. Assuming voters submit rankings of the candidates without ties, this method
always selects a single winner. It is clear that no voter has an incentive to misrepresent their top choice,
since either they will not be chosen as the dictator, in which case their ranking will be ignored, or they
will be chosen as the dictator, in which case their top choice is guaranteed to win. Of course, each
dictatorship is immune to strategizing by itself. Beyond this example of random dictatorship, there are
general results suggesting that randomization can be an effective barrier to manipulation [26, 1].
The relationship between our work and probabilistic voting methods is clarified at the end of this
In short, although any uncertainty set S of voting methods determines a probabilistic voting
paper.
method FS, none of our three notions of manipulation above with respect to S is equivalent to a standard
notion of manipulation with respect to the probabilistic voting method FS. In addition, since the mapping
S (cid:55)→ FS from uncertainty sets of voting methods to probabilistic voting methods is not one-to-one, there
is no obvious definition of sure, safe, or even expected manipulation for probabilistic voting methods
such that for any uncertainty set S of voting methods, S is susceptible to sure/safe/expected manipulation
if and only if FS is susceptible to sure/safe/expected manipulation. Thus, there is no obvious way to
reframe our investigation purely in the language of probabilistic voting methods.
Both our approach and that of probabilistic voting methods involve a loss of transparency at the time
of the vote. However, the approaches seem to differ in the explainability of the outcome after the vote.
In our approach, the election designer may simply inform voters after the vote of which voting method
f from S was used to determine the outcome of the election, so the algorithm for f can be used to
explain why the election had one outcome rather than another. This may be a more intelligible reason for
voters than "this was the outcome of the lottery." Abstractly, the difference is that in our setting, initially
the voters have subjective uncertainty about which deterministic mechanism will be used; but after this
subjective uncertainty is removed, there is an explanation of why the election had one outcome rather
than another in terms of the deterministic mechanism applied to the voters' inputs.5 By contrast, with a
probabilistic voting method, the only available "explanation" of the outcome is in terms of an inherently
stochastic mechanism applied to the voters' inputs, which may fail to explain why the election had one
outcome rather than another with non-zero probability (cf. [18, p. 24], [29, p. 238]).6 Of course, whether
such a contrastive explanation is desirable may vary from case to case.
Our findings in this paper are of two main types: analytic results with mathematical proofs and data
from computer searches. For these searches we generalize to sets of voting methods a standard index
of manipulability for a single voting method, known as the Nitzan-Kelly index [25, 20], which gives
the percentage of profiles with n candidates and m voters in which at least one voter in the profile has
4Cf. [16], where voters are assumed to submit utility functions over the set of candidates. In this paper, we restrict attention
to the case where voters submit rankings of the candidates.
5That the voters have subjective uncertainty about which method in S will be used does not imply that the election designer
uses a chance process to determine which method will be used. As in standard voting theory, we make no assumption about
how the election designer chooses the voting method, whether by randomization, consideration of axiomatic properties, etc.
6In the case where f is an irresolute voting method that outputs a winning set X of candidates in a given election, a single
winner may be chosen by lottery; but still we have an explanation in terms of the algorithm for f of why the field was narrowed
to X rather than some other winning set before applying tiebreaking.
Holliday and Pacuit
255
an incentive to manipulate. In probabilistic terms, assuming the Impartial Culture Model [15] in which
every profile is equally probable, this index gives the probability that in a randomly chosen profile, at
least one voter has an incentive to manipulate. Similarly, we report data on the percentage of profiles in
which at least one voter has an incentive to manipulate against a set S of voting methods. All of the data
in the paper were produced by a Python script available at https://github.com/epacuit/strategic-voting.
The rest of the paper is organized as follows. The next section introduces our formal framework,
including the definitions of the voting methods we study in this paper. The three notions of manipulation
are studied in Sections 3, 4, and 5, respectively. Section 6 discusses the connections with probabilistic
social choice. Finally, in Section 7 we conclude with some pointers to future work.
2 Preliminaries
Let C be a nonempty finite set of candidates and V a nonempty finite set of voters. We use lower case
letters from the beginning and end of the alphabet a,b,c, . . . ,x,y,z, . . . for elements of C and lower case
letters from the middle of the alphabet i, j,k, . . . for elements of V .
A voter's ranking of the set of candidates is a strict linear order P on C. Let L(C) be the set of all
strict linear orders on C. For P ∈ L(C) and X ⊆ C, let max(X,P) be the maximally ranked element of
X, i.e., max(X,P) = y where for all x ∈ X, if x (cid:54)= y, then y P x (such an element always exists since P
is assumed to be a strict linear order). Similarly, let min(X,P) be the minimally ranked element of X,
i.e., min(X,P) = y where for all x ∈ X, if x (cid:54)= y, then x P y. We say y ∈ C is ranked rth by P when
{x ∈ C x P y} = r− 1.7 So, for example, y is ranked 1st by P if and only if max(C,P) = y. To simplify
our notation, we specify a ranking by simply listing candidates from highest to lowest in the ranking,
e.g., abcd for the ranking a P b P c P d.
A profile P for (C,V ) is an element of L(C)V , i.e., a function assigning to each i ∈ V a relation
Pi ∈ L(C). If C = n and V = m, we call a profile for (C,V ) an (n,m)-profile. A pointed profile for
(C,V ) is a pair (P,i) where P is a profile and i ∈ V . For x,y ∈ C, let P(x,y) = {i ∈ V xPiy}. We write
NP(x,y) for the number of voters in P ranking x above y, i.e., NP(x,y) = P(x,y). We say that a majority
P y, when NP(x,y) > NP(y,x). Let NetP(x,y) = NP(x,y)− NP(y,x). So
prefers x to y in P, denoted x >M
x >M
P y if and only if NetP(x,y) > 0. Finally, from the strict linear order Pi we define the weak relation
Ri by xRiy iff xPiy or x = y.
A voting method for (C,V ) is a function assigning a nonempty subset of candidates, called the win-
ning set, to each profile, i.e., f : L(C)V → ℘(C)\{∅}. The following are the voting methods we will
discuss in this paper (also see, e.g., [28]).
(1) Positional scoring rules: Suppose (cid:104)s1,s2, . . . ,sm(cid:105) is a vector of numbers, called a scoring vector,
where for each l = 1, . . . ,m−1, sl ≥ sl+1. Suppose P∈ L(C). The score of x∈C given P is score(P,x) = sr
where r is the rank of x in P. For each profile P and x ∈ C, let score(P,x) = ∑n
i=1 score(Pi,x). A positional
scoring rule for a scoring vector(cid:126)s assigns to each profile P the set of candidates that maximize their score
according to (cid:126)s in P. That is, a voting method f is a positional scoring rule for a scoring vector (cid:126)s provided
that for all P ∈ L(C)V , f (P) = argmaxx∈Cscore(P,x). We study two such rules:
Borda: the positional scoring rule for (cid:104)n− 1,n− 2, . . . ,1,0(cid:105).
Plurality: the positional scoring rule for (cid:104)1,0, . . . ,0(cid:105).
(2) The Condorcet winner in a profile P is a candidate x ∈ C that is the maximum of the majority
ordering, i.e., for all y ∈ C, if x (cid:54)= y, then x >M
P y. The Condorcet voting method is:
7As usual, for a set A, A is the number of elements in A.
256
Strategic Voting Under Uncertainty About the Voting Method
(cid:40){x} if x is the Condorcet winner in P
C
if there is no Condorcet winner.
Condorcet(P) =
(3) The win-loss record for a candidate x ∈ C in a profile P is the number of candidates z such that
a majority prefers x to z in P minus the number of candidates z such that a majority prefers z to x in P.
Formally, for each P and x ∈ C, let wlP(x) = {z NetP(x,z) > 0}−{z NetP(z,x) > 0}. The Copeland
winners are the candidates with maximal win-loss records: Copeland(P) = argmaxx∈C(wlP(x)).
(4) The support for a candidate x ∈ C in a profile P is found by calculating for each candidate y (cid:54)= x
the number of voters who rank x above y and then taking the minimum of these values. Formally, for
each P and x ∈ C, let supp(x,P) = min({NP(x,y) y ∈ C,y (cid:54)= x}). The MaxMin (also known as Simpson's
Rule) winners are the candidates with maximal support: MaxMin(P) = argmaxx∈C(supp(x,P)).
(5) PluralityWRunoff: Calculate the plurality score for each candidate -- the number of voters
who rank the candidate first. If there are 2 or more candidates with the highest plurality score, remove
all other candidates and select the Plurality winners from the remaining candidates. If there is one
candidate with the highest plurality score, remove all candidates except the candidates with the highest
or second-highest plurality score, and select the Plurality winners from the remaining candidates.
(6) Hare: Iteratively remove all candidates with the fewest number of voters who rank them first,
until there is a candidate who is a majority winner, i.e., ranked first by a majority of voters. If, at some
stage of the removal process, all remaining candidates have the same number of voters who rank them
first (so all candidates would be removed), then all remaining candidates are selected as winners.
(7) Coombs: Iteratively remove all candidates with the most number of voters who rank them last,
until there is a candidate who is a majority winner. If, at some stage of the removal process, all remaining
candidates have the same number voters who rank them last (so all candidates would be removed), then
all remaining candidates are selected as winners.
(8) Baldwin: Iteratively remove all candidates with the smallest Borda score, until there is a single
candidate remaining. If, at some stage of the removal process, all remaining candidates have the same
Borda score (so all candidates would be removed), then all remaining candidates are selected as winners.
(9) Rather than removing candidates with the lowest Borda score, the next two methods remove all
candidates who have a Borda score below the average Borda score for all candidates. There are two
versions of this voting method [24]: StrictNanson iteratively removes all candidates whose Borda
score is strictly smaller than the average Borda score (of the candidates remaining at that stage), until
one candidate remains. WeakNanson iteratively removes all candidates whose Borda score is less than or
equal to the average Borda score (of the candidates remaining at that stage), until one candidate remains.
If, at some stage of the removal process, all remaining candidates have the same Borda score (so all
candidates would be removed), then all remaining candidates are selected as winners.
Definition 2.1. Let Methods be the set of 11 voting methods described above.
We are interested in situations in which the strategizing voter is uncertain about which voting method
will be used to determine the winner(s). As noted in Section 1, we represent such uncertainty by a set S
of voting methods, called the uncertainty set. This is the set of voting methods f such that it is consistent
with the strategizing voter's knowledge that f will be used.
Each of the above methods may select more than one winner for a given profile. Thus, to discuss
strategizing, one needs a notion of when one set of candidates is "preferable" to another for a particular
voter. The following are the standard notions from the literature on strategic voting (see, e.g., [35]).
Definition 2.2. Let P be a profile, i ∈ V , and X,Y ⊆ C. We define the following dominance notions, each
of which has a nonstrict (≥) and strict (>) version:
Y and ∃x ∈ X ∃y ∈ Y : xPiy.
weak: (a) X ≥weak
Y iff ∀x ∈ X ∀y ∈ Y : xRiy;
Y iff X ≥weak
(b) X >weak
Pi
Pi
Pi
Holliday and Pacuit
257
optimistic: (a) X ≥Opt
Y iff max(X,Pi) Ri max(Y,Pi);
Pi
pessimistic: (a) X ≥Pes
Pi Y iff min(X,Pi) Ri min(Y,Pi);
(b) X >Opt
Y iff max(X,Pi) Pi max(Y,Pi).
Pi
(b) X >Pes
Pi Y iff min(X,Pi) Pi min(Y,Pi).
3 Sure manipulation
If a voter is uncertain about which voting method from a set S of voting methods will determine the
winners of an election, the most conservative approach to strategic voting is to submit an insincere
ranking if and only if the voter is sure that by doing so, the set of winners will be strictly better from the
point of view of her true ranking (and the relevant dominance notion) no matter which voting method
from S is used. This approach is appropriate when there is a cost to submitting an insincere ranking
that a voter is only willing to incur if it will surely improve the set of winners. For example, in the
context of a hiring committee in which committee members know each other's true preferences over the
candidates, e.g., through deliberation, there may be a social cost in submitting an insincere ranking of the
candidates, which a committee member is willing to bear only if doing so is sure to result in a preferable
set of winners. These considerations motivate the following definition.
Definition 3.1. Let (P,i) be a pointed profile, ∆ a dominance notion, and S a set of voting methods. We
say that (P,i) witnesses sure ∆-manipulability for S if and only if there is a profile P(cid:48) differing from P only
in i's ranking such that ∀ f ∈ S : f (P(cid:48)) >∆
Pi f (P). We then say that (P,i) witnesses sure ∆-manipulability
for S by transitioning to P(cid:48) and that i has a sure ∆-manipulation incentive under S to transition to P(cid:48). A
profile P witnesses sure ∆-manipulability for S if and only if there is an i ∈ V such that (P,i) witnesses
sure ∆-manipulability for S. Finally, we say that S is susceptible to sure ∆-manipulation for (n,m) if and
only if there is an (n,m)-profile P that witnesses sure ∆-manipulability for S.
As an initial example, consider the Borda method. Recall that Borda is not resolute, so the Borda
winning set for a particular profile may contain multiple candidates. To obtain a resolute method from
an irresolute method f such as Borda, we may fix a tiebreaking mechanism, understood as a strict linear
order L on C, and define fL to be the resolute voting method defined by fL(P) = max( f (P),L). An
especially natural example of uncertainty about the voting method arises when there is uncertainty about
the tiebreaking mechanism to be used for a fixed voting method. Moreover, such uncertainty can be a
barrier to sure manipulation. For example, for n = 3, {Borda} is susceptible to sure weak dominance
manipulation, but this is not so when there is complete uncertainty about the tiebreaking mechanism.
Proposition 3.2. For any m ≥ 4, {BordaL L a linear order on C} is not susceptible to sure weak domi-
nance manipulation for (3,m).
Proof. Suppose for contradiction that there is a pointed profile (P,i) that witnesses sure weak dominance
manipulation for S = {BordaL L a linear order on C} by transitioning to P(cid:48). By the choice of S, it
follows that (i) every candidate in the Borda winning set for P(cid:48) is strictly preferred according to Pi to
every candidate in the Borda winning set in P. Let i's ranking of the candidates in P be αβγ.
First, the Borda winning set in P cannot contain α. For if it does, then there is no incentive to manip-
ulate under Bordaα>β >γ or Bordaα>γ>β , contradicting sure weak dominance manipulation. Second, the
Borda winning set in P cannot contain γ. For if it does, then by (i), the Borda winning set in P(cid:48) cannot
contain γ; but there is no P(cid:48) differing from P only in i's ranking such that γ is in the Borda winning set
in P but not in the Borda winning set in P(cid:48). Finally, we claim that the Borda winning set in P cannot be
{β}. Suppose it is. By (i), the Borda winning set in P(cid:48) cannot contain β or γ, so it must be {α}. But this
contradicts the fact that for 3 candidates, Borda is not single-winner manipulable [35, p. 57]. Having
ruled out all possible Borda winning sets in P, we obtain a contradiction.
258
Strategic Voting Under Uncertainty About the Voting Method
In this paper, we will focus on the case where S contains different voting methods, as in the following
example, rather than the same voting method with different tiebreaking rules.
Example 3.3. Consider the following (3,4)-profile P for C = {a,b,c} and V = {1,2,3,4}:
1
a
b
c
2
b
c
a
3
c
a
b
4
c
b
a
The winning sets for the voting methods are:
• {c} for Borda, Copeland, Hare, WeakNanson, Plurality,
PluralityWRunoff;
• {b,c} for Baldwin, Coombs, MaxMin, and StrictNanson.
If candidate 1 changes her ranking to bac, then all the methods select the winning set {b,c}. Suppose
P1 {c}, (P,1) witnesses sure ∆-dominance
that ∆ is either weak or optimistic dominance. Since {b,c} >∆
manipulability for any nonempty subset of methods from {Borda, Copeland, Hare, WeakNanson,
P1 {b,c}, this pointed profile (P,1) does not wit-
Plurality, PluralityWRunoff}. Since {b,c} (cid:54)>∆
ness sure ∆-dominance manipulability for any set of voting methods that contains one or more of the
following methods: Baldwin, Coombs, MaxMin, StrictNanson. Of course, there may be other pointed
profiles witnessing sure ∆-manipulation for sets of methods containing one of these methods.
the following profile P(cid:48) witnesses sure pessimist manipulation:
The above profile P does not witness sure pessimist manipulation for any set of voting methods. But
1
a
b
c
2
a
c
b
3
b
a
c
4
c
b
a
The winning sets for the voting methods are:
• {a} for Borda, Copeland, Hare, WeakNanson, Plurality, and
PluralityWRunoff;
• {a,b} for Baldwin, Coombs, MaxMin, and StrictNanson.
If candidate 1 changes her ranking to acb, then all the methods select the winning set {a}. Since
{a} >Pes
{a,b}, (P,1) witnesses sure pessimist manipulability for any nonempty
P(cid:48)
subset of methods from {Baldwin, Coombs, MaxMin, StrictNanson}, but no set containing any of the
1
following methods: Borda, Copeland, Hare, WeakNanson, Plurality, PluralityWRunoff.
{a,b} and {a,b} (cid:54)>Pes
P(cid:48)
1
3.1 Eliminating sure manipulation with a pair of voting methods
Our first question is whether uncertainty about the voting method may eliminate sure manipulation.
Definition 3.4. Let S be a set of voting methods. We say that S eliminates sure ∆-manipulation for (n,m)
iff S is not susceptible to sure ∆-manipulation for (n,m) but every nonempty S(cid:48) (cid:40) S is susceptible to sure
∆-manipulation for (n,m).
The numbers in Figure 1 represent the percentage of profiles that witness sure weak dominance
manipulation for (3,4) and (3,7). For example, 7.6% of (3,4)-profiles witness sure weak dominance
manipulation for {Plurality, Copeland}. The numbers along the diagonal give the percentage of
profiles witnessing weak dominance manipulation for a single voting method.8 The numbers highlighted
in red identify pairs of voting methods that eliminate sure weak dominance manipulation according to
Definition 3.4. For instance, 25% of the (3,4)-profiles witness weak dominance manipulation for Borda,
15% of the pointed (3,4)-profiles witness weak dominances manipulation for StrictNanson, but there
are no instances of sure weak dominance manipulation for {Borda, StrictNanson}.
8For 3 candidates, Hare and PluralityWRunoff always pick the same winners.
Holliday and Pacuit
259
Figure 1: Percentage of profiles witnessing sure weak dominance manipulation for (3,4) (left) and (3,7) (right).
To illustrate what happens with larger number of voters, we present in Figure 2 percentages for sure
weak dominance manipulation for Borda alone and Borda paired with several other voting methods.
The data for (4,4) was obtain by exhaustive search, while the data for (4,5) -- (4,70) was obtained by
generating 10,000 profiles for each (4,m) using the Impartial Culture model.
By exhaustive search from (3,4) -- (3,8),
we find that {Borda, Baldwin}, {Borda,
StrictNanson}, {WeakNanson, Baldwin},
and {WeakNanson, StrictNanson} are not
susceptible to sure weak dominance manip-
ulation, while each method individually is.
This raises the question of whether one can
prove that for all (3,m), those sets of meth-
ods eliminate sure weak dominance manipu-
lation. Indeed, we will prove this result.
Lemma 3.5. For any n ≥ 3 and m ≥
4,9 Baldwin, Borda, StrictNanson, and
WeakNanson are each susceptible to sure
weak dominance manipulation for (n,m).
Proof. Given a (3,m)-profile P, let P(cid:93)P2 be
the (3,m+2)-profile that results from adding
to P two fresh voters with rankings abc and
cba, respectively. The rankings of candidates by Borda score in P and P(cid:93) P2 are the same; the sets of
candidates with the lowest Borda scores in P and P(cid:93)P2 are the same; and the sets of candidates with less
than average (resp. less than or equal to average) Borda scores in P and P(cid:93)P2 are the same. Thus, the set
of Borda (resp. Baldwin, StrictNanson, WeakNanson) winners does not change from P and P(cid:93) P2.
It follows that if P witnesses ∆-manipulation for Borda (resp. Baldwin, StrictNanson, WeakNanson)
by transitioning to P(cid:48), then P(cid:93)P2 witnesses ∆-manipulation for Borda (resp. Baldwin, StrictNanson,
WeakNanson) by transitioning to P(cid:48) (cid:93) P2. Thus, to prove that one of these voting methods is susceptible
to ∆-dominance manipulation for (3,m) for any m ≥ 4, it suffices to show this for (3,4) and (3,5), as
9The lemma can also be proved by similar reasoning for n ≥ 4 and m ≥ 3. However, for n = 3 and m = 3, there are no
Figure 2: Percentage of (4,m)-profiles witnessing sure
weak dominance manipulation for Borda alone and
Borda paired with several other methods.
instances of weak dominance manipulation for these methods.
260
Strategic Voting Under Uncertainty About the Voting Method
susceptibility for all other pairs (3,m) then follows by the preceding observation about P(cid:93) P2. As we
verified using our Python script, there are indeed (3,4) and (3,5) profiles witnessing weak dominance
manipulability for all four methods individually.
For any (n,m)-profile P, let P+ be the (n+1,m)-profile that results from adding to P a fresh candidate
at the bottom of every voter's ranking. The set of Borda (resp. Baldwin, StrictNanson, WeakNanson)
winners does not change from P to P+. Thus, to prove that one of these methods is susceptible to
∆-dominance manipulation for (n,m) for any n ≥ 3, it suffices to show this for (3,m), as above.
The following main theorems, proved in the Appendix, show that uncertainty about the voting
method can entirely eliminate sure weak dominance manipulation.
Theorem 3.6. For any m ≥ 4, the sets {Borda, Baldwin} and {Borda, StrictNanson} eliminate sure
weak dominance manipulation for (3,m).
Theorem 3.7. For any m ≥ 4, the sets {WeakNanson, Baldwin} and {WeakNanson, StrictNanson}
eliminate sure weak dominance manipulation for (3,m).
By contrast, already for (3,5), {Baldwin, Borda, StrictNanson, WeakNanson} is susceptible to
sure optimistic dominance and sure pessimistic dominance. We give an example for optimistic domi-
nance, leaving pessimistic dominance as an exercise.
Example 3.8. Let P be the following (3,5) profile:
2
a
b
c
4
c
b
a
5
c
b
a
3
b
a
c
1
a
b
c
For another contrast to Theorems 3.6-3.7, when we increase to 4 candidates, {Baldwin, Borda,
Baldwin, Borda, StrictNanson, and WeakNanson choose {b}. If voter
1 changes her ranking to a c b, then {a,b,c} is the winning set for all four
methods. Since {a,b,c} >Opt
{b}, (P,1) witnesses sure optimist dominance
P1
manipulability for {Baldwin, Borda, StrictNanson, WeakNanson}.
StrictNanson, WeakNanson} is susceptible to sure weak dominance manipulation.
Example 3.9. Consider the following (4,3)-profile P:
1
a
b
c
d
2
b
d
c
a
3
c
a
b
d
is {b}, while the Baldwin, StrictNanson, and
The Borda winning set
WeakNanson winning sets are all {a,b,c}.
If voter 1 changes her rank-
is {a,b}, while the Baldwin,
ing to ad bc,
then the Borda winning set
StrictNanson, and WeakNanson winning sets are {a}. Since {a,b} >weak
{b}
P1
and {a} >weak
{a,b,c}, (P,1) witnesses sure weak dominance manipulability for
P1
{Baldwin, Borda, StrictNanson, WeakNanson}.
3.2 The failure of the Duggan-Schwartz theorem for sets of voting methods
A natural analogue of the Duggan-Schwartz theorem [9] for sure manipulation of sets of voting methods
would state that for any (n,m) with n ≥ 3 and set S of methods, each of which is non-imposed and
has no nominator, S is susceptible to sure optimistic or pessimistic dominance manipulation for (n,m).
However, this statement is false, as shown by the following example verified by our Python script.
Example 3.10. These sets of methods (which are non-imposed and have no nominator) eliminate sure
optimistic and pessimistic dominance manipulation for (3,6): {Baldwin, Condorcet}, {Condorcet,
Copeland}, {Condorcet, MaxMin}, {Condorcet, StrictNanson}, and {Condorcet, WeakNanson}.
Holliday and Pacuit
261
3.3 Cases where three methods are needed for elimination
So far we have only considered sets of two voting methods. But in some cases three voting methods are
needed to eliminate sure manipulation. We saw in Example 3.9 that {Borda, Baldwin} is susceptible to
sure weak dominance manipulation for (4,3). However, adding Coombs to {Borda, Baldwin} eliminates
sure weak dominance manipulation, as verified by our Python script (which also finds profiles witnessing
sure weak dominance manipulability for {Borda, Coombs} and {Coombs, Baldwin}).
Fact 3.11. {Borda, Coombs, Baldwin} eliminates sure weak dominance manipulation for (4,3).
3.4 (n,m) for which sure manipulation cannot be eliminated
So far we have focused on eliminating sure manipulation using uncertainty about the voting method.
However, as the following result shows, eliminating sure manipulation is not always possible.
Proposition 3.12. For every (n,m), there are n(cid:48) > n and m(cid:48) > m such that every nonempty subset of
Methods\{Condorcet} is susceptible to sure weak dominance manipulation for (n(cid:48),m(cid:48)).
Proof. First, we claim that if there is one (n,m)-profile that witnesses sure weak dominance manipula-
bility for every nonempty subset of Methods\{Condorcet}, then for all k ∈ N, there is an (n,m +24k)-
profile that does so. For any profile P, let P(cid:93)P24 be the result of adding 24 new voters to P, one with each
of the possible 24 rankings of {a,b,c,d}. It is easy to see that for any f ∈ Methods, f (P) = f (P(cid:93) P24).
It follows that if P witnesses sure ∆-dominance manipulability for S by transitioning to P(cid:48), then so does
P(cid:93) P24 by transitioning to P(cid:48) (cid:93) P24. In addition, using the construction from P to P+ in the proof of
Lemma 3.5, we can increase the number n of candidates, since for any f ∈ Methods, f (P) = f (P+).
Now consider the following (4,4)-profile P:
1
a
b
c
d
2
b
d
c
a
3
c
a
b
d
4
c
a
b
d
If voter 1 changes to bd ca,
Every method in Methods \ {Condorcet} chooses {c} as the set of win-
ners.
then the winning set for all methods
in Method\{Condorcet} becomes {b,c}.
{c}, (P,1)
witnesses sure weak dominance manipulability for any nonempty subset of
Method\{Condorcet}.
Since {b,c} >weak
P1
3.5 Reduction without elimination
Even when eliminating sure manipulation is not possible, one may hope to reduce it. For example,
in Figures 1 and 2, there are a number of cases in which a pair of methods does not eliminate sure
weak dominance manipulation but does reduce the number of profiles witnessing sure weak dominance
manipulation relative to either method individually. This motivates the following notions.
Definition 3.13. For any sets S and S(cid:48) of voting methods, S is less susceptible to sure ∆-manipulation
than S(cid:48) for (n,m)-profiles (resp. pointed (n,m)-profiles) iff there are fewer (n,m)-profiles (resp. pointed
(n,m)-profiles) witnessing sure ∆-manipulation for S than there are for S(cid:48).
Definition 3.14. A set S of methods improves on all its subsets with respect to sure ∆-manipulation for
(n,m) iff S is less susceptible to sure ∆-manipulation for (n,m)-profiles than any nonempty S(cid:48) (cid:40) S.
Such improvement is especially pronounced with optimistic and pessimistic dominance, as in Figure 3.
Even if a set S does not improve on all of its subsets, that S is less susceptible to sure ∆-manipulation
than one of its subset may still be significant. An election designer who intends to use method f may
wish to leave voters uncertain between f and f (cid:48) in order to reduce the chance that voters will surely
262
Strategic Voting Under Uncertainty About the Voting Method
Figure 3: Percentage of profiles witnessing sure optimistic dominance manipulation for (3,7) (left) and sure
pessimistic dominance manipulation for (3,6) (right).
manipulate, relative to what would happen if voters knew the method was f , even if there is no reduction
relative to what would happen if the planner intended to use f (cid:48) and voters knew this. For example, in
Figure 1 for (3,7), someone intending to use Plurality could reduce the percentage of profiles in which
a voter will surely manipulate from 29% to 9% by leaving the voter uncertain between Plurality and
Hare, even though an election designer intending to use Hare would have no incentive to do so, since
the percentage of profiles witnessing sure manipulation for Hare by itself is already 9%.
A striking pattern in Figures 1, 2, and 3 is that pairing Borda with another method leads to significant
reductions in sure dominance manipulation. Using one or more methods to help reduce manipulation for
a preferred method is even more important in the case of safe manipulation discussed next.
4 Safe manipulation
Pi f (P) and ∃ f ∈ S : f (P(cid:48)) >∆
We now turn to a less conservative approach to strategic voting under uncertainty about the voting
method: submit an insincere ranking whenever you know that doing so will lead to an outcome that
is at least as good and might lead to a better outcome.
Definition 4.1. Let (P,i) be a pointed profile, ∆ a dominance notion, and S a set of voting methods.
Then (P,i) witnesses safe ∆-manipulability for S iff there is a profile P(cid:48) differing from P only in i's ballot
such that: ∀ f ∈ S : f (P(cid:48)) ≥∆
Pi f (P). We then say that (P,i) witnesses safe
∆-manipulability for S by transitioning to P(cid:48). A profile P witnesses safe ∆-manipulability for S iff there
is an i ∈ V such that (P,i) witnesses safe ∆-manipulability for S.
Remark 4.2. A variant of safe manipulability, which we will call harmless manipulability, says that
you should submit an insincere ranking whenever you know that doing so will not lead to a worse
outcome and might lead to a better outcome: ∀ f ∈ S : f (P(cid:48)) (cid:54)<∆
Pi f (P). Since
f (P(cid:48)) (cid:54)<weak
f (P), harmless weak dominance manipulability does not
imply safe weak dominance manipulability for a given (P,i) transitioning to P(cid:48). But for pessimistic and
optimistic dominance, harmless and safe manipulability are equivalent.
Pi f (P) and ∃ f ∈ S : f (P(cid:48)) >∆
f (P) does not imply f (P(cid:48)) ≥weak
Pi
Pi
For certain profiles and uncertainty sets S, submitting an insincere ranking may lead to a better
outcome with one method in S but a worse outcome with another method in S, in which case it is not safe
to manipulate using that insincere ranking.
Holliday and Pacuit
263
Example 4.3. Let P be the following (3,5)-profile:
1
c
b
a
2
a
c
b
3
b
a
c
4
c
b
a
5
a
c
b
Here Hare(P) = {a}, Borda(P) = {c}, and MaxMin(P) = {a,c}. Suppose
voter 1 changes her ranking to b a c, resulting in P(cid:48). Then Hare(P(cid:48)) = {b},
Borda(P(cid:48)) = {a}, and MaxMin(P(cid:48)) = {a,b}. Since {b} >weak
{a}, voter
1 has an incentive to manipulate with Hare. But voter 1 does not have an
incentive to manipulate with Borda, since {c} >weak
{a}, or MaxMin, since
P1
{a,b} (cid:54)≥weak
P1
{a,c}.
P
Thus, (P,1) does not witness safe weak dominance manipulation for Borda together with any nonempty
subset of {Hare, MaxMin}.
It seems too much to hope to eliminate safe manipulation by adding reasonable methods to S; for this
would require that for every profile in which a manipulation results in a better outcome for one method
in S, it results in a worse outcome for another method in S, which seems unlikely to hold for a set of
reasonable methods. However, one can eliminate safe manipulation by adding methods that would be
considered unreasonable by themselves.
Example 4.4. For any distinct x,y ∈ C and i ∈ V , let fx,y,i be the method such that fx,y,i(P) selects as the
winner whichever of x and y is ranked higher according to Pi (cf. [26]). It is easy to see that if S contains
fx,y,i for each distinct x,y ∈ C, then i cannot safely manipulate with S.
Although eliminating safe manipulation with reasonable methods may be too much to hope for, one
can reduce safe manipulation. Thus, we are interested in the following analogue of Definition 3.13.
Definition 4.5. For any sets S and S(cid:48) of voting methods, S is less susceptible to safe ∆-manipulation
than S(cid:48) for (n,m)-profiles (resp. pointed (n,m)-profiles) iff there are fewer (n,m)-profiles (resp. pointed
(n,m)-profiles) witnessing sure safe ∆-manipulation for S than there are for S(cid:48).
Figure 4: Percentage of profiles witnessing safe weak dominance manipulation for (3,6) (left) and (3,7) (right).
Figure 4 shows the percentage of profiles witnessing safe weak dominance manipulation for (3,6)
and (3,7) for sets of two voting methods. All of the following can happen: (1) Unlike with sure
manipulation, with safe manipulation a voter who is uncertain between methods f and f (cid:48) may have
an incentive to manipulate on more profiles than a voter who knows the method is f and more pro-
files than a voter who knows the method is f (cid:48). E.g., this happens for (3,7) when f = Borda and
f (cid:48) = Hare. (2) A voter who is uncertain between methods f and f (cid:48) may have an incentive to manip-
ulate on fewer profiles than a voter who knows the method is f and fewer profiles than a voter who
264
Strategic Voting Under Uncertainty About the Voting Method
knows the method if f (cid:48). E.g., this happens for (3,6) when f = Coombs and f (cid:48) = Hare. In Figure 4,
all examples of this phenomenon are indicated with the blue boxes. For (3,7), there are no examples.
(3) A voter who is uncertain between meth-
ods f and f (cid:48) may have an incentive to ma-
nipulate on fewer profiles than a voter who
knows the method is f but more profiles than
a voter who knows the method is f (cid:48). E.g.,
this happens with (3,6) when f = Borda
and f (cid:48) = Hare. In case (3), an election de-
signer who intends to use method f may de-
cide to leave voters uncertain between f and
f (cid:48) in order to decrease the chance that voters
will safely manipulate (cf. the end of Section
3.5).10 E.g., Figure 5 shows how an election
designer intending to use Coombs could pair
Coombs with several other methods to form
an uncertainty set of two methods in order to
decrease the percentage of profiles in which
a voter will safely manipulate.
Figure 5: Percentage of (4,m)-profiles witnessing safe
weak dominance manipulation for Coombs alone and
Coombs paired with several other methods.
5 Expected manipulation
Our last approach to strategic voting under uncertainty about the voting method is the most liberal:
assuming one's uncertainty about the voting method is given by a lottery on the set of voting methods,
submit an insincere ranking if and only if doing so is more likely to lead to a better outcome than to lead
to a worse outcome. Recall that a lottery on a set Y is a function ν : Y → [0,1] such that ∑y∈Y ν(y) = 1.
For X ⊆ Y , let ν(X) = ∑x∈X ν(x).
Definition 5.1. Let (P,i) be a pointed profile, ∆ a dominance notion, S a set of voting methods, and ν a
lottery on S. Then (P,i) witnesses ν-expected ∆-manipulability for S if and only if there is a profile P(cid:48)
differing from P only in i's ballot such that ν({ f ∈ S f (P(cid:48)) >∆
Pi f (P)}).
Then we say (P,i) witnesses ν-expected ∆-manipulability for S by transitioning to P(cid:48).
Pi f (P)}) > ν({ f ∈ S f (P(cid:48)) <∆
For simplicity, here we focus on ν being the uniform lottery on S, in which case we simply speak
of 'expected ∆-manipulability' instead of 'ν-expected ∆-manipulability'. For ν uniform, this amounts to
simply counting the number of voting methods in S that lead to a better outcome vs. a worse outcome.
Example 5.2. The pointed profile (P,1) in Example 4.3 does not witness expected weak dominance
manipulability for {Borda, Hare} by transitioning to P(cid:48) since voter 1's manipulation results in a better
outcome according to one method (Hare) but a worse outcome according to another method (Borda).
However, like Hare, Baldwin chooses {a} as the set of winners in P and {b} as the set in P(cid:48). Hence
(P,1) witnesses expected weak dominance manipulability for {Baldwin, Borda, Hare} by transitioning
to P(cid:48), as two methods lead to a better outcome and only one leads to a worse outcome.
10In this case, a sophisticated voter with access to the manipulation data for f , f (cid:48), and { f , f (cid:48)} could infer that the election
designer intenders to use f . For example, if S = {Borda, Hare} for (3,6), then such a voter could infer that the designer intends
to use Borda, since a designer who intends to use Hare will not decrease manipulation with S = {Borda, Hare}. If the designer
anticipates that voters are sophisticated in this way, then she should move from a single method to a pair only in case (2).
(4, 4)(4, 5)(4, 6)(4, 7)(4, 10)(4, 25)(4, 40)(4, 55)(4, 70)Voting Sizes1020304050PercentagePercentage of profiles witnessing safe weak dominance manipulationUncertainty SetCoombsCoombs,WeakNansonCoombs,CopelandCoombs,BaldwinCoombs,MaxMinHolliday and Pacuit
265
The following fact is immediate from the definitions.
Fact 5.3. If (P,i) witnesses safe ∆-dominance manipulability for S, then (P,i) witnesses expected ∆-
dominance manipulability for S.
The converse of Fact 5.3 does not hold, as shown by Example 5.2. But for S = 2 expected weak
dominance manipulability is equivalent to harmless weak dominance manipulability (recall Remark 4.2).
Using the obvious notion of less susceptible to expected ∆-dominance manipulation analogous to
Definitions 3.13 and 4.5, we have the following result, inspired by [26], showing how adding a method
to the set S may reduce expected manipulation.
Proposition 5.4. Suppose S is a set of voting methods such that for some f ∈ S, (n,m), pointed (n,m)-
profile (P,i), and a,b ∈ C, (1) (P,i) witnesses weak dominance manipulability for f , and (2) for any
P(cid:48) differing from P only in i's ranking, if (P,i) witnesses weak dominance manipulability for f by
transitioning to P(cid:48), then P(cid:48) differs from P in i's ranking of a vs. b, and for all g ∈ S\{ f}, g(P) = g(P(cid:48)).
Then where fa,b,i is the method defined in Example 4.4, S∪{ fa,b,i} is less susceptible to expected weak
dominance manipulation than S for pointed (n,m)-profiles.
Proof. The key properties of fa,b,i are that (i) there are no profiles P and P(cid:48) differing only in i's rank-
ing such that we have fa,b,i(P(cid:48)) >weak
fa,b,i(P), and (ii) if P and P(cid:48) differ in i's ranking of a vs. b, then
fa,b,i(P(cid:48)) <weak
fa,b,i(P). It follows from (i) that any pointed profile witnessing expected weak dominance
manipulability for S∪{ fa,b,i} also witnesses expected weak dominance manipulability for S. Thus, to
prove the proposition, we need only find a pointed profile witnessing expected weak dominance manip-
ulability for S but not S∪{ fa,b,i}. By assumption, there is a pointed (n,m)-profile (P,i) and a,b ∈ C
satisfying items (1) and (2) of the proposition. Given (1), consider any P(cid:48) such that (P,i) witnesses
weak dominance manipulability for f by transitioning to P(cid:48). It then follows by (2) that (P,i) witnesses
expected weak dominance manipulability for S by transitioning to P(cid:48). However, we claim that (P,i) does
not witness expected weak dominance manipulability for S∪{ fa,b,i} by transitioning to P(cid:48). This follows
from the facts that f and fa,b,i are equally likely according to the uniform measure, {h ∈ S ∪{ fa,b,i}
h(P(cid:48)) <weak
h(P)} = { fa,b,i} by (2) and (ii), and {h ∈ S∪{ fa,b,i} h(P(cid:48)) >weak
Pi
h(P)} = { f} by (2).
Pi
Pi
Pi
We conclude this section with an example in which the conditions of Proposition 5.4 apply.
Example 5.5. Consider the following (3,5)-profile P:
1
c
a
b
2
c
a
b
3
a
c
b
4
a
c
b
5
a
c
b
Let S = {Borda, Coombs}.
(P,i) witnesses the weak manipulability of
Borda by transitioning to the profile P(cid:48) in which i's new ranking is cba,
as the Borda winning set in P is {a}, the Borda winning set in P(cid:48) is {a,c},
and {a,c} >weak
P1
{a}.
Moreover, this is the only P(cid:48) differing from P only in i's ranking such that (P,i) witnesses the weak
manipulability of Borda by transitioning to P(cid:48). Finally, the winning set for Coombs in both P and P(cid:48) is
{a}. Thus, the conditions of Proposition 5.4 are satisfied for f = Borda, so {Borda, Coombs, fa,b,i} is
less susceptible to expected weak dominance manipulation than {Borda, Coombs}.
6 Relation to probabilistic social choice
In this section, we briefly relate our work to strategic voting in the setting of probabilistic social choice.
Definition 6.1. A probabilistic social choice function (PSCF) is a function F assigning to each profile P
a lottery F(P) on C.
266
Strategic Voting Under Uncertainty About the Voting Method
To define manipulation of PSCFs, we need a notion of when a voter prefers one lottery to another.
Among many possible options (see, e.g., [4, Sec. 1.3.2]), the following is popular.
Definition 6.2. Let µ and µ(cid:48) be lotteries on C and (P,i) a pointed profile. We say that µ stochastically
dominates µ(cid:48) in (P,i) if and only if for every x ∈ C, the probability that µ selects a candidate ranked at
least as highly as x by i is greater than or equal to the probability that µ(cid:48) selects a candidate ranked at
least as highly as x by i:
∀x ∈ C : ∑
µ(y) ≥ ∑
µ(cid:48)(y).
y:yRix
y:yRix
We write µ (cid:37)Pi µ(cid:48) if µ stochastically dominates µ(cid:48) in (P,i) and µ (cid:31)Pi µ(cid:48) if µ (cid:37)Pi µ(cid:48) but µ(cid:48) (cid:54)(cid:37)Pi µ.
Note that µ (cid:37)Pi µ(cid:48) if and only if for every utility function on C that is compatible with Pi, the expected
utility of µ is at least as great as the expected utility of µ(cid:48) (see, e.g., [3, p. 302-3]).
Definition 6.3. Let F be a PSCF. A pointed profile (P,i) witnesses stochastic dominance manipulability
for F if and only if there is a profile P(cid:48) differing only in i's ranking such that F(P(cid:48)) (cid:31)Pi F(P).11 We then
say that (P,i) witnesses stochastic dominance manipulability for F by transitioning to P(cid:48).
For results on stochastic dominance manipulability, see [4].
To relate the above notions to this paper, we observe how any set S of voting methods gives rise to
a PSCF, assuming that (i) each method in S is equally likely to be used and (ii) each candidate in the
set of winners selected by a method is equally likely to be chosen as the unique winner by a tiebreaking
mechanism. Then the probability that a given candidate a ∈ C will be chosen as the winner is:
Pr(a wins) = ∑
f∈S
= ∑
(cid:16)
f∈S
a∈ f (P)
∑
f∈S
a∈ f (P)
Pr(a wins f is used)× Pr( f is used)
Pr(a wins f is used)× Pr( f is used) + ∑
f∈S
a(cid:54)∈ f (P)
= ∑
f∈S
a∈ f (P)
Pr(a wins f is used)× Pr( f is used)
f (P) × 1
S .
0× 1
S
1
f (P) × 1
S
∑
f∈S
a(cid:54)∈ f (P)
(cid:17)
(cid:16)
(cid:17)
1
=
+
Thus, for a profile P and set S of voting methods, we define the lottery µP
S on C by
S (a) = ∑
µP
f∈S
a∈ f (P)
1
f (P) × 1
S .
Finally, for any set S of voting methods, we define the PSCF FS by FS(P) = µP
S .
Remark 6.4. For any set S of voting methods and lottery ν on S, one can define a PSCF FS,ν in the
obvious way by weighting the methods in S according to ν (and one can modify assumption (ii) with a
non-uniform measure for tiebreaking). For simplicity, here we focus on the uniform measure on S.
The following fact can be verified from the definitions.
11Gibbard's [14] notion of srategyproofness for a PSCF F is equivalent to the condition (called strong SD-strategyproofness
in [4]) that for every pointed profile (P,i) and profile P(cid:48) differing only in i's ranking, F(P) (cid:37)Pi F(P(cid:48)), i.e., there is no profile
(P,i) witnessing manipulation in the sense that there exists a profile P(cid:48) differing only in i's ranking such that F(P) (cid:54)(cid:37)Pi F(P(cid:48))
(which Gibbard states in the equivalent form: there is some utility function on C such that the expected utility of F(P(cid:48)) is
greater than that of F(P)). Following Brandt [4], we prefer the notion of (P,i) witnessing stochastic dominance manipulation
in Definition 6.3, which is the notion used in Brandt's definition of (weak) SD-strategyproofness.
Holliday and Pacuit
267
Fact 6.5. If (P,i) witnesses safe weak dominance manipulation for S by transitioning to P(cid:48), then (P,i)
witnesses stochastic dominance manipulation for FS by transitioning to P(cid:48).
However, stochastic manipulation does not imply safe weak manipulation.
Example 6.6. Consider the following (3,4)-profile P for C = {a,b,c} and V = {1,2,3,4}:
1
a
b
c
2
a
c
b
3
b
a
c
4
b
a
c
The Coombs, Copeland, and Hare winning set is {a,b}.
If voter 1 changes
to the ranking cab, transitioning to the profile P(cid:48), then the new winning set for
Coombs and Copeland is {a} and the new winning set for Hare is {b}. Note that
{a} >weak
{b}, so voter 1's new ranking leads to a better
P1
weak dominance outcome according to Coombs and Copeland but a worse weak
dominance outcome according to Hare.
{a,b} and {a,b} >weak
P1
Pi
Pi
Thus, (P,1) does not witness safe weak dominance manipulability by transitioning to P(cid:48).
Let S = {Coombs, Copeland, Hare}. The lottery FS(P) is [a : 1/2, b : 1/2, c : 0]. The lottery FS(P(cid:48))
is [a : 2/3, b : 1/3, c : 0]. As voter 1's ranking in P is abc, FS(P(cid:48)) stochastically dominates FS(P), since
the probability according to FS(P(cid:48)) of selecting a candidate at least as good as b is equal to the probability
according to FS(P) (both are 1), and the probability according to FS(P(cid:48)) of selecting a candidate at least
as good as a (probability 2/3) is greater than the probability according to FS(P) (probability 1/2). So
(P,1) witnesses stochastic dominance manipulability for FS(P) by transitioning to P(cid:48).
It is easy to see abstractly that stochastic dominance manipulation also does not imply expected
weak dominance manipulation: e.g., if S = { f1, f2} and the transition from (P,i) to P is such that
f2(P(cid:48)), then the transition does not witness expected weak manip-
f1(P) <weak
ulation, but the amount by which f1 increases the probability of getting a preferred candidate may be
greater than the amount by which f2 decreases the probability of getting a preferred candidate, so that
the lottery Ff1, f2(P(cid:48)) stochastically dominates the lottery Ff1, f2(P). The same idea applies for more than
two methods. It remains to be seen whether an example of this kind exists with standard voting methods.
We can, however, use standard methods to show that expected weak dominance manipulation does
f1(P(cid:48)) and f2(P) >weak
not imply stochastic weak dominance manipulation.
Example 6.7. Let P and P(cid:48) be the profiles in Example 4.3 and S = {Baldwin, Borda, Hare}. In P,
Baldwin and Hare select a as the winner, while Borda selects c as the winner. Thus, the lottery FS(P)
is [a : 2/3, b : 0, c : 1/3]. In P(cid:48), Baldwin and Hare select b as the winner, while Borda selects a as the
winner. Thus, the lottery FS(P(cid:48)) is [a : 1/3, b : 2/3, c : 0]. As voter 1's ranking in P is cba, FS(P(cid:48)) does
not stochastically dominate FS(P), since the probability according to FS(P(cid:48)) of selecting a candidate at
least as good as c is not greater than or equal to the probability according to FS(P) of selecting a candidate
at least as good as c. Thus, (P,1) does not witness stochastic dominance manipulability for FS(P) by
transitioning to P(cid:48). However, as two of the three methods in S lead to a better set of winners (in the sense
of weak dominance) in P(cid:48) than in P according to voter 1's ranking in P, (P,1) does witness expected
weak dominance manipulability for {Baldwin, Borda, Hare} by transitioning to P(cid:48).
7 Conclusion
In this paper, we have shown that uncertainty about the voting method can be used as a barrier to ma-
nipulation. Considering such uncertainty led to three decision rules that voters may use to decide when
to manipulate: sure, safe, and expected manipulation. Related issues arise when studying probabilistic
voting methods, though Section 6 shows that our notions of sure, safe, and expected manipulation do not
collapse to a standard notion of stochastic manipulation of probabilistic voting methods.
268
Strategic Voting Under Uncertainty About the Voting Method
This initial study relied heavily on computer searches. Two natural next steps are (i) to prove addi-
tional possibility (or impossibility) theorems, like our Theorems 3.6-3.7, and (ii) to incorporate uncer-
tainty about voting methods into the asymptotic analysis of strategic voting as the number of candidates
or voters increases (see, e.g., [33, 23]). Finally, a full analysis should take into account both uncertainty
about the voting method and uncertainty about how others will vote.
References
[1] Haris Aziz, Florian Brandl, Felix Brandt & Markus Brill (2018): On the tradeoff between efficiency and
strategyproofness. Games and Economic Behavior 110, pp. 1 -- 18, doi:10.1016/j.geb.2018.03.005.
[2] Jean-Pierre Benoit (2002): Strategic Manipulation in Voting Games When Lotteries and Ties Are Permitted.
Journal of Economic Theory 102(2), pp. 421 -- 436, doi:10.1006/jeth.2001.2794.
[3] Anna Bogomolnaia & Herv´e Moulin (2001): A New Solution to the Random Assignment Problem. Journal
of Economic Theory 100(2), pp. 295 -- 328, doi:10.1006/jeth.2000.2710.
[4] Felix Brandt (2017): Rolling the dice: Recent results in probabilistic social choice. In Ulle Endriss, editor:
Trends in Computational Social Choice, AI Access, pp. 3 -- 26.
[5] Samir Chopra, Eric Pacuit & Rohit Parikh (2004): Knowledge-theoretic properties of strategic voting.
In: Proceedings of the 8th European Conference on Logics in Artificial Intelligence (JELIA), pp. 18 -- 30,
doi:10.1007/11493402 15.
[6] Vincent Conitzer, Tobby Walsh & Lirong Xia (2011): Dominating manipulations in voting with partial
information. In: Proceedings of AAAI 2011, pp. 638 -- 643.
[7] Vincent Conitzer & Toby Walsh (2016): Barriers to Manipulation in Voting. In: Handbook of Computational
Social Choice, Cambridge University Press, pp. 127 -- 145, doi:10.1017/CBO9781107446984.007.
[8] Keith Dowding & Martin Van Hees (2008): In Praise of Manipulation. British Journal of Political Science
38(1), pp. 1 -- 15, doi:10.1017/S000712340800001X.
[9] John Duggan & Thomas Schwartz (2000): Strategic manipulability without resoluteness or shared beliefs:
Gibbard-Satterthwaite generalized. Social Choice and Welfare 17(1), pp. 85 -- 93, doi:10.1007/PL00007177.
[10] Piotr Faliszewski & Ariel D. Procaccia (2010): AI's War on Manipulation: Are We Winning? AI Magazine
31(4), pp. 53 -- 64, doi:10.1609/aimag.v31i4.2314.
[11] Allan M. Feldman (1980): Strongly nonmanipulable multi-valued collective choice rules. Public Choice
35(4), pp. 503 -- 509, doi:10.1007/BF00128127.
[12] Peter Gardenfors (1976): Manipulation of social choice functions. Journal of Economic Theory 13, pp.
217 -- 228, doi:10.1016/0022-0531(76)90016-8.
[13] Allan Gibbard (1973): Manipulation of Voting Schemes: A General Result. Econometrica 41(4), pp. 587 --
601, doi:10.2307/1914083.
[14] Allan Gibbard (1977): Manipulation of Schemes that Mix Voting with Chance. Econometrica 45(3), pp.
665 -- 681, doi:10.2307/1911681.
[15] Georges-Th´eodule Guilbaud (1952): Les th´eories de l'int´eret gen´eral et le probl´emelogique de l'agr´egation.
Economie Appliqu´ee 5(4), pp. 501 -- 551.
[16] Aanund Hylland (1980): Strategy proofness of voting procedures with lotteries as outcomes and infinite sets
of strategies. University of Oslo.
[17] Egor Ianovski, Lan Yu, Edith Elkind & Mark C. Wilson (2011): The Complexity of Safe Manipulation under
Scoring Rules. In: Proceedings of the Twenty-Second International Joint Conference on Artificial Intelli-
gence, pp. 246 -- 251, doi:10.5591/978-1-57735-516-8/IJCAI11-052.
Holliday and Pacuit
269
[18] Richard Jeffrey (1971): Statistical Explanation vs. Statistical Inference.
In Wesley C. Salmon, ed-
itor: Statistical Explanation and Statistical Relevance, University of Pittsburgh Press, pp. 19 -- 28,
doi:10.2307/j.ctt6wrd9p.5.
[19] Jerry S. Kelly (1977): Strategy-Proofness and Social Choice Functions Without Single-valuedness. Econo-
metrica 45(2), pp. 439 -- 446, doi:10.2307/1911220.
[20] Jerry S. Kelly (1985): Minimal Manipulability and Local Strategy-Proofness. Social Choice and Welfare
5(1), pp. 81 -- 85, doi:10.1007/BF00435499.
[21] Reshef Meir (2018): Strategic Voting. Synthesis Lectures on Artificial Intelligence and Machine Learning,
Morgan & Claypool.
[22] Samuel Merrill (1982): Strategic voting in multicandidate elections under uncertainty and under risk. In:
Power, voting, and voting power, Springer, pp. 179 -- 187, doi:10.1007/978-3-662-00411-1 12.
[23] Elchanan Mossel & Mikl´os Z. R´acz (2015): A quantitative Gibbard-Satterthwaite theorem without neutrality.
Combinatorica 35(3), pp. 317 -- 387, doi:10.1007/s00493-014-2979-5.
[24] Emerson M. S. Niou (1987): A Note on Nanson's Rule.
doi:10.1007/BF00123006.
Public Choice 54(2), pp. 191 -- 193,
[25] Shmuel Nitzan (1985): The vulnerability of point-voting schemes to preference variation and strategic ma-
nipulation. Public Choice 47(2), pp. 349 -- 370, doi:10.1007/BF00127531.
[26] Matias Nunez & Marcus Pivato (2019): Truth-revealing voting rules for large populations. Games and
Economic Behaviour 113, pp. 285 -- 305, doi:10.1016/j.geb.2018.09.009.
[27] Martin Osborne & Ariel Rubinstein (2003): Sampling equilibrium, with an application to strategic voting.
Games and Economic Behavior 45(2), pp. 434 -- 441, doi:10.1016/S0899-8256(03)00147-7.
[28] Eric Pacuit (2019): Voting Methods. In Edward N. Zalta, editor: The Stanford Encyclopedia of Philosophy,
Metaphysics Research Lab, Stanford University.
[29] Peter Railton (1981): Probability, Explanation, and Information.
doi:10.1007/BF01063889.
Synthese 48(2), pp. 233 -- 256,
[30] Annemieke Reijngoud & Ulle Endriss (2012): Voter response to iterated poll information. In: Proceedings
of the 11th International Conference on Autonomous Agents and Multiagent Systems, pp. 635 -- 644.
[31] Mark Satterthwaite (1973): The Existence of a Strategy Proof Voting Procedure. Ph.D. thesis, University of
Wisconsin.
[32] Mark Satterthwaite (1975): Strategy-proofness and Arrow's Conditions: Existence and Correspondence The-
orems for Voting Procedures and Social Welfare Functions. Journal of Economic Theory 10(2), pp. 187 -- 217,
doi:10.1016/0022-0531(75)90050-2.
[33] Arkadii Slinko (2002): On Asymptotic Strategy-Proofness of Classical Social Choice Rules. Theory and
Decision 52(4), pp. 389 -- 398, doi:10.1023/A:1020240214900.
[34] Arkadii Slinko & Shaun White (2014): Is it ever safe to vote strategically? Social Choice and Welfare 43(2),
pp. 403 -- 427, doi:10.1007/s00355-013-0785-4.
[35] Alan D. Taylor (2005): Social Choice and the Mathematics of Manipulation. Cambridge University Press,
Cambridge, doi:10.1017/CBO9780511614316.
[36] Hans van Ditmarsch, Jerome Lang & Abdallah Saffidine (2013): Strategic voting and the logic of knowledge.
In: Proceedings of the 14th Conference on Theoretical Aspects of Rationality and Knowledge (TARK), pp.
196 -- 205.
A Proof of Theorem 3.6
In this appendix, we prove Theorem 3.6: for any m ≥ 4, the sets {Borda, Baldwin} and {Borda,
StrictNanson} eliminate sure weak dominance manipulation for (3,m).
270
Strategic Voting Under Uncertainty About the Voting Method
Proof. Given Lemma 3.5, we need only show that the two sets of methods are not susceptible to sure
weak dominance manipulation for (3,m). Toward a contradiction, suppose (P,i) is a pointed (3,m)-
profile witnessing sure weak dominance manipulation for either of the two sets by transitioning to a
profile P(cid:48). Suppose i's ballot in P is αβγ.
Claim 1: the Borda winning set in P(cid:48) does not contain all three candidates. This follows by analyzing
the possible sets of Borda winners in P. A three-way tie {α,β ,γ} does not weakly dominate any of the
following sets for i: {α}, {β}, {α,β}, {α,γ}, {α,β ,γ}. This leaves only the winning sets {β ,γ} and
{γ} to consider. But voter i cannot manipulate so as to change the set of Borda winners from {β ,γ}
to {α,β ,γ}; for the Borda scores of β and γ must still be tied in P(cid:48), so i's ranking in P(cid:48) must be βγα,
which decreases α's Borda score. In addition, voter i cannot manipulate so as to change the set of Borda
winners from {γ} to {α,β ,γ}. For if i ranks γ higher in P(cid:48), then γ's Borda score increases by at least
one, and no other candidate's Borda score increases by more than one, so the set of winners is still {γ};
hence i's ranking in P(cid:48) must be βαγ, but this fails to add α to the set of winners.
Label the candidates in order of ascending Borda score in P(cid:48) as ϕ, ψ, and χ. Thus, by Claim 1,
B(cid:48)(ϕ) < B(cid:48)(ψ) ≤ B(cid:48)(χ) or
B(cid:48)(ϕ) = B(cid:48)(ψ) < B(cid:48)(χ),
(1)
(2)
where B(cid:48) indicates the Borda score in P(cid:48). Let B(ϕ),B(ψ),B(χ) be the Borda scores of ϕ, ψ, and χ in P.
Claim 2: i's ranking changes from P to P(cid:48) either by switching her 1st and 2nd placed candidates or
by switching her 2nd and 3rd candidates; thus, one candidate's Borda score remains the same, and no
candidate's Borda score changes by more than one point. Suppose for a contradiction that i's 3rd place
candidate in P is her 1st place candidate in P(cid:48) or her 1st place candidate in P is her 3rd place candidate
in P(cid:48). Then since i's ranking in P is αβγ, we have that i's ranking in P(cid:48) is either γβα, γαβ , or βγα.
But we claim i does not have an incentive to transition to any of these rankings from the original ranking
αβγ. The first two transitions are such that the only candidate to increase in Borda score is i's last place
candidate, which never improves the winning set for i. The transition from αβγ to βγα does not improve
the winning set if the winning set in P contains α; and if the winning set in P is {β}, {γ}, or {β ,γ},
again the transition from αβγ to βγα does not change the winning set. Thus, we have a contradiction
with the assumption that (P,i) witnesses sure weak dominance manipulation for Borda.
Using Claim 2, we can rule out case (2) above. For (3,m), Borda is not single-winner manipulable
[35, p. 57, Exercise 10], which means that if {χ} is the set of Borda winners in P(cid:48), then the set of Borda
winners in P cannot be a singleton, so it must be one of {ϕ,ψ, χ}, {ψ, χ}, {ϕ, χ}, or {ϕ,ψ}. By Claim
2, there is no way i can change the Borda scores from B(ϕ) = B(ψ) = B(χ) to B(cid:48)(ϕ) = B(cid:48)(ψ) < B(cid:48)(χ),
so we can rule out {ϕ,ψ, χ}. Also by Claim 2, in order for i to change the Borda scores from B(ϕ) <
B(ψ) = B(χ) to B(cid:48)(ϕ) = B(cid:48)(ψ) < B(cid:48)(χ), her ranking must go from ψχϕ to χψϕ or from ϕψχ to ϕχψ,
but then the new winning set {χ} is worse for i than the original {ψ, χ}. Thus, we can rule out {ψ, χ},
and by the same reasoning, {ϕ, χ}. Finally, by Claim 2, there is no way for i to change the Borda scores
from B(χ) < B(ϕ) = B(ψ) to B(cid:48)(ϕ) = B(cid:48)(ψ) < B(cid:48)(χ), so we can rule out {ϕ,ψ}. Thus, (1) holds.
Claim 3: ϕ has the unique below average Borda score in P and P(cid:48). We argue by cases.
Case 1: B(cid:48)(ψ) = B(cid:48)(χ). Then it is immediate from (1) that ϕ has the unique below average Borda
score in P(cid:48). We now show that ϕ has the unique below average Borda score in P. Given B(cid:48)(ψ) = B(cid:48)(χ)
and B(cid:48)(ϕ) + B(cid:48)(ψ) + B(cid:48)(χ) = 3m, we have
We claim that
B(cid:48)(ϕ) + 2B(cid:48)(ψ) = 3m.
B(cid:48)(ψ)− B(cid:48)(ϕ) > 2.
(3)
(4)
Holliday and Pacuit
271
For B(cid:48)(ψ)− B(cid:48)(ϕ) (cid:54)= 0 since ϕ was chosen as the candidate with the lowest Borda score in P(cid:48), and if
B(cid:48)(ψ) − B(cid:48)(ϕ) = k for k ∈ {1,2}, so B(cid:48)(ϕ) = B(cid:48)(ψ) − k, then from (3) we have 3B(cid:48)(ψ) − k = 3m, a
contradiction. Now by Claim 2, we have B(ϕ)− B(cid:48)(ϕ) ≤ 1, B(ψ)− B(cid:48)(ψ) ≤ 1, and B(χ)− B(cid:48)(χ) ≤
1. It follows by (4) that B(ϕ) < B(ψ) and B(ϕ) < B(χ). Thus, ϕ has a below average Borda score in P.
Finally, we claim that ϕ is the only candidate with a below average Borda score in P. Since the average
Borda score is m, this means B(ψ) ≥ m and B(χ) ≥ m. Suppose for contradiction that B(ψ) < m or
B(χ) < m. Without loss of generality, suppose B(ψ) < m. By Claim 2 and the fact that B(cid:48)(ψ) = B(cid:48)(χ),
we have B(ψ)− B(χ) ≤ 2. But together B(ϕ) < B(ψ), B(ψ) < m, and B(ψ)− B(χ) ≤ 2 contradict
the fact that B(ϕ) + B(ψ) + B(χ) = 3m. Thus, ϕ has the unique below average Borda score in P.
Case 2: B(cid:48)(ψ) < B(cid:48)(χ). First, we claim it is not the case that B(ϕ) = B(ψ) = B(χ). It follows from
Claim 2 that there are only two ways to go from B(ϕ) = B(ψ) = B(χ) to B(cid:48)(ϕ) < B(cid:48)(ψ) < B(cid:48)(χ): i's
ranking goes from ϕχψ to χϕψ or from ψϕχ to ψχϕ. But in both cases the new Borda winning set
{χ} does not weakly dominate the old winning Borda set {ϕ,ψ, χ}, contradicting the assumption that
i had an incentive to manipulate. In addition, it is not the case that B(ϕ) = B(ψ) < B(χ) or B(ϕ) <
B(ψ) < B(χ), for then i would have no incentive to transition to B(cid:48)(ϕ) < B(cid:48)(ψ) < B(cid:48)(χ), since the
Borda winning set would not change. Thus, we have that B(ϕ) < B(ψ) = B(χ), so ϕ has the unique
below average Borda score in P. Now by Claim 2, the Borda score of one of ϕ, ψ, and χ must remain
the same from P to P(cid:48). But we cannot have B(ϕ) = B(cid:48)(ϕ), for then in order to go from B(ψ) = B(χ) to
B(cid:48)(ψ) < B(cid:48)(χ), by Claim 2 i's ranking must either change from ψχϕ to χψϕ or from ϕψχ to ϕχψ;
but in both cases the new Borda winning set {χ} does not weakly dominate the old winning Borda set
{ψ, χ}, contradicting the assumption that i had an incentive to manipulate. Thus, either B(ψ) = B(cid:48)(ψ)
or B(χ) = B(cid:48)(χ). But if B(ψ) = B(cid:48)(ψ) or B(χ) = B(cid:48)(χ), then together B(ψ) = B(χ) and B(cid:48)(ψ) < B(cid:48)(χ)
imply B(cid:48)(ψ)− B(cid:48)(χ) = 1 by Claim 2, in which case B(cid:48)(ϕ) < B(cid:48)(ψ) < B(cid:48)(χ) implies that ϕ has the
unique below average Borda score in P(cid:48).
Claim 4: the majority ordering between ψ and χ does not change from P to P(cid:48). This follows from
the claim that i's ordering of ψ and χ does not change from P to P(cid:48). We know ϕ is not in the set of
Borda winners in P or in P(cid:48) by Claim 3, and the set of Borda winners in P(cid:48) is not {ϕ,ψ, χ} by Claim 1.
Case 1: the Borda winning set in P(cid:48) is {ψ, χ}, so B(cid:48)(ψ) = B(cid:48)(χ). Suppose for contradiction that i's
ranking for ψ vs. χ in P is the reverse of i's ranking in P(cid:48). Suppose, without loss of generality, that i
ranks ψ over χ in P but i ranks χ over ψ in P(cid:48). Then since in P(cid:48), we have B(cid:48)(ψ) = B(cid:48)(χ), it follows that
B(ψ) > B(χ), which with Claim 3 implies that ψ is the unique Borda winner in P. But then there is no
incentive for i to manipulate, as i would do worse with the winning set {ψ, χ} in P(cid:48). This contradicts our
assumption that (P,i) witnesses manipulation for Borda by transitioning to P(cid:48).
Case 2: the Borda winning set in P(cid:48) is {χ}, so B(cid:48)(ψ) < B(cid:48)(χ). Since ϕ is not in the Borda winning
set in P by Claim 3, the Borda winning set in P is {ψ, χ} or {ψ}, but the latter is ruled out since Borda
is not single-winner manipulable. Since by assumption the winning set in P(cid:48) weakly dominates that in P
for i, it follows that i ranks χ above ψ in P. But then the transition from the Borda winning set {ψ, χ}
to {χ} cannot be the result of i switching her ranking of χ and ψ so that ψ is ranked above χ in P(cid:48).
For any (3,m)-profile, the set of Baldwin (resp. StrictNanson) winners may be obtained by first
eliminating the candidates (if there are any) with the strictly lowest Borda scores (resp. with below aver-
age Borda scores) and then selecting as winners from the remaining candidates those who are maximal in
the majority ordering. Thus, by Claim 3 and Claim 4, the sets of Baldwin winners and StrictNanson
winners do not change from P to P(cid:48). This contradicts the assumption that (P,i) witnesses sure weak
dominance manipulation for {Borda, Baldwin} or {Borda, StrictNanson} by transitioning to P(cid:48).
272
Strategic Voting Under Uncertainty About the Voting Method
B Proof of Theorem 3.7
In this appendix, we prove Theorem 3.7: for any m ≥ 4, {WeakNanson, Baldwin} and {WeakNanson,
StrictNanson} eliminate sure weak dominance manipulation for (3,m).
Proof. Given Lemma 3.5, we need only show that the two sets of methods are not susceptible to sure
weak dominance manipulation for (3,m). Consider an arbitrary pointed profile (P,i). We show that
for any profile P(cid:48) differing from P only in i's ranking, (P,i) does not witness sure weak dominance
manipulation for {WeakNanson, Baldwin} or {WeakNanson, StrictNanson} by transitioning to P(cid:48).
Let i's ranking in P be αβγ. Let B(α), B(β ), and B(γ) be the Borda scores of α, β , and γ, respectively,
in P, and likewise for B(cid:48)(α), B(cid:48)(β ), and B(cid:48)(γ) in P(cid:48). For any (3,m)-profile, the set of WeakNanson
(resp. StrictNanson, Baldwin) winners may be obtained by first eliminating the candidates (if there
are any) with less than or equal to average Borda scores (resp. with below average Borda scores, with
strictly lowest Borda scores) and then selecting as winners from the remaining candidates those who are
maximal in the majority ordering. Note that the average Borda score for any given (3,m)-profile is m.
We consider the following exhaustive list of cases, where 'WN' stands for WeakNanson:
1. B(β ),B(γ) ≤ m < B(α); or B(β ) ≤ m < B(α),B(γ) and α >M
P γ; or B(γ) ≤ m < B(α),B(β ) and
P β . Then {α} is the WN-winning set in P, so i has no incentive to transition from P to P(cid:48)
α >M
2. B(α) ≤ m < B(β ),B(γ) and β >M
P γ, so {β} is the WN-winning set in P. Then B(cid:48)(α) ≤ m < B(cid:48)(γ),
so α is not in the WN-winning set in P(cid:48). But only sets that contain α weakly dominate {β} for i.
3. B(α) ≤ m < B(β ),B(γ) and γ >M
P β , so {γ} is the WN-winning set in P. In this case B(cid:48)(α) ≤ m ≤
B(cid:48)(β ), m < B(cid:48)(γ), and γ >M
P(cid:48) β for any P(cid:48) differing only in i's ranking. So the winning set in P(cid:48) is again
{γ}, providing no incentive under WN to transition to P(cid:48).
P β , so {β ,γ} is the WN-winning set in P. In this case B(cid:48)(α) ≤
m ≤ B(cid:48)(β ), m < B(cid:48)(γ), and γ ≥M
P(cid:48) β for any P(cid:48) differ only in i's ranking. So the WN-winning set in P(cid:48) is
{γ} or {β ,γ}, neither of which weakly dominates {β ,γ} for i.
P α, so the WN-winning set in P is either {γ} or {α,γ}. It follows
that B(β ) ≤ m− 2 and hence B(cid:48)(β ) < m, and γ ≥M
P(cid:48) α for any P(cid:48) differ only in i's ranking. Thus, if {γ} is
the WN-winning set in P, it is the WN-winning set in P(cid:48); and if {α,γ} is the WN-winning set in P, then
the WN-winning set in P(cid:48) contains γ, but no set containing γ weakly dominates {α,γ}.
P α, so the WN-winning set is either {β} or {α,β}. It follows
that B(γ) < m and indeed B(γ) ≤ m− 2. Hence B(cid:48)(γ) ≤ m. Thus, γ is eliminated for WN in the first
round for P(cid:48). Since β ≥M
P(cid:48) α for any P(cid:48)
differing from P only in i's ranking. Thus, if {β} is the WN-wining set in P, it is still the WN-winning
set in P(cid:48); and if {α,β} is the WN-winning set in P, then the WN-winning set in P(cid:48) contains β , but no set
containing β weakly dominates {α,β}.
7. B(α),B(γ)≤ m≤ B(β ), so the WN-winning set in P is {β} or {α,β ,γ}. In this case B(cid:48)(α)≤ m, so
the WN-winning set in P(cid:48) is either {α,β ,γ} or a set not containing α, and in both cases the WN-winning
set in P(cid:48) does not weakly dominate the WN-winning set in P.
If
B(cid:48)(β ) ≤ m, then {γ} is still the WN-winning set in P(cid:48). So suppose m < B(cid:48)(β ), which implies B(β ) = m,
B(α) < m, and B(cid:48)(α) < m. There are only two post-manipulation rankings consistent with m < B(cid:48)(β ):
βαγ and βγα. Note that the majority ordering of β and γ has not changed from P to P(cid:48), and in both P
and P(cid:48), α is the unique candidate with below average Borda score. It follows that the StrictNanson
winning set in P and P(cid:48) is the same, and the Baldwin winning set in P and P(cid:48) is the same. Hence the
transition from P to P(cid:48) does not witness sure manipulation.
8. B(α),B(β ) ≤ m < B(γ), so {γ} is the WN-winning set in P. Hence B(cid:48)(α) ≤ m < B(cid:48)(γ).
P α with i having the ranking αβγ in P, it follows that β ≥M
4. B(α) ≤ m < B(β ),B(γ) and γ =M
5. B(β ) ≤ m < B(α),B(γ) and γ ≥M
6. B(γ) ≤ m < B(α),B(β ), and β ≥M
|
1905.05717 | 2 | 1905 | 2019-11-05T09:17:57 | CoLight: Learning Network-level Cooperation for Traffic Signal Control | [
"cs.MA",
"cs.GT",
"cs.LG"
] | Cooperation among the traffic signals enables vehicles to move through intersections more quickly. Conventional transportation approaches implement cooperation by pre-calculating the offsets between two intersections. Such pre-calculated offsets are not suitable for dynamic traffic environments. To enable cooperation of traffic signals, in this paper, we propose a model, CoLight, which uses graph attentional networks to facilitate communication. Specifically, for a target intersection in a network, CoLight can not only incorporate the temporal and spatial influences of neighboring intersections to the target intersection, but also build up index-free modeling of neighboring intersections. To the best of our knowledge, we are the first to use graph attentional networks in the setting of reinforcement learning for traffic signal control and to conduct experiments on the large-scale road network with hundreds of traffic signals. In experiments, we demonstrate that by learning the communication, the proposed model can achieve superior performance against the state-of-the-art methods. | cs.MA | cs |
CoLight: Learning Network-level Cooperation
for Traffic Signal Control
Hua Wei†∗, Nan Xu‡∗, Huichu Zhang‡, Guanjie Zheng†, Xinshi Zang‡, Chacha Chen‡,
Weinan Zhang‡, Yanmin Zhu‡, Kai Xu§, Zhenhui Li†
†Pennsylvania State University, ‡Shanghai Jiao Tong Univerisity, §Shanghai Tianrang Intelligent Technology Co., Ltd
†{hzw77, gjz5038, jessieli}@ist.psu.edu, ‡{xunannancy, chacha1997, wnzhang, yzhu}@sjtu.edu.cn,
‡{zhc,xszang}@apex.sjtu.edu.cn, §[email protected]
ABSTRACT
Cooperation among the traffic signals enables vehicles to move
through intersections more quickly. Conventional transportation
approaches implement cooperation by pre-calculating the offsets
between two intersections. Such pre-calculated offsets are not suit-
able for dynamic traffic environments.
To enable cooperation of traffic signals, in this paper, we pro-
pose a model, CoLight, which uses graph attentional networks to
facilitate communication. Specifically, for a target intersection in a
network, CoLight can not only incorporate the temporal and spatial
influences of neighboring intersections to the target intersection,
but also build up index-free modeling of neighboring intersections.
To the best of our knowledge, we are the first to use graph atten-
tional networks in the setting of reinforcement learning for traffic
signal control and to conduct experiments on the large-scale road
network with hundreds of traffic signals. In experiments, we demon-
strate that by learning the communication, the proposed model can
achieve superior performance against the state-of-the-art methods.
CCS CONCEPTS
• Computing methodologies → Artificial intelligence; Con-
trol methods; • Applied computing → Transportation.
KEYWORDS
Deep reinforcement learning, traffic signal control, multi-agent
system
ACM Reference Format:
Hua Wei, Nan Xu, Huichu Zhang, Guanjie Zheng, Xinshi Zang, Chacha
Chen, and Weinan Zhang, Yanmin Zhu, Kai Xu, Zhenhui Li. 2019. CoLight:
Learning Network-level Cooperation for Traffic Signal Control. In The 28th
ACM International Conference on Information and Knowledge Management
*Equal contribution.
Permission to make digital or hard copies of all or part of this work for personal or
classroom use is granted without fee provided that copies are not made or distributed
for profit or commercial advantage and that copies bear this notice and the full citation
on the first page. Copyrights for components of this work owned by others than ACM
must be honored. Abstracting with credit is permitted. To copy otherwise, or republish,
to post on servers or to redistribute to lists, requires prior specific permission and/or a
fee. Request permissions from [email protected].
CIKM '19, November 3 -- 7, 2019, Beijing, China
© 2019 Association for Computing Machinery.
ACM ISBN 978-1-4503-6976-3/19/11...$15.00
https://doi.org/10.1145/3357384.3357902
(CIKM '19), November 3 -- 7, 2019, Beijing, China. ACM, New York, NY, USA,
10 pages. https://doi.org/10.1145/3357384.3357902.
1 INTRODUCTION
A key question often asked of traffic signal control is "How do traf-
fic signals cooperate between intersections?" Cooperation among
intersections is especially important for an urban road network
because the actions of signals could affect each other, especially
when the intersections are closely connected. Good cooperation
among the traffic signals enables the vehicles to move through
intersections more quickly.
In the transportation field, a typical way to solve the cooperation
problem between intersections is to formulate it as an optimization
problem and solve it under certain assumptions (e.g., uniform ar-
rival rate [21, 27] and unlimited lane capacity [24]). Such methods,
however, do not perform well because the assumptions do not hold
in the real world.
Recently, researchers start to investigate reinforcement learning
(RL) techniques for the cooperation of traffic signals. The most
common way is to have an RL agent control each intersection and
communication is achieved by sharing information among agents [1,
8, 9, 22]. At each time step, the agent observes the traffic condition
of the target intersection and its neighboring intersections, and
decides an action a to take. After the action is taken, a reward
r (often defined as a measure correlated with travel time) is fed
back to the agent indicating how good the action a is. Different
from conventional approaches, such RL methods avoid making
strong assumptions and directly learn good strategies from trials
and errors.
Existing RL-based methods still fail to communicate with neigh-
bors in the most efficient way. We propose CoLight that improves
communication of agents and is scalable to hundreds of intersec-
tions. In particular, our work makes the following key contributions:
• Cooperation through dynamic communication. Most methods
to achieve cooporation are through expanding the observation of
the target agent for more comprehensive information. Existing
studies [1, 5, 8, 9, 22] tend to select the traffic conditions from
adjacent intersections and directly concatenate them with the traffic
condition of the target intersection, neglecting the fact that the
traffic is changing both temporally and spatially. For example, if
intersections A and B are adjacent intersections on a major road,
but intersection C is on a side road linked with B. The information
justify their cooperation strategies on small road networks with
only fewer than 20 intersections [29]. In this paper, we conduct
comprehensive experiments on both synthetic and real-world data,
including a large-scale road network with 196 intersections derived
from Manhattan, New York. The experiments demonstrate that the
proposed model benefits from the dynamic communication and the
index-free modeling mechanism and significantly outperforms the
state-of-the-art methods.
2 RELATED WORK
Conventional coordinated methods [15] and systems [12, 13, 17] in
transportation usually coordinate traffic signals through modifying
the offset (i.e., the time interval between the beginnings of green
lights) between consecutive intersections and require the intersec-
tions to have the same cycle length. But this type of methods can
only optimize the traffic flow for certain pre-defined directions [10].
Actually, it is not an easy task to coordinate the offsets for traffic sig-
nals in the network. For network-level control, Max-pressure [24]
is a state-of-the-art signal control method which greedily takes
actions that maximizes the throughput of the network, under the
assumption that the downstream lanes have unlimited capacity.
Other traffic control methods like TUC [7] also use optimization
techniques to minimize vehicle travel time and/or the number of
stops at multiple intersections under certain assumptions, such as
the traffic flow is unform in a certain time period. However, such
assumptions often do not hold in the network setting and therefore
prevent these methods from being widely applied.
Recently, reinforcement learning techniques have been proposed
to coordinate traffic signals for their capability of online optimiza-
tion without prior knowledge about the given environment. One
way to achieve coordination is through centralized optimization
over the joint actions of multiple intersections. [20] directly trains
one central agent to decide the actions for all intersections but it
cannot learn well due to the curse of dimension in joint action
space. [16, 23] propose to jointly model two adjacent intersections
and then using centralized coordination over the global joint ac-
tions, but they require the maximization over a combinatorially
large joint action space and face scalability issues during deploy-
ment. Therefore, these centralized methods are hard to apply on
the large-scale road network.
To mitigate this issue, independently modelling RL methods [3,
28, 31] are proposed in which they train a bunch of RL agents
separately, one for each intersection. To avoid the non-stationary
impacts from neighboring agents, communication among agents [2,
19] are proposed in order to achieve coordination using neigh-
boring information: [5, 8, 9, 22, 31] add downstream information
into states, [1, 31] add all neighboring states, and [18] adds neigh-
bors' hidden states. However, in these methods, the information
from different neighbors is concatenated all together and treated
with equal importance, which leads to two major issues: 1). the
impacts from neighboring intersections are changing dynamically
with the traffic flow and should not be treated evenly. Even when
the traffic flow is static, Kinenmatic-wave theory [11] from the
transportation area shows that the upstream intersections could
have larger influence than downstream intersections; 2). simple
concatenation of neighboring information requires all agents to
have an extra indexing mechanism, which is usually unrealistic and
Figure 1: Illustration of index-based concatenation. Thick
yellow lines are the arterials and grey thin lines are the side
streets. With index-based concatenation, A and B's obser-
vation will be aligned as model inputs with an fixed order.
These two inputs will confuse the model shared by A and B.
from A is more useful to B compared with that from C to B. Besides,
the influences from intersection A could change temporally. For
example, during the morning rush hour, there are a large number
of vehicles moving from A to B, and the direction of vehicles is
reversed at night peak hours. Therefore, the effect of A on B is also
changing at different times of the day. In this paper, we propose
to use the graph attentional network [26] to learn the dynamics of
the influences, which shows superior performance against methods
without this mechanism in Section 5.5. To the best of our knowledge,
we are the first to use graph attentional network in the setting of
traffic signal control.
• Index-free model learning with parameter sharing. Agents often
share the same model parameters to enable efficient learning [1, 9].
However, if we simply take neighboring information as part of the
state for the communication purpose, the fixed indexing of neigh-
bors may cause conflicting learning problems. Take Figure 1 as an
example. Figure 1(a) shows two target intersections A and B, where
their neighbors A-W, A-E, B-N and B-S are on the major roads,
while A-N, A-S, B-W and B-E are on the side streets. Intuitively,
the two intersections on the major roads should relate more to the
target intersection than those on the side streets, e.g., the influence
from A-W to A should be greater than that from A-N to A. When
neighbors are indexed in the way as [E, W, N, S], agent A would
care more about the first and second neighbors (i.e., East and West)
and agent B would pay more attention to the third and fourth neigh-
bors (i.e., North and South). However, when two agents share the
model parameters, this will cause conflicts to learn the influences
of neighbors to the target intersection. In this paper, similar to the
"mean-field" idea [32], we tackle this problem by averaging over
the influences of all neighboring intersections with the learned
attention weights, instead of using a fixed indexing for neighbors.
This weighted average mechanism provides index-free modeling
of the influences of neighboring intersections, and along with the
parameter sharing strategy, the overall parameters of the learning
model can be largely reduced. We will show the parameter analysis
later in Section 4.4.
• Experiment on the large-scale road network. To the best of our
knowledge, none of the existing studies that use RL to cooperate
traffic signals have evaluated their methods in large-scale road
networks with hundreds of traffic signals. Instead, most of them
AA-NA-WA-SA-EBB-NB-WB-SB-E (b) Model input alignmentEastNorthWestSouthSelfA-SA-NA-WA-EAB-SB-NB-WB-EB(c) Actual influence to target intersectionEastNorthWestSouthA's NeighborB's Neighbor(a) Two target intersections in a real-world road networkNrequires heuristic design. To address the shortcomings of previous
methods, our proposed method leverages the attention mechanism
to learn and specify different weights to different neighboring inter-
sections and directly models the overall influence of neighboring
intersections on the target intersection.
It is worth noting that most of joint modelling methods for the
traffic signal control problem only conduct experiments on simple
road networks with at most 20 intersections. To the best of our
knowledge, none of the individual modelling methods conduct
experiments on more than 70 signals [29]. In this paper, we conduct
experiments on the simulator under different scales, including a
real-world road network with about 200 intersections.
3 PROBLEM DEFINITION
In this section, we present the problem of traffic signal control as a
Markov Game. Each intersection in the system is controlled by an
agent. Given each agent observes part of the total system condition,
we would like to proactively decide for all the intersections in the
system which phases should they change to so as to minimize
the average queue length on the lanes around the intersections.
Specifically, the problem is characterized by the following major
components ⟨S, O, A, P, r, π , γ⟩:
• System state space S and observation space O. We assume
that there are N intersections in the system and each agent can
observe part of the system state s ∈ S as its observation o ∈ O. In
this work, we define ot
i for agent i at time t, which consists of its
current phase (which direction is in green light) represented by a
one-hot vector, and the number of vehicles on each lane connected
with the intersection.
• Set of actions A. In the traffic signal control problem, at time
t, an agent i would choose an action at
i from its candidate action
set Ai as a decision for the next ∆t period of time. Here, each inter-
section would choose a phase p as its action at
i from its pre-defined
phase set, indicating that from time t to t + ∆t, this intersection
would be in phase p.
• Transition probability P. Given the system state st and cor-
responding joint actions at of agents at time t, the system arrives
at the next state st +1 according to the state transition probability
P(st +1st , at) : S × A1 × · · · × AN → Ω(S), where Ω(S) denotes
the space of state distributions.
i from the
environment at time t by a reward function S×A1×· · ·×AN → R.
In this paper, we want to minimize the travel time for all vehicles
in the system, which is hard to optimize directly. Therefore, we
= −Σlut
define the reward for intersection i as rt
i,l is
i
the queue length on the approaching lane l at time t.
• Policy π and discount factor γ. Intuitively, the joint actions
have long-term effects on the system, so that we want to minimize
the expected queue length of each intersection in each episode.
Specifically, at time t, each agent chooses an action following a
certain policy O × A → π, aiming to maximize its total reward
Gt
= ΣT
i , where T is total time steps of an episode and
i
γ ∈ [0, 1] differentiates the rewards in terms of temporal proximity.
In this paper, we use the action-value function Qi(θn) for each
agent i at the n-th iteration (parameterized by θ) to approximate
• Reward r. Each agent i obtains an immediate reward rt
t =τ γ t−τ rt
i,l where ut
a′ Q(ot
i
′
, at
i
the total reward Gt
L(θn) = E[(rt
i with neural networks by minimizing the loss:
(1)
′; θn−1) − Q(ot
i ; θn))2]
i + γ max
i , at
′ denotes the next observation for ot
where ot
i . These earlier snap-
i
shots of parameters are periodically updated with the most recent
network weights and help increase the learning stability by decor-
relating predicted and target q-values.
4 METHOD
In this section, we will first introduce the proposed cooperated RL
network structure, as Figure 2 illustrates, from bottom to top layer:
the first observation embedding layer, the interior neighborhood
cooperation layers (shorted as GAT layers) and the final q-value
prediction layer. Then we will discuss its time and space complex-
ity compared with other methods of signal control for multiple
intersections.
4.1 Observation Embedding
Given the raw data of the local observation, i.e., the number of
vehicles on each lane and the phase the signal currently in, we first
embed such k-dimensional data into an m-dimensional latent space
via a layer of Multi-Layer Perceptron:
hi = Embed(ot
i ) = σ(oiWe + be),
(2)
i ∈ Rk is intersection i's observation at time t and k is
where ot
i , We ∈ Rk×m and be ∈ Rm are weight
the feature dimension of ot
matrix and bias vector to learn, σ is ReLU function (same denotation
for the following σ). The generated hidden state hi ∈ Rm represents
the current traffic condition of the i-th intersection.
4.2 Graph Attention Networks for Cooperation
Communication between agents is necessary for cooperation in
multi-agent reinforcement learning (MARL) environment, since
the evaluation of the conducted policy for each agent depends
not only on the observable surrounding, but also on the policies
of other agents [6, 19]. CoLight agent learns to communicate on
the representations of neighboring intersections by leveraging the
attention mechanism, a widely-used technique to boost model ac-
curacy [4, 14, 33, 34]. Then an overall summary of the agent's
neighborhood is generated, upon which the agent learns to model
the influence of neighborhoods.
4.2.1 Observation Interaction. To learn the importance of informa-
tion from intersection j (source intersection) in determining the
policy for intersection i (target intersection), we first embed the
representation of these two intersections from previous layer and
calculate ei, j, the importance of j in determining the policy for i,
with the following operation:
eij = (hiWt) · (hjWs)T ,
(3)
where Ws ,Wt ∈ Rm×n are embedding parameters for the source
and target intersection respectively.
Note that eij is not necessarily equal to eji. Take the scenario
in Figure 2(a) as an example, where the 9-th Avenue is a one-way
arterial. On one hand, since the traffic flow goes from Inter 9-50 to
Inter 9-49, the traffic condition from Inter 9-50 is important for Inter
Figure 2: Left: Framework of the proposed CoLight model. Right: variation of cooperation scope (light blue shadow, from
one-hop to two-hop) and attention distribution (colored points, the redder, the more important) of the target intersection.
(cid:1),
αij(hjWc) + bq
(5)
9-49 to decide for the future actions, thus, e9-49,9-50 should be quite
large. On the other hand, as the traffic condition of the downstream
Inter 9-49 is less helpful to Inter 9-50, e9-50,9-49 should be relatively
small.
4.2.2 Attention Distribution within Neighborhood Scope. To re-
trieve a general attention value between source and target inter-
sections, we further normalize the interaction scores between the
target intersection i and its neighborhood intersections:
αij = softmax(eij) =
exp(eij/τ)
j∈Ni exp(eij/τ) ,
(4)
where τ is the temperature factor and Ni is the set of intersections
in the target intersection's neighborhood scope. The neighborhood
of the target contains the top Ni closest intersections, and the
distance can be defined in multiple ways. For example, we can
construct the neighborhood scope for target intersection i through:
• Road distance: the geo-distance between two intersections'
• Node distance: the smallest hop count between two nodes over
Note that intersection i itself is also included in Ni to help the
agent get aware of how much attention should be put on its own
traffic condition.
the network, with each node as an intersection.
geo-locations.
The general attention score αij is beneficial not only for it applies
to all kinds of road network structures (intersections with different
numbers of arms), but also for it relaxes the concept of "neighbor-
hood". Without losing generality, the target can even take some
other intersections into Ni although they are not adjacent to them.
For instance, one four-way intersection can determine its signal
policy based on information from five nearby intersections, four of
which are the adjacent neighbors while the other is disconnected
but geographically close to the target intersection.
Index-free Neighborhood Cooperation. To model the overall
4.2.3
influence of neighborhoods to the target intersection, the repre-
sentation of several source intersections are combined with their
respective importance:
hsi = σ(cid:0)Wq ·
j∈Ni
where Wc ∈ Rm×c is weight parameters for source intersection
embedding, Wq and bq are trainable variables. The weighted sum of
neighborhood representation hsi ∈ Rc accumulates the key infor-
mation from the surrounding environment for performing efficient
signal policy. By summing over the neighborhood representation,
the model is index-free that does not require all agents to align the
index of their neighboring intersections.
The graph-level attention allows the agent to adjust their focus
according to the dynamic traffic and to sense the environment in
a larger scale. In Figure 2(b) and (c), the emphasizes of Inter 9-49
on four neighbors are quite distinct due to the uni-directional traf-
fic flow, i.e., a higher attention score for Inter 9-50 (upstream, red
marked) than for Inter 9-48 (downstream, green marked). The agent
for Inter 9-49 acquires the knowledge of adjacent intersections (In-
ter 9-48, Inter 9-50, Inter 10-49 and Inter 8-49) directly from the first
layer of Graph Attention Networks (GAT). Since the hidden states
of adjacent neighbors from the first GAT layer carry their respective
neighborhood message, then in the second GAT layer, the coop-
eration scope of Inter 9-49 expands significantly (blue shadow in
Figure 2(c)) to 8 intersections. Such additional information helps the
target Inter 9-49 learn the traffic trend. As a result, Inter 9-49 relies
more on the upstream intersections and less on the downstream to
take actions, and the attention scores on Inter 9-50 and Inter 8-49
grow higher while those on Inter 10-49 and Inter 9-48 become lower.
More GAT layers helps the agent detect environment dynamics
more hops away.
4.2.4 Multi-head Attention. The cooperating information hsi for
the i-th intersection concludes one type of relationship with neigh-
boring intersections. To jointly attend to the neighborhood from
different representation subspaces at different positions, we extend
the previous single-head attention in the neural network to multi-
head attention as much recent work did [25, 26]. Specifically, the
attention function (procedures including Observation Interaction,
10-th Ave.9-th Ave.8-th Ave.W47-th St.W48-th St.W49-th St.W50-th St.W51-st St.9-499-509-4810-498-49NN⇥⇥⇥⇥(cid:1)(cid:1)ihmLi1Ni(cid:1)(cid:1)(cid:1)L1. Observation embedding2. Graph Attentional Network(GAT)GATGAT1(cid:1)3. Q-value predictionObservationsActionPhase 1Phase p(cid:1)↵i,1...↵i,N 1↵i,2↵i,iH+ hihm1i1Ni(cid:1)(cid:1)......qiai(cid:1)(a) Model framework(b) 1st GAT layer (one-hop view)(c) 2nd GAT layer (two-hop view)Attention Distribution and Neighborhood Cooperation) with differ-
ent linear projections (multiple sets of trainable parameters {Wt ,
Ws, Wc}) is performed in parallel and the different versions of neigh-
borhood condition summarization hsi are averaged as hmi:
ij = softmax(eh
αh
ij = (hiW h
t ) · (hjW h
s )T
eh
exp(eh
ij/τ)
ij) =
j∈Ni exp(eh
ij(hjW h
αh
(cid:16)
Wq ·(cid:0) 1
h=H
ij/τ)
c )(cid:1) + bq
(cid:17)
(6)
(7)
(8)
hmi = σ
H
h=1
j∈Ni
where H is the number of attention heads. Besides averaging oper-
ation, concatenating the product of multi-head attention is another
feasible way to conclude multiple types of the neighborhood coop-
eration.
In this work, we investigate the effects of multi-head attention
on performance of the proposed model and find that 5 attention
heads achieve the best performance.
4.3 Q-value Prediction
As illustrated in Figure 2(a), each hidden layer of model CoLight
learns the neighborhood representation through methods intro-
duced in Section 4.2. We denote such layerwise cooperation proce-
dure by GAT, then the forward propagation of input data in CoLight
can be formatted as follows:
hm1
hi =
i =
· · ·
hmL
i =
i ) =
(cid:101)q(ot
Embed(ot
i ),
GAT 1(hi),
,
GAT L(hmL−1
),
hmL
i Wp + bp ,
i
(9)
where Wp ∈ Rc×p and bp ∈ Rp are parameters to learn, p is the
number of phases (action space), L is the number of GAT layers,(cid:101)q
is the predicted q-value.
According to Eq. (1), the loss function for our CoLight to optimize
the current policy is:
L(θ) = 1
t =T
i =N
(cid:0)q(ot
i ) −(cid:101)q(ot
i ; at
i , θ)(cid:1)2
i , at
T
t =1
i =1
,
(10)
where T is the total number of time steps that contribute to the
network update, N is the number of intersections in the whole road
network, θ represents all the trainable variables in CoLight.
As the importance of neighborhood to the target intersection
varies spatially and temporally, the proposed attention mechanism
is able to help the target agent distinguish among the complex
scenarios by considering the traffic condition of any source-target
intersection pair.
4.4 Complexity Analysis
Although CoLight spares additional parameters to learn the dy-
namic cooperation from neighborhood, owing to the index-free
parameter sharing mechanism, both the time and space it demands
are approximately equal to O(m2L), which is irrelevant to the num-
ber of intersections. Hence CoLight is scalable even if the road
network contains hundreds of or even thousands of intersections.
the number of layers (L), the phase space (p) and comparable to the
input dimension (k). Therefore, the space complexity of CoLight is
approximately equal to O(m2L).
Space Complexity. If there are L hidden layers and each layer
4.4.1
has m neurons, then the size of the weight matrices and bias vectors
in each component of CoLight is: 1) Observation Embedding layer:
m(4m + 1)L; 3) Q-value Prediction layer: mp + p. Hence the total
km + m; 2) interior Graph Attentional layers:(cid:0)3m2 + (m2 + m)(cid:1)L =
number of learnable parameters to store is O(cid:0)m(4mL + L + k + 1 +
p) +p(cid:1). Normally, the size of the hidden layer (m) is far greater than
(cid:17) ≈ O(m2L · N), which
(cid:16)(cid:0)(km + m) + (m2 + m)L + (mp + p)(cid:1) · N
If we leverage N separate RL models (without parameter sharing)
to control signals in N intersections, then the space complexity is
O
is unfeasible when N is extremely large for city-level traffic signal
control. To scale up, the simplest solution is to allow all the intersec-
tions to share parameters and maintain one model, in this case, the
space complexity is O(m2L), which is identical to that of CoLight.
4.4.2 Time Complexity. We assume that: 1) all the agents lever-
age CoLight to predict q-values for the corresponding intersections
concurrently; 2) the multiple heads of attention are independently
computed so that they are as fast as the single-head attention; 3)
the embeddings for either source or target intersection condition
via Ws, Wc and Wt are separate processes that can also be executed
at the same time, 4) for one target intersection, the interaction
with all the neighbors is computed simultaneously, then the time
complexity (only multiplication operations considered since the
addition procedures are relatively insignificant) in each compo-
nent of CoLight is: 1) Observation Embedding layer: km; 2) interior
Graph Attentional layers: (m2 + m2)L; 3) Q-value Prediction layer:
it is approximately equal to O(m2L).
mp. Hence the time complexity is O(cid:0)m(k + 2mL + p)(cid:1), and similarly,
signal control in multiple intersections requires O(cid:0)m(k +mL +p)(cid:1) ≈
Either the individual RL models or the shared single RL model for
O(m2L) computation, approaching that of CoLight.
5 EXPERIMENTS
We perform experiments on two synthetic datasets and three real-
world datasets to evaluate our proposed method, especially the
graph-level attention for neighborhood cooperation.
5.1 Settings
We conduct experiments on CityFlow1, an open-source traffic sim-
ulator that supports large-scale traffic signal control [35]. After the
traffic data being fed into the simulator, a vehicle moves towards its
destination according to the setting of the environment. The simu-
lator provides the state to the signal control method and executes
the traffic signal actions from the control method. Following the
tradition, each green signal is followed by a three-second yellow
signal and two-second all red time.2
In a traffic dataset, each vehicle is described as (o, t, d), where
o is the origin location, t is time, and d is the destination location.
Locations o and d are both locations on the road network.
1http://cityflow-project.github.io
2CoLight's codes, parameter settings, public datasets can be found at:
https://github.com/wingsweihua/colight. More datasets can be found at: http://
traffic-signal-control.github.io
(a) Upper East Side, Manhattan,
New York, USA
(b) Gudang Sub-district,
Hangzhou, China
(c) Dongfeng Sub-district,
Jinan, China
Figure 3: Road networks for real-world datasets. Red polygons are the areas we select to model, blue dots are the traffic signals
we control. Left: 196 intersections with uni-directional traffic, middle: 16 intersections with uni- & bi-directional traffic, right:
12 intersections with bi-directional traffic.
5.2 Datasets
Synthetic Data. In the experiment, we use two kinds of syn-
5.2.1
thetic data, i.e., uni- and bi-directional traffic, on the following
different road networks:
• Arterial1×3: A 1 × 3 arterial to show the spatial attention distri-
bution learned by CoLight.
• Grid3×3: A 3 × 3 grid network to show convergence speed of
different RL methods and the temporal attention distribution.
• Grid6×6: A 6 × 6 grid network to evaluate effectiveness and effi-
ciency of different methods.
Each intersection in the synthetic road network has four direc-
tions (West→East, East→West, South→North, North→South), and
3 lanes (300 meters in length and 3 meters in width) for each direc-
tion. In bi-directional traffic, vehicles come uniformly with 300 ve-
hicles/lane/hour in West↔East direction and 90 vehicles/lane/hour
in South↔North direction. Only West→East and North→South
directional flows travel in uni-directional traffic.
5.2.2 Real-world Data. We also use the real-world traffic data from
three cities: New York, Hangzhou and Jinan. Their road networks
are imported from OpenStreetMap1, as shown in Figure 3. And
their traffic flows are processed from multiple sources, with data
statistics listed in Table 1. The detailed descriptions on how we
preprocess these datasets are as follows:
only contains the origin and destination geo-locations of each trip,
we first map these geo-locations to the intersections and find the
shortest path between them. Then we take the trips that fall within
the selected areas.
• DH anдzhou: There are 16 intersections in Gudang Sub-district
with traffic data generated from the roadside surveillance cameras.
Each record in the dataset consists of time, camera ID and the
information about vehicles. By analyzing these records with camera
locations, the trajectories of vehicles are recorded when they pass
through road intersections. We use the number of vehicles passing
through these intersections as traffic volume for experiments.
• D J inan: Similar to DH anдzhou, this traffic data is collected by
roadside cameras near 12 intersections in Dongfeng Sub-district,
Jinan, China.
Transportation Methods:
5.3 Compared Methods
We compare our model with the following two categories of meth-
ods: conventional transportation methods and RL methods. Note
that all the RL models are learned without any pre-trained parame-
ters for fair comparison.
• Fixedtime [15]: Fixed-time with random offsets. This method uses
a pre-determined plan for cycle length and phase time, which is
widely used when the traffic flow is steady.
• MaxPressure [24]: A state-of-the-art network-level traffic signal
control method in the transportation field, which greedily chooses
the phase that maximizes the pressure (a pre-defined metric about
upstream and downstream queue length).
• CGRL [23]: A RL-based method for multi-intersection signal con-
trol with joint-action modelling [23]. Specifically, the cooperation
is achieved by designing a coordination graph and it learns to opti-
mize the joint action between two intersections.
• Individual RL [30]: An individual deep RL approach which does
not consider neighbor information. Each intersection is controlled
by one agent, and the agents do not share parameters, but update
their own networks independently.
RL Methods:
Table 1: Data statistics of real-world traffic dataset
# intersections Arrival rate (vehicles/300s)
Std Max Min
216
10.08
86.70
256
208
38.21
Mean
240.79
526.63
250.70
274
676
335
196
16
12
Dataset
DN ewY ork
DH anдzhou
D J inan
• DN ewY ork: There are 196 intersections in Upper East Side of
Manhattan with open source taxi trip data2. Since the taxi data
1https://www.openstreetmap.org
2http://www.nyc.gov/html/tlc/html/about/trip_record_data.shtml
Table 2: Performance on synthetic data and real-world data w.r.t average travel time. CoLight is the best.
Model
Fixedtime [15]
MaxPressure [24]
CGRL [23]
Individual RL [30]
OneModel [5]
Neighbor RL [1]
GCN [18]
CoLight-node
CoLight
1950.27
1633.41
2187.12
-∗
Grid6×6-Uni Grid6×6-Bi DN ewY ork DH anдzhou D J inan
869.85
361.33
1210.70
325.56
728.63
1168.32
625.66
340.70
291.14
728.79
422.15
1582.26
345.00
394.56
1053.45
768.43
331.50
297.26
209.68
186.07
1532.75
314.82
181.81
240.68
205.40
178.42
173.79
209.68
194.96
2884.23
261.60
242.63
248.11
272.14
176.71
170.11
1973.11
2280.92
1876.37
1493.37
1459.28
∗No result as Individual RL can not scale up to 196 intersections in New York's road network.
• OneModel [5]: This method uses the same state and reward as
Individual RL in its agent design, which only considers the traffic
condition on the roads connecting with the controlled intersection.
Instead of maintaining their own parameters, all the agents share
the same policy network.
• Neighbor RL [1]: Based on OneModel, agents concatenate their
neighboring intersections' traffic condition with their own and all
the agents share the same parameters. Hence its feature space for
observation is larger than OneModel.
• GCN [18]: A RL based traffic signal control method that uses a
graph convolutional neural network to automatically extract the
traffic features of adjacent intersections. This method treats each
neighboring traffic condition without difference.
• CoLight: The neighborhood scope of an intersection is constructed
through geo-distance.
• CoLight-node: The neighborhood scope is constructed through
node distance, i.e., the smallest hop count between two intersections
in the road network.
Variants of Our Proposed Method:
5.4 Evaluation Metric
Following existing studies [28, 30], we use the average travel time
to evaluate the performance of different models for traffic signal
control. It calculates the average travel time of all the vehicles spend
between entering and leaving the area (in seconds), which is the
most frequently used measure of performance to control traffic
signal in the transportation field [21, 29].
5.5 Performance Comparison
In this section, we investigate on the performance of CoLight w.r.t.
the travel time and compare it with state-of-the-art transportation
and RL methods.
5.5.1 Overall Analysis. Table 2 lists the performance of two types
of the proposed CoLight, classic transportation models as well as
state-of-the-art learning methods in both synthetic and real-world
datasets. We have the following observations:
1. CoLight achieves consistent performance improvements over
state-of-the-art transportation (MaxPressure) and RL (Individual
RL) methods across diverse road networks and traffic patterns: the
average improvement is 6.98% for synthetic data and 11.69% for
real-world data. The performance improvements are attributed to
the benefits from dynamic communication along with the index-
free modeling. The advantage of our model is especially evident
when controlling signals in real-world cities, where road structures
are more irregular and traffic flows are more dynamic. Specifically,
Individual RL can hardly achieve satisfactory results because it in-
dependently optimizes the single intersection's policy; Neighbor RL
and GCN do not work well for either DN ewY ork or DH anдzhou,
as the agent treats the information from the upstream and down-
stream intersections with static importance according to the prior
geographic knowledge rather than real-time traffic flows.
2. The performance gap between the proposed CoLight and the
conventional transportation method MaxPressure becomes larger
as the evaluated data change from synthetic regular traffic (aver-
age gap 8.08%) to real-world dynamic traffic (average gap 19.89%).
Such growing performance divergence conforms to the deficiency
inherent in MaxPressure, that it is incapable of learning from the
feedback of the environment.
3. Our method outperforms the joint-action modelling method
CGRL. In order to achieve cooperation, CGRL first builds up one
model to decide the joint actions of two adjacent intersections and
then uses centralized coordination over the global joint actions. It
requires the centralized maximization over a combinatorially large
joint action space and faces scalability issues. On the constrast,
our method achieves cooperation through communication between
decentralized agents, which has a smaller action space and shows
superior performances.
5.5.2 Convergence Comparison. In Figure 4, we compare CoLight's
performance (average travel time for vehicles evaluated at each
episode) to the corresponding learning curves for the other five RL
methods. Evaluated in all the listed datasets, the performance of
CoLight is better than any of the baselines by a large margin, both in
jumpstart performance (initial performance after the first episode),
time to threshold (learning time to achieve a pre-specified perfor-
mance level), as well as in asymptotic performance (final learned
performance). Learning the attention on neighborhood does not
slow down model convergence, but accelerates the speed of ap-
proaching the optimal policy instead.
From Figure 4(a), we discover that model Individual RL starts
with extremely huge travel time and approaches to the optimal per-
formance after a long training time. Such disparity of convergence
speed shown in Figure 4 agrees with our previous space complexity
analysis (in Section 4.4.1), that agents with shared models (CGRL,
(a) Grid3×3
(b) Grid6×6-Uni
(c) Grid6×6-Bi
(d) DN ewY or k
(e) DH anдzhou
(f) D J inan
Figure 4: Convergence speed of CoLight (red continuous curves) and other 5 RL baselines (dashed curves) during training.
CoLight starts with the best performance (Jumpstart), reaches to the pre-defined performance the fastest (Time to Threshold),
and ends with the optimal policy (Aysmptotic). Curves are smoothed with a moving average of 5 points.
Neighbor RL, OneModel, GCN and CoLight) need to learn O(m2L)
parameters while individual agents (Individual RL) have to update
O(m2L · N) parameters.
5.6 Scalability Comparison
In this section, we investigate on whether CoLight is more scalable
than other RL-based methods in the following aspects:
5.6.1 Effectiveness. As is shown in Table 2 and the convergence
curve in Figure 4, CoLight performs consistently better than other
RL methods on networks with different scales, ranging from 9-
intersection grid network to 196-intersection real-world network.
5.6.2 Training time. We compare CoLight's training time (total
clock time for 100 episodes) to the corresponding running time for
the other five RL methods on road networks with different scales.
All the methods are evaluated individually on the server for fair
comparison. As is shown in Figure 5, the training time for CoLight
is comparable to that of OneModel and GCN, which is far more
efficient than that of CGRL, Individual RL and Neighbor RL. This is
consistent with the time complexity analysis (in Section 4.4.2), as
most of the parallel computation assumptions are satisfied in our
experiments.
Note that the average travel time for Individual RL (in Table 2)
is missing and the bar of training time (in Figure 5) is estimated on
DN ewY ork setting. This is because Individual RL is non-scalable
because all the separate 196 agents cannot be trained and updated
simultaneously due to processor and memory limitation.
5.7 Study of CoLight
In this section, we investigate on how different components (i.e.,
neighborhood definition, number of neighbors, and number of
attention heads) affect CoLight.
Impact of Neighborhood Definition. As mentioned in Sec-
5.7.1
tion 4.2.2, the neighborhood scope of an intersection can be defined
Figure 5: The training time of different models for 100
episodes. CoLight is efficient across all the datasets. The bar
for Individual RL on DN ewY ork is shadowed as its running
time is far beyond the acceptable time.
in different ways. And the results in Table 2 show that CoLight (us-
ing geo-distance) achieves similar performance with CoLight-node
under synthetic data, but largely outperforms CoLight-node under
real-world traffic. The reason could be that under synthetic data,
since the lane lengths of all intersections are the same, the top
closest neighboring intersections set according to geo-distance is
identical to that based on node distance. In the following parts of
our experiments, we only compare CoLight with other methods.
Figure 6: Performance of CoLight with respect to different
numbers of neighbors (Ni) on dataset DH anдzhou (left) and
D J inan (right). More neighbors (Ni ≤ 5) for cooperation
brings better performance, but too many neighbors (Ni >
5) requires more time (200 episodes or more) to learn.
Impact of Neighbor Number. In Figure 6, we show how the
5.7.2
number of neighbors Ni influences the performance and also
shed lights on how to set it. As is shown in Figure 6, when the
020406080Episode010002000Travel time (s)CGRLNeighbor RLIndividual RLOneModelGCNCoLightJumpstartTime to ThresholdAsymptotic020406080Episode100020003000Travel time (s)CGRLNeighbor RLIndividual RLOneModelGCNCoLight020406080Episode100020003000Travel time (s)CGRLNeighbor RLIndividual RLOneModelGCNCoLight020406080100Episode1500175020002250Travel time (s)CGRLNeighbor RLOneModelGCNCoLight020406080Episode50010001500Travel time (s)CGRLNeighbor RLIndividual RLOneModelGCNCoLight0255075100125150175200Episode50010001500Travel time (s)CGRLNeighbor RLIndividual RLOneModelGCNCoLight2357913Number of neighbors400500Travel time (s)100 episodes200 episodes1000 episodes2357913Number of neighbors300400500Travel time (s)100 episodes200 episodes1000 episodesnumber of neighbors grows from 2 to 5, the performance of CoLight
achieves the optimal. Further adding nearby intersections into the
neighborhood scope Ni, however, leads to the opposite trend. This
is because including more neighbors in the neighborhood results in
learning more relations. To determine signal control policy for each
intersection, computing the attention scores only on four nearby
intersections and itself seems adequate for cooperation with both
time and performance guarantee.
Impact of Attention Head Number. To evaluate the effective-
5.7.3
ness of multi-head attention, we test different numbers of attention
heads and find that moderate numbers of heads are beneficial to
better control intersection signals. As shown in Table 3, drivers
spend less time as the number of attention heads grows. However,
the benefits of more types of attention disappear as H exceeds 5.
Similar conclusions can be made on other datasets with details
unshown due to space limitation.
Table 3: Performance of CoLight with respect to different
numbers of attention heads (H) on dataset Grid6×6. More
types of attention (H ≤ 5) enhance model efficiency, while
too many (H > 5) could distract the learning and deteriorate
the overall performance.
#Heads
1
3
5
7
9
Travel Time (s)
176.32
172.47
170.11
174.54
174.51
6 ATTENTION STUDY
To analyze how well the neighborhood cooperation is implemented
via the attention mechanism, we will study both the spatial and
temporal distribution of attention learned by CoLight on both syn-
thetic and real-world data.
6.1 Spatial Distribution
The spatial distribution of attention scores indicates the importance
of different neighbors to the target agent. In this section, we analyze
the learned average attention that CoLight learns from the real-
world data in each episode. We have the following observations:
•Upstream vs. Downstream. Figure 7(a) shows an intersection (green
dot) in New York, whose neighborhood includes four nearby inter-
sections along the arterial. Traffic along the arterial is uni-directional
(blue arrow). From the attention distribution learned by CoLight,
we can see that while the majority of attention is allocated to it-
self, the upstream intersections (orange and blue lines) have larger
scores than downstream intersections (red and purple lines).
•Arterial vs. Side Street. Figure 7(b) shows an intersection (green
dot) in Hangzhou, whose neighborhood includes two intersections
along the arterial and two intersections on the side street. In the left
part of Figure 7(b), the arterial traffic is heavy and uni-directional
(thick horizontal arrow), and the side-street traffic is light and bi-
directional (thin vertical arrow). From the right part of Figure 7(b),
we can see that the arterial intersections (orange and blue lines)
have larger scores than side-street intersections (red and purple
lines).
(a) Intersection A in New York
(b) Intersection B in Hangzhou
Figure 7: Spatial difference of attention distribution learned
by CoLight during training process in real-world traffic. Dif-
ferent colored lines in the right figures correspond with
the colored dots in the left figures. Up: For intersection
A in DN ewY ork , major concentration is allocated on up-
stream intersections and A itself. Down: For intersection B
in DH anдzhou, major concentration is allocated on arterial
intersections and B itself.
6.2 Temporal Distribution
The temporal distribution of neighbors' attention scores throughout
a certain time period indicates the temporal change of neighbors'
influence. In this section, we analyze the learned attention of a
converged CoLight model in a 3 × 3 network under a 3600-second
traffic. As is shown in the upper part of Figure 8(b), there is small
basic traffic on every direction; at the same time, similar to the traffic
change between morning peak hours and evening peak hours, the
traffic of Inter #4 experiences great changes, where the traffic from
Inter #3 to Inter #4 drops (blue arrows in Figure 8(a)) and the traffic
from Inter #1 to Inter #4 increases (green arrows in Figure 8(a)).
(a) Grid3×3 road network
(b) Traffic flows and attention
scores of neighbors to Inter#4
Figure 8: Temporal distribution of attention score learned
by CoLight corresponds with temporally changing traffic.
The attention scores of the neighboring four intersections of
Inter #4 are shown in the lower part of Figure 8(b). Firstly, we can
see that the score from Inter #4 to Inter #4 always occupies the
largest purple area, indicating that the traffic condition of Inter
Inter 0Inter 1Inter 2Inter 3Inter 4Inter 5Inter 8Inter 7Inter 6500100015002000250030003500Timestep (s)0.00.20.40.60.81.0Attention ScoreInter 3 to Inter 4Inter 5 to Inter 4Inter 1 to Inter 4Inter 7 to Inter 4Inter 4 to Inter 4500100015002000250030003500Timestep (s)0100300Number of Vehicles/hInter 3 to Inter 4Inter 1 to Inter 4#4 is of a great importance. Secondly, the attention scores of Inter
#1 and #7 increase with more traffic on South↔North direction.
Similarly, the attention scores of Inter #3 and #5 decrease as less
traffic on West↔East direction. The temporal change of attention
scores of Inter #4's four neighbors matches exactly with the change
of traffic flow from the four directions, which demonstrates that the
proposed CoLight model is capable to capture the key neighborhood
information over time, i.e., the temporal attention.
7 CONCLUSION
In this paper, we propose a well-designed reinforcement learning
approach to solve the network-level traffic signal control problem.
Specifically, our method learns the dynamic communication be-
tween agents and constructs an index-free model by leveraging
the graph attention network. We conduct extensive experiments
using synthetic and real-world data and demonstrate the superior
performance of our proposed method over state-of-the-art meth-
ods. In addition, we show in-depth case studies and observations
to understand how the attention mechanism helps cooperation.
We would like to point out several important future directions
to make the method more applicable to the real world. First, the
neighborhood scope can be determined in a more flexible way. The
traffic flow information between intersections can be utilized to
determine the neighborhood. Second, the raw data for observation
only include the phase and the number of vehicles on each lane.
More exterior data like the road and weather condition might help
to boost model performance.
ACKNOWLEDGMENTS
The work was supported in part by NSF awards #1652525 and
#1618448. The views and conclusions contained in this paper are
those of the authors and should not be interpreted as representing
any funding agencies.
REFERENCES
[1] Itamar Arel, Cong Liu, T Urbanik, and AG Kohls. 2010. Reinforcement learning-
based multi-agent system for network traffic signal control. IET Intelligent Trans-
port Systems 4, 2 (2010), 128 -- 135.
[2] Christopher M Bishop et al. 2006. Pattern recognition and machine learning
(information science and statistics). (2006).
[3] Eduardo Camponogara and Werner Kraus. 2003. Distributed learning agents in
urban traffic control. In Portuguese Conference on Artificial Intelligence. Springer,
324 -- 335.
[4] Weiyu Cheng, Yanyan Shen, Yanmin Zhu, and Linpeng Huang. 2018. A neural at-
tention model for urban air quality inference: Learning the weights of monitoring
stations. In Thirty-Second AAAI Conference on Artificial Intelligence.
[5] Tianshu Chu, Jie Wang, Lara Codecà, and Zhaojian Li. 2019. Multi-Agent Deep
Reinforcement Learning for Large-Scale Traffic Signal Control. IEEE Transactions
on Intelligent Transportation Systems (2019).
[6] Denise de Oliveira and Ana LC Bazzan. 2009. Multiagent learning on traffic lights
control: effects of using shared information. In Multi-agent systems for traffic
and transportation engineering. IGI Global, 307 -- 321.
[7] Christina Diakaki, Markos Papageorgiou, and Kostas Aboudolas. 2002. A multi-
variable regulator approach to traffic-responsive network-wide signal control.
Control Engineering Practice 10, 2 (2002), 183 -- 195.
[8] Kurt Dresner and Peter Stone. 2006. Multiagent traffic management: Opportu-
nities for multiagent learning. In Learning and Adaption in Multi-Agent Systems.
Springer, 129 -- 138.
[9] Samah El-Tantawy, Baher Abdulhai, and Hossam Abdelgawad. 2013. Multiagent
reinforcement learning for integrated network of adaptive traffic signal con-
trollers (MARLIN-ATSC): methodology and large-scale application on downtown
Toronto.
IEEE Transactions on Intelligent Transportation Systems 14, 3 (2013),
1140 -- 1150.
[10] Nathan H Gartner, Susan F Assman, Fernando Lasaga, and Dennis L Hou. 1991.
A multi-band approach to arterial traffic signal optimization. Transportation
Research Part B: Methodological 25, 1 (1991), 55 -- 74.
[11] Wallce D Hayes. 1970. Kinematic wave theory. Proc. R. Soc. Lond. A 320, 1541
(1970), 209 -- 226.
[12] PB Hunt, DI Robertson, RD Bretherton, and M Cr Royle. 1982. The SCOOT
on-line traffic signal optimisation technique. Traffic Engineering & Control 23, 4
(1982).
[13] PB Hunt, DI Robertson, RD Bretherton, and RI Winton. 1981. SCOOT-a traffic
responsive method of coordinating signals. Technical Report.
[14] Jiechuan Jiang, Chen Dun, and Zongqing Lu. 2018. Graph Convolutional Rein-
forcement Learning for Multi-Agent Cooperation. arXiv preprint arXiv:1810.09202
(2018).
[15] Peter Koonce et al. 2008. Traffic signal timing manual. Technical Report. United
States. Federal Highway Administration.
[16] Lior Kuyer, Shimon Whiteson, Bram Bakker, and Nikos Vlassis. 2008. Multia-
gent reinforcement learning for urban traffic control using coordination graphs.
In Joint European Conference on Machine Learning and Knowledge Discovery in
Databases. Springer, 656 -- 671.
[17] PR Lowrie. 1992. SCATS -- a traffic responsive method of controlling urban traffic.
Roads and traffic authority. NSW, Australia (1992).
[18] Tomoki Nishi, Keisuke Otaki, Keiichiro Hayakawa, and Takayoshi Yoshimura.
2018. Traffic Signal Control Based on Reinforcement Learning with Graph
Convolutional Neural Nets. In 2018 21st International Conference on Intelligent
Transportation Systems (ITSC). IEEE, 877 -- 883.
[19] Ann NowÃľ, Peter Vrancx, and Yann MichaÃńl De Hauwere. 2012. Game Theory
and Multi-agent Reinforcement Learning.
[20] LA Prashanth and Shalabh Bhatnagar. 2011. Reinforcement learning with func-
IEEE Transactions on Intelligent
tion approximation for traffic signal control.
Transportation Systems 12, 2 (2011), 412 -- 421.
[21] Roger P Roess, Elena S Prassas, and William R McShane. 2004. Traffic engineering.
Pearson/Prentice Hall.
[22] Bruno Castro Da Silva, Eduardo W. Basso, Filipo Studzinski Perotto, Ana L. C.
Bazzan, and Paulo Martins Engel. 2006. Improving reinforcement learning with
context detection. In International Joint Conference on Autonomous Agents &
Multiagent Systems.
[23] van der Pol et al. 2016. Coordinated Deep Reinforcement Learners for Traffic
Light Control. NIPS.
[24] Pravin Varaiya. 2013. The max-pressure controller for arbitrary networks of
signalized intersections. In Advances in Dynamic Network Modeling in Complex
Transportation Systems. Springer, 27 -- 66.
[25] Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones,
Aidan N Gomez, Łukasz Kaiser, and Illia Polosukhin. 2017. Attention is all
you need. In Advances in Neural Information Processing Systems. 5998 -- 6008.
[26] Petar Velickovic, Guillem Cucurull, Arantxa Casanova, Adriana Romero, Pietro
arXiv preprint
Lio, and Yoshua Bengio. 2017. Graph attention networks.
arXiv:1710.10903 1, 2 (2017).
[27] Fo Vo Webster. 1958. Traffic signal settings. Technical Report.
[28] Hua Wei, Chacha Chen, Guanjie Zheng, Kan Wu, Vikash Gayah, Kai Xu, and
Zhenhui Li. 2019. PressLight: Learning Max Pressure Control to Coordinate
Traffic Signals in Arterial Network. In Proceedings of the 25th ACM SIGKDD
International Conference on Knowledge Discovery & Data Mining (KDD '19). ACM,
1290 -- 1298.
[29] Hua Wei, Guanjie Zheng, Vikash Gayah, and Zhenhui Li. 2019. A Survey on
Traffic Signal Control Methods. CoRR abs/1904.08117 (2019). arXiv:1904.08117
http://arxiv.org/abs/1904.08117
[30] Hua Wei, Guanjie Zheng, Huaxiu Yao, and Zhenhui Li. 2018.
Intellilight: A
reinforcement learning approach for intelligent traffic light control. In Proceedings
of the 24th ACM SIGKDD International Conference on Knowledge Discovery &
Data Mining. ACM, 2496 -- 2505.
[31] MA Wiering. 2000. Multi-agent reinforcement learning for traffic light con-
trol. In Machine Learning: Proceedings of the Seventeenth International Conference
(ICML'2000). 1151 -- 1158.
[32] Yaodong Yang, Rui Luo, Minne Li, Ming Zhou, Weinan Zhang, and Jun Wang. 2018.
Mean Field Multi-Agent Reinforcement Learning. arXiv preprint arXiv:1802.05438
(2018).
[33] Huaxiu Yao, Xianfeng Tang, Hua Wei, Guanjie Zheng, Yanwei Yu, and Zhenhui Li.
2018. Modeling Spatial-Temporal Dynamics for Traffic Prediction. arXiv preprint
arXiv:1803.01254 (2018).
[34] Quanzeng You, Hailin Jin, Zhaowen Wang, Chen Fang, and Jiebo Luo. 2016.
Image captioning with semantic attention. In Proceedings of the IEEE conference
on computer vision and pattern recognition. 4651 -- 4659.
[35] Huichu Zhang, Siyuan Feng, Chang Liu, Yaoyao Ding, Yichen Zhu, Zihan Zhou,
Weinan Zhang, Yong Yu, Haiming Jin, and Zhenhui Li. 2019. CityFlow: A Multi-
Agent Reinforcement Learning Environment for Large Scale City Traffic Scenario.
(2019).
|
1904.09630 | 5 | 1904 | 2019-11-21T15:11:55 | Genuine Personal Identifiers and Mutual Sureties for Sybil-Resilient Community Formation | [
"cs.MA",
"cs.SI"
] | While most of humanity is suddenly on the net, the value of this singularity is hampered by the lack of credible digital identities: Social networking, person-to-person transactions, democratic conduct, cooperation and philanthropy are all hampered by the profound presence of fake identities, as illustrated by Facebook's removal of 5.4Bn fake accounts since the beginning of 2019.
Here, we introduce the fundamental notion of a \emph{genuine personal identifier}---a globally unique and singular identifier of a person---and present a foundation for a decentralized, grassroots, bottom-up process in which every human being may create, own, and protect the privacy of a genuine personal identifier. The solution employs mutual sureties among owners of personal identifiers, resulting in a mutual-surety graph reminiscent of a web-of-trust. Importantly, this approach is designed for a distributed realization, possibly using distributed ledger technology, and does not depend on the use or storage of biometric properties. For the solution to be complete, additional components are needed, notably a mechanism that encourages honest behavior and a sybil-resilient governance system. | cs.MA | cs | Genuine Personal Identifiers and Mutual Sureties for
Sybil-Resilient Community Formation
Gal Shahaf1, Ehud Shapiro1 & Nimrod Talmon2
{gal.shahaf, ehud.shapiro}@weizmann.ac.il, [email protected]
1Weizmann Institute of Science
2Ben-Gurion University
9
1
0
2
v
o
N
1
2
]
A
M
.
s
c
[
5
v
0
3
6
9
0
.
4
0
9
1
:
v
i
X
r
a
Abstract. While most of humanity is suddenly on the net, the value
of this singularity is hampered by the lack of credible digital iden-
tities: Social networking, person-to-person transactions, democratic
conduct, cooperation and philanthropy are all hampered by the pro-
found presence of fake identities, as illustrated by Facebook's re-
moval of 5.4Bn fake accounts since the beginning of 2019.
Here, we introduce the fundamental notion of a genuine personal
identifier -- a globally unique and singular identifier of a person --
and present a foundation for a decentralized, grassroots, bottom-up
process in which every human being may create, own, and protect
the privacy of a genuine personal identifier. The solution employs
mutual sureties among owners of personal identifiers, resulting in a
mutual-surety graph reminiscent of a web-of-trust. Importantly, this
approach is designed for a distributed realization, possibly using dis-
tributed ledger technology, and does not depend on the use or storage
of biometric properties. For the solution to be complete, additional
components are needed, notably a mechanism that encourages hon-
est behavior [29] and a sybil-resilient governance system [30].
Introduction
Providing credible identities to all by 2030 is a UN Sustainable De-
velopment Goal. Yet, current top-down digital identity-granting solu-
tions are unlikely to close the 1Bn-people gap [6] in time, as they are
not working for citizens of failed states nor for people fleeing phys-
ical or political harshness [17, 5]. Concurrently, humanity is going
online at an astonishing rate, with more than half the world popu-
lation now being connected. Still, online accounts do not provide a
solution for credible digital identity either, as they may easily be fake,
resulting in lack of accountability and trust. For example, Facebook
reports the removal of 5.4Bn (!) fake accounts since the beginning of
2019 [16, 21].
The profound penetration of fake accounts on the net greatly ham-
pers its utility for credible human discourse and any ensuing delib-
erations and democratic decision making; it makes the net unsuit-
able for vulnerable populations, including children and the elderly;
it makes the use of the net for person-to-person transactions, notably
direct philanthropy, precarious; and in general it turns the net into an
inhuman, even dangerous, ecosystem. As an aside, we note that the
panacea of cryptocurrencies for the lack of credible personal iden-
tities on the net is the reckless employment of the environmentally-
harmful proof-of-work protocol.
Our aim is a conceptual and mathematical foundation for al-
lowing every person to create, own, and protect the privacy of a
globally-unique and singular identifier, henceforth referred to as
genuine personal identifier. We believe that successful deployment
and broad adoption of genuine personal identifiers will afford solu-
tions to these problems and more, providing for: egalitarian digital
democratic governance in local communities and in global move-
ments; digital cooperatives and digital credit unions; direct philan-
thropy; child-safe digital communities; preventing unwanted digi-
tal solicitation; banishing deep-fake (by marking as spam videos
not signed by a genuine personal identifier); credible and durable
digital identities for people fleeing political or economic harsh-
ness; accountability for criminal activities on the net; and egalitarian
cryptocurrencies employing an environmentally-friendly Byzantine-
agreement consensus protocol among owners of genuine personal
identifiers. Furthermore, genuine personal identifiers may provide
the necessary digital foundation for a notion of global citizenship
and, subsequently, for democratic global governance [31].
Granting an identity document by a state is a complex process as
it requires careful verification of the person's credentials. The pro-
cess culminates in granting the applicant a state-wide identifier that is
unique (no two people have the same identifier) and singular (no per-
son has two identifiers). Granting a genuine personal identifier might
seem even more daunting, as it needs to be globally-unique, not only
state-wide unique, except for following fundamental premise:
Every person deserves a genuine personal identifier. Thus, there are
no specific credentials to be checked, except for the existence of the
person. As a result, a solution for all people to create and own gen-
uine personal identifiers may focus solely on ensuring the one-to-one
correspondence between people and their personal identifiers.
A solution that is workable for all must be decentralized, dis-
tributed, grassroots, and bottom-up. Solid foundations are being laid
out by the notion of self-sovereign identities [22] and the W3C De-
centralized Identifiers [13] and Verifiable Claims [34] emerging stan-
dards, which aim to let people freely create and own identifiers and
associated credentials. We augment this freedom with the goal that
each person declares exactly one identifier as her genuine personal
identifier. We note that besides the genuine personal identifier, one
may create, own and use any number of identifiers of other types.
Becoming the owner of a genuine personal identifier is simple.
With a suitable app, this could be done with a click of a button:
1. Choose a new cryptographic key-pair (v, v−1), with v being the
public key and v−1 the private key.
2. Claim v to be your genuine personal identifier by publicly posting
a declaration that v is a genuine personal identifier, signed with
v−1.
Lo and behold! You have become the proud rightful owner of a gen-
uine personal identifier.1 Note that a declaration of a genuine per-
sonal identifier, by itself, does not reveal the person making the dec-
laration; it only reveals to all that someone who knows the secret key
for the public key v claims v as her genuine personal identifier. De-
pending on personality and habit, the person may or may not publicly
associate oneself with v. E.g., a person with truthful social media ac-
counts may wish to associate these accounts with its newly-minted
genuine personal identifier.
If becoming the rightful owner of a genuine personal identifier
is so simple, what could go wrong? In fact, so many things can go
wrong, that this paper is but an initial investigation into describing,
analyzing, and preventing them. Some of them are enumerated be-
low; h denotes an agent:
1. The key-pair (v, v−1) is not new, or else someone got hold of it
between Step 1 and Step 2 above. Either way, someone else has
declared v to be a genuine personal identifier prior to the declara-
tion by h. In which case h cannot declare v.
2. Agent h failed to keep v−1 secret so that other people, e.g. h(cid:48),
know v−1, in which case h(cid:48) is also an owner of v and, thus, v is
compromised. Figure 1 (left) illustrates a compromised personal
identifier.
3. The agent h intended to divulge his association with his public
key v only on a need-to-know basis, but the association of v and
h has become public knowledge, prompting agent h to replace his
genuine personal identifier v with a new one.
4. Agent h declared v as his genuine personal identifier, but later also
declared another personal identifier v(cid:48). Then, v and v(cid:48) are dupli-
cates, v(cid:48) is a sybil, and agent h is corrupt. An honest agent does
not declare sybils. Figure 1 illustrates honest and corrupt agents.
We aim to develop the foundation for genuine personal identifiers
utilizing basic concepts of public-key cryptography, graph theory, so-
cial choice theory and game theory. Here, we focus on utilizing the
first two disciplines; see [30] for sybil-resilient social choice, which
provides a foundation for democratic governance of digital commu-
nities with bounded sybil penetration; incorporating sybils in cooper-
ative game theory, with the goal of forming a sybil-free grand coali-
tion, is work in progress.
Related Work. Sybil-resilience has received considerable attention
in AI research [2, 3, 7, 8, 10, 11, 12, 30, 35, 36] as elaborated below.
Philosophically, genuine personal identifiers aim to bridge the gap
between agents and their corresponding identifiers. This distinction,
acknowledged in semiotics as the difference between signified and
signifier, strongly relates to the study of sense and reference initi-
ated by Frege [15] followed by vast literature in analytic philosophy
and the philosophy of language. Conceptually, the formal framework
suggested here may be viewed as an attempt to computationally re-
alize unique and singular signifiers of agents in a distributed setting.
Practically, digital identities are a subject of extensive study, with
many organizations aiming at providing solutions, notably Self-
Sovereign Identifiers [22]. Business initiatives include the Decen-
tralized Identity Foundation (identity.foundation), the Global Iden-
tity Foundation [14] and Sovrin [33]. None of these projects are con-
cerned with the uniqueness or singularity of personal identities.
1 As the public key may be quite long, one may also associate oneself with
a shorter "nickname", a hash of the public key, e.g. a 128-bit hash (as a
UUID) or a 256-bit hash (as common in the crypto world).
Other high-profile projects to provide nationwide digital identities
include India's Aadhaar system [23], Sierra Leone's Kiva identity
protocol [32] and the World Food Programmes cash aid distribution
program in refugee camps [19]. Here we are concerned with self-
sovereign and global personal identities, not bound to any national
boundaries or entities, and argue that top-down approaches fail to
provide such a solution. In this context, we mention the concept of
Proof of Personhood [7], aiming at providing unique and singular
identities by means of conducting face-to-face encounters, an ap-
proach suitable only for small communities.
Our solution is based upon the notion of trust, thus we men-
tion Andersen et al. [3], studying axiomatizations of trust systems.
They are not concerned, however, with sybils, but with quality of
recommendations. We mention work on sybil-resilient community
growth [26], describing algorithms for the growth of an online com-
munity that keep the fraction of sybils in it small; and work on sybil-
resilient social choice [30], describing aggregation methods to be ap-
plied in situations where sybils have infiltrated the electorate. In these
two papers, a notion of genuine identities and sybils is used without
specifying what they are; here, we define a concrete notion of gen-
uine personal identifiers, and derive from it a formal definition of
sybils and related notions of honest and corrupt agents and byzan-
tine identifiers. Finally, we mention the work of Conitzer
[12, 2]
regarding computerized tests for sybil fighting: A test that is hard for
a person to pass more than once [12] and a test that is hard to pass
simultaneously by one person [2].
Genuine Personal Identifiers
Ingredients. The ingredients needed for a realization of genuine per-
sonal identifiers are:
1. A set of agents. It is important to note that, mathematically, the
agents form a set (of unique entities) not a multiset (with dupli-
cates). Intuitively, it is best to think of agents as people (or other
physical beings with unique personal characteristics, unique per-
sonal history, and agency, such as intelligent aliens), which cannot
be duplicated, but not as software agents, which can be.
2. A way for agents to create cryptographic key-pairs. This can be
realized, e.g., using the RSA standard [27]. Our solution does not
require a global standard or a uniform implementation for pub-
lic key encryption: Different agents can use different technologies
for creating and using such key-pairs, as long as the signatures-
verification methods are declared.
3. A way for agents to sign strings using their key-pairs. As we as-
sume cryptographic hardness, an agent that does not know a cer-
tain key-pair cannot sign strings with this key-pair.
4. A bulletin board or public ledger, to which agents may post and
observe signed messages, where all agents observe the same order
of messages. The weaker requirement that the same order is ob-
served only eventually, as is standard with distributed ledger pro-
tocols, could also be accommodated. Considering partial orders is
a subject of future work.
Agents and their Personal Identifiers. We assume a set of agents
H that is fixed over time.2 Agents can create new key-pairs (v, v−1).
We assume that an agent that has a key-pair can sign a string, and de-
note by v(x) the string resulting from signing the string x with v−1.
Intuitively, each agent corresponds to a human being. Importantly,
2 Birth and death of agents will be addressed in future work.
Figure 1. A compromised identifier (left), honest agent (middle), and corrupt agent (right).
members of the set H of agents (e.g., containing all human beings)
cannot be referenced explicitly and, in particular, posted signed mes-
sages never refer directly to agents h ∈ H. A key motivation for
our work is providing people with digital genuine personal identi-
fiers without accessing any of their intrinsic (e.g. biometric) private
properties and without depending upon such properties as identifiers.
As we aim personal identifiers to be self-sovereign identities that
conform to the W3C Decentralized Identifiers emerging standards,
we let agents create and own their personal identifiers. An agent
h can publicly declare a personal identifier v for which it knows
the private key v−1. A personal identifier declaration has the form
v(gid(v)) and can be effected by agent h posting v(gid(v)) to a pub-
lic ledger. We denote this action by declareh(gid(v)) ∈ C. Recall
that all agents have the same view of the sequence of all declarations
made; subsequent work may relax this assumption.
Definition 1 (Personal Identifier) Let C be a sequence of personal
identifier declaration events and declareh(gid(v)) ∈ C the first dec-
laration event in which v occurs. Then v is a personal identifier and
h is the rightful owner of v, given C.
Definition 2 (Genuine Personal Identifier, Sybil, Honest, and
Corrupt Agents) Let C be a sequence of personal identifier dec-
laration events and h be the rightful owner of personal identifier v in
C. Then v is genuine if it is the first personal identifier declared in C
by h, else v is a sybil. An agent h is corrupt if it declares any sybils,
else h is honest. (All notions are relative to C.)
See Figure 1 and some remarks: (1) An agent is the rightful owner
of its genuine personal identifier as well as of any subsequent sybils
that it declares. (2) If h, the rightful owner of v, is corrupt, then its
first declared identifier is genuine and the rest of its declared iden-
tifiers are all sybils. (3) An honest agent may create and use many
key-pairs for various purposes, yet remain honest as long as it has
declared at most one public key as a personal identifier.
Mutual Sureties and Their Graphs
A key element of our approach is the pledging of mutual sureties by
agents. Intuitively, mutual surety pledges provide a notion of trust
between the owners of personal identifiers. They allow two agents
that know each other and know the personal identifiers declared by
each other to vouch for the other regarding the good standing of the
personal identifiers. This notion is key to help honest agents fend-off
sybils. We consider several types of mutual sureties, of increasing
strength, and illustrate the corresponding sybil-resilience each type
of mutual sureties can obtain.
For an agent, say h, to provide surety regarding the personal iden-
tifier of another agent, say h(cid:48), h first has to know h(cid:48). How this knowl-
edge is established is not specified in our formal framework, but this
is quite an onerous requirement that cannot be taken lightly or sat-
isfied casually. E.g., we may assume that one knows one's family,
friends and colleagues, and may diligently get to know new people
if one so chooses. We consider several types of sureties of increas-
ing strength, in which an agent h with personal identifier v makes
a pledge regarding the personal identifier v(cid:48) of another agent h(cid:48); all
assume that the agent h knows the agent h(cid:48). We describe four Surety
Types, which are cumulative as each includes all previous ones, ex-
plain on what basis one may choose to pledge each of them, and
present results that utilize them,
Surety of Type 1: Ownership of a personal identifier. Agent
pledges that agent h(cid:48) owns personal identifier v(cid:48).
Agent h(cid:48) can prove to agent h that she owns v(cid:48) without disclos-
ing v(cid:48)−1 to h. This can be done, for example, by h asking h(cid:48) to sign
a novel string x and verifying that v(cid:48)(x) is signed using v(cid:48)−1. This
surety type is the weakest of all four, it is the one given in "key sign-
ing parties", and is implicitly assumed by applications such as PGP
and web-of-trust [1]. For a given surety type, we say that the surety is
violated if its assertion does not hold; in particular, a surety of Type
1 is violated if h(cid:48) in fact does not know the secret key v(cid:48)−1.
h
In general, mutual surety between two agents with two per-
sonal identifiers is pledged by each of the two agents pledging
a surety to the personal identifier of the other agent.3 We de-
fine below three additional surety types, where the format of a
surety pledge of Type X by the owner of v to the owner of v(cid:48) is
v(suretyX(v(cid:48))), X ∈ {1, 2, 3, 4}. The corresponding surety event
is pledgehv(suretyX(v(cid:48))), and the surety enters into effect once
both parties have made the mutual pledges. We now take C to be a
record of both declaration events and pledge events.
3 We consider undirected graphs, as we require surety to be symmetric. In-
deed, one may consider directed sureties.
Definition 3 (Mutual Surety) The personal identifiers v, v(cid:48) have
there are
mutual surety of
h, h(cid:48) ∈ H for which pledgehv(suretyX(v(cid:48))) ∈ C
&
pledgeh(cid:48) v(cid:48)(suretyX(v)) ∈ C, in which case h and h(cid:48) are the wit-
nesses for the mutual surety between v and v(cid:48).
type X, X ∈ {1, 2, 3, 4},
if
A sequence of events induces a sequence of surety graphs in which
the vertices are personal identifiers that correspond to personal iden-
tifier declarations and the edges correspond to mutual surety pledges.
Definition 4 (Surety Graph) Let C = c1, c2, . . . be a sequence of
events and let Ck denote its first k ≥ 0 events. Then, for each k ≥ 0,
Ck induces a surety graph of type X, GXk = (Vk, EXk), X ∈
{1, 2, 3, 4}, as follows:4
Vk = {v declareh(gid(v)) ∈ Ck for some h ∈ H}
EXk = {(v, v
(cid:48)
) pledgehv(suretyX(v
pledgeh(cid:48) v
for some h, h
(cid:48)
(cid:48)
)) ∈ Ck,
(suretyX(v)) ∈ Ck,
(cid:48) ∈ Vk}
(cid:48) ∈ H, v, v
Remark 1 Observe that mutual sureties can be easily pledged by
agents, technically. However, we wish agents to be prudent and sin-
cere in their mutual surety pledges. Thus, we expect a mechanism
that, on one hand, rewards the pledging of sureties but, on the other
hand, punishes for surety violations, for example based on the ap-
proach of [29]. While the specifics of such a mechanism is beyond
the scope of the current paper, note that with such a mechanism in
place, the commissive illocutionary force [28] of a surety pledge will
come to bear.
Updating a Personal Identifier with Mutual Sureties
Once creating a genuine personal identifier is provided for, one must
also consider the many circumstances under which a person may
wish to update their personal identifier:
1. Identifier loss: The private key was lost.
2. Identifier theft: The private key was stolen, robbed, extorted, or
otherwise compromised.
3. Identifier breach of privacy: The association between the per-
sonal identifier and the person was accidentally or maliciously
disclosed with unwarranted consequences.
4. Identifier refresh: Proactive identifier update to protect against
all the above.
Update in Case of Loss or Theft. The personal identifier declara-
tion event declareh(gid(v)) establishes v as a personal identifier.
To support updating a personal identifier, we add the personal iden-
tifier update event declareh(gid(v, v(cid:48))), which declares that v(cid:48) is a
new personal identifier that replaces v. A public declaration of iden-
tifier update has the form v(gid(v, v(cid:48))), i.e., it is signed with the new
identifier. We refer to declarations of both types as personal iden-
tifier declarations, and extend the assumption that a new identifier
can be declared at most once to this broader definition of identifier
declaration. The validity of an identifier update declaration is defined
inductively, as follows.
4 We allow surety pledges to be made before the corresponding personal iden-
tifier declarations, as we do not see a reason to enforce order.
Definition 5 (Valid identifier Update declaration) Let C be a se-
quence of declarations, V the set of global identities declared in C,
and h ∈ H. A personal identifier update event over V has the form
declareh(gid(v, v(cid:48))), v, v(cid:48) ∈ V .
A personal identifier update event declareh(gid(v, v(cid:48))) ∈ C is
valid and h is the rightful owner of v if it is the first identifier decla-
(cid:3)
ration event of v and h is the rightful owner of v(cid:48).
Valid personal identifier declarations should form linear chains, one
for each agent, each starting from gid(v) and ending with the cur-
rently valid personal identifier of the agent:
Definition 6 (Identifier Provenance Chain) Let C be a sequence of
declarations and V the declared set of global identities. An identifier
provenance chain (provenance chain for short) is a subsequence of C
of the form (starting from the bottom):
declarehk (gid(vk, vk−1)),
declarehk−1 (gid(vk−1, vk−2)),
. . .
declareh1 (gid(v1)).
Such a provenance chain is valid if the declarations in it are valid.
Such a provenance chain is maximal if there is no declaration
declareh(gid(v, vk)) ∈ C
for any v ∈ V and h ∈ H. A personal identifier v is current in C if it
is the last identifier v = vk in a maximal provenance chain in C. (cid:3)
Note that it is very easy for an agent to make an update declaration
for its identifier. However, it is just as easy for an adversarial agent
wishing to steal the identifier to make such a declaration. Hence, this
ability must be coupled with a mechanism that protects the rightful
owner of an identifier from identifier theft through invalid identifier
update declarations. Here we propose to use a stronger type of mu-
tual sureties to support valid identifier update declarations and help
distinguish between them and invalid declarations.
Surety of Type 2: Rightful ownership of a personal identifier.
Agent h pledges that h(cid:48) is the rightful owner of personal iden-
tifier v(cid:48).
In addition to proving to h that it owns v(cid:48), h(cid:48) must provide evidence
that h(cid:48) itself, and not some other agent, has declared v(cid:48). A selfie
video of h(cid:48) pressing the declare button with v(cid:48), signed with a certified
timestamp promptly after the video was taken, and then signed by v(cid:48),
may constitute such evidence. A suitable app may record, timestamp,
and sign such a selfie video automatically during the creation of a
genuine personal identifier. In particular, this surety is violated if h(cid:48)
in fact did not declared v(cid:48) as a personal identifier.
Note that immediately following an identifier update declaration,
the new identifier may not have any surety edges incident to it. Thus,
as a crude measure, we may require that the identifier update would
come to bear only after all the Type 2 surety neighbors of the old
identifier, or a sufficiently large majority of them, would update their
mutual sureties to be with the new identifier. To achieve that, an agent
wishing to update its identifier would have to approach its neighbors
and to create such updated Type 2 mutual surety pledges.
Example 1 Consider two friends, agent h and agent h(cid:48) having a mu-
tual surety pledge between them. If h(cid:48) would lose her identifier, she
would create a new key-pair, make an identifier update declaration,
and ask h for a new mutual surety pledge between h's identifier and
h(cid:48)'s new identifier.
The following observation follows from: (1) a valid provenance
chain has a single owner; and (2) whether a Type 2 surety between
two identifiers is violated depends on their rightful owners.
Observation 1 Let C be a sequence of update declarations and
C1, C2 be two valid provenance chains in C. If a Type 2 surety pledge
between two global identities v1 ∈ C1, v2 ∈ C2 is valid, then any
Type 2 surety pledge between two personal identifiers in these prove-
nance chains, u1 ∈ C1, u2 ∈ C2 is valid.
The import of Observation 1 is that a Type 2 mutual surety can
be "moved along" valid provenance chains as they grow, without be-
ing violated, as it should be. Below we argue that invalid identifier
update declarations are quite easy to catch, thus the risk of stealing
identities can be managed. In effect, we show the value of Type 2
surety pledges in defending an identifier against theft via invalid up-
date declarations.
Let C be a sequence of declarations, C1, C2 be two provenance
chains in C, and assume that there is a valid Type 2 surety pledge be-
tween the two current global identifiers v1 ∈ C1, v2 ∈ C2, made by
h1 = Marry and h2 = John. Now assume that the identifier update
declaration c = declareh(gid(v, v1)) is made, namely, some agent
Sue (cid:54)= Marry has declared to replace v1 by v. Then, it will be hard for
Marry to secure surety from John and, if she attempts to do so, then
John will know that c is not valid and thus (if John is honest) a Type
2 mutual surety between v and v2 will not be established. Consider
the following case analysis:
• Assume Marry notices c. Then she would inform John that she did
• Assume that John notices c. He would approach Marry to update
the Type 2 mutual surety between them accordingly; Marry would
deny owning v, and thus John will know that c is invalid.
• Alternatively, Sue would approach John to update the Type 2 mu-
tual surety of v2 with v1 to be with v instead; John will see (or
suspect, if Sue did not reveal herself) that Sue is not Marry, will
double check with Marry and deem the declaration c invalid.
not declare c, and thus John will know that c is not valid.
Reset in Case of Breach of Privacy. Note that provenance chains
address identifier update in case of loss of theft, but do not address
breach of privacy, as the updated new identifier is publicly tied to the
previous one. To address breach of privacy, a person first has to inval-
idate his existing identifier, then create a new genuine identifier that
is not linked to the previous one; this may result in loss of any public
credit and goodwill associated with the old genuine personal identi-
fier, but there may be circumstances in which a person would need to
protect his privacy even at the expense of such loss. To facilitate that,
an identifier reset declaration uses the special value null and has the
form declareh(gid(v, null)), which nullifies v as a personal identi-
fier, and enters into effect if supported by those who initially provided
the surety to v. Agent h would then be free to declare a new personal
identifier v(cid:48), which is not tied to the now-defunct v, and at the same
time without v(cid:48) being a sybil and without h becoming corrupt as a
result of this declaration.
We note that using null, an initial genuine identifier declaration
could be of the form declareh(gid(null, v)), thus dispensing with
the unary declaration format declareh(gid(v)) altogether.
GDPR. In general, our approach does not imply any "data con-
trollers" or "data processors" [24] other than people and their trusted
friends, but if realized on a large scale it might require such, possibly
democratically-appointed by the large community that needs them.
Furthermore, our approach and does not record or store any "person-
ally identifiable information", and as such we believe is compliant
with GDPR [24]. One exception is perhaps the association of a gen-
uine personal identifier with the person that owns it, which could be
made public on purpose by the owner, inadvertently by the owner
or by another person, or maliciously by another person. Closely tied
to this exception is GDPR's "right to be forgotten" [24, Article 17],
which is notoriously difficult to realize in a distributed setting and
hence resulted in sweeping legal opinions regarding the inapplica-
bility of distributed ledger/blockchain technology for the storage of
personally identifiable information [25].
Our method of personal identifier reset first invalidates an existing
identifier (which could be coupled with a demand of erasure of every
reference to this identifier from any public data controller, e.g. Face-
book) and then creates an independent and unlinked new personal
identifier. This may be the first proposal on how to realize the "right
to be forgotten" in a decentralized setting.
Sybil- and Byzantine-Resilient Community Growth
Ideally, we would like to attain sybil-free communities, but acknowl-
edge that one cannot prevent sybils from being declared and, fur-
thermore, perfect detection and eradication of sybils is out of reach.
Thus, our aim is to provide the foundation for a digital community
of genuine personal identifiers to grow by admitting new identifiers
indefinitely, while retaining a bounded sybil penetration. As noted
above, democratic governance can be achieved even with bounded
sybils penetration [30].
Community history. For simplicity, we assume a single global com-
munity A and consider elementary transitions obtained by either
adding a single member to the community or removing a single com-
munity member:
Definition 7 (Elementary Community Transition) Let A, A(cid:48) de-
note two communities in V . We say that A(cid:48) is obtained from A by an
elementary community transition, and we denote it by A → A(cid:48), if:
• A(cid:48) = A, or
• A(cid:48) = A ∪ {v} for some v ∈ V \ A, or
• A(cid:48) = A \ {v} for some v ∈ A.
Definition 8 (Community History) Let C = c1, c2, ... be a se-
quence of events. A community history wrt. C is a sequence of com-
munities A = A1, A2, . . . such that Ai ⊆ Vi and Ai → Ai+1 holds
for every i ≥ 1.
We do not consider community governance in this paper, only the
effects of community decisions to add or remove members. Hence,
we assume that the sequence of events C includes the events addA(v)
and removeA(v). With this addition, C = c1, c2, . . . induces a com-
munity history A1, A2, ..., where Ai+1 = Ai∪{v} if ci = addA(v)
for v ∈ V \ Ai; Ai+1 = Ai \ {v} if ci = removeA(v) for v ∈ Ai;
else Ai+1 = Ai.
Definition 9 (Community, Sybil penetration rate) Let C be a se-
quence of events and let S ⊆ V denote the sybils in V wrt. C. A
community in V is a subset of identifiers A ⊆ V . The sybil penetra-
tion σ(A) of the community A is given by σ(A) =
.
A∩S
A
The following observation is immediate.
Observation 2 Let A1, A2, ... be the community history wrt. a se-
quence of declarations C. Assume that A1 ⊆ H, and that whenever
Ai+1 = Ai ∪ {v} for some v /∈ Ai, it holds that P r(v ∈ S) ≤ σ
for some fixed 0 ≤ σ ≤ 1. Then, the expected sybil penetration rate
for every Ai is at most σ.
That is, the observation above states that a sybil-free community can
keep its sybil penetration rate below σ, as long as the probability of
admitting a sybil to it is at most σ. While the simplicity of Observa-
tion 2 might seem promising, its premise is naively optimistic. Due
to the ease in which sybils can be created and to the benefits of own-
ing sybils in a democratic community, the realistic scenario is of a
hoard of sybils and a modest number of genuine personal identifiers
hoping to join the community. Furthermore, once a fraction of sybils
has already been admitted, it is reasonable to assume that all of them
(together with their perpetrators of course) would support the admis-
sion of further sybils. Thus, there is no reason to assume neither the
independence of candidates being sybils, nor a constant upper bound
on the probability of sybil admission to the community. Hence, in the
following we explore sybil-resilient community growth under more
realistic assumptions.
Sybil-Resilient Community Growth
A far more conservative assumption includes a process employed by
the community with the aim of detecting sybils. We shall use the ab-
stract notion of sybil detector in order to capture such process, that
may take the form of a query, a data-based comparison to other iden-
tifiers, or a personal investigation by some other agent. To leverage
this detector to sybil-resilient community growth regardless of the
sybil distribution among the candidates, we shall utilize a stronger
surety type, defined as follows:
Surety of Type 3: Rightful ownership of a genuine personal
identifier. Agent h pledges Surety Type 2 and that v(cid:48) is the gen-
uine personal identifier of h(cid:48).
Providing this surety requires a leap of faith. In addition to h ob-
taining from h(cid:48) a proof of rightful ownership of v(cid:48), h must also trust
h(cid:48) not to have declared any other personal identifier prior to declar-
ing v(cid:48). There is no reasonable way for h(cid:48) to prove this to h, hence the
leap of faith.
Since Type 3 sureties inherently aim to distinguish between gen-
uine identifiers and sybils, sybil-resilient community growth is es-
tablished upon the underlying G3 surety graph. Specifically, we con-
sider a setting where potential candidates to join the community are
identifiers with a surety obtained from current community members.
Conversely, we consider a violation of a surety in one direction as
a strong indication that the surety in the other direction is violated.
That is, if (v, v(cid:48)) ∈ E and v(cid:48) was shown to be sybil, (i.e., h(cid:48) has
declared some other v(cid:48)(cid:48) as a personal identifier before declaring v(cid:48) as
a personal identifier), then v should undergo a thorough investigation
in order to determine whether it is sybil as well.
Next, we formalize this intuition in a simple stochastic model
where admissions of new members are interleaved with random sybil
detection among community members:
(1) An identifier is admitted to the community via an elementary com-
munity transition A → A ∪ {v} only if there is some a ∈ A with
(a, v) ∈ E.
(2) Every admittance of a candidate is followed by a random sybil
detection within the community: An identifier a ∈ A is chosen
uniformly at random. If a is genuine it is declared as such. If a is
sybil, it is successfully detected with probability 0 < p ≤ 1.
(3) The detection of a sybil implies the successful detection of its en-
tire connected sybil component (with probability 1). That is, if a is
detected as sybil, then the entire connected component of a in the
sybil subgraph GS is detected and expelled from the community.
(4) The sybils are operated from at most j ≤ k disjoint sybil compo-
nents in A. Furthermore, we assume that sybils join sybil compo-
nents uniformly at random, i.e., a new sybil member has a surety
to a given sybil component with probability 1
k , else, it forms a new
sybil component with probability k−j
k .
Note that assumption (2) is far weaker than the premise in Obser-
vation 2 as it presumes nothing on the sybil penetration among the
candidates, but rather on the proactive ability to detect a sybil, once
examined. Assumption (3) exploits the natural cooperation among
sybils, especially if owned by the same agent, and assumes that if a
sybil is detected by a shallow random check with probability p, then
all its neighbours will be thoroughly investigated and will be detected
if sybil with probability 1, continuing the investigation iteratively un-
til the entire connected sybil component of the initially-detected sybil
is identified. In assumption (4), the parameter k and the locations of
the components are adversarial -- the attacker may choose how to op-
erate. While realistic attackers may also choose to which component
shall the new (sybil) member join, uniformity is assumed to simplify
the analysis. Possible relaxations of this model are future work.
For this setting we show an upper bound on the expected sybil pen-
etration, assuming bounded computational resources of the attacker.
Theorem 1 In the stochastic model described above, obtaining an
expected sybil penetration E[σ(A)] ≥ is NP-hard for every > 0.
Let Xi ⊆ A denote a sybil component within the commu-
Proof.
nity at time i. In the stochastic model described above, Xi is detected
and immediately expelled with probability p· Xi
Ai . The expected size
of the component in this model is obtained in a steady state, i.e., in a
state i in time where E[Xi+1] = Xi, that is:
(1 − px/n) · 1
k
· (x + 1) + (1 − px/n) · (1 − 1
k
where n := Ai and x = Xi. It follows that x2 + 1
pk = 0.
Solving this quadratic equation implies that the size of a single sybil
component in the steady state is x ≤ (cid:112)n/pk. It follows that the
number of sybils in the community in a steady state is xk ≤(cid:112)nk/p.
) · x = x,
k x − n
The crucial observation now is that operating from k nonempty
sybil components corresponds to obtaining an independent set of
size k (at least, choosing a single vertex in each component). The
theorem follows from the fact that approximating independent set
(cid:3)
within a constant factor is NP-hard (see, e.g., [4]).
The following corollary establishes an upper bound on the sybil
penetration rate regardless of the attacker's computational power.
The result is formulated in terms of the second eigenvalue of the
graph restricted to Ai. (λ(GAi ) is defined in the supplementary ma-
terials section.
Corollary 1 Let A = A1, A2, . . . be a community history wrt. a
sequence of events C. If every community Ai ∈ A with Ai = Ai−1 (cid:93)
{v} satisfies λ(GAi ) < λ, then the expected sybil penetration in
every Ai ∈ A under the stochastic model depicted above, is at most
(cid:112)λ/p.
utilize the notation A (cid:16) A(cid:48) to indicate that A(cid:48) was obtained from
A via a finite sequence of elementary community transitions of in-
cremental growth. Formally, A (cid:16) A(cid:48) if there exists k ∈ N with
A = A0 → A1 → ...Ak = A(cid:48), with Ai \ Ai−1 = 1 for all i ∈ [k].
Theorem 2 Let A = A1 (cid:16) A2 (cid:16) A3 (cid:16) . . . be a community his-
tory wrt. a sequence of events C. Set a sequence of degrees d1, d2, . . .
and parameters α, β, γ, δ ∈ [0, 1]. Assume:
1. deg(v) ≤ di for all v ∈ Ai, i ∈ N.
2. Every a ∈ Ai satisfies {x∈Ai (a,x)∈E}
A1 ≤ β.
A1∩B
3.
4. e(Ai∩H,Ai∩B)
5. Ai \ Ai−1 ≤ δAi−1, with β + δ ≤ 1
2 .
6. Φ(GAi ) > γ
α ·(cid:16) 1−β
(Ai∩H) ≤ γ.
≥ α.
volAi
di
(cid:17)
.
β
Then, every community Ai ∈ A has Byzantine penetration
β(Ai) ≤ β.
Roughly speaking, Theorem 2 suggests that whenever: (1) Each
graph GAi has a bounded degree di; (2) Sufficiently many edges are
within Ai; (3) Byzantine penetration to A1 is bounded; (4) Edges be-
tween harmless and byzantine identifiers are scarce; (5) Community
growth in each step is bounded; (6) The conductance within GAi is
sufficiently high; Then, the community may grow indefinitely with
bounded byzantine penetration.
As Theorem 2 allows byzantine resilient growth at a fixed rate δ,
it may be interpreted as an extension of a related result by Poupko
et al. [26], where new members were added one at a time. More-
over, [26] assumed a notion of honest (what we refer to as genuine)
and byzantine identities without defining what they are; here we for-
malize these notions and provide more sound definitions of harmless
and byzantine identifiers. A formal definition of graph conductance
Φ and the proof of Theorem 2 may be found in the supplementary
material.
Remark 2 A potential application of Theorem 2 is a byzantine-
resilient union of two communities. Let A, A(cid:48) ⊆ V denote two com-
munities that have some overlap (non-empty intersection) and wish
to unite into A2 := A ∪ A(cid:48). Then, if Theorem 2 holds for (A1, A2)
in case A1 := A and also in case A1 := A(cid:48), this would provide both
A and A(cid:48) the necessary guarantee that the union would not result in
an increase of the sybil penetration rate for either community.
Outlook
Digital identity systems face the "Decentralized Identity Trilemma",
of being (i) privacy-preserving, (ii) sybil-resilient and (iii) self-
sovereign, all at the same time [20]. It has been claimed that no ex-
isting identity system satisfies all three corners of the Trilemma [20];
our approach may be the first to do so.
While this paper provides a formal mathematical framework, we
aimed the constructions to be readily amenable to implementation.
Realizing the proposed solution entails developing additional com-
ponents, notably sybil-resilient governance mechanisms, e.g. along
the lines of [30]; a mechanism for encouraging honest behavior and
discouraging corrupt behavior, e.g. along the lines of [29]; and a
cryptocurrency to fuel such a mechanism and the system in general.
Once all components have been designed, we aim to implement, sim-
ulate, test, deploy, and evaluate the proposed framework, hopefully
realizing the potential of genuine personal identifiers.
Figure 2. Violations of Sureties of Type 3 and Type 4. The axis of time
goes from left to right, with the points in time in which v(cid:48) was declared by
h(cid:48) and the surety from h to h(cid:48) was declared. Then, the braces describe the
time regions in which, if another identifier v(cid:48)(cid:48) was to be declared by h(cid:48),
would correspond to a violation of a surety of Type 3 or 4.
Proof.
Recall that the size of the maximal independent set is
a trivial upper bound on k. The cardinality of an independent set
in a λ-expander is at most λn [18]; thus, k ≤ λn. It follows
that the number of sybils in the community in a steady state is
(cid:3)
xk ≤(cid:112)nk/p ≤ n(cid:112)λ/p.
Byzantine-Resilient Community Growth
Here we consider the challenge of byzantine-resilient community
growth. Intuitively, the term byzantines aims to capture identifiers
owned by agents that are acting maliciously, possibly in collabora-
tion with other malicious agents. Formally, we define byzantines as
follows.
Definition 10 (Byzantine and harmless identifiers, Byzantine
penetration) An identifier is said to be byzantine if it is either a
sybil or the personal identifier of a corrupt agent. Non-byzantine
identifiers are referred to as harmless. We denote the byzantine and
harmless identifiers in V by B, H ⊆ V , respectively. The byzantine
penetration β(A) of a community A ⊆ V is given by β(A) =
A∩B
.
Since S ⊆ B, it holds that σ(A) ≤ β(A) for every community A,
hence an upper bound on the byzantine penetration also provides an
upper bound on the sybil penetration.
A
As byzantine identifiers include genuine identifiers, they are inher-
ently harder to detect, and thus the detection-based model described
in Section is no longer applicable in this setting. Rather, to achieve
byzantine-resilient community growth, we rely on a stronger surety
type, defined as follows:
Surety of Type 4: Rightful ownership of a genuine personal
identifier by an honest agent. Agent h pledges Surety Type 3
and, furthermore, that v(cid:48) is a genuine personal identifier of an hon-
est agent h(cid:48).
Here h has to put even greater trust in h(cid:48): Not only does h has
to trust that the past actions of h(cid:48) resulted in v(cid:48) being her genuine
personal identifier, but she also has to take on faith that h(cid:48) has not
declared any sybils since and, furthermore, that h(cid:48) will not do so in
the future. Note that a Type 4 surety is violated if after h(cid:48) declares v(cid:48)
it ever declares some other v(cid:48)(cid:48) as a personal identifier. See Figure 2
for illustrations of violations of sureties of Types 3 and 4.
In the following, we provide sufficient conditions for Type 4
sureties to be used for byzantine-resilient community growth. We
References
[1] Alfarez Abdul-Rahman, 'The pgp trust model', in EDI-Forum: the
Journal of Electronic Commerce, volume 10 (3), pp. 27 -- 31, (1997).
[2] Garrett Andersen and Vincent Conitzer, 'Atucapts: Automated tests that
a user cannot pass twice simultaneously.', in Proceedings of IJCAI '16,
pp. 3662 -- 3669, (2016).
[3] R. Andersen, C. Borgs, J. Chayes, U. Feige, A. Flaxman, A. Kalai,
V. Mirrokni, and M. Tennenholtz, 'Trust-based recommendation sys-
tems: an axiomatic approach', in Proceedings of WWW '08, pp. 199 --
208, (2008).
[4] Sanjeev Arora and Boaz Barak, Computational complexity: a modern
approach, Cambridge University Press, 2009.
[5] R. Baird, K. Migiro, D. Nutt, A. Kwatra, S. Wilson, J. Melby,
A. Pendleton, M. Rodgers, and J. Davison. Human tide: the real mi-
gration crisis, 2007.
[6] World Bank.
Identification for development (ID4D) global dataset,
2018.
[7] M. Borge, E. Kokoris-Kogias, P. Jovanovic, L. Gasser, N. Gailly, and
B. Ford, 'Proof-of-personhood: Redemocratizing permissionless cryp-
tocurrencies', in Proceedings of EuroS&PW '17, pp. 23 -- 26, (2017).
[8] Maria Borge, Eleftherios Kokoris-Kogias, Philipp Jovanovic, Linus
Gasser, Nicolas Gailly, and Bryan Ford, 'Proof-of-personhood: Re-
democratizing permissionless cryptocurrencies', Proceedings of Eu-
roS&PW '17, 23 -- 26, (2017).
Jeff Cheeger, 'A lower bound for the smallest eigenvalue of the lapla-
cian', in Proceedings of the Princeton conference in honor of Professor
S. Bochner, (1969).
[9]
[10] V. Conitzer, N. Immorlica, J. Letchford, K. Munagala, and L. Wag-
man, 'False-name-proofness in social networks', in Proceedings of the
6th International Workshop on Internet and Network Economics (WINE
'10), pp. 209 -- 221, (2010).
[11] V. Conitzer and M. Yokoo, 'Using mechanism design to prevent false-
name manipulations', AI magazine, 31(4), 65 -- 78, (2010).
[12] Vincent Conitzer, 'Using a memory test to limit a user to one account',
in Proceedings of AMEC '08, pp. 60 -- 72, (2008).
[13] D. Longley C. Allen R. Grant M. Sabadello D. Reed, M. Sporny, 'De-
centralized identifiers (DIDs) v0. 12 -- data model and syntaxes for de-
centralized identifiers (DIDs)', Draft Community Group Report, 29,
(2018).
[14] The Global Identity Foundation. Global identity challenges, pitfalls and
solutions, 2014.
[15] Gottlob Frege, 'On sense and reference', oversatt av Max Black, i J.
Guit´errez-Rexach (red.): Semantics: Crictical concepts in linguistics,
1, 7 -- 25, (2003).
[16] Brian Fung and Ahiza Garcia, 'Facebook has shut down 5.4 billion fake
accounts this year', CNN, (November 2019).
[17] Charles Geisler and Ben Currens, 'Impediments to inland resettlement
under conditions of accelerated sea level rise', Land Use Policy, 66,
322 -- 330, (2017).
[18] Shlomo Hoory, Nathan Linial, and Avi Wigderson, 'Expander graphs
and their applications', Bulletin of the American Mathematical Society,
43(4), 439 -- 561, (2006).
[19] Nir Kshetri and Jeffrey Voas, 'Blockchain in developing countries', It
Professional, 20(2), 11 -- 14, (2018).
[20] Maciek Laskus. Decentralized identity trilemma, 2018. Available at
http://maciek.blog/dit/?cookie-state-change=1574327093444.
[21] Niall McCarthy, 'Facebook deleted more than 2 billion fake accounts
in the first quarter of the year', Forbes, (May 2019).
[22] A. Muhle, A. Gruner, T. Gayvoronskaya, and C. Meinel, 'A survey on
essential components of a self-sovereign identity', Computer Science
Review, 30, 80 -- 86, (2018).
[23] Government of India. Home - unique identification authority of india,
2018. Available at https://uidai.gov.in.
[24] European Parliament. General data protection regulation (gdpr).
[25] European Parliament. Blockchain and the general data protection regu-
lation: Can distributed ledgers be squared with european data protection
law?, 2019.
[26] Ouri Poupko, Gal Shahaf, Ehud Shapiro, and Nimrod Talmon, 'Sybil-
resilient conductance-based community growth', in Proceedings of
CSR '19, (2019). A preliminary version appears in https://arxiv.org/
abs/1901.00752.
[27] R. L. Rivest, A. Shamir, and L. Adleman, 'A method for obtaining dig-
ital signatures and public-key cryptosystems', Communications of the
ACM, 21(2), 120 -- 126, (1978).
[28]
J. R. Searle, S. Willis, and D. Vanderveken, Foundations of illocution-
ary logic, CUP Archive, 1985.
[29] Sven Seuken and David C Parkes, 'Sybil-proof accounting mechanisms
with transitive trust', in Proceedings of the 2014 international confer-
ence on Autonomous agents and multi-agent systems, pp. 205 -- 212. In-
ternational Foundation for Autonomous Agents and Multiagent Sys-
tems, (2014).
[30] G. Shahaf, E. Shapiro, and N. Talmon, 'Sybil-resilient reality-aware
social choice', in IJCAI '19, pp. 572 -- 579, (2019).
[31] E. Shapiro, 'Point: foundations of e-democracy', Communications of
the ACM, 61(8), 31 -- 34, (2018).
[32] Susan Staats, Alfonso Sintjago, and Renata Fitzpatrick, 'Kiva mi-
croloans in a learning community: An assignment for interdisciplinary
synthesis', Innovative Higher Education, 38(3), 173 -- 187, (2013).
[33] A. Tobin and D. Reed, 'The inevitable rise of self-sovereign identity',
The Sovrin Foundation, 29, (2016).
[34] W3C. Verifiable credentials data model 1.0, 2019.
[35] B. Waggoner, L. Xia, and V. Conitzer, 'Evaluating resistance to false-
name manipulations in elections.', in Proceedings of the 26rd AAAI
Conference on Artificial Intelligence (AAAI '12), (2012).
[36] L. Wagman and V. Conitzer, 'Optimal false-name-proof voting rules
with costly voting.', in Proceedings of the 22st AAAI Conference on
Artificial Intelligence (AAAI '08), pp. 190 -- 195, (2008).
Supplementary Material
Graph notations and terminology
We provide some more detailed notations regarding graphs and con-
ductance.
Let G = (V, E) be an undirected graph. The degree of a vertex
x ∈ V is deg(x) := {y ∈ V (x, y) ∈ E}. The volume of a
(cid:80)
given subset A ⊆ V is the sum of degrees of its vertices, vol(A) :=
in GA, and by volA(B) := (cid:80)
x∈A deg(x). Additionally, we denote the subgraph induced on the
set of vertices A as GA, by degA(x) the degree of vertex x ∈ A
x∈B degA(x) the volume of a set
B ⊆ A in GA. Given two disjoint subsets A, B ⊆ V , the size of the
cut between A and B is denoted by
e(A, B) = {(x, y) ∈ E x ∈ A, y ∈ B} .
Connectivity measures. In the following, we define two fundamen-
tal notions of graph connectivity that play a substantial role in safe
community growth.
Definition 11 (Combinatorial Conductance) Let G = (V, E) be a
graph. The conductance of G is defined by:
Φ(G) = min
∅(cid:54)=A⊂V
e(A, Ac)
min{vol(A), vol(Ac)} .
(Ac := V \ A is the complement of A.)
The following definition is an algebraic measure for connectivity.
Definition 12 (Algebraic conductance) Let G be a graph, and let
λn ≤ λn−1 ≤ ... ≤ λ2 ≤ λ1 be the eigenvalues of its random walk
matrix. Then, G is a said to be a λ-expander if its generalized second
eigenvalue λ(G) := maxi(cid:54)=1 λi satisfies λ(G) ≤ λ.
We note that the notions of conductance and algebraic conduc-
tance are tightly related via the celebrated Cheeger inequality [9].
We refer the reader to the text of Hoory et al. [18] for through ex-
position and elaborate discussion regarding conductance and graph
expansion.
Proof of Theorem 2
Theorem 2 follows by induction from the following Lemma:
Lemma 1 Let G = (V, E) be a surety graph with A ⊆ A(cid:48) ⊆ V ,
and set α, β, γ, δ ∈ [0, 1] and d > 0.
or equivalently
e(A(cid:48) ∩ H, A(cid:48) ∩ B)
dγA(cid:48) ∩ B
Assumptions (1) and (4) imply
≥ 1 − β
β
.
(5)
e(A(cid:48) ∩ H, A(cid:48) ∩ B)
dA(cid:48) ∩ H
≤ e(A(cid:48) ∩ H, A(cid:48) ∩ B)
volA(cid:48) (A(cid:48) ∩ H)
≤ γ ,
or equivalently
(cid:48) ∩ H ≥ e(A(cid:48) ∩ H, A(cid:48) ∩ B)
A
dγ
.
(6)
Combining Inequalities 5, 6 we get:
A(cid:48)
A(cid:48) ∩ B =
A(cid:48) ∩ B
A(cid:48) ∩ H + A(cid:48) ∩ B
≥ e(A(cid:48) ∩ H, A(cid:48) ∩ B)
(cid:18) 1 − β
dγA(cid:48) ∩ B
(cid:19)
+ 1 =
>
1
β
,
β
+ 1
where the first equality holds as A = (A ∩ H) (cid:93) (A ∩ B), the
second inequality stems from Equation 6 and the third inequality
stems from Equation 5. Flipping the nominator and the denominator
(cid:3)
then gives β(A(cid:48)) :=
A(cid:48)∩B
A(cid:48) < β.
Assume:
1. deg(v) ≤ d for all v ∈ A(cid:48).
2. Every a ∈ A(cid:48) satisfies {x∈A(cid:48) (a,x)∈E}
[The graph has a bounded degree].
≥ α.
d
[Sufficiently many edges are within members of A(cid:48)]
A ≤ β.
A∩B
3.
[Byzantine penetration to the initial community is bounded]
4. e(A(cid:48)∩H,A(cid:48)∩B)
volA(cid:48) (A(cid:48)∩H) ≤ γ.
[the edges between harmless and byzantine identifiers are rela-
tively scarce]
5. A(cid:48) \ A ≤ δA, with β + δ ≤ 1
2 .
[Community growth is bounded]
α ·(cid:16) 1−β
β
(cid:17)
.
6. Φ(GA(cid:48) ) > γ
[the conductance within A(cid:48) is sufficiently high]
Then, A(cid:48)∩B
A(cid:48) ≤ β.
Proof. We first note that due to A ⊆ A(cid:48), and assumptions (3), (5),
we have
(cid:48) \ A
A
(cid:48) ∩ B ≤ A ∩ B + A
≤ βA + δA
≤ A
A(cid:48)
2
2
As V = B (cid:93) H, it follows that
<
.
We now utilize assumption (1):
volA(cid:48) (A
(cid:48) ∩ B) :=
{x ∈ A
(cid:48) (a, x) ∈ E}
αd = αdA
(cid:48) ∩ B.
A
(cid:48) ∩ B < A
(cid:48) ∩ H.
(cid:88)
≥ (cid:88)
a∈A(cid:48)∩B
a∈A(cid:48)∩B
Similarly, we have
volA(cid:48) (A
(cid:48) ∩ H) ≥ αdA
(cid:48) ∩ H.
Inequalities 3 and 1 imply that
(cid:48) ∩ H) ≥ αdA
and together with Inequality 2, we have:
volA(cid:48) (A
(cid:48) ∩ B,
min{vol(A
(cid:48) ∩ B)} ≥ αdA
Now, Inequality 4 and assumption (6) imply that:
(cid:48) ∩ H), vol(A
(cid:48) ∩ B.
e(A(cid:48) ∩ H, A(cid:48) ∩ B)
αdA(cid:48) ∩ B
≥
>
e(A(cid:48) ∩ H, A(cid:48) ∩ B)
(cid:18) 1 − β
min{vol(A(cid:48) ∩ H), vol(A(cid:48) ∩ B)}
γ
α
(cid:19)
β
·
,
(1)
(2)
(3)
(4)
|
1609.05264 | 2 | 1609 | 2017-02-15T00:46:48 | Asynchronous and Dynamic Coverage Control Scheme for Persistent Surveillance Missions | [
"cs.MA",
"cs.RO",
"eess.SY"
] | A decomposition-based coverage control scheme is proposed for multi-agent, persistent surveillance missions operating in a communication-constrained, dynamic environment. The proposed approach decouples high-level task assignment from low-level motion planning in a modular framework. Coverage assignments and surveillance parameters are managed by a central base station, and transmitted to mobile agents via unplanned and asynchronous exchanges. Coverage updates promote load balancing, while maintaining geometric and temporal characteristics that allow effective pairing with generic path planners. Namely, the proposed scheme guarantees that (i) coverage regions are connected and collectively cover the environment, (ii) subregions may only go uncovered for bounded periods of time, (iii) collisions (or sensing overlaps) are inherently avoided, and (iv) under static event likelihoods, the collective coverage regions converge to a Pareto-optimal configuration. This management scheme is then paired with a generic path planner satisfying loose assumptions. The scheme is illustrated through simulated surveillance missions. | cs.MA | cs | Asynchronous and Dynamic Coverage Control
Scheme for Persistent Surveillance Missions
Jeffrey R. Peters, Sean J. Wang, Amit Surana, and Francesco Bullo
1
7
1
0
2
b
e
F
5
1
]
A
M
.
s
c
[
2
v
4
6
2
5
0
.
9
0
6
1
:
v
i
X
r
a
Abstract-A decomposition-based coverage control scheme is
proposed for multi-agent, persistent surveillance missions operat-
ing in a communication-constrained, dynamic environment. The
proposed approach decouples high-level task assignment from
low-level motion planning in a modular framework. Coverage as-
signments and surveillance parameters are managed by a central
base station, and transmitted to mobile agents via unplanned and
asynchronous exchanges. Coverage updates promote load balanc-
ing, while maintaining geometric and temporal characteristics
that allow effective pairing with generic path planners. Namely,
the proposed scheme guarantees that (i) coverage regions are
connected and collectively cover the environment, (ii) subregions
may only go uncovered for bounded periods of time, (iii) collisions
(or sensing overlaps) are inherently avoided, and (iv) under static
event likelihoods, the collective coverage regions converge to a
Pareto-optimal configuration. This management scheme is then
paired with a generic path planner satisfying loose assumptions.
The scheme is illustrated through simulated surveillance missions.
I. INTRODUCTION
A. Decomposition-Based Multi-Agent Surveillance
Modern exploratory and surveillance missions often utilize
autonomous vehicles or sensors to observe and monitor large
geographic areas. Example application domains include search
and rescue [14], environmental monitoring [32], warehouse
logistics [37], and military reconnaissance [7]. Such scenarios
require robust and flexible tools for autonomous coordination.
A number of planning strategies have been studied for single
agents, ranging from simple a priori tour construction [23]
to more complex methods involving Markov chains [34],
optimization [17], or Fourier analysis [16]. Unfortunately, it is
not straightforward to generalize single-agent strategies for use
in multi-agent missions: Naive approaches where each agent
follows an independent policy can result in poor performance
and introduce collision risks, while sophisticated generaliza-
tions often require joint optimizations that are intractable for
even modestly sized problems. Scaling issues are sometimes
This work has been sponsored by the U.S. Army Research Office and the
Regents of the University of California, through Contract Number W911NF-
09-D-0001 for the Institute for Collaborative Biotechnologies, and that the
content of the information does not necessarily reflect the position or the
policy of the Government or the Regents of the University of California, and
no official endorsement should be inferred.
Jeffrey R. Peters and Sean J. Wang are with the Mechanical Engineering
Department and the Center for Control, Dynamical Systems and Computa-
tion, University of California, Santa Barbara [email protected],
[email protected]
Amit Surana is with the Systems Department at United Technologies
Research Center, East Hartford, CT, [email protected]
Francesco Bullo is with the Mechanical Engineering Department and the
Center for Control, Dynamical Systems and Computation, University of
California, Santa Barbara [email protected]
Fig. 1. Difficulties arise when complete or pairwise updates are impossible.
With only single-region updates, two steps are required to move from the
left-most to the right-most configuration. In the top path, blue is updated first,
leaving an uncovered block at the intermediate step. In the bottom path, red
is updated first, leaving a block that belongs to both regions simultaneously.
alleviated through distributed control; however, such setups are
application specific and may require extensive efforts to pose
a mathematical problem that is suitable for use with formal
techniques [19]. In contrast, decomposition-based approaches,
which decouple the assignment and routing problem by first
dividing the workspace among agents, offer a straightforward,
modular framework to reasonably accomplish the desired
goals, despite sacrificing optimality in general.
the result
Communication constraints can, however, make it difficult
to effectively divide a dynamic workspace in real time, while
still ensuring that
is amenable for pairing with
single-agent motion planners. For example, many unmanned
missions require agents to transfer sensor data to a central
base station for analysis. With difficult terrain or hardware
limitations, these sporadic exchanges with the base station
may provide the only means of sharing real-time information
across agents. Applications that operate under this constraint
include underwater gliders that must surface to communicate
with a tower [28], data mules that periodically visit ground
robots [31], and supervisory missions where human operators
analyze data collected by unmanned vehicles [29]. Here,
updated mission information can only be relayed to one agent
at a time, rendering traditional dynamic partitioning schemes,
which rely on complete or pairwise coverage updates, impossi-
ble. As such, designers are forced to either allow for overlap in
coverage assignments, or sacrifice complete coverage (Fig. 1).
This work presents a decomposition-based surveillance
framework that operates under asynchronous one-to-base sta-
tion communication, a protocol in which data is transferred
solely via sporadic exchanges between a central base station
and autonomous agents [26]. The complete scheme consists
of two components: a dynamic partitioning component and
a single-agent routing component. The work herein focuses
primarily on developing the partitioning component, which,
in addition to dividing the workload among the agents, ma-
nipulates local variables in order to allow for effective pairing
with single-agent route planners. This development naturally
leads to a complete multi-agent framework in which high-level
coverage is coordinated by the base station, while individual
trajectories are generated independently via on-board planners.
B. Related Literature
Research relating to multi-agent coverage control is vast.
Typical strategies involve optimization [27], auctions [10],
biological meta-heuristics [4], potential fields [30], or space
decomposition [20]. Of particular relevance are multi-agent
persistent surveillance (persistent monitoring) problems, in
which a mobile sensor team is tasked with continual surveil-
lance of a region of interest, requiring each subregion to be
visited multiple (or infinitely many) times with the goal of
minimizing a cost, e.g., the time between visits or the likeli-
hood of detecting stochastic events [19]. Persistent surveillance
is a generalization of patrolling, where closed tours are sought
for the purpose of protecting or supervising an environment.
Patrolling has been studied extensively, with most current
solutions being based on operations research algorithms, non-
learning multi-agent systems, and multi-agent learning [1]. Pa-
trolling formulations are often one-dimensional and solutions
usually reduce to "back and forth" motions that do not readily
extend to general scenarios (see, e.g. [24]).
The framework proposed herein is based on workspace
decomposition, and uses an allocation strategy to reduce the
multi-agent problem into a set of single-agent problems.
This approach is common in multi-agent systems due to its
simplicity and scalability [19]. For persistent surveillance of
planar regions, decomposition-based approaches consist of two
primary components: partitioning and single-agent routing.
The most common approaches to optimal partitioning are
based on Voronoi partitions [21]. Effective schemes exist for
constructing centroidal Voronoi, equitable, or other types of
optimal partitions under various communication, sensing, and
workload constraints [5], [6], [25]. These strategies usually re-
quire convex environments. More general workspaces are usu-
ally addressed by discretizing the environment and considering
the resulting graph, on which any number of graph partitioning
schemes can be used [9]. In robotic contexts, the discrete
partitioning problem is often considered under communication
constraints, e.g., pairwise gossip [8] or asynchronous one-to-
base station communication [26]. The proposed partitioning
scheme most closely mirrors [26]; however, our approach em-
ploys additional logic to ensure the resultant coverage regions
are amenable for use in decomposition-based surveillance.
for persistent
Single-agent path planners
surveillance
most commonly operate over discrete environments,
i.e.,
graphs [13], [35], and solutions to classical problems, e.g., the
Traveling Salesperson Problem [11], may suffice. Stochasticity
can be introduced using tools such as Markov chains [34].
Persistent surveillance strategies for non-discrete regions (in
particular, open subsets of Euclidean space), are less common.
Here, strategies include the a priori construction of motion
routines [22], the adaptation of static coverage strategies [33],
the use of random fields [12], and spectral decomposition [16].
The modular framework herein does not require any particular
2
single-agent route planner, but rather can incorporate any
planner satisfying a mild assumption set (see Section V).
Despite the vast research on both topics individually, re-
markably few papers explicitly consider the implications of
combining geometric partitioning with continuous routing in
the context of multi-agent persistent surveillance. Research
that does exist is mostly preliminary, considering ideal com-
munication and employing simplistic methods. For example,
the authors of [2] employ a sweeping algorithm for partitioning
and guide vehicle motion via lawn-mower pattens. The authors
of [20] use rectangular partitions, while employing a reactive
routing policy which, in ideal cases, reduces to spiral search
patterns. The work in [18] uses slightly more sophisticated par-
titioning in tandem with lawn-mower motion trajectories. Also
relevant is [36], where partitions are based on the statistical
expectation of target presence; however, ideal communication
is assumed. Other works, e.g. [3], employ decomposition-
based structures, but focus on task-assignment with no detailed
treatment of the combined assignment/routing protocol.
C. Contributions
This work presents a decomposition-based, multi-agent cov-
erage control framework for persistent surveillance, which
requires only sporadic, unscheduled exchanges between agents
and a central base station. In particular, we focus on develop-
ing a sophisticated partitioning and coordination scheme that
is designed for pairing with generic single-agent trajectory
planners within a modular framework. Our setup encompasses
realistic constraints including restrictive communication, dy-
namic environments, and non-parametric event likelihoods.
Specifically, we develop a dynamic partitioning scheme
that assumes only asynchronous, one-to-base station commu-
nication. This algorithm governs region assignments, while
also introducing timing variables and manipulating the agents'
high-level surveillance parameters. We prove that our parti-
tioning strategy has properties that make it amenable for use
in a decomposition-based surveillance scheme: the produced
coverage regions collectively form a connected m-covering,
local likelihood functions have disjoint support, no subregion
remains uncovered indefinitely, coverage regions evolve at a
time-scale that allows for appropriate agent reactions, among
others. For static likelihoods under mild assumptions, we show
that the set of coverage regions and associated generators
converges to a Pareto optimal partition in finite time. We
combine our partitioning scheme with a generic single-agent
trajectory, and show that this combination guarantees collision
avoidance (no sensing overlap) when the trajectory planner
obeys natural restrictions. We illustrate our framework through
numerical examples.
For clarity and readability in what follows, we postpone all
Theorem proofs until the Appendix.
II. MISSION OBJECTIVES AND SOLUTION APPROACH
A team of m mobile agents, each equipped with an on-
board sensor,
is tasked with endlessly monitoring a non-
trivial, planar, large region of interest. The primary goal of
the mission is to collect sensor data about some key dynamic
3
load among the agents. During the exchange, the base station
also updates timing variables and governs the local likelihood
functions maintained by each agent so that, if no agent were
ever located outside of the support of its local likelihood at
any time, then the agents (sensors) would never be colocated.
Timing considerations also guarantee that 1) no region remains
uncovered, i.e., outside of the allowable area to which the
agents can travel, for an unbounded amount of time, and 2)
ample time is allotted for agents to vacate regions that are re-
assigned before the newly assigned agent takes over. Once the
update is complete, the link with the base is terminated and
the agent follows the trajectory found via its onboard planner.
III. PROBLEM SETUP
The base station, as well as each agent, has its own local
processor. "Global" information is stored by the base station,
while each agent only stores information pertinent to itself.
Convention 1. The subscripts i, j, or (cid:96) denote an entity
relevant to agent i, j, or (cid:96), resp. When attached to a set, the
subscripts i, j, (cid:96) indicate the component relevant to agent i, j
or (cid:96), resp. The superscript 'A' indicates an entity that is stored
on the agent's local processor.
A summary of the variables stored by relevant entities is
shown in Table I. We expand on these, and define other
relevant mathematical constructs here.
A. Agent Dynamics
Each agent (sensor) i is modeled as a point mass that moves
with maximum possible speed si > 0. Define s := {si}m
i=1.
B. Communication Protocol
There is a central base station with which the agents
communicate. We assume the following:
1) each agent can identify itself to the base station and
transmit sensor data,
2) there is a lower bound ∆ > 0 on the time between any
two successive exchanges involving the base station, and
3) there is an upper bound ∆ > 0 on the time between any
single agent's successive exchanges with the base.
Note that 2) implies that no two agents can communicate with
the base station simultaneously1. These communication spec-
ifications collectively define the one-to-base station protocol.
C. Surveillance Region
Consider the surveillance region as a finite grid of disjoint,
non-empty, simply-connected subregions. We represent
the
environment as a weighted graph G(Q) := (Q,E), where Q
is the set of vertices (each representative of a unique grid
element), and E is the edge set comprised of undirected,
weighted edges {k1, k2} spanning vertices representing adja-
cent regions2. The weight assigned to {k1, k2} is the distance
loss
between the appropriate regions. We assume without
1This constraint also prevents zeno behavior in the communication times
2Travel between the regions without entering other subregions is possible
Fig. 2. An example illustrating the proposed strategy. The dynamic partition-
ing component (executed by the base station) manages coverage regions and
introduces logic to prevent collisions, while the routing component (executed
onboard each agent) governs agent motion.
event or characteristic, e.g., an intruder. Data collected by
the agents is periodically relayed to a central base station
for analysis. Agents must move within the region to obtain
complete sensory information. Ideally, the agent motion/data
collection strategy should be coordinated so that:
1) the workload is balanced across agents,
2) no subregion goes unobserved indefinitely,
3) agents never collide (have sensor overlap), and
4) the search is biased toward regions of greater interest.
To achieve these goals, we adopt a decomposition-based
approach in which each agent's motion is restricted to lie
within a dynamically assigned coverage region.
The analysis herein focuses primarily on developing an
algorithmic framework for partitioning that defines, maintains,
and updates the agents' coverage assignments in a manner that
can be effectively paired with a typical single-agent route plan-
ner. More specifically, we seek a scheme to assign coverage
responsibilities, as well as provide high-level restrictions on
agent motion, so that lower-level, on-board trajectory planners
can operate independently within the proposed boundaries
to achieve global surveillance goals. In addition, we seek
algorithms that do not require peer-to-peer communication or
require the agents to be in constant contact with the base
station. As such, we assume only asynchronous, one-to-base
station communication (data transfer) [26], i.e., agents are
only assumed to sporadically communicate with a central base
station, subject to an upper bound on inter-communication
times, which are not specified a priori.
Broadly, our proposed solution operates as follows (see
Fig. 2). During each exchange with an agent,
the base-
station calculates the new coverage region solely for the
communicating agent, and transmits the update. Updates are
performed so as to guarantee connected coverage regions,
and, in the limit for static likelihoods, distribute the coverage
•Communication link is established•Sensor data sent to base station.•Base station calculates update•Agent receives updated region/variables•Agents follow continuous time surveillance within assigned regions.•Once waiting period is up, agents can enter any part of their assigned region•Agent waits a pre-specified time to enter newly assigned regions•During waiting period, other agent communicates with base, vacates region it no-longer owns. of generality that Q ⊂ N. Environmental information, e.g.,
terrain, is largely unknown at the mission onset; however, the
location of obstacles and prohibited areas, is known a priori
and is not included in the graphical representation G(Q).
Consider Q(cid:48) ⊆ Q. A vertex k1 ∈ Q is adjacent to Q(cid:48)
if k1 /∈ Q(cid:48) and there exists {k1, k2} ∈ E with k2 ∈ Q(cid:48).
Define G(Q(cid:48)) := (Q(cid:48),E(cid:48)), where E(cid:48) := {{k1, k2} ∈ Ek1, k2 ∈
Q(cid:48)}. A path on G(Q(cid:48)) between k1, kn ∈ Q(cid:48) is a sequence
(k1, k2, . . . , kn), where k1, k2, . . . , kn ∈ Q(cid:48) and {kr, kr+1} ∈
E(cid:48) for r ∈ {1, . . . , n − 1}. We say Q(cid:48) is connected if a path
exists in G(Q(cid:48)) between any k1, k2 ∈ Q(cid:48). Let dQ(cid:48) : Q(cid:48)×Q(cid:48) →
R≥0∪{∞} be the standard distance on G(Q(cid:48)), i.e., the length
of a shortest weighted path in G(Q(cid:48)) (if none exists, dQ(cid:48) takes
value ∞). Notice dQ(cid:48)(k1, k2) ≤ dQ(k1, k2) for any k1, k2 ∈
Q(cid:48). Also let dQ(cid:48) denote the map dQ(cid:48) : Q(cid:48)×2Q(cid:48) → R≥0∪{∞},
where dQ(cid:48)(k, Q(cid:48)(cid:48)) is the length of a shortest weighted path in
G(Q(cid:48)) between k and any vertex in Q(cid:48)(cid:48).
D. Coverage Regions
ing 1)(cid:83)m
(cid:84) Pj = ∅, if
An m-covering of Q is a family P = {Pi ⊆ Q}m
i=1 satisfy-
i=1 Pi = Q, and 2) Pi (cid:54)= ∅ for all i. Define Covm(Q)
as the set of all possible m-coverings of Q. An m-partition
of Q is an m-covering that also satisfies 3) Pi
i (cid:54)= j. An m-covering or m-partition P is connected if each
Pi is connected. In what follows, the base station maintains
an m-covering P of Q, and surveillance responsibilities are
assigned by pairing each agent i with Pi ∈ P (called agent
i's coverage region). Each agent maintains a copy P A
i of Pi.
The base station also stores a set c := {ci ∈ Q}m
i=1 (ci is the
generator of Pi), and each agent i maintains a copy cA
i of ci.
E. Identifiers, Timers, and Auxiliary Variables
i
i
}m
i=1, where P ID
k=1, and let P ID := {P ID
The proposed algorithms introduce logic and timing con-
siderations to ensure an effective overall framework. To each
k ∈ Q, assign an identifier IDk ∈ {1, . . . , m}. Define
ID := {IDk}Q
:=
{k ∈ Q IDk = i}. Notice P ID is an m-partition of Q. For
each agent i, define a timer Ti having dynamics Ti = −1
(cid:54)= 0, and Ti = 0 otherwise. The set T := {Ti}m
if Ti
i=1
is maintained by the base station. Similarly, each agent i
maintains a local timing variable τ A
i plays
is constant unless
a similar role to the timer Ti, note that τ A
i
explicitly changed by the algorithm, while Ti has autonomous
dynamics. Next, the base station maintains a set ω := {ωi}m
i=1,
where ωi is the time of agent i's last exchange with the base
i of ωi. Finally, each
station. Each agent maintains a copy ωA
⊆ P A
agent stores locally a subset P A,pd
i which, loosely,
collects vertices that have recently been added to P A
i .
i . Even though τ A
i
F. Likelihood Functions
A real-time estimate of the likelihood of events of interest
occurring within any subset of the surveillance region is
maintained by the base station in the form of a time-varying
probability mass function3 Φ : Q × R≥0 → R≥0. Since it is
3For any t, we have(cid:80)
k∈Q Φ(k, t) = 1
TABLE I
STORAGE SUMMARY
Stored by Base Station
Variable
G(Q)
P
c
ID
T
ω
Φ
Variable
G(Q)
P A
i
cA
i
P A,pd
i
τ A
i
ωA
i
ΦA
i
(cid:17)
(cid:17)
(cid:16)
T (t) ∈ Rm≥0
Description
Graphical representation of the environment
m-covering of Q (P ∈ Covm(Q))
Set of generators (c ∈ Qm)
Set of identifiers
Set of Timers
Set of most recent communication times
(cid:16)ID ∈ {1, . . . , m}Q(cid:17)
(cid:16)
(cid:1)
ω ∈ Rm≥0
Description
Graphical representation of the environment
Global likelihood function(cid:0)Φ : Q × R≥0 → R≥0
Coverage region(cid:0)P A
i ⊂ Q(cid:1)
i ∈ Q(cid:1)
Coverage region generator(cid:0)cA
(cid:17)
(cid:16)
i ∈ R(cid:1)
Local timing parameter(cid:0)τ A
Agent i's most recent communication time(cid:0)ωA
(cid:1)
Local likelihood function(cid:0)ΦA
i ∈ R≥0
Set of "recently added" vertices
: Q × R≥0 → R≥0
Stored by Agent i
⊆ P A
P A,pd
i
i
i
4
(cid:1)
difficult to precisely define load-balancing requirements over
arbitrarily time-varying environments, our analysis focuses on
achieving optimal performance in the case of a static environ-
ment, i.e., when Φ is time-invariant. We then show through
simulation that our proposed strategy still can be effectively
employed in the case of a quasi-static environment, i.e., when
Φ(k,·) is piecewise constant for any k. This situation arises in
many common scenarios, e.g., when estimates of Φ are only
updated during exchanges between the base station and the
mobile agents, which occur at discrete time-points.
: Q × R≥0 → R≥0
as the function that, loosely, represents the agent's local belief
regarding events of interest occurring in Q. The partitioning
algorithm will manipulate the support of each ΦA
to ensure
i
effective surveillance while also inherently preventing agent
collisions (sensor redundancy). Specifically, define
Define each agent's local likelihood ΦA
i
(cid:16)
if k ∈ P A
i ≥ τ A
i or k /∈ P A,pd
i
i and
t − ωA
(cid:17)
,
(1)
Φ(k, t),
ΦA
i (k, t) =
0,
otherwise.
i will be different4 from Φ.
In general, each function ΦA
Remark 1 (Global Data). If global knowledge of Φ is not
i can alternatively be
available instantaneously to agent i, ΦA
defined by replacing Φ(k, t) in (1) by Φ(k, ωA
i ). All subsequent
theorems hold under this alternative definition.
Remark 2 (Data Storage). The cost of storing a graph as
an adjacency list is O(Q + E). The generator set c, each
element of P , and the identifier set ID are stored as a integral
4Note that ΦA
i need not be normalized and thus may not be a time-varying
probability mass function in a strict sense
vectors. The timer set T and the set ω are are stored as real
vectors. Typically, only the values of Φ at vertices in Q are
needed, so Φ is stored as a time-varying real vector. Thus, the
cost of storage at the base station is O(mQ +E). Similarly,
each agent's local storage cost is O(Q + E).
IV. DYNAMIC COVERAGE UPDATE SCHEME
We adopt following convention for the remaining analysis.
Convention 2. Suppose that:
1) min∅ := max∅ := 0, and
2) when referring to a specific time instant, e.g., the instant
when an update is executed, the notation e+ and e−
refers to the value of the entity e immediately before
and after the instant in question, resp.
A. Additive Subset
We start with a definition.
i
, the additive
(k) ⊆ Q is the largest connected subset satisfying:
(cid:106) P add
Definition 1 (Additive Subset). Given k ∈ P ID
subset P add
1) P ID
2) for any h ∈ P add
a) Tj = 0, and
b)
(k) ∩ Pj, where j (cid:54)= i:
(k), and
dPj (h, cj).
i (k)(h, k) < 1
dP add
1
si
sj
i
i
i
i
The following characterizes well-posedness of Definition 1.
is connected and
(k) exists and is unique for
i
disjoint from (cid:83)
i
i
.
j(cid:54)=i Pj, then P add
Proposition 1 (Well-Posedness). If P ID
any k ∈ P ID
Proof. With the specified conditions, P ID
satisfies conditions 1-3 in Definition 1. Thus, P add
unique, maximally connected superset of P ID
same conditions.
i
i
is connected and
(k) is the
i
satisfying the
Under the conditions of Proposition 1, if h ∈ P add
(k), then
max{Tjj (cid:54)= i, h ∈ Pj} = 0 and there is a path from k to h
in G(P add
(k)) that is shorter than the optimal path spanning
cj and h within G(Pj), for any j (cid:54)= i with h ∈ Pj. Also note
that, by definition, additive subsets are connected.
i
i
B. Primary Update Algorithm
Define H : Qm × Covm(Q) × R≥0 → R≥0 ∪ {∞} by
H(c, P, t) =
dPi(k, ci)k ∈ Pi
(cid:88)
min
Φ(k, t),
(cid:27)
(cid:26) 1
si
k∈Q
where Φ is the global likelihood. If (i) each agent is solely
responsible for events within its own coverage region and (ii)
events occur proportionally to Φ, then H(c, P, t) is understood
as the expected time required for an appropriate agent to reach
a randomly occurring event from its region generator at time
t. Algorithm 1 defines the operations performed by the base
station when agent i communicates at time t0. Here, the input
∆H > 0 is a constant mission-specific parameter.
Consider the following initialization assumptions.
5
Algorithm 1: Timed One-To-Base Station Update
Data: t0, P , c, Φ, ω, ∆, ∆H, T , ID, s
Result: P , c, P A
i , ΦA
begin
i , P A,pd
i , ω, ωA
, T , τ A
i , cA
i
i , ID
i
i = P test
i = P ID
Initialize P ∗ = P test = P , c∗ = ctest = c
Set P ∗
if Ti > 0 and P ∗
Set τ A
i = τ A
for k ∈ P ID
i
Set P test
if H(ctest, P test, t) < H(c∗, P ∗, t) then
i = Pi then
i − t0 + ωi and ωA
i = P add
(k) and ctest
Set P ∗ = P test, c∗ = ctest
i = ωi = t0
i = k
else
do
i
i
i \P ID
Set P A,pd
Call Alg. 2 and obtain output ΦA
i = c∗
Set Pi = P A
i , ci = cA
for k ∈ Pi do Set IDk = i
= P ∗
i = P ∗
i
i , ω, T, τ A
i
i , ωA
i = ωi
return P , c, P A
i , cA
i , P A,pd
i
, T , τ A
i , ΦA
i , ω, ωA
i , ID
, Φ, ω, ∆, ∆H, T , s
(cid:111)
Algorithm 2: Timer Update
Data: t0, P , P ∗, c∗, P A,pd
Result: ΦA
begin
i , ω, T, τ A
i
i
(cid:110) 1
si
:= max
dPi(k, P ∗
i \P A,pd
∆Bf
i
for Each j (cid:54)= i satisfying Pj ∩ P ∗
dPj (k, Pj\P ∗
(cid:110) 1
∆Bf
j
Set Tj = ωj + ∆ − t0
:= max
sj
i
i
)k ∈ Pi\P ∗
(cid:54)= ∅ do
i )k ∈ Pj ∩ P ∗
i
i
(cid:111)
j − t0}
{ωj + ∆ + ∆Bf
i }
max, ∆Bf
i = ∆Bf
max, ωi = t0
max
j(cid:54)=i,Pj∩P ∗
i (cid:54)=∅
max = max{∆Bf
max + ∆H, τ A
i , according to (1) with updated variables
Find ∆Bf
max =
Redefine ∆Bf
Set Ti = ∆Bf
Construct ΦA
return ΦA
i , ω, T, τ A
i
1
2
3
4
5
6
7
8
9
10
1
2
3
4
5
6
7
8
Assumption 1 (Initialization). The following properties are
satisfied when t = 0:
1) P is a connected m-partition of Q,
2) P = P A = P ID, and
3) for all i ∈ {1, . . . , m},
i ∈ P A
i ,
= ∅,
i
a) ci = cA
b) P A,pd
c) Ti = ωi = ωA
d) τ A
e) ΦA
i = 0,
i = −∆H, and
i (·, 0) is defined according to Eq. 1.
Notice 1) and 3a) together imply that ci (cid:54)= cj for any j (cid:54)= i.
Our first result guarantees that the use of Algorithm 1 for
coverage region updates is well-posed.
Theorem 1 (Well-Posedness). Under Assumption 1, an update
scheme in which, upon each exchange, the base station and
the communicating agent update their respective variables via
Algorithm 1 is well-posed. That is, the operations required by
Algorithm 1 are well-posed at the time of execution.
i }m
Performing of updates with Algorithm 1 does not guarantee
that individual coverage regions (elements of P ), are disjoint
from one another. It does, however, guarantee that the m-
i }m
covering P , the local coverage region set P A := {P A
i=1,
and the local likelihoods {ΦA
i=1 retain properties that are
consistent with the goals of the decomposition-based coverage
framework. Namely, the coverings P and P A maintain connec-
tivity, and each function ΦA
i has support that is disjoint from
that of all other local likelihoods, yet still evolves to provide
reasonable global coverage. The manipulations in Algorithm 2
also ensure that agents are able to "safely" vacate areas that
are re-assigned before newly assigned agents enter. We detail
these and other properties for the remainder of this section.
C. Set Properties
The next result formalizes key set properties.
Theorem 2 (Set Properties). Suppose Assumption 1 holds,
and that, upon each exchange,
the base station and the
communicating agent update their respective variables via
Algorithm 1. Then, the following5 hold at any time t ≥ 0:
1) P ID is a connected m-partition of Q,
2) P is a connected m-covering of Q,
3) ci ∈ Pi and ci (cid:54)= cj for any i (cid:54)= j,
i (·, t)) ⊆ Pi for any i, and
4) supp(ΦA
i=1 supp(ΦA
i (·, t)) = ∅
5) (cid:84)m
Whenever additions are made to an agent's coverage region
during a call to Algorithm 1, the newly added vertices are
not immediately included in the instantaneous support6 of the
agent's local likelihood. As such, if each agent's movement is
restricted to lie within the aforementioned instantaneous sup-
port, then exploration of newly added regions is temporarily
prohibited following an update. This delay allows other agents
to vacate before the newly assigned agent enters. Conversely,
when regions are removed from an agent's coverage region,
Algorithm 1 guarantees a "safe" path, i.e., a path with no
collision risk, exists and persists long enough for the agent to
vacate. Let d := maxi
the prohibited region of agent i at time t, Prohi(t), as the
subset consisting of any newly added vertices that do not yet
i (·, t)), i.e., Prohi(t) := {k ∈ P A
i , t−ωA
belong to supp(ΦA
i <
}, we formalize this discussion as follows.
i and k ∈ P A,pd
τ A
Theorem 3 (Coverage Quality). Suppose Assumption 1 holds,
and that, upon each exchange,
the base station and the
communicating agent updates their respective variables via
Algorithm 1. Then, for any k ∈ Q and any t ≥ 0:
(cid:80){k1,k2}∈E dQ(k1, k2), and define
1
si
i
1) k belongs to at least one agent's coverage region Pi,
2) if k ∈ Prohi(t) for some i, then there exists t0 satisfying
t < t0 < t + ∆ + d such that, for all ¯t ∈ [t0, t0 + ∆H],
the vertex k belongs to the set Pi\Prohi(¯t), and
5supp(f ) denotes the support of a function f.
6The instantaneous support of ΦA
i at time t is defined as supp(ΦA
i (·, t)).
(cid:18)
¯t ∈
t, t +
(cid:16)
1
si
dP
−
i
k, P
ID,−
i
6
(cid:17)(cid:21)
,
3) if k is removed from Pi at time t, then, for all
ID,−
i
we have
a) P
b) there exists a length-minimizing path on G(P −
i )
from k into P
, and all of the vertices along
any such path (except the terminal vertex) belong
to the set ProhID+
⊆ Pi, and
ID,−
i
(¯t)\(cid:83)
j(cid:54)=ID+
k
Pj.
k
Theorems 2 and 3 allow Algorithm 1 to operate within a
decomposition-based framework to provide reasonable cover-
age with inherent collision avoidance. Indeed, when each agent
moves within its coverage region and avoids its prohibited
region, the theorems imply that each agent 1) can visit its
entire coverage region (connectedness), 2) allows adequate
time for other agents to vacate newly assigned regions before
entering, and 3) has a "safe" route into the remaining coverage
region if its current location is removed during an update.
Remark 3 (Local Variables). Theorems 2 and 3 also hold if
we replace P with P A and c with cA in the theorem statement.
Remark 4 (Bounds). Theorem 3 also holds when d is re-
defined as any other upper bound on the subgraph distance
between two arbitrarily chosen vertices of an arbitrarily
chosen connected subgraph of G.
D. Convergence Properties
Our proposed strategy differs from that of [26] mainly due
to the presence of logic (e.g., timer manipulations) to ensure
effective pairing with single-agent trajectory planners. Note
also that H differs from typical partitioning costs, since it
uses subgraph, rather than global graph, distances. As such,
convergence properties of the algorithms herein do not follow
readily from existing results. Consider the following definition.
Definition 2 (Pareto Optimality). The pair (c, P ) is Pareto
optimal at time t if (i) H(c, P, t) ≤ H(¯c, P, t) for any ¯c ∈ Qm,
and (ii) H(c, P, t) ≤ H(c, ¯P , t) for any ¯P ∈ Covm(Q).
The following result characterizes the dynamic evolution of
coverage regions with respect to Pareto optimality.
Theorem 4 (Convergence). Suppose Assumption 1 holds
and that, upon each exchange,
the base station and the
communicating agent updates their respective variables via
Algorithm 1. If Φ is static, i.e., Φ(·, t1) = Φ(·, t2) for all t1, t2,
then the m-covering P and the generators c converge in finite
time to an m-partition P ∗ of Q and a set c∗, resp. The pair
(c∗, P ∗) is Pareto optimal at any time following convergence.
Whenever the event likelihood is static (and Assumption 1
holds), Algorithm 1 causes coverage regions and generators to
collectively converge in finite time to a Pareto optimal config-
uration. That is, the agent's limiting coverage assignments are
"optimal" in that they balance the coverage load in a manner
that directly considers the likelihood Φ. Further, the entire
operation only relies on sporadic and unplanned information
exchange between agents and the base station.
Remark 5 (Voronoi Partitions). It can be shown that Pareto
optimality of (c∗, P ∗) in Theorem 4 implies that, following
convergence, P ∗ is a multiplicatively weighted Voronoi parti-
tion (generated by c∗, weighted by s, subject to density Φ(·, t))
by standard definitions (e.g., [26]). If the centroid set of each
dPi(k, h)Φ(k, t), then P ∗
Pi is defined as arg minh∈Pi
is also centroidal.
(cid:80)
k∈Pi
V. DECOMPOSITION-BASED SURVEILLANCE.
This section pairs the proposed partitioning framework
with a generic, single-vehicle trajectory planner, forming the
complete, decomposition-based coverage control framework.
A. Complete Routing Algorithm
lies entirely within the coverage region P A
Theorems 2 and 3 provide a number of useful insights when
using the dynamic partitioning updates of the previous section.
Namely, Theorem 2 ensures that (i) the instantaneous support
of each ΦA
i , and
i
(ii) the support of two distinct agents' local likelihoods do not
intersect. Theorem 3 states that (i) length of any interval on
which a given vertex is uncovered, i.e., belongs solely to agent
prohibited regions, cannot exceed a finite upper bound, and (ii)
the parameter ∆H is a lower bound on the length of time that
a recently uncovered vertex must remain covered before it can
become uncovered again. Since G(Q) is a discrete represen-
tation of the surveillance region, these facts together suggest
that an intelligent routing scheme that carefully restricts agent
motion according to the instantaneous support of the local
likelihood functions could achieve adequate coverage while
also accomplishing the ancillary goal of collision avoidance.
This motivates the following assumption.
Assumption 2 (Agent Motion). Each agent i has knowledge of
its position at any time t, and its on-board trajectory planner
operates under the following guidelines:
1) generated trajectories obey agent motion constraints,
2) trajectories are constructed incrementally and can be
altered in real-time, and
3) the agent is never directed to leave regions associated
with Pi or enter regions associated with Prohi(t).
Each agent precisely traverses generated trajectories.
Algorithm 3 presents the local protocol for Agent i.
B. Collision Avoidance
Although Assumption 2 locally prevents agents from leav-
ing assigned coverage regions or entering prohibited regions,
dynamic coverage updates can still result in undesirable agent
configurations. Indeed, an agent can be placed outside of
its own coverage region if the vertex corresponding to its
location is abruptly removed during an update. If this happens,
Algorithm 3 constructs a route from the agent's location back
into a region where there is no collision risk. With mild
assumptions, Theorem 3 guarantees that this construction 1) is
7
Algorithm 3: Motion Protocol for Agent i
Data: G(Q), ΦA
i , ωA
i
begin
i , P A,pd
i , P A
i , cA
, τ A
i
while True do
1
2
3
4
5
6
Increment trajectory via on-board planner
Follow trajectory
if Communication with the base station then
i = P A
i
Set P test
Obtain updated variables from base station
if Location lies within the set P A
i \P test
i
then
)
Find a minimum-length path in G(P test
from the currently occupied node into
P A
i
while Agent i is outside P A
i do
i
Follow the aforementioned route
well-defined, and 2) does not present the agent with a transient
collision risk. We formalize this result here.
Theorem 5 (Collision Avoidance). Suppose Assumptions 1
and 2 hold, and that each agent's initial position lies within its
initial coverage region Pi. Suppose further that each agent's
motion is locally governed according to Algorithm 3, where
the update in line 4 is calculated by the base station via
Algorithm 1. If the weight assigned to each edge in G(Q)
is an upper bound on the distance between the associated
regions, then no two agents will ever collide.
By running the schemes of Section IV in conjunction with
a motion planning scheme obeying Assumption 2, we obtain
a complete strategy that 1) only requires weak communication
assumptions, 2) provides dynamic load-balancing, and 3) has
inherent collision avoidance/efficiency properties.
VI. NUMERICAL EXAMPLES
This section presents numerical examples to illustrate the
functionality of the decomposition-based routing scheme. In
all examples, high-level coverage assignment updates are
performed by the base station via Algorithm 1 during each
exchange with an agent, while each agent's local processor
runs the motion protocol in Algorithm 3. For incremental
trajectory construction (Algorithm 3, line 1), we implement a
modified version of the Spectral Multiscale Coverage (SMC)
scheme in [15], which creates agent trajectories that mimic
ergodic dynamics while also locally constraining agent motion
to lie within the appropriate sets. This planner satisfies As-
sumption 2. Initial region generators were selected randomly
(enforcing the non-coincidence constraint), and each agent was
initially placed at its region generator. The initial covering P
was created from these generators by calculating a weighted
Voronoi partition. The remaining parameters were chosen
according to Assumption 1. During the simulation, randomly
chosen agents (chosen via random number generator) sporad-
ically communicated with the base station to receive coverage
8
assignment updates. Communication times were randomly
chosen, subject to a maximum inter-communication time ∆.
A. Static Likelihood
The first example is a 4 agent mission, which is executed
to a static,
over a 100 x 100 surveillance region subject
Gaussian likelihood centered at the bottom left corner. For
discretization, the region is divided into 400, 5 x 5 subregions,
and regions are considered adjacent if they share a horizontal
or vertical edge. Each agent has a maximum speed of 1 unit
distance per unit time, and the maximum inter-communication
time is ∆ = 10 time units. Figure 3 shows the evolution of
the coverage regions at various time points for an example
simulation run. Note that Figure 3 only shows each agent i's
active coverage region, i.e., the subset of Pi that does not
intersect its prohibited region Prohi(t). The family of active
coverage regions does not generally form an m-covering of
Q; however, elements of this family are connected and never
intersect as a result of inherent collision avoidance properties.
Figure 4 shows the mean values of the cost function H as
a function of time, calculated over the same 50 simulations
runs. Here, error bars represent
the range of cost values
achieved at select time points. The variance between runs
is due to the stochastic nature of the data-exchange patterns
between the agents and the base station. Notice that
the
cost
is a non-increasing function of time, as predicted in
the proof of Theorem 4, eventually settling as the coverage
regions/generators reach their limiting configuration, e.g., see
Figure 3. These configurations are guaranteed to be Pareto
optimal and, by Remark 5, to form a multiplicatively weighted
Voronoi partition. Since vehicles are assumed to have identical
maximum speeds, we see from the limiting configuration in
Figure 3 that the resultant coverage assignments provide load-
balancing that takes into account the event likelihood. If the
low-level trajectory planner biases trajectories according to the
event likelihood, this results in desirable coverage properties.
Under the modified SMC planner used here, the temporal
distribution of agent locations closely resembles the spatial
likelihood distribution in the limit, as shown in Figure 5.
Fig. 3. Snapshots of a 4 agent surveillance mission, assuming a static
Gaussian likelihood. Each agent's position, past trajectory, and active coverage
region are indicated by the colored triangle, line, and squares, resp..
The left plot in Figure 4 depicts the maximum amount
of time that any individual subregion went uncovered, i.e.
the subregion did not belong to any agent's active covering
Pi\Prohi(t), during each of 50 simulation runs. Here, the
Fig. 4. The maximum amount of time that any subregion went uncovered in
each of 50 simulation runs (left), and the value of the cost H as a function
of time, averaged over the same 50 runs (right).
maximum amount of time that any region went uncovered
was 186 units, though most trials had maximums of less than
75 units. This is well-below the loose bound ∆ + d = 770
predicted by Theorem 3 (see Remark 4). The right plot in
Fig. 5. Comparison between the (static) event likelihood Φ (left), and the
proportion of time that some agent occupied each subregion after significant
time has passed (10000 units) (right).
Further, during the simulation, no two agents ever occupied
the same space due to the careful parameter manipulations em-
ployed by Algorithm 1. Figure 6 illustrates the logic governing
these manipulations through a simplistic example. During the
Fig. 6. Simplified example illustrating how Algorithm 1 manipulates timing
parameters to prevent agent collisions.
first update, the blue agent acquires some of the red agent's
coverage region. Rather than immediately adding these regions
to its active covering, the blue region waits until sufficient
time has passed to guarantee that the red agent has updated
and moved out of the reassigned regions. Under Algorithm 3,
once the red agent communicates with the base, it immediately
vacates the re-assigned regions, after which the blue agent can
add the region to its active covering. This procedure guarantees
that no two agents will never have overlapping active coverings
and thus never collide (Theorem 5). This same logic is results
in inherent collision prevention over more complex scenarios.
B. Quasi-static Likelihood
We now illustrate how the proposed coverage framework
reacts to abrupt changes in the underlying likelihood, i.e.,
t = 0t = 50t = 150t = 250t = 350t = 10000501001502000510152025TimeFrequency01002003004002025303540455055Number of UpdatesCostBlue communicates with baseRed communicates, vacates regionBlue adds new regionswhen the likelihood is quasi-static. This type of scenario is
common in realistic missions, e.g., when the base-station's
estimate of the underlying likelihood is only re-formulated
if some agent's sensor data indicates a drastic change in the
underlying landscape. For this purpose, we adopt identical
parameters as in the first example, with the exception of the
likelihood Φ, whose spatial distribution abruptly switches at
select time-points. If the switches are sufficiently spaced in
comparison to the rate of convergence,
then the coverage
regions dynamically adjust to an optimal configuration that
is reflective of the current state. For example, Figure 8 shows
the coverage region evolution after the underlying likelihood
undergoes a single switch from the initial to the final density
shown in Figure 7 at time t = 2000.
In contrast, when
Fig. 7. The initial and final likelihood Φ(·, t).
Fig. 8. Coverage regions after the likelihood switches (see Fig. 7)
the underlying likelihood changes faster than the rate of
convergence, coverage regions are constantly in a transient
state. Despite this, the proposed framework still results in
some degree of load-balancing. To illustrate, Figure 9 shows
the value of the cost H during a simulation in which the
underlying likelihood switches at 12 randomly chosen time-
points over a 1000 unit horizon. Each switch re-defined the
spatial
likelihood as a Gaussian distribution centered at a
randomly selected location. Notice that the value of the cost
function monotonically decreases between the abrupt spikes
caused by changes in the underlying likelihood. Despite the
fact that convergence is not reached, coverage regions quickly
shift away from high-cost configurations, as indicated by the
sharp decreases in the cost shortly following each switch.
Fig. 9. Evolution of the cost H using a quasi-static likelihood with 12 random
switches (switch times are indicated by the stars).
9
VII. CONCLUSION
This work presents a modular, decomposition-based, cover-
age control framework for communication-constrained multi-
agent surveillance missions. In particular, our approach uses a
dynamic partitioning strategy to balance the surveillance load
across available agents, requiring only sporadic and unplanned
exchanges between individual agents and a base station. The
partitioning update algorithm also manages high-level timing
and logic parameters to guarantee that the resulting coverage
assignments have geometric and temporal properties that are
amenable for combination with generic single vehicle trajec-
tory planners. Under appropriate assumptions, the proposed
algorithms will produce a set of coverage regions forming a
Pareto optimal partition, while also ensuring collision avoid-
ance and quality of coverage guarantees.
Future work should further relax communication assump-
tions to reflect additional realistic hardware limitations, e.g.,
use of directional antennae for wireless transmission. Other
areas of future research include the addition of peer-to-peer, in
addition to central, communication, performance comparisons
between specific trajectory planners when used within our
framework, e.g., those involving ergodic Markov chains, and
further theoretical characterizations of performance.
APPENDIX: PROOFS
Proposition 2 (Set Membership). Suppose Assumption 1
holds, and that, at the time of each exchange occurring prior
to the fixed time ¯t ≥ 0, required algorithmic constructions are
well-posed so that the base station and the communicating
agent are able to update their respective variables via Algo-
rithm 1. Then, for any k ∈ Q at any time t ≤ ¯t:
1) k ∈ PIDk,
2) k belongs to at most 2 elements of P ,
3) if TIDk = 0, then k /∈ Pj for any j (cid:54)= IDk, and
4) if k ∈ Pj, j (cid:54)= IDk, then Pj ∩ P ID
k = i (cid:54)= j. Algorithm 1 defines P
(cid:96) = ∅ for (cid:96) /∈ {j, IDk}
Proof. Fix ¯t ≥ 0, k ∈ Q. When t = 0, P = P ID is an
m-partition of Q, implying the proposition. Since k is not
removed from PIDk or added to any Pi with i (cid:54)= IDk until
its first reassignment, i.e., when IDk is changed. Thus, the
proposition is true for all t prior to the first reassignment.
Suppose the proposition holds for all t prior to the pth
reassignment, which occurs at t = t0. Suppose that ID−
k = j,
i = P +
ID+
.
ID+
Thus, k ∈ P +
k
i and remains in these sets until another
ID+
k
reassignment. Statement 1 holds, therefore, for all t prior to the
p + 1st reassignment. Now note that, by Alg. 2, reassignment
cannot occur at t0 unless T −
j = 0. By inductive assumption,
statement 3 of the proposition holds when t = t−
0 , implying
for any (cid:96) (cid:54)= j. Upon reassignment, the timers
that k /∈ P −
j + ∆ − t0. Since
Tj, Ti are modified such that T +
1) IDk is unchanged as long as Tj > 0, and 2) agent j
communicates with the base prior to time ω+
j + ∆ (when k
is removed from Pj), we deduce that k solely belongs to Pj
and Pi until the p + 1st reassignment. By the same logic, at
any time t ≥ t+
0 at which Ti = 0 and the p + 1st reassignment
has not yet occurred, k ∈ Pi exclusively (addition to other
ID,+
i
= P +
= P +
(cid:96)
j , T +
i > ω+
Initial LikelihoodFinal Likelihoodt = 2000t = 2100t = 2200t = 400002004006008001000102030405060TimeCost0 , implying P −
sets in P without reassignment is impossible). We deduce
that statements 2 and 3 hold for any t prior to the p + 1st
reassignment. Now note that, 1) statement 3 holds prior at
time t+
, 2) no agent claims additional
points vertices from P +
j unless Tj = 0, and 3) k cannot be
added to a coverage region without reassignment. As such,
(cid:96) = ∅ for any (cid:96) /∈ {j, IDk = i} prior to the p + 1st
Pj ∩ P ID
reassignment. From persistent communication and the bound
∆, the proposition follows by induction.
ID,−
i
j = P
i
i
i
(c+
(cid:17)
j(cid:54)=i Pj
(cid:83)
i = P add
= P +
ID,+
i
occurs, then P ID
i ∩(cid:16)(cid:83)
Proof of Theorem 1. It suffices to show that Def. 1 is well-
posed (Prop. 1) whenever additive sets are required. We
proceed by induction. When t = 0, P ID = P is a connected
m-partition of Q and thus, for any i, P ID
is disjoint from
j(cid:54)=i Pj. The same holds prior to the first exchange between
the base station and some agent. Thus, by Prop. 1, the first
call to Alg. 1 is well-posed. Now assume that, for all times
t prior to the pth call to Alg. 1, 1) P ID is a connected m-
partition of Q, and 2) if an exchange that requires construction
= ∅. This implies that
of P add
Prop. 2 holds at any time t prior to the p + 1st exchange.
Assume the pth communication occurs when t = t0 and
involves agent i. By the uniqueness of identifiers, P ID,+ is
an m-partition of Q. To show that P ID,+ is connected, first
ID,+
i . Since P +
note that P
i ) (connected
ID,−
i
(connected by inductive
by Def. 1), or P
= P
ID,+
i
follows. Now consider
assumption) connectivity of P
ID,−
(cid:54)= 0,
i
P ID
then P
and
j
ID,+
follows. Suppose T −
connectivity of P
j
is not connected. Then, P +
if it were,
j
k /∈ {i, j}, contradicting
there would exist k ∈ P +
Prop. 2, satement. Thus, there exists k1 ∈ P
such that 1)
k1 /∈ P add
i ), and 2) any length-minimizing path in G(P −
(c+
j )
j contains some k2 ∈ P add
spanning k1 and c+
i (c+
i ).
Select one such path and vertex k2. Assume without loss of
generality that there exists an edge {k1, k2} ∈ E. Def. 1
(cid:96) )(cid:96) (cid:54)= i, k2 ∈
implies 1
si
i } and thus 1
(k1, c+
P +
j ). Since
T −
j = 0 and ID−
i ) <
(cid:96) }, con-
dP +
tradicting k1 /∈ P add
is connected. Invoking
Prop. 2 statement 3, the inductive assumption therefore holds
for all times prior to the p + 1st exchange, thereby implying
well-posedness of the first p + 1 exchanges.
(k2, c+
(k2, c+
s(cid:96)
i ) < 1
dP +
dP +
sj
i ∪{k1}(k1, c+
= j, Prop. 2 implies 1
dP +
si
(cid:96) )(cid:96) (cid:54)= i, k1 ∈ P +
(k1, c+
ID,+
j
, j (cid:54)= i. If T −
j
ID,+
j
i ) < min{ 1
i ∪{k1}(k1, c+
j ) = min{ 1
(c+
is not connected:
j = 0 and P
j with ID+
i ). Thus, P
i ) = P +
ID,+
j
ID,+
j
(k1, c+
= P
dP +
dP +
dP +
(c+
1
sj
k1
s(cid:96)
si
j
i
i
i
(cid:96)
(cid:96)
j
j
i
Proof of Theorem 2.
Statement 1: The proof of Thm. 1 implies the statement.
Statement 2: P is an m-covering of Q since P ID is always
i ⊆ Pi for any
an m-partition of Q (statement 1), and P ID
i (Prop. 2, statement 1). P is connected, since Pi = P ID
(connected by statement 1) immediately following any update,
and Pi is unchanged in between updates.
Statement 3: It suffices to show that IDci = i for any t and
any i: this would imply ci (cid:54)= cj for any i (cid:54)= j, and ci ∈ Pi
(Prop. 2). By assumption, IDci = i for all i at t = 0. The same
holds for any t prior to the first exchange between any agent
and the base station. Suppose IDci = i for all i (thus ci (cid:54)= cj
i
10
i
i
i
i
j
j = ω+
. Since supp(ΦA
j + ∆ < t0 + T +
j (·, t)) = Pj = P A
j ) = 0 for any j, we have c+
j (·, t)). Thus, for all t > t0 +τ +
(c−
j , c−
= j, and induction proves the statement.
for any i (cid:54)= j) prior to the pth exchange. If agent i is the pth
communicating agent, lines 2 and 9 of Alg. 1 imply ID+
= i.
c+
j /∈ P add
i
(c+
Since dP
i ).
−
j
Thus, ID+
c+
j
Statements 4 and 5: Statement 4 follows from (1), noting that
i = Pi. Statement 5 holds by assumption when t = 0.
P A
Let k ∈ Q, and consider times when IDk changes (k is
re-assigned). Since supp(ΦA
for any j
at t = 0, statement 4 implies that, for any t prior to the
(·, t)),
first reassignment, k belongs exclusively to supp(ΦA
IDk
implying statement 5. Suppose statement 5 holds for all t prior
to the pth reassignment (occurring at time t0), and ID−
k = j,
k = i (cid:54)= j. Then, T −
ID+
j = 0 and k belongs exclusively to
0 (Prop. 2). By Alg. 1 and 2, k ∈ P A,pd,+
j when t = t−
P −
i (·, t))
j + ∆ − t0 ≥ τ A,+
and T +
i > ω+
i ≥ τ A,+
least T +
is not redefined for a duration of at
,
i (·, t)) when t ∈ [t+
(1) implies k /∈ supp(ΦA
0 + τ A,+
0 , t+
].
ID,−
Since k is re-assigned when t = t0, k ∈ P +
i \P
i
and
j + ∆ − t0. Agent j will communicate with the base
i
T +
j = ω+
at some time t1 < t0 + T +
i . Thus,
Ti > 0 when t = t1, and k is removed from both Pj and
i and before the p+1st
supp(ΦA
reassignment, k belongs exclusively to supp(φi(·, t)).
Proof of Theorem 3. Thm. 2 implies statement 1.
Statement 2: For any i, 1) Ti = 0 when t = 0, and 2)
dQ(cid:48)(k1, k2) ≤ d for any Q(cid:48) ⊆ Q, k1, k2 ∈ Q(cid:48). Thus, it
1
si
is straightforward to show that, for any i and any T , we have
the bound Ti ≤ ∆ + ∆H + d. We show that, for any i, the
i ≤ Ti− ∆H holds by induction: Ti = 0 and
bound τ A
i = −∆H when t = 0 , so τ A
i ≤ Ti − ∆H.
τ A
i = τ A
The bound similarly holds prior to the first exchange involving
i − t = τ A
i ≤ −∆H ≤ Ti − ∆H
any agent, since τ A
at any such time. Assume the bound holds prior to the pth
update (occuring at t = t0). Consider 2 cases: if agent i is the
i − ∆H;
communicating agent, then τ A,+
if not, then τ A,+
i = T +
implying
− t0 + ωA,+
the desired bound, or 2) T −
=
τ A,−
− t + ωA,−
i + ∆ − t0) −
i − ∆H. This logic extends to all times prior to the
i
∆H = T +
p + 1st exchange and the desired bound follows by induction.
Using the bounds from the previous paragraph, we have
i ≤ t + ∆ + d. Fix t and k ∈ Prohi(t). Then, k ∈
τ A
i + ωA
P A,+
= P +
('+' is
i
with respect to the fixed time t). Further, over the interval
[t, ωA,+
], the vertex k is not re-assigned, Pi is not
is unchanged . Therefore, k /∈ Prohi(t) at
augmented, and τ A
, we have t < t0 ≤ t+
i
time ωA,+
. If t0 := ωA,+
∆ + d. Since Ti ≥ τ A
, k is not re-assigned
, t0 + ∆H] ⊇
during the interval [ωA,+
[t0, t0 + ∆H]. Thus k ∈ Pi\Prohi(·) over the same interval.
Statement 3: Fix t and suppose k ∈ P −
(in this proof,
'+,−' are with respect to t). Then, 1) IDk changed (k was
reassigned) at time t0 < t, 2) agent i communicates with the
base at time t, and 3) no exchanges involving agent i occurred
during the interval [t0, t). Upon reassignment at time t0, Alg. 2
specifies that 1) Ti is reset to value ωA,−
i + ∆− t0, thus P ID
i − t + ωA
and either 1) T −
i = 0 and τ A,+
i − t + ωA
i − t + ωA
i +τ A,+
i + ∆H at time ωA,+
= τ A,−
i ≤ T −
i ] ⊇ [ωA,+
i \P +
i − ∆H = −∆H ≤ (ωA,+
i , k ∈ P A,pd,+
, and t − ωA,+
i − t + ωA
i + τ A,+
i +τ A,+
i + T +
i = τ +
i
< τ A,+
, ωA,+
:= T +
i
i
i
i
i
i
i
i
i
i
i
i
i
i
i
i
is unchanged over the interval [t0, t), 2) k is added to P A,pd
IDk
and 3) τ A
IDk
, TIDk are given values of at least
,
(cid:16)k, P
ID,−
i
(cid:27)
(cid:17) − t0
(cid:26)
ωA,−
i + ∆ +
1
si
i
k
k
k
i
(cid:96)
si
si
−
i
−
i
−
i
−
i
dP
dP
dP
dP
k∈P
−
i \P +
ID,−
i
ID,−
i
ID,−
i
⊆ P ID
ID,−
i
)].
)] ⊇ (t0, t].
) from k into P
i \P +
(k, P
i \P +
when TID+
i ⊆ ProhID+
ID,−
i
(k, P
i \P +
i , and 2) P −
ω := max
,
implying that PIDk, ProhIDk (·) remain unchanged over the
interval (t0, ω] ⊇ (t0, t + 1
(k, P
dP
Since coverage regions are connected and non-empty
= ∅ for any (cid:96) /∈ {i, ID+
i ∩ P ID
k }
(Thm. 2) and P −
on the interval (t0, t] (Prop. 2), 1) there exists a path of
ID,−
length dP
and every ver-
−
i
i
tex along any such path (except the terminal vertex) lyies
within P −
over the interval
(t0, ω] ⊇ [t, t + 1
)]. Since 1) each vertex
belongs to no more than two sets simultaneously (Prop. 2),
2) k ∈ P −
i , and 3) no agent claims any vertex in the set
ProhID+
> 0, vertices along the path (excluding
the terminal vertex) do not belong to Pj with j (cid:54)= IDk over
)]. To complete the proof,
the interval [t, t + 1
(k, P
si
note that Alg. 2 implies T +
), and thus
i > 1
(k, P
dP
−
si
ID,−
i
over [t, t + 1
P
(k, P
−
i
si
i
ID,−
i
Proposition 3 (Cost). Suppose Assumption 1 holds and that,
upon each exchange, the base station and the communicating
agent update their respective variables via Alg. 1. If Φ(·, t1) =
Φ(·, t2) for all t1, t2, then H(c, P ID,·) = H(c, P,·).
Proof. Since Φ is static, H(·,·, t1) = H(·,·, t2) for any t1, t2.
When t = 0, P = P ID and thus H(c, P ID, 0) = H(c, P, 0).
The same is true prior to the first exchange between any
agent and the base. Suppose that immediately prior to the pth
exchange (occurring at t = t0, involving agent i), we have
H(c−, P ID,−, t0) = H(c−, P −, t0). Recall that, for any agent
j, Pj and P ID
coincide immediately following any exchange
involving agent j and, if agent j claims vertices from Pi,
then Alg. 2 guarantees that agent i will communicate with
the base station before any additional vertices are claimed
by other agents. At the time of the pth update, this logic,
ID,−
j = ∅, for
along with Prop. 2,
implies that P
i
ID,−
all j (cid:54)= i. Noting that c+
i ∈ P
, we deduce that any
single k ∈ P
contributes equally to H(c+, P ID,+, t0)
i
and H(c+, P +, t0). If k ∈ P add
, then for any
j
i ) <
dP +
j ) (Def. 1). Therefore, k contributes equivalently
1
sj
to the values of both H(c+, P ID,+, t0) and H(c+, P +, t0).
(cid:54)= ∅. We show
j \P +
Now suppose k ∈ P +
j ∩ P +
(c+
if a length-minimizing
j , k):
that dP
j , k) = dP +
path in G(P +
j ) between c+
and k is also contained in
), then the result is trivial. Suppose that every such
G(P
minimum length path does leave G(P
). From Prop. 2
statement 4, every ¯k ∈ P +
¯k ∈ {i, j}.
Therefore, we assume without loss of generality that k is
to P +
adjacent
is adja-
cent to k and lies along a minimum-length path in G(P +
j )
j and k. Since k ∈ P +
spanning c+
, we must have
k ∈ P add
(c+
i ) as constructed during the update, which implies
(cid:54)= i such that k ∈ P +
dP +
be a vertex that
i \P
i )\P
(c+
j , we have
j must satisfy either ID+
i . Let k ∈ P +
i , where P +
ID,−
i
1
si
∩ P −
ID,−
i
ID,−
i
ID,+
j
ID,+
j
(k, c+
(k, c+
ID,+
j
(c+
j
j
i
i
i
i
j
j
i
11
i
j
j
j
(cid:96)
(cid:96)
i
s(cid:96)
(c+
dP +
dP +
dP +
dP +
j , k) = dP +
(k, c+
(k, c+
(k, c+
ID,+
j
(k, c+
i ∪{k}(k, c+
i ∪{k}(k, c+
(cid:96) }, contradicting k /∈ P add
(cid:96) )(cid:96) (cid:54)= i, ¯k ∈ P +
j ). Since T −
i ) < 1
sj
i ) < min{ 1
dP +
s(cid:96)
i ) < 1
dP +
sj
1
dP +
si
(cid:96) )(cid:96) (cid:54)= i, P +
(c+
(cid:96) } and thus
1
si
j = 0 and ID−
1
k =
si
(k, c+
j, Prop. 2 implies
j ) =
min{ 1
i ) ⊂
(c+
P +
j , k), which, by inductive
i . Thus, dP
assumption, implies that k contributes equally to the value of
both H(c+, P ID,+, t0) and H(c+, P +, t0). We conclude that
H(c+, P ID,+, t0) = H(c+, P +, t0). Since P , P ID, and c are
static between updates, the statement follows by induction.
Proof of Theorem 4. The value of H(c, P, t) is static in
between base station exchanges since P and c do not
change in between updates. Consider an update occurring
at t = t0 involving agent i. Noting Prop. 3, we have
H(c+, P +, t0) ≤ H(c−, P ID,−, t0) = H(c−, P −, t0). Thus,
the value H(c, P, t) is non-increasing as t → ∞. Since
Covm(Q) is finite, there must exist some time t0 after which
the value of H is static. Consider fixed t > t0 at which some
agent i communicates with the base. Since the value of H
does not change during the update, Alg. 1 implies that P ID
and c will be unchanged by the update. It follows that c and
i ⊆ Pi for any
P ID converge in finite time. Further, since P ID
ID,−
i (Prop. 2), we have P
i ) =
i
P +
i . Noting the persistence of communication imposed by ∆,
the same logic implies that after some finite time, P and P ID
are concurrent.
∪ P add
ID,−
i
ID,+
i
(c+
= P
= P
i
i
sj
h∈Pi
h∈Pi
k∈Q(cid:48) 1
si
that (cid:80)
dPi∪{k}(ci, k) ≥ 1
such that (cid:80)
dPi∪Q(cid:48)(ci, k) < (cid:80)
dPi(h, k)Φ(h, t) <(cid:80)
We show that the limiting configuration is Pareto optimal.
Consider t0, such that for all t > t0, c and P are static and P
is an m-partition of Q. Since timers Ti are only reset when P
is altered, we assume without loss of generality that Ti = 0
for all i ∈ {1, . . . , m} at any t > t0. Suppose that agent
i communicates with the base station at time t > t0. With
these assumptions, Alg. 1 implies that there exists no k ∈ Pi
dPi(h, ci)Φ(h, t)
(otherwise the value of H would be lowered by moving ci).
Similarly, for any k ∈ Pj with j (cid:54)= i that is adjacent to
Pi, we must have 1
dPj (cj, k). Indeed,
si
if this were not so, there would exist k ∈ P add
i )\P −
(c+
i ,
contradicting the convergence assumption, since P add
(c+
i ) =
there is no Q(cid:48) ⊂ Q\Pi such
P +
i . As such, for any i,
dPj (cj, k)k ∈
Pj, j (cid:54)= i}, which implies statement (ii) of Def. 2.
Proof of Theorem 5. By Assumption 2, no agent ever leaves
its assigned coverage region or enters its prohibited region,
provided no abrupt changes to these regions occur during
an update. Therefore, if no update ever occurs in which the
vertex corresponding to the communicating agent's location
is removed from the relevant agent's coverage region, then
the statement is immediate. Suppose now that, at some time
t = t0, agent i, whose location is associated with some
k ∈ P A,−
, communicates with the base station and k is
removed, i.e., k /∈ P A,+
. At time t+, agent i executes lines
5 and 6 of Alg. 3. Thm. 3, however, guarantees that 1) there
will exist a path in G(P A,−
ID,−
, 2)
i
P +
that all vertices along this path belong to ProhID+
j(cid:54)=ID+
j
)], and 3)
during the time period (t0, t0 + 1
(k, P
si
) between k and the set P
k∈Q(cid:48) min{ 1
\(cid:83)
ID,−
i
dP A,−
sj
i
i
i
i
k
k
i
ID,−
i
⊆ Pi := P A
k
i
.
until it reaches P A,+
i over the same interval. Therefore, if agent
P
i immediately starts moving along the path, its location will
lie exclusively within ProhID+
It remains to show that no agent i ever enters Prohi(t).
Whenever agent i is executing lines 1− 2 of Alg. 3, it follows
readily that it will not enter Prohi(t). We show that the same
holds when agent i is forced to execute line 5 and 6 of Alg. 3.
Without loss of generality, consider the update at time t0
previously described. Since k is re-assigned prior to the update
i = ∅ (since vertices in Pi cannot be
at time t0, we have Proh−
claimed unless Ti = 0, implying t0 − ωA,−
). Using
Prop. 2, we deduce that T +
> 0 and thus no vertices in
ID+
P A,−
k
, and no vertex on the
belongs to Prohi(t+
constructed path between k and P
0 ).
ID,−
), Prohi(·) remains
Since T +
(k, P
i
unchanged over the interval (t0, t0 + 1
si
can belong to P A,pd,+
ID,−
i
∩ P +
ID+
k
i > τ A,+
> τ A,−
ID,−
i
dP A,−
dP A,−
> 1
si
(k, P
)].
i
i
i
i
i
i
i
REFERENCES
[1] A. Almeida, G. Ramalho, H. Santana, P. Tedesco, T. Menezes, V. Cor-
ruble, and Y. Chevaleyre. Recent advances on multi-agent patrolling.
In Advances in Artificial Intelligence, volume 3171 of Lecture Notes in
Computer Science, pages 474–483. Springer, 2004.
[2] J.F. Araujo, P.B. Sujit, and J.B. Sousa. Multiple UAV area decom-
position and coverage. In Computational Intelligence for Security and
Defense Applications (CISDA), 2013 IEEE Symposium on, pages 30–37,
Singapore, April 2013. IEEE.
[3] B. Bethke, M. Valenti, and J. P. How. UAV task assignment.
IEEE
Robotics & Automation Magazine, 15(1):39–44, 2008.
[4] E. Bonabeau, M. Dorigo, and G. Theraulaz. Swarm Intelligence: From
Natural to Artificial Systems. Number 1. Oxford university press, 1999.
[5] J. Cort´es. Coverage optimization and spatial load balancing by robotic
sensor networks. IEEE Transactions on Automatic Control, 55(3):749–
754, 2010.
[6] J. Cort´es, S. Mart´ınez, T. Karatas, and F. Bullo. Coverage control
IEEE Transactions on Robotics and
for mobile sensing networks.
Automation, 20(2):243–255, 2004.
[7] S. R. Dixon and C. D. Wickens. Automation reliability in unmanned
aerial vehicle control: A reliance-compliance model of automation
dependence in high workload. Human Factors: The Journal of the
Human Factors and Ergonomics Society, 48(3):474–486, 2006.
[8] J. W. Durham, R. Carli, P. Frasca, and F. Bullo. Discrete partitioning and
coverage control for gossiping robots. IEEE Transactions on Robotics,
28(2):364–378, 2012.
[9] P. O. Fjallstrom. Algorithms for graph partitioning: A survey. Linkoping
Electronic Articles in Computer and Information Science, 3(10), 1998.
[10] B. P. Gerkey and M. J. Matari´c. Sold!: Auction methods for multi-
IEEE Transactions on Robotics and Automation,
robot coordination.
18(5):758–768, 2002.
[11] G. Gutin and A. P. Punnen. The Traveling Salesman Problem and Its
Variations. Springer, 2007.
[12] X. Lan and M. Schwager. Planning periodic persistent monitoring
In IEEE
trajectories for sensing robots in Gaussian random fields.
Int. Conf. on Robotics and Automation, pages 2415–2420, Karlsruhe,
Germany, May 2013.
[13] Gilbert Laporte. The vehicle routing problem: An overview of exact and
approximate algorithms. European Journal of Operational Research,
59(3):345–358, 1992.
[14] A. Macwan, G. Nejat, and B. Benhabib. Optimal deployment of robotic
teams for autonomous wilderness search and rescue. In IEEE/RSJ Int.
Conf. on Intelligent Robots & Systems, pages 4544–4549, San Francisco,
CA, USA, September 2011.
[15] G. Mathew and I. Mezic. Spectral multiscale coverage: A uniform
In IEEE Conf. on
coverage algorithm for mobile sensor networks.
Decision and Control, pages 7872–7877, Shanghai, China, December
2009.
[16] George Mathew, Amit Surana, and Igor Mezic. Uniform coverage
control of mobile sensor networks for dynamic target detection.
In
Decision and Control (CDC), 2010 49th IEEE Conference on, pages
7292–7299. IEEE, 2010.
12
[17] N. Mathew, S. L. Smith, and S. L. Waslander. Multirobot rendezvous
IEEE Transactions on
tasks.
planning for recharging in persistent
Robotics, 31(1):128–142, 2015.
[18] I. Maza and A. Ollero. Multiple UAV cooperative searching operation
using polygon area decomposition and efficient coverage algorithms. In
R. Alami, R. Chatila, and H. Asama, editors, Distributed Autonomous
Robotic Systems 6, pages 221–230. Springer, 2007.
[19] N. Nigam. The multiple unmanned air vehicle persistent surveillance
problem: A review. Machines, 2(1):13–72, 2014.
[20] N. Nigam and I. Kroo. Persistent surveillance using multiple unmanned
In Aerospace Conference, 2008 IEEE, pages 1–14, Big
air vehicles.
Sky, MT, USA, March 2008. IEEE.
[21] A. Okabe, B. Boots, K. Sugihara, and S. N. Chiu. Spatial Tessellations:
Concepts and Applications of Voronoi Diagrams. Wiley Series in
Probability and Statistics. John Wiley & Sons, 2 edition, 2000.
[22] J. Ousingsawat and M.G. Earl. Modified lawn-mower search pattern for
areas comprised of weighted regions. In American Control Conference,
pages 918–923. IEEE, 2007.
[23] F. Pasqualetti, J. W. Durham, and F. Bullo. Cooperative patrolling via
weighted tours: Performance analysis and distributed algorithms. IEEE
Transactions on Robotics, 28(5):1181–1188, 2012.
[24] F. Pasqualetti, F. Zanella, J. R. Peters, M. Spindler, R. Carli, and F. Bullo.
Camera network coordination for intruder detection. IEEE Transactions
on Control Systems Technology, 22(5):1669–1683, 2014.
[25] R. Patel, P. Frasca, and F. Bullo. Centroidal area-constrained partitioning
for robotic networks. ASME Journal of Dynamic Systems, Measurement,
and Control, 136(3):031024, 2014.
[26] R. Patel, P. Frasca, J. W. Durham, R. Carli, and F. Bullo. Dynamic
partitioning and coverage control with asynchronous one-to-base-station
IEEE Transactions on Control of Network Systems,
communication.
3(1):24–33, 2016.
[27] J. Peng and S. Akella. Coordinating multiple robots with kinodynamic
constraints along specified paths. The International Journal of Robotics
Research, 24(4):295–310, 2005.
[28] A. Pereira, H. Heidarsson, C. Oberg, D. Caron, B. Jones, and
G. Sukhatme. A communication framework for cost-effective operation
of AUVs in coastal regions. In A. Howard, K. Iagnemma, and A. Kelly,
editors, Field and Service Robotics, volume 62 of Tracts in Advanced
Robotics, pages 433–442. Springer, 2010.
[29] J. Peters, V. Srivastava, G. Taylor, A. Surana, M. P. Eckstein, and
F. Bullo. Mixed human-robot team surveillance: Integrating cognitive
IEEE Control Systems Magazine,
modeling with engineering design.
35(6):57–80, 2015.
[30] J. H. Reif and H. Wang. Social potential fields: a distributed behavioral
Robotics & Autonomous Systems,
control for autonomous robots.
27(3):171–194, 1999.
[31] R. C. Shah, S. Roy, S. Jain, and W. Brunette. Data MULEs: modeling
and analysis of a three-tier architecture for sparse sensor networks. Ad
Hoc Networks, 1(2-3):215–233, 2003.
[32] R. N. Smith, Y. Chao, P. P. Li, D. A. Caron, B. H. Jones, and G. S.
Sukhatme.
Planning and implementing trajectories for autonomous
underwater vehicles to track evolving ocean processes based on predic-
tions from a regional ocean model. International Journal of Robotics
Research, 29(12):1475–1497, 2010.
[33] D. E. Soltero, M. Schwager, and D. Rus. Generating informative paths
for persistent sensing in unknown environments. In IEEE/RSJ Int. Conf.
on Intelligent Robots & Systems, pages 2172–2179, Vilamoura, Portugal,
October 2012.
[34] V. Srivastava, F. Pasqualetti, and F. Bullo. Stochastic surveillance strate-
International Journal of Robotics
gies for spatial quickest detection.
Research, 32(12):1438–1458, 2013.
[35] P. Toth and D. Vigo, editors. The Vehicle Routing Problem. Monographs
on Discrete Mathematics and Applications. SIAM, 2001.
[36] J. Wood and J.k. Hedrick. Space partitioning and classification for multi-
target search and tracking by heterogeneous unmanned aerial system
In Infotech@Aerospace, St. Louis, MO, USA, March 2011.
teams.
AIAA 2011-1443.
[37] P. R. Wurman, R. D'Andrea, and M. Mountz. Coordinating hundreds of
cooperative, autonomous vehicles in warehouses. AI Magazine, 29(1):9–
20, 2008.
|
1802.01208 | 3 | 1802 | 2019-03-26T23:54:14 | Toward a Theory of Markov Influence Systems and their Renormalization | [
"cs.MA",
"math.PR",
"nlin.AO"
] | We introduce the concept of a Markov influence system (MIS) and analyze its dynamics. An MIS models a random walk in a graph whose edges and transition probabilities change endogenously as a function of the current distribution. This article consists of two independent parts: in the first one, we generalize the standard classification of Markov chain states to the time-varying case by showing how to "parse" graph sequences; in the second part, we use this framework to carry out the bifurcation analysis of a few important MIS families. We show that, in general, these systems can be chaotic but that irreducible MIS are almost always asymptotically periodic. We give an example of "hyper-torpid" mixing, where a stationary distribution is reached in super-exponential time, a timescale beyond the reach of any Markov chain. | cs.MA | cs |
Toward a Theory of Markov Influence Systems and their
Renormalization∗
Bernard Chazelle †
Abstract
We introduce the concept of a Markov influence system (MIS) and analyze its dynamics.
An MIS models a random walk in a graph whose edges and transition probabilities change
endogenously as a function of the current distribution. This article consists of two inde-
pendent parts: in the first one, we generalize the standard classification of Markov chain
states to the time-varying case by showing how to "parse" graph sequences; in the second
part, we use this framework to carry out the bifurcation analysis of a few important MIS
families. We show that, in general, these systems can be chaotic but that irreducible MIS
are almost always asymptotically periodic. We give an example of "hyper-torpid" mixing,
where a stationary distribution is reached in super-exponential time, a timescale beyond the
reach of any Markov chain.
Keywords: Random walks on time-varying graphs; Markov influence systems; Graph sequence parsing;
Renormalization; Hyper-torpid mixing; Chaos
1 Introduction
Nonlinear Markov chains are popular probabilistic models in the natural and social sciences.
They are commonly used in interacting particle systems, epidemic models, replicator dynamics,
mean-field games, etc. [5, 11, 15, 17, 20, 23, 31]. They differ from the linear kind by allowing
transition probabilities to vary as a function of the current state distribution. For example, a
traffic network might update its topology and edge transition rates adaptively to alleviate con-
gestion. The systems are Markovian in that the future depends only on the present: in this
work, the present will refer to the current state distribution rather than the single state presently
∗A preliminary version of this work appeared in the Proceedings of the 9th Innovations in Theoretical Com-
puter Science (ITCS), 2018. The Research was sponsored by the Army Research Office and the Defense Advanced
Research Projects Agency and was accomplished under Grant Number W911NF-17-1-0078. The views and conclu-
sions contained in this document are those of the authors and should not be interpreted as representing the official
policies, either expressed or implied, of the Army Research Office, the Defense Advanced Research Projects Agency,
or the U.S. Government. The U.S. Government is authorized to reproduce and distribute reprints for Government
purposes notwithstanding any copyright notation herein.
†Department of Computer Science, Princeton University, [email protected]
1
visited. The traditional formulation of these models comes from physics and relies on the clas-
sic tools of the trade: stochastic differential calculus, McKean interpretations, Feynman-Kac
models, Fokker-Planck PDEs, etc. [6, 8, 17, 23]. These techniques assume symmetries that are
typically absent from the "mesoscopic" scales of natural algorithms; they also often operate at
the thermodynamic limit, which rules out genuine agent-based modeling. Our goal is to initi-
ate a theory of discrete-time Markov chains whose topologies vary as a function of the current
probability distribution. Thus the entire theory of finite Markov chains should be recoverable as
a special case. Our contribution comes in two independent parts: the first one is a generalization
of the classification of Markov chains to the time-varying case; the second part is the bifurcation
analysis of Markov influence systems. The work highlights the signature trait of time-varying
random walks, which is the possibility of super-exponential ("hyper-torpid") mixing.
Renormalization. The term refers to a wide-reaching approach to complex systems that orig-
inated in quantum field theory and later expanded into statistical mechanics and dynamics.
Whether in its exact or coarse-grained form, the basic idea is to break down a complex sys-
tem into a hierarchy of simpler parts. When we define a dynamics on the original system (think
of interacting particles moving about) then the hierarchy itself creates its own dynamics between
the layers. This new "renormalized" dynamics can be entirely different from the original one.
Crucially, it can be both easier to analyze and more readily expressive of global properties. For
example, second-order phase transitions in the Ising model might correspond to fixed points of
the renormalized dynamics.
What is the relation to Markov chains? The standard classification of the states of a Markov
chain is an example of exact renormalization. Recall that the main idea behind the classification
is to express the chain as an acyclic directed graph, its condensation, whose vertices correspond
to its strongly connected components. This creates a two-level hierarchy (fig.1): a tree with
a root (the condensation) and its children (the strongly connected components). In a random
walk, the probability mass will flow entirely into the k (= 2) sinks of the condensation. The
stationary distribution lies on an attracting manifold of dimension k − 1 (= 1). The hierarchy
has only two levels. The situation is different with time-varying Markov chains, which can have
deep hierarchies.
Figure 1: The condensation of a graph.
Consider an infinite sequence (gk)k>0 of digraphs over a fixed set of labelled vertices. A
2
temporal random walk is defined by picking a starting vertex, moving to a random neighbor
in g1, then a random neighbor in g2, and so on, forever [9, 10, 19, 24, 32]. Note that a temporal
walk might not match a path in any of the graphs. How would one classify the states of this
"dynamic" Markov chain? Repeating the condensation decomposition at each step makes little
sense, as it carries no information about the temporal walks. Instead, we want to monitor when
and where temporal walks are extended. The cumulant graph compiles all such extensions and,
when the process stalls at time t(cid:48), reboots it by restarting from scratch at t = t(cid:48). We define
a grammar with which we parse the sequence (gk)k>0 accordingly. The method, explained in
detail in the next section, is very general and likely to be useful elsewhere.
Markov influence systems. All finite Markov chains oscillate periodically or mix to a station-
ary distribution. One key fact about their dynamics is that the timescales never exceed a single
exponential in the number of states. Allowing the transition probabilities to fluctuate over time
at random does not change that basic fact [2, 12, 13]. Markov influence systems are quite differ-
ent in that regard. Postponing formal definitions, let us think of an MIS for now as a dynamical
system defined by iterating the map f : x(cid:62) (cid:55)→ x(cid:62)S (x), where x is a probability distribution rep-
resented as a column vector in Rn and S (x) is a stochastic matrix that is piecewise-constant as a
function of x. We assume that the discontinuities are flats (ie, affine subspaces). The assumption
is not nearly as restrictive as it appears, as we explain with a simple example.
(cid:80)
Consider a random variable ξ over the distribution x and fix two n-by-n stochastic matrices
A and B. Define S (x) = A (resp. B) if varx ξ > 1 (resp. else); in other words, the random walk
picks one of two stochastic matrices at each step depending on the variance of ξ with respect
to the current state distribution x. Note that, in violation of our assumption, the discontinuity
is quadratic in x. This is not an issue because we can always linearize the variance: we begin
i, j (ξi − ξ j)2xix j and the fact that y := (xix j)i, j is a probability
with the identity varx ξ = 1
distribution. We form the Kronecker square T(y) = S (x) ⊗ S (x) and lift the system into the
2
(n2 − 1)-dimensional unit simplex to get a brand-new MIS defined by the map y(cid:62) (cid:55)→ y(cid:62)T(y).
We now have linear discontinuities. This same type of tensor lift can be used to linearize any
algebraic constraints; this requires making the polynomials over xi homogeneous, which we can
i xi = 1. Using ideas from [7], one can go even further than that
and base the stepwise edge selection on the outcome of any first-order logical formula we may
fancy (with the xi's acting as free variables). The key fact behind this result is that the first-
order theory of the reals is decidable by quantifier elimination. This allows us to pick the next
stochastic matrix at each time step on the basis of the truth value of a Boolean logic formula
with arbitrarily many quantifiers (see [7] for details). This discussion is meant to highlight the
fact that assuming linear discontinuities is not truly restrictive.
do by using the identity(cid:80)
We prove in this article that an irreducible Markov influence system is almost always asymp-
totically periodic. (An MIS is irreducible if S (x) forms an irreducible chain for each x.) We
extend this result to larger families of Markov influence systems. We also give an example of
"hyper-torpid" mixing: an MIS that converges to a stationary distribution in time equal to a
tower-of-twos in the size of the chain. This bound also applies to the period of certain peri-
odic MIS. The emergence of timescales far beyond the reach of standard Markov chains is a
distinctive feature of Markov influence systems.
Unlike in a standard random walk, the noncontractive eigenspace of an MIS may vary over
3
time. It is this spectral incoherence that renormalization attempts to "tame." To see why this has
a strong graph-theoretic flavor, observe that at each time step the support of the stationary distri-
bution can be read off the topology of the current graph: for example, the number of sinks in the
condensation is equal to the dimension of the principal eigenspace plus one. Renormalization
can thus be seen as an attempt to restore coherence to an ever-changing spectral landscape via a
dynamic hierarchy of graphs, subgraphs, and homomorphs.
The bifurcation analysis at the heart of the analysis depends on a notion of "general position"
aimed at bounding the growth rate of the induced symbolic dynamics [4,21,33]. The root of the
problem is a clash between order and randomness similar to the conflict between entropy and
energy encountered in the Ising model. The tension between these two "forces" is mediated by
the critical values of a perturbation parameter, which are shown to form a Cantor set of Hausdorff
dimension strictly less than 1. Final remark: There is a growing body of literature on dynamic
graphs [1, 3, 6, 16, 19, 22, 24, 25, 28, 29] and their random walks [2, 9 -- 13, 15, 20, 26, 27, 30, 32].
What distinguishes this work from its predecessors is that the changes in topology are induced
endogenously by the system itself (via a feedback loop).
2 How to Parse a Graph Sequence
Throughout this work, a digraph refers to a directed graph with vertices in [n] := {1, . . . , n}
and a self-loop at each vertex. Graphs and digraphs (words we use interchangeably) have no
multiple edges. We denote digraphs by lower-case letters (g, h, etc) and use boldface symbols
for sequences. A digraph sequence g = (gk)k>0 is an ordered, finite or infinite, list of digraphs
over the vertex set [n]. The digraph gi × g j consists of all the edges (x, y) such that there exist
an edge (x, z) in gi and another one (z, y) in g j for at least one vertex z. The operation × is
associative but not commutative; it corresponds roughly to matrix multiplication. We define the
cumulant(cid:81)≤k g = g1×···×gk and write(cid:81) g = g1×g2×··· for finite g. The cumulant indicates
all the pairs of vertices that can be joined by a temporal walk of a given length. The mixing time
of a random walk on a (fixed) graph depends on the speed at which information propagates and,
in particular, how quickly the cumulant becomes transitive. In the time-varying case, mixing is
a more complicated proposition, but the emergence of transitive cumulants is still what guides
the parsing process.
An edge (x, y) of a digraph g is leading if there is u such that (u, x) is an edge of g but (u, y)
is not. The non-leading edges form a subgraph of g, which is denoted by tf (g) and called the
transitive front of g. For example, tf (x → y → z) is the graph over x, y, z with the single edge
x → y (and the three self-loops); on the other hand, the transitive front of a directed cycle over
three or more vertices has no edges besides the self-loops. We denote by cl(g) the transitive
closure of g: it is the graph that includes an edge (x, y) for any two vertices x, y with a path from
x to y. Note that tf (g) (cid:22) g (cid:22) cl(g).
• An equivalent definition of the transitive front is that the edges of tf (g) are precisely the
pairs (i, j) such that Ci ⊆ C j, where Ck denotes the set of vertices l such that (l, k) is an
edge of g. Because each vertex has a self-loop, the inclusion Ci ⊆ C j implies that (i, j) is
an edge of g. If g is transitive, then tf (g) = g. The set-inclusion definition of the transitive
front shows that it is indeed transitive: ie, if (x, y) and (y, z) are edges, then so is (x, z).
4
Given two graphs g, h over the same vertex set, we write g (cid:22) h if all the edges of g are in
h (with strict inclusion denoted by the symbol ≺). Because of the self-loops, g, h (cid:22) g × h.
• A third characterization of tf (g) is as the unique densest graph h over [n] such that g× h =
g: we call this the maximally-dense property of the transitive front, and it is the motivation
behind our use of the concept.
Indeed, the failure of subsequent graphs to grow the
cumulant implies a structural constraint on them. This is the sort of structure that parsing
attempts to tease out.
observation that, because of the self-loops, the cumulant(cid:81)≤k g is monotonically nondecreasing
The parser. The parse tree of a (finite or infinite) graph sequence g = (gk)k>0 is a rooted tree
whose leaves are associated with g1, g2, . . . from left to right. The purpose of the parse tree
is to monitor the formation of new temporal walks as time progresses. This is based on the
with k (with all references to graph ordering being relative to (cid:22)). If the increase were strict at
each step then the parse tree would look like a fishbone. But, of course, the increase cannot go
on forever. To continue to extract structure even when the cumulant is "stuck" is what parsing is
all about. The underlying grammar consists of three productions: (1a) and (1b) renormalize the
graph sequence along the time axis, while (2) creates the hierarchical clustering of the graphs in
the sequence g.
1. Temporal renormalization We express the sequence g in terms of minimal subse-
quences with cumulants equal to(cid:81) g. There is a unique decomposition
g = g1, gm1, . . . , gk, gmk , gk+1
(cid:1) × gmi
The two productions below create the temporal parse tree.
such that
(i) g1 = g1, . . . , gm1−1; gi = gmi−1+1, . . . , gmi−1 (1 < i ≤ k); and gk+1 = gmk+1, . . . .
=(cid:81) g, for any i ≤ k; and(cid:81) gi ≺(cid:81) g, for any i ≤ k + 1.
(ii) (cid:0)(cid:81) gi
• Transitivization. Assume that(cid:81) g is not transitive. We define h = tf ((cid:81) g) and note
that h ≺(cid:81) g. It follows from the maximally-dense property of the transitive front
that k = 1. Indeed, k > 1 implies that(cid:81) g = (cid:0)(cid:81) g2
(cid:1) × gm1
(cid:9) =
tf ((cid:81) g), which contradicts the non-transitivity of(cid:81) g. We have the production
(cid:0) (g2) (cid:52) h(cid:1),
(cid:1) × gm2 (cid:22) tf(cid:8)(cid:0)(cid:81) g1
g −→ (cid:0) g1
(cid:1) gm1
(1a)
In the parse tree, the node for g has three children: the first one serves as the root
of the temporal parse subtree for g1; the second one is the leaf associated with the
graph gm1; the third one is a special node annotated with the label h, which serves
as the parent v of the node w rooting the parse subtree for g2. The node w is la-
beled (implicitly) by the transitive graph cl((cid:81) g2), which serves as a coarse-grained
approximation of(cid:81) g2. The purpose of annotating a special node with the label h
is to provide an intermediate approximation of(cid:81) g2 that is strictly finer than the
"obvious" cl((cid:81) g). These coarse-grained approximations are called sketches.
5
• Cumulant completion. Assume that(cid:81) g is transitive. We have the production
(cid:0) gk+1
(cid:1).
(1b)
g −→ (cid:0) g1
(cid:1) gm1
(cid:0) g2
(cid:1) gm2 ···(cid:0) gk
(cid:1) gmk
Note that the index k may be infinite and any of the subsequences gi might be empty
(for example, gk+1 if k = ∞).
2. Topological renormalization Network renormalization exploits the fact that the infor-
mation flowing across the system might get stuck in portions of the graph for some period
of time: when this happens, we cluster the graphs using topological renormalization. As
we just discussed, each node v of the temporal parse tree that is not annotated by (1a)
is labeled by the sketch cl((cid:81) g), where g is the graph sequence formed by the leaves of
the subtree rooted at v. In this way, every path from the root of the temporal parse tree
comes with a nested sequence of sketches h1 (cid:23) ··· (cid:23) hl. Pick two consecutive ones,
hi, hi+1: these are two transitive graphs whose strongly connected components, therefore,
are cliques. Let V1, . . . , Va and W1, . . . , Wb be the vertex sets of the cliques corresponding
to hi and hi+1, respectively. Since hi+1 is a subgraph of hi, it follows that each Vi is a
disjoint union of the form Wi1 ∪ ··· ∪ Wisi .
• Decoupling. We decorate the temporal parse tree with an additional tree connecting
the sketches present along each one of its paths. These topological parse trees are
formed by all the productions of the type:
Vi −→ Wi1 ··· Wisi
.
(1)
A sketch at a node v of the temporal tree can be viewed as an acyclic digraph over
cliques: its purpose is to place limits on the movement of the probability mass in
any temporal random walk corresponding to the leaves of the subtree rooted at v. In
particular, it indicates how decoupling might arise in the system.
The maximum depth of the temporal parse tree is O(n2) because each child's cumulant loses
at least one edge from its parent's (or grandparent's) cumulant. To see why the quadratic bound
is tight, consider a bipartite graph V = L ∪ R, where L = R and each pair from L × R is added
one at a time as a bipartite graph with a single nonloop edge; the leftmost path of the parse tree
is of quadratic length.
Left-to-right parsing. The temporal tree can be built on-line by scanning the graph sequence
g with no need to back up. Let g(cid:48) denote the sequence formed by appending the graph g to the
end of the finite graph sequence g. If g is empty, then the tree T (g(cid:48)) consists of a root with one
child labeled g. If g is not empty and(cid:81) g ≺(cid:81) g(cid:48), the root of T (g(cid:48)) has one child formed by the
root of T (g) as well as a child labeled g. Assume now that g is not empty and that(cid:81) g =(cid:81) g(cid:48).
Let v be the lowest internal node on the rightmost path of T (g) such that cv × g = cv, where cu
denotes the product of the graphs associated with the leaves of the subtree rooted at node u of
T (g). Let w be the rightmost child of v; note that v and w always exist. We explain how to form
T (g(cid:48)) by editing T (g).
6
1. cv is transitive and w is a leaf: We add a leaf labeled g as the new rightmost child z of v if
g = cv; otherwise, we do the same but, instead of attaching g directly to v, we make it the
unique child of z.
2. cv is transitive and w is not a leaf: We add a leaf labeled g as the new rightmost child of v
if cw × g = cv; otherwise, we add a new rightmost child z to v and we give z two children:
its left child is w and its subtree below; its right child is a leaf labeled g.
3. cv is not transitive and w is a leaf: We attach a new rightmost child z to v, and we make it
a special node annotated with the label tf (cv). We give z a single child z(cid:48), which is itself
the parent of a new leaf labeled g.
4. cv is not transitive and w is not a leaf: We note that cw × g (cid:22) tf (cv) ≺ cv. We attach a new
rightmost child z to v, and we make it a special node annotated with the label tf (cv). We
give z a single child z(cid:48), to which we attach two children: one of them is w (and its subtree)
and the other one is the leaf labeled g.
Undirected graphs. A graph is called undirected if any edge (x, y) with x (cid:44) y comes with
its companion (y, x). Consider a sequence of undirected graphs over [n]. We begin with the
observation that the cumulant of a subsequence might itself be directed; for example, the product
g1×g2 = (x ↔ y z)×(x y ↔ z) has a directed edge from x to z but not from z to x. We can use
undirectedness to strengthen the definition of the transitive front. Recall that tf (g) is the unique
densest graph h such that g × h = g. Its purpose is the following: if g is the current cumulant,
the transitive front of g is intended to include any edge that might appear in subsequent graphs
in the sequence without extending any path in g. Since, in the present case, the only edges
considered for extension will be undirected, we might as well require that h itself (unlike g)
should be undirected. In this way, we redefine the transitive front, now denoted by utf (g), as
the unique densest undirected graph h such that g × h = g. Its edge set includes all the pairs
(i, j) such that Ci = C j. Because of self-loops, the condition implies that (i, j) is an undirected
edge of g. This forms an equivalence relation among the vertices, so that utf (g) actually consists
of disconnected, undirected cliques. To see the difference with the directed case, we take our
previous example and note that tf (g1 × g2) has the edges (x, y), (x, z), (y, z), (z, y) in addition to
the self-loops, whereas utf (g1 × g2) has the single undirected edge (y, z) plus self-loops.
The depth of the parse tree can still be as high as quadratic in n. To see why, consider the
following recursive construction. Given a clique Ck over k vertices x1, . . . , xk at time t, attach
to it, at time t + 1, the undirected edge (x1, y). The cumulant gains the undirected edge (x1, y)
and the directed edges (xi, y) for i = 2, . . . , k. At time t + 2, . . . , t + k, visit each one of the k − 1
undirected edges (x1, xi) for i > 1, using single-edge undirected graphs. Each such step will see
the addition of a new directed edge (y, xi) to the cumulant, until it becomes the undirected clique
Ck+1. The quadratic lower bound on the tree depth follows immediately.
Backward parsing. The sequence of graphs leads to products where each new graph is mul-
tiplied to the right, as would happen in a time-varying Markov chain. Algebraically, the matri-
ces are multiplied from left to right. In diffusive systems (eg, multiagent agreement systems,
Hegselmann-Krause models, Deffuant systems), however, matrices are multiplied from right to
7
left. Although the dynamics can be quite different, the same parsing algorithm can be used.
Given a sequence g = (gk)k>0, its backward parsing is formed by applying the parser to the
sequence ←−g = (hk)k>0, where hk is derived from gk by reversing the direction of every edge, ie,
(x, y) becomes (y, x). Once the parse tree for ←−g has been built, we simply restore each edge to
its proper direction to produce the backward parse tree of g.
3 The Markov Influence Model
Let Sn−1 (or S when the dimension is understood) be the standard simplex (cid:8) x ∈ Rn x ≥
0 , (cid:107)x(cid:107)1 = 1(cid:9) and let S denote set of all n-by-n rational stochastic matrices. A Markov in-
fluence system (MIS ) is a discrete-time dynamical system with phase space S, which is defined
by the map f : x(cid:62) (cid:55)→ f (x) := x(cid:62)S(x), where x ∈ S and S is a function S (cid:55)→ S that is constant
over the pieces of a finite polyhedral partition P ={Pk} of S; we define f as the identity on the
discontinuities of the partition (fig.2).
(i) We define the digraph g(x) (and its corresponding Markov chain) formed by the positive
entries of S(x). To avoid inessential technicalities, we assume that the diagonal of each S(x)
is strictly positive (ie, g(x) has self-loops). In this way, any orbit of an MIS corresponds to a
lazy, time-varying random walk with transitions defined endogenously.1 We recall some basic
terminology. The orbit of x ∈ S is the infinite sequence ( f t(x))t≥0 and its itinerary is the corre-
sponding sequence of cells Pk visited in the process. The orbit is periodic if f t(x) = f s(x) for
any s = t modulo a fixed integer. It is asymptotically periodic if it gets arbitrarily close to a
periodic orbit over time.
Figure 2: A Markov influence system: each region Pk is associated with a single stochastic matrix. The
first five steps of an orbit are shown to visit regions P1, P2, P4, P4, P5 in this order.
(ii) The discontinuities in P are formed by hyperplanes in Rn of the form a(cid:62)
i x = 1 + δ,
where δ is confined to an interval Ω := [−ω, ω]. Assuming general position, we can pick a
1As discussed in the introduction, to access the full power of first-order logic in the stepwise choice of digraphs
requires nonlinear partitions, but these can be linearized by a suitable tensor construction [7].
8
small positive ω < 1/2 so that P remains (topologically) the same over Ω.2 Thus, the MIS
remains well-defined for all δ ∈ Ω. As we show in Section 5, the parameter δ is necessary to
keep chaos at bay.
(iii) The coefficient of ergodicity τ(M) of a matrix M is defined as half the maximum (cid:96)1-
distance between any two of its rows [31]. It is submultiplicative for stochastic matrices, a direct
consequence of the identity τ(M) = max
(cid:110)(cid:107)x(cid:62)M(cid:107)1 : x(cid:62)1 = 0 and (cid:107)x(cid:107)1 = 1
(cid:111)
.
(iv) Given ∆ ⊆ Ω, let Lt
∆ denote the set of t-long prefixes of any itinerary for any starting
position x ∈ S and any δ ∈ ∆. We define the ergodic renormalizer η∆ as the smallest integer
such that, for any t ≥ η∆ and any matrix sequence S1, . . . , St associated with an element of
∆, the product S1 ··· St is primitive (ie, some high enough power is a positive matrix) and its
Lt
coefficient of ergodicity is less than 1/2. We assume in this section that η := ηΩ < ∞ and
discuss in Section 4 how to relax this assumption via renormalization. Let D be the union of
0≤k≤t f −k(D) and
t≥0 Zt. Note that Z ⊆ S since the latter is the domain of f . Remarkably, for almost all
the hyperplanes from P in Rn (where δ is understood). We define Zt = (cid:83)
Z = (cid:83)
δ ∈ Ω, Zt becomes strictly equal to Z in a finite number of steps.3
Lemma 3.1. There is a constant c > 0 such that, for any ε > 0, there exists an integer ν ≤
2ηc log(1/ε) and a finite union K of intervals of total length less than ε such that Zν = Zν−1, for
any δ ∈ Ω \ K.
Note that Zν = Zν−1 implies that Z = Zν. Indeed, suppose that Zt+1 ⊃ Zt for t ≥ ν; then,
f t+1(y) ∈ D but f t(y) (cid:60) D for some y ∈ S; in other words, f ν(x) ∈ D but f ν−1(x) (cid:60) D for
x = f t−ν+1(y), which contradicts the equality Zν = Zν−1.
Corollary 3.2. For δ almost everywhere in Ω,4 every orbit is asymptotically periodic.
Proof. The equality Z = Zν implies the eventual periodicity of the symbolic dynamics. The
period cannot exceed the number of connected components in the complement of Z. Once an
itinerary becomes periodic at time to with period σ, the map f t can be expressed locally by
matrix powers. Indeed, divide t − to by σ and let q be the quotient and r the remainder; then,
locally, f t = gq ◦ f to+r, where g is specified by a stochastic matrix with a positive diagonal,
bidden" intervals. Define Kl = (cid:83)
which implies convergence to a periodic point at an exponential rate. Finally, apply Lemma 3.1
repeatedly, with ε = 2−l for l = 1, 2, . . . and denote by Kl be the corresponding union of "for-
l>0 Kl; then Leb(Kl) ≤ 21−l and hence
Leb(K∞) = 0. The lemma follows from the fact that any δ ∈ Ω outside of K∞ lies outside of Kl
(cid:3)
for some l > 0.
2Let Hδ be the set consisting of the hyperplane(cid:80)
on the set of vectors {ai}. Note that this problem arises only because of the constraint(cid:80)
i xi = 1 together with those used to define P. We assume that
H0 is in general position; hence so is Hδ for any δ ∈ Ω, where 0 < ω < 1/2 is smaller than a value that depends only
i xi = 1, since otherwise the
hyperplane arrangement is central around (0, . . . , 0,−1).
3Recall that both Z and Zt depend on δ ∈ Ω. All the constants used in this work may depend on the system's
parameters such as n, P (but not on δ). Dependency on other parameters is indicated by a subscript.
j≥l K j and K∞ = (cid:84)
4Meaning outside a subset of Ω of Lebesgue measure zero.
9
The corollary states that the set of "nonperiodic" values of δ has measure zero in parameter
space. Our result is actually stronger than that. We prove that the nonperiodic set can be covered
by a Cantor set of Hausdorff dimension strictly less than 1. The remainder of this section is
devoted to a proof of Lemma 3.1.
3.1 Shift spaces and growth rates
The growth exponent of a language is defined as limn→∞ 1
n maxk≤n log N(k), where N(k) is the
number of words of length k; for example, the growth exponent of {0, 1}∗ is 1 (all logarithms
taken to the base 2). The language consisting of all the itineraries of a Markov influence sys-
tem forms a shift space and its growth exponent is the topological entropy of its symbolic
dynamics [33] -- not to be confused with the topological entropy of the MIS itself. It can be
strictly positive, which is a sign of chaos. We show that, for a typical system, it is zero, the
key fact underlying periodicity. Let M1, . . . , MT be n-by-n matrices from a finite set M of
primitive stochastic rational matrices with positive diagonals, and assume that τ(M) < 1/2
for M ∈ M; hence τ(M1 ··· Mk) < 2−k. Because each product M1 ··· Mk is a primitive ma-
trix, it can be expressed as 1π(cid:62)
+ Qk (by Perron-Frobenius), where πk is its (unique) sta-
tionary distribution.5 If π is a stationary distribution for a stochastic matrix S , then its j-th
i πi(s j − si); hence, by the triangular inequality,
row s j satisfies s j − π(cid:62) = s j − π(cid:62)S = (cid:80)
(cid:107)s j − π(cid:62)(cid:107)1 ≤(cid:80)
M1 ··· Mk = 1π(cid:62)
i πi(cid:107)s j − si(cid:107)1 ≤ 2τ(S ). This implies that
(cid:107)Qk(cid:107)∞ ≤ 2τ(M1 ··· Mk) < 21−k.
(2)
+ Qk
k
k
Property U. Fix a vector a ∈ Qn, and denote by M (θ) the n-by-m matrix with the m column
vectors M1 ··· Mki a, where θ = (k1, . . . , km) is an increasing sequence of integers in [T]. We
say that property U holds if there exists a rational vector u = u(θ) such that 1(cid:62)u = 1 and
x(cid:62)M (θ)u does not depend on the variable x ∈ S.6 Property U is a quantifier elimination device
for expressing a notion of "general position" for an MIS. To see why, consider a simple statement
such as "the three points(cid:0)x, x2(cid:1),(cid:0)x + 1, (x + 1)2(cid:1), and(cid:0)x + 2, (x + 2)2(cid:1) cannot be collinear for
any value of x." This can be expressed by saying that a certain determinant polynomial in x
is constant. Likewise, the vector u manufactures a quantity, x(cid:62)M (θ)u, that "eliminates" the
variable x. Some condition on u is needed since otherwise we could pick u = 0. Note that
property U would be obvious if all the matrices Qk in (2) were null: indeed, we would have
x(cid:62)M (θ) = x(cid:62)1(b1, . . . , bm) = (b1, . . . , bm), where bi = π(cid:62)
a. This suggests that property U rests
ki
on the decaying properties of Qk.
To see the relevance of general position to the dynamics of an MIS, consider the iterates of a
small ball through the map f . To avoid chaos, it is intuitively obvious that these iterated images
should not fall across discontinuities too often. Fix such a discontinuity: if we think of the ball
(cid:1) are both primitive but their product is not.
(cid:1) and(cid:0) 0 1
(cid:0) 1 1
x(cid:62)(cid:0)11(cid:62)(cid:1) u = 1 for u = 1
1 1
1 0
n 1.
5Positive diagonals play a key role here because primitiveness is not closed under multiplication: for example,
6Because x is a probability distribution, property U does not imply that M (θ)u = 0; for example, we have
10
as being so small it looks like a point, then the case we are trying to avoid consists of many
points (the ball's iterates) lying on (or near) a given hyperplane. This is similar to the definition
of general position, which requires that a set of point should not lie on the same hyperplane.
Lemma 3.3. There exists a constant b > 0 (linear in n) such that, given any integer T > 0 and
any increasing sequence θ in [T] of length at least T 1−α/α, property U holds, where α := µ−b
and µ is the maximum number of bits needed to encode any entry of Mk for any k ∈ [T].
Proof. By choosing b large enough, we can ensure that T is as big as we want. The proof is
a mixture of algebraic and combinatorial arguments. We begin with a Ramsey-like statement
about stochastic matrices.
Fact 3.4. There is a constant d > 0 such that, if the sequence θ contains j0, . . . , jn with ji ≥
dµ ji−1 for each i ∈ [n], then property U holds.
Proof. By (2), (cid:107)Qka(cid:107)∞ < c02−k for constant c0 > 0. Note that Qk has rational entries over O(µk)
bits: the bound follows from the fact that the stationary distribution πk has rational coordinates
over O(µk) bits; as noted earlier, the constant factors may depend on n. We write M (θ) =
1a(cid:62)Π (θ) + Q (θ), where Π (θ) and Q (θ) are the n-by-m matrices formed by the m column vectors
πki and Qkia, respectively, for i ∈ [m]; recall that θ = (k1, . . . , km). The key fact is that the
dependency on x ∈ S is confined to the term Q (θ): indeed,
x(cid:62)M (θ)u = a(cid:62)Π (θ)u + x(cid:62)Q (θ)u.
(3)
This shows that, in order to satisfy property U, it is enough to ensure that Q (θ)u = 0 has a
solution such that 1(cid:62)u = 1. Let σ = ( j0, . . . , jn−1). If Q (σ) is nonsingular then, because each
one of its entries is a rational over O(µ jn−1) bits, we have det Q (σ) ≥ cµ jn−1
, for constant c1 > 0.
Let R be the (n + 1)-by-(n + 1) matrix derived from Q (σ) by adding the column Q jna to its right
and then adding a row of ones at the bottom. If R is nonsingular, then R u = (0, . . . , 0, 1)(cid:62) has
a (unique) solution in u and property U holds (after padding u with zeroes). Otherwise, we
expand the determinant of R along the last column. Suppose that det Q (σ) (cid:44) 0. By Hadamard's
inequality, all the cofactors are at most a constant c2 > 0 in absolute value; hence, for d large
enough,
1
0 = det R ≥ det Q (σ) − nc2(cid:107)Q jna(cid:107)∞ ≥ cµ jn−1
− nc2c02− jn > 0.
1
This contradiction implies that Q (σ) is singular, so (at least) one of its rows can be expressed as
a linear combination of the others. We form the n-by-n matrix R(cid:48) by removing that row from R,
= 0 to rewrite Q (θ)u = 0 as R(cid:48)u(cid:48) = (0, . . . , 0, 1)(cid:62),
together with the last column, and setting u jn
where u(cid:48) is the restriction of u(cid:48) to the columns indexed by R(cid:48). Having reduced the dimension
of the system by one variable, we can proceed inductively in the same way; either we terminate
with the discovery of a solution or the induction runs its course until n = 1 and the corresponding
1-by-1 matrix is null, so that the solution 1 works. Note that u has rational coordinates over
(cid:3)
O(µT) bits.
Let N(T) be the largest sequence θ in [T] such that property U does not hold. Divide [T]
into bins [(dµ)k, (dµ)k+1 − 1] for k ≥ 0. By Fact 3.4, the sequence θ can intersect at most
11
2n of them; thus, if T > t0, for some large enough t0 = (dµ)O(n), there is at least one empty
interval in T of length T/(dµ)2n+3. This gives us the recurrence N(T) ≤ T for T ≤ t0 and
N(T) ≤ N(T1) + N(T2), where T1 + T2 ≤ βT, for a positive constant β = 1 − (dµ)−2n−3. The
recursion to the right of the empty interval, say, N(T2), warrants a brief discussion. The issue is
that the proof of Fact 3.4 relies crucially on the property that Qk has rational entries over O(µk)
bits -- this is needed to lower-bound det Q (σ) when it is not 0. But this is not true any more,
because, after the recursion, the columns of the matrix M (θ) are of the form M1 ··· Mk a, for
T1 + L < k ≤ T, where L is the length of the empty interval and T = T1 + L + T2. Left as such,
the matrices use too many bits for the recursion to go through. To overcome this obstacle, we
observe that the recursively transformed M (θ) can be factored as AB, where A = M1 ··· MT1+L
and B consists of the column vectors MT1+L+1 ··· Mk a. The key observation now is that, if
x(cid:62)B u does not depend on x, then neither does x(cid:62)M (θ) u, since it can be written as y(cid:62)B u where
y = A(cid:62)x ∈ S. In this way, we can enforce property U while having restored the proper encoding
length for the entries of M (θ).
Plugging in the ansatz N(T) ≤ t0T γ, for some unknown positive γ < 1, we find by Jensen's
2 ) ≤ t021−γβγT γ. For the ansatz to hold true, we
inequality that, for all T > 0, N(T) ≤ t0(T γ
need to ensure that 21−γβγ ≤ 1. Setting γ = 1/(1−log β) < 1 completes the proof of Lemma 3.3.
(cid:3)
hyperplane in Rn. We consider a set of canonical intervals of length ρ (or less): Dρ =(cid:8) [kρ, (k +
1)ρ] ∩ Ω k ∈ Z(cid:9), where ρ > 0 (specified below), Ω = ωI, I := [−1, 1], and 0 < ω < 1/2.
Define φk(x) = x(cid:62)M1 ··· Mk for x ∈ Rn and k ≤ T; and let hδ : a(cid:62)x = 1 + δ be some
Roughly, the "general position" lemma below says that, for most δ, the φk-images of any ρ-wide
cube centered in the simplex S cannot come very near the hyperplane hδ for most values of
k ≤ T. This may be counterintuitive. After all, if the stochastic matrices Mi are the identity, the
images stay put, so if the initial cube collides then all of the images will! The point is that Mi
is primitive so it cannot be the identity. The low coefficients of ergodicity will also play a key
role. The crux of the lemma is that the exclusion set U does not depend on the choice of x ∈ S.
A point of notation: α refers to its use in Lemma 3.3.
Lemma 3.5. For any real ρ > 0 and any integer T > 0, there exists U ⊆ Dρ of size cT = 2O(µT),
where cT is independent of ρ, such that, for any ∆ ∈ Dρ\U and x ∈ S, there are at most T 1−α/α
integers k ≤ T such that φk(X) ∩ h∆ (cid:44) ∅, where X = x + ρIn and h∆ :=(cid:83)
+ T γ
1
δ∈∆ hδ.
Proof. In what follows, b0, b1, . . . refer to suitably large positive constants (which, we shall
recall, may depend on n, a, etc). We assume the existence of more than T 1−α/α integers k ≤ T
such that φk(X) ∩ h∆ (cid:44) ∅ for some ∆ ∈ Dρ and draw the consequences: in particular, we infer
certain linear constraints on δ; by negating them, we define the forbidden set U and ensure the
conclusion of the lemma. Let k1 < ··· < km be the integers in question, where m > T 1−α/α. For
each i ∈ [m], there exists x(i) ∈ X and δi ∈ ∆ such that x(i)(cid:62)M1 ··· Mkia − 1 − δi ≤ ρ. Note
that δi − δ ≤ ρ for some δ ∈ ∆ common to all i ∈ [m]. By the stochasticity of the matrices,
By Lemma 3.3, there is a rational vector u such that 1(cid:62)u = 1 and x(cid:62)M (θ)u = ψ(M (θ), a) does
not depend on the variable x ∈ S; on the other hand, x(cid:62)M (θ)u − (1 + δ) ≤ b1ρ. Two quick
remarks: (i) the term 1 + δ is derived from (1 + δ)1(cid:62)u = 1 + δ; (ii) b1 ≤ (b0 + 2)(cid:107)u(cid:107)1, where
it follows that (cid:0)x(i) − x(cid:1)(cid:62)M1 ··· Mkia ≤ b0 ρ; hence x(cid:62)M1 ··· Mkia − 1 − δ ≤ (b0 + 2)ρ.
12
u is a rational over O(µT) bits. We invalidate the condition on k1, . . . , km by keeping δ outside
the interval ψ(M (θ), a) − 1 + b1ρI, which rules out at most 2(b1 + 1) = 2O(µT) intervals from Dρ.
Repeating this for all sequences (k1, . . . , km) raises the number of forbidden intervals by a factor
(cid:3)
of at most 2T .
Topological entropy. We identify the family M with the set of all matrices of the form
S1 ··· Sk, for η ≤ k ≤ 3η (η = ηΩ), where the matrix sequence S1, . . . , Sk matches some ele-
Ω. By definition of the ergodic renormalizer, any M ∈ M is primitive and τ(M) < 1/2;
ment of Lk
furthermore, both µ and logM are in O(η). Our next result shows that the topological entropy
of the shift space of itineraries vanishes.
Lemma 3.6. For any real ρ > 0 and any integer T > 0, there exist tρ = O(η log ρ) and an
exclusion set V ⊆ Dρ of size dT = 2O(T) such that, for any ∆ ∈ Dρ\V, any integer t ≥ tρ, and
any σ ∈ Lt
(cid:9)(cid:12)(cid:12)(cid:12) ≤ ηbT 1−η−b, for constant b > 0.
∆, log
(cid:12)(cid:12)(cid:12)(cid:8) σ(cid:48) σ · σ(cid:48) ∈ Lt+T
∆
Proof.
In the lemma, tρ (resp. dT ) is independent of T (resp. ρ). The main point is that
the exponent of T is bounded away from 1. We define V as the union of the sets U formed
by applying Lemma 3.5 to each one of the hyperplanes hδ involved in P and every possible
phase space S× ∆ for the dynamical system induced by the map f↑ :(cid:0)x(cid:62), δ) (cid:55)→ ( x(cid:62)S(x), δ(cid:1). The
sequence of T matrices in M. This increases cT to 2O(ηT). Fix ∆ ∈ Dρ\V and consider the (lifted)
system is piecewise-linear with respect to the polyhedral partition P↑ of Rn+1 formed by treating
δ as a variable in hδ. Let Υt be a continuity piece for f t↑, ie, a maximal region of S × ∆ over
which the t-th iterate of f↑ is linear. Reprising the argument leading to (2), any matrix sequence
S1, . . . , St matching an element of Lt
∆ is such that S1 ··· St = 1π(cid:62) + Q, where
(cid:107)Q(cid:107)∞ < 22−t/η.
(4)
Thus there exists tρ = O(η log ρ) such that, for any t ≥ tρ, f t↑(Υt) ⊆ (x + ρIn) × ∆, for some
x = x(t, Υt) ∈ S. Consider a nested sequence Υ1 ⊇ Υ2 ⊇ ··· . Note that Υ1 is a cell of P↑,
f k↑ (Υk+1) ⊆ f k↑ (Υk), and Sl is the stochastic matrix used to map f l−1↑
(Υl) to f l↑(Υl) (ignoring the
δ-axis). We say there is a split at k if Υk+1 ⊂ Υk, and we show that, given any t ≥ tρ, there
are only O(ηT 1−α/α) splits between t and t + ηT, where α = η−b, for constant b.7 We may
confine our attention to splits caused by the same hyperplane hδ since P features only a constant
number of them. Arguing by contradiction, we assume the presence of at least 6ηT 1−α/α splits,
which implies that at least N := 2T 1−α/α of those splits occur for values of k at least 2η apart.
This is best seen by binning [t + 1, t + ηT] into T intervals of length η and observing that at
least 3N intervals must feature splits. In fact, this proves the existence of N splits at positions
separated by a least two consecutive bins. Next, we use the same binning to produce the matrices
M1, . . . , MT , where M j = St+1+( j−1)η ··· St+ jη.
Suppose that all of the N splits occur for values k of the form t + jη. In this case, a straight-
forward application of Lemma 3.5 is possible: we set X × ∆ = f t↑(Υt) and note that the functions
7We may have to scale b up by a constant factor since µ = O(η) and, by Lemma 3.3, α = µ−b.
13
φk are all products of matrices from the family M, which happen to be η-long products. The
number of splits, 2T 1−α/α, exceeds the number allowed by the lemma and we have a contra-
diction. If the splits do not fall neatly at endpoints of the bins, we use the fact that M includes
matrix products of any length between η and 3η. This allows us to reconfigure the bins so as to
form a sequence M1, . . . , MT with the splits occurring at the endpoints: for each split, merge its
own bin with the one to its left and the one to its right (neither of which contains a split) and use
the split's position to subdivide the resulting interval into two new bins; we leave all the other
bins alone.8 This leads to the same contradiction, which implies the existence of fewer than
O(ηT 1−α/α) splits at k ∈ [t, t + ηT]; hence the same bound on the number of strict inclusions
in the nested sequence Υt ⊇ ··· ⊇ Υt+ηT . The set of all such sequences forms a tree of depth
ηT, where each node has at most a constant number of children and any path from the root has
O(ηT 1−α/α) nodes with more than one child. Rescaling T to ηT and raising b completes the
(cid:3)
proof.
3.2 Proof of Lemma 3.1
We show that the nonperiodic δ-intervals can be covered by a Cantor set of Hausdorff dimension
less than one. All the parameters below refer to Lemma 3.6. We fix ε > 0 and ∆ ∈ Dρ\V and
assume that δ ∈ ∆. Set T = 2η2b, ρ = ε/(2dT ), and ν = tρ + kT, where k = cη log(1/ρ) for a large
enough constant c > 0. Since tρ = O(η log ρ) and dT = 2O(T), we have
ν = 2ηO(1) log(1/ε).
(5)
Let M be the matrix S1 ··· Sν, where S1, . . . , Sν the matrix sequence matching an element of Lν
∆.
By (4), diam(cid:96)∞(S M) ≤ 22−ν/η. There exists a point xM such that, given any point y ∈ S whose ν-
th iterate f ν(y) = zT is specified by the matrix M, that is, zT = yT M, we have (cid:107)xM−y(cid:107)∞ ≤ 22−ν/η.
Consider a discontinuity hδ : a(cid:62)
i x = 1 + δ of the system. Testing which side of it the point z lies
is equivalent to checking the point xM instead with respect to hδ(cid:48) for some δ(cid:48) that differs from δ
by O(2−ν/η). It follows that adding an interval of length O(2−ν/η) to the exclusion set V ensures
that all the ν-th iterates f ν(y) (specified by M) lie strictly on the same side of hδ for all δ ∈ ∆.
∆ and every ∆ ∈ Dρ\V increases the length covered by V from
Repeating this for every string Lν
∆2−ν/η/ρ) < ε. This last bound follows from the
its original dT ρ = ε/2 to at most dT ρ + O(Lν
consequence of Lemma 3.6 that logLν
∆ ≤ kηbT 1−η−b + O(tρ). Thus, for any δ ∈ Ω outside a set
of intervals covering a length less than ε, no f ν(x) lies on a discontinuity. It follows that, for any
(cid:3)
such δ, we have Zν = Zν−1 and, by (5), the proof is complete.
4 Applications
We can use the renormalization and bifurcation analysis techniques developed above to resolve
several important families of MIS. We discuss two simple cases here.
8We note the possibility of an inconsequential decrease in T caused by the merges. Also, we can now see clearly
why Lemma 3.5 is stated in terms of the slab h∆ and not the hyperplane hδ. This allows us to express splitting caused
by the hyperplane a(cid:62)x = 1 + δ in lifted space Rn+1.
14
Irreducible systems
4.1
A Markov influence system is called irreducible if the Markov chain g(x) is irreducible for all
x ∈ S; given the assumed presence of self-loops, each chain is ergodic. All the digraphs g(x)
of an irreducible MIS are strongly connected. Every step from the beginning sees growth in the
cumulant until it is a clique. To see why, assume by contradiction that the cumulant fails to
<k g =(cid:81)≤k g for k ≤ m1, where m1 is the smallest index for which
grow at an earlier step, ie,(cid:81)
(cid:81)≤m1 g is a clique. If so, then gk is a subgraph of tf ((cid:81)
(cid:81)
<k g). Because the latter is transitive and it
has in gk a strongly connected subgraph that spans all the vertices, it must be a clique; therefore
<m1 g is a clique, which contradicts our assumption. Because m1 ≤ n, each product of at most
n graphs is a clique, so its coefficient of ergodicity is at most 1 − γ, for γ > 0. Since the number
of distinct matrices is finite, their positive entries are uniformly bounded away from zero; hence
ηΩ is bounded from below by a positive constant (which may depend on n). By Lemma 3.1 and
Corollary 3.2, we conclude with:
Theorem 4.1. Typically, every orbit of an irreducible Markov influence system is asymptotically
periodic.
4.2 Weakly irreducible systems
We strengthen the previous result by assuming a fixed partition of the vertices such that each
digraph g(x) consists of disjoint strongly connected graphs defined over the subsets V1, . . . , Vl
of the partition. This means that no edges ever join two distinct Vi, V j and, within each Vi,
the graphs are always strongly connected with self-loops. Irreducible systems correspond to
the case l = 1. What makes weak irreducibility interesting is that the systems are not simply
the union of independent irreducible systems. Indeed, communication flows among states in
two ways: (i) directly, vertices collect information from incoming neighbors to update their
states; and (ii) indirectly, via the polyhedral partition P, the sequence of graphs for Vi may be
determined by the current states within other groups V j. In the extreme case, we can have the
co-evolution of two systems V1 and V2, each one depending entirely on the other one yet with
no links between the two of them. If the two subsystems were independent, their joint dynamics
could be expressed as a direct sum and resolved separately. This cannot be done, in general, and
the bifurcation analysis requires some modifications.
By using topological renormalization, we can partition the vertex set [n] into l subsets and
deal with each one separately. For the bifurcation analysis, Fact 3.4 relies on the rank-l expan-
sion
l(cid:88)
(cid:16)(cid:88)
(cid:17)
x(cid:62)M (θ) =
a(cid:62)Π (θ)
i
+ x(cid:62)Q (θ) ,
i=1
x j
j∈Vi
i=1 1Viπ(cid:62)
where (i) M1 ··· Mk =(cid:80)l
dependency is confined to the sums si :=(cid:80)
+ Qk; (ii) all vectors 1Vi and πi,k have support in Vi; (iii) Qk
is block-diagonal and (cid:107)Qk(cid:107)∞ < 21−k; (iv) Π (θ)
and Q (θ) are formed, respectively, by the column
vectors πi,k j and Qk ja for j ∈ [m], with θ = (k1, . . . , km). Property U no longer holds, however:
if l > 1, indeed, it is no longer true that x(cid:62)M (θ)u is independent of the variable x ∈ S. The
j∈Vi x j for i ∈ [l]. The key observation is that these
sums are time-invariant. We assume them to be rational and we redefine the phase space as
i,k
i
15
the invariant manifold(cid:81)l
(cid:0)si SVi−1(cid:1). The rest of the proof mimics the irreducible case, whose
conclusion therefore still applies.
i=1
Theorem 4.2. Typically, every orbit of a weakly irreducible Markov influence system is asymp-
totically periodic.
5 Hyper-Torpid Mixing and Chaos
Among the MIS that converge to a single stationary distribution, we show that the mixing time
the MIS
can be super-exponential. Very slow clocks can be designed in the same manner:
is periodic with a period of length equal to a tower-of-twos. The creation of new timescales
is what most distinguishes MIS from standard Markov chains. As we mentioned earlier, the
system can be chaotic. We prove all of these claims below.
5.1 A super-exponential mixer
How can reaching a fixed point distribution take so long? Before we answer this question for-
mally, we provide a bit of intuition. Imagine having three unit-volume water reservoirs A, B, C
alongside a clock that rings at noon every day. Initially, the clock is at 1pm and A is full while
B and C are empty. Reservoir A transfers half of its content to B and repeats this each hour until
the clock rings noon. At this point, reservoir A empties into C the little water that it has left
and B empties its content into A. At 1pm, we resume what we did the day before at the same
hour, ie, A transfers half of its water content to B, etc. This goes on until some day, the noon
hour rings and reservoir C finds its more than half full. (Note that the water level of C rises by
about 10−3 every day.) At this point, both B and C transfer all their water back to A, so that at
1pm on that same day, we are back to square one. The original 12-step clock has been extended
into a new clock of period roughly 1,000. The proof below shows how to simulate this iterative
process with an MIS.
Theorem 5.1. There exist Markov influence systems that mix to a stationary distribution in time
equal to a tower-of-twos of height linear in the number of states.
Proof. We construct an MIS with a periodic orbit of length equal to a power-of-twos of height
proportional to n; this is the function f (n) = 2 f (n−1), with f (1) = 1. It is easy to turn it into
one with an orbit that is attracted to a stationary distribution (a fixed point) with an equivalent
mixing rate, and we omit this part of the discussion. Assume, by induction, that we have a
Markov influence system M cycling through states 1, . . . , p, for p ≥ 4. We build another one
with period at least 2p by adding a "gadget" to it consisting of a graph over the vertices 1, 2, 3
with probability distribution (x, y, z) ∈ S. We initialize the system by placing M in state 1 (ie,
1pm in our clock example) and setting x = 1. The dynamic graph is specified by these rules:
1. Suppose that M is in state 1, . . . , p − 1. The graph has the edge (1, 2), which is assigned
probability 1/2, as is the self-loop at 1. There are self-loops at 2 and 3.
16
2. Suppose that M is in state p. If z ≤ 1/2, then the graph has the edge (2, 1) and (1, 3), both
of them assigned probability 1, with one self-loop at 3. If z > 1/2, then the graph has the
edge (2, 1) and (3, 1), both of them assigned probability 1, with one self-loop at 3.
Suppose that M is in state 1 and that y = 0 and z ≤ 1/2. When M reaches state p − 1, then
x = (1 − z)21−p and y = (1 − z)(1 − 21−p). Since z ≤ 1/2, the system cycles back to state 1 with
the updates z ← x + z and x ← y. Note that z increases by a number between 2−p and 21−p.
Since z begins at 0, such increases will occur consecutively at least p2p/4 ≥ 2p times, before x
is reset to 1. The construction on top of M adds three new vertices so we can push this recursion
roughly n/3 times to produce a Markov influence system that is periodic with a period of length
equal to a tower-of-twos of height roughly n/3.
We need to tie up a few loose ends. The construction needs to recognize state p − 1 by
a polyhedral cell; in fact, any state will do. The easiest choice is state 1, which corresponds
to x ≥ 1 (to express it as an inequality). The base case of our inductive construction consists
of a two-vertex system of period p = 4 with initial distribution (1, 0). If x > 21−p, the graph
has an edge from 1 to 2 and a self-loop at 1, both of them assigned probability 1/2; else an
edge from 2 to 1 given probability 1 to reset the system. Finally, the construction assumes
probabilities summing up to 1 within each of the (cid:98)(n−2)/3(cid:99) +1 gadgets, which is clearly wrong:
we fix this by dividing the probability weights equally among the gadget and adjusting the linear
(cid:3)
discontinuities appropriately.
5.2 Chaos
We give a simple 5-state construction with chaotic symbolic dynamics. The idea is to build an
MIS that simulates the classic baker's map.
1
y ←
2(y + 1)
2y
y+1
if y < −1
if −1 ≤ y ≤ 0.
Writing z = (y + 1)/(y − 1), we note that −1 ≤ z < 1 and it evolves according to z (cid:55)→ 2z + 1 if
z ≤ 0, and z (cid:55)→ 2z− 1 otherwise, a map that conjugates with the baker's map and is known to be
chaotic [14].
17
2
0
0
0
0
A =
1
3
if x1 + x2 > x4
1 0 0
1 2 0
0 3 0
0 0 2
0 0 0
0
0
0
1
3
and
B =
for x ∈ S4. We focus our attention on Σ =(cid:8) (x1, x2, x4) 0 < x1 ≤ x4/2 ≤ x2 < x4
check that it is an invariant manifold. At time 0, we fix x4 = 1/4 and x5 = 0; at all times, of
course, x3 = 1 − x1 − x2 − x4 − x5. The variable y:= (2x2 − x4)/(2x1 − x4) is always nonpositive
over Σ. It evolves as follows:
1
1
0
0
0
1
3
0
2
0
0
0
2
0
3
0
0
0
0
0
2
0
else,
(cid:9), and easily
0
0
0
1
3
Acknowledgments
I wish to thank Maria Chudnovsky and Ramon van Handel for helpful comments.
References
[1] Anagnostopoulos, A., Kumar, R., Mahdian, M., Upfal, E., Vandin, F. Algorithms on evolving
graphs, Proc. 3rd Innovations in Theoretical Computer Science ITCS (2012) 149 -- 160.
[2] Avin, C., Kouck´y, M., Lotker, Z. How to explore a fast-changing world (cover time of a simple
random walk on evolving graphs), Proc. 35th ICALP (2008), 121 -- 132.
[3] Barrat, A., Barth´elemy, M., Vespignani, A. Dynamical Processes on Complex Networks, Cam-
bridge University Press, 2008.
[4] Bruin, H., Deane, J.H.B. Piecewise contractions are asymptotically periodic, Proc. American
Mathematical Society 137, 4 (2009), 1389 -- 1395.
[5] Cao, M., Spielman, D.A. Morse, A.S. A lower bound on convergence of a distributed network
consensus algorithm, 44th IEEE Conference on Decision and Control, and the European Control
Conference, Seville, Spain (2005), 2356 -- 2361.
[6] Castellano, C., Fortunato, S., Loreto, V. Statistical physics of social dynamics, Rev. Mod. Phys. 81
(2009), 591 -- 646.
[7] Chazelle, B. Diffusive influence systems, SIAM J. Comput. 44 (2015), 1403 -- 1442.
[8] Chazelle, B. Jiu, Q., Li, Q., Wang, C. Well-posedness of the limiting equation of a noisy consensus
model in opinion dynamics, J. Differential Equations 263 (2017), 365 -- 397.
[9] Condon, A., Hernek, D. Random walks on colored graphs, Random Structures and Algorithms 5
(1994), 285 -- 303.
[10] Condon, A., Lipton, R.J. On the complexity of space bounded interactive proofs, Proc. 30th IEEE
Symp. on Foundations of Computer Science (1989), 462 -- 267.
[11] Coppersmith, D., Diaconis, P. Random walk with reinforcement (1986), Unpublished manuscript.
[12] Denysyuk, O., Rodrigues, L. Random walks on directed dynamic graphs, Proc. 2nd International
Workshop on Dynamic Networks: Algorithms and Security (DYNAS10), Bordeaux, France, July,
2010. Also arXiv:1101.5944 (2011).
[13] Denysyuk, O., Rodrigues, L. Random walks on evolving graphs with recurring topologies, Proc.
28th International Symposium on Distributed Computing (DISC), Austin, Texas, USA, October
2014.
[14] Devaney, R.L. An Introduction to Chaotic Dynamical Systems, 2nd edition, Westview Press, 2003.
[15] Diaconis, P. Recent progress on de Finetti's notions of exchangeability, Bayesian Statistics 3
(1988).
[16] Fagnani, F., Frasca, P. Introduction to Averaging Dynamics over Networks, Lecture Notes in Con-
trol and Information Sciences, 472, Springer, 2018.
18
[17] Frank, T.D. Strongly nonlinear stochastic processes in physics and the life sciences, ISRN Mathe-
matical Physics 2013, Article ID 149169 (2013).
[18] Holme, P., Modern temporal networks theory: a colloquium, European Physical Journal B, 88, 234
(2015).
[19] Holme, P., Saramaki, J. Temporal networks, Physics Reports 519 (2012), 97 -- 125.
[20] Iacobelli, G., Figueiredo, D.R. Edge-attractor random walks on dynamic networks, J. Complex
Networks 5 (2017), 84 -- 110.
[21] Katok, A., Hasselblatt, B. Introduction to the Modern Theory of Dynamical Systems, Cambridge
University Press; revised ed. edition (December 28, 1996).
[22] Kempe, D., Kleinberg, J. Kumar, A. Connectivity and inference problems for temporal networks,
J. Computer and System Sciences 64 (2002), 820 -- 842.
[23] Kolokoltsov, V.N. Nonlinear Markov Processes and Kinetic Equations, Cambridge Tracks in Math-
ematics 182, Cambridge Univ. Press, 2010.
[24] Michail, O. An introduction to temporal graphs: an algorithmic perspective, Internet Mathematics
12 (2016).
[25] Michail, O., Spirakis, P.G. Elements of the theory of dynamic networks, Commun. ACM 61, 2
(2018), 72 -- 72.
[26] Nguyen, G.H., Lee, J.B., Rossi, R.A., Ahmed, N., Koh, E., Kim, S. Dynamic network embeddings:
from random walks to temporal random walks, 2018 IEEE International Conference on Big Data
(2018), 1085 -- 1092.
[27] Perra, N., Baronchelli, A., Mocanu, D., Gonc¸alves, B., Pastor-Satorras, R., Vespignani, A. Random
walks and search in time-varying networks, Phys. Rev. Lett. 109, 238701, 2012.
[28] Proskurnikov, A.V., Tempo, R. A tutorial on modeling and analysis of dynamic social networks, I.
Annual Reviews in Control 43 (2017), 65 -- 79.
[29] Proskurnikov, A.V., Tempo, R. A tutorial on modeling and analysis of dynamic social networks,
Part II. Annual Reviews in Control 45 (2018), 166 -- 190.
[30] Ramiro, V., Lochin, E., S´enac, P., Rakotoarivelo, T. Temporal random walk as a lightweight com-
munication infrastructure for opportunistic networks, 2014 IEEE 15th International Symposium
(WoWMoM), June 2014.
[31] Seneta, E. Non-Negative Matrices and Markov Chains, Springer, 2nd ed., 2006.
[32] Starnini, M., Baronchelli, A., Barrat, A., Pastor-Satorras, R. Random walks on temporal networks,
Phys. Rev. E 85, 5 (2012), 056115 -- 26.
[33] Sternberg, S. Dynamical Systems, Dover Books on Mathematics, 2010.
19
|
1708.02938 | 1 | 1708 | 2017-08-09T07:15:47 | A Novel Formal Agent-based Simulation Modeling Framework of an AIDS Complex Adaptive System | [
"cs.MA",
"nlin.PS",
"q-bio.PE"
] | HIV/AIDS spread depends upon complex patterns of interaction among various sub-sets emerging at population level. This added complexity makes it difficult to study and model AIDS and its dynamics. AIDS is therefore a natural candidate to be modeled using agent-based modeling, a paradigm well-known for modeling Complex Adaptive Systems (CAS). While agent-based models are also well-known to effectively model CAS, often times models can tend to be ambiguous and the use of purely text-based specifications (such as ODD) can make models difficult to be replicated. Previous work has shown how formal specification may be used in conjunction with agent-based modeling to develop models of various CAS. However, to the best of our knowledge, no such model has been developed in conjunction with AIDS. In this paper, we present a Formal Agent-Based Simulation modeling framework (FABS-AIDS) for an AIDS-based CAS. FABS-AIDS employs the use of a formal specification model in conjunction with an agent-based model to reduce ambiguity as well as improve clarity in the model definition. The proposed model demonstrates the effectiveness of using formal specification in conjunction with agent-based simulation for developing models of CAS in general and, social network-based agent-based models, in particular. | cs.MA | cs | A Novel Formal Agent-based
Simulation Modeling
Framework of an AIDS Complex
Adaptive System
Amnah Siddiqa1, Muaz Niazi2,*
1Research Centre for Modeling and Simulation, National University of Sciences and Technology,
Islamabad, Pakistan
2Office of Research, Innovation & Commercialization, Bahria University, Islamabad, Pakistan
*Corresponding author [email protected]
Cite as:
Siddiqa, A., & Niazi, M. (2013). A Novel Formal Agent-Based Simulation Modeling Framework of an AIDS
Complex Adaptive System. International Journal of Agent Technologies and Systems (IJATS), 5(3), 33-53.
doi:10.4018/ijats.2013070103
http://www.igi-global.com/article/a-novel-formal-agent-based-simulation-modeling-framework-of-
an-aids-complex-adaptive-system/97688
Abstract
HIV/AIDS spread depends upon complex patterns of interaction among various
sub-sets emerging at population level. This added complexity makes it difficult to
study and model AIDS and its dynamics. AIDS is therefore a natural candidate to be
modeled using agent-based modeling, a paradigm well-known for modeling Complex
Adaptive Systems (CAS). While agent-based models are also well-known to effectively
model CAS, often times models can tend to be ambiguous and the use of purely text-
based specifications (such as ODD) can make models difficult to be replicated.
Previous work has shown how formal specification may be used in conjunction with
agent-based modeling to develop models of various CAS. However, to the best of our
knowledge, no such model has been developed in conjunction with AIDS. In this
paper, we present a Formal Agent-Based Simulation modeling framework (FABS-AIDS)
for an AIDS-based CAS. FABS-AIDS employs the use of a formal specification model in
conjunction with an agent-based model to reduce ambiguity as well as improve clarity
in the model definition. The proposed model demonstrates the effectiveness of using
formal specification in conjunction with agent-based simulation for developing models
of CAS in general and, social network-based agent-based models, in particular.
Keywords: Agent based modeling, AIDS, Complex Adaptive System, sub-
populations, complex networks, formal specification
1. Introduction
As noted in reports by the World Health Organization (WHO) (WHO, 2011), the Acquired
Immunodeficiency Syndrome (AIDS) contributes 0.8% (i.e., approximately 34 million people) to the
global burden of diseases. While the mode of spread of AIDS and its prevention strategies are quite
well-known, a clear indication of the complexity of HIV/AIDS spread can be noted by its continual
prevalence in regions globally. The causative agent of AIDS is a retrovirus termed as the "Human
Immunodeficiency Virus (HIV)". WHO reports note that areas such as Sub-Saharan Africa have nearly
1 in every 20 adults (4.9%) living with HIV thereby accounting for 69% of the people living with HIV
worldwide.
The variation in the emergent pattern of the AIDS/HIV pandemic in global populations is
primarily due to the numerous and complex interactions of a large number of heterogeneous
entities or agents1 (Dean & Fenton, 2010) and populations. One of the pioneers of the theory of
"Complex Adaptive Systems" (CAS), John Holland (JH Holland, 1992) forecasted that AIDS spread can
be modeled as a CAS; systems which are traditionally associated with the observance of unusual
1 "agent" being used here as a technical term, which can refer to a person, a group, a cell or even
a particular country or sub-population (M. Niazi & A. Hussain, 2011).
patterns, termed as "emergent behaviors" (Boccara, 2010; Muaz A Niazi & Amir Hussain, 2011).
Considering AIDS as a CAS would imply that we can expect HIV/AIDS to exhibit emergent
phenomena as a result of non-linear interactions of its constituent agents. However, to the best of
our knowledge, although such patterns are expected and predicted by CAS researchers (such as
Holland), such patterns have not been modeled or highlighted much in existing literature which has
traditionally focused on studying AIDS primarily from the healthcare perspective.
In this paper, the research question addressed is as to how a formal specification model can
be coupled with an agent-based model of AIDS/HIV spread for examining HIV allowing for the
discovery of emergent patterns. We use existing techniques such as studied in previous literature
(M. A. Niazi & A. Hussain, 2011a) to develop a Formal Agent-based Simulation Framework of
HIV/AIDS spread (FABS-HIV). The structure of the rest of the paper is as follows: Section 2 presents
background. In section 3, first a formal specification framework of the HIV/AIDS spread "FABS-HIV" is
described followed by the description of an agent-based model developed in line with this formal
specification. Section 4 presents implementation details of the agent-based model as well as
simulation experiments, results and discussion. In the final section, the paper is concluded and
future research directions are outlined.
2. Background
This section first provides background and related work about modeling HIV/AIDS spread,
formal specification and Agent-based.
2.1. HIV Disease Spread
The HIV/AIDS epidemic has received considerable interest in the last two decades. With specific
journals dedicated to different aspects of studying HIV/AIDS, there is considerable information
available on both the actual virology of the epidemic as well as on infection spread. In addition, it is
well-known how protection from HIV/AIDS can be achieved. However, in spite of this considerable
amount of literature and wide-spread knowledge, the AIDS epidemic still poses a serious problem
with worldwide prevalence.
Complex dynamics in AIDS were suggested by Jones and Handcock for disease spread associated
within sexual social networks (Jones & Handcock, 2003). A key problem in investigative studies of
HIV/AIDS is in the collection of real-time data of disease spread due to challenges such as the taboo
nature of the way it spreads in populations and subsequently how HIV transforms into AIDS and the
hitherto unknown exact factors which causes the HIV virus to behave in a seemingly unpredictable
manner (Chin & Kroesen, 1999). Thus, while not all cases of HIV spread can be monitored easily,
post-infection data can be considerably scarce (Allen et al., 2003). This can result in developing
results based on speculations and are limited by the extent of the sampled data. Thus, even the
guidelines for determining non-probabilistic sample sizes are virtually nonexistent in most affected
countries, mentioned by Guest et al. (Guest, Bunce, & Johnson, 2006). Whereas Pollack et al.
(Pollack, Osmond, Paul, & Catania, 2005) note that risk behavior can be overestimated in the case it
is defined broadly. In other words, while the existing schemes of data collection have given
interesting results, there is actually a possibility of considerable room for further exploration and
investigation in how different studies are practically structured and conducted.
2.2. Formal Specification
Formal specification is a type of formal methods employed for mathematical modeling of real-
world systems (Hall, 1990). While modeling a system, it is necessary to ensure that all the system
components have been incorporated at the desired level of abstraction. Thus it is usually demanding
and very effective strategy to use formal methods for the correct implementation of the system
under investigation. The use of formal specification in the design phase of system modeling is
suggested by Bowen (Bowen, 1995) for earlier debugging of the system. "Z" is an ISO standard
formal specification language developed in 1970s at Oxford University (Woodcock & Davies, 1996).
It has been used to model large scale real systems including IBM CICS (Houston & King, 1991) and
cardiac pacemaker (Verdasca et al., 2005). Formal semantics of Z specification
includes
mathematical notations based on set like and first order predicate calculus. These notations are
represented using formal structure known as "schemas" in Z specification.
In this paper, we have employed a Z-based formal specification model for HIV/AIDS modeling as
part of FABS, an established modeling framework which has previously been shown to effectively
model and analyze different types of CAS such as sensing emergence such as flocking near Wireless
Sensor Networks (M. A. Niazi & A. Hussain, 2011a, 2011b) and emergent behavior of citations of
scholars as they progress in their research careers (Hussain & Niazi, 2013). Further to the
justification of using formal specification is the fact that in spite of various modeling methods
applied to investigate the HIV/AIDS spread dynamics there is lack of effective monitoring of the AIDS
disease perhaps because of missing specification related to the modeling of CAS in context of
HIV/AIDS spread. The reason behind this dilemma needs to be investigated through a modeling
paradigm which takes into account a formal specification model of the system as offered by Z formal
specification language.
2.3. Agent-based Modeling
Agent based modeling (ABM) is a simulation paradigm which has close ties with actual scientific
experiments thus making it a good technique for evaluation different paradigms (Li, Brimicombe, &
Li, 2008). What makes ABM unique for modeling complex adaptive systems is the way an ABM is
typically designed. ABMs have been used in domains as diverse as Biological Sciences (Bailey,
Lawrence, Shang, Katz, & Peirce, 2009; Siddiqa et al., 2009), disease spread models such as for
Dengue (Jacintho, Batista, Ruas, Marietto, & Silva, 2010), Social Sciences (Dennard, Richardson, &
Morçöl, 2008), Economics (Cartier, 2004) and Computer Sciences (Muaz Niazi & Hussain, 2010; M. A.
Niazi & A. Hussain, 2011a). ABM has been termed as a revolution in the prestigious journal
"Proceedings of the National Academy of Sciences" (Bankes, 2002). Holland also notes that CAS can
be better studied by the use of agent-based models (John Holland, 2006). A recent review by Niazi
(M. A. Niazi, 2013) presents literature about modeling CAS using agent-based and complex-network
based models.
3. Model Development
This section includes description of informal model concepts needed for modeling FABS-HIV. It
further includes description of formal specification model developed using Z and subsequently
transformed working agent-based model.
3.1.
Informal Description of Model Concepts
Modeling of HIV/AIDS spread involves dealing with heterogeneous population subsets with complex
intra and inter communication patterns. The infection starts in a closed population sub-group2
sharing common disease spreading behavior usually termed as high risk category. These high risk
categories are further classified according to the mode of infection transmission used by them for
example Injecting Drug Users (IDU) share syringes for intravenous drug intake and sex workers
communicate through physical interaction as a mode of infection transmission etc. These sub-groups
become a core source to transmit the infection to other population sub-groups which might be
intermediate or secondary contractors of the infection. The intermediate individuals directly
contract the disease from high risk individuals and in turn become a source to spread it to the
population strata which is not directly exposed to any of the sources of HIV infection (thus termed
secondary). Thus a complete picture of HIV/AIDS spread system demand the modeling of both intra
and inter communication pattern involved in these population sub-groups instead of individually
modeling each category as is the case with previous studies.
We in this study will limit our model to a single high risk category i.e., Female Sex Workers (FSWs) for
simplicity's sake. The FSWs interact directly with their clients. Their clients in turn interact with their
social partners belonging to low risk population sub-group2 which are further divided into two
categories. These two categories include both the socially committed and non-committed partners.
The interaction between individuals belonging to any of these sub-groups might or might not be
using preventive measures, another important factor in determining the shape of infection
pandemic. This informal description enlists the key concepts to explain how infection actually travels
in population. The same pattern is replicable for other high risk categories which is the reason for
limiting our model to single high risk category for conduction of exploratory analysis of interaction
pattern.
3.2.
The FABS-HIV Framework
The FABS modeling framework involve two phases of model construction. First a formal model
of HIV/AIDS spread using a mathematical framework originally based on a formal specification
language Z is constructed. This formal specification model aims to validate all the informal needs of
the system under investigation at the selected level of abstraction besides providing the
unambiguous representation of concepts. Next an agent based model based on the formal
specification framework is developed as a proof of concept. Subsequent simulation experiments
performed by means of setting a 100% condom usage in populations (as control setting) were used
for validation. Our results based on 95% confidence interval demonstrate the existence of complex
2 "Sub-group" refers to a subset of people in the population which share commonalities in terms of
disease spreading behavior
emergent interaction pattern observed as backflow of HIV infection in FSWs population based on
coupling habits of their clients. Thus, in general, our experiments demonstrate why there exists a
need for a realistic division of sub-populations in HIV studies in line with the local population sexual
habits and behavior implying AIDS/HIV spread to be modeled as CAS. Our results suggest that
instead of simply dividing populations between high risk and low-risk categories, studies should
examine populations based on topological structure exhibited within and among the sub-
populations. Following a more logic division in HIV studies could thus assist in a better evaluation
and hopefully development of better mechanisms for controlling the spread of the HIV/AIDS spread
worldwide.
As such the formal agent-based simulation framework consists of three types of parameters i.e.,
hard-coded, programmable and measured. The hard-coded parameters allows
for
the
representation of key concepts based on the facts associated with the system, programmable
parameters allow for state initializing of the system and measurable parameters allow for the
subsequent monitoring of behavior dynamics.
The model is described using some key concepts required for modeling of FABS-HIV. The model dealt
with a population consisting of various sub-populations that were categorized on the basis of risk
behavior. These included one HIV/AIDS high risk population; i.e., Female Sex Workers (FSWs) in this
case and three seemingly low risk populations: 1) heterosexual men (termed "primaries") being the
people who have occasional interaction with the FSWs as their clients), 2) heterosexual women
(termed "secondaries") since they do not have any direct interaction with the FSWs and acquire
infection via primaries being their socially committed partner, and 3) heterosexual women who are
not committed partners of the primaries, termed exsecondaries. The next key concept is to model
the interactions between all these sub-population categories. The interactions required for modeling
of FABS-HIV can be concluded as follows:
a) The interaction between primary and secondary
b) The interaction between primary and exsecondary
c) The interaction between primary and FSWs
All these interactions are based on the moral behavior of primary population which can be
described using two more concepts i.e., commitment level and adopting preventive measures such
as condom usage. A high commitment level of a primary with its socially committed partner is
indicative of keeping away from all other types of partnerships and in turn the infection itself and
vice versa. Similarly, using the preventive measures like condom usage is also an indicator of partially
staying away from the infection. We assume some basic knowledge of Z notation for simplification.
3.2.1. Sets
Sets have been used in the model to declare the user defined types in the model. We started by
defining the given sets.
The set "PERSON" is the set of all persons in a given population:
[PERSON] == {x:ℕx>=0 }
Each person in the population carries different attributes regarding population sub-group
category, infection status, gender, and their social status for coupling with their partners. Each of
these concepts was adequately defined by associating different attributes with each PERSON entity.
The free type definition "PERSONTYPE" depicts the different types of individuals in a given
population; i.e., fsw, primary, secondary and exsecondary. A PERSON entity can belong to any one
of these types. Formal definition of PERSONTYPE is as follows:
[PERSONTYPE] == {fsw, primary, secondary, exsecondary}
The free type "PERSONSTATE" was used to declare the health state of the individual which could
either be infected or uninfected:
[PERSONSTATE]=={infected, unifected}
The next free type "PERSONGENDER" was defined as a means of declaring the gender of the
individual which could either be male or female:
[PERSONGENDER]=={male,female}
The next set "INFECTED" defined all the infected individuals. It belongs to both programmable
and measurable component of the model. It is used to monitor the system state encompassing
infected population only, at a given time point:
[INFECTED]=={n:INFECTED0<n<#persons∧ personstate=infected }
where #persons is a count of total no of persons in the population.
Likewise the set "PARTNER" is the set of all partners of a person. The persontype of partner was
restricted to either primary or secondary since the partner is used to model the relationship of
socially recognized commitment between these two entities:
[PARTNER] = = {x: PARTNER persontype= primary ∨ persontype= secondary}
The set "COUPLE" was used to declare the pairs of sexually interacting individuals in the
population. Each couple models the interaction of primaries with any of the other female sub-
populations. Therefore, the predicate of the couple was restricted to at least one primary:
[COUPLE]== {x,y:COUPLE x∈primary ∨y∈primary}
The set "𝔽" was defined as the set of natural numbers greater than or equal to 0 and less than or
equal to 100. The natural numbers between 1-100 provided a scale for adjusting user-desired
variables like commitment and condom usage as a property of the primary population. It was also a
programmable parameter:
[𝔽] = = { x: ℕ 0<x≤100}
Several user-defined global variables were declared with axiomatic declaration as programmable
parameters. The variables "maxprimary, maxsecondary, maxfsw, maxinfectedfsw, maxexsecondary,
and tobecoupled" were used for declaration of the number of primaries, secondaries, FSWs, the
infected FSWs, the exsecondaries, and the number of pairs to be formed between primaries and
secondaries, respectively. These global variables were provided for customized modeling of the
initial population:
maxprimary:ℕ
maxsecondary:ℕ
maxfsw:ℕ
maxinfectedfsw:ℕ
maxessecondary:ℕ
tobecoupled:ℕ
3.2.2. State Schemas
A state schema is a special structure used for the declaration of the system state. Each system
state requires a specific set of objects, variables, entities and functions to ensure that all system
requirements are being met. The states of FABS-HIV might be summed in three concise
declarations:
a) State declaration for each population sub-group
b) State declaration of socially committed partnerships
c) State declaration for coupling action based on heterogeneous male population behavior
As a first step, the state schemas for all the sub-populations were declared to accommodate for
their heterogeneity. The first population subtype object declared was Fsw. Every Fsw was declared
with a set of attributes; i.e., persontype, gender and state. The predicate function restricts the
person type to Fsw, and the gender to female:
Fsw
type : PERSONTYPE
state : PERSONSTATE
gender : GENDER
persontype = fsw
gender = female
The next population subtype defined was Primary. The predicate function restricts the person
type to Primary, gender to male and declares it with a socially committed partner which must belong
to Secondary subtype:
Primary
type : PERSONTYPE
state : PERSONSTATE
gender : GENDER
apartner : PARTNER
persontype = Primary
gender =male
apartner= Secondary
The next sub-population declared was Secondary. The predicate function restricts the person
type to secondary, gender to female and declares it with a partner who must belong to primary
subtype:
Secondary
type : PERSONTYPE
state : PERSONSTATE
gender : GENDER
apartner : PARTNER
persontype = Secondary
gender = female
apartner = Primary
Exsecondary is an object of type Secondary. This category is used to depict the females who
belong to low risk population with no socially committed partner at given time point. However they
might be involved in occasional sexual encounters. The predicate function restricts the exsecondary
to a null partner:
ExSecondary
exsecondary : Secondary
partner= Null
After defining all the population sub-groups adequately, we formulated the state schema
Partners to store the pointers of the partners as a couple. This schema tends to create a pair of
socially selected partners necessarily should be a primary (a male) and a secondary (a female). The
aim of this object is to only declare the socially committed partners in a population. It has nothing to
do with the coupling (sexual interaction) between these partners yet. The term coupling refers to
the sexual act between heterosexual individuals.
The set 𝔽PARTNER depicts a set of finite elements. Each element of this set consists of two
entities, thus forming a pair. Each pair consists of two elements which holds pointer to each other.
Each created pair can be called by using notation 𝔽PARTNER. However, the elements of each pair are
accessible using notation PARTNER. Three conditions were checked in the predicate. First condition
checked for both elements of a pair to either belong with Primary or Secondary. Second condition
monitored that no input entity is reusable i.e., an individual who has been used to form a pair is not
used again in another partnership. Third condition implied that the pair formed uses the user-
defined range for input values. The numbers maxprimary and maxsecondary depict the global
variables used to declare the user defined values for the maximum number of primaries and
seconadries, respectively. The total number of pairs to be formed was declared using a global
variable tobecoupled.:
Partners
x,y: PERSON
apair: 𝔽PARTNER
(x∨y)∧(Primary∨Secondary)
x∧y∉PARTNERS
#primary ≤ maxprimary
#primary ≤ tobecoupled
#seconadry ≤ maxsecondary
#secondary ≤ tobecoupled
The next state schema Link modeled the heterosexual sexual interaction between two
individuals. Two variables are needed to model such an interaction. In the interaction, to model a
male population one would always need a primary and to model a female population, a person
could belong to any of the female sub-populations. Secondly the primary would always go for its
own secondary partner from secondary sub-set. The purpose was achieved by calling three variables.
Two of these were the elements of a pair created through Makepartner schema. It was depicted by
notation x:PARTNER and y:PARTNER. Another person variable was used to model rest of two female
subpopulations and restricting it to belong to either of two female populations i.e., fsw and
exsexondary in the predicate. The variable acouple held the pointers to the coupling individuals in
the pair. Two variables commitment and threshold-commitment declares the user-defined value of
commitment level associated with primary population and a threshold value for implementation of
commitment preference rule:
Link
p1 : PARTNER
p2:PARTNER
p3:PERSON
acouple : 𝔽COUPLE
commitment, threshold-commitment : 𝔽
P3 ∧ ( fsw ∨ exsecondary)
commitment< threshold-commitment<=commitment
The next step is initialization of the declared states to describe the system state when it is first
started. The initializing elucidates the working of concepts as hard-coded parameters i.e., population
sub-groups representation and programmable parameters i.e., partnership declaration and coupling
frequency etc.
Each fsw was a heterosexual female who was initially uninfected. The state schema fsw was
initialized as InitFsw with type fsw, state uninfected, and gender female:
InitFsw
Fsw
type = fsw
state =uninfected
gender = female
Each primary was a heterosexual male who was initially uninfected with no socially committed
partner. The state schema primary was initialized as InitPrimary with type primary, state uninfected,
gender male, and a null partner:
InitPrimary
Primary
type = primary
state= uninfected
gender =male
apartner = NULL
Each secondary was a heterosexual female who was initially uninfected with no socially
committed partner. The state schema secondary was initialized as InitSecondary with type
secondary, state uninfected, gender female and a null partner:
InitSecondary
Secondary
type =secondary
state = uninfected
gender = female
apartner = NULL
Each exsecondary was the element of secondary population with no socially committed partner.
The state schema exsecondary was initialized as InitExsecondary with type secondary, state
uninfected, gender female and a null partner:
InitExsecondary
Exsecondary
type =secondary
state = uninfected
gender = female
apartner = NULL
The partner schema was initialized as InitPartner. The partnership between the primary
(declared as variable x) and secondary (declared as variable y) sub-populations as socially committed
partners was initialized in this schema. The number of primaries and secondaries to be declared as
socially committed partners was chosen through the user-defined value of global variables
maxprimary and maxsecondary. The maxprimary and maxsecondary in this schema were set to
#maxprimary and #maxsecondary respectively. There was no value stored in the couple yet;
therefore, the value for acouple was set to an empty set(∅).
InitPartner
Partner
x=Primary
y=Secondary
maxprimary = #maxprimary
maxsecondary =#maxsecondary
tobecoupled=#tobecoupled
acouple=∅
The Link schema was initialized as InitLink schema. Initially, each variable was set to null as no
coupling was performed.
InitLink
Link
p1 = Null
p2= Null
p3=Null
acouple =∅
commitment=Null
threshold-commitment=Null
Next all the global variables were declared using axiomatic declaration. The user-defined
variables maxprimary, maxsecondary, maxfsw and maxinfectedfsw were declared to be positive
integers. The variables coupledprimary and coupledsecondary were declared to be zero initially as
these variables will be updated by their respective usage in further operations.The threshold-
condomusage and threshold-commitment were declared to be any value between 0 and 100
inclusive.
maxprimary:ℕ
maxsecondary:ℕ
maxfsw:ℕ
maxinfectedfsw:ℕ
maxessecondary:ℕ
tobecoupled:ℕ
maxprimary => 0
maxsecondary=>0
maxfsw=>0
maxinfectedfsw=>0
maxexsecondary=>0
tobecoupled=0
3.2.3. Operation Schemas
An operation schema is the special structure in which the change in the states of the system is
illustrated. It performs all the functions on all components using predicate specified conditions. The
results of operation schemas produce output of measured parameters needed for system analysis
and monitoring.
The first operation of FABS-HIV was to initialize the population. For this purpose, a schema
SetupInitialPopulation was defined. The schema used several global variables to deploy user-desired
inputs. The global variables used in this schema were: maxprimary, maxsecondary, maxexsecondary,
maxfsws and maxinfectedfsws taking input for the maximum no of primaries, secondaries, fsws, and
the infected fsws in the initial population:
SetupInitialPopulation
primaries: PRIMARY
secondaries : SECONDARIES
exsecondaries:SECONDARIES
fsws: FSWS
infectedfsws: FSWS
primaries′ = #maxprimaries
secondaries′= #maxsecondaries
exsecondaries′= #maxexsecondaries
fsws′= #maxfsws
infectedfsws′= #maxinfected fsws
The aim of the next operation was to declare the primaries and secondaries as social partners of
each other. The operation schema was declared as "MakePartners". The operation on the Partner
schema is performed which has been included with a delta(Δ) sign to show the change in it. Two
objects of type Primary and Secondary were taken as inputs. Both of these individuals were checked
for the condition that the count of coupled individuals in the simulation was still required or not
according to the initialized values. They were additionally checked for not being the elements of
PARTNER set. The total number of pairs to be formed was checked using several global variables i.e.,
maxprimary, maxsecondary and tobecoupled through predicate conditions. The fulfillment of all the
conditions would result in making the primary and secondary partners of each other:
MakePartners
ΔPartner
x? : Primary
y? : Secondary
x=Primary
y=Secondary
x∉PARTNER
y∉PARTNER
#primary < #maxprimary
#primary<#tobecoupled
#secondary< #maxsecondary
#secondary<#tobecoupled
apair′=𝔽PARTNER ∪{x?, y?}
The next operation schema Coupling performed operation of coupling on the Link schema. A
primary will always go for coupling with his partner if the commitment is greater or equal to the
threshold value. Otherwise, it will go for the coupling with FSW. This interaction was modeled as a
binary relation defined as acouple between the selected objects through commitment preference
rules:
Coupling
ΔLink
p1?, p2?:PARTNER
p3?:Fsw
commitment?, threshold-commitment? : 𝔽
p3?=Fsw
commitment?>=threshold-commitment?
acouple′ = (p1? , p2?) ∪ acouple
commitment?<threshold-commitment?
acouple′ = (p1?, p3?) ∪ acouple
The next schema ApplyCondomUsage performed an operation on selected coupling pair from
Coupling schema as an input to apply the condom usage rule. This operation modeled the infection
spread in a given population based on the frequency of preventive measure deployed by the
primarys. If the condomusage was less than the threshold value, the infection would spread and vice
versa. The predicate function would check the state of both the persons in the pair and infect the
other if one was infected; otherwise, the state would remain the same:
Applyingcondomusage
ΔCoupling
x?: COUPLE
y?:COUPLE
condomusage?, threshold-condomusage?:𝔽
condomusage? >=threshold-condomusage?
x′=x?
y′=y?
condomusage?< threshold-condomusage?
x?∉INFECTED
y?∉INFECTED
x′={x?} ∪ INFECTED
y′= {y?} ∪ INFECTED
3.3.
Agent-based Model of FABS-HIV
This section formally describes the translated agent-based model developed as a proof-of-
concept based on the formal specification presented for FABS-HIV in order to study AIDS/HIV as a
CAS. The model was developed using NetLogo (Wilensky, 1999), a freely available agent-based
modeling tool that has previously been used extensively to model complex phenomena (M. A. K.
Niazi, 2011).
3.3.1. Agents
Based on the formal specification model, we modeled three sub-populations: a high risk
category i.e., FSWs, their clients termed primaries, and the partners of the primaries termed
secondaries (Fig. 1). To differentiate between them, a color code was used where yellow color
indicated FSWs, blue indicated primaries, pink indicated secondaries and red indicated HIV/AIDS
infected individuals.
3.3.2. Interactions
The model used "links" to represent two people engaged in a sexual relationship. These links
created couples. There were essentially two kinds of couplings envisioned in this model:
1) an interaction between FSWs and primaries
2) an interaction between primaries and secondaries. These again were of two types:
between primaries and their socially selected secondary partners (e.g. married partner)
between primaries and their other secondary partners (which are perhaps not coupled with
any other primary)
To perform verification of the model, each time there was a coupling, a link was shown on the
screen between the two agents as a connecting line as (Fig 1).
3.3.3. Model Input Parameters (Agent Behavior)
Several input parameters were provided as controls in the model to adjust the behavior of the
agents. The number of sub-populations could be adjusted through the sliders on the graphical user
interphase (GUI) of the model (Fig 2). The differentiation between secondaries of the two types
could be adjusted with the help of another slider named "ex-sec", where ex-sec were the low risk
heterosexual women other than the long-term selected partners of the primaries. The coupling
between primaries and secondaries was controlled through a coupling variable based on per-month
frequency of interactions (coupling) and the coupling between the primaries and FSWs was
controlled through a variable adjusted according to the average client coupling recorded for the
FSWs (Fig. 2). Two key confounding parameters; i.e. the commitment level of the primaries and the
condom-usage among the primaries was used to study their impact on the spread of HIV/AIDS. The
values of these parameters could also be adjusted according to the sliding scales provided in the
model (Fig. 2). All the user-desired adjustable parameters were chosen on the basis of reported
statistical parameters used for empirical data collection of HIV/AIDS spread(UNAIDS, 2005)
(UNAIDS, 2010).
3.3.4. Model Output Parameters (Counters)
All changes occurring in the model are time-dependant. Several output monitors including plots
and counters (display screens with relevant numbers) were used for displaying the updated variable
state of the agents at a given time. The estimates of the number of infected FSWs, their direct
partners and secondaries were displayed as output counters. Furthermore, the model also provided
estimates of the number of non-committed-secondaries (the number of secondaries used in the
simulation which were not committed with any of the primaries), non-committed-infected-
secondaries (the number of infected non-committed secondaries), and the total-infected population,
a number that gave the overall picture of the infection spreading in the population. More
importantly, the model also displayed the numbers of FSWs which were back-infected from infected
primaries, FSW-back-infected. In other words, these infections resulted due to the interaction of
infected primaries with non-infected FSWs, a value that demonstrates the effects of the existence of
a complex hidden network for HIV back-flow. Finally, the number of back-infections of primaries
from secondaries; i.e., primaries-back-infected was also displayed individually. The infection curve
for all sub-populations was displayed through a line plot on ABM screen.
4. Results and Discussion
In this section, we first give an overview of the implementation details followed by model
calibration. Finally, we present experiments and discussion of results.
4.1.
Implementation details
The desired input parameters were incorporated using input scales provided on the model GUI.
Next the setup button was used to initialize the model based on adjusted parameter settings. Time
control provided to run the simulation allows performing it either indefinitely or for a specific time
period. These controls were provided in the form of two "go" buttons, which allowed the control of
the simulation runs in respective manners.
4.2.
Model Calibration and Methods
Our model allows for calibration of certain parameters using the real data which include the
number of sub-groups of agent population, the coupling frequency of primaries and FSWs, condom
usage, infection rate, and time period. We performed verification of our model using two
confounding parameters i.e., commitment level of primaries and variation in condom usage among
the primaries.
Variation in commitment level of the primaries: we experimented with a 0%
commitment level since it would mean that the primary agent had no regard for his
partner regarding sexual practice in regular life, while a 100% commitment level
meant that the agent was totally committed to the partner. The value of percent
commitment level was adjusted from 0 to a commitment level of 100 percent in
increments of 20.
Variation in condom-usage among the primaries: We experimented with a 0%
condom-usage level since it would mean that the infection would not propagate at
all while a 100% condom-usage level meant that the infection would propagate
exponentially. The value of percent commitment level was adjusted from 0 to a
commitment level of 100 percent in increments of 20.
Each point in all experiments was tested in 50 individual simulations. Every time tick represents
one month as the smallest collective time unit. The simulation results were rendered in a graphical
format for easy understanding. An error line function was used to get a clear picture of the
minimum, maximum and average values of the data (to a 95% confidence interval) to observe
various trends (Figs. 3 and 4).
To ensure realism in the simulations, the input data was based on real sources (UNAIDS, 2005)
(UNAIDS, 2010) for Pakistani population except the coupling parameter which was analyzed by
incrementing it through equally spaced variation intervals. The results obtained from the various
experiments conducted below thus reflect the trends found in the Pakistani population.
4.3.
Experiment no 1: Test of Variation in the Commitment Level
The first simulation experiment tested the effect of commitment level of the primary partners of
FSWs on the spread of infection among the various agents being tested. The commitment level of
the primary population was studied since we felt that their actions could seriously affect the form
and shape that an HIV epidemic could take within a population.
Simulation results, while varying the commitment level among the primaries, revealed that the
average infection among FSWs increased if the commitment of primaries with the secondaries went
down (Fig. 3A). On the other hand, when the commitment level of the primaries increased with
their partners, the infection among the primaries went down drastically by nearly 50% (Fig. 3B). The
results in Fig. 3C show that the infection in FSWs could actually be significantly increased due to a
lack of commitment level among the primaries with their partners, revealing that the infection was
actually due to a back-flow from the primaries to the FSWs. In Fig. 3D, the same trend was observed
for back-infected primaries, revealing the possibility that it was not the infected FSWs passing the
disease to the primaries as they were quite few in number; rather, the primaries could actually be
mostly "back-infected" from the secondaries since the infections went significantly down with an
increase in the commitment level. The results from Fig. 3, panels A and C confirm the existence of
back-flow emergence patterns involved in the HIV/AIDS spread which could not be calculated
through traditional methods and thus prove FABS-HIV to be presentable as an adequate modeling
framework for analyzing a CAS like HIV/AIDS spread. Interestingly, the rate of infected secondaries
were seen to be very low when primaries had no regard of commitment perhaps because of high
coupling rate with FSWs instead of their partners which gradually increased with higher commitment
levels(Fig. 3E). The infection rate within the secondaries decreased gradually after 50 percent
commitment level, as expected. This could perhaps be owing to the lesser infection flow in the
secondaries because of low infection rates among primaries due to higher commitment and lesser
couplings with the FSWs (Fig 3E). Fig. 3F reveals the overall trend of varying commitment level
which shows up as normal distribution in the form of a bell-shaped curve.
4.4.
Experiment no 2: Test of Variation in Condom Usage
Next, the variation in condom usage on infection rates was studied among the various actors
using simulation modeling with the assumption that any interaction using condoms would not
propagate infection. Thus, condom usage here assumed proper usage without any tears or
exchange of fluids. The infection rate obtained by varying commitment level was plotted against the
different types of agents to reveal trends in each population as before.
It was observed that infections in FSWs could be significantly reduced by nearly 50% if the
condom usage of primaries was increased incrementally (Fig. 4A). With a 100% condom usage, the
simulation experiment could not stop, verifying the program. The same effect was observed on the
back-flow of infection to the FSWs (Fig. 4C), suggesting the possibility of infection from back-flow as
mentioned above.
Effect of increase in condom usage among the primaries revealed a similar effect on infection as
in FSWs. However, the rate of decrease in infection rates initially among the primaries was observed
to be slower than that observed among the FSWs (Fig. 4B) and the same was observed with the
back-flow of infection to the primaries from the secondaries (Fig. 4D)
Fig. 4E reveals the effect of variation of condom usage on the overall number of infected
secondaries. As expected, with a 100% condom use, the infections went to zero, demonstrating the
verification of the simulation program. Finally, the effect of increase in condom use on total number
of infections revealed a similar trend (Fig.4F). In all these calculations, the number avg-client-
pmonth (Average Transactional Clients per month for FSWs) was also taken from the self-reported
data.
4.5. Correlation with Related Work
While, to the best of our knowledge, there is no other work which presents a FABS in the area of
HIV/AIDS, in this section we present a comparison of our presented work with related work.
A review of AIDS propogation modeling using agent-based model has previously been presented
in (Tirado-Ramos & Kelley, 2013). One of the earliest agent-based model of HIV spread among
injecting drug users (IDUs) was conducted by Atkins et al. in 1996 to simulate the spread of HIV from
an index case to other IDUs using contaminated needles (Atkinson). Newer agent-based models
consider network topology such as geographic isolation, social norms and also sexual taboos such as
by Osgood et al. (Osgood, Moavenzadeh, & Rhee, 2006). Such studies have shown that depending
upon the mode of transmission of the disease agents, the epidemic can take on different profiles. As
such, a variety of intervention and policy decisions may have to be used to counter the effects of
epidemic transmission such as those observed in Taiwan, Botswana, India, and South Africa
(Nagelkerke et al.). Teweldemedhin et al. (Teweldemedhin, Marwala, & Mueller, 2004) use an agent-
based modeling approach to model HIV spread in populations. Alam et al. (Alam, Meyer, & Norling,
2006) use an agent-based modeling approach to study the impact of HIV/AIDS in the context of
socio-economic stressors. Mei et al. (Mei, Sloot, Quax, Zhu, & Wang, 2010) use agent-based
networks to explain HIV epidemic in homosexual males in Amsterdam. Nagoski (Nagoski, 2006)
presents an agent-based disease diffusion model to study heterogeneous sexual motivation. All
these models are encompassing small set of agent/entities and the interactions as well, thus not
employing the full potential of ABM to model a CAS. A previous paper on modeling HIV/AIDS as a
CAS has been presented by Niazi et al. in (MuazA Niazi, Siddiqa, & Fortino, 2013).
Other previous studies based on formal methods include a fuzzy mathematical model developed
by Morio et al. (Morio et al.) to analyze the heterosexual HIV transmission in Japan. A mathematical
framework of concurrent partnerships on the transmission of HIV has been presented by Morris and.
Kretzschmar in (Morris & Kretzschmar, 1997). Other mathematical models developed for the
understanding of the HIV/AIDS epidemic and its transmission have been reviewed by Boily et al. in
(Boily, Lowndes, & Alary, 2002). These models however lack a formal specification or modeling
HIV/AIDS spread as a CAS.
In short, to the best of our knowledge, previous work either did not expand the use of agent-
based modeling to the extent of modeling AIDS as a CAS or else if models were presented, they did
not employ the use of formal specification. Likewise, previously presented models using formal
methods or mathematical models have not connected these models to agent-based models. The
current paper can be considered as extension of previous work on AIDS by means of developing a
formal specification model in addition to expanding agent-based modeling to study emergent
patterns in AIDS spread.
5. Conclusions & Future Work
In this paper, our goal was to present an agent-based model of AIDS spread, modeled as a CAS,
coupled and correlated with a formal specification model. In particular, however, as an outcome of
extensive simulation experiments, we have noted how a more natural sub-division of populations
might lead to discovery of complex emergent behaviors in HIV epidemic spread. The results
demonstrate how a more natural division of population preferably in the form of networks might
allow for the detection of complex, emergent patterns in HIV spread.
We have demonstrated the use of a formal framework in conjunction with agent-based
simulation model as an effective method in order to study complex diseases like HIV/AIDS. This
formal framework allows conducting an investigative study for analyzing a complex adaptive
environment like HIV/AIDS spread effectively. First a formal specification model of HIV/AIDS spread
was developed using Z which allowed for a clear and unambiguous representation of the underlying
complex social network. Next the formal specification was translated into an agent-based model as a
proof of concept.
Extensive simulation experiments presented in a 95% confidence interval, demonstrated that in
the case of FSWs, there can be back-infection patterns originating based on sexual habits and
partnerships of their clients with a different section of population. We have also shown how the
model can be verified and validated by evaluating the use of protection in physical relations as a
protective measure from disease spread. Sensitivity analysis provided a proof of the utility of
dividing populations
into further sub-populations. The discovered emergent patterns are
demonstrated since HIV spread is closely tied with the realities associated with the taboos and
norms of the human society. The traditional modeling techniques could not predict the existence of
complex hidden patterns and thus FABS-HIV proves to be presentable as an adequate modeling
framework for analyzing a CAS like HIV/AIDS spread.
We demonstrate theoretically that infection emergence can change considerably depending
upon the variations in the high risk behavior of certain populations. Our results also confirm the
significantly positive role of both condom usage and commitment levels on stopping this possible
backflow of infection in FSWs. Positive awareness of both these factors can play a significant role in
better understanding of the disease diffusion rates specific to a population and also in planning
effective intervention strategies.
Although the formal framework presented here has been described in the context of FSWs, it
provides a complete description of the complex patterns involved in the flow of HIV/AIDS. In the
future, further research can be conducted on the use of complex network methods to investigate
trends in AIDS spread. In addition, FABS-based models can be developed for other sub-populations
based on the behavior of high risk individuals such as injecting drug users (IDUs).
Fig.1. Screen shot of agents used during simulation modeling showing female sex
workers, FSWs (yellow), infected FSWs (red), their clients, termed primaries (blue) and
partners of primaries, termed secondaries (red). Sexual coupling between agents of different
sub-populations during simulation is shown by vertical lines between agents. For each time
tick (equally-spaced time interval), the interactions appear as lines between the relevant
agents and then disappear in the next time tick for the sake of clarity.
Fig.2. Screen shot of the graphical user interface (GUI) of the agent-based model of the
FABS-HIV. The image shows sliders that allowed modulation of various sub-populations
within the model as well as the level of confounding parameters like commitment levels and
condom usage among the various agents.
Fig.3. Results of simulation modeling by varying the commitment level among primaries.
The graphs represent the estimated number of infected agents with increase in commitment
levels: A) female sex workers (FSWs) infected, B) primaries infected, C) FSWs back-
infected, D) primaries back-infected E) secondaries infected, F) total infected. The bars show
the minimum, maximum, and average numbers estimated by simulation modeling using 50
rounds of simulations conducted per point.
Fig.4. Results of simulation modeling by varying the condom use among primaries and
secondaries. The graphs represent the estimated number of infected agents with increase in
condom usage: A) female sex workers (FSWs) infected, B) primaries infected, C) FSWs
back-infected, D) primaries back-infected, E) secondaries infected, and F) total infected. The
bars show the minimum, maximum, and average numbers estimated by simulation modeling
using 50 rounds of simulations conducted per point.
References
Alam, S., Meyer, R., & Norling, E. (2006). Using Agent-Based Modeling to Understand the Impact of HIV/AIDS in the Context of Socio-
Economic Stressors Centre for Policy Modelling Report CPM-06-167.
Allen, S., Meinzen-Derr, J., Kautzman, M., Zulu, I., Trask, S., Fideli, U., . . . Haworth, A. (2003). Sexual behavior of HIV discordant
couples after HIV counseling and testing. Aids, 17(5), 733.
Atkinson, J. (1996). A simulation model of the dynamics of HIV transmission in intravenous drug users. Computers and Biomedical
Research, 29(4), 338-349.
Bailey, A. M., Lawrence, M. B., Shang, H., Katz, A. J., & Peirce, S. M. (2009). Agent-based model of therapeutic adipose-derived stromal
cell trafficking during ischemia predicts ability to roll on P-selectin. PLoS Comput Biol, 5(2), e1000294. doi:
10.1371/journal.pcbi.1000294
Bankes, S. C. (2002). Agent-based modeling: A revolution? Proceedings of the National Academy of Sciences, 99(90003), 7199-7200.
Boccara, N. (2010). Modeling complex systems (Second ed.): Springer.
Boily, M., Lowndes, C., & Alary, M. (2002). The impact of HIV epidemic phases on the effectiveness of core group interventions: insights
from mathematical models. Sexually transmitted infections, 78(suppl 1), i78.
Bowen, J. (1995). Formal specification and documentation using Z: a case study approach: Citeseer.
Cartier, M. (2004). An Agent-Based Model of Innovation Emergence in Organizations: Renault and Ford Through the Lens of
Evolutionism. Comput. Math. Organ. Theory, 10(2), 147-153. doi: http://dx.doi.org/10.1023/B:CMOT.0000039167.91320.df
Chin, D., & Kroesen, K. (1999). Disclosure of HIV Infection Among Asian/Pacific Islander American Women: Cultural Stigma and
Support* 1. Cultural diversity and ethnic minority psychology, 5(3), 222-235.
Dean, H. D., & Fenton, K. A. (2010). Addressing social determinants of health in the prevention and control of HIV/AIDS, viral hepatitis,
sexually transmitted infections, and tuberculosis. Public Health Reports, 125(Suppl 4), 1.
Dennard, L. F., Richardson, K. A., & Morçöl, G. g. (2008). Complexity and policy analysis : tools and concepts for designing robust
policies in a complex world. Goodyear, AZ: ISCE Pub.
Guest, G., Bunce, A., & Johnson, L. (2006). How many interviews are enough? Field methods, 18(1), 59.
Hall, A. (1990). Seven myths of formal methods. IEEE software, 7(5), 11-19.
Holland, J. (1992). Complex adaptive systems. Daedalus, 121(1), 17-30.
Holland, J. (2006). Studying Complex Adaptive Systems. Journal of Systems Science and Complexity, 19(1), 1-8. doi: 10.1007/s11424-006-
0001-z
Houston, I., & King, S. (1991). CICS project report experiences and results from the use of Z in IBM. Paper presented at the VDM'91
Formal Software Development Methods.
Hussain, A., & Niazi, M. (2013). Toward a Formal, Visual Framework of Emergent Cognitive Development of Scholars. Cognitive
Computation, 1-12. doi: 10.1007/s12559-013-9219-y
Jacintho, L. F. O., Batista, A. F. M., Ruas, T. L., Marietto, M. G. B., & Silva, F. A. (2010). An agent-based model for the spread of the
Dengue fever: a swarm platform simulation approach.
Jones, J., & Handcock, M. (2003). Social networks (communication arising): Sexual contacts and epidemic thresholds. Nature, 423(6940),
605-606.
Li, Y., Brimicombe, A. J., & Li, C. (2008). Agent-based services for the validation and calibration of multi-agent models. Computers,
Environment and Urban Systems, 32(6), 464-473. doi: DOI: 10.1016/j.compenvurbsys.2008.09.002
Mei, S., Sloot, P., Quax, R., Zhu, Y., & Wang, W. (2010). Complex agent networks explaining the HIV epidemic among homosexual men
in Amsterdam. Mathematics and Computers in Simulation, 80(5), 1018-1030.
Mitchell, M. (2009). Complexity: a guided tour: Oxford University Press, USA.
Morio, S., Soda, K., HashimotoY, S., Fukutomiy, K., Ichikawa, S., Kamakura, M., & Nakayama, H. (1996). Simulation of the heterosexual
HIV/AIDS epidemic in Japan by a fuzzy mathematical model. Yonago Acta medica, 39(2), 83-98.
Morris, M., & Kretzschmar, M. (1997). Concurrent partnerships and the spread of HIV. Aids, 11(5), 641.
Nagelkerke, N. J. D., Jha, P., Vlas, S. J., Korenromp, E. L., Moses, S., Blanchard, J. F., & Plummer, F. A. (2002). Modelling HIV/AIDS
epidemics in Botswana and India: impact of interventions to prevent transmission. Bulletin of the World Health Organization, 80,
89-96.
Nagoski, E. (2006). An Agent Based Model of Disease Diffusion in the Context of Heterogeneous Sexual Motivation. PhD, Indiana
University. Retrieved from http://hdl.handle.net/2022/7351
Niazi, M., & Hussain, A. (2010). Agent based tools for modeling and simulation of self-organization in peer-to-peer, ad-hoc and other
complex networks. IEEE Communications Magazine, 47(3), 163 – 173.
Niazi, M., & Hussain, A. (2011). Agent-based computing from multi-agent systems to agent-based models: a visual survey. Scientometrics,
89(2), 479-499. doi: 10.1007/s11192-011-0468-9
Niazi, M., Siddiqa, A., & Fortino, G. (2013). Modeling AIDS Spread in Social Networks. In M. Klusch, M. Thimm & M. Paprzycki (Eds.),
Multiagent System Technologies (Vol. 8076, pp. 361-371): Springer Berlin Heidelberg.
Niazi, M. A. (2013). Complex Adaptive Systems Modeling: A multidisciplinary Roadmap. Complex Adaptive Systems Modeling, 1(1), 1.
Niazi, M. A., & Hussain, A. (2011a). A Novel Agent-Based Simulation Framework for Sensing in Complex Adaptive Environments.
Sensors Journal, IEEE, 11(2), 404-412.
Niazi, M. A., & Hussain, A. (2011b). Sensing Emergence in Complex Systems. Sensors Journal, IEEE, 11(10), 2479-2480.
Niazi, M. A., & Hussain, A. (2011). Sensing Emergence in Complex Systems. IEEE Sensors Journal. doi: 10.1109/JSEN.2011.2142303
Niazi, M. A. K. (2011). Towards A Novel Unified Framework for Developing Formal, Network and Validated Agent-Based Simulation
from
PhD, University
Retrieved
Systems.
Stirling,
Models
https://dspace.stir.ac.uk/handle/1893/3365
Adaptive
Complex
of
of
Stirling.
Osgood, N., Moavenzadeh, F., & Rhee, A. J. (2006). An agent-based approach to HIV/AIDS epidemic modeling: a case study of Papua New
Guinea.
Pollack, L., Osmond, D., Paul, J., & Catania, J. (2005). Evaluation of the Center for Disease Control and Prevention's HIV behavioral
surveillance of men who have sex with men: sampling issues. Sexually transmitted diseases, 32(9), 581.
Siddiqa, A., Niazi, M. A., Mustafa, F., Bokhari, H., Hussain, A., Akram, N., . . . Iqbal, S. (2009, 15-16 Aug. 2009). A new hybrid agent-
based modeling & simulation decision support system for breast cancer data analysis. Paper presented at the Information and
Communication Technologies, 2009. ICICT '09. International Conference on.
Teweldemedhin, E., Marwala, T., & Mueller, C. (2004, 5-8 Dec. 2004). Agent-based modelling: a case study in HIV epidemic. Paper
presented at the Hybrid Intelligent Systems, 2004. HIS '04. Fourth International Conference on.
Tirado-Ramos, A., & Kelley, C. (2013). Simulation of HIV Infection Propagation Networks: A Review of the State of the Art in Agent-
Based Approaches. International Journal of Agent Technologies and Systems (IJATS), 5(1), 53-63. doi: 10.4018/jats.2013010104
UNAIDS, W. (2005). HIV/AIDS Surveillance Project Report (HASP) 2003 and 2005
UNAIDS, W. (2010). Second generation surveillance for HIV: The next decade. Islamabad: HASP, Pakistan.
Verdasca, J., Telo da Gama, M. M., Nunes, A., Bernardino, N. R., Pacheco, J. M., & Gomes, M. C. (2005). Recurrent epidemics in small
world networks. Journal of Theoretical Biology, 233(4), 553-561. doi: DOI: 10.1016/j.jtbi.2004.10.031
WHO. (2011). Adult HIV Prevalence (15-49 years) by WHO Region (G. H. Observatory, Trans.): World Health Organization.
Wilensky, U. (1999). NetLogo. Evanston, IL, 1999: Center for Connected Learning Comp.-Based Modeling, Northwestern University.
Retrieved from http://ccl.northwestern.edu/netlogo
Woodcock, J., & Davies, J. (1996). Using Z: specification, refinement, and proof: Prentice Hall Upper Saddle River, NJ.
|
1810.05587 | 3 | 1810 | 2019-08-30T19:33:23 | A Survey and Critique of Multiagent Deep Reinforcement Learning | [
"cs.MA",
"cs.AI",
"cs.LG"
] | Deep reinforcement learning (RL) has achieved outstanding results in recent years. This has led to a dramatic increase in the number of applications and methods. Recent works have explored learning beyond single-agent scenarios and have considered multiagent learning (MAL) scenarios. Initial results report successes in complex multiagent domains, although there are several challenges to be addressed. The primary goal of this article is to provide a clear overview of current multiagent deep reinforcement learning (MDRL) literature. Additionally, we complement the overview with a broader analysis: (i) we revisit previous key components, originally presented in MAL and RL, and highlight how they have been adapted to multiagent deep reinforcement learning settings. (ii) We provide general guidelines to new practitioners in the area: describing lessons learned from MDRL works, pointing to recent benchmarks, and outlining open avenues of research. (iii) We take a more critical tone raising practical challenges of MDRL (e.g., implementation and computational demands). We expect this article will help unify and motivate future research to take advantage of the abundant literature that exists (e.g., RL and MAL) in a joint effort to promote fruitful research in the multiagent community. | cs.MA | cs | A Survey and Critique of Multiagent Deep Reinforcement Learning$
Pablo Hernandez-Leal, Bilal Kartal and Matthew E. Taylor
{pablo.hernandez,bilal.kartal,matthew.taylor}@borealisai.com
Borealis AI
Edmonton, Canada
9
1
0
2
g
u
A
0
3
]
A
M
.
s
c
[
3
v
7
8
5
5
0
.
0
1
8
1
:
v
i
X
r
a
Abstract
Deep reinforcement learning (RL) has achieved outstanding results in recent years. This has led
to a dramatic increase in the number of applications and methods. Recent works have explored
learning beyond single-agent scenarios and have considered multiagent learning (MAL) scenarios.
Initial results report successes in complex multiagent domains, although there are several challenges
to be addressed. The primary goal of this article is to provide a clear overview of current multiagent
deep reinforcement learning (MDRL) literature. Additionally, we complement the overview with a
broader analysis: (i) we revisit previous key components, originally presented in MAL and RL, and
highlight how they have been adapted to multiagent deep reinforcement learning settings. (ii) We
provide general guidelines to new practitioners in the area: describing lessons learned from MDRL
works, pointing to recent benchmarks, and outlining open avenues of research. (iii) We take a
more critical tone raising practical challenges of MDRL (e.g., implementation and computational
demands). We expect this article will help unify and motivate future research to take advantage of
the abundant literature that exists (e.g., RL and MAL) in a joint effort to promote fruitful research
in the multiagent community.
1. Introduction
Almost 20 years ago Stone and Veloso's seminal survey [1] laid the groundwork for defining the
area of multiagent systems (MAS) and its open problems in the context of AI. About ten years
ago, Shoham, Powers, and Grenager [2] noted that the literature on multiagent learning (MAL)
was growing and it was not possible to enumerate all relevant articles. Since then, the number of
published MAL works continues to steadily rise, which led to different surveys on the area, ranging
from analyzing the basics of MAL and their challenges [3, 4, 5], to addressing specific subareas:
game theory and MAL [2, 6], cooperative scenarios [7, 8], and evolutionary dynamics of MAL [9].
In just the last couple of years, three surveys related to MAL have been published:
learning in
non-stationary environments [10], agents modeling agents [11], and transfer learning in multiagent
RL [12].
The research interest in MAL has been accompanied by successes in artificial intelligence,
first, in single-agent video games [13]; more recently, in two-player games, for example, playing
$Earlier versions of this work had the title: "Is multiagent deep reinforcement learning the answer or the question?
A brief survey"
1
Go [14, 15], poker [16, 17], and games of two competing teams, e.g., DOTA 2 [18] and StarCraft
II [19].
While different techniques and algorithms were used in the above scenarios, in general, they are
all a combination of techniques from two main areas: reinforcement learning (RL) [20] and deep
learning [21, 22].
RL is an area of machine learning where an agent learns by interacting (i.e., taking actions)
within a dynamic environment. However, one of the main challenges to RL, and traditional ma-
chine learning in general, is the need for manually designing quality features on which to learn.
Deep learning enables efficient representation learning, thus allowing the automatic discovery of
features [21, 22]. In recent years, deep learning has had successes in different areas such as com-
puter vision and natural language processing [21, 22]. One of the key aspects of deep learning is the
use of neural networks (NNs) that can find compact representations in high-dimensional data [23].
In deep reinforcement learning (DRL) [23, 24] deep neural networks are trained to approximate
the optimal policy and/or the value function.
In this way the deep NN, serving as function
approximator, enables powerful generalization. One of the key advantages of DRL is that it enables
RL to scale to problems with high-dimensional state and action spaces. However, most existing
successful DRL applications so far have been on visual domains (e.g., Atari games), and there is
still a lot of work to be done for more realistic applications [25, 26] with complex dynamics, which
are not necessarily vision-based.
DRL has been regarded as an important component in constructing general AI systems [27]
and has been successfully integrated with other techniques, e.g., search [14], planning [28], and
more recently with multiagent systems, with an emerging area of multiagent deep reinforcement
learning (MDRL)[29, 30].1
Learning in multiagent settings is fundamentally more difficult than the single-agent case due to
the presence of multiagent pathologies, e.g., the moving target problem (non-stationarity) [2, 5, 10],
curse of dimensionality [2, 5], multiagent credit assignment [31, 32], global exploration [8], and
relative overgeneralization [33, 34, 35]. Despite this complexity, top AI conferences like AAAI,
ICML, ICLR, IJCAI and NeurIPS, and specialized conferences such as AAMAS, have published
works reporting successes in MDRL. In light of these works, we believe it is pertinent to first, have
an overview of the recent MDRL works, and second, understand how these recent works relate to
the existing literature.
This article contributes to the state of the art with a brief survey of the current works in
MDRL in an effort to complement existing surveys on multiagent learning [36, 10], cooperative
learning [7, 8], agents modeling agents [11], knowledge reuse in multiagent RL [12], and (single-
agent) deep reinforcement learning [23, 37].
First, we provide a short review of key algorithms in RL such as Q-learning and REINFORCE
(see Section 2.1). Second, we review DRL highlighting the challenges in this setting and reviewing
recent works (see Section 2.2). Third, we present the multiagent setting and give an overview of
key challenges and results (see Section 3.1). Then, we present the identified four categories to
group recent MDRL works (see Figure 1):
• Analysis of emergent behaviors: evaluate single-agent DRL algorithms in multiagent scenarios
(e.g., Atari games, social dilemmas, 3D competitive games).
• Learning communication: agents learn communication protocols to solve cooperative tasks.
1We have noted inconsistency in abbreviations such as: D-MARL, MADRL, deep-multiagent RL and MA-DRL.
2
(a) Analysis of emergent behaviors
(b) Learning communication
(c) Learning cooperation
(d) Agents modeling agents
Figure 1: Categories of different MDRL works.
(a) Analysis of emergent behaviors: evaluate single-agent DRL
algorithms in multiagent scenarios. (b) Learning communication: agents learn with actions and through messages.
(c) Learning cooperation: agents learn to cooperate using only actions and (local) observations. (d) Agents modeling
agents: agents reason about others to fulfill a task (e.g., cooperative or competitive). For a more detailed description
see Sections 3.3 -- 3.6 and Tables 1 -- 4.
• Learning cooperation: agents learn to cooperate using only actions and (local) observations.
• Agents modeling agents: agents reason about others to fulfill a task (e.g., best response
learners).
For each category we provide a description as well as outline the recent works (see Section 3.2
and Tables 1 -- 4). Then, we take a step back and reflect on how these new works relate to the existing
literature. In that context, first, we present examples on how methods and algorithms originally
introduced in RL and MAL were successfully been scaled to MDRL (see Section 4.1). Second,
we provide some pointers for new practitioners in the area by describing general lessons learned
from the existing MDRL works (see Section 4.2) and point to recent multiagent benchmarks (see
Section 4.3). Third, we take a more critical view and describe practical challenges in MDRL, such
as reproducibility, hyperparameter tunning, and computational demands (see Section 4.4). Then,
we outline some open research questions (see Section 4.5). Lastly, we present our conclusions from
this work (see Section 5).
Our goal is to outline a recent and active area (i.e., MDRL), as well as to motivate future
research to take advantage of the ample and existing literature in multiagent learning. We aim to
enable researchers with experience in either DRL or MAL to gain a common understanding about
recent works, and open problems in MDRL, and to avoid having scattered sub-communities with
little interaction [2, 10, 11, 38].
2. Single-agent learning
This section presents the formalism of reinforcement learning and its main components before
outlining deep reinforcement learning along with its particular challenges and recent algorithms.
3
For a more detailed description we refer the reader to excellent books and surveys on the area [39,
20, 23, 40, 24].
2.1. Reinforcement learning
RL formalizes the interaction of an agent with an environment using a Markov decision process
(MDP) [41]. An MDP is defined by the tuple (cid:104)S,A, R, T, γ(cid:105) where S represents a finite set of states.
A represents a finite set of actions. The transition function T : S × A × S → [0, 1] determines the
probability of a transition from any state s ∈ S to any state s(cid:48) ∈ S given any possible action a ∈ A.
The reward function R : S ×A×S → R defines the immediate and possibly stochastic reward that
an agent would receive given that the agent executes action a while in state s and it is transitioned
to state s(cid:48), γ ∈ [0, 1] represents the discount factor that balances the trade-off between immediate
rewards and future rewards.
MDPs are adequate models to obtain optimal decisions in single agent fully observable environ-
ments.2 Solving an MDP will yield a policy π : S → A, which is a mapping from states to actions.
An optimal policy π∗ is the one that maximizes the expected discounted sum of rewards. There are
different techniques for solving MDPs assuming a complete description of all its elements. One of
the most common techniques is the value iteration algorithm [44], which requires a complete and
accurate representation of states, actions, rewards, and transitions. However, this may be difficult
to obtain in many domains. For this reason, RL algorithms often learn from experience interacting
with the environment in discrete time steps.
Q-learning. One of the most well known algorithms for RL is Q-learning [45]. It has been devised
for stationary, single-agent, fully observable environments with discrete actions. A Q-learning agent
keeps the estimate of its expected payoff starting in state s, taking action a as Q(s, a). Each tabular
entry Q(s, a) is an estimate of the corresponding optimal Q∗ function that maps state-action pairs
to the discounted sum of future rewards starting with action a at state s and following the optimal
policy thereafter. Each time the agent transitions from a state s to a state s(cid:48) via action a receiving
payoff r, the Q table is updated as follows:
Q(s, a) ← Q(s, a) + α[(r + γ max
a(cid:48)
Q(s(cid:48), a(cid:48))) − Q(s, a)]
(1)
with the learning rate α ∈ [0, 1]. Q-learning is proven to converge to Q∗ if state and action spaces
are discrete and finite, the sum of the learning rates goes to infinity (so that each state-action pair
is visited infinitely often) and that the sum of the squares of the learning rates is finite (which
is required to show that the convergence is with probability one) [46, 45, 47, 48, 49, 50, 51].
The convergence of single-step on-policy RL algorithms, i.e, SARSA (λ = 0), for both decaying
exploration (greedy in the limit with infinite exploration) and persistent exploration (selecting
actions probabilistically according to the ranks of the Q values) was demonstrated by Singh et
al. [52]. Furthermore, Van Seijen [53] has proven convergence for Expected SARSA (see Section 3.1
for convergence results in multiagent domains).
2A Partially Observable Markov Decision Process (POMDP) [42, 43] explicitly models environments where the
agent no longer sees the true system state and instead receives an observation (generated from the underlying system
state).
4
REINFORCE (Monte Carlo policy gradient). In contrast to value-based methods, which do not
try to optimize directly over a policy space [54], policy gradient methods can learn parameterized
policies without using intermediate value estimates.
Policy parameters are learned by following the gradient of some performance measure with
gradient descent [55]. For example, REINFORCE [56] uses estimated return by Monte Carlo (MC)
methods with full episode trajectories to learn policy parameters θ, with π(a; s, θ) ≈ π(a; s), as
follows
∇π(At; St, θt)
π(At; St, θt)
(2)
where Gt represents the return, α is the learning rate, and At ∼ π. A main limitation is that policy
gradient methods can have high variance [54].
θt+1 = θt + αGt
The policy gradient update can be generalized to include a comparison to an arbitrary baseline
of the state [56]. The baseline, b(s), can be any function, as long as it does not vary with the
action; the baseline leaves the expected value of the update unchanged, but it can have an effect
on its variance [20]. A natural choice for the baseline is a learned state-value function, this reduces
the variance, and it is bias-free if learned by MC.3 Moreover, when using the state-value function
for bootstrapping (updating the value estimate for a state from the estimated values of subsequent
states) it assigns credit (reducing the variance but introducing bias), i.e., criticizes the policy's
action selections. Thus, in actor-critic methods [54], the actor represents the policy, i.e., action-
selection mechanism, whereas a critic is used for the value function learning. In the case when
the critic learns a state-action function (Q function) and a state value function (V function), an
advantage function can be computed by subtracting state values from the state-action values [20,
60]. The advantage function indicates the relative quality of an action compared to other available
actions computed from the baseline, i.e., state value function. An example of an actor-critic
algorithm is Deterministic Policy Gradient (DPG) [61]. In DPG [61] the critic follows the standard
Q-learning and the actor is updated following the gradient of the policy's performance [62], DPG
was later extended to DRL (see Section 2.2) and MDRL (see Section 3.5). For multiagent learning
settings the variance is further increased as all the agents' rewards depend on the rest of the agents,
and it is formally shown that as the number of agents increase, the probability of taking a correct
gradient direction decreases exponentially [63]. Recent MDRL works addressed this high variance
issue, e.g., COMA [64] and MADDPG [63] (see Section 3.5).
Policy gradient methods have a clear connection with deep reinforcement learning since the
policy might be represented by a neural network whose input is a representation of the state, whose
output are action selection probabilities or values for continuous control [65], and whose weights
are the policy parameters.
2.2. Deep reinforcement learning
While tabular RL methods such as Q-learning are successful in domains that do not suffer
from the curse of dimensionality, there are many limitations: learning in large state spaces can be
prohibitively slow, methods do not generalize (across the state space), and state representations
need to be hand-specified [20]. Function approximators tried to address those limitations, using
3Action-dependant baselines had been proposed [57, 58], however, a recent study by Tucker et al. [59] found that
in many works the reason of good performance was because of bugs or errors in the code, rather than the proposed
method itself.
5
for example, decision trees [66], tile coding [67], radial basis functions [68], and locally weighted
regression [69] to approximate the value function.
Similarly, these challenges can be addressed by using deep learning, i.e., neural networks [69, 66]
as function approximators. For example, Q(s, a; θ) can be used to approximate the state-action
values with θ representing the neural network weights. This has two advantages, first, deep learning
helps to generalize across states improving the sample efficiency for large state-space RL problems.
Second, deep learning can be used to reduce (or eliminate) the need for manually designing features
to represent state information [21, 22].
However, extending deep learning to RL problems comes with additional challenges including
non-i.i.d. (not independently and identically distributed) data. Many supervised learning methods
assume that training data is from an i.i.d. stationary distribution [70, 22, 71]. However, in RL,
training data consists of highly correlated sequential agent-environment interactions, which violates
the independence condition. Moreover, RL training data distribution is non-stationary as the agent
actively learns while exploring different parts of the state space, violating the condition of sampled
data being identically distributed [72].
In practice, using function approximators in RL requires making crucial representational de-
cisions and poor design choices can result in estimates that diverge from the optimal value func-
tion [73, 69, 74, 75, 76, 77]. In particular, function approximation, bootstrapping, and off-policy
learning are considered the three main properties that when combined, can make the learning to di-
verge and are known as the deadly triad [77, 20]. Recently, some works have shown that non-linear
(i.e., deep) function approximators poorly estimate the value function [78, 59, 79] and another
work found problems with Q-learning using function approximation (over/under-estimation, in-
stability and even divergence) due to the delusional bias: "delusional bias occurs whenever a
backed-up value estimate is derived from action choices that are not realizable in the underlying
policy class"[80]. Additionally, convergence results for reinforcement learning using function ap-
proximation are still scarce [74, 81, 82, 83, 80]; in general, stronger convergence guarantees are
available for policy-gradient methods [55] than for value-based methods [20].
Below we mention how the existing DRL methods aim to address these challenges when briefly
reviewing value-based methods, such as DQN [13]; policy gradient methods, like Proximal Policy
Optimization (PPO) [60]; and actor-critic methods like Asynchronous Advantage Actor-Critic
(A3C) [84]. We refer the reader to recent surveys on single-agent DRL [23, 37, 24] for a more
detailed discussion of the literature.
Value-based methods. The major breakthrough work combining deep learning with Q-learning was
the Deep Q-Network (DQN) [13]. DQN uses a deep neural network for function approxima-
tion [87]4 (see Figure 2) and maintains an experience replay (ER) buffer [89, 90] to store interactions
(cid:104)s, a, r, s(cid:48)(cid:105). DQN keeps an additional copy of neural network parameters, θ−, for the target net-
work in addition to the θ parameters to stabilize the learning, i.e., to alleviate the non-stationary
data distribution.5 For each training iteration i, DQN minimizes the mean-squared error (MSE)
between the Q-network and its target network using the loss function:
4Before DQN, many approaches used neural networks for representing the Q-value function [88], such as Neural
Fitted Q-learning [87] and NEAT+Q [75].
5Double Q-learning [91] originally proposed keeping two Q functions (estimators) to reduce the overestimation
bias in RL, while still keeping the convergence guarantees, later it was extended to DRL in Double DQN [92] (see
Section 4.1).
6
Figure 2: Deep Q-Network (DQN) [13]: Inputs are four stacked frames; the network is composed of several layers:
Convolutional layers employ filters to learn features from high-dimensional data with a much smaller number of
neurons and Dense layers are fully-connected layers. The last layer represents the actions the agent can take (in
this case, 10 possible actions). Deep Recurrent Q-Network (DRQN) [85], which extends DQN to partially observable
domains [42], is identical to this setup except the penultimate layer (1× 256 Dense layer) is replaced with a recurrent
LSTM layer [86].
Li(θi) = Es,a,r,s(cid:48)[(r + γmaxa(cid:48)Q(s(cid:48), a(cid:48); θ−
(3)
where target network parameters θ− are set to Q-network parameters θ periodically and mini-
batches of (cid:104)s, a, r, s(cid:48)(cid:105) tuples are sampled from the ER buffer, as depicted in Figure 3.
i ) − Q(s, a; θi))2]
The ER buffer provides stability for learning as random batches sampled from the buffer helps
alleviating the problems caused by the non-i.i.d. data. However, it comes with disadvantages,
such as higher memory requirements and computation per real interaction [93]. The ER buffer is
mainly used for off-policy RL methods as it can cause a mismatch between buffer content from
earlier policy and from the current policy for on-policy methods [93]. Extending the ER buffer
for the multiagent case is not trivial, see Sections 3.5, 4.1 and 4.2. Recent works were designed
to reduce the problem of catastrophic forgetting (this occurs when the trained neural network
performs poorly on previously learned tasks due to a non-stationary training distribution [94, 95])
and the ER buffer, in DRL [96] and MDRL [97].
DQN has been extended in many ways, for example, by using double estimators [91] to reduce
the overestimation bias with Double DQN [92] (see Section 4.1) and by decomposing the Q-function
with a dueling-DQN architecture [98], where two streams are learned, one estimates state values
and another one advantages, those are combined in the final layer to form Q values (this method
improved over Double DQN).
In practice, DQN is trained using an input of four stacked frames (last four frames the agent has
encountered). If a game requires a memory of more than four frames it will appear non-Markovian
to DQN because the future game states (and rewards) do not depend only on the input (four
frames) but rather on the history [99]. Thus, DQN's performance declines when given incomplete
state observations (e.g., one input frame) since DQN assumes full state observability.
Real-world tasks often feature incomplete and noisy state information resulting from partial
observability (see Section 2.1). Deep Recurrent Q-Networks (DRQN) [85] proposed using recurrent
neural networks, in particular, Long Short-Term Memory (LSTMs) cells [86] in DQN, for this
setting. Consider the architecture in Figure 2 with the first dense layer after convolution replaced
7
Figure 3: Representation of a DQN agent that uses an experience replay buffer [89, 90] to keep (cid:104)s, a, r, s(cid:48)(cid:105) tuples for
minibatch updates. The Q-values are parameterized with a NN and a policy is obtained by selecting (greedily) over
those at every timestep.
by a layer of LSTM cells. With this addition, DRQN has memory capacity so that it can even
work with only one input frame rather than a stacked input of consecutive frames. This idea has
been extended to MDRL, see Figure 6 and Section 4.2. There are also other approaches to deal
with partial observability such as finite state controllers [100] (where action selection is performed
according to the complete observation history) and using an initiation set of options conditioned
on the previously employed option [101].
Policy gradient methods. For many tasks, particularly for physical control, the action space is
continuous and high dimensional where DQN is not suitable. Deep Deterministic Policy Gradient
(DDPG) [65] is a model-free off-policy actor-critic algorithm for such domains, based on the DPG
algorithm [61] (see Section 2.1). Additionally, it proposes a new method for updating the networks,
i.e., the target network parameters slowly change (this could also be applicable to DQN), in contrast
to the hard reset (direct weight copy) used in DQN. Given the off-policy nature, DDPG generates
exploratory behavior by adding sampled noise from some noise processes to its actor policy. The
authors also used batch normalization [102] to ensure generalization across many different tasks
without performing manual normalizations. However, note that other works have shown batch
normalization can cause divergence in DRL [103, 104].
Asynchronous Advantage Actor-Critic (A3C) [93] is an algorithm that employs a parallelized
asynchronous training scheme (using multiple CPU threads) for efficiency.
It is an on-policy
RL method that does not use an experience replay buffer. A3C allows multiple workers to
simultaneously interact with the environment and compute gradients locally. All the workers
pass their computed local gradients to a global NN which performs the optimization and syn-
chronizes with the workers asynchronously (see Figure 4). There is also the Advantage Actor-
Critic (A2C) method [105] that combines all the gradients from all the workers to update the
global NN synchronously. The loss function for A3C is composed of two terms: policy loss (ac-
tor), Lπ, and value loss (critic), Lv. A3C parameters are updated using the advantage function
A(st, at; θv) = Q(s, a)− V (s), commonly used to reduce variance (see Section 2.1). An entropy loss
for the policy, H(π), is also commonly added, which helps to improve exploration by discouraging
premature convergence to suboptimal deterministic policies [93]. Thus, the loss function is given
by: LA3C = λvLv + λπLπ − λHEs∼π[H(π(s,·, θ)] with λv, λπ, and λH , being weighting terms on the
individual loss components. Wang et al. [106] took A3C's framework but used off-policy learning
8
Figure 4: Asynchronous Advantage Actor-Critic (A3C) employs multiple (CPUs) workers without needing an ER
buffer. Each worker has its own NN and independently interacts with the environment to compute the loss and
gradients. Workers then pass computed gradients to the global NN that optimizes the parameters and synchronizes
with the worker asynchronously. This distributed system is designed for single-agent deep RL. Compared to different
DQN variants, A3C obtains better performance on a variety of Atari games using substantially less training time
with multiple CPU cores of standard laptops without a GPU [93]. However, we note that more recent approaches
use both multiple CPU cores for more efficient training data generation and GPUs for more efficient learning.
to create the Actor-critic with experience replay (ACER) algorithm. Gu et al. [107] introduced
the Interpolated Policy Gradient (IPG) algorithm and showed a connection between ACER and
DDPG: they are a pair of reparametrization terms (they are special cases of IPG) when they are
put under the same stochastic policy setting, and when the policy is deterministic they collapse
into DDPG.
Jaderberg et al. [84] built the Unsupervised Reinforcement and Auxiliary Learning (UNREAL)
framework on top of A3C and introduced unsupervised auxiliary tasks (e.g., reward prediction)
to speed up the learning process. Auxiliary tasks in general are not used for anything other
than shaping the features of the agent, i.e., facilitating and regularizing the representation learn-
(cid:80)
ing process [108, 109]; their formalization in RL is related to the concept of general value func-
tions [20, 110]. The UNREAL framework optimizes a combined loss function LUNREAL ≈ LA3C +
i λATiLATi, that combines the A3C loss, LA3C, together with auxiliary task losses LATi, where
λATi are weight terms (see Section 4.1 for use of auxiliary tasks in MDRL). In contrast to A3C, UN-
REAL uses a prioritized ER buffer, in which transitions with positive reward are given higher prob-
ability of being sampled. This approach can be viewed as a simple form of prioritized replay [111],
which was in turn inspired by model-based RL algorithms like prioritized sweeping [112, 113].
Another distributed architecture is the Importance Weighted Actor-Learner Architecture (IM-
9
PALA) [114]. Unlike A3C or UNREAL, IMPALA actors communicate trajectories of experience
(sequences of states, actions, and rewards) to a centralized learner, thus IMPALA decouples acting
from learning.
Trust Region Policy Optimization (TRPO) [60] and Proximal Policy Optimization (PPO) [115]
are recently proposed policy gradient algorithms where the latter represents the state-of-the art
with advantages such as being simpler to implement and having better empirical sample complex-
ity. Interestingly, a recent work [79] studying PPO and TRPO arrived at the surprising conclusion
that these methods often deviate from what the theoretical framework would predict: gradient
estimates are poorly correlated with the true gradient and value networks tend to produce inaccu-
rate predictions for the true value function. Compared to vanilla policy gradient algorithms, PPO
prevents abrupt changes in policies during training through the loss function, similar to early work
by Kakade [116]. Another advantage of PPO is that it can be used in a distributed fashion, i.e,
Distributed PPO (DPPO) [117]. Note that distributed approaches like DPPO or A3C use paral-
lelization only to improve the learning by more efficient training data generation through multiple
CPU cores for single agent DRL and they should not be considered multiagent approaches (except
for recent work which tries to exploit this parallelization in a multiagent environment [118]).
Lastly, there's a connection between policy gradient algorithms and Q-learning [119] within the
framework of entropy-regularized reinforcement learning [120] where the value and Q functions are
slightly altered to consider the entropy of the policy. In this vein, Soft Actor-Critic (SAC) [121] is
a recent algorithm that concurrently learns a stochastic policy, two Q-functions (taking inspiration
from Double Q-learning) and a value function. SAC alternates between collecting experience with
the current policy and updating from batches sampled from the ER buffer.
We have reviewed recent algorithms in DRL, while the list is not exhaustive, it provides an
overview of the different state-of-art techniques and algorithms which will become useful while
describing the MDRL techniques in the next section.
3. Multiagent Deep Reinforcement Learning (MDRL)
First, we briefly introduce the general framework on multiagent learning and then we dive into
the categories and the research on MDRL.
3.1. Multiagent Learning
Learning in a multiagent environment is inherently more complex than in the single-agent
case, as agents interact at the same time with environment and potentially with each other [5].
The independent learners, a.k.a. decentralized learners approach [122] directly uses single-agent
algorithms in the multi-agent setting despite the underlying assumptions of these algorithms being
violated (each agent independently learns its own policy, treating other agents as part of the
environment). In particular the Markov property (the future dynamics, transitions, and rewards
depend only on the current state) becomes invalid since the environment is no longer stationary [4,
6, 123]. This approach ignores the multiagent nature of the setting entirely and it can fail when
an opponent adapts or learns, for example, based on the past history of interactions [2]. Despite
the lack of guarantees, independent learners have been used in practice, providing advantages with
regards to scalability while often achieving good results [8].
To understand why multiagent domains are non-stationary from agents' local perspectives,
consider a simple stochastic (also known as Markov) game (S,N ,A,T ,R), which can be seen as
an extension of an MDP to multiple agents [124, 125]. One key distinction is that the transition,
10
T , and reward function, R, depend on the actions A = A1 × ...× AN of all, N , agents, this means,
R = R1 × ... × RN and T = S × A1 × ... × AN .
Given a learning agent i and using the common shorthand notation −i = N \{i} for the set of
opponents, the value function now depends on the joint action a = (ai, a−i), and the joint policy
π(s, a) =(cid:81)
j πj(s, aj):6
V π
i (s) =
π(s, a)
T (s, ai, a−i, s(cid:48))[Ri(s, ai, a−i, s(cid:48)) + γVi(s(cid:48))].
(cid:88)
a∈A
(cid:88)
s(cid:48)∈S
(4)
(5)
Consequently, the optimal policy is dependent on the other agents' policies,
π∗
i (s, ai, π−i) = arg max
(πi,π−i)
i
V
πi
(cid:88)
a∈A
arg max
πi
(s) =
(cid:88)
s(cid:48)∈S
πi(s, ai)π−i(s, a−i)
T (s, ai, a−i, s(cid:48))[Ri(s, ai, a−i, s(cid:48)) + γV
(πi,π−i)
i
(s(cid:48))].
Specifically, the opponents' joint policy π−i(s, a−i) can be non-stationary, i.e., changes as the
opponents' policies change over time, for example with learning opponents.
Convergence results. Littman [125] studied convergence properties of reinforcement learning joint
action agents [126] in Markov games with the following conclusions: in adversarial environments
(zero-sum games) an optimal play can be guaranteed against an arbitrary opponent, i.e., Minimax
Q-learning [124]. In coordination environments (e.g., in cooperative games all agents share the same
reward function), strong assumptions need be made about other agents to guarantee convergence
to optimal behavior [125], e.g., Nash Q-learning [127] and Friend-or-Foe Q-learning [128]. In other
types of environments no value-based RL algorithms with guaranteed convergence properties are
known [125].
Recent work on MDRL have addressed scalability and have focused significantly less on con-
vergence guarantees, with few exceptions [129, 130, 131, 132]. One notable work has shown a
connection between update rules for actor-critic algorithms for multiagent partially observable set-
tings and (counterfactual) regret minimization:7 the advantage values are scaled counterfactual
regrets. This lead to new convergence properties of independent RL algorithms in zero-sum games
with imperfect information [136]. The result is also used to support policy gradient optimization
against worst-case opponents, in a new algorithm called Exploitability Descent [137].8
We refer the interested reader to seminal works about convergence in multiagent domains [139,
140, 141, 142, 143, 144, 145, 146, 147, 148, 149]. Note that instead of convergence, some MAL
algorithms have proved learning a best response against classes of opponents [150, 151, 152].
There are other common problems in MAL, including action shadowing [34, 33], the curse of
dimensionality [5], and multiagent credit assignment [32]. Describing each problem is out of the
6In this setting each agent independently executes a policy, however, there are other cases where this does not
hold, for example when agents have a coordinated exploration strategy.
7 Counterfactual regret minimization is a technique for solving large games based on regret minimization [133, 134]
due to a well-known connection between regret and Nash equilibria [135]. It has been one of the reasons of successes
in Poker [16, 17].
8This algorithm is similar to CFR-BR [138] and has the main advantage that the current policy convergences
rather than the average policy, so there is no need to learn the average strategy, which requires large reservoir buffers
or many past networks.
11
scope of this survey. However, we refer the interested reader to excellent resources on general
MAL [4, 153, 154], as well as surveys in specific areas: game theory and multiagent reinforce-
ment learning [5, 6], cooperative scenarios [7, 8], evolutionary dynamics of multiagent learning [9],
learning in non-stationary environments [10], agents modeling agents [11], and transfer learning in
multiagent RL [12].
3.2. MDRL categorization
In Section 2.2 we outlined some recent works in single-agent DRL since an exhaustive list is out
of the scope of this article. This explosion of works has led DRL to be extended and combined with
other techniques [23, 37, 29]. One natural extension to DRL is to test whether these approaches
could be applied in a multiagent environment.
We analyzed the most recent works (that are not covered by previous MAL surveys [10, 11]
and we do not consider genetic algorithms or swarm intelligence in this survey) that have a clear
connection with MDRL. We propose 4 categories which take inspiration from previous surveys [1,
5, 7, 11] and that conveniently describe and represent current works. Note that some of these works
fit into more than one category (they are not mutually exclusive), therefore their summaries are
presented in all applicable Tables 1-4, however, for the ease of exposition when describing them in
the text we only do so in one category. Additionally, for each work we present its learning type,
either a value-based method (e.g., DQN) or a policy gradient method (e.g., actor-critic); also, we
mention if the setting is evaluated in a fully cooperative, fully competitive or mixed environment
(both cooperative and competitive).
• Analysis of emergent behaviors. These works, in general, do not propose learning algorithms
-- their main focus is to analyze and evaluate DRL algorithms, e.g., DQN [155, 156, 157],
PPO [158, 157] and others [159, 157, 160], in a multiagent environment. In this category we
found works which analyze behaviors in the three major settings: cooperative, competitive
and mixed scenarios; see Section 3.3 and Table 1.
• Learning communication [161, 160, 162, 163, 164, 165]. These works explore a sub-area
in which agents can share information with communication protocols, for example through
direct messages [162] or via a shared memory [165]. This area is attracting attention and it
had not been explored much in the MAL literature. See Section 3.4 and Table 2.
• Learning cooperation. While learning to communicate is an emerging area, fostering coop-
eration in learning agents has a long history of research in MAL [7, 8].
In this category
the analyzed works are evaluated in either cooperative or mixed settings. Some works in
this category take inspiration from MAL (e.g., leniency, hysteresis, and difference rewards
concepts) and extend them to the MDRL setting [35, 166, 167]. A notable exception [168]
takes a key component from RL (i.e., experience replay buffer) and adapts it for MDRL. See
Section 3.5 and Table 3.
• Agents modeling agents. Albrecht and Stone [11] presented a thorough survey in this topic
and we have found many works that fit into this category in the MDRL setting, some taking
inspiration from DRL [169, 170, 171], and others from MAL [172, 173, 64, 174, 175]. Modeling
agents is helpful not only to cooperate, but also for modeling opponents [172, 169, 171, 173],
inferring goals [170], and accounting for the learning behavior of other agents [64]. In this
category the analyzed algorithms present their results in either a competitive setting or a
mixed one (cooperative and competitive). See Section 3.6 and Table 4.
12
In the rest of this section we describe each category along with the summaries of related works.
3.3. Emergent behaviors
Some recent works have analyzed the previously mentioned independent DRL agents (see Sec-
tion 3.1) from the perspective of types of emerging behaviors (e.g., cooperative or competitive).
One of the earliest MDRL works is by Tampuu et al. [155], which had two independent DQN
learning agents to play the Atari Pong game. Their focus was to adapt the reward function for the
learning agents, which resulted in either cooperative or competitive emergent behaviors.
Leibo et al. [156] meanwhile studied independent DQNs in the context of sequential social
dilemmas: a Markov game that satisfies certain inequalities [156]. The focus of this work was
to highlight that cooperative or competitive behaviors exist not only as discrete (atomic) actions,
but they are temporally extended (over policies). In the related setting of one shot Markov social
dilemmas, Lerer and Peysakhovich [176] extended the famous Tit-for-Tat (TFT)9 strategy [187]
for DRL (using function approximators) and showed (theoretically and experimentally) that such
agents can maintain cooperation. To construct the agents they used self-play and two reward
schemes: selfish and cooperative. Previously, different MAL algorithms were designed to foster
cooperation in social dilemmas with Q-learning agents [188, 189].
Self-play is a useful concept for learning algorithms (e.g., fictitious play [190]) since under certain
classes of games it can guarantee convergence10 and it has been used as a standard technique in
previous RL and MAL works [192, 14, 193]. Despite its common usage self-play can be brittle
to forgetting past knowledge [194, 172, 195] (see Section 4.5 for a note on the role of self-play
as an open question in MDRL). To overcome this issue, Leibo et al. [159] proposed Malthusian
reinforcement learning as an extension of self-play to population dynamics. The approach can be
thought of as community coevolution and has been shown to produce better results (avoiding local
optima) than independent agents with intrinsic motivation [196]. A limitation of this work is that it
does not place itself within the state of the art in evolutionary and genetic algorithms. Evolutionary
strategies have been employed for solving reinforcement learning problems [197] and for evolving
function approximators [75]. Similarly, they have been used multiagent scenarios to compute
approximate Nash equilibria [198] and as metaheuristic optimization algorithms [199, 200, 7, 201].
Bansal et al. [158] explored the emergent behaviors in competitive scenarios using the Mu-
JoCo simulator [202]. They trained independent learning agents with PPO and incorporated two
main modifications to deal with the MAL nature of the problem. First, they used exploration
rewards [203] which are dense rewards that allow agents to learn basic (non-competitive) behaviors
-- this type of reward is annealed through time giving more weight to the environmental (com-
petitive) reward. Exploration rewards come from early work in robotics [204] and single-agent
RL [205], and their goal is to provide dense feedback for the learning algorithm to improve sam-
ple efficiency (Ng et al. [206] studied the theoretical conditions under which modifications of the
reward function of an MDP preserve the optimal policy). For multiagent scenarios, these dense
rewards help agents in the beginning phase of the training to learn basic non-competitive skills,
increasing the probability of random actions from the agent yielding a positive reward. The second
9TFT originated in an iterated prisoner's dilemma tournament and later inspired different strategies in MAL [185],
its generalization, Godfather, is a representative of leader strategies [186].
10The average strategy profile of fictitious players converges to a Nash equilibrium in certain classes of games, e.g.,
two-player zero-sum and potential games [191].
13
Table 1: These papers analyze emergent behaviors in MDRL. Learning type is either value-based (VB) or policy
gradient (PG). Setting where experiments were performed: cooperative (CO), competitive (CMP) or mixed. A
detailed description is given in Section 3.3.
Work
Tampuu et al. [155]
Leibo et al. [156]
Lerer
Peysakhovich [176]
Leibo et al. [159]
and
Bansal et al. [158]
Raghu et al. [157]
Lazaridou et al. [161]
Mordatch
Abbeel [160]
and
Summary
Train DQN agents to play Pong.
Train DQN agents to play sequential social dilemmas.
Propose DRL agents able to cooperate in social dilem-
mas.
Propose Malthusian reinforcement learning which ex-
tends self-play to population dynamics.
Train PPO agents in competitive MuJoCo scenarios.
Train PPO, A3C, and DQN agents in attacker-defender
games.
Train agents represented with NN to learn a communi-
cation language.
Learn communication with an end-to-end differentiable
model to train with backpropagation.
Learning
Setting
VB
VB
VB
VB
PG
VB, PG
PG
PG
CO&CMP
Mixed
Mixed
Mixed
CMP
CMP
CO
CO
Table 2: These papers propose algorithms for learning communication. Learning type is either value-based (VB)
or policy gradient (PG). Setting were experiments were performed: cooperative (CO) or mixed. A more detailed
description is given in Section 3.4.
Algorithm
Lazaridou et al. [161]
and
Mordatch
Abbeel [160]
RIAL [162]
DIAL [162]
CommNet [163]
BiCNet [164]
MD-MADDPG [165]
MADDPG-MD [177]
Summary
Train agents represented with NN to learn a communica-
tion language.
Learn communication with an end-to-end differentiable
model to train with backpropagation.
Use a single network (parameter sharing) to train agents
that take environmental and communication actions.
Use gradient sharing during learning and communication
actions during execution.
Use a continuous vector channel for communication on a
single network.
Use the actor-critic paradigm where communication occurs
in the latent space.
Use of a shared memory as a means to multiagent commu-
nication.
Extend dropout technique to robustify communication
when applied in multiagent scenarios with direct commu-
nication.
Learning
Setting
PG
PG
VB
VB
PG
PG
PG
PG
CO
CO
CO
CO
CO
Mixed
CO
CO
14
Table 3: These papers aim to learn cooperation. Learning type is either value-based (VB) or policy gradient (PG).
Setting where experiments were performed: cooperative (CO), competitive (CMP) or mixed. A more detailed
description is given in Section 3.5.
Algorithm
Lerer
Peysakhovich [176]
MD-MADDPG [165]
and
MADDPG-MD [177]
RIAL [162]
DIAL [162]
DCH/PSRO [172]
Fingerprints [168]
Lenient-DQN [35]
Hysteretic-
DRQN [166]
WDDQN [178]
FTW [179]
VDN [180]
QMIX [181]
COMA [167]
PS-DQN, PS-TRPO,
PS-A3C [182]
MADDPG [63]
Summary
Propose DRL agents able to cooperate in social dilem-
mas.
Use of a shared memory as a means to multiagent com-
munication.
Extend dropout technique to robustify communication
when applied in multiagent scenarios with direct com-
munication.
Use a single network (parameter sharing) to train agents
that take environmental and communication actions.
Use gradient sharing during learning and communication
actions during execution.
Policies can overfit to opponents: better compute approx-
imate best responses to a mixture of policies.
Deal with ER problems in MDRL by conditioning the
value function on a fingerprint that disambiguates the
age of the sampled data.
Achieve cooperation by leniency, optimism in the value
function by forgiving suboptimal (low-rewards) actions.
Achieve cooperation by using two learning rates, depend-
ing on the updated values together with multitask learn-
ing via policy distillation.
Achieve cooperation by leniency, weighted double estima-
tors, and a modified prioritized experience replay buffer.
Agents act in a mixed environment (composed of team-
mates and opponents), it proposes a two-level architec-
ture and population-based learning.
Decompose the team action-value function into pieces
across agents, where the pieces can be easily added.
Decompose the team action-value function together with
a mixing network that can recombine them.
Use a centralized critic and a counter-factual advantage
function based on solving the multiagent credit assign-
ment.
Propose parameter sharing for learning cooperative
tasks.
Use an actor-critic approach where the critic is aug-
mented with information from other agents, the actions
of all agents.
Learning
VB
PG
PG
VB
VB
VB
VB
VB
VB
VB
PG
VB
VB
PG
Setting
Mixed
CO
CO
CO
CO
CO & CMP
CO
CO
CO
CO
Mixed
Mixed
Mixed
Mixed
VB, PG
CO
PG
Mixed
15
Table 4: These papers consider agents modeling agents. Learning type is either value-based (VB) or policy gradient
(PG). Setting where experiments were performed: cooperative (CO), competitive (CMP) or mixed. A more detailed
description is given in Section 3.6.
Algorithm
MADDPG [63]
DRON [169]
DPIQN,
DPIRQN [171]
SOM [170]
NFSP [173]
PSRO/DCH [172]
M3DDPG [183]
LOLA [64]
ToMnet [174]
Bayes-
Deep
ToMoP [175]
Deep BPR+[184]
Summary
Use an actor-critic approach where the critic is augmented
with information from other agents, the actions of all
agents.
Have a network to infer the opponent behavior together
with the standard DQN architecture.
Learn policy features from raw observations that represent
high-level opponent behaviors via auxiliary tasks.
Assume the reward function depends on a hidden goal of
both agents and then use an agent's own policy to infer the
goal of the other agent.
Compute approximate Nash equilibria via self-play and two
neural networks.
Policies can overfit to opponents: better compute approxi-
mate best responses to a mixture of policies.
Extend MADDPG with minimax objective to robustify the
learned policy.
Use a learning rule where the agent accounts for the param-
eter update of other agents to maximize its own reward.
Use an architecture for end-to-end learning and inference
of diverse opponent types.
Best respond to opponents using Bayesian policy reuse, the-
ory of mind, and deep networks.
Bayesian policy reuse and policy distillation to quickly best
respond to opponents.
Learning
PG
Setting
Mixed
VB
VB
PG
VB
PG
PG
PG
PG
VB
VB
Mixed
Mixed
Mixed
CMP
CO & CMP
Mixed
Mixed
Mixed
CMP
CO & CMP
16
contribution was opponent sampling which maintains a pool of older versions of the opponent to
sample from, in contrast to using the most recent version.
Raghu et al. [157] investigated how DRL algorithms (DQN, A2C, and PPO) performed in
a family of two-player zero-sum games with tunable complexity, called Erdos-Selfridge-Spencer
games [207, 208]. Their reasoning is threefold: (i) these games provide a parameterized family
of environments where (ii) optimal behavior can be completely characterized, and (iii) support
multiagent play. Their work showed that algorithms can exhibit wide variation in performance as
the algorithms are tuned to the game's difficulty.
Lazaridou et al. [161] proposed a framework for language learning that relies on multiagent
communication. The agents, represented by (feed-forward) neural networks, need to develop an
emergent language to solve a task. The task is formalized as a signaling game [209] in which two
agents, a sender and a receiver, obtain a pair of images. The sender is told one of them is the target
and is allowed to send a message (from a fixed vocabulary) to the receiver. Only when the receiver
identifies the target image do both agents receive a positive reward. The results show that agents
can coordinate for the experimented visual-based domain. To analyze the semantic properties11 of
the learned communication protocol they looked whether symbol usage reflects the semantics of
the visual space, and that despite some variation, many high level objects groups correspond to the
same learned symbols using a t-SNE [210] based analysis (t-SNE is a visualization technique for
high-dimensional data and it has also been used to better understand the behavior of trained DRL
agents [211, 212]). A key objective of this work was to determine if the agent's language could be
human-interpretable. To achieve this, learned symbols were grounded with natural language by
extending the signaling game with a supervised image labelling task (the sender will be encouraged
to use conventional names, making communication more transparent to humans). To measure the
interpretability of the extended game, a crowdsourced survey was performed, and in essence, the
trained agent receiver was replaced with a human. The results showed that 68% of the cases,
human participants picked the correct image.
Similarly, Mordatch and Abbeel [160] investigated the emergence of language with the difference
that in their setting there were no explicit roles for the agents (i.e., sender or receiver). To learn,
they proposed an end-to-end differentiable model of all agent and environment state dynamics over
time to calculate the gradient of the return with backpropagation.
3.4. Learning communication
As we discussed in the previous section, one of the desired emergent behaviors of multiagent
interaction is the emergence of communication [161, 160]. This setting usually considers a set of
cooperative agents in a partially observable environment (see Section 2.2) where agents need to
maximize their shared utility by means of communicating information.
Reinforced Inter-Agent Learning (RIAL) and Differentiable Inter-Agent Learning (DIAL) are
two methods using deep networks to learn to communicate [162]. Both methods use a neural
net that outputs the agent's Q values (as done in standard DRL algorithms) and a message to
communicate to other agents in the next timestep. RIAL is based on DRQN and also uses the
concept of parameter sharing, i.e., using a single network whose parameters are shared among all
agents. In contrast, DIAL directly passes gradients via the communication channel during learning,
and messages are discretized and mapped to the set of communication actions during execution.
11The vocabulary that agents use was arbitrary and had no initial meaning. To understand its emerging semantics
they looked at the relationship between symbols and the sets of images they referred to [161].
17
Memory-driven (MD) communication was proposed on top of the Multi-Agent Deep Determin-
istic Policy Gradient (MADDPG) [63] method. In MD-MADDPG [165], the agents use a shared
memory as a communication channel: before taking an action, the agent first reads the memory,
then writes a response. In this case the agent's policy becomes dependent on its private observation
and its interpretation of the collective memory. Experiments were performed with two agents in
cooperative scenarios. The results highlighted the fact that the communication channel was used
differently in each environment, e.g., in simpler tasks agents significantly decrease their memory
activity near the end of the task as there are no more changes in the environment; in more complex
environments, the changes in memory usage appear at a much higher frequency due to the presence
of many sub-tasks.
Dropout [213] is a technique to prevent overfitting (in supervised learning this happens when the
learning algorithm achieves good performance only on a specific data set and fails to generalize) in
neural networks which is based on randomly dropping units and their connections during training
time. Inspired by dropout, Kim et al. [177] proposed a similar approach in multiagent environments
where direct communication through messages is allowed. In this case, the messages of other agents
are dropped out at training time, thus the authors proposed the Message-Dropout MADDPG
algorithm [177]. This method is expected to work in fully or limited communication environments.
The empirical results show that with properly chosen message dropout rate, the proposed method
both significantly improves the training speed and the robustness of learned policies (by introducing
communication errors) during execution time. This capability is important as MDRL agents trained
in simulated or controlled environments will be less fragile when transferred to more realistic
environments.
While RIAL and DIAL used a discrete communication channel, CommNet [163] used a con-
tinuous vector channel. Through this channel agents receive the summed transmissions of other
agents. The authors assume full cooperation and train a single network for all the agents. There
are two distinctive characteristics of CommNet from previous works: it allows multiple communi-
cation cycles at each timestep and a dynamic variation of agents at run time, i.e., agents come and
go in the environment.
In contrast to previous approaches, in Multiagent Bidirectionally Coordinated Network (BiC-
Net) [164], communication takes place in the latent space (i.e., in the hidden layers). It also uses
parameter sharing, however, it proposes bidirectional recurrent neural networks [214] to model the
actor and critic networks of their model. Note that in BiCNet agents do not explicitly share a
message and thus it can be considered a method for learning cooperation.
Learning communication is an active area in MDRL with many open questions, in this context,
we refer the interested reader to a recent work by Lowe et al. [215] where it discusses common pitfalls
(and recommendations to avoid those) while measuring communication in multiagent environments.
3.5. Learning cooperation
Although explicit communication is a new emerging trend in MDRL, there has already been a
large amount of work in MAL for cooperative settings12 that do not involve communication [7, 8].
Therefore, it was a natural starting point for many recent MDRL works.
Foerster et al. [168] studied the simple scenario of cooperation with independent Q-learning
agents (see Section 3.1), where the agents use the standard DQN architecture of neural networks
12There is a large body of research on coordinating multiagent teams by specifying communication protocols [216,
217]: these expect agents to know the team's goal as well as the tasks required to accomplish the goal.
18
and an experience replay buffer (see Figure 3). However, for the ER to work, the data distribution
needs to follow certain assumptions (see Section 2.2) which are no loger valid due to the multiagent
nature of the world: the dynamics that generated the data in the ER no longer reflect the current
dynamics, making the experience obsolete [168, 90]. Their solution is to add information to the
experience tuple that can help to disambiguate the age of the sampled data from the replay memory.
Two approaches were proposed. The first is Multiagent Importance Sampling which adds the
probability of the joint action so an importance sampling correction [70, 218] can computed when
the tuple is later sampled for training. This was similar to previous works in adaptive importance
sampling [219, 220] and off-environment RL [221]. The second approach is Multiagent Fingerprints
which adds the estimate (i.e., fingerprint) of other agents' policies (loosely inspired by Hyper-
Q [150], see Section 4.1). For the practical implementation, good results were obtained by using
the training iteration number and exploration rate as the fingerprint.
Gupta et al. [182] tackled cooperative environments in partially observable domains without
explicit communication. They proposed parameter sharing (PS) as a way to improve learning in
homogeneous multiagent environments (where agents have the same set of actions). The idea is to
have one globally shared learning network that can still behave differently in execution time, i.e.,
because its inputs (individual agent observation and agent index) will be different. They tested
three variations of this approach with parameter sharing: PS-DQN, PS-DDPG and PS-TRPO,
which extended single-agent DQN, DDPG and TRPO algorithms, respectively. The results showed
that PS-TRPO outperformed the other two. Note that Foerster et al. [162] concurrently proposed
a similar concept, see Section 3.4.
Lenient-DQN (LDQN) [35] took the leniency concept [222] (originally presented in MAL) and
extended their use to MDRL. The purpose of leniency is to overcome a pathology called rela-
tive overgeneralization [34, 223, 224]. Similar to other approaches designed to overcome relative
overgeneralization (e.g., distributed Q-learning [225] and hysteretic Q-learning [8]) lenient learn-
ers initially maintain an optimistic disposition to mitigate the noise from transitions resulting in
miscoordination, preventing agents from being drawn towards sub-optimal but wide peaks in the
reward search space [97]. However, similar to other MDRL works [168], the LDQN authors expe-
rienced problems with the ER buffer and arrived at a similar solution: adding information to the
experience tuple, in their case, the leniency value. When sampling from the ER buffer, this value
is used to determine a leniency condition; if the condition is not met then the sample is ignored.
In a similar vein, Decentralized-Hysteretic Deep Recurrent Q-Networks (DEC-HDRQNs) [166]
were proposed for fostering cooperation among independent learners. The motivation is similar
to LDQN, making an optimistic value update, however, their solution is different. Here, the
authors took inspiration from Hysteretic Q-learning [8], originally presented in MAL, where two
learning rates were used. A difference between lenient agents and hysteretic Q-learning is that
lenient agents are only initially forgiving towards teammates. Lenient learners over time apply
less leniency towards updates that would lower utility values, taking into account how frequently
observation-action pairs have been encountered. The idea being that the transition from optimistic
to average reward learner will help make lenient learners more robust towards misleading stochastic
rewards [222]. Additionally, in DEC-HDRQNs the ER buffer is also extended into concurrent
experience replay trajectories, which are composed of three dimensions: agent index, the episode,
and the timestep; when training, the sampled traces have the same starting timesteps. Moreover,
to improve on generalization over different tasks, i.e., multi-task learning[226], DEC-HDRQNs
make use of policy distillation [227, 228] (see Section 4.1). In contrast to other approaches, DEC-
19
Figure 5: A schematic view of the architecture used in FTW (For the Win) [179]: two unrolled recurrent neural
networks (RNNs) operate at different time-scales, the idea is that the Slow RNN helps with long term temporal
correlations. Observations are latent space output of some convolutional neural network to learn non-linear features.
Feudal Networks [229] is another work in single-agent DRL that also maintains a multi-time scale hierarchy where
the slower network sets the goal, and the faster network tries to achieve them. Fedual Networks were in turn, inspired
by early work in RL which proposed a hierarchy of Q-learners [230, 231].
HDRQNS are fully decentralized during learning and execution.
Weighted Double Deep Q-Network (WDDQN) [178] is based on having double estimators. This
idea was originally introduced in Double Q-learning [91] and aims to remove the existing overes-
timation bias caused by using the maximum action value as an approximation for the maximum
expected action value (see Section 4.1). It also uses a lenient reward [222] to be optimistic during
initial phase of coordination and proposes a scheduled replay strategy in which samples closer to
the terminal states are heuristically given higher priority; this strategy might not be applicable
for any domain. For other works extending the ER to multiagent settings see MADDPG [63],
Sections 4.1 and 4.2.
While previous approaches were mostly inspired by how MAL algorithms could be extended
to MDRL, other works take as base the results by single-agent DRL. One example is the For The
Win (FTW) [179] agent which is based on the actor-learner structure of IMPALA [114] (see Sec-
tion 2.2). The authors test FTW in a game where two opposing teams compete to capture each
other's flags [232]. To deal with the MAL problem they propose two main additions: a hierarchical
two-level representation with recurrent neural networks operating at different timescales, as de-
picted in Figure 5, and a population based training [233, 234, 235] where 30 agents were trained in
parallel together with a stochastic matchmaking scheme that biases agents to be of similar skills.
20
The Elo rating system [236] was originally devised to rate chess player skills,13 TrueSkill [237]
extended Elo by tracking uncertainty in skill rating, supporting draws, and matches beyond 1 vs
1; α−Rank is a more recent alternative to ELO [238]. FTW did not use TrueSkill but a sim-
pler extension of Elo for n vs n games (by adding individual agent ratings to compute the team
skill). Hierarchical approaches were previously proposed in RL, e.g., Feudal RL [230, 231], and
were later extended to DRL in Feudal networks [229]; population based training can be considered
analogous to evolutionary strategies that employ self-adaptive hyperparameter tuning to modify
how the genetic algorithm itself operates [234, 239, 240]. An interesting result from FTW is that
the population-based training obtained better results than training via self-play [192], which was
a standard concept in previous works [14, 193]. FTW used heavy compute resources, it used 30
agents (processes) in parallel where every training game lasted 4500 agent steps (≈ five minutes)
and agents were trained for two billion steps (≈ 450K games).
Lowe et al. [63] noted that using standard policy gradient methods (see Section 2.1) on mul-
tiagent environments yields high variance and performs poorly. This occurs because the variance
is further increased as all the agents' rewards depend on the rest of the agents, and it is for-
mally shown that as the number of agents increase, the probability of taking a correct gradient
direction decreases exponentially [63]. Therefore, to overcome this issue Lowe et al. proposed the
Multi-Agent Deep Deterministic Policy Gradient (MADDPG) [63], building on DDPG [65] (see
Section 2.2), to train a centralized critic per agent that is given all agents' policies during train-
ing to reduce the variance by removing the non-stationarity caused by the concurrently learning
agents. Here, the actor only has local information (turning the method into a centralized training
with decentralized execution) and the ER buffer records experiences of all agents. MADDPG was
tested in both cooperative and competitive scenarios, experimental results show that it performs
better than several decentralized methods (such as DQN, DDPG, and TRPO). The authors men-
tion that traditional RL methods do not produce consistent gradient signals. This is exemplified
in a challenging competitive scenarios where agents continuously adapt to each other causing the
learned best-response policies oscillate -- for such a domain, MADDPG is shown to learn more
robustly than DDPG.
Another approach based on policy gradients is the Counterfactual Multi-Agent Policy Gradients
(COMA) [167]. COMA was designed for the fully centralized setting and the multiagent credit
assignment problem [241], i.e., how the agents should deduce their contributions when learning
in a cooperative setting in the presence of only global rewards. Their proposal is to compute a
counterfactual baseline, that is, marginalize out the action of the agent while keeping the rest of
the other agents' actions fixed. Then, an advantage function can be computed comparing the
current Q value to the counterfactual. This counterfactual baseline has its roots in difference
rewards, which is a method for obtaining the individual contribution of an agent in a cooperative
multiagent team [241]. In particular, the aristocrat utility aims to measure the difference between
an agent's actual action and the average action [31]. The intention would be equivalent to sideline
the agent by having the agent perform an action where the reward does not depend on the agent's
actions, i.e., to consider the reward that would have arisen assuming a world without that agent
having ever existed (see Section 4.2).
On the one hand, fully centralized approaches (e.g., COMA) do not suffer from non-stationarity
13Elo uses a normal distribution for each player skill, and after each match, both players' distributions are updated
based on measure of surprise, i.e., if a user with previously lower (predicted) skill beats a high skilled one, the
low-skilled player is significantly increased.
21
Figure 6: (a) Deep Policy Inference Q-Network: receives four stacked frames as input (similar to DQN, see Figure 2).
(b) Deep Policy Inference Recurrent Q-Network: receives one frame as input and has an LSTM layer instead of a
fully connected layer (FC). Both approaches [171] condition the QM value outputs on the policy features, hP I , which
are also used to learn the opponent policy πo.
but have constrained scalability. On the other hand, independent learning agents are better suited
to scale but suffer from non-stationarity issues. There are some hybrid approaches that learn a
centralized but factored Q value function [242, 243]. Value Decomposition Networks (VDNs) [180]
decompose a team value function into an additive decomposition of the individual value functions.
Similarly, QMIX [181] relies on the idea of factorizing, however, instead of sum, QMIX assumes a
mixing network that combines the local values in a non-linear way, which can represent monotonic
action-value functions. While the mentioned approaches have obtained good empirical results, the
factorization of value-functions in multiagent scenarios using function approximators (MDRL) is
an ongoing research topic, with open questions such as how well factorizations capture complex
coordination problems and how to learn those factorizations [244] (see Section 4.4).
3.6. Agents modeling agents
An important ability for agents to have is to reason about the behaviors of other agents by
constructing models that make predictions about the modeled agents [11]. An early work for
modeling agents while using deep neural networks was the Deep Reinforcement Opponent Network
(DRON) [169]. The idea is to have two networks: one which evaluates Q-values and a second
one that learns a representation of the opponent's policy. Moreover, the authors proposed to have
several expert networks to combine their predictions to get the estimated Q value, the idea being
that each expert network captures one type of opponent strategy [245]. This is related to previous
22
works in type-based reasoning from game theory [246, 139] later applied in AI [245, 11, 247]. The
mixture of experts idea was presented in supervised learning where each expert handled a subset of
the data (a subtask), and then a gating network decided which of the experts should be used [248].
DRON uses hand-crafted features to define the opponent network. In contrast, Deep Policy
Inference Q-Network (DPIQN) and its recurrent version, DPIRQN [171] learn policy features di-
rectly from raw observations of the other agents. The way to learn these policy features is by
means of auxiliary tasks [84, 110] (see Sections 2.2 and 4.1) that provide additional learning goals,
in this case, the auxiliary task is to learn the opponents' policies. This auxiliary task modifies the
loss function by computing an auxiliary loss: the cross entropy loss between the inferred opponent
policy and the ground truth (one-hot action vector) of the opponent. Then, the Q value function
of the learning agent is conditioned on the opponent's policy features (see Figure 6), which aims to
reduce the non-stationarity of the environment. The authors used an adaptive training procedure
to adjust the attention (a weight on the loss function) to either emphasize learning the policy fea-
tures (of the opponent) or the respective Q values of the agent. An advantage of these approaches
is that modeling the agents can work for both opponents and teammates [171].
In many previous works an opponent model is learned from observations. Self Other Modeling
(SOM) [170] proposed a different approach, this is, using the agent's own policy as a means to
predict the opponent's actions. SOM can be used in cooperative and competitive settings (with
an arbitrary number of agents) and infers other agents' goals. This is important because in the
evaluated domains, the reward function depends on the goal of the agents. SOM uses two networks,
one used for computing the agents' own policy, and a second one used to infer the opponent's goal.
The idea is that these networks have the same input parameters but with different values (the
agent's or the opponent's). In contrast to previous approaches, SOM is not focused on learning
the opponent policy, i.e., a probability distribution over next actions, but rather on estimating the
opponent's goal. SOM is expected to work best when agents share a set of goals from which each
agent gets assigned one at the beginning of the episode and the reward structure depends on both
of their assigned goals. Despite its simplicity, training takes longer as an additional optimization
step is performed given the other agent's observed actions.
There is a long-standing history of combining game theory and MAL [2, 6, 193]. From that
context, some approaches were inspired by influential game theory approaches. Neural Fictitious
Self-Play (NFSP) [173] builds on fictitious (self-) play [190, 249], together with two deep networks to
find approximate Nash equilibria 14 in two-player imperfect information games [251] (for example,
consider Poker: when it is an agent's turn to move it does not have access to all information
about the world). One network learns an approximate best response (−greedy over Q values) to
the historical behavior of other agents and the second one (called the average network) learns to
imitate its own past best response behaviour using supervised classification. The agent behaves
using a mixture of the average and the best response networks depending on the probability of an
anticipatory parameter [252]. Comparisons with DQN in Leduc Holdem Poker revealed that DQN's
deterministic strategy is highly exploitable. Such strategies are sufficient to behave optimally in
single-agent domains, i.e., MDPs for which DQN was designed. However, imperfect-information
games generally require stochastic strategies to achieve optimal behaviour [173]. DQN learning
experiences are both highly correlated over time, and highly focused on a narrow state distribution.
14Nash equilibrium [250] is a solution concept in game theory in which no agent would choose to deviate from its
strategy (they are a best response to others' strategies). This concept has been explored in seminal MAL algorithms
like Nash-Q learning [127] and Minimax-Q learning [124, 128].
23
In contrast to NFSP agents whose experience varies more smoothly, resulting in a more stable data
distribution, more stable neural networks and better performance.
The (N)FSP concept was further generalized in Policy-Space Response Oracles (PSRO) [172],
where it was shown that fictitious play is one specific meta-strategy distribution over a set of
previous (approximate) best responses (summarized by a meta-game obtained by empirical game
theoretic analysis [253]), but there are a wide variety to choose from. One reason to use mixed meta-
strategies is that it prevents overfitting15 the responses to one specific policy, and hence provides a
form of opponent/teammate regularization. An approximate scalable version of the algorithm leads
to a graph of agents best-responding independently called Deep Cognitive Hierarchies (DCHs) [172]
due to its similarity to behavioral game-theoretic models [255, 256].
Minimax is a paramount concept in game theory that is roughly described as minimizing the
worst case scenario (maximum loss) [251]. Li et al. [183] took the minimax idea as an approach
to robustify learning in multiagent environments so that the learned robust policy should be able
to behave well even with strategies not seen during training. They extended the MADDPG algo-
rithm [63] to Minimax Multiagent Deep Deterministic Policy Gradients (M3DDPG), which updates
policies considering a worst-case scenario: assuming that all other agents act adversarially. This
yields a minimax learning objective which is computationally intractable to directly optimize. They
address this issue by taking ideas from robust reinforcement learning [257] which implicitly adopts
the minimax idea by using the worst noise concept [258]. In MAL different approaches were pro-
posed to assess the robustness of an algorithm, e.g., guarantees of safety [152, 259], security [260]
or exploitability [261, 262, 263].
Previous approaches usually learned a model of the other agents as a way to predict their
behavior. However, they do not explicitly account for anticipated learning of the other agents, which
is the objective of Learning with Opponent-Learning Awareness (LOLA) [64]. LOLA optimizes the
expected return after the opponent updates its policy one step. Therefore, a LOLA agent directly
shapes the policy updates of other agents to maximize its own reward. One of LOLA's assumptions
is having access to opponents' policy parameters. LOLA builds on previous ideas by Zhang and
Lesser [264] where the learning agent predicts the opponent's policy parameter update but only
uses it to learn a best response (to the anticipated updated parameters).
Theory of mind is part of a group of recursive reasoning approaches[265, 245, 266, 267] in
which agents have explicit beliefs about the mental states of other agents. The mental states
of other agents may, in turn, also contain beliefs and mental states of other agents, leading to
a nesting of beliefs [11]. Theory of Mind Network (ToMnet) [174] starts with a simple premise:
when encountering a novel opponent, the agent should already have a strong and rich prior about
how the opponent should behave. ToMnet has an architecture composed of three networks: (i) a
character network that learns from historical information, (ii) a mental state network that takes the
character output and the recent trajectory, and (iii) the prediction network that takes the current
state as well as the outputs of the other networks as its input. The output of the architecture
is open for different problems but in general its goal is to predict the opponent's next action. A
main advantage of ToMnet is that it can predict general behavior, for all agents; or specific, for a
particular agent.
Deep Bayesian Theory of Mind Policy (Bayes-ToMoP) [175] is another algorithm that takes
inspiration from theory of mind [268]. The algorithm assumes the opponent has different stationary
15Johanson et al. [254] also found "overfitting" when solving large extensive games (e.g., poker) -- the performance
in an abstract game improved but it was worse in the full game.
24
strategies to act and changes among them over time [269]. Earlier work in MAL dealt with
this setting, e.g., BPR+ [270] extends the Bayesian policy reuse16 framework [271] to multiagent
settings (BPR assumes a single-agent environment; BPR+ aims to best respond to the opponent
in a multiagent game). A limitation of BPR+ is that it behaves poorly against itself (self-play),
thus, Deep Bayes-ToMoP uses theory of mind to provide a higher-level reasoning strategy which
provides an optimal behavior against BPR+ agents.
Deep BPR+ [184] is another work inspired by BPR+ which uses neural networks as value-
function approximators. It not only uses the environment reward but also uses the online learned
opponent model [272, 273] to construct a rectified belief over the opponent strategy. Additionally, it
leverages ideas from policy distillation [227, 228] and extends them to the multiagent case to create a
distilled policy network. In this case, whenever a new acting policy is learned, distillation is applied
to consolidate the new updated library which improves in terms of storage and generalization (over
opponents).
4. Bridging RL, MAL and MDRL
This section aims to provide directions to promote fruitful cooperations between sub-communities.
First, we address the pitfall of deep learning amnesia, roughly described as missing citations to
the original works and not exploiting the advancements that have been made in the past. We
present examples on how ideas originated earlier, for example in RL and MAL, were successfully
extended to MDRL (see Section 4.1). Second, we outline lessons learned from the works analyzed
in this survey (see Section 4.2). Then we point the readers to recent benchmarks for MDRL (see
Section 4.3) and we discuss the practical challenges that arise in MDRL like high computational
demands and reproducibility (see Section 4.4). Lastly, we pose some open research challenges and
reflect on their relation with previous open questions in MAL [11] (see Section 4.5).
4.1. Avoiding deep learning amnesia: examples in MDRL
This survey focuses on recent deep works, however, in previous sections, when describing recent
algorithms, we also point to original works that inspired them. Schmidhuber said "Machine learning
is the science of credit assignment. The machine learning community itself profits from proper
credit assignment to its members" [274]. In this context, we want to avoid committing the pitfall
of not giving credit to original ideas that were proposed earlier, a.k.a. deep learning amnesia.
Here, we provide some specific examples of research milestones that were studied earlier, e.g., RL
or MAL, and that now became highly relevant for MDRL. Our purpose is to highlight that existent
literature contains pertinent ideas and algorithms that should not be ignored. On the contrary,
they should be examined and cited [275, 276] to understand recent developments [277].
Dealing with non-stationarity in independent learners. It is well known that using independent
learners makes the environment non-stationary from the agent's point of view [4, 123]. Many MAL
algorithms tried to solve this problem in different ways [10]. One example is Hyper-Q [150] which
accounts for the (values of mixed) strategies of other agents and includes that information in the
state representation, which effectively turns the learning problem into a stationary one. Note that in
16Bayesian policy reuse assumes an agent with prior experience in the form of a library of policies. When a novel
task instance occurs, the objective is to reuse a policy from its library based on observed signals which correlate to
policy performance [271].
25
this way it is possible to even consider adaptive agents. Foerster et al. [162] make use of this insight
to propose their fingerprint algorithm in an MDRL problem (see Section 3.5). Other examples
include the leniency concept [222] and Hysteretic Q-learning [8] originally presented in MAL, which
now have their "deep" counterparts, LDQNs [35] and DEC-HDRQNs[166], see Section 3.5.
Multiagent credit assignment. In cooperative multiagent scenarios, it is common to use either
local rewards, unique for each agent, or global rewards, which represent the entire group's perfor-
mance [278]. However, local rewards are usually harder to obtain, therefore, it is common to rely
only on the global ones. This raises the problem of credit assignment: how does a single agent's ac-
tions contribute to a system that involves the actions of many agents [32]. A solution that came from
MAL research that has proven successful in many scenarios is difference rewards [241, 278, 279],
which aims to capture an agent's contribution to the system's global performance. In particular
the aristocrat utility aims to measure the difference between an agents actual action and the av-
erage action [31], however, it has a self-consistency problem and in practice it is more common
to compute the wonderful life utility [280, 31], which proposes to use a clamping operation that
would be equivalent to removing that player from the team. COMA [167] builds on these concepts
to propose an advantage function based on the contribution of the agent, which can be efficiently
computed with deep neural networks (see Section 3.5).
Multitask learning. In the context of RL, multitask learning [226] is an area that develops agents
that can act in several related tasks rather than just in a single one [281]. Distillation, roughly
defined as transferring the knowledge from a large model to a small model, was a concept originally
introduced for supervised learning and model compression [282, 228].
Inspired by those works,
Policy distillation [227] was extended to the DRL realm. Policy distillation was used to train a much
smaller network and to merge several task-specific policies into a single policy, i.e., for multitask
learning.
In the MDRL setting, Omidshafiei et al. [166] successfully adapted policy distillation
within Dec-HDRQNs to obtain a more general multitask multiagent network (see Section 3.5).
Another example is Deep BPR+ [184] which uses distillation to generalize over multiple opponents
(see Section 3.6).
Auxiliary tasks. Jaderberg et al. [84] introduced the term auxiliary task with the insight that
(single-agent) environments contain a variety of possible training signals (e.g., pixel changes). These
tasks are naturally implemented in DRL in which the last layer is split into multiple parts (heads),
each working on a different task. All heads propagate errors into the same shared preceding part
of the network, which would then try to form representations, in its next-to-last layer, to support
all the heads [20]. However, the idea of multiple predictions about arbitrary signals was originally
suggested for RL, in the context of general value functions [110, 20] and there still open problems,
for example, better theoretical understanding [109, 283]. In the context of neural networks, early
work proposed hints that improved the network performance and learning time. Suddarth and
Kergosien [284] presented a minimal example of a small neural network where it was shown that
adding an auxiliary task effectively removed local minima. One could think of extending these
auxiliary tasks to modeling other agents' behaviors [285, 160], which is one of the key ideas that
DPIQN and DRPIQN [171] proposed in MDRL settings (see Section 3.6).
Experience replay. Lin [90, 89] proposed the concept of experience replay to speed up the credit
assignment propagation process in single agent RL. This concept became central to many DRL
works [72] (see Section 2.2). However, Lin stated that a condition for the ER to be useful is
26
that "the environment should not change over time because this makes past experiences irrelevant
or even harmful" [90]. This is a problem in domains where many agents are learning since the
environment becomes non-stationary from the point of view of each agent. Since DRL relies
heavily on experience replay, this is an issue in MDRL: the non-stationarity introduced means that
the dynamics that generated the data in the agent's replay memory no longer reflect the current
dynamics in which it is learning [162]. To overcome this problem different methods have been
proposed [168, 35, 166, 178], see Section 4.2.
Double estimators. Double Q-learning [91] proposed to reduce the overestimation of action values
in Q-learning, this is caused by using the maximum action value as an approximation for the
maximum expected action value. Double Q-learning works by keeping two Q functions and was
proven to convergence to the optimal policy [91]. Later this idea was applied to arbitrary function
approximators, including deep neural networks, i.e., Double DQN [92], which were naturally applied
since two networks were already used in DQN (see Section 2.2). These ideas have also been recently
applied to MDRL [178].
4.2. Lessons learned
We have exemplified how RL and MAL can be extended for MDRL settings. Now, we outline
general best practices learned from the works analyzed throughout this paper.
• Experience replay buffer in MDRL. While some works removed the ER buffer in MDRL [162]
it is an important component in many DRL and MDRL algorithms. However, using the
standard buffer (i.e., keeping (cid:104)s, a, r, s(cid:48)(cid:105)) will probably fail due to a lack of theoretical guar-
antees under this setting, see Sections 2.2 and 4.1. Adding information in the experience
tuple that can help disambiguate the sample is the solution adopted in many works, whether
a value based method [168, 35, 166, 178] or a policy gradient method [63]. In this regard,
it is an open question to consider how new DRL ideas could be best integrated into the
ER [286, 111, 287, 288, 96] and how those ideas would fare in a MDRL setting.
• Centralized learning with decentralized execution. Many MAL works were either fully cen-
tralized or fully decentralized approaches. However, inspired by decentralized partially ob-
servable Markov decison processes (DEC-POMDPs) [289, 290],17 in MDRL this new mixed
paradigm has been commonly used [168, 35, 181, 172, 167, 63] (a notable exception are
DEC-HDRQNs [166] which perform learning and execution in a decentralized manner, see
Section 3.5). Note that not all real-world problems fit into this paradigm and it is more
common for robotics or games where a simulator is generally available [162]. The main ben-
efit is that during learning additional information can be used (e.g., global state, action, or
rewards) and during execution this information is removed.
• Parameter sharing. Another frequent component in many MDRL works is the idea of sharing
parameters, i.e., training a single network in which agents share their weights. Note that, since
agents could receive different observations (e.g., in partially observable scenarios), they can
still behave differently. This method was proposed concurrently in different works [292, 162]
and later it has been successfully applied in many others [163, 164, 168, 180, 181].
17Centralized planning and decentralized execution is also a standard paradigm for multiagent planning [291].
27
(a) Multiagent object transportation
(b) Pommerman
Figure 7: (a) A fully cooperative benchmark with two agents, Multiagent Object Trasportation.
cooperative-competitive domain with four agents, Pommerman. For more MDRL benchmarks see Section 4.3.
(b) A mixed
• Recurrent networks. Recurrent neural networks (RNNs) enhanced neural networks with a
memory capability, however, they suffer from the vanishing gradient problem, which ren-
ders them inefficient for long-term dependencies [293]. However, RNN variants such as
LSTMs [86, 294] and GRUs (Gated Recurrent Unit) [295] addressed this challenge. In single-
agent DRL, DRQN [85] initially proposed idea of using recurrent networks in single-agent
partially observable environments. Then, Feudal Networks [229] proposed a hierarchical ap-
proach [230], multiple LSTM networks with different time-scales, i.e., the observation input
schedule is different for each LSTM network, to create a temporal hierarchy so that it can
better address the long-term credit assignment challenge for RL problems. Recently, the
use of recurrent networks has been extended to MDRL to address the challenge of partially
observability [158, 162, 164, 166, 180, 181, 170, 171, 174] for example, in FTW [179], depicted
in Figure 5 and DRPIRQN [171] depicted in Figure 6. See Section 4.4 for practical challenges
(e.g., training issues) of recurrent networks in MDRL.
• Overfitting in MAL. In single-agent RL, agents can overfit to the environment [296]. A similar
problem can occur in multiagent settings [254], agents can overfit, i.e., an agent's policy can
easily get stuck in a local optima and the learned policy may be only locally optimal to other
agents' current policies [183]. This has the effect of limiting the generalization of the learned
policies [172]. To reduce this problem, a solution is to have a set of policies (an ensemble)
and learn from them or best respond to the mixture of them [172, 63, 169]. Another solution
has been to robustify algorithms -- a robust policy should be able to behave well even with
strategies different from its training (better generalization) [183].
4.3. Benchmarks for MDRL
Standardized environments such as the Arcade Learning Environment (ALE) [297, 298] and
OpenAI Gym [299] have allowed single-agent RL to move beyond toy domains. For DRL there are
open-source frameworks that provide compact and reliable implementations of some state-of-the-
art DRL algorithms [300]. Even though MDRL is a recent area, there are now a number of open
sourced simulators and benchmarks to use with different characteristics, which we describe below.
28
• Fully Cooperative Multiagent Object Transporation Problems (CMOTPs)18 were originally
presented by Busoniu et al. [36] as a simple two-agent coordination problem in MAL. Palmer
et al. [35] proposed two pixel-based extensions to the original setting which include narrow
passages that test the agents' ability to master fully-cooperative sub-tasks, stochastic rewards
and noisy observations, see Figure 7a.
• The Apprentice Firemen Game19 (inspired by the classic climb game [126]) is another two-
agent pixel-based environment that simultaneously confronts learners with four pathologies
in MAL: relative overgeneralization, stochasticity, the moving target problem, and alter ex-
ploration problem [97].
• Pommerman [301] is a multiagent benchmark useful for testing cooperative, competitive
and mixed (cooperative and competitive) scenarios.
It supports partial observability and
communication among agents, see Figure 7b. Pommerman is a very challenging domain
from the exploration perspective as the rewards are very sparse and delayed [302]. A recent
competition was held during NeurIPS-201820 and the top agents from that competition are
available for training purposes.
• Starcraft Multiagent Challenge [303] is based on the real-time strategy game StarCraft II
and focuses on micromanagement challenges,21 that is, fine-grained control of individual
units, where each unit is controlled by an independent agent that must act based on local
observations. It is accompanied by a MDRL framework including state-of-the-art algorithms
(e.g., QMIX and COMA).22
• The Multi-Agent Reinforcement Learning in Malmo (MARL O) competition [304] is another
multiagent challenge with multiple cooperative 3D games23 within Minecraft. The scenarios
were created with the open source Malmo platform [305], providing examples of how a wider
range of multiagent cooperative, competitive and mixed scenarios can be experimented on
within Minecraft.
• Hanabi is a cooperative multiplayer card game (two to five players). The main characteristic
of the game is that players do not observe their own cards but other players can reveal
information about them. This makes an interesting challenge for learning algorithms in
particular in the context of self-play learning and ad-hoc teams [306, 307, 308]. The Hanabi
Learning Environment [309] was recently released24 and it is accompanied with a baseline
(deep RL) agent [310].
• Arena [311] is platform for multiagent research25 based on the Unity engine [312]. It has 35
multiagent games (e.g., social dilemmas) and supports communication among agents. It has
basseline implementations of recent DRL algorithms such as independent PPO learners.
18https://github.com/gjp1203/nui_in_madrl
19https://github.com/gjp1203/nui_in_madrl
20https://www.pommerman.com/
21https://github.com/oxwhirl/smac
22https://github.com/oxwhirl/pymarl
23https://github.com/crowdAI/marlo-single-agent-starter-kit/
24https://github.com/deepmind/hanabi-learning-environment
25https://github.com/YuhangSong/Arena-BuildingToolkit
29
• MuJoCo Multiagent Soccer [313] uses the MuJoCo physics engine [202]. The environment
simulates a 2 vs. 2 soccer game with agents having a 3-dimensional action space.26
• Neural MMO [314] is a research platform27 inspired by the human game genre of Massively
Multiplayer Online (MMO) Role-Playing Games. These games involve a large, variable num-
ber of players competing to survive.
4.4. Practical challenges in MDRL
In this section we take a more critical view with respect to MDRL and highlight different
practical challenges that already happen in DRL and that are likely to occur in MDRL such
as reproducibility, hyperparameter tuning, the need of computational resources and conflation of
results. We provide pointers on how we think those challenges could be (partially) addressed.
Reproducibility, troubling trends and negative results. Reproducibility is a challenge in RL which
is only aggravated in DRL due to different sources of stochasticity: baselines, hyperparameters,
architectures [315, 316] and random seeds [317]. Moreover, DRL does not have common practices
for statistical testing [318] which has led to bad practices such as only reporting the results when
algorithms perform well, sometimes referred as cherry picking [319] (Azizzadenesheli also describes
cherry planting as adapting an environment to a specific algorithm [319]). We believe that together
with following the advice on how to design experiments and report results [320], the community
would also benefit from reporting negative results [321, 322, 318, 323] for carefully designed hypoth-
esis and experiments.28 However, we found very few papers with this characteristic[324, 325, 326]
-- we note that this is not encouraged in the ML community; moreover, negative results reduce
the chance of paper acceptance [320]. In this regard, we ask the community to reflect on these
practices and find ways to remove these obstacles.
Implementation challenges and hyperparameter tuning. One problem is that canonical implementa-
tions of DRL algorithms often contain additional non-trivial optimizations -- these are sometimes
necessary for the algorithms to achieve good performance [79]. A recent study by Tucker et al. [59]
found that several published works on action-dependant baselines contained bugs and errors --
those were the real reason of the high performance in the experimental results, not the proposed
method. Melis et al. [327] compared a series of works with increasing innovations in network ar-
chitectures and the vanilla LSTMs [86] (originally proposed in 1997). The results showed that,
when properly tuned, LSTMs outperformed the more recent models. In this context, Lipton and
Steinhardt noted that the community may have benefited more by learning the details of the hy-
perparameter tuning [320]. A partial reason for this surprising result might be that this type of
networks are known for being difficult to train [293] and there are recent works in DRL that re-
port problems when using recurrent networks [182, 328, 329, 330]. Another known complication is
catastrophic forgetting (see Section 2.2) with recent examples in DRL [157, 92] -- we expect that
26https://github.com/deepmind/dm_control/tree/master/dm_control/locomotion/soccer
27https://github.com/openai/neural-mmo
28This idea was initially inspired by the Workshop "Critiquing and Correcting Trends in Machine Learning" at
NeurIPS 2018 where it was possible to submit Negative results papers: "Papers which show failure modes of existing
algorithms or suggest new approaches which one might expect to perform well but which do not. The aim is to
provide a venue for work which might otherwise go unpublished but which is still of interest to the community."
https://ml-critique-correct.github.io/
30
these issues would likely occur in MDRL. The effects of hyperparameter tuning were analyzed in
more detail in DRL by Henderson et al. [315], who arrived at the conclusion that hyperparameters
can have significantly different effects across algorithms (they tested TRPO, DDPG, PPO and
ACKTR) and environments since there is an intricate interplay among them [315]. The authors
urge the community to report all parameters used in the experimental evaluations for accurate
comparison -- we encourage a similar behavior for MDRL. Note that hyperparameter tuning is re-
lated to the troubling trend of cherry picking in that it can show a carefully picked set of parameters
that make an algorithm work (see previous challenge). Lastly, note that hyperparameter tuning
is computationally very expensive, which relates to the connection with the following challenge of
computational demands.
Computational resources. Deep RL usually requires millions of interactions for an agent to learn [331],
i.e., low sample efficiency [332], which highlights the need for large computational infrastructure
in general. The original A3C implementation [93] uses 16 CPU workers for 4 days to learn to play
an Atari game with a total of 200M training frames29 (results are reported for 57 Atari games).
Distributed PPO used 64 workers (presumably one CPU per worker, although this is not clearly
stated in the paper) for 100 hours (more than 4 days) to learn locomotion tasks [117]. In MDRL,
for example, the Atari Pong game, agents were trained for 50 epochs, 250k time steps each, for a
total of 1.25M training frames [155]. The FTW agent [179] uses 30 agents (processes) in parallel
and every training game lasts for five minues; FTW agents were trained for approximately 450K
games ≈4.2 years. These examples highlight the computational demands sometimes needed within
DRL and MDRL.
Recent works have reduced the learning of an Atari game to minutes (Stooke and Abbeel [334]
trained DRL agents in less than one hour with hardware consisting of 8 GPUs and 40 cores).
However, this is (for now) the exception and computational infrastructure is a major bottleneck
for doing DRL and MDRL, especially for those who do not have such large compute power (e.g.,
most companies and most academic research groups) [212, 322].30 Within this context we propose
two ways to address this problem. (1) Raising awareness: For DRL we found few works that study
the computational demands of recent algorithms [335, 331]. For MDRL most published works do
not provide information regarding computational resources used such as CPU/GPU usage, memory
demands, and wall-clock computation. Therefore, the first way to tackle this issue is by raising
awareness and encouraging authors to report metrics about computational demands for accurately
comparison and evaluation.
(2) Delve into algorithmic contributions. Another way to address
these issues is to prioritize the algorithmic contribution for the new MDRL algorithms rather than
the computational resources spent.
Indeed, for this to work, it needs to be accompanied with
high-quality reviewers.
We have argued to raise awareness on the computational demands and report results, however,
there is still the open question on how and what to measure/report. There are several dimensions
to measure efficiency: sample efficiency is commonly measured by counting state-action pairs used
for training; computational efficiency could be measured by number of CPUs/GPUs and days used
for training. How do we measure the impact of other resources, such as external data sources or
29It is sometimes unclear in the literature what is the meaning of frame due to the "frame skip" technique. It is
therefore suggested to refer to "game frames" and "training frames" [333].
30One recent effort by Beeching et al. [212] proposes to use only "mid-range hardware" (8 CPUs and 1 GPU) to
train deep RL agents.
31
annotations?31 Similarly, do we need to differentiate the computational needs of the algorithm
itself versus the environment it is run in? We do not have the answers, however, we point out that
current standard metrics might not be entirely comprehensive.
In the end, we believe that high compute based methods act as a frontier to showcase bench-
marks [19, 18], i.e., they show what results are possible as data and compute is scaled up (e.g.,
OpenAI Five generates 180 years of gameplay data each day using 128,000 CPU cores and 256
GPUs [18]; AlphaStar uses 200 years of Starcraft II gameplay [19]); however, lighter compute based
algorithmic methods can also yield significant contributions to better tackle real-world problems.
Occam's razor and ablative analysis. Finding the simplest context that exposes the innovative
research idea remains challenging, and if ignored leads to a conflation of fundamental research
(working principles in the most abstract setting) and applied research (working systems as complete
as possible). In particular, some deep learning papers are presented as learning from pixels without
further explanation, while object-level representations would have already exposed the algorithmic
contribution. This still makes sense to remain comparable with established benchmarks (e.g.,
OpenAI Gym [299]), but less so if custom simulations are written without open source access, as it
introduces unnecessary variance in pixel-level representations and artificially inflates computational
resources (see previous point about computational resources).32
In this context there are some
notable exceptions where the algorithmic contribution is presented in a minimal setting and then
results are scaled into complex settings: LOLA [64] first presented a minimalist setting with a two-
player two-action game and then with a more complex variant; similarly, QMIX [181] presented its
results in a two-step (matrix) game and then in the more involved Starcraft II micromanagement
domain [303].
4.5. Open questions
Finally, here we present some open questions for MDRL and point to suggestions on how to
approach them. We believe that there are solid ideas in earlier literature and we refer the reader
to Section 4.1 to avoid deep learning amnesia.
• On the challenge of sparse and delayed rewards.
Recent MDRL competitions and environments have complex scenarios where many actions
are taken before a reward signal is available (see Section 4.3). This sparseness is already a
challenge for RL [20, 338] where approaches such as count-based exploration/intrinsic moti-
vation [196, 339, 340, 341, 342] and hierarchical learning [343, 344, 111] have been proposed
to address it -- in MDRL this is even more problematic since the agents not only need to
learn basic behaviors (like in DRL), but also to learn the strategic element (e.g., competi-
tive/collaborative) embedded in the multiagent setting. To address this issue, recent MDRL
approaches applied dense rewards [206, 205, 204] (a concept originated in RL) at each step
to allow the agents to learn basic motor skills and then decrease these dense rewards over
31NeurIPS 2019 hosts the "MineRL Competition on Sample Efficient Reinforcement Learning using Human Priors"
where the primary goal of the competition is to foster the development of algorithms which can efficiently leverage
human demonstrations to drastically reduce the number of samples needed to solve complex, hierarchical, and sparse
environments [336].
32Cuccu, Togelius and Cudr´e-Mauroux achieved state-of-the-art policy learning in Atari games with only 6 to 18
neurons [337]. The main idea was to decouple image processing from decision-making.
32
time in favor of the environmental reward [158], see Section 3.3. Recent works like OpenAI
Five [18] uses hand-crafted intermediate rewards to accelerate the learning and FTW [179]
lets the agents learn their internal rewards by a hierarchical two-tier optimization. In single
agent domains, RUDDER [345] has been recently proposed for such delayed sparse reward
problems. RUDDER generates a new MDP with more intermediate rewards whose optimal
solution is still an optimal solution to the original MDP. This is achieved by using LSTM
networks to redistribute the original sparse reward to earlier state-action pairs and automat-
ically provide reward shaping. How to best extend RUDDER to multiagent domains is an
open avenue of research.
• On the role of self-play.
Self-play is a cornerstone in MAL with impressive results [147, 127, 145, 346, 143]. While
notable results had also been shown in MDRL [173, 193], recent works have also shown that
plain self-play does not yield the best results. However, adding diversity, i.e., evolutionary
methods [239, 240, 233, 234] or sampling-based methods, have shown good results [158, 179,
159]. A drawback of these solutions is the additional computational requirements since they
need either parallel training (more CPU computation) or memory requirements. Then, it is
still an open problem to improve the computational efficiency of these previously proposed
successful methods, i.e., achieving similar training stability with smaller population sizes that
uses fewer CPU workers in MAL and MDRL (see Section 4.4 and Albrecht et al. [11, Section
5.5]).
• On the challenge of the combinatorial nature of MDRL.
Monte Carlo tree search (MCTS) [347] has been the backbone of the major breakthroughs be-
hind AlphaGo [14] and AlphaGo Zero [15] that combined search and DRL. A recent work [348]
has outlined how search and RL can be better combined for potentially new methods. How-
ever, for multiagent scenarios, there is an additional challenge of the exponential growth of
all the agents' action spaces for centralized methods [349]. One way to tackle this challenge
within multiagent scenarios is the use of search parallelization [350, 351]. Given more scalable
planners, there is room for research in combining these techniques in MDRL settings.
To learn complex multiagent interactions some type of abstraction [352] is often needed, for
example, factored value functions [353, 354, 242, 243, 355, 356] (see QMIX and VDN in
Section 3.5 for recent work in MDRL) try to exploit independence among agents through
(factored) structure; however, in MDRL there are still open questions such as understanding
their representational power [244] (e.g., the accuracy of the learned Q-function approxima-
tions) and how to learn those factorizations, where ideas from transfer planning techniques
could be useful [357, 103]. In transfer planning the idea is to define a simpler "source prob-
lem" (e.g., with fewer agents), in which the agent(s) can plan [357] or learn [103]; since it
is less complex than the real multiagent problem, issues such as the non-stationarity of the
environment can be reduced/removed. Lastly, another related idea are influence abstrac-
tions [358, 359, 10], where instead of learning a complex multiagent model, these methods
try to build smaller models based on the influence agents can exert on one another. While
this has not been sufficiently explored in actual multiagent settings, there is some evidence
that these ideas can lead to effective inductive biases, improving effectiveness of DRL in such
local abstractions [360].
33
5. Conclusions
Deep reinforcement learning has shown recent success on many fronts [13, 14, 16] and a natural
next step is to test multiagent scenarios. However, learning in multiagent environments is fun-
damentally more difficult due to non-stationarity, the increase of dimensionality, and the credit-
assignment problem, among other factors [1, 5, 10, 147, 241, 361, 97].
This survey provides broad overview of recent works in the emerging area of Multiagent Deep
Reinforcement Learning (MDRL). First, we categorized recent works into four different topics:
emergent behaviors, learning communication, learning cooperation, and agents modeling agents.
Then, we exemplified how key components (e.g., experience replay and difference rewards) origi-
nated in RL and MAL need to be adapted to work in MDRL. We provided general lessons learned
applicable to MDRL, pointed to recent multiagent benchmarks and highlighted some open research
problems. Finally, we also reflected on the practical challenges such as computational demands
and reproducibility in MDRL.
Our conclusions of this work are that while the number of works in DRL and MDRL are
notable and represent important milestones for AI, at the same time we acknowledge there are also
open questions in both (deep) single-agent learning [38, 298, 362, 79] and multiagent learning [363,
364, 365, 366, 367, 368]. Our view is that there are practical issues within MDRL that hinder
its scientific progress: the necessity of high compute power, complicated reproducibility (e.g.,
hyperparameter tuning), and the lack of sufficient encouragement for publishing negative results.
However, we remain highly optimistic of the multiagent community and hope this work serves to
raise those issues, encounter good solutions, and ultimately take advantage of the existing literature
and resources available to move the area in the right direction.
Acknowledgements
We would like to thank Chao Gao, Nidhi Hegde, Gregory Palmer, Felipe Leno Da Silva and
Craig Sherstan for reading earlier versions of this work and providing feedback, to April Cooper for
her visual designs for the figures in the article, to Frans Oliehoek, Sam Devlin, Marc Lanctot, Nolan
Bard, Roberta Raileanu, Angeliki Lazaridou, and Yuhang Song for clarifications in their areas of
expertise, to Baoxiang Wang for his suggestions on recent deep RL works, to Michael Kaisers, Daan
Bloembergen, and Katja Hofmann for their comments about the practical challenges of MDRL,
and to the editor and three anonymous reviewers whose comments and suggestions increased the
quality of this work.
References
[1] P. Stone, M. M. Veloso, Multiagent Systems - A Survey from a Machine Learning Perspective., Autonomous
Robots 8 (3) (2000) 345 -- 383.
[2] Y. Shoham, R. Powers, T. Grenager, If multi-agent learning is the answer, what is the question?, Artificial
Intelligence 171 (7) (2007) 365 -- 377.
[3] E. Alonso, M. D'inverno, D. Kudenko, M. Luck, J. Noble, Learning in multi-agent systems, Knowledge Engi-
neering Review 16 (03) (2002) 1 -- 8.
[4] K. Tuyls, G. Weiss, Multiagent learning: Basics, challenges, and prospects, AI Magazine 33 (3) (2012) 41 -- 52.
[5] L. Busoniu, R. Babuska, B. De Schutter, A Comprehensive Survey of Multiagent Reinforcement Learning, IEEE
Transactions on Systems, Man and Cybernetics, Part C (Applications and Reviews) 38 (2) (2008) 156 -- 172.
[6] A. Now´e, P. Vrancx, Y.-M. De Hauwere, Game theory and multi-agent reinforcement learning, in: Reinforce-
ment Learning, Springer, 2012, pp. 441 -- 470.
34
[7] L. Panait, S. Luke, Cooperative Multi-Agent Learning: The State of the Art, Autonomous Agents and Multi-
Agent Systems 11 (3).
[8] L. Matignon, G. J. Laurent, N. Le Fort-Piat, Independent reinforcement learners in cooperative Markov games:
a survey regarding coordination problems, Knowledge Engineering Review 27 (1) (2012) 1 -- 31.
[9] D. Bloembergen, K. Tuyls, D. Hennes, M. Kaisers, Evolutionary Dynamics of Multi-Agent Learning: A Survey.,
Journal of Artificial Intelligence Research 53 (2015) 659 -- 697.
[10] P. Hernandez-Leal, M. Kaisers, T. Baarslag, E. Munoz de Cote, A Survey of Learning in Multiagent Environ-
ments - Dealing with Non-Stationarity.
URL http://arxiv.org/abs/1707.09183
[11] S. V. Albrecht, P. Stone, Autonomous agents modelling other agents: A comprehensive survey and open
problems, Artificial Intelligence 258 (2018) 66 -- 95.
[12] F. L. Silva, A. H. R. Costa, A survey on transfer learning for multiagent reinforcement learning systems,
Journal of Artificial Intelligence Research 64 (2019) 645 -- 703.
[13] V. Mnih, K. Kavukcuoglu, D. Silver, A. A. Rusu, J. Veness, M. G. Bellemare, A. Graves, M. Riedmiller, A. K.
Fidjeland, G. Ostrovski, S. Petersen, C. Beattie, A. Sadik, I. Antonoglou, H. King, D. Kumaran, D. Wierstra,
S. Legg, D. Hassabis, Human-level control through deep reinforcement learning, Nature 518 (7540) (2015)
529 -- 533.
[14] D. Silver, A. Huang, C. J. Maddison, A. Guez, L. Sifre, G. van den Driessche, J. Schrittwieser, I. Antonoglou,
V. Panneershelvam, M. Lanctot, S. Dieleman, D. Grewe, J. Nham, N. Kalchbrenner, I. Sutskever, T. Lillicrap,
M. Leach, K. Kavukcuoglu, T. Graepel, D. Hassabis, Mastering the game of Go with deep neural networks
and tree search, Nature 529 (7587) (2016) 484 -- 489.
[15] D. Silver, J. Schrittwieser, K. Simonyan, I. Antonoglou, A. Huang, A. Guez, T. Hubert, L. Baker, M. Lai,
A. Bolton, et al., Mastering the game of Go without human knowledge, Nature 550 (7676) (2017) 354.
[16] M. Moravc´ık, M. Schmid, N. Burch, V. Lis´y, D. Morrill, N. Bard, T. Davis, K. Waugh, M. Johanson, M. Bowl-
ing, DeepStack: Expert-level artificial intelligence in heads-up no-limit poker, Science 356 (6337) (2017) 508 --
513.
[17] N. Brown, T. Sandholm, Superhuman AI for heads-up no-limit poker: Libratus beats top professionals, Science
359 (6374) (2018) 418 -- 424.
[18] Open AI Five, https://blog.openai.com/openai-five, [Online; accessed 7-September-2018] (2018).
[19] O. Vinyals, I. Babuschkin, J. Chung, M. Mathieu, M. Jaderberg, W. M. Czarnecki, A. Dudzik, A. Huang,
P. Georgiev, R. Powell, T. Ewalds, D. Horgan, M. Kroiss, I. Danihelka, J. Agapiou, J. Oh, V. Dalibard,
D. Choi, L. Sifre, Y. Sulsky, S. Vezhnevets, J. Molloy, T. Cai, D. Budden, T. Paine, C. Gulcehre, Z. Wang,
T. Pfaff, T. Pohlen, Y. Wu, D. Yogatama, J. Cohen, K. McKinney, O. Smith, T. Schaul, T. Lillicrap, C. Apps,
K. Kavukcuoglu, D. Hassabis, D. Silver, AlphaStar: Mastering the Real-Time Strategy Game StarCraft II,
https://deepmind.com/blog/alphastar-mastering-real-time-strategy-game-starcraft-ii/ (2019).
[20] R. S. Sutton, A. G. Barto, Reinforcement learning: An introduction, 2nd Edition, MIT Press, 2018.
[21] Y. LeCun, Y. Bengio, G. Hinton, Deep learning, Nature 521 (7553) (2015) 436.
[22] J. Schmidhuber, Deep learning in neural networks: An overview, Neural networks 61 (2015) 85 -- 117.
[23] K. Arulkumaran, M. P. Deisenroth, M. Brundage, A. A. Bharath, A Brief Survey of Deep Reinforcement
Learning .
URL http://arXiv.org/abs/1708.05866v2
reinforcement learning, Foundations and Trends R(cid:13) in Machine Learning 11 (3-4) (2018) 219 -- 354.
[24] V. Fran¸cois-Lavet, P. Henderson, R. Islam, M. G. Bellemare, J. Pineau, et al., An introduction to deep
[25] Y. Yang, J. Hao, M. Sun, Z. Wang, C. Fan, G. Strbac, Recurrent Deep Multiagent Q-Learning for Autonomous
Brokers in Smart Grid, in: Proceedings of the Twenty-Seventh International Joint Conference on Artificial
Intelligence, Stockholm, Sweden, 2018.
[26] J. Zhao, G. Qiu, Z. Guan, W. Zhao, X. He, Deep reinforcement learning for sponsored search real-time bidding,
in: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining,
ACM, 2018, pp. 1021 -- 1030.
[27] B. M. Lake, T. D. Ullman, J. Tenenbaum, S. Gershman, Building machines that learn and think like people,
Behavioral and Brain Sciences 40.
[28] A. Tamar, S. Levine, P. Abbeel, Y. Wu, G. Thomas, Value Iteration Networks., NIPS (2016) 2154 -- 2162.
[29] G. Papoudakis, F. Christianos, A. Rahman, S. V. Albrecht, Dealing with non-stationarity in multi-agent deep
reinforcement learning, arXiv preprint arXiv:1906.04737.
[30] T. T. Nguyen, N. D. Nguyen, S. Nahavandi, Deep reinforcement learning for multi-agent systems: A review of
challenges, solutions and applications, arXiv preprint arXiv:1812.11794.
35
[31] D. H. Wolpert, K. Tumer, Optimal payoff functions for members of collectives, in: Modeling complexity in
economic and social systems, 2002, pp. 355 -- 369.
[32] A. K. Agogino, K. Tumer, Unifying Temporal and Structural Credit Assignment Problems., in: Proceedings
of 17th International Conference on Autonomous Agents and Multiagent Systems, 2004.
[33] N. Fulda, D. Ventura, Predicting and Preventing Coordination Problems in Cooperative Q-learning Systems,
in: Proceedings of the Twentieth International Joint Conference on Artificial Intelligence, Hyderabad, India,
2007, pp. 780 -- 785.
[34] E. Wei, S. Luke, Lenient Learning in Independent-Learner Stochastic Cooperative Games., Journal of Machine
Learning Research.
[35] G. Palmer, K. Tuyls, D. Bloembergen, R. Savani, Lenient Multi-Agent Deep Reinforcement Learning., in:
International Conference on Autonomous Agents and Multiagent Systems, 2018.
[36] L. Busoniu, R. Babuska, B. De Schutter, Multi-agent reinforcement learning: An overview, in: D. Srinivasan,
L. C. Jain (Eds.), Innovations in Multi-Agent Systems and Applications - 1, Springer Berlin Heidelberg, Berlin,
Heidelberg, 2010, pp. 183 -- 221.
[37] Y. Li, Deep reinforcement learning: An overview, CoRR abs/1701.07274. arXiv:1701.07274.
URL http://arxiv.org/abs/1701.07274
[38] A. Darwiche, Human-level intelligence or animal-like abilities?, Commun. ACM 61 (10) (2018) 56 -- 67.
[39] M. Wiering, M. Van Otterlo, Reinforcement learning, Adaptation, learning, and optimization 12.
[40] L. P. Kaelbling, M. L. Littman, A. W. Moore, Reinforcement learning: A survey, Journal of artificial intelligence
research 4 (1996) 237 -- 285.
[41] M. L. Puterman, Markov decision processes: Discrete stochastic dynamic programming, John Wiley & Sons,
Inc., 1994.
[42] A. R. Cassandra, Exact and approximate algorithms for partially observable Markov decision processes, Ph.D.
thesis, Computer Science Department, Brown University (May 1998).
[43] K. J. Astrom, Optimal control of Markov processes with incomplete state information, Journal of mathematical
analysis and applications 10 (1) (1965) 174 -- 205.
[44] R. Bellman, A Markovian decision process, Journal of Mathematics and Mechanics 6 (5) (1957) 679 -- 684.
[45] J. Watkins, Learning from delayed rewards, Ph.D. thesis, King's College, Cambridge, UK (Apr. 1989).
[46] T. Kamihigashi, C. Le Van, Necessary and Sufficient Conditions for a Solution of the Bellman Equation to be
the Value Function: A General Principle.
URL https://halshs.archives-ouvertes.fr/halshs-01159177
[47] J. Tsitsiklis, Asynchronous stochastic approximation and Q-learning, Machine Learning 16 (3) (1994) 185 -- 202.
[48] T. Jaakkola, M. I. Jordan, S. P. Singh, Convergence of stochastic iterative dynamic programming algorithms,
in: Advances in neural information processing systems, 1994, pp. 703 -- 710.
[49] C. Szepesv´ari, M. L. Littman, A unified analysis of value-function-based reinforcement-learning algorithms,
Neural computation 11 (8) (1999) 2017 -- 2060.
[50] E. Even-Dar, Y. Mansour, Learning rates for Q-learning, Journal of Machine Learning Research 5 (Dec) (2003)
1 -- 25.
[51] C. Szepesv´ari, Algorithms for reinforcement learning, Synthesis lectures on artificial intelligence and machine
learning 4 (1) (2010) 1 -- 103.
[52] S. Singh, T. Jaakkola, M. L. Littman, C. Szepesv´ari, Convergence results for single-step on-policy
reinforcement-learning algorithms, Machine learning 38 (3) (2000) 287 -- 308.
[53] H. Van Seijen, H. Van Hasselt, S. Whiteson, M. Wiering, A theoretical and empirical analysis of Expected
Sarsa, in: IEEE Symposium on Adaptive Dynamic Programming and Reinforcement Learning, Nashville, TN,
USA, 2009, pp. 177 -- 184.
[54] V. R. Konda, J. Tsitsiklis, Actor-critic algorithms, in: Advances in Neural Information Processing Systems,
2000.
[55] R. S. Sutton, D. A. McAllester, S. P. Singh, Y. Mansour, Policy Gradient Methods for Reinforcement Learning
with Function Approximation., in: Advances in Neural Information Processing Systems, 2000.
[56] R. J. Williams, Simple statistical gradient-following algorithms for connectionist reinforcement learning, Ma-
chine learning 8 (3-4) (1992) 229 -- 256.
[57] H. Liu, Y. Feng, Y. Mao, D. Zhou, J. Peng, Q. Liu, Action-depedent control variates for policy optimization
via stein's identity, in: International Conference on Learning Representations, 2018.
[58] S. Gu, T. Lillicrap, Z. Ghahramani, R. E. Turner, S. Levine, Q-prop: Sample-efficient policy gradient with an
off-policy critic, in: International Conference on Learning Representations, 2017.
[59] G. Tucker, S. Bhupatiraju, S. Gu, R. E. Turner, Z. Ghahramani, S. Levine, The mirage of action-dependent
36
baselines in reinforcement learning, in: International Conference on Machine Learning, 2018.
[60] J. Schulman, S. Levine, P. Abbeel, M. I. Jordan, P. Moritz, Trust Region Policy Optimization., in: 31st
International Conference on Machine Learning, Lille, France, 2015.
[61] D. Silver, G. Lever, N. Heess, T. Degris, D. Wierstra, M. Riedmiller, Deterministic policy gradient algorithms,
in: ICML, 2014.
[62] R. Hafner, M. Riedmiller, Reinforcement learning in feedback control, Machine learning 84 (1-2) (2011) 137 --
169.
[63] R. Lowe, Y. Wu, A. Tamar, J. Harb, P. Abbeel, I. Mordatch, Multi-Agent Actor-Critic for Mixed Cooperative-
Competitive Environments., in: Advances in Neural Information Processing Systems, 2017, pp. 6379 -- 6390.
[64] J. N. Foerster, R. Y. Chen, M. Al-Shedivat, S. Whiteson, P. Abbeel, I. Mordatch, Learning with Opponent-
Learning Awareness., in: Proceedings of 17th International Conference on Autonomous Agents and Multiagent
Systems, Stockholm, Sweden, 2018.
[65] T. P. Lillicrap, J. J. Hunt, A. Pritzel, N. Heess, T. Erez, Y. Tassa, D. Silver, D. Wierstra, Continuous control
with deep reinforcement learning, in: International Conference on Learning Representations, 2016.
[66] L. D. Pyeatt, A. E. Howe, et al., Decision tree function approximation in reinforcement learning, in: Proceed-
ings of the third international symposium on adaptive systems: evolutionary computation and probabilistic
graphical models, Vol. 2, Cuba, 2001, pp. 70 -- 77.
[67] R. S. Sutton, Generalization in reinforcement learning: Successful examples using sparse coarse coding, in:
Advances in neural information processing systems, 1996, pp. 1038 -- 1044.
[68] R. M. Kretchmar, C. W. Anderson, Comparison of CMACs and radial basis functions for local function
approximators in reinforcement learning, in: Proceedings of International Conference on Neural Networks
(ICNN'97), Vol. 2, IEEE, 1997, pp. 834 -- 837.
[69] J. A. Boyan, A. W. Moore, Generalization in reinforcement learning: Safely approximating the value function,
in: Advances in neural information processing systems, 1995, pp. 369 -- 376.
[70] C. M. Bishop, Pattern recognition and machine learning, Springer, 2006.
[71] M. Riemer, I. Cases, R. Ajemian, M. Liu, I. Rish, Y. Tu, G. Tesauro, Learning to learn without forgetting by
maximizing transfer and minimizing interference, CoRR abs/1810.11910. arXiv:1810.11910.
URL http://arxiv.org/abs/1810.11910
[72] V. Mnih, K. Kavukcuoglu, D. Silver, A. Graves, I. Antonoglou, D. Wierstra, M. Riedmiller, Playing Atari with
Deep Reinforcement Learning.
URL http://arxiv.org/abs/1312.5602v1
[73] G. J. Gordon, Approximate solutions to Markov decision processes, Tech. rep., Carnegie-Mellon University
(1999).
[74] L. Baird, Residual algorithms: Reinforcement learning with function approximation, in: Machine Learning
Proceedings 1995, 1995, pp. 30 -- 37.
[75] S. Whiteson, P. Stone, Evolutionary function approximation for reinforcement learning, Journal of Machine
Learning Research 7 (May) (2006) 877 -- 917.
[76] J. Achiam, E. Knight, P. Abbeel, Towards Characterizing Divergence in Deep Q-Learning, CoRR
abs/1903.08894. arXiv:1903.08894.
URL http://arxiv.org/abs/1903.08894
[77] H. van Hasselt, Y. Doron, F. Strub, M. Hessel, N. Sonnerat, J. Modayil, Deep reinforcement learning and the
deadly triad, CoRR abs/1812.02648. arXiv:1812.02648.
URL http://arxiv.org/abs/1812.02648
[78] S. Fujimoto, H. van Hoof, D. Meger, Addressing function approximation error in actor-critic methods, in:
International Conference on Machine Learning, 2018.
[79] A. Ilyas, L. Engstrom, S. Santurkar, D. Tsipras, F. Janoos, L. Rudolph, A. Madry, Are deep policy gradient
algorithms truly policy gradient algorithms?, CoRR abs/1811.02553. arXiv:1811.02553.
URL http://arxiv.org/abs/1811.02553
[80] T. Lu, D. Schuurmans, C. Boutilier, Non-delusional Q-learning and value-iteration, in: Advances in Neural
Information Processing Systems, 2018, pp. 9949 -- 9959.
[81] J. N. Tsitsiklis, B. Van Roy, Analysis of temporal-diffference learning with function approximation, in: Ad-
vances in neural information processing systems, 1997, pp. 1075 -- 1081.
[82] F. S. Melo, S. P. Meyn, M. I. Ribeiro, An analysis of reinforcement learning with function approximation, in:
Proceedings of the 25th international conference on Machine learning, ACM, 2008, pp. 664 -- 671.
[83] D. Ernst, P. Geurts, L. Wehenkel, Tree-based batch mode reinforcement learning, Journal of Machine Learning
Research 6 (Apr) (2005) 503 -- 556.
37
[84] M. Jaderberg, V. Mnih, W. M. Czarnecki, T. Schaul, J. Z. Leibo, D. Silver, K. Kavukcuoglu, Reinforcement
Learning with Unsupervised Auxiliary Tasks., in: International Conference on Learning Representations, 2017.
[85] M. Hausknecht, P. Stone, Deep Recurrent Q-Learning for Partially Observable MDPs, in: International Con-
ference on Learning Representations, 2015.
[86] S. Hochreiter, J. Schmidhuber, Long short-term memory, Neural computation 9 (8) (1997) 1735 -- 1780.
[87] M. Riedmiller, Neural fitted Q iteration -- first experiences with a data efficient neural reinforcement learning
method, in: European Conference on Machine Learning, Springer, 2005, pp. 317 -- 328.
[88] R. H. Crites, A. G. Barto, Elevator group control using multiple reinforcement learning agents, Machine
learning 33 (2-3) (1998) 235 -- 262.
[89] L. J. Lin, Programming robots using reinforcement learning and teaching., in: AAAI, 1991, pp. 781 -- 786.
[90] L.-J. Lin, Self-improving reactive agents based on reinforcement learning, planning and teaching, Machine
learning 8 (3-4) (1992) 293 -- 321.
[91] H. V. Hasselt, Double Q-learning, in: Advances in Neural Information Processing Systems, 2010, pp. 2613 --
2621.
[92] H. Van Hasselt, A. Guez, D. Silver, Deep reinforcement learning with double Q-learning, in: Thirtieth AAAI
Conference on Artificial Intelligence, 2016.
[93] V. Mnih, A. P. Badia, M. Mirza, A. Graves, T. Lillicrap, T. Harley, D. Silver, K. Kavukcuoglu, Asynchronous
methods for deep reinforcement learning, in: International Conference on Machine Learning, 2016, pp. 1928 --
1937.
[94] M. McCloskey, N. J. Cohen, Catastrophic interference in connectionist networks: The sequential learning
problem, in: Psychology of learning and motivation, Vol. 24, Elsevier, 1989, pp. 109 -- 165.
[95] I. J. Goodfellow, M. Mirza, D. Xiao, A. Courville, Y. Bengio, An empirical investigation of catastrophic
forgetting in gradient-based neural networks.
URL https://arxiv.org/abs/1312.6211
[96] D. Isele, A. Cosgun, Selective experience replay for lifelong learning, in: Thirty-Second AAAI Conference on
Artificial Intelligence, 2018.
[97] G. Palmer, R. Savani, K. Tuyls, Negative update intervals in deep multi-agent reinforcement learning, in: 18th
International Conference on Autonomous Agents and Multiagent Systems, 2019.
[98] Z. Wang, T. Schaul, M. Hessel, H. Van Hasselt, M. Lanctot, N. De Freitas, Dueling network architectures for
deep reinforcement learning, in: International Conference on Machine Learning, 2016.
[99] M. Hauskrecht, Value-function approximations for partially observable Markov decision processes, Journal of
Artificial Intelligence Research 13 (1).
[100] N. Meuleau, L. Peshkin, K.-E. Kim, L. P. Kaelbling, Learning finite-state controllers for partially observable
environments, in: Proceedings of the Fifteenth conference on Uncertainty in artificial intelligence, 1999, pp.
427 -- 436.
[101] D. Steckelmacher, D. M. Roijers, A. Harutyunyan, P. Vrancx, H. Plisnier, A. Now´e, Reinforcement learning in
pomdps with memoryless options and option-observation initiation sets, in: Thirty-Second AAAI Conference
on Artificial Intelligence, 2018.
[102] S. Ioffe, C. Szegedy, Batch normalization: Accelerating deep network training by reducing internal covariate
shift, Proceedings of the 32nd International Conference on Machine Learning (2015) 448 -- 456.
[103] E. Van der Pol, F. A. Oliehoek, Coordinated deep reinforcement learners for traffic light control, in: Proceedings
of Learning, Inference and Control of Multi-Agent Systems at NIPS, 2016.
[104] T. Salimans, D. P. Kingma, Weight normalization: A simple reparameterization to accelerate training of deep
neural networks, in: Advances in Neural Information Processing Systems, 2016, pp. 901 -- 909.
[105] OpenAI Baselines: ACKTR & A2C, https://openai.com/blog/baselines-acktr-a2c/, [Online; accessed
29-April-2019] (2017).
[106] Z. Wang, V. Bapst, N. Heess, V. Mnih, R. Munos, K. Kavukcuoglu, N. de Freitas, Sample efficient actor-critic
with experience replay, arXiv preprint arXiv:1611.01224.
[107] S. S. Gu, T. Lillicrap, R. E. Turner, Z. Ghahramani, B. Scholkopf, S. Levine, Interpolated policy gradient:
Merging on-policy and off-policy gradient estimation for deep reinforcement learning, in: Advances in Neural
Information Processing Systems, 2017, pp. 3846 -- 3855.
[108] E. Shelhamer, P. Mahmoudieh, M. Argus, T. Darrell, Loss is its own reward: Self-supervision for reinforcement
learning, ICLR workshops.
[109] M. G. Bellemare, W. Dabney, R. Dadashi, A. A. Taıga, P. S. Castro, N. L. Roux, D. Schuurmans, T. Lat-
timore, C. Lyle, A Geometric Perspective on Optimal Representations for Reinforcement Learning, CoRR
abs/1901.11530. arXiv:1901.11530.
38
URL http://arxiv.org/abs/1901.11530
[110] R. S. Sutton, J. Modayil, M. Delp, T. Degris, P. M. Pilarski, A. White, D. Precup, Horde: A scalable
real-time architecture for learning knowledge from unsupervised sensorimotor interaction, in: The 10th Inter-
national Conference on Autonomous Agents and Multiagent Systems-Volume 2, International Foundation for
Autonomous Agents and Multiagent Systems, 2011, pp. 761 -- 768.
[111] T. Schaul, J. Quan, I. Antonoglou, D. Silver, Prioritized Experience Replay, in: International Conference on
Learning Representations, 2016.
[112] A. W. Moore, C. G. Atkeson, Prioritized sweeping: Reinforcement learning with less data and less time,
Machine learning 13 (1) (1993) 103 -- 130.
[113] D. Andre, N. Friedman, R. Parr, Generalized prioritized sweeping, in: Advances in Neural Information Pro-
cessing Systems, 1998, pp. 1001 -- 1007.
[114] L. Espeholt, H. Soyer, R. Munos, K. Simonyan, V. Mnih, T. Ward, Y. Doron, V. Firoiu, T. Harley, I. Dun-
ning, et al., IMPALA: Scalable distributed Deep-RL with importance weighted actor-learner architectures, in:
International Conference on Machine Learning, 2018.
[115] J. Schulman, F. Wolski, P. Dhariwal, A. Radford, O. Klimov, Proximal Policy Optimization Algorithms.
URL http://arxiv.org/abs/1707.06347
[116] S. M. Kakade, A natural policy gradient, in: Advances in neural information processing systems, 2002, pp.
1531 -- 1538.
[117] N. Heess, D. TB, S. Sriram, J. Lemmon, J. Merel, G. Wayne, Y. Tassa, T. Erez, Z. Wang, S. M. A. Eslami,
M. A. Riedmiller, D. Silver, Emergence of Locomotion Behaviours in Rich Environments.
URL http://arXiv.org/abs/1707.02286v2
[118] G. Bacchiani, D. Molinari, M. Patander, Microscopic traffic simulation by cooperative multi-agent deep rein-
forcement learning, in: AAMAS, 2019.
[119] J. Schulman, P. Abbeel, X. Chen, Equivalence Between Policy Gradients and Soft Q-Learning, CoRR
abs/1704.06440. arXiv:1704.06440.
URL http://arxiv.org/abs/1704.06440
[120] T. Haarnoja, H. Tang, P. Abbeel, S. Levine, Reinforcement learning with deep energy-based policies, in:
Proceedings of the 34th International Conference on Machine Learning-Volume 70, 2017, pp. 1352 -- 1361.
[121] T. Haarnoja, A. Zhou, P. Abbeel, S. Levine, Soft actor-critic: Off-policy maximum entropy deep reinforcement
learning with a stochastic actor, in: International Conference on Machine Learning, 2018.
[122] M. Tan, Multi-Agent Reinforcement Learning: Independent vs. Cooperative Agents, in: Machine Learning
Proceedings 1993 Proceedings of the Tenth International Conference, University of Massachusetts, Amherst,
June 27 -- 29, 1993, 1993, pp. 330 -- 337.
[123] G. J. Laurent, L. Matignon, L. Fort-Piat, et al., The world of independent learners is not Markovian, Interna-
tional Journal of Knowledge-based and Intelligent Engineering Systems 15 (1) (2011) 55 -- 64.
[124] M. L. Littman, Markov games as a framework for multi-agent reinforcement learning, in: Proceedings of the
11th International Conference on Machine Learning, New Brunswick, NJ, USA, 1994, pp. 157 -- 163.
[125] M. L. Littman, Value-function reinforcement learning in Markov games, Cognitive Systems Research 2 (1)
(2001) 55 -- 66.
[126] C. Claus, C. Boutilier, The dynamics of reinforcement learning in cooperative multiagent systems, in: Proceed-
ings of the 15th National Conference on Artificial Intelligence, Madison, Wisconsin, USA, 1998, pp. 746 -- 752.
[127] J. Hu, M. P. Wellman, Nash Q-learning for general-sum stochastic games, The Journal of Machine Learning
Research 4 (2003) 1039 -- 1069.
[128] M. L. Littman, Friend-or-foe Q-learning in general-sum games, in: Proceedings of 17th International Conference
on Autonomous Agents and Multiagent Systems, Williamstown, MA, USA, 2001, pp. 322 -- 328.
[129] X. Song, T. Wang, C. Zhang, Convergence of multi-agent learning with a finite step size in general-sum games,
in: 18th International Conference on Autonomous Agents and Multiagent Systems, 2019.
[130] D. Balduzzi, S. Racaniere, J. Martens, J. Foerster, K. Tuyls, T. Graepel, The mechanics of n-player differ-
entiable games, in: Proceedings of the 35th International Conference on Machine Learning, Proceedings of
Machine Learning Research, Stockholm, Sweden, 2018, pp. 354 -- 363.
[131] J. P´erolat, B. Piot, O. Pietquin, Actor-critic fictitious play in simultaneous move multistage games, in: 21st
International Conference on Artificial Intelligence and Statistics, 2018.
[132] G. Bono, J. S. Dibangoye, L. Matignon, F. Pereyron, O. Simonin, Cooperative multi-agent policy gradient, in:
European Conference on Machine Learning, 2018.
[133] T. W. Neller, M. Lanctot, An introduction to counterfactual regret minimization, in: Proceedings of Model AI
Assignments, The Fourth Symposium on Educational Advances in Artificial Intelligence (EAAI-2013), 2013.
39
[134] M. Zinkevich, M. Johanson, M. Bowling, C. Piccione, Regret minimization in games with incomplete informa-
tion, in: Advances in neural information processing systems, 2008, pp. 1729 -- 1736.
[135] A. Blum, Y. Monsour, Learning, regret minimization, and equilibria, in: Algorithmic Game Theory, Cambridge
University Press, 2007, Ch. 4.
[136] S. Srinivasan, M. Lanctot, V. Zambaldi, J. P´erolat, K. Tuyls, R. Munos, M. Bowling, Actor-critic policy
optimization in partially observable multiagent environments, in: Advances in Neural Information Processing
Systems, 2018, pp. 3422 -- 3435.
[137] E. Lockhart, M. Lanctot, J. P´erolat, J. Lespiau, D. Morrill, F. Timbers, K. Tuyls, Computing approximate
equilibria in sequential adversarial games by exploitability descent, CoRR abs/1903.05614. arXiv:1903.05614.
URL http://arxiv.org/abs/1903.05614
[138] M. Johanson, N. Bard, N. Burch, M. Bowling, Finding optimal abstract strategies in extensive-form games,
in: Twenty-Sixth AAAI Conference on Artificial Intelligence, 2012.
[139] E. Kalai, E. Lehrer, Rational learning leads to Nash equilibrium, Econometrica: Journal of the Econometric
Society (1993) 1019 -- 1045.
[140] T. W. Sandholm, R. H. Crites, Multiagent reinforcement learning in the iterated prisoner's dilemma, Biosystems
37 (1-2) (1996) 147 -- 166.
[141] S. Singh, M. Kearns, Y. Mansour, Nash convergence of gradient dynamics in general-sum games, in: Proceed-
ings of the Sixteenth conference on Uncertainty in artificial intelligence, Morgan Kaufmann Publishers Inc.,
2000, pp. 541 -- 548.
[142] B. Banerjee, J. Peng, Adaptive policy gradient in multiagent learning, in: Proceedings of the second interna-
tional joint conference on Autonomous agents and multiagent systems, ACM, 2003, pp. 686 -- 692.
[143] A. Greenwald, K. Hall, Correlated Q-learning, in: Proceedings of 17th International Conference on Autonomous
Agents and Multiagent Systems, Washington, DC, USA, 2003, pp. 242 -- 249.
[144] M. Bowling, Convergence problems of general-sum multiagent reinforcement learning, in: International Con-
ference on Machine Learning, 2000, pp. 89 -- 94.
[145] M. Bowling, Convergence and no-regret in multiagent learning, in: Advances in Neural Information Processing
Systems, Vancouver, Canada, 2004, pp. 209 -- 216.
[146] M. Zinkevich, A. Greenwald, M. L. Littman, Cyclic equilibria in Markov games, in: Advances in Neural
Information Processing Systems, 2006, pp. 1641 -- 1648.
[147] M. Bowling, M. Veloso, Multiagent learning using a variable learning rate, Artificial Intelligence 136 (2) (2002)
215 -- 250.
[148] M. Kaisers, K. Tuyls, FAQ-learning in matrix games: demonstrating convergence near Nash equilibria, and
bifurcation of attractors in the battle of sexes, in: AAAI Workshop on Interactive Decision Theory and Game
Theory, San Francisco, CA, USA, 2011, pp. 309 -- 316.
[149] M. Wunder, M. L. Littman, M. Babes, Classes of Multiagent Q-learning Dynamics with epsilon-greedy Ex-
ploration, in: Proceedings of the 35th International Conference on Machine Learning, Haifa, Israel, 2010, pp.
1167 -- 1174.
[150] G. Tesauro, Extending Q-learning to general adaptive multi-agent systems, in: Advances in Neural Information
Processing Systems, Vancouver, Canada, 2003, pp. 871 -- 878.
[151] M. Weinberg, J. S. Rosenschein, Best-response multiagent learning in non-stationary environments, in: Pro-
ceedings of the 3rd International Conference on Autonomous Agents and Multiagent Systems, New York, NY,
USA, 2004, pp. 506 -- 513.
[152] D. Chakraborty, P. Stone, Multiagent learning in the presence of memory-bounded agents, Autonomous Agents
and Multi-Agent Systems 28 (2) (2013) 182 -- 213.
[153] G. Weiss (Ed.), Multiagent Systems, 2nd Edition, (Intelligent Robotics and Autonomous Agents series), MIT
Press, Cambridge, MA, USA, 2013.
[154] Multiagent Learning, Foundations and Recent Trends, https://www.cs.utexas.edu/~larg/ijcai17_
tutorial/multiagent_learning.pdf, [Online; accessed 7-September-2018] (2017).
[155] A. Tampuu, T. Matiisen, D. Kodelja, I. Kuzovkin, K. Korjus, J. Aru, J. Aru, R. Vicente, Multiagent cooper-
ation and competition with deep reinforcement learning, PLOS ONE 12 (4) (2017) e0172395.
[156] J. Z. Leibo, V. Zambaldi, M. Lanctot, J. Marecki, Multi-agent Reinforcement Learning in Sequential Social
Dilemmas, in: Proceedings of the 16th Conference on Autonomous Agents and Multiagent Systems, Sao Paulo,
2017.
[157] M. Raghu, A. Irpan, J. Andreas, R. Kleinberg, Q. Le, J. Kleinberg, Can Deep Reinforcement Learning solve
Erdos-Selfridge-Spencer Games?, in: Proceedings of the 35th International Conference on Machine Learning,
2018.
40
[158] T. Bansal, J. Pachocki, S. Sidor, I. Sutskever, I. Mordatch, Emergent Complexity via Multi-Agent Competition.,
in: International Conference on Machine Learning, 2018.
[159] J. Z. Leibo, J. Perolat, E. Hughes, S. Wheelwright, A. H. Marblestone, E. Du´enez-Guzm´an, P. Sunehag,
I. Dunning, T. Graepel, Malthusian reinforcement learning, in: 18th International Conference on Autonomous
Agents and Multiagent Systems, 2019.
[160] I. Mordatch, P. Abbeel, Emergence of grounded compositional language in multi-agent populations, in: Thirty-
Second AAAI Conference on Artificial Intelligence, 2018.
[161] A. Lazaridou, A. Peysakhovich, M. Baroni, Multi-Agent Cooperation and the Emergence of (Natural) Lan-
guage, in: International Conference on Learning Representations, 2017.
[162] J. N. Foerster, Y. M. Assael, N. De Freitas, S. Whiteson, Learning to communicate with deep multi-agent
reinforcement learning, in: Advances in Neural Information Processing Systems, 2016, pp. 2145 -- 2153.
[163] S. Sukhbaatar, A. Szlam, R. Fergus, Learning Multiagent Communication with Backpropagation, in: Advances
in Neural Information Processing Systems, 2016, pp. 2244 -- 2252.
[164] P. Peng, Q. Yuan, Y. Wen, Y. Yang, Z. Tang, H. Long, J. Wang, Multiagent Bidirectionally-Coordinated Nets
for Learning to Play StarCraft Combat Games.
URL http://arxiv.org/abs/1703.10069
[165] E. Pesce, G. Montana, Improving coordination in multi-agent deep reinforcement learning through memory-
driven communication, CoRR abs/1901.03887. arXiv:1901.03887.
URL http://arxiv.org/abs/1901.03887
[166] S. Omidshafiei, J. Pazis, C. Amato, J. P. How, J. Vian, Deep Decentralized Multi-task Multi-Agent Reinforce-
ment Learning under Partial Observability, in: Proceedings of the 34th International Conference on Machine
Learning, Sydney, 2017.
[167] J. N. Foerster, G. Farquhar, T. Afouras, N. Nardelli, S. Whiteson, Counterfactual Multi-Agent Policy Gradi-
ents., in: 32nd AAAI Conference on Artificial Intelligence, 2017.
[168] J. N. Foerster, N. Nardelli, G. Farquhar, T. Afouras, P. H. S. Torr, P. Kohli, S. Whiteson, Stabilising Experience
Replay for Deep Multi-Agent Reinforcement Learning., in: International Conference on Machine Learning,
2017.
[169] H. He, J. Boyd-Graber, K. Kwok, H. Daume, Opponent modeling in deep reinforcement learning, in: 33rd
International Conference on Machine Learning, 2016, pp. 2675 -- 2684.
[170] R. Raileanu, E. Denton, A. Szlam, R. Fergus, Modeling Others using Oneself in Multi-Agent Reinforcement
Learning., in: International Conference on Machine Learning, 2018.
[171] Z.-W. Hong, S.-Y. Su, T.-Y. Shann, Y.-H. Chang, C.-Y. Lee, A Deep Policy Inference Q-Network for Multi-
Agent Systems, in: International Conference on Autonomous Agents and Multiagent Systems, 2018.
[172] M. Lanctot, V. F. Zambaldi, A. Gruslys, A. Lazaridou, K. Tuyls, J. P´erolat, D. Silver, T. Graepel, A Uni-
fied Game-Theoretic Approach to Multiagent Reinforcement Learning., in: Advances in Neural Information
Processing Systems, 2017.
[173] J. Heinrich, D. Silver, Deep Reinforcement Learning from Self-Play in Imperfect-Information Games.
URL http://arxiv.org/abs/1603.01121
[174] N. C. Rabinowitz, F. Perbet, H. F. Song, C. Zhang, S. M. A. Eslami, M. Botvinick, Machine Theory of Mind.,
in: International Conference on Machine Learning, Stockholm, Sweden, 2018.
[175] T. Yang, J. Hao, Z. Meng, C. Zhang, Y. Z. Z. Zheng, Towards Efficient Detection and Optimal Response
against Sophisticated Opponents, in: IJCAI, 2019.
[176] A. Lerer, A. Peysakhovich, Maintaining cooperation in complex social dilemmas using deep reinforcement
learning, CoRR abs/1707.01068. arXiv:1707.01068.
URL http://arxiv.org/abs/1707.01068
[177] W. Kim, M. Cho, Y. Sung, Message-Dropout: An Efficient Training Method for Multi-Agent Deep Reinforce-
ment Learning, in: 33rd AAAI Conference on Artificial Intelligence, 2019.
[178] Y. Zheng, J. Hao, Z. Zhang, Weighted double deep multiagent reinforcement learning in stochastic cooperative
environments.
URL http://arXiv.org/abs/1802.08534
[179] M. Jaderberg, W. M. Czarnecki, I. Dunning, L. Marris, G. Lever, A. G. Castaneda, C. Beattie, N. C. Rabi-
nowitz, A. S. Morcos, A. Ruderman, N. Sonnerat, T. Green, L. Deason, J. Z. Leibo, D. Silver, D. Hassabis,
K. Kavukcuoglu, T. Graepel, Human-level performance in 3d multiplayer games with population-based rein-
forcement learning, Science 364 (6443) (2019) 859 -- 865. arXiv:https://science.sciencemag.org/content/
364/6443/859.full.pdf, doi:10.1126/science.aau6249.
URL https://science.sciencemag.org/content/364/6443/859
41
[180] P. Sunehag, G. Lever, A. Gruslys, W. M. Czarnecki, V. F. Zambaldi, M. Jaderberg, M. Lanctot, N. Sonnerat,
J. Z. Leibo, K. Tuyls, T. Graepel, Value-Decomposition Networks For Cooperative Multi-Agent Learning Based
On Team Reward., in: Proceedings of 17th International Conference on Autonomous Agents and Multiagent
Systems, Stockholm, Sweden, 2018.
[181] T. Rashid, M. Samvelyan, C. S. de Witt, G. Farquhar, J. N. Foerster, S. Whiteson, QMIX - Monotonic
Value Function Factorisation for Deep Multi-Agent Reinforcement Learning., in: International Conference on
Machine Learning, 2018.
[182] J. K. Gupta, M. Egorov, M. Kochenderfer, Cooperative multi-agent control using deep reinforcement learning,
in: G. Sukthankar, J. A. Rodriguez-Aguilar (Eds.), Autonomous Agents and Multiagent Systems, Springer
International Publishing, Cham, 2017, pp. 66 -- 83.
[183] S. Li, Y. Wu, X. Cui, H. Dong, F. Fang, S. Russell, Robust multi-agent reinforcement learning via minimax
deep deterministic policy gradient, in: AAAI Conference on Artificial Intelligence, 2019.
[184] Y. Zheng, Z. Meng, J. Hao, Z. Zhang, T. Yang, C. Fan, A Deep Bayesian Policy Reuse Approach Against
Non-Stationary Agents, in: Advances in Neural Information Processing Systems, 2018, pp. 962 -- 972.
[185] R. Powers, Y. Shoham, Learning against opponents with bounded memory, in: Proceedings of the 19th Inter-
national Joint Conference on Artificial Intelligence, Edinburg, Scotland, UK, 2005, pp. 817 -- 822.
[186] M. L. Littman, P. Stone, Implicit Negotiation in Repeated Games, ATAL '01: Revised Papers from the 8th
International Workshop on Intelligent Agents VIII.
[187] R. Axelrod, W. D. Hamilton, The evolution of cooperation, Science 211 (27) (1981) 1390 -- 1396.
[188] E. Munoz de Cote, A. Lazaric, M. Restelli, Learning to cooperate in multi-agent social dilemmas, in: Proceed-
ings of the 5th International Conference on Autonomous Agents and Multiagent Systems, Hakodate, Hokkaido,
Japan, 2006, pp. 783 -- 785.
[189] J. L. Stimpson, M. A. Goodrich, Learning to cooperate in a social dilemma: A satisficing approach to bar-
gaining, in: Proceedings of the 20th International Conference on Machine Learning (ICML-03), 2003, pp.
728 -- 735.
[190] G. W. Brown, Iterative solution of games by fictitious play, Activity analysis of production and allocation
13 (1) (1951) 374 -- 376.
[191] D. Monderer, L. S. Shapley, Fictitious play property for games with identical interests, Journal of economic
theory 68 (1) (1996) 258 -- 265.
[192] G. Tesauro, Temporal difference learning and TD-Gammon, Communications of the ACM 38 (3) (1995) 58 -- 68.
[193] M. Bowling, N. Burch, M. Johanson, O. Tammelin, Heads-up limit hold'em poker is solved, Science 347 (6218)
(2015) 145 -- 149.
[194] J. Z. Leibo, E. Hughes, M. Lanctot, T. Graepel, Autocurricula and the emergence of innovation from social
interaction: A manifesto for multi-agent intelligence research, CoRR abs/1903.00742. arXiv:1903.00742.
URL http://arxiv.org/abs/1903.00742
[195] S. Samothrakis, S. Lucas, T. Runarsson, D. Robles, Coevolving game-playing agents: Measuring performance
and intransitivities, IEEE Transactions on Evolutionary Computation 17 (2) (2013) 213 -- 226.
[196] M. Bellemare, S. Srinivasan, G. Ostrovski, T. Schaul, D. Saxton, R. Munos, Unifying count-based exploration
and intrinsic motivation, in: Advances in Neural Information Processing Systems, 2016, pp. 1471 -- 1479.
[197] D. E. Moriarty, A. C. Schultz, J. J. Grefenstette, Evolutionary algorithms for reinforcement learning, Journal
of Artificial Intelligence Research 11 (1999) 241 -- 276.
[198] F. A. Oliehoek, E. D. De Jong, N. Vlassis, The parallel Nash memory for asymmetric games, in: Proceedings
of the 8th annual conference on Genetic and evolutionary computation, ACM, 2006, pp. 337 -- 344.
[199] L. Bull, T. C. Fogarty, M. Snaith, Evolution in multi-agent systems: Evolving communicating classifier systems
for gait in a quadrupedal robot, in: Proceedings of the 6th International Conference on Genetic Algorithms,
Morgan Kaufmann Publishers Inc., 1995, pp. 382 -- 388.
[200] L. Bull, Evolutionary computing in multi-agent environments: Operators, in: International Conference on
Evolutionary Programming, Springer, 1998, pp. 43 -- 52.
[201] H. Iba, Emergent cooperation for multiple agents using genetic programming, in: International Conference on
Parallel Problem Solving from Nature, Springer, 1996, pp. 32 -- 41.
[202] E. Todorov, T. Erez, Y. Tassa, MuJoCo - A physics engine for model-based control, Intelligent Robots and
Systems (2012) 5026 -- 5033.
[203] V. Gullapalli, A. G. Barto, Shaping as a method for accelerating reinforcement learning, in: Proceedings of
the 1992 IEEE international symposium on intelligent control, IEEE, 1992, pp. 554 -- 559.
[204] S. Mahadevan, J. Connell, Automatic programming of behavior-based robots using reinforcement learning,
Artificial intelligence 55 (2-3) (1992) 311 -- 365.
42
[205] G. Konidaris, A. Barto, Autonomous shaping: Knowledge transfer in reinforcement learning, in: Proceedings
of the 23rd international conference on Machine learning, ACM, 2006, pp. 489 -- 496.
[206] A. Y. Ng, D. Harada, S. J. Russell, Policy invariance under reward transformations: Theory and application
to reward shaping, in: Proceedings of the Sixteenth International Conference on Machine Learning, 1999, pp.
278 -- 287.
[207] P. Erdos, J. L. Selfridge, On a combinatorial game, Journal of Combinatorial Theory, Series A 14 (3) (1973)
298 -- 301.
[208] J. Spencer, Randomization, derandomization and antirandomization: three games, Theoretical Computer
Science 131 (2) (1994) 415 -- 429.
[209] D. Fudenberg, J. Tirole, Game Theory, The MIT Press, 1991.
[210] L. v. d. Maaten, G. Hinton, Visualizing data using t-SNE, Journal of machine learning research 9 (Nov) (2008)
2579 -- 2605.
[211] T. Zahavy, N. Ben-Zrihem, S. Mannor, Graying the black box: Understanding DQNs, in: International Con-
ference on Machine Learning, 2016, pp. 1899 -- 1908.
[212] E. Beeching, C. Wolf, J. Dibangoye, O. Simonin, Deep Reinforcement Learning on a Budget: 3D Control and
Reasoning Without a Supercomputer, CoRR abs/1904.01806. arXiv:1904.01806.
URL http://arxiv.org/abs/1904.01806
[213] N. Srivastava, G. Hinton, A. Krizhevsky, I. Sutskever, R. Salakhutdinov, Dropout: a simple way to prevent
neural networks from overfitting, The Journal of Machine Learning Research 15 (1) (2014) 1929 -- 1958.
[214] M. Schuster, K. K. Paliwal, Bidirectional recurrent neural networks, IEEE Transactions on Signal Processing
45 (11) (1997) 2673 -- 2681.
[215] R. Lowe, J. Foerster, Y.-L. Boureau, J. Pineau, Y. Dauphin, On the pitfalls of measuring emergent communi-
cation, in: 18th International Conference on Autonomous Agents and Multiagent Systems, 2019.
[216] M. Tambe, Towards flexible teamwork, Journal of artificial intelligence research 7 (1997) 83 -- 124.
[217] B. J. Grosz, S. Kraus, Collaborative plans for complex group action, Artificial Intelligence 86 (2) (1996)
269 -- 357.
[218] D. Precup, R. S. Sutton, S. Singh, Eligibility traces for off-policy policy evaluation, in: Proceedings of the
Seventeenth International Conference on Machine Learning., 2000.
[219] J. Frank, S. Mannor, D. Precup, Reinforcement learning in the presence of rare events, in: Proceedings of the
25th international conference on Machine learning, ACM, 2008, pp. 336 -- 343.
[220] T. I. Ahamed, V. S. Borkar, S. Juneja, Adaptive importance sampling technique for markov chains using
stochastic approximation, Operations Research 54 (3) (2006) 489 -- 504.
[221] K. A. Ciosek, S. Whiteson, Offer: Off-environment reinforcement learning, in: Thirty-First AAAI Conference
on Artificial Intelligence, 2017.
[222] D. Bloembergen, M. Kaisers, K. Tuyls, Lenient frequency adjusted Q-learning, in: Proceedings of the 22nd
Belgian/Netherlands Artificial Intelligence Conference, 2010.
[223] L. Panait, K. Sullivan, S. Luke, Lenience towards teammates helps in cooperative multiagent learning, in:
Proceedings of the 5th International Conference on Autonomous Agents and Multiagent Systems, Hakodate,
Japan, 2006.
[224] L. Panait, K. Tuyls, S. Luke, Theoretical advantages of lenient learners: An evolutionary game theoretic
perspective, JMLR 9 (Mar) (2008) 423 -- 457.
[225] M. Lauer, M. Riedmiller, An algorithm for distributed reinforcement learning in cooperative multi-agent sys-
tems, in: In Proceedings of the Seventeenth International Conference on Machine Learning, 2000.
[226] R. Caruana, Multitask learning, Machine learning 28 (1) (1997) 41 -- 75.
[227] A. A. Rusu, S. G. Colmenarejo, C. Gulcehre, G. Desjardins, J. Kirkpatrick, R. Pascanu, V. Mnih,
K. Kavukcuoglu, R. Hadsell, Policy Distillation, in: International Conference on Learning Representations,
2016.
[228] G. Hinton, O. Vinyals, J. Dean, Distilling the knowledge in a neural network, in: NIPS Deep Learning Work-
shop, 2014.
[229] A. S. Vezhnevets, S. Osindero, T. Schaul, N. Heess, M. Jaderberg, D. Silver, K. Kavukcuoglu, FeUdal Networks
for Hierarchical Reinforcement Learning., International Conference On Machine Learning.
[230] P. Dayan, G. E. Hinton, Feudal reinforcement learning, in: Advances in neural information processing systems,
1993, pp. 271 -- 278.
[231] S. P. Singh, Transfer of learning by composing solutions of elemental sequential tasks, Machine Learning 8 (3-4)
(1992) 323 -- 339.
[232] Capture
the Flag:
the
emergence of
complex cooperative agents,
https://deepmind.com/blog/
43
capture-the-flag/, [Online; accessed 7-September-2018] (2018).
[233] C. D. Rosin, R. K. Belew, New methods for competitive coevolution, Evolutionary computation 5 (1) (1997)
1 -- 29.
[234] J. Lehman, K. O. Stanley, Exploiting open-endedness to solve problems through the search for novelty., in:
ALIFE, 2008, pp. 329 -- 336.
[235] M. Jaderberg, V. Dalibard, S. Osindero, W. M. Czarnecki, J. Donahue, A. Razavi, O. Vinyals, T. Green,
I. Dunning, K. Simonyan, et al., Population based training of neural networks.
URL http://arxiv.org/abs/1711.09846
[236] A. E. Elo, The rating of chessplayers, past and present, Arco Pub., 1978.
[237] R. Herbrich, T. Minka, T. Graepel, TrueSkill: a Bayesian skill rating system, in: Advances in neural information
processing systems, 2007, pp. 569 -- 576.
[238] S. Omidshafiei, C. Papadimitriou, G. Piliouras, K. Tuyls, M. Rowland, J.-B. Lespiau, W. M. Czarnecki,
M. Lanctot, J. Perolat, R. Munos, α-Rank: Multi-Agent Evaluation by Evolution, Scientific Reports 9.
[239] T. Back, Evolutionary algorithms in theory and practice: evolution strategies, evolutionary programming,
genetic algorithms, Oxford university press, 1996.
[240] K. A. De Jong, Evolutionary computation: a unified approach, MIT press, 2006.
[241] K. Tumer, A. Agogino, Distributed agent-based air traffic flow management, in: Proceedings of the 6th Inter-
national Conference on Autonomous Agents and Multiagent Systems, Honolulu, Hawaii, 2007.
[242] C. Guestrin, D. Koller, R. Parr, Multiagent planning with factored MDPs, in: Advances in neural information
processing systems, 2002, pp. 1523 -- 1530.
[243] J. R. Kok, N. Vlassis, Sparse cooperative Q-learning, in: Proceedings of the twenty-first international conference
on Machine learning, ACM, 2004, p. 61.
[244] J. Castellini, F. A. Oliehoek, R. Savani, S. Whiteson, The Representational Capacity of Action-Value Net-
works for Multi-Agent Reinforcement Learning, in: 18th International Conference on Autonomous Agents and
Multiagent Systems, 2019.
[245] P. J. Gmytrasiewicz, P. Doshi, A framework for sequential planning in multiagent settings, Journal of Artificial
Intelligence Research 24 (1) (2005) 49 -- 79.
[246] J. C. Harsanyi, Games with incomplete information played by Bayesian players, I -- III Part I. The basic model,
Management science 14 (3) (1967) 159 -- 182.
[247] S. Barrett, P. Stone, S. Kraus, A. Rosenfeld, Teamwork with Limited Knowledge of Teammates., in: Pro-
ceedings of the Twenty-Seventh AAAI Conference on Artificial Intelligence, Bellevue, WS, USA, 2013, pp.
102 -- 108.
[248] R. A. Jacobs, M. I. Jordan, S. J. Nowlan, G. E. Hinton, et al., Adaptive mixtures of local experts., Neural
computation 3 (1) (1991) 79 -- 87.
[249] J. Heinrich, M. Lanctot, D. Silver, Fictitious self-play in extensive-form games, in: International Conference
on Machine Learning, 2015, pp. 805 -- 813.
[250] J. F. Nash, Equilibrium points in n-person games, Proceedings of the National Academy of Sciences 36 (1)
(1950) 48 -- 49.
[251] J. Von Neumann, O. Morgenstern, Theory of games and economic behavior, Vol. 51, Bull. Amer. Math. Soc,
1945.
[252] J. S. Shamma, G. Arslan, Dynamic fictitious play, dynamic gradient play, and distributed convergence to Nash
equilibria, IEEE Transactions on Automatic Control 50 (3) (2005) 312 -- 327.
[253] W. E. Walsh, R. Das, G. Tesauro, J. O. Kephart, Analyzing complex strategic interactions in multi-agent
systems, AAAI-02 Workshop on Game-Theoretic and Decision-Theoretic Agents (2002) 109 -- 118.
[254] M. Johanson, K. Waugh, M. Bowling, M. Zinkevich, Accelerating best response calculation in large extensive
games, in: Twenty-Second International Joint Conference on Artificial Intelligence, 2011.
[255] C. F. Camerer, T.-H. Ho, J.-K. Chong, A cognitive hierarchy model of games, The Quarterly Journal of
Economics 119 (3) (2004) 861.
[256] M. Costa Gomes, V. P. Crawford, B. Broseta, Cognition and Behavior in Normal -- Form Games: An Experi-
mental Study, Econometrica 69 (5) (2001) 1193 -- 1235.
[257] J. Morimoto, K. Doya, Robust reinforcement learning, Neural computation 17 (2) (2005) 335 -- 359.
[258] L. Pinto, J. Davidson, R. Sukthankar, A. Gupta, Robust adversarial reinforcement learning, in: Proceedings
of the 34th International Conference on Machine Learning-Volume 70, JMLR. org, 2017, pp. 2817 -- 2826.
[259] R. Powers, Y. Shoham, T. Vu, A general criterion and an algorithmic framework for learning in multi-agent
systems, Machine Learning 67 (1-2) (2007) 45 -- 76.
[260] J. W. Crandall, M. A. Goodrich, Learning to compete, coordinate, and cooperate in repeated games using
44
reinforcement learning, Machine Learning 82 (3) (2011) 281 -- 314.
[261] M. Johanson, M. A. Zinkevich, M. Bowling, Computing Robust Counter-Strategies., in: Advances in Neural
Information Processing Systems, Vancouver, BC, Canada, 2007, pp. 721 -- 728.
[262] P. McCracken, M. Bowling, Safe strategies for agent modelling in games, in: AAAI Fall Symposium, 2004, pp.
103 -- 110.
[263] S. Damer, M. Gini, Safely using predictions in general-sum normal form games, in: Proceedings of the 16th
Conference on Autonomous Agents and Multiagent Systems, Sao Paulo, 2017.
[264] C. Zhang, V. Lesser, Multi-agent learning with policy prediction, in: Twenty-Fourth AAAI Conference on
Artificial Intelligence, 2010.
[265] P. J. Gmytrasiewicz, E. H. Durfee, Rational Coordination in Multi-Agent Environments, Autonomous Agents
and Multi-Agent Systems 3 (4) (2000) 319 -- 350.
[266] C. F. Camerer, T.-H. Ho, J.-K. Chong, Behavioural Game Theory: Thinking, Learning and Teaching, in:
Advances in Understanding Strategic Behavior, New York, 2004, pp. 120 -- 180.
[267] D. Carmel, S. Markovitch, Incorporating opponent models into adversary search, in: AAAI/IAAI, Vol. 1, 1996,
pp. 120 -- 125.
[268] H. de Weerd, R. Verbrugge, B. Verheij, How much does it help to know what she knows you know? An
agent-based simulation study, Artificial Intelligence 199-200 (C) (2013) 67 -- 92.
[269] P. Hernandez-Leal, M. Kaisers, Towards a Fast Detection of Opponents in Repeated Stochastic Games, in:
G. Sukthankar, J. A. Rodriguez-Aguilar (Eds.), Autonomous Agents and Multiagent Systems: AAMAS 2017
Workshops, Best Papers, Sao Paulo, Brazil, May 8-12, 2017, Revised Selected Papers, 2017, pp. 239 -- 257.
[270] P. Hernandez-Leal, M. E. Taylor, B. Rosman, L. E. Sucar, E. Munoz de Cote, Identifying and Tracking Switch-
ing, Non-stationary Opponents: a Bayesian Approach, in: Multiagent Interaction without Prior Coordination
Workshop at AAAI, Phoenix, AZ, USA, 2016.
[271] B. Rosman, M. Hawasly, S. Ramamoorthy, Bayesian Policy Reuse, Machine Learning 104 (1) (2016) 99 -- 127.
[272] P. Hernandez-Leal, Y. Zhan, M. E. Taylor, L. E. Sucar, E. Munoz de Cote, Efficiently detecting switches
against non-stationary opponents, Autonomous Agents and Multi-Agent Systems 31 (4) (2017) 767 -- 789.
[273] P. Hernandez-Leal, M. Kaisers, Learning against sequential opponents in repeated stochastic games, in: The
3rd Multi-disciplinary Conference on Reinforcement Learning and Decision Making, Ann Arbor, 2017.
[274] J. Schmidhuber, Critique of Paper by "Deep Learning Conspiracy" (Nature 521 p 436), http://people.idsia.
ch/~juergen/deep-learning-conspiracy.html (2015).
paper?,
arXiv
really
cite
an
have
to
[275] Do
I
http://approximatelycorrect.com/2017/08/01/
do-i-have-to-cite-arxiv-paper/, [Online; accessed 21-May-2019] (2017).
[276] Collaboration & Credit Principles, How can we be good stewards of collaborative trust?, http://colah.
github.io/posts/2019-05-Collaboration/index.html, [Online; accessed 31-May-2019] (2019).
[277] H. Wang, B. Raj, E. P. Xing, On the origin of deep learning, CoRR abs/1702.07800. arXiv:1702.07800.
URL http://arxiv.org/abs/1702.07800
[278] A. K. Agogino, K. Tumer, Analyzing and visualizing multiagent rewards in dynamic and stochastic domains,
Autonomous Agents and Multi-Agent Systems 17 (2) (2008) 320 -- 338.
[279] S. Devlin, L. M. Yliniemi, D. Kudenko, K. Tumer, Potential-based difference rewards for multiagent reinforce-
ment learning., in: 13th International Conference on Autonomous Agents and Multiagent Systems, AAMAS
2014, Paris, France, 2014.
[280] D. H. Wolpert, K. R. Wheeler, K. Tumer, General principles of learning-based multi-agent systems, in: Pro-
ceedings of the Third International Conference on Autonomous Agents, 1999.
[281] M. E. Taylor, P. Stone, Transfer learning for reinforcement learning domains: A survey, The Journal of Machine
Learning Research 10 (2009) 1633 -- 1685.
[282] C. Bucilua, R. Caruana, A. Niculescu-Mizil, Model compression, in: Proceedings of the 12th ACM SIGKDD
international conference on Knowledge discovery and data mining, ACM, 2006, pp. 535 -- 541.
[283] Y. Du, W. M. Czarnecki, S. M. Jayakumar, R. Pascanu, B. Lakshminarayanan, Adapting auxiliary losses using
gradient similarity, arXiv preprint arXiv:1812.02224.
[284] S. C. Suddarth, Y. Kergosien, Rule-injection hints as a means of improving network performance and learning
time, in: Neural Networks, Springer, 1990, pp. 120 -- 129.
[285] P. Hernandez-Leal, B. Kartal, M. E. Taylor, Agent Modeling as Auxiliary Task for Deep Reinforcement Learn-
ing, in: AAAI Conference on Artificial Intelligence and Interactive Digital Entertainment, 2019.
[286] M. Andrychowicz, F. Wolski, A. Ray, J. Schneider, R. Fong, P. Welinder, B. McGrew, J. Tobin, P. Abbeel,
W. Zaremba, Hindsight experience replay, in: Advances in Neural Information Processing Systems, 2017.
[287] Z. C. Lipton, K. Azizzadenesheli, A. Kumar, L. Li, J. Gao, L. Deng, Combating Reinforcement Learning's
45
Sisyphean Curse with Intrinsic Fear.
URL http://arxiv.org/abs/1611.01211v8
[288] T. De Bruin, J. Kober, K. Tuyls, R. Babuska, Experience selection in deep reinforcement learning for control,
The Journal of Machine Learning Research 19 (1) (2018) 347 -- 402.
[289] D. S. Bernstein, R. Givan, N. Immerman, S. Zilberstein, The complexity of decentralized control of Markov
decision processes, Mathematics of operations research 27 (4) (2002) 819 -- 840.
[290] F. A. Oliehoek, C. Amato, et al., A concise introduction to decentralized POMDPs, Springer, 2016.
[291] F. A. Oliehoek, M. T. Spaan, N. Vlassis, Optimal and approximate Q-value functions for decentralized
POMDPs, Journal of Artificial Intelligence Research 32 (2008) 289 -- 353.
[292] J. K. Gupta, M. Egorov, M. J. Kochenderfer, Cooperative Multi-agent Control using deep reinforcement
learning, in: Adaptive Learning Agents at AAMAS, Sao Paulo, 2017.
[293] R. Pascanu, T. Mikolov, Y. Bengio, On the difficulty of training recurrent neural networks, in: International
conference on machine learning, 2013, pp. 1310 -- 1318.
[294] K. Greff, R. K. Srivastava, J. Koutnik, B. R. Steunebrink, J. Schmidhuber, LSTM: A Search Space Odyssey,
IEEE Transactions on Neural Networks and Learning Systems 28 (10) (2017) 2222 -- 2232.
[295] J. Chung, C. Gulcehre, K. Cho, Y. Bengio, Empirical evaluation of gated recurrent neural networks on sequence
modeling, in: Deep Learning and Representation Learning Workshop, 2014.
[296] S. Whiteson, B. Tanner, M. E. Taylor, P. Stone, Protecting against evaluation overfitting in empirical reinforce-
ment learning, in: 2011 IEEE Symposium on Adaptive Dynamic Programming and Reinforcement Learning
(ADPRL), IEEE, 2011, pp. 120 -- 127.
[297] M. G. Bellemare, Y. Naddaf, J. Veness, M. Bowling, The arcade learning environment: An evaluation platform
for general agents, Journal of Artificial Intelligence Research 47 (2013) 253 -- 279.
[298] M. C. Machado, M. G. Bellemare, E. Talvitie, J. Veness, M. Hausknecht, M. Bowling, Revisiting the ar-
cade learning environment: Evaluation protocols and open problems for general agents, Journal of Artificial
Intelligence Research 61 (2018) 523 -- 562.
[299] G. Brockman, V. Cheung, L. Pettersson, J. Schneider, J. Schulman, J. Tang, W. Zaremba, OpenAI Gym,
arXiv preprint arXiv:1606.01540.
[300] P. S. Castro, S. Moitra, C. Gelada, S. Kumar, M. G. Bellemare, Dopamine: A Research Framework for Deep
Reinforcement Learning.
URL http://arxiv.org/abs/1812.06110
[301] C. Resnick, W. Eldridge, D. Ha, D. Britz, J. Foerster, J. Togelius, K. Cho, J. Bruna, Pommerman: A Multi-
Agent Playground.
URL http://arxiv.org/abs/1809.07124
[302] C. Gao, B. Kartal, P. Hernandez-Leal, M. E. Taylor, On Hard Exploration for Reinforcement Learning: a Case
Study in Pommerman, in: AAAI Conference on Artificial Intelligence and Interactive Digital Entertainment,
2019.
[303] M. Samvelyan, T. Rashid, C. S. de Witt, G. Farquhar, N. Nardelli, T. G. J. Rudner, C. Hung, P. H. S. Torr,
J. N. Foerster, S. Whiteson, The StarCraft Multi-Agent Challenge, CoRR abs/1902.04043. arXiv:1902.04043.
URL http://arxiv.org/abs/1902.04043
[304] D. P´erez-Li´ebana, K. Hofmann, S. P. Mohanty, N. Kuno, A. Kramer, S. Devlin, R. D. Gaina, D. Ionita,
The multi-agent reinforcement learning in Malmo (MARL O) competition, CoRR abs/1901.08129. arXiv:
1901.08129.
URL http://arxiv.org/abs/1901.08129
[305] M. Johnson, K. Hofmann, T. Hutton, D. Bignell, The Malmo platform for artificial intelligence experimenta-
tion., in: IJCAI, 2016, pp. 4246 -- 4247.
[306] P. Stone, G. Kaminka, S. Kraus, J. S. Rosenschein, Ad Hoc Autonomous Agent Teams: Collaboration without
Pre-Coordination., in: 32nd AAAI Conference on Artificial Intelligence, Atlanta, Georgia, USA, 2010, pp.
1504 -- 1509.
[307] M. Bowling, P. McCracken, Coordination and adaptation in impromptu teams, in: Proceedings of the Nine-
teenth Conference on Artificial Intelligence, Vol. 5, 2005, pp. 53 -- 58.
[308] S. V. Albrecht, S. Ramamoorthy, A game-theoretic model and best-response learning method for ad hoc
coordination in multiagent systems, in: Proceedings of the 12th International Conference on Autonomous
Agents and Multi-agent Systems, Saint Paul, MN, USA, 2013.
[309] N. Bard, J. N. Foerster, S. Chandar, N. Burch, M. Lanctot, H. F. Song, E. Parisotto, V. Dumoulin, S. Moitra,
E. Hughes, I. Dunning, S. Mourad, H. Larochelle, M. G. Bellemare, M. Bowling, The Hanabi Challenge: A
New Frontier for AI Research.
46
URL https://arxiv.org/abs/1902.00506
[310] M. Hessel, J. Modayil, H. Van Hasselt, T. Schaul, G. Ostrovski, W. Dabney, D. Horgan, B. Piot, M. Azar,
D. Silver, Rainbow: Combining improvements in deep reinforcement learning, in: Thirty-Second AAAI Con-
ference on Artificial Intelligence, 2018.
[311] Y. Song, J. Wang, T. Lukasiewicz, Z. Xu, M. Xu, Z. Ding, L. Wu, Arena: A general evaluation platform and
building toolkit for multi-agent intelligence, CoRR abs/1905.08085. arXiv:1905.08085.
URL http://arxiv.org/abs/1905.08085
[312] A. Juliani, V. Berges, E. Vckay, Y. Gao, H. Henry, M. Mattar, D. Lange, Unity: A general platform for
intelligent agents, CoRR abs/1809.02627. arXiv:1809.02627.
URL http://arxiv.org/abs/1809.02627
[313] S. Liu, G. Lever, J. Merel, S. Tunyasuvunakool, N. Heess, T. Graepel, Emergent coordination through compe-
tition, in: International Conference on Learning Representations, 2019.
[314] J. Suarez, Y. Du, P. Isola, I. Mordatch, Neural MMO: A massively multiagent game environment for training
and evaluating intelligent agents, CoRR abs/1903.00784. arXiv:1903.00784.
URL http://arxiv.org/abs/1903.00784
[315] P. Henderson, R. Islam, P. Bachman, J. Pineau, D. Precup, D. Meger, Deep Reinforcement Learning That
Matters., in: 32nd AAAI Conference on Artificial Intelligence, 2018.
[316] P. Nagarajan, G. Warnell, P. Stone, Deterministic implementations for reproducibility in deep reinforcement
learning.
URL http://arxiv.org/abs/1809.05676
[317] K. Clary, E. Tosch, J. Foley, D. Jensen, Let's play again: Variability of deep reinforcement learning agents in
Atari environments, in: NeurIPS Critiquing and Correcting Trends Workshop, 2018.
[318] J. Z. Forde, M. Paganini, The scientific method in the science of machine learning, in: ICLR Debugging
Machine Learning Models workshop, 2019.
[319] K. Azizzadenesheli, Maybe a few considerations in reinforcement learning research?, in: Reinforcement Learn-
ing for Real Life Workshop, 2019.
[320] Z. C. Lipton, J. Steinhardt, Troubling trends in machine learning scholarship, in: ICML Machine Learning
Debates workshop, 2018.
[321] R. Rosenthal, The file drawer problem and tolerance for null results., Psychological bulletin 86 (3) (1979) 638.
[322] D. Sculley, J. Snoek, A. Wiltschko, A. Rahimi, Winner's curse? on pace, progress, and empirical rigor, in:
ICLR Workshop, 2018.
[323] O. Gencoglu, M. van Gils, E. Guldogan, C. Morikawa, M. Suzen, M. Gruber, J. Leinonen, H. Hut-
tunen, Hark side of deep learning -- from grad student descent to automated machine learning, arXiv preprint
arXiv:1904.07633.
[324] K. Azizzadenesheli, B. Yang, W. Liu, E. Brunskill, Z. Lipton, A. Anandkumar, Surprising negative results for
generative adversarial tree search, in: Critiquing and Correcting Trends in Machine Learning Workshop, 2018.
[325] C. Lyle, P. S. Castro, M. G. Bellemare, A comparative analysis of expected and distributional reinforcement
learning, in: Thirty-Third AAAI Conference on Artificial Intelligence, 2019.
[326] B. Kartal, P. Hernandez-Leal, M. E. Taylor, Using Monte Carlo tree search as a demonstrator within asyn-
chronous deep RL, in: AAAI Workshop on Reinforcement Learning in Games, 2019.
[327] G. Melis, C. Dyer, P. Blunsom, On the state of the art of evaluation in neural language models, in: International
Conference on Learning Representations, 2018.
[328] Deep Reinforcement Learning: Pong from Pixels, https://karpathy.github.io/2016/05/31/rl/, [Online;
accessed 7-May-2019] (2016).
[329] V. Firoiu, W. F. Whitney, J. B. Tenenbaum, Beating the World's Best at Super Smash Bros. with Deep
Reinforcement Learning, CoRR abs/1702.06230. arXiv:1702.06230.
URL http://arxiv.org/abs/1702.06230
[330] C. Gao, P. Hernandez-Leal, B. Kartal, M. E. Taylor, Skynet: A Top Deep RL Agent in the Inaugural Pom-
merman Team Competition, in: 4th Multidisciplinary Conference on Reinforcement Learning and Decision
Making, 2019.
[331] D. Amodei, D. Hernandez, AI and Compute (2018).
URL https://blog.openai.com/ai-and-compute
[332] Y. Yu, Towards sample efficient reinforcement learning., in: IJCAI, 2018, pp. 5739 -- 5743.
[333] F. P. Such, V. Madhavan, E. Conti, J. Lehman, K. O. Stanley, J. Clune, Deep neuroevolution: Genetic
algorithms are a competitive alternative for training deep neural networks for reinforcement learning, CoRR
abs/1712.06567.
47
URL http://arxiv.org/abs/1712.06567
[334] A. Stooke, P. Abbeel, Accelerated methods for deep reinforcement learning, CoRR abs/1803.02811. arXiv:
1803.02811.
URL http://arxiv.org/abs/1803.02811
[335] M. Babaeizadeh, I. Frosio, S. Tyree, J. Clemons, J. Kautz, Reinforcement learning through asynchronous
advantage actor-critic on a GPU, in: International Conference on Learning Representations, 2017.
[336] W. H. Guss, C. Codel, K. Hofmann, B. Houghton, N. Kuno, S. Milani, S. P. Mohanty, D. P. Liebana,
R. Salakhutdinov, N. Topin, M. Veloso, P. Wang, The MineRL Competition on Sample Efficient Reinforcement
Learning using Human Priors, CoRR abs/1904.10079. arXiv:1904.10079.
URL http://arxiv.org/abs/1904.10079
[337] G. Cuccu, J. Togelius, P. Cudr´e-Mauroux, Playing Atari with six neurons, in: Proceedings of the 18th Interna-
tional Conference on Autonomous Agents and MultiAgent Systems, International Foundation for Autonomous
Agents and Multiagent Systems, 2019, pp. 998 -- 1006.
[338] A. Ecoffet, J. Huizinga, J. Lehman, K. O. Stanley, J. Clune, Go-explore: a new approach for hard-exploration
problems, arXiv preprint arXiv:1901.10995.
[339] R. I. Brafman, M. Tennenholtz, R-max-a general polynomial time algorithm for near-optimal reinforcement
learning, Journal of Machine Learning Research 3 (Oct) (2002) 213 -- 231.
[340] A. L. Strehl, M. L. Littman, An analysis of model-based interval estimation for Markov decision processes,
Journal of Computer and System Sciences 74 (8) (2008) 1309 -- 1331.
[341] J. Schmidhuber, A possibility for implementing curiosity and boredom in model-building neural controllers,
in: Proc. of the international conference on simulation of adaptive behavior: From animals to animats, 1991,
pp. 222 -- 227.
[342] A. G. Barto, Intrinsic motivation and reinforcement learning, in: Intrinsically motivated learning in natural
and artificial systems, Springer, 2013, pp. 17 -- 47.
[343] T. D. Kulkarni, K. Narasimhan, A. Saeedi, J. Tenenbaum, Hierarchical deep reinforcement learning: Integrating
temporal abstraction and intrinsic motivation, in: Advances in neural information processing systems, 2016,
pp. 3675 -- 3683.
[344] T. G. Dietterich, Ensemble Methods in Machine Learning, in: MCS Proceedings of the First International
Workshop on Multiple Classifier Systems, Springer Berlin Heidelberg, Cagliari, Italy, 2000, pp. 1 -- 15.
[345] J. A. Arjona-Medina, M. Gillhofer, M. Widrich, T. Unterthiner, S. Hochreiter, RUDDER: Return Decomposi-
tion for Delayed Rewards.
URL http://arxiv.org/abs/1806.07857
[346] V. Conitzer, T. Sandholm, AWESOME: A general multiagent learning algorithm that converges in self-play
and learns a best response against stationary opponents, Machine Learning 67 (1-2) (2006) 23 -- 43.
[347] C. B. Browne, E. Powley, D. Whitehouse, S. M. Lucas, P. I. Cowling, P. Rohlfshagen, S. Tavener, D. Perez,
S. Samothrakis, S. Colton, A survey of Monte Carlo tree search methods, IEEE Transactions on Computational
Intelligence and AI in games 4 (1) (2012) 1 -- 43.
[348] T. Vodopivec, S. Samothrakis, B. Ster, On Monte Carlo tree search and reinforcement learning, Journal of
Artificial Intelligence Research 60 (2017) 881 -- 936.
[349] B. Kartal, J. Godoy, I. Karamouzas, S. J. Guy, Stochastic tree search with useful cycles for patrolling problems,
in: Robotics and Automation (ICRA), 2015 IEEE International Conference on, IEEE, 2015, pp. 1289 -- 1294.
[350] B. Kartal, E. Nunes, J. Godoy, M. Gini, Monte Carlo tree search with branch and bound for multi-robot task
allocation, in: The IJCAI-16 Workshop on Autonomous Mobile Service Robots, 2016.
[351] G. Best, O. M. Cliff, T. Patten, R. R. Mettu, R. Fitch, Dec-MCTS: Decentralized planning for multi-robot
active perception, The International Journal of Robotics Research 38 (2-3) (2019) 316 -- 337.
[352] Y.-M. De Hauwere, P. Vrancx, A. Nowe, Learning multi-agent state space representations, in: Proceedings of
the 9th International Conference on Autonomous Agents and Multiagent Systems, Toronto, Canada, 2010, pp.
715 -- 722.
[353] C. Guestrin, M. Lagoudakis, R. Parr, Coordinated reinforcement learning, in: ICML, Vol. 2, 2002, pp. 227 -- 234.
[354] C. Guestrin, D. Koller, R. Parr, S. Venkataraman, Efficient solution algorithms for factored MDPs, Journal of
Artificial Intelligence Research 19 (2003) 399 -- 468.
[355] C. Amato, F. A. Oliehoek, Scalable Planning and Learning for Multiagent POMDPs, in: AAAI, 2015, pp.
1995 -- 2002.
[356] F. A. Oliehoek, Interactive Learning and Decision Making - Foundations, Insights & Challenges., International
Joint Conference on Artificial Intelligence.
[357] F. A. Oliehoek, S. Whiteson, M. T. Spaan, Approximate solutions for factored Dec-POMDPs with many
48
agents, in: Proceedings of the 2013 international conference on Autonomous agents and multi-agent systems,
International Foundation for Autonomous Agents and Multiagent Systems, 2013, pp. 563 -- 570.
[358] R. Becker, S. Zilberstein, V. Lesser, C. V. Goldman, Solving transition independent decentralized Markov
decision processes, Journal of Artificial Intelligence Research 22 (2004) 423 -- 455.
[359] F. A. Oliehoek, S. J. Witwicki, L. P. Kaelbling, Influence-based abstraction for multiagent systems, in: Twenty-
Sixth AAAI Conference on Artificial Intelligence, 2012.
[360] M. Suau de Castro, E. Congeduti, R. A. Starre, A. Czechowski, F. A. Oliehoek, Influence-based abstraction in
deep reinforcement learning, in: Adaptive, Learning Agents workshop, 2019.
[361] E. Wei, D. Wicke, D. Freelan, S. Luke, Multiagent Soft Q-Learning.
URL http://arXiv.org/abs/1804.09817
[362] R. R. Torrado, P. Bontrager, J. Togelius, J. Liu, D. Perez-Liebana, Deep Reinforcement Learning for General
Video Game AI.
URL http://arxiv.org/abs/1806.02448
[363] P. A. Ortega, S. Legg, Modeling friends and foes.
URL http://arxiv.org/abs/1807.00196
[364] Y. Yang, R. Luo, M. Li, M. Zhou, W. Zhang, J. Wang, Mean field multi-agent reinforcement learning, in:
Proceedings of the 35th International Conference on Machine Learning, Stockholm Sweden, 2018.
[365] A. Grover, M. Al-Shedivat, J. K. Gupta, Y. Burda, H. Edwards, Learning Policy Representations in Multiagent
Systems., in: International Conference on Machine Learning, 2018.
[366] C. K. Ling, F. Fang, J. Z. Kolter, What game are we playing? end-to-end learning in normal and extensive
form games, in: Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018.
[367] S. Omidshafiei, D. Hennes, D. Morrill, R. Munos, J. Perolat, M. Lanctot, A. Gruslys, J.-B. Lespiau, K. Tuyls,
Neural Replicator Dynamics, arXiv e-prints (2019) arXiv:1906.00190arXiv:1906.00190.
[368] S. Khadka, S. Majumdar, K. Tumer, Evolutionary Reinforcement Learning for Sample-Efficient Multiagent
Coordination, arXiv e-prints (2019) arXiv:1906.07315arXiv:1906.07315.
49
|
1902.01642 | 1 | 1902 | 2019-02-05T11:15:55 | Agent-Based Simulation Modelling for Reflecting on Consequences of Digital Mental Health | [
"cs.MA",
"cs.CY"
] | The premise of this working paper is based around agent-based simulation models and how to go about creating them from given incomplete information. Agent-based simulations are stochastic simulations that revolve around groups of agents that each have their own characteristics and can make decisions. Such simulations can be used to emulate real life situations and to create hypothetical situations without the need for real-world testing prior. Here we describe the development of an agent-based simulation model for studying future digital mental health scenarios. An incomplete conceptual model has been used as the basis for this development. To define differences in responses to stimuli we employed fuzzy decision making logic. The model has been implemented but not been used for structured experimentation yet. This is planned as our next step. | cs.MA | cs | Agent-Based Simulation Modelling for Reflecting on
Consequences of Digital Mental Health
A working paper based on the 2018 Summer Internship Report by Daniel Stroud, who was
supervised by Peer-Olaf Siebers and Christian Wagner
Finalised by Peer-Olaf Siebers (University of Nottingham, School of Computer Science, Nottingham,
NG8 1BB, UK, [email protected])
Published on 05/02/2019
Abstract
The premise of this working paper is based around agent-based simulation models and how to go
about creating them from given incomplete information. Agent-based simulations are stochastic
simulations that revolve around groups of agents that each have their own characteristics and can
make decisions. Such simulations can be used to emulate real life situations and to create hypothetical
situations without the need for real-world testing prior. Here we describe the development of an
agent-based simulation model for studying future digital mental health scenarios. An incomplete
conceptual model has been used as the basis for this development. To define differences in responses
to stimuli we employed fuzzy decision making logic. The model has been implemented but not been
used for structured experimentation yet. This is planned as our next step.
Keywords
Digital Mental Health; Agent Based Modelling; Simulation; Fuzzy Logic Decision Making
1 Introduction
Agent-Based Simulation (ABS) is a powerful paradigm that can be used for conducting what-if analysis
of human centric systems (Siebers and Aickelin 2008). Agents are comparable to non-player characters
in games. In principle, ABS enables exploring the interaction of different groups of stakeholders, where
the latter are often people in a specific context, from land owners in conservation, to shoppers in
marketing.
A key challenge in ABS is the appropriate specification of agents in order for them to behave similarly
to humans. Commonly, so-called archetypes are established, which capture groups within a
population sharing similar behaviour (Zhang et al 2012). This project is designed to combine fuzzy set
theory with ABS in order to enable simulations where agents can be efficiently designed to replicate
core behavioural aspects of human stakeholders, thus providing a pathway for human-inspired ABS.
My internship was based on creating a simulation from an incomplete conceptual model that was
previously created by my supervisor Peer-Olaf Siebers and his colleagues Elvira Perez Vallejos and
Tommy Nilsson (Siebers et al unpublished) using the Engineering Agent Based Social Simulation
framework (or EABSS for short). The EABSS supports a structured way of co-creation by embedding
design philosophies and tools from Software Engineering and using these for driving its focus group
communications. The process is guided by a set of predefined table templates in combination with the
use of UML diagrams - a graphical notation used in Software Engineering to conduct system analysis
and design (Fowler 2004) - for capturing the thoughts of academic and non-academic participants.
1
I started by learning to use AnyLogic (XJTEK 2018) and by reading up on the subject of technology with
mental health. After this, I created a very simple simulation of a hospital scenario including doctors,
patient and robot doctors (the technology). This simulation gave me something that I could add to and
build upon using the conceptual model given to me by Peer. I continued adding to the conceptual
model and the simulation model until I had a detailed enough simulation that I could start catering it
towards the hypotheses defined in the conceptual model I was given. As well as this, I added a small
bit of fuzzy logic to the simulation to familiarize myself with the area before the second half of my
internship. The fuzzy logic was used as the decision making for doctors and robot doctors to decide
how long they should treat patients for, and was used for visitors to decide whether they should visit
or not. After catering towards the hypotheses I had a fully working simulation based off the conceptual
model given to me.
2 Proof-of-Principle Agent-Based Simulation Model
For the first half I created an ABS based on a conceptual model given to me by Peer Olaf Siebers that
was created in a focus group (Siebers et al, unpublished). In Agent-Based Modelling (ABM), a system
is modelled as a collection of autonomous decision-making entities called agents. Each agent
individually assesses its situation and makes decisions on the basis of a set of rules (Bonabeau 2002).
He wanted me to create a simple model that would visualize and give valuable outputs to the problems
posed in the conceptual model. Some scans of the original conceptual model are shown in Figure 1.
The conceptual model had the aim "reflect on consequences of digital mental health solutions" and
used the EABSS framework approach (Siebers and Klügl 2017) for driving the model development
process. The information within it allowed me to develop a simulation model and run some
experiments. My simulation was a hospital scenario with doctors, patients, visitors and robot doctors
(modelled as proactive machines). The idea of the hospital scenario was to have doctors and proactive
machines treating patients with occasional visits from visitors and then to track the mental state of
the patients. Depending on the different ratios of human doctors to proactive machines and how
much the patients communicated, their mental states would vary.
2
EABSS driven system analysis
EABSS driven initial model scope table
3
EABSS model scope table after iteration
Figure 1: Scans of parts of the original conceptual model that I worked off
The initial steps of the internship were to create a very simple hospital scenario that wasn't very
specific to certain hypotheses, this would allow me to add more detail later depending on which
hypotheses from the conceptual model I chose to focus on. My initial model included doctors,
proactive machines and patients. The doctors and proactive machines would both treat the patients
and there was no mental state for the patients at this point. They treated the patients based off a
linked list containing patients that needed a check-up or requested to be seen. For the implementation
I used the free version of AnyLogic PLE (XJTEK 2018). Figure 2 shows how the simulation looked like
during runtime at this point (stage 1).
Figure 2: Example screenshot, showing what the simulation looked like at stage 1
4
The next step after this was adding visitors and differences between the doctors and proactive
machines. I initially added visitors that would be created at a certain time every day and then after an
hour they would all be removed from the simulation. This method caused some problems due to the
50,000 agent limit on the free version of AnyLogic, so I had to create a certain number of visitors at
the start of the simulation and then have them visit and leave the hospital every day for the duration
of the simulation. In order to create differences between the doctors and proactive machines, firstly I
made them do slightly different jobs and secondly, I added a mental state (satisfaction) variable to the
patients so that they are more satisfied if they have been treated by a doctor than a proactive
machine. The colour behind each patient represents their mental state. Figure 3 shows how the
simulation looked like during runtime at this point (stage 2).
Figure 3: Example screenshot, showing what the simulation looked like at stage 2
3 Proof-of-Principle Fuzzy Logic Extension
At this point I had a simulation that was fully functional and allowed me to track the patients' mental
states over time, however I had not focussed on certain hypotheses from the original conceptual
model.
Before fully focussing on specific hypotheses I decided to create and add some fuzzy logic systems into
the simulation to give me a better idea of the area for the second half of the internship and because
some areas of the simulation required decision making that could be made using fuzzy logic systems.
Fuzzy logic is an approach to computing based on "degrees of truth" rather than the usual "true or
false" (1 or 0) Boolean logic on which the modern computer is based. The idea of fuzzy logic was first
advanced by Dr Lotfi Zadeh of the University of California at Berkeley in the 1960s (Rouse n.d.). I added
three FLSs overall and their purposes were to decide the amount of time doctors and proactive
machines should treat patients for and also to decide whether visitors should visit patients and if so,
how long for. I created these FLSs initially using JuzzyOnline (Wagner and Pierfitte n.d.) and then used
those to help write and implement the Java into the AnyLogic simulation model I created earlier.
Following are the fuzzy logic graphs showing the inputs, outputs and membership functions of the FLS'
for a doctor (Figure 4), a robot (Figure 5), and a visitor (Figure 6).
5
Figure 4: Inputs, outputs and membership functions of the FLS' for a doctor
Figure 5: Inputs, outputs and membership functions of the FLS' for a robot
6
Figure 6: Inputs, outputs and membership functions of the FLS' for a visitor
4 Applying EABSS for Model Re-Development and Documentation
After adding fuzzy logic into the simulation I decided to focus on 2 of the hypotheses posed by the
original conceptual model. The two hypotheses I focused on were 'Trust between machines and
humans will affect human-human relationships in a negative way' and 'Machine-look influences our
decisions'.
To aim the simulation towards the first hypothesis I had to add trust variables to each patient. These
variables changed over time depending on the treatment of robots or doctors on that patient. As well
as this I created a network between the patients so that a patient is connected to the patients in the
beds next to them and the beds next to those beds. If patients are connected in a network, then their
current trust can affect other patient's trust as if they are talking to each other and sharing opinions.
Then to be able to view the relationships/trust between patients they are connected with lines that
change colour depending on the patients' difference in trust values. If there is a large difference, then
the line is shown in red but if they have similar trust values then they are like each other and trust
each other so the line is shown in green. Anywhere in between is shown in yellow.
To tackle the second hypothesis, I created two different groups of robots, human-like robots and
robot-like robots. If a human-like robot treats a patient, then they are more satisfied and trust the
robot more than if is robot-like. From this I can track the trust and opinions of robots and see it spread
throughout the patients using the network explained before. As well as this I added two groups of
7
doctors, a senior group and a junior group. The senior doctors treat patients quicker than the junior
doctors meaning that they can treat more patients overall.
In the following I present the conceptual model for final version of hospital simulation using the EABSS
framework:
Title
Exploratory Study of Proactive Machines in a Hospital Scenario
Context
Proactive machines are an idea that in the future hospitals will have automated machines as well as
Doctors and Nurses that can help and treat patients. This project uses the idea of proactive machines
to test the impact of technology on mental state and opinions within patients. The project also
incorporates the use of fuzzy logic for some of the decision making.
Gathering Knowledge
All information for this project has been gathered from a conceptual model created by a focus group
lead by Peer-Olaf Siebers which had the aim of reflecting on the consequences of digital mental health
solutions considering the relationship between machines and humans.
Step 1: Defining Objectives
Aim and objectives
Reflect on the consequences of digital mental health solutions
Hypotheses
Trust between machines and humans will affect human-human relationships in a negative way
Machine-look influences our decisions
Experimental factors
Number of doctors, proactive machines and patients
Number of beds
Responses
Mental state of patients, e.g. happiness
Opinions of each patient on the doctors and robots
The trust of the patients on the robots
Step 2: Defining the Scope
Level of abstraction
For this model the high level scope decision was to only consider the treatment of patients by doctors
and proactive machines and to consider the visitors visiting patients. Any movement of agents or
geographical location were not considered as there is no need for this and it would add more
complexity which is not needed. I have chosen to use a hypothetical hospital setting to keep it realistic
without having the problems of gathering data which would be required if a real-world hospital was
used.
8
Scope table
The next step was to define the scope of the simulation model, considering which elements should be
included/excluded and stating why I have made this decision. The result can be found in Table 1.
Table 1: Scope table (part 1/2)
Table 1: Scope table (part 2/2)
9
Step 3: Defining Key Activities
For this stage, use case diagrams were made to show the specific use cases that each actor must do.
Figure 7 shows the use case diagram from the original conceptual model and includes a lot of actors
that are not in the final simulation. Figure 8 shows the use case diagram from the final simulation that
includes just the actors and use cases that are included in the final simulation.
Figure 7: Use case diagram of original conceptual model
Figure 8: Use case diagram of final simulation
Step 4: Defining Stereotypes
I decided to use a habit table approach to create the stereotypes. Stereotypes were only needed for
the doctors and robots because these were the only agents where stereotyping would have been
relevant to the hypotheses. Table 2 shows that a doctor can be one of two stereotypes, a senior or
junior. This difference in level means that the senior doctors treat patients quicker than the junior
doctors. Table 3 shows that robots can also be one of two stereotypes, they can either be more
humanlike in appearance or more robot-like. Whichever one they are, affects the patients opinions
on them when they are treated by them.
10
Table 2: Doctor stereotypes
Table 3: Robot stereotypes
Step 5: Defining Agent and Object Templates
Class diagram
Figure 9 shows a class diagram for the whole simulation. It shows each agent/class and what is
contained inside them as well as how each agent/class is connected to each other. The solid black
diamonds represent strong aggregation also known as composition.
11
Figure 9: Class diagram for final simulation
State machine diagrams
The figures below (Figure 10-14) show the state machine diagrams for each of the agents. Most agents
have very simple state machines with usually less than 3 main states. They are mostly self-explanatory
with names on each of the states that describe what they do. I have made use of three different types
of transitions which are timeout transitions, condition transitions and message transitions. Timeout
transitions trigger after a certain amount of time, condition transitions trigger when a condition is true
and message transitions trigger when a message is received.
Figure 10: Patient agent
Figure 11: Doctor agent
12
Figure 12: Robot agent
Figure 13: Visitor agent
Figure 14: Bed agent
Step 6: Defining Interactions
The figures below (Figure 15-17) show the most significant tasks and interactions of the simulation
represented in sequence diagrams. I haven't transferred all interactions into sequence diagrams
because there would be too many and it is not important to represent every interaction with a
sequence diagram.
13
Figure 15: Patient getting treated by robot
Figure 16: Patient getting treated by doctor
Figure 17: Visitor visits patient
5 The Final Version of the Hospital Simulation Model
Once the conceptual model was completed I have updated the simulation model to reflect all design
features. Figure 18 shows a screenshot of the final hospital simulation model while running. The
benefit of this final model in comparison to the previous versions created along the way is that this
version is catered towards two of the hypotheses on the original conceptual model so, these being
"Trust between machines and humans will affect human-human relationships in a negative way" and
14
"Machine-look influences our decisions (trust)". This means that we can see valuable outputs that are
related to the original ideas of the conceptual model e.g. the lines connecting each patient to other
patients show how their trust values differ, if the line is red it means that those two patients' trust
values differ a lot meaning their relationship is not good but if it is green it means their relationship is
good. These colours are affected depending on lots of different aspects in this model that were not
included in the previous, simpler models.
Figure 18: Screenshot of the final version of the simulation in progress
6 Conclusions
During my internship I finalised the conceptualisation of a simulation model, based on incomplete
information previously gathered by Peer-Olaf Siebers and his colleagues, for exploratory studies of the
impact of proactive machines in a hospital scenario. I have then implemented the simulation model,
and documented my implementation using the EABSS framework.
The next step will be a more in-depth validation of the model. In particular we need to establish face
validity by showing it to the people who provided us with the incomplete conceptual model. Once this
has been done and the colleagues are happy with our interpretation of the information provided, we
would need to run some experiments to test the hypotheses define in the conceptual model.
NB: The final version of the hospital simulation model is available upon request. Please get in touch
with Peer-Olaf Siebers ([email protected]).
Acknowledgement
The internship this working paper is based upon was run jointly by Peer-Olaf Siebers and Christian
Wagner. The original (incomplete) conceptual model this work is based upon was donated by Peer-
Olaf Siebers, Tommy Nilsson, and Elvira Perez Vallejos. Many thanks to all supporters!
15
References
Bonabeau E (2002) Agent-based modeling: Methods and techniques for simulating human systems.
Proceedings of the National Academy of Sciences, 99(suppl 3), pp. 7280-7287.
Fowler M (2004) UML Distilled: A Brief Guide to the Standard Object Modeling Language. Addison-
Wesley Professional
Rouse M (n.d.) Definition of fuzzy logic. https://searchenterpriseai.techtarget.com/definition/fuzzy-
logic (last accessed 30/08/2018)
Siebers PO, Perez Vallejos E, and Nilsson T (unpublished) Conceptual model draft "Reflecting on
consequences of digital mental health solutions"
Siebers PO and Aickelin U (2008) Introduction to multi-agent simulation. In: Adam F and Humphreys
P (Eds). Encyclopaedia of Decision Making and Decision Support Technologies, Pennsylvania:
Idea Group Publishing, pp. 554-564.
Siebers PO and Klügl F (2017) What software engineering has to offer to agent-based social
simulation. In: Edmonds B and Meyer R (eds.) 'Simulating Social Complexity: A Handbook' - 2e,
pp. 81-117. New York: Springer.
Wagner C and Pierfitte M (n.d.) JuzzyOnline.
https://ieeexplore.ieee.org/abstract/document/6891548/ (last accessed 30/08/2018)
XJTEK (2018) AnyLogic software. https://www.anylogic.com/ (last accessed 30/08/2018)
Zhang T, Siebers PO and Aickelin U (2012) A Three-Dimensional Model of Residential Energy
Consumer Archetypes for Local Energy Policy Design in the UK. Energy Policy, pp. 102-110.
16
|
0809.0009 | 2 | 0809 | 2012-05-18T14:36:33 | Distributed Parameter Estimation in Sensor Networks: Nonlinear Observation Models and Imperfect Communication | [
"cs.MA",
"cs.IT",
"cs.IT"
] | The paper studies distributed static parameter (vector) estimation in sensor networks with nonlinear observation models and noisy inter-sensor communication. It introduces \emph{separably estimable} observation models that generalize the observability condition in linear centralized estimation to nonlinear distributed estimation. It studies two distributed estimation algorithms in separably estimable models, the $\mathcal{NU}$ (with its linear counterpart $\mathcal{LU}$) and the $\mathcal{NLU}$. Their update rule combines a \emph{consensus} step (where each sensor updates the state by weight averaging it with its neighbors' states) and an \emph{innovation} step (where each sensor processes its local current observation.) This makes the three algorithms of the \textit{consensus + innovations} type, very different from traditional consensus. The paper proves consistency (all sensors reach consensus almost surely and converge to the true parameter value,) efficiency, and asymptotic unbiasedness. For $\mathcal{LU}$ and $\mathcal{NU}$, it proves asymptotic normality and provides convergence rate guarantees. The three algorithms are characterized by appropriately chosen decaying weight sequences. Algorithms $\mathcal{LU}$ and $\mathcal{NU}$ are analyzed in the framework of stochastic approximation theory; algorithm $\mathcal{NLU}$ exhibits mixed time-scale behavior and biased perturbations, and its analysis requires a different approach that is developed in the paper. | cs.MA | cs | IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 6, JUNE 2012
1
Distributed Parameter Estimation in Sensor
Networks: Nonlinear Observation Models and
Imperfect Communication
Soummya Kar, Jos´e M. F. Moura and Kavita Ramanan
Abstract
The paper studies distributed static parameter (vector) estimation in sensor networks with nonlinear observation
models and noisy inter-sensor communication. It introduces separably estimable observation models that generalize
the observability condition in linear centralized estimation to nonlinear distributed estimation. It studies two distributed
estimation algorithms in separably estimable models, the NU (with its linear counterpart LU) and the NLU. Their
update rule combines a consensus step (where each sensor updates the state by weight averaging it with its neighbors'
states) and an innovation step (where each sensor processes its local current observation.) This makes the three
algorithms of the consensus + innovations type, very different from traditional consensus. The paper proves consistency
(all sensors reach consensus almost surely and converge to the true parameter value,) efficiency, and asymptotic
unbiasedness. For LU and NU, it proves asymptotic normality and provides convergence rate guarantees. The three
algorithms are characterized by appropriately chosen decaying weight sequences. Algorithms LU and NU are analyzed
in the framework of stochastic approximation theory; algorithm NLU exhibits mixed time-scale behavior and biased
perturbations, and its analysis requires a different approach that is developed in the paper.
Keywords: Asymptotic normality, consensus, consensus + innovations, consistency, distributed parameter estimation,
Laplacian, separable estimable, spectral graph theory, stochastic approximation, unbiasedness.
A. Background and Motivation
I. INTRODUCTION
The paper studies distributed inference, in particular, distributed estimation, as consensus+innovations algorithms
that generalize distributed consensus by combining, at each time step, cooperation among agents (consensus) with
assimilation of their observations (innovations). Our consensus + innovations algorithms contrast with: i) standard
consensus, see the extensive literature, e.g., [1], [2], [3], [4], [5], [6], [7], [8], [9], [10], [11], [12], [13], [14],
where in each time step only local averaging of the neighbors' states occurs, and no observations are processed;
and ii) distributed estimation algorithms, see recent literature,e.g., [15], [16], [17], [18], [19], where between
measurement updates a large number of consensus steps (theoretically, an infinite number of steps) is taken.
Combined consensus+innovations algorithms are natural when a distributed network estimates a spatially varying
random field defined at M spatial locations, say, for simplicity, a temperature field. The goal is to reconstruct at
each and every sensor an accurate image of the entire spatial distribution of the M-dimensional field, assuming
that at each time step each sensor makes a noisy measurement of the temperature at its single location. Without
cooperation (no consensus step,) the processing of the successive temperature readings at each sensor (successive
innovation steps) leads to a reliable estimate of the temperature at the sensor location -- but provides no clue about the
temperature distribution at the other M − 1 locations. On the other hand, if sensors cooperate (consensus iterates,)
but only process the initial measurement, as in traditional consensus, they converge to the average temperature across
2
1
0
2
y
a
M
8
1
]
A
M
.
s
c
[
2
v
9
0
0
0
.
9
0
8
0
:
v
i
X
r
a
Manuscript received August 29, 2008; revised February 05, 2011; accepted November 15, 2011. The work of Soummya Kar and Jos´e
M. F. Moura was supported by NSF under grants CCF-1011903 and CCF-1018509, and by AFOSR grant FA95501010291. The work of Kavita
Ramanan was supported by the NSF under grants DMS 0405343 and CMMI 0728064.
Soummya Kar and Jos´e M. F. Moura are with the Department of Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh,
PA, USA 15213 (e-mail: [email protected], [email protected], ph: (412) 268-6341, fax: (412) 268-3890.)
Kavita Ramanan is with the Division of Applied Mathematics, Brown University, Providence, RI 02912 (e-mail: Kavita [email protected].)
Communicated by M. Lops, Associate Editor for Detection and Estimation.
Digital Object Identifier 10.1109/TIT.2012.219450
c(cid:13)2012 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or
future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale
or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 6, JUNE 2012
2
the field, not to an estimate of the M-dimensional temperature distribution. The distributed consensus+innovations
algorithms that we introduce achieve both; each sensor converges to an estimate of the entire M-dimensional field
by combining consensus and processing of the sensors measurements. Subsequent to this paper, analysis of detection
consensus+innovations type algorithms is, e.g., in [20], [21].
Important questions that arise with consensus+innovations algorithms include: i) convergence: do the algorithms
converge and if so in what sense; ii) consensus: do the agents reach a consensus on their field estimates; iii) dis-
tributed versus centralized: how good is the distributed field estimate at each sensor when compared with the
centralized estimate obtained by a fusion center, in other words are the distributed estimate sequences consistent,
and asymptotically unbiased, efficient, or normal; and iv) rate of convergence: what is the rate at which the distributed
estimators converge. These questions are very distinct from the convergence issues considered in the "consensus
only" literature.
We present three distributed consensus+innovations inference algorithms: LU for linear observation models (as
when each sensor makes a noisy reading of the temperature at its location, see Section II-E;) and two algorithms,
NU and NLU, for nonlinear observation models (like in power grids when each sensor measures a phase differential
through a sinusoidal modulation, see Section IV-D.) The paper introduces the conditions on the sensor observations
model (separable estimability that we define) and on the communication network (connectedness on average) for
the distributed estimates to converge. The separable estimability, akin to global observability, and connectedness, is
an intuitively pleasing condition and in a sense minimal -- distributed estimation cannot do better than (the optimal)
centralized estimator, hence, the model better be (globally) observable (but not necessarily locally observable;) and
if the sensors need to cooperate to assimilate the data collected by the distributed network, the network should be
connected (on average,) or the sensors will work in isolation.
In contrast with other settings, e.g., linear distributed least-mean-square (LMS) approaches to parameter esti-
mation, e.g, [22], [23], [24], [25], we study distributed estimation in the usual framework of linear or nonlinear
observations of a (vector) parameter in noise1, when the dimension, Mn, of the observation at each sensor n
is Mn (cid:28) M, and the parameter estimation model is locally unobservable, i.e., each individual sensor cannot
recover the entire M-dimensional parameter from its Mn-dimensional observation, even if noiseless. Through
cooperation (consensus) a (local) sensor estimator may converge to an estimate of the entire M-dimensional field,
by simultaneously combining at each time i, its estimate, its observation (innovation), and the estimates received
from the sensors with which it communicates. We show in the paper conditions under which this holds.
We extend this distributed estimation model to include sensor and link or communication channel failures, random
communication protocols, and quantized communication. These conditions make the problem more realistic when
a large number of agents are involved since inexpensive sensors are bounded to fail at random times, packet loss
in wireless digital communications cause links to fail intermittently, agents can communicate asynchronously via a
random protocol like gossip or one of its variants, and the agents may be resource constrained and have a limited
bit budget for communication. We make no distributional assumptions on the sensors and link failures, they can
be spatially correlated, [28], but are temporally uncorrelated2. We show that, under these broad conditions, the
three distributed estimation algorithms, LU, NU, and NLU, are consistent if the observation model is separable
estimable (see Section III-A) and the network is connected on average.
Algorithms LU, NU, and NLU: LU applies when the noisy observations are linear on the parameter. For the
linear model, the separably estimable condition reduces to a rank condition on the global observability Grammian.
LU combines at each time iteration the consensus term with the innovations associated with the new observation.
Note that, in this algorithm, as well as with the other two nonlinear algorithms, the dimension of the local observation
for sensor n, Mn, is much smaller than the dimension M of the field, i.e., Mn (cid:28) M. The algorithm NU generalizes
LU to nonlinear separably estimable models. It is very important to note that, in both algorithms, LU and NU, the
same asymptotically decaying to zero time-varying weight sequence is associated with the consensus and innovation
updates; in other words, both the consensus and innovation terms of the algorithm exhibit the same decay rate.
Because of this, it is enough to resort to stochastic approximation techniques to prove consistency, asymptotic
unbiasedness, and asymptotic normality for both algorithms, LU and NU. For a treatment of general distributed
stochastic algorithms see [29], [30], [31], [32]. Beyond consistency, we characterize explicitly for the LU algorithm
1In this paper, we restrict attention to static parameter (fields). Time-varying parameters/signals are considered elsewhere, see, for example,
[26],[27] for estimation/filtering of fading (non-stationary) parameters and general time-varying linear dynamical systems, respectively.
2This dynamic network is more general and subsumes the erasure network model, where the link failures are independent over space and
time.
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 6, JUNE 2012
3
the asymptotic variance and compare it with the asymptotic variance of the centralized optimal scheme. For the
NU algorithm, and general models, it is difficult to find explicitly a Lyapounov function (as needed by stochastic
approximation). However, with weaker assumptions on the nonlinear observation model (Lipschitz continuity and
certain growth properties,) we guarantee the existence of a Lyapounov function; hence, demonstrate asymptotic
normality of the NU estimates, see Theorems 18 and 19 in Section III-C. These conditions are much easier to
verify than guessing the form of a Lyapounov function. Also, in the proof of Theorem 18, we actually show how to
use these conditions to determine a Lyapounov function explicitly, which can then be used to analyze convergence
rates.
The third algorithm, NLU, applies when the observation models are only continuous and not Lipschitz continuous.
NLU is however a mixed time-scale algorithm, where the consensus time-scale dominates the innovations time-
scale, and consists of unbiased perturbations (detailed explanation is provided in the paper.) Because of this mixed
time-scales, the NLU algorithm does not fall under the purview of standard stochastic approximation theory, and
to show its consistency requires an altogether different framework as developed in the paper, see Theorems 21
and 22, in Section IV.
The two algorithms NLU and NU represent different tradeoffs. We show consistency for NLU under weaker
assumptions (observation model continuity) than for NU (Lipschitz continuity plus growth conditions.) On the
other hand, when these more stringent conditions hold, NU provides convergence rate guarantees and asymptotic
normality; these follow from standard stochastic approximation theory that apply to NU but not to NLU.
Brief comment on the literature. We contrast our work with relevant recent literature on distributed estimation.
Papers [15], [17], [33], [18] study estimation in static networks, where either the sensors take a single snapshot of
the field at the start and then initiate distributed consensus protocols (or more generally distributed optimization,
as in [17]) to fuse the initial estimates, or the observation rate of the sensors is assumed to be much slower
than the inter-sensor communicate rate, thus permitting a separation of the two time-scales. On the contrary, our
consensus+innovations algorithm combines fusion (consensus) and observation (innovation) updates in the same
iteration. The network is dynamic with channel failures, the protocols are random, and the sensors fail. Unlike [15],
[17], [33], [18], our approach does not require distributional assumptions on the observation noise, and we make
explicit the structural assumptions on the observation model (separable estimability) and network connectivity
needed to guarantee consistent parameter estimates at every sensor. These structural assumptions are quite weak
and are necessary for centralized estimators to obtain consistency.
There is considerable work in linear distributed least-mean-square (LMS) approaches to parameter estimation in
static networks, e.g., [22], [23], [24], [25]. While LMS is also a consensus+innovation type algorithm, we show
how our linear algorithm LU and LMS are quite distinct, with a very different setup and goal. In LMS, for example,
for channel estimation or channel equalization, [34], in adaptive filtering, [35], or in system identification, see [36],
the observations zn(i) are the output of a noisy finite impulse response channel (or a linear system to be identified)
excited by a random input sequence u(i) (these random input sequences are the regressors.) The unknown channel
impulse response θ is to be estimated by a stochastic gradient type algorithm that has available (in the channel
estimation or training phase) both the random inputs and the regressors. In contrast, in the distributed estimation
problem we study, for example, for the LU, the observations at sensor n and time i are
For example, in (1), the observation matrices Hn(i) could be of the form,
zn(i) = Hn(i)θ∗ + ζn(i)
Hn(i) =
1
p
δn(i)H n
(1)
(2)
where δn(i) is a zero-one Bernoulli variable to account for sensor failures, p > 0 denotes the sensing probability,
and the mean value H n models the normal operation of the sensor, e.g., measuring the local temperature, or
an average of local temperatures. Equation (1) is the usual model in parameter estimation or waveform filtering,
while (2) extends this model in a significant way to random intermittent measurements. In our distributed estimation
algorithms, we do not know the random observation matrix Hn(i) (only its first and second moment), while in the
LMS where they play the role of the regressors, they are usually known to the LMS algorithm.
We contrast further our linear distributed LU with linear distributed LMS. References [22], [24], [25] use non-
decaying combining weights that lead to a residual tracking error; under appropriate assumptions, these algorithms
can be adapted to certain time-varying tracking scenarios; we consider time varying processes in other work, [26],
[27]. Reference [23] considers decaying weight sequences as we do in LU, thereby establishing also L2 convergence
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 6, JUNE 2012
4
to the desired parameter value. All these works deal with distributed linear problems, while our work emphasizes
distributed estimators for linear and nonlinear sensor observation models and establishes their convergence properties.
We present the necessary (minimal) structural conditions that the distributed sensing model (given) and the inter-
sensor communication network should satisfy to guarantee the existence of successful distributed estimators. Also,
apart from treating generic separably estimable nonlinear observation models, in the linear case, our algorithms NU
and LU lead to asymptotic normality in addition to consistency and asymptotic unbiasedness in random time-varying
networks with quantized inter-sensor communication and sensor failures.
Remark. We noted that the NLU algorithm is mixed time scale; this means a stochastic algorithm where two
potentials act in the same update step with different weight or gain sequences. This should not be confused with
(centralized) stochastic algorithms with coupling (see [37]), where a quickly switching parameter influences the
relatively slower dynamics of another state, leading to averaged dynamics. We note further in this context that [38]
(and references therein) develops methods to analyze mixed time scale (centralized) algorithms in the context of
simulated annealing. In [38], the role of our innovation (new observation) potential is played by a martingale
difference term. However, in our study, the innovation is not a martingale difference process, and a key step in the
analysis is to derive pathwise strong approximation results to characterize the rate at which the innovation process
converges to a martingale difference process.
We briefly comment on the organization of the remaining of the paper. The rest of this section introduces notation
and preliminaries to be adopted throughout the paper. To motivate the generic nonlinear problem, we study the linear
case (algorithm LU) in Section II. Section III studies the generic separably estimable models and the algorithm
NU, whereas algorithm NLU is presented in Section IV. Finally, Section V concludes the paper.
B. Notation
(cid:16)
(cid:17)
k 1k1T
√
1/
k
and dithered quantization to be used in the sequel.
For completeness, this subsection sets notation and presents preliminaries on algebraic graph theory, matrices,
Preliminaries: We adopt the following notation. Rk: the k-dimensional Euclidean space; Ik: k×k identity matrix;
k : the rank one k × k projector, whose
1k, 0k: column vector of ones and zeros in Rk, respectively; Pk = 1
1k; (cid:107)·(cid:107): the standard
only non-zero eigenvalue is one, and the corresponding normalized eigenvector is
Euclidean 2-norm when applied to a vector and the induced 2-norm when applied to matrices, which is equivalent
to the matrix spectral radius for symmetric matrices; θ ∈ U ⊂ RM : the parameter to be estimated; θ∗: the true (but
unknown) value of the parameter θ; xn(i) ∈ RM : the estimate of θ∗ at time i at sensor n -- without loss of generality
(wlog), the initial estimate, xn(0), at time 0 at sensor n is a non-random quantity; (Ω,F): common measurable
space where all the random objects are defined; Pθ∗ [·] and Eθ∗ [·]: the probability and expectation operators when
the true (but unknown) parameter value is θ∗ -- when the context is clear, we abuse notation by dropping the subscript.
All inequalities involving random variables are to be interpreted a.s. (almost surely.)
Spectral graph theory: For the undirected graph G = (V, E), V = [1··· N ] is the set of nodes or vertices,
V = N, and E is the set of edges. The unordered pair (n, l) ∈ E if there exists an edge between nodes n and l.
The graph G is simple if devoid of self-loops and multiple edges and connected if there exists a path3 between each
pair of nodes. The neighborhood of node n is Ωn = {l ∈ V (n, l) ∈ E}. The degree dn = Ωn of node n is the
number of edges with n as one end point, and D = diag (d1 ··· dN ) is the degree matrix, the diagonal matrix with
diagonal entries the degrees dn. The structure of the graph can be described by the symmetric N × N adjacency
matrix, A = [Anl], Anl = 1, if (n, l) ∈ E, Anl = 0, otherwise. The graph Laplacian matrix, L, is L = D − A;
it is a a positive semidefinite matrix whose eigenvalues can be ordered as 0 = λ1(L) ≤ λ2(L) ≤ ··· ≤ λN (L).
1N being the corresponding normalized eigenvector. The
The smallest eigenvalue λ1(l) is zero, with
multiplicity of the zero eigenvalue equals the number of connected components of the network; for a connected
graph, λ2(L) > 0. This second eigenvalue is the algebraic connectivity or the Fiedler value of the network; see
[39], [40], [41] for detailed treatment of graphs and their spectral theory.
Kronecker product: Since we are dealing with vector parameters, most of the matrix manipulations will involve
Kronecker products. For example, the Kronecker product of the N ×N matrix L and IM will be an N M ×N M ma-
trix, denoted by L⊗IM . We will deal often with matrices of the form C = [INM − bL ⊗ IM − aINM − PN ⊗ IM ].
It follows from the properties of Kronecker products and of the matrices L and PN that the eigenvalues of the
matrix C are −a and 1 − bλi(L) − a, 2 ≤ i ≤ N, each being repeated M times.
√
1/
(cid:16)
(cid:17)
N
3A path between nodes n and l of length m is a sequence (n = i0, i1, · · · , im = l) of vertices, such that (ik, ik+1) ∈ E ∀ 0 ≤ k ≤ m− 1.
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 6, JUNE 2012
5
[k1∆,··· , kM ∆]T(cid:12)(cid:12)(cid:12) ki ∈ Z, ∀i
(cid:111)
(cid:110)
We now review results from statistical quantization theory.
Dithered quantization: We assume that all sensors are equipped with identical uniform, dithered quantizers
q(·) : RM → QM applied componentwise, with countable alphabet QM =
. We
assume the dither satisfies the Schuchman conditions (see [42], [43], [44], [45],) so that the error sequence for
subtractively dithered systems ([43]) {ε(i)}i≥0
(3)
is an i.i.d. sequence of uniformly distributed random variables on [−∆/2, ∆/2), which is independent of the
input sequence {y(i)}i≥0. In (3), the dither sequence {ν(i)}i≥0 is i.i.d. uniformly distributed random variables on
[−∆/2, ∆/2), independent of the input sequence {y(i)}i≥0; we refer to [46] where we use this model and make
Consistency and asymptotic unbiasedness: We recall standard definitions from sequential estimation theory
ε(i) = q(y(i) + ν(i)) − (y(i) + ν(i))
further relevant comments.
(see, for example, [47]).
Definition 1 (Consistency) : A sequence of estimates {x•(i)}i≥0 is called consistent if
(cid:104)
Pθ∗
lim
i→∞
(cid:105)
x•(i) = θ∗
= 1, ∀θ∗ ∈ U
or, in other words, if the estimate sequence converges a.s. to the true parameter value. The above definition of
consistency is also called strong consistency. When the convergence is in probability, we get weak consistency. In
this paper, we use the term consistency to mean strong consistency, which implies weak consistency.
Definition 2 (Asymptotic Unbiasedness) :
A sequence of estimates {x•(i)}i≥0 is called asymptotically unbiased if
Eθ∗ [x•(i)] = θ∗, ∀θ∗ ∈ U
lim
i→∞
II. DISTRIBUTED LINEAR PARAMETER ESTIMATION: ALGORITHM LU
In this section, we consider the algorithm LU for distributed parameter estimation when the observation model
is linear. This problem motivates the generic separably estimable nonlinear observation models considered in
Sections III and IV. Section II-A sets up the distributed linear estimation problem and presents the algorithm LU.
Section II-B establishes the consistency and asymptotic unbiasedness of the LU algorithm, where we show that,
under the LU algorithm, all sensors converge a.s. to the true parameter value, θ∗. Convergence rate analysis
(asymptotic normality) is carried out in Section II-C, while Section II-E illustrates LU with an example.
A. Problem Formulation: Algorithm LU
Let θ∗ ∈ RM be an M-dimensional parameter to be estimated by a network of N sensors. Sensor n makes the
observations:
zn(i) = Hn(i)θ∗ + ζn(i) ∈ RMn
(6)
Each sensor observes only a subset of Mn of the components of θ∗, or Mn linear combinations of a few components
of θ∗, with Mn (cid:28) M. We make the following assumptions.
(A.1)Observation Noise: The observation noise process,
with finite second moment. In particular, the observation noise covariance is bounded and independent of i
1 (i),··· , ζ T
is i.i.d. zero mean,
i≥0
(cid:110)
ζ(i) =(cid:2)ζ T
E(cid:2)ζ(i)ζ T (j)(cid:3) = Sζδij, ∀i, j ≥ 0
N (i)(cid:3)T(cid:111)
(7)
where the Kronecker symbol δij = 1 if i = j and zero otherwise. Note that the observation noises at different
sensors may be correlated during a particular iteration. Eqn. (7) states only temporal independence. The spatial
correlation of the observation noise makes our model applicable to practical sensor network problems, for instance,
for distributed target localization, where the observation noise is generally correlated across sensors.
(cid:2)H 1,··· , H N
(A.2)Sensor Failures: The observation matrices, {[H1(i),··· , HN (i)]}i≥0, form an i.i.d. sequence with mean
(cid:3) and finite second moment. In particular, we have
Hn(i) = H n + (cid:101)Hn(i), ∀i, n
(4)
(5)
(8)
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 6, JUNE 2012
6
(cid:110)(cid:104)(cid:101)H1(i),··· , (cid:101)HN (i)
(cid:105)(cid:111)
where, H n = E [Hn(i)] , ∀i, n and the sequence
is zero mean i.i.d. with finite second
moment. Here, also, we require only temporal independence of the observation matrices, but allow them to be
spatially correlated. For example, Hn(i) = δn(i)H n, with δn(i) an iid sequence of Bernoulli variables modeling
intermittent sensor failures.
Remark 3 The LU update does not use the instantaneous observation matrices, Hn(i), only their ensemble
averages. This is a distinction between LU and LMS. LMS (for example, in adaptive filtering) assumes the
random matrices Hn(i) are, together with the observations, also available (see Chapter 4 of [48]). In parameter
estimation, the Hn(i) model sensor failures and LU has no control over their instantiations. Hence, while in LMS
it may be reasonable to use the instantaneous values of the random regressors Hn(i), in the setting we consider,
the instantaneous realizations of the observation matrices are not available.
i≥0
L(i) = L +(cid:101)L(i), ∀i ≥ 0
(A.3)Mean Connectedness, Link Failures, and Random Protocols: The graph Laplacians
(9)
are a sequence of i.i.d. matrices with mean L = E [L(i)]. We make no distributional assumptions on the {L(i)}.
Although independent at different times, during the same iteration, the link failures can be spatially dependent,
i.e., correlated. This is more general and subsumes the erasure network model, where the link failures are
independent over space and time. Wireless sensor networks motivate this model since interference among the
wireless communication channels correlates the link failures over space, while, over time, it is still reasonable to
assume that the channels are memoryless or independent. Connectedness of the graph is an important issue. The
random instantiations G(i) of the graph need not be connected; in fact, all these instantiations may be disconnected.
We only require the graph to be connected on average. This is captured by requiring that λ2
to capture a broad class of asynchronous communication models; for example, the random asynchronous gossip
protocol analyzed in [49] satisfies λ2
(A.4) Independence: The sequences {L(i)}i≥0, {ζn(i)}1≤n≤N, i≥0, {Hn(i)}1≤n≤N,i≥0, {νm
nl(i)} are mutually
independent.
We introduce the distributed observability condition required for convergence of the LU linear estimation algorithm.
(cid:0)L(cid:1) > 0 and hence falls under this framework.
(cid:0)L(cid:1) > 0, enabling us
Definition 4 (Distributed observability) The observation system (6) is distributedly observable if the matrix G is
full rank
G =
T
n H n
H
(10)
N(cid:88)
n=1
This distributed observability extends the observability condition for a centralized estimator that is needed to get
a consistent estimate of the parameter θ∗. We note that the information available to the n-th sensor at any time i
about the corresponding observation matrix is just the mean H n, and not the random Hn(i). Hence, the state
update equation uses only the H n's, as given in (11) below.
(A.5) Observability: The distributed observation system (6) is distributedly observable in the sense of definition 4.
Algorithm LU: We consider now the algorithm LU for distributed parameter estimation in the linear observation
model (6). Starting from some initial deterministic estimate of the parameters4, xn(0) ∈ RM , each sensor n
generates a sequence of estimates, {xn(i)}i≥0 by the following distributed iterative algorithm:
xn(i + 1) = xn(i) − α(i)
(xn(i) − q (xl(i)
(11)
b
(cid:88)
(cid:0)zn(i) − H nxn(i)(cid:1)
l∈Ωn(i)
+νnl(i))) − H
T
n
4The initial states may be random, we assume deterministic for notational simplicity.
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 6, JUNE 2012
7
where {q(xl(i) + νnl(i))}l∈Ωn(i) is the dithered quantized exchanged data. In (11), the sequence of weights {α(i)}
satisfies the persistence condition B5 given in the Appendix A; b > 0 is a constant and {α(i)}i≥0 is a sequence
of weights with properties to be defined below. The algorithm (11) is distributed because for sensor n it involves
only the data from the sensors in its neighborhood Ωn(i). Using (3), the state update can be written as
We rewrite (12) in compact form. Define the random vectors, Υ(i) and Ψ(i) ∈ RNM with vector components
It follows from the Schuchman conditions on the dither, see Section I-B and [46], that
b
(cid:88)
εnl(i)
(xn(i) − xl(i))
T
n
− H
l∈Ωn(i)
l∈Ωn(i)
l∈Ωn(i)
xn(i + 1) = xn(i) − α(i)
Υn(i) = − (cid:88)
(cid:0)zn(i) − H nxn(i)(cid:1) − bνnl(i) − bεnl(i)
νnl(i) and Ψn(i) = − (cid:88)
E(cid:104)(cid:107)Ψ(i)(cid:107)2(cid:105)
≤ N (N − 1)M ∆2
E(cid:104)(cid:107)Υ(i)(cid:107)2(cid:105)
E(cid:104)(cid:107)Ψ(i)(cid:107)2(cid:105) ≤ N (N − 1)M ∆2
N (i)(cid:3)T and define the matrices
(cid:104)
E(cid:104)(cid:107)Υ(i) + Ψ(i)(cid:107)2(cid:105) ≤ 2 sup
E(cid:104)(cid:107)Υ(i)(cid:107)2(cid:105)
E [Υ(i)] = E [Ψ(i)] = 0, ∀i
+ 2 sup
= sup
(cid:105)
sup
i
sup
i
12
3
i
i
i
+
= ηq
(cid:105)
T
N H N
DH = diag
DH = DH D
T
N
(cid:104)
H
H
T
1 ··· H
T
H = diag
(cid:104)
T
1 H 1 ··· H
(cid:17)
T
H
z(i) − D
b(L(i) ⊗ IM )x(i)D
(cid:16)
(Υ(i) + Ψ(i)) (Υ(i) + Ψ(i))T(cid:105)
T
H x(i)
+ bΥ(i) + bΨ(i)
(cid:105)
−DH
Sq = E(cid:104)
(cid:16)
Then, the compact vector form of the LU algorithm is
x(i + 1) = x(i) − α(i)
In the LU algorithm (19), the covariance matrix of the noise is defined as
(12)
(13)
(14)
(15)
(16)
(17)
(18)
(19)
(20)
(21)
from which we then have
x(i) =(cid:2)xT
1 (i)··· xT
The iterations in (11) can be written in compact form. Stack all sensors state estimates in a long state vector estimate
Markov: We characterize the state vector estimate x(i). Consider the filtration, {F x
From (A1) -- (A4), L(i), z(i), Υ(i), Ψ(i) are independent of F x
B. Consistency of LU
F x
i = σ
x(0),{L(j), z(j), Υ(j), Ψ(j)}0≤j<i
i ; so, {x(i),F x
We consider consistency and asymptotic unbiasedness.
Lemma 5 Consider LU under Assumptions (A.1)-(A.5). Then,(cid:2)bL ⊗ IM + DH
i }i≥0, given by
(cid:17)
i }i≥0 is a Markov process.
(cid:3) is symmetric positive definite.
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 6, JUNE 2012
8
Proof: Symmetricity is obvious. It also follows from the properties of Laplacian matrices and the structure
of DH that these matrices are positive semidefinite. Then the matrix (cid:2)bL ⊗ IM + DH
the matrix(cid:2)bL ⊗ IM + DH
(cid:3) is not positive definite. Then, there exists, x ∈ RNM , such that x (cid:54)= 0 and
being the sum of two positive semidefinite matrices. To prove positive definiteness, assume, on the contrary, that
(cid:3) is positive semidefinite,
xT(cid:2)bL ⊗ IM + DH
xT(cid:2)L ⊗ IM
(cid:3) x = 0
(cid:3) x = 0, xT DH x = 0
From the positive semidefiniteness of L ⊗ IM and DH, and the fact that b > 0, it follows
Partition x as x =(cid:2)xT
1 ··· xT
N
(cid:3)T
the fact that λ2(L) > 0, that (23) holds iff
where a ∈ RM , and a (cid:54)= 0. Also, (23) implies
N(cid:88)
n=1
Let G be as in (10). Equations (25) and (24) imply
(23)
, xn ∈ RM ,∀1 ≤ n ≤ N. It follows from the properties of Laplacian matrices and
xn = a, ∀n
xT
n H
T
n H nxn = 0
(24)
(25)
a contradiction, since G > 0 by Assumption (A.5) and a (cid:54)= 0. Thus,(cid:2)bL ⊗ IM + DH
Theorem 6 (LU: Asymptotic unbiasedness) Let the LU algorithm under (A.1)-(A.5). Then, {xn(i)}i≥0, at sensor n
(cid:3) > 0.
aT Ga = 0,
(26)
is asymptotically unbiased
(22)
(27)
(28)
(29)
(30)
Proof: Taking expectations on both sides of (19) and by the independence assumption (A.4),
E [xn(i)] = θ∗, 1 ≤ n ≤ N
lim
i→∞
E [x(i + 1)] = E [x(i)] − α(i)(cid:2)b(cid:0)L ⊗ IM
E [z(i)](cid:3)
E [x(i)] − DH
+DH
(cid:1) E [x(i)] +
Subtracting 1N ⊗ θ∗ from both sides of (28), noting that
(cid:0)L ⊗ IM
(cid:1) (1N ⊗ θ∗) = 0,
we have
(cid:0)bL ⊗ IM + DH
matrix(cid:2)bL ⊗ IM + DH
Let λmin
E [z(i)] = DH (1N ⊗ θ∗)
DH
E [x(i + 1)] − 1N ⊗ θ∗ =(cid:2)INM − α(i)(cid:0)bL ⊗ IM +
(cid:1), λmax
(cid:0)bL ⊗ IM + DH
(cid:3) (Lemma 5.) Since α(i) → 0 (Assumption (B.5), Appendix A),
+ DH )] [E [x(i)] − 1N ⊗ θ∗]
λmax
Continuing the recursion in (31), we have, for i > i0,
∃i0 (cid:51): α(i0) ≤
1
(31)
(cid:1) be the smallest and largest eigenvalues of the positive definite
(cid:1) , ∀i ≥ i0
(cid:0)bL ⊗ IM + DH
i−1(cid:89)
(cid:2)INM − α(j)(cid:0)bL ⊗ IM +
[E [x(i0)] − 1N ⊗ θ∗]
(32)
(33)
j=i0
E [x(i)] − 1N ⊗ θ∗ =
+ DH )]
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 6, JUNE 2012
Eqn. (33) implies
It follows from (32)
Eqns. (34,35) now give for i > i0
i−1(cid:89)
j=i0
i > i0
(cid:107)INM − α(j)
(cid:107)E [x(i)] − 1N ⊗ θ∗(cid:107) ≤
(cid:1)(cid:13)(cid:13)(cid:107)E [x(i0)] − 1N ⊗ θ∗(cid:107) ,
(cid:0)bL ⊗ IM + DH
(cid:13)(cid:13)INM − α(j)(cid:0)bL ⊗ IM + DH
(cid:1)(cid:13)(cid:13) =
(cid:1) , j ≥ i0
(cid:0)bL ⊗ IM + DH
i−1(cid:89)
(cid:1)(cid:1)(cid:107)E [x(i0)] − 1N ⊗ θ∗(cid:107) ,
(cid:0)bL ⊗ IM + DH
1 − α(j)λmin
(1 − α(j)
λmin
j=i0
(cid:107)E [x(i)] − 1N ⊗ θ∗(cid:107) ≤
Finally, from the inequality 1 − a ≤ e−a, 0 ≤ a ≤ 1, get
(cid:0)bL ⊗ IM + DH
Since, λmin
(cid:107)E [x(i)] − 1N ⊗ θ∗(cid:107) ≤ e−λmin(bL⊗IM +DH)(cid:80)i−1
(cid:1) > 0 and the weight sequence sums to infinity, the theorem follows since
(cid:107)E [x (i0)] − 1N ⊗ θ∗(cid:107) ,
i > i0
α(j)
j=i0
(cid:107)E [x(i)] − 1N ⊗ θ∗(cid:107) = 0
lim
i→∞
9
(34)
(35)
(36)
(37)
(38)
Before proceeding to Theorems 7 and 10 establishing the consistency and asymptotic normality of the LU, the
reader may refer to Appendix A, where useful results on stochastic approximation are discussed.
= 1
(cid:105)
lim
i→∞
n is consistent
xn(i) = θ∗, ∀n
(Appendix A). Recall the filtration, {F x
and noting that
Theorem 7 (LU: Consistency) Consider LU under (A.1) -- (A.5). Then, the estimate sequence {xn(i)}i≥0 at sensor
P(cid:104)
Proof: The proof follows by showing that {x(i)}i≥0 satisfies the Assumptions (B.1)-(B.5) of Theorem 29
i }i≥0, in (21). Rewrite (19) by adding and subtracting the vector 1N ⊗ θ∗
(cid:1) (1N ⊗ θ∗) = 0
(cid:20)
(cid:1) (x(i)−
b(cid:0)L ⊗ IM
(cid:16)(cid:101)L(i) ⊗ IM
(cid:17)
(cid:16)
x(i)+
(cid:21)
H 1N ⊗ θ∗
−1N ⊗ θ∗) + b
+DH (x(i)−1N ⊗ θ∗)−DH
x(i + 1) = x(i) − α(i)
(cid:0)L ⊗ IM
z(i)−D
(cid:17)
(40)
(41)
(39)
T
+
+ bΥ(i) + bΨ(i)
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 6, JUNE 2012
10
In the notation of Theorem 29, Appendix A, let R (x) and Γ (i + 1, x, ω) as in (42) and (43) below and rewrite
(41)
x(i + 1) = x(i) + α(i) [R(x(i)) + Γ (i + 1, x(i), ω)]
R (x) = −(cid:2)bL ⊗ IM + DH
Γ (i + 1, x, ω) = −(cid:104)
b
(cid:3) (x − 1N ⊗ θ∗)
(cid:16)(cid:101)L(i) ⊗ IM
(cid:17)
(cid:17)
H 1N ⊗ θ∗
T
x−
−DH
z(i) − D
(cid:16)
+ bΥ(i) + bΨ(i)
(cid:105)
Under the Assumptions (A.1)-(A.5), for fixed i+1, the random family, {Γ (i + 1, x, ω)}x∈RNM , is F x
i+1 measurable,
zero-mean and independent of F x
i . Hence, the assumptions (B.1)-(B.2) of Theorem 29 are satisfied.
We now show the existence of a stochastic potential function V (·) satisfying the remaining Assumptions (B.3)-
(B.4) of Theorem 29. To this end, define
V (x) = (x − 1N ⊗ θ∗)T(cid:2)bL ⊗ IM + DH
(cid:3)
(x − 1N ⊗ θ∗)
Clearly, V (x) ∈ C2 with bounded second order partial derivatives. It follows from the positive definiteness of
(cid:3) (Lemma 5), that
(cid:2)bL ⊗ IM + DH
Since the matrix(cid:2)bL ⊗ IM + DH
hence, there exists a constant c1 > 0, such that
V (1N ⊗ θ∗) = 0, V (x) > 0, x (cid:54)= 1N ⊗ θ∗
(cid:3) is positive definite, the matrix(cid:2)bL ⊗ IM + DH
(x − 1N ⊗ θ∗)T(cid:2)bL ⊗ IM + DH
(x − 1N ⊗ θ∗) ≥
(cid:3)2
≥ c1(cid:107)x − 1N ⊗ θ∗(cid:107)2, ∀x ∈ RNM
(cid:3)2 is also positive definite and
(45)
(42)
(43)
(44)
(46)
(47)
(48)
(49)
(50)
It then follows that
sup
(cid:107)x−1N⊗θ∗(cid:107)>
− 2
inf
(cid:107)x−1N⊗θ∗(cid:107)>
(R (x) , Vx (x)) =
(cid:110)
(x − 1N ⊗ θ∗)T(cid:2)bL ⊗ IM + DH
(cid:3)2
(cid:111)
(x − 1N ⊗ θ∗)
c1 (cid:107)x − 1N ⊗ θ∗(cid:107)2
≤ −2
inf
≤ −2c12 < 0
(cid:107)x−1N⊗θ∗(cid:107)>
Thus, Assumption (B.3) is satisfied. From (42)
From (43) and the independence Assumption (A.4)
= − 1
2
(R (x) , Vx (x))
(cid:107)R (x)(cid:107)2 =
= (x − 1N ⊗ θ∗)T(cid:2)bL ⊗ IM + DH
E(cid:104)(cid:107)Γ (i + 1, x, ω)(cid:107)2(cid:105)
(cid:20)
(x − 1N ⊗ θ∗)T(cid:16)
b(cid:101)L(i) ⊗ IM
(cid:20)(cid:13)(cid:13)(cid:13)DH
(cid:16)
+ b2E(cid:104)(cid:107)Υ(i) + Ψ(i)(cid:107)2(cid:105)
z(i) − D
= E
+ E
=
(cid:3)2
(x − 1N ⊗ θ∗)
(cid:21)
(cid:17)2
H 1N ⊗ θ∗
T
(x − 1N ⊗ θ∗)
(cid:17)(cid:13)(cid:13)(cid:13)2(cid:21)
+
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 6, JUNE 2012
Since the random matrix (cid:101)L(i) takes values in a finite set, there exists a constant c2 > 0, such that, ∀x ∈ RNM ,
Again, since(cid:0)bL ⊗ IM + DH
≤ c2(cid:107)x − 1N ⊗ θ∗(cid:107)2
(x − 1N ⊗ θ∗) ≤
(cid:17)2
(x − 1N ⊗ θ∗)T(cid:16)
b(cid:101)L(i) ⊗ IM
(cid:1) is positive definite, there exists a constant c3 > 0, such that, ∀x ∈ RNM ,
(x − 1N ⊗ θ∗)T(cid:2)bL ⊗ IM + DH
(cid:3) (x − 1N ⊗ θ∗) ≥
(cid:21)
(cid:20)
(cid:17)2
(x − 1N ⊗ θ∗)T(cid:16)
b(cid:101)L(i) ⊗ IM
(cid:3)(x − 1N ⊗ θ∗)
(x − 1N ⊗ θ∗)T(cid:2)bL ⊗ IM + DH
+ b2E(cid:104)(cid:107)Υ(i) + Ψ(i)(cid:107)2(cid:105)
E(cid:104)(cid:13)(cid:13)DH z(i) − DH 1N ⊗ θ∗(cid:13)(cid:13)2(cid:105)
≥ c3(cid:107)x − 1N ⊗ θ∗(cid:107)2.
(x − 1N ⊗ θ∗)
≤ c2
c3
= c4V (x)
> 0. The term
for some constant c4 = c2
c3
We then have from (51)-(52)
≤
E
11
(51)
(52)
(53)
is bounded by a finite constant c5 > 0, as it follows from Assumptions (A.1)-(A.5). We then have from (49)-(50)
(cid:107)R (x)(cid:107)2 + E(cid:104)(cid:107)Γ (i + 1, x, ω)(cid:107)2(cid:105) ≤
(R (x) , Vx (x)) + c4V (x) + c5 ≤
≤ − 1
2
≤ c6 (1 + V (x)) − 1
2
(R (x) , Vx (x))
xn(i) = θ∗, ∀n] = 1
P[ lim
i→∞
where c6 = max (c4, c5) > 0. This verifies Assumption (B.4) of Theorem 29. Assumption (B.5) is satisfied by the
choice of {α(i)}i≥0. It then follows that the process {x(i)}i≥0 converges a.s. to 1N ⊗ θ∗. In other words,
which establishes consistency of LU.
The proof above can be modified to show L2 convergence of the sensor estimates to θ∗. Due to the fact that the
LU update rule is linear, the driving noise terms are L2 bounded, and the stable (as shown in the proof) Lyapunov
function V (·) assumes a positive definite quadratic form. Hence, by studying the recursion of the deterministic
sequence {E[V (x(i))]} and by similar arguments5 as in [46] (Lemma 4), we conclude the following:
Lemma 8 (Mean square convergence) Let the hypotheses of Theorem 7 hold and, in addition, the weight sequence
{α(i)} satisfy the following:
(54)
(55)
(56)
(57)
where a > 0 and .5 < τ ≤ 1. Then, the a.s. convergence in Theorem 7 holds in L2 also, i.e., for all n,
a
α(i) =
(i + 1)τ
E(cid:104)(cid:107)xn(i) − θ∗(cid:107)2(cid:105)
= 0
lim
i→∞
C. Asymptotic Variance: LU
In this subsection, we carry out a convergence rate analysis of the LU algorithm by studying its moderate
deviation characteristics. We summarize here some definitions and terminology from the statistical literature, used
to characterize the performance of sequential estimation procedures (see [47]).
5Note, that Lemma 4 in [46] does not assume the additional term due to new observations at each iteration. However, this does not pose
difficulties as the observation weights are the same as the consensus weights.
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 6, JUNE 2012
12
Definition 9 (Asymptotic Normality) A sequence of estimates {x•(i)}i≥0 is asymptotically normal if for every
θ∗ ∈ U, there exists a positive semidefinite matrix S(θ∗) ∈ RM×M , such that,
i (x•(i) − θ∗) =⇒ N (0M , S(θ∗))
(58)
√
The matrix S(θ∗) is called the asymptotic variance of the estimate sequence {x•(i)}i≥0.
In the following we prove the asymptotic normality of the LU algorithm and explicitly characterize the resulting
lim
i→∞
asymptotic variance. To this end, define
...
...
SH = E
(cid:101)H1(i)
DH
DH
(cid:101)H1(i)
1N θ∗
...(cid:101)HN (i)
T
1N θ∗
(cid:3) and recall Sζ, Sq in (7) and (20).
(cid:1) be the smallest eigenvalue of(cid:2)bL ⊗ IM + DH
...(cid:101)HN (i)
...
...
(cid:0)bL ⊗ IM + DH
Let λmin
We now state the main result of this subsection, establishing the asymptotic normality of the LU algorithm.
Theorem 10 (LU: Asymptotic efficiency/ normality) Let the LU algorithm under (A.1)-(A.5) with link weight se-
quence, {α(i)}i≥0 that is given by:
a
, ∀i
α(i) =
i + 1
for some constant a > 0. Let {x(i)}i≥0 be the state sequence generated. Then, if a >
1
2λmin(bL⊗IM +DH)
, we have
(i) (x(i) − 1N ⊗ θ∗) =⇒ N (0, S(θ∗))
(59)
(60)
(61)
(62)
(63)
(64)
(65)
where
and
(cid:112)
(cid:112)
(cid:90) ∞
S(θ∗) = a2
eΣvS0eΣvdv,
Σ = −a(cid:2)bL ⊗ IM + DH
(cid:3) +
0
1
2
I,
S0 = SH + DH SζD
T
H + b2Sq
In particular, at any sensor n, the estimate sequence, {xn(i)}i≥0 is asymptotically normal:
(i) (xn(i) − θ∗) =⇒ N (0, Snn(θ∗))
where, Snn(θ∗) ∈ RM×M denotes the n-th principal block of S(θ∗).
Proof: The proof involves a step-by-step verification of Assumptions (C.1)-(C.5) of Theorem 29 (Appendix A),
since the Assumptions (B.1)-(B.5) are already shown to be satisfied (see, Theorem 7.) Recall R (x) and Γ (i + 1, x, ω)
from Theorem 7 ((42)-(43)). From (42), Assumption (C.1) of Theorem 29 is satisfied with
B = −(cid:2)bL ⊗ IM + DH
(cid:3)
and δ (x) ≡ 0. Assumption (C.2) is satisfied by hypothesis, while the condition a >
Σ = −a(cid:2)bL ⊗ IM + DH
(cid:3) +
1
2
INM = aB +
1
2
INM
(66)
1
2λmin(bL⊗IM +DH)
implies
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 6, JUNE 2012
is stable, and hence Assumption (C.3). To verify Assumption (C.4), we have from Assumption (A.4)
From the i.i.d. assumptions, we note that all the three terms on the R.H.S. of (67) are independent of i, and, in
particular, the last two terms are constants. For the first term, we note that
from the bounded convergence theorem, as the entries of
are bounded and
For the second term on the R.H.S. of (67), we have
lim
(cid:17)
= b2E
E
x→1N⊗θ∗
xxT(cid:16)(cid:101)L(i) ⊗ IM
(cid:110)(cid:101)L(i)
A (i, x) = E(cid:2)Γ (i + 1, x, ω) ΓT (i + 1, x, ω)(cid:3)
(cid:20)(cid:16)(cid:101)L(i) ⊗ IM
(cid:17)T(cid:21)
xxT(cid:16)(cid:101)L(i) ⊗ IM
+ E(cid:2)(cid:0)DH z(i) − DH 1N ⊗ θ∗(cid:1)
(cid:0)DH z(i) − DH 1N ⊗ θ∗(cid:1)T(cid:105)
(Υ(i) + Ψ(i)) (Υ(i) + Ψ(i))T(cid:105)
+ b2E(cid:104)
(cid:17)T(cid:21)
(cid:20)(cid:16)(cid:101)L(i) ⊗ IM
(cid:17)
(cid:17)
(cid:16)(cid:101)L(i) ⊗ IM
E(cid:104)(cid:0)DH z(i)−DH 1N ⊗ θ∗(cid:1)(cid:0)DH z(i)−DH 1N ⊗ θ∗(cid:1)T(cid:105)
1N θ∗
DH
(cid:101)H1(i)
...(cid:101)HN (i)
T +
1N θ∗
DH
(cid:101)H1(i)
...(cid:101)HN (i)
+ E(cid:104)
(cid:105)
(1N ⊗ θ∗) = 0
= E
(cid:111)
...
...
...
...
DH ζζ T D
T
H
= 0
i≥0
= SH + DH SζD
T
H
=
x−
(x − θ∗)−
(cid:107)Γ (i + 1, x, ω)(cid:107)2 =
−(cid:0)DH z(i) − DH 1N ⊗ θ∗(cid:1) + bΥ(i) + bΨ(i)(cid:13)(cid:13)2
(cid:13)(cid:13)(cid:13)b
(cid:17)
(cid:16)(cid:101)L(i) ⊗ IM
(cid:13)(cid:13)2
−(cid:0)DH z(i) − DH 1N ⊗ θ∗(cid:1) + bΥ(i) + bΨ(i)
(cid:20)(cid:13)(cid:13)(cid:13)(cid:16)
(cid:13)(cid:13)(cid:13)2
b(cid:101)L(i) ⊗ IM
+ b2 (cid:107)Υ(i) + Ψ(i)(cid:107)2(cid:105)
+(cid:13)(cid:13)DH z(i) − DH 1N ⊗ θ∗(cid:13)(cid:13)2
(x − θ∗)
≤ 9
(cid:17)
+
13
(67)
(68)
(69)
(70)
(71)
(72)
where the last step follows from (59),(7). Finally, we note the third term on the R.H.S. of (67) is b2Sq, see (20).
We thus have from (67)-(70)
We now verify Assumption (C.5). Consider a fixed > 0. We note that (157) is a restatement of the uniform
lim
integrability of the random family,(cid:8)(cid:107)Γ (i + 1, x, ω)(cid:107)2(cid:9)
(cid:13)(cid:13)(cid:13)b
i→∞, x→x∗ A (i, x) = SH + DH SζD
(cid:17)
(cid:16)(cid:101)L(i) ⊗ IM
i≥0, (cid:107)x−θ∗(cid:107)<. From (43), we have
T
H + b2Sq = S0
(cid:104)(cid:107)y1(cid:107)2 + (cid:107)y2(cid:107)2 + (cid:107)y3(cid:107)2(cid:105)
(cid:13)(cid:13)(cid:13)2 ≤ c22
14
, for vectors y1, y2, y3.
(73)
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 6, JUNE 2012
where we used (69) and the inequality, (cid:107)y1 + y2 + y3(cid:107)2 ≤ 9
From (51) we note that, if (cid:107)x − θ∗(cid:107) < ,(cid:13)(cid:13)(cid:13)(cid:16)
(cid:17)
b(cid:101)L(i) ⊗ IM
(cid:111)
From (72), the family [defined in (74) below](cid:110)(cid:101)Γ (i + 1, x, ω)
(cid:8)(cid:107)Γ (i + 1, x, ω)(cid:107)2(cid:9)
dominates the family
(x − θ∗)
where
(cid:101)Γ (i + 1, x, ω) = 9
i≥0,(cid:107)x−θ∗(cid:107)<
(cid:104)
i≥0, (cid:107)x−θ∗(cid:107)< ,
c22 +(cid:13)(cid:13)DH z(i) − DH 1N ⊗ θ∗(cid:13)(cid:13)2
+ b2 (cid:107)Υ(i) + Ψ(i)(cid:107)2(cid:105)
The family
(cid:111)
(cid:110)(cid:101)Γ (i + 1, x, ω)
(cid:8)(cid:107)Γ (i + 1, x, ω)(cid:107)2(cid:9)
is i.i.d. and hence uniformly integrable (see [50]). Then the family
(cid:110)(cid:101)Γ (i + 1, x, ω)
(cid:111)
i≥0, (cid:107)x−θ∗(cid:107)< is also uniformly integrable since it is dominated by the uniformly integrable
(see [50]). Thus (C.1)-(C.5) are verified and the theorem follows.
i≥0, (cid:107)x−θ∗(cid:107)<
family
(74)
i≥0, (cid:107)x−θ∗(cid:107)<
N(cid:88)
D. A Simulation Example
Fig. 1 (b) shows the performance of LU for the network of N = 45 sensors in Fig. 1 (a), where the sensors
are deployed randomly on a 25 × 25 grid. The sensors communicate in a fixed radius and are further constrained
to have a maximum of 6 neighbors per node. The true parameter θ∗ ∈ R45. Each node is associated with a single
n , the unit vector of zeros, except entry n that is 1. For the experiment, each
component of θ∗, i.e., H n = eT
component of θ∗ is generated by an instantiation of a zero mean Gaussian random variable of variance 25. The
parameter θ∗ represents the state of the field to be estimated. In this example, the field is white, stationary, and
hence each sample of the field has the same Gaussian distribution and is independent of the others. More generally,
the components of θ∗ may correspond to random field samples, as dictated by the sensor deployment, that can
possibly arise from the discretization of a field governed by a PDE. Each sensor observes the corresponding field
component in additive Gaussian noise. For example, sensor 1 observes z1(t) = θ∗1 + ζ1(t), where ζ1(t) ∼ N (0, 1).
Clearly, such a model satisfies the distributed observability condition
G =
T
n H n = I45 = G−1
H
(75)
n=1
Fig. 1(b) shows the normalized error at every sensor plotted against the iteration index i for an instantiation of the
algorithm. The normalized error for the n-th sensor at time i is given by the quantity (cid:107)xn(i) − θ∗(cid:107) /45, i.e., the
estimation error normalized by the dimension of θ∗. We note that the errors converge to zero as established by the
theoretical findings. The decrease is rapid at the beginning and slows down at i increases. This is a standard property
of stochastic approximation based algorithms, consequence of the decreasing weight sequence α(i) required for
convergence. From the plots, although the individual sensors are low rank observations of the true parameter, by
collaborating, each sensor reconstructs the true parameter value, as desired.
E. An Example
From Theorem 10 and (59), we note that the asymptotic variance is independent of θ∗, if the observation matrices
are non-random. In that case, it is possible to optimize (minimize) the asymptotic variance over the weights a and
b. In the following, we study a special case permitting explicit computations and that leads to interesting results.
Consider a scalar parameter (M = 1) and let each sensor n have the same i.i.d. observation model,
zn(i) = hθ∗ + ζn(i)
(76)
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 6, JUNE 2012
15
(a)
(b)
Fig. 1.
estimation error at each sensor.
Illustration of distributed linear parameter estimation. (a) Example network deployment of 45 nodes. (b) Convergence of normalized
where h (cid:54)= 0 and {ζn(i)}i≥0, 1≤n≤N is a family of independent zero mean Gaussian random variables with variance
σ2. In addition, assume unquantized inter-sensor exchanges. We define the average asymptotic variance per sensor
attained by the algorithm LU as
where S is given by (62) in Theorem 10. From Theorem 10, we have S0 = σ2h2IN and, hence, from (62)
From (63) the eigenvalues of 2Σv are(cid:2)−2abλn(L) −(cid:0)2ah2 − 1(cid:1)(cid:3) v for 1 ≤ n ≤ N and we have
N
=
0
a2σ2h2
SLU =
1
N
Tr (S)
(cid:18)(cid:90) ∞
(cid:19)
(cid:90) ∞
Tr(cid:0)e2Σv(cid:1) dv
e2Σvdv
0
SLU =
a2σ2h2
N
Tr
(cid:90) ∞
N(cid:88)
N(cid:88)
n=1
a2σ2h2
N
a2σ2h2
SLU =
=
=
e[−2abλn(L)−(2ah2−1)]vdv
0
1
2abλn(L) + (2ah2 − 1)
N
n=1
a2σ2h2
N (2ah2 − 1)
+
a2σ2h2
N
N(cid:88)
n=2
1
2abλn(L) + (2ah2 − 1)
(77)
(78)
(79)
In this case, the constraint a >
2λmin(bL⊗IM +DH )
optimum a, b design to minimize SLU is given by
S∗
LU =
1
in Theorem 10 reduces to a > 1
2h2 , and hence the problem of
inf
2h2 , b>0
a> 1
SLU
(80)
It is to be noted, that the first term on the last step of (79) is minimized at a = 1
non-negative under the constraint) goes to zero as b → ∞ for any fixed a > 0. Hence, we have
h2 and the second term (always
The above shows that, by setting a = 1
h2 and b sufficiently large in LU, SLU is arbitrarily close to S∗
LU
S∗
LU =
σ2
N h2
(81)
.
051015202505101520255010015020025030000.511.522.53IterationsErrorpercomponentofθ∗IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 6, JUNE 2012
16
We compare this optimum achievable asymptotic variance per sensor, S∗
LU
, attained by LU to that attained by a
centralized scheme. In the centralized scheme, there is a central estimator, which receives measurements from all
the sensors and computes an estimate based on all measurements. In this case, the sample mean estimator is an
efficient estimator (in the sense of Cram´er-Rao) and the estimate sequence {xc(i)}i≥0 is given by
(cid:88)
n,i
xc(i) =
1
N ih
zn(i)
(82)
(83)
and we have
√
i (xc(i) − θ∗) ∼ (0,Sc)
where, Sc is the variance (which is also the one-step Fisher information in this case, see, [47]) and is given by
Sc =
σ2
N h2
(84)
From (81) we note that,
S∗
LU = Sc
(85)
Thus the average asymptotic variance attainable by the distributed algorithm LU is the same as that of the optimum
(in the sense of Cram´er-Rao) centralized estimator having access to all information simultaneously. This is an
interesting result, as it holds irrespective of the network topology. In particular, however sparse the inter-sensor
communication graph is, the optimum achievable asymptotic variance is the same as that of the centralized efficient
estimator. Note that weak convergence itself is a limiting result, and, hence, the rate of convergence in (61) in
Theorem 10 will, in general, depend on the network topology.
F. Some generalizations
We discuss some generalizations of the basic LU scheme before proceeding to the nonlinear observation models
addressed in the subsequent sections. We start by revisiting the scalar example in Section II-E for which the
distributed LU is shown to achieve the performance of the optimal centralized estimator. Interestingly, the above
example is not an isolated special case and has several important implications. The observation that by increasing
b > 0 we can achieve asymptotic variance as close as desired to the centralized estimator hints to a more general
time-scale separation in the case of unquantized transmissions. Intuitively, for a fixed b > 0, the weight associated to
the consensus potential is bα(i), which goes to zero at the same rate as that of the innovation potential. Hence, in the
long run, a non-negligible (in the scale {α(i)}) amount of time is required to disseminate new information acquired
by a sensor. In other words, the rate of uncertainty reduction in LU depends on both the rate of new information
acquisition at the sensors and the rate of information dissemination in the network. On the contrary, in a centralized
scenario, no additional time is incurred for information dissemination and the rate of uncertainty reduction is the
same as the rate of information acquisition. This is manifested, in general, in the asymptotic variance of LU,
which is larger than its centralized counterpart due to the additional overhead of the mixing terms (Theorem 10).
This suggests that, if the mixing can be carried out at a faster scale, the additional overhead due to the mixing
time will not be observed at the time scale of observation acquisition and, in effect, the distributed scheme will
lead to similar asymptotic variance as in the centralized setting. This is noted in Section II-E, where increasing
the relative weight b of the consensus or mixing potential leads to a time scale separation between information
dissemination and acquisition. Increasing b beyond bounds suggests that we replace the decreasing weight sequence
{α(i)} from the consensus term and retain it with a constant weight, or more generally, a weight sequence {β(i)},
that asymptotically dominates {α(i)}. Such a mixed time scale extension of the LU is introduced and analyzed
in [26]. The results in [26] show that the conclusion in Section II-E for the scalar example (the distributed achieves
the centralized performance in terms of asymptotic variance) holds in more general vector parameter settings by
appropriately tuning the consensus and innovation weights. This is significant, as it justifies the applicability of
distributed estimation schemes over centralized approaches.
The development in this paper assumes stationarity of the sensor observations over time. While this is applicable
and is a commonly used assumption in many statistical models, some scenarios inherently lead to non-stationary
observation time series. For example, consider a distributed sensor network monitoring a target that fades over
time. In this example, the sensor observation models are no longer stationary as the SNR (signal to noise ratio)
decays over time, the decay rate being a function of the fading characteristics. Treating nonstationarity requires
modification of the algorithm (intuitively, the update rules are no longer stationary) and is pursued in [26].
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 6, JUNE 2012
17
The above did not exploit the physical significance of the parameter θ. That θ may itself come from a spa-
tially distributed random field was only implicit in the distributed observation model. Typical examples include
instrumenting a spatially distributed random field (say a temperature surface) with a sensor network. Another
example is of cyberphysical systems, where a network of physical entities equipped with sensors are deployed over
a large geographical region. A well known example in this setting is the power grid, a large distributed network
of generators and loads. Our results imply that, under appropriate observability conditions, the physical field θ
may be reconstructed completely at each node (sensor).6 However, for such systems, the parameter θ representing
the physical field is quite large dimensional, may be of the order of 103 or more, as exemplified by the power
grid.7 It is then impractical and unnecessary to reconstruct the high dimensional parameter in its entirety at each
node. On the other hand, the node may be interested only in its state, or those of its close neighbors. In general,
the observation at each sensor reflects the coupling of a few local physical states and hence, acting alone, a node
may not be able to recover its state uniquely. In [51], we develop approaches to address this problem, where each
node wants to reconstruct a few components8 of the large state vector. The estimation approach would lead to
low dimensional data exchanges between neighboring sensors (nodes) and local estimate updates would involve
only those components, the node wants to reconstruct. Due to the partial information exchange between sensors
and the fact that sensors may have different goals, the distributed observability no longer culminates to the sum
of network connectivity and global connectivity, but requires more subtle relations between the observation model
and the network topology. In general, the scope of such problems of distributed estimation with partial inter-sensor
information exchange is quite broad and challenging, and we refer the reader to [51] (Chapter 5) for an exposition.
III. NONLINEAR OBSERVATION MODELS: AGORITHM NU
The previous section developed the algorithm LU for distributed parameter estimation when the observation model
is linear. In this section, we extend the previous development to accommodate more general classes of nonlinear
observation models. We comment briefly on the organization of this section. In Section III-B, we introduce notation
and setup the problem, and in Section III-C we present the NU algorithm for distributed parameter estimation for
nonlinear observation models and establish conditions for its consistency.
A. Nonlinear Observation Models
Similar to Section II, let θ∗ ∈ U ⊂ RM be the true but unknown parameter value. We assume that the domain
U is an open set in RM . In the general case, the observation model at each sensor n consists of an i.i.d. sequence
{zn(i)}i≥0 in RMN with
(cid:90)
Pθ∗ [zn(i) ∈ D] =
dFn,θ∗ , ∀ D ∈ BMN
(86)
where Fn,θ∗ denotes the distribution function of the random vector zn(i). For consistent parameter estimates, even
in centralized settings, some form of observability needs to be imposed on the nonlinear model. In the following,
we assume that the distributed observation model is separably estimable, a notion which we introduce now.
D
Definition 11 (Separably Estimable) Let {zn(i)}i≥0 be the i.i.d. observation sequence at sensor n, where 1 ≤ n ≤
N. We call the parameter estimation problem to be separably estimable, if there exist functions gn(·) : RMN (cid:55)−→
RM , ∀1 ≤ n ≤ N, such that the function h(·) : U (cid:55)−→ RM is continuous and invertible on U
N(cid:88)
n=1
h(θ) =
1
N
Eθ [gn(zn(i))]
(87)
Remark 12 Before providing examples of separably estimable observation models and demonstrating the applica-
bility of the notion, we comment on the definition.
6A node, in this context, refers to the physical entity at a geographical location, for example, a generator in a power grid. The sensing or
measurement unit associated to a node is referred to as a sensor. The state of a node represents the field intensity at that point, for example,
the phase of a generator.
7For problems involving infinite dimensional systems, such as the temperature distribution over a domain in the Euclidean space, any reasonable
discretization would lead to a large dimensional θ.
8These components may vary from node to node.
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 6, JUNE 2012
18
T
(i) We note that the factor 1
N in (87) is just for notational convenience, as will be seen later. In fact, the 1
N can be
absorbed by redefining the functions gn(·). Also, it is implicitly assumed that the random vectors gn(zn(i))
are integrable w.r.t. the measures Pθ for θ ∈ U.
(ii) Let h(U) ⊂ RM denote the range of h(·). The continuity of h(·) implies that h(U) is open. Let h−1 : h(U) (cid:55)−→
RM denote the inverse of h(·) (which is necessarily continuous on h(U).) It then follows that h−1(·) has a
measurable extension defined over all of RM . In the following we will assume that h−1(·) has been measurably
extended and, by abusing notation, denote this extension by h−1.
(iii) We will show that the notion of separably estimable models introduced above is, in fact, necessary and
sufficient to guarantee the existence of consistent distributed estimation procedures for a wide range of practical
scenarios. This condition may also be viewed as a natural generalization of the observability constraint
of Assumption (A.5) in the linear model. Indeed, if, assuming the linear model, we define gn(zn(i)) =
n zn(i), ∀1 ≤ n ≤ N in (87), we have h(θ) = Gθ, where G is defined in (10). Then, invertibility of (87)
H
is equivalent to Assumption (A.5), i.e., to invertibility of G; hence, the linear model is an example of a
separably estimable problem. Note that, if an observation model is separably estimable, then the choice of
functions gn(·) is not unique. Indeed, given a separably estimable model, it is important to figure out an
appropriate decomposition, as in (87), because the convergence properties of the algorithms (Algorithm NU,
Section III-C) to be studied are intimately related to the behavior of these functions. Finally, we note that, in
general, M (cid:54)= M, and the dimension M of the range space of h(·) is very much linked to the memory and
transmission requirements of the distributed algorithm NLU to be studied in Section IV. In this sense, the
function h(·) plays the role of a complete sufficient statistic as used in classical (centralized) estimation, the
major difference being the distributed computability (to be made precise later) of h(·) in the current setting.
In Sections III-C and IV, respectively, we will present algorithms NU and NLU for distributed parameter
estimation in separably estimable models. While the NLU provides consistent parameter estimates for all separably
estimable models, the NU requires further (mainly of the Lipschitz type) conditions on the functions gn(·) and h(·).
However, in cases where the NU is applicable, it automatically leads to convergence rate guarantees in the context
of asymptotic normality. These differences are further clarified in Section V. Before discussing these algorithms in
detail, we provide examples of separably estimably models in the following.
Examples: Signal in additive noise models
We now demonstrate an important and large class of distributed observation models possessing the separably
estimable property, thus justifying the generality and applicability of the notion.
A wide range of observation models are of the signal in additive noise type. In particular, for each n, denote
by {ζn(i)} the zero mean i.i.d. observation noise at the n-th sensor of arbitrary distribution (the distribution may
vary from sensor to sensor.) The sensor observation model is said to be of signal in additive noise type, if the
observation sequence {zn(i)} at the n-th sensor is of the form:
zn(i) = fn(θ∗) + ζn(i)
(88)
Here fn : U (cid:55)−→ RMn denotes the transformed (nonlinearly) signal (or parameter) observed at sensor n, further
corrupted by additive noise. The following simple proposition characterizes the subclass of signal in additive noise
observable models with the separably estimable property:
Proposition 13 Let f : U (cid:55)−→ R(cid:80)N
additive noise observation model (see (88)) is separably estimable if f (·) is continuous and invertible on U.
pothetical centralized estimator having access to all the sensor observations at all times. Clearly, the (cid:80)N
Before providing the rather straightforward proof, we note the consequences of Proposition 13. Consider a hy-
n=1 Mn
dimensional i.i.d. observation sequence {z(i)} at such a center is given by:
N (θ)]T . Then, the above signal in
n=1 Mn be defined by, f (θ) = [f T
1 (θ)··· f T
z(i) = f (θ∗) + ζ(i)
(89)
In general, for arbitrary statistics of the noise sequence {ζ(i)}, it is necessary that the function f be invertible, for the
center to yield a consistent estimate of the parameter. In fact, for consistent centralized estimates, the invertibility of
f (·) is required, even when the observation noise is identically zero. On the other hand, Proposition 13 asserts that
the invertibility of f (·) (and its continuity) is sufficient to guarantee that the model is separably estimable and hence
the existence of consistent distributed estimation schemes. Hence, at least in the class of widely adopted signal in
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 6, JUNE 2012
19
additive noise models, centralized observability is equivalent to distributed observability (formulated here in terms
of separable estimability.) This further justifies the notion of separable estimability as a reasonable generalization
of the concept of centralized observability to distributed nonlinear settings. In Section IV-D, we will show that the
NLU algorithm provides a completely distributed approach to the static phase estimation problem in power grids
of generators and loads based on line flow measurements, an important practical example of a distributed nonlinear
signal in additive noise model.
gn : RMn (cid:55)−→ R(cid:80)N
Proof: The proof follows in a straightforward manner from the definition. For each n, define the function
n=1 Mn by
(90)
Recall 0M1 ∈ RM1 denotes the column vector of M1 zeros and so on. By the independence of the noise sequence
{ζ(i)}, it the follows that
gn(y) = [0T
M1
0T
M2
··· yT ··· 0T
MN ]T , ∀y ∈ RMn
Eθ∗ [gn(zn(i))] = f (θ∗)
(91)
N(cid:88)
n=1
The continuity and invertibility of f (·) then establishes the separable estimability of the model (Definition 11) by
the correspondence h(·) = 1
By using the same arguments we demonstrate a larger class of separably estimable models as follows:
N f (·).
Proposition 14 Let the observation sequence {zn(i)} at the n-th sensor be of the form:
zn(i) = fn(θ∗, ζ 1
n(i)} ∈ RM 1
n(i)) + ζ 2
n(i)
n(i), ζ 2
n (cid:55)−→ RMn, {ζ 1
where fn : U × RM 1
mean. Assuming that the moments exist, define the function f n : U (cid:55)−→ RMn, for each n, by
Further, let f : U (cid:55)−→ R(cid:80)N
is separably estimable if f (·) is continuous and invertible on U.
(cid:2)fn(θ∗, ζ 1
n(i))(cid:3)
n=1 Mn be defined by, f (θ) = [f
f n(θ) = Eθ
n × RMn is a temporally i.i.d. sequence and {ζ 2
T
1 (θ)··· f
T
N (θ)]T . Then, the observation model in (92)
(92)
n(i)} is zero
(93)
Remark 15 The generic model considered in Proposition 14 subsumes the class of signals with multiplicative noise
n(i) to zero.
models, by suitably defining the functions fn(θ∗, ζ 1
We also note that a general guideline for choosing the functions gn(·) for the signal in additive noise type models
based on problem data is given in (90). From a similar line of reasoning, it follows that the same choice of gn(·)
works for the larger class of separably estimable models considered in Proposition 14.
n(i)) and setting the additive noise component ζ 2
In the following subsection, we present the algorithm NU for distributed parameter estimation in nonlinear
separably estimable observation models.
B. Algorithm NU and Assumptions
Before introducing the algorithm, we formally state the generic observation and communication assumptions
required by the NU.
(D.1)Separably Estimable Model: The nonlinear observation model (86) is separably estimable (Definition 11).
In particular, at iteration i, the observations across different sensors need not be independent. In other words,
we allow spatial correlation, but require temporal independence. Also, other than the structural assumption of
separable estimability, no assumptions are required on the noise statistics, in particular, its distribution.
(D.2)Random Link Failure, Quantized Communication: The random link failure model is the model given in
sequence, as in (II-A)) are mutually independent. Let M =(cid:80)N
Section I-B; similarly, we assume quantized inter-sensor communication with subtractive dithering.
(D.3)Independence and Moment Assumptions: The sequences {L(i)}i≥0,{zn(i)}1≤n≤N, i≥0,{νm
nl(i)} (dither
n=1 Mn and define hn : RM (cid:55)−→ RM , by
hn(θ) = Eθ [gn(zn(i))] , ∀1 ≤ n ≤ N
(94)
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 6, JUNE 2012
We make the assumption ∀θ ∈ U:
Eθ
(cid:13)(cid:13)(cid:13)(cid:13)(cid:13) 1
N
N(cid:88)
n=1
(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)2=η(θ) < ∞,
gn(zn(i)) − h(θ)
20
(95)
We thus assume the existence of quadratic moments of the (transformed) random variables gn(zn(i)). For example,
under the reasonable hypotheses of Propositions 13-14, the functions gn(·) may be taken to be linear, and
Assumption (D.3) then coincides with the existence of quadratic moment of the observations zn(i). In general,
since the choice of the functions gn(·) for a separably estimable model is not unique, the moment Assumption (D.3)
may enter as a selection criterion of the transformations gn(·).
In Section III-C and Section IV, we give two algorithms, NU and NLU, respectively, for the distributed estimation
problem (D.1)-(D.3) and provide conditions for consistency and other properties of the estimates.
C. Algorithm NU
In this subsection, we present the algorithm NU for distributed parameter estimation in separably estimable
Algorithm NU: Each sensor n performs the following estimate update:
models under Assumptions (D.1)-(D.3).
xn(i + 1) = xn(i) − α(i)
β (xn(i)−
(96)
(cid:88)
l∈Ωn(i)
q(xl(i) + νnl(i))) + Kn (hn(xn(i)) − gn(zn(i)))
(cid:8)xn(i) ∈ RM(cid:9)
based on xn(i), {q(xl(i) + νnl(i))}l∈Ωn(i), and zn(i), which are all available to it at time i. The sequence,
i≥0, is the estimate (state) sequence generated at sensor n. The weight sequence {α(i)}i≥0 satisfies
the persistence condition of Assumption (B.5) and β > 0 is chosen to be an appropriate constant. Finally,
Kn ∈ RM×M is an appropriately chosen matrix gain, possibly varying from sensor to sensor. Similar to (12)
the above update can be written in compact form as
x(i + 1) = x(i) − α(i) [β(L(i) ⊗ IM )x(i)+
+ K (M (x(i)) − J(z(i))) + Υ(i) + Ψ(i)]
(97)
1 (i)··· xT
N (i)]T is the vector of sensor states (estimates). The
where Υ(i), Ψ(i) are as in (13)-(15) and x(i) = [xT
functions M (x(i)) and J(z(i)) are given by
M (x(i)) =(cid:2)hT
J(z(i)) =(cid:2)gT
N (xN (i))(cid:3)T
N (zN (i))(cid:3)T
1 (x1(i))··· hT
1 (z1(i))··· gT
and K = diag(K1,··· ,KN ) is the block diagonal matrix of gains.
gains Kn to be IM ), the NU reduces to the LU updates (19).
As an example, for the linear observation model, by defining gn(zn(i)) to be H
,
(98)
(99)
T
n zn(i) (and choosing the matrix
We note that the update scheme in (97) is nonlinear and hence convergence properties can, in general, be
characterized through the existence of appropriate stochastic Lyapunov functions. In particular, if we can show that
the iterative scheme in (97) falls under the purview of a general result like Theorem 29, we can establish properties
like consistency, normality etc. To this end, we note, that (97) can be written as
x(i + 1) = x(i) − α(i)(cid:2)β(cid:0)L ⊗ IM
(cid:16)(cid:101)L(i) ⊗ IM
(cid:17)
x(i) + K (M (x(i)) − M (1N ⊗ θ∗))
+ β
−K (J(z(i)) − M (1N ⊗ θ∗)) + Υ(i) + Ψ(i)]
(cid:1) (x(i) − 1N ⊗ θ∗)
(100)
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 6, JUNE 2012
which becomes in the notation of Theorem 29
x(i + 1)=x(i)+α(i)[R(x(i)) + Γ (i + 1, x(i), ω)]
R (x) = −(cid:2)β(cid:0)L ⊗ IM
Γ (i + 1, x, ω) = −(cid:104)
(cid:1) (x − 1N ⊗ θ∗)
+ K (M (x) − M (1N ⊗ θ∗))(cid:3)
(cid:17)
(cid:16)(cid:101)L(i) ⊗ IM
x−
β
− K (J(z(i)) − M (1N ⊗ θ∗)) + Υ(i) + Ψ(i)
(cid:18)
Fi=σ
x(0),
(cid:110)
(cid:111)
L(j),{zn(j)}1≤N ,Υ(j), Ψ(j)
0≤j<i
(cid:105)
(cid:19)
Consider the filtration, {Fi}i≥0,
21
(101)
(102)
(103)
(104)
(105)
(106)
(107)
Clearly, under (D.1)-(D.3), the {x(i)}i≥0 generated by NU is Markov w.r.t. {Fi}i≥0, and the definition in (103)
renders the random family, {Γ (i + 1, x, ω)}x∈RNM , Fi+1 measurable, zero-mean, and independent of Fi for fixed
i + 1. Thus (B.1)-(B.2) of Theorem 29 are satisfied, and we have the following.
Proposition 16 (NU:Consistency/ asymp. normality) Let the sequence {x(i)}i≥0 be generated by NU. Let R (x) , Γ (i + 1, x, ω) ,Fi
be as in (102)-(103). Then, if there exists a function V (x) satisfying (B.3)-(B.4) at x∗ = 1N ⊗ θ∗, the estimate
sequence {xn(i)}i≥0 at any sensor n is consistent. In other words,
Pθ∗ [ lim
i→∞
xn(i) = θ∗, ∀n] = 1
If, in addition, (C.1)-(C.4) are satisfied, the sequence {xn(i)}i≥0 at any sensor n is asymptotically normal.
Proposition 16 states that, a.s. asymptotically, the network reaches consensus, and the estimates at each sensor
converge to the true value of the parameter vector θ(cid:63). The Proposition relates these convergence properties of NU to
the existence of suitable Lyapunov functions. For a particular observation model characterized by the corresponding
functions hn(·), gn(·), if one can come up with an appropriate Lyapunov function satisfying the assumptions
of Proposition 16, then consistency and asymptotic normality are guaranteed. Existence of a suitable Lyapunov
condition is sufficient for consistency, but may not be necessary. In particular, there may be observation models
for which the NU algorithm is consistent, but there exists no Lyapunov function satisfying the assumptions of
Proposition 16.9 Also, even if a suitable Lyapunov function exists, it may be difficult to guess its form, because
there is no systematic (constructive) way of coming up with Lyapunov functions for generic models.
However, for our problem of interest, some additional weak assumptions on the observation model, for example,
Lipschitz continuity of the functions hn(·), will guarantee the existence of suitable Lyapunov functions, thus
establishing convergence properties of the NU algorithm. The rest of this subsection studies this issue and presents
different sufficient conditions on the observation model, which guarantee that the assumptions of Proposition 16 are
satisfied, leading to the a.s. convergence of the NU algorithm. For the development in the rest of the subsection,
we assume that M = M in the decomposition (87) and Kn = IM for all n. The extensions of Theorems 18-19 to
M (cid:54)= M and arbitrary gains Kn are immediate. We start with the following definition:
Definition 17 (Consensus Subspace) We define the consensus subspace, C ⊂ RM N as
y ∈ RNM(cid:12)(cid:12)(cid:12) y = 1N ⊗(cid:101)y,(cid:101)y ∈ RM(cid:111)
(cid:110)
C =
For y ∈ RNM , we denote its component in C by yC and its orthogonal component by y⊥
C
algorithm (Assumptions (D.1)-(D.3)). Further, ∀θ (cid:54)=(cid:101)θ ∈ RM , 1 ≤ n ≤ N, let the functions hn(·) be:
Theorem 18 (NU:Consistency under Lipschitz on hn) Let {x(i)}i≥0 be the state sequence generated by the NU
1) Lipschitz continuous with constants kn > 0, i.e.,
.
(cid:107)hn(θ) − hn((cid:101)θ)(cid:107) ≤ kn(cid:107)θ −(cid:101)θ(cid:107)
9This is because converse theorems in stability theory do not hold in general, see, [52].
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 6, JUNE 2012
2)
Define K as
(cid:16)
(cid:17)T(cid:16)
θ −(cid:101)θ
hn(θ) − hn((cid:101)θ)
(cid:17) ≥ 0.
K = max(k1,··· , kN )
(cid:104)
Pθ∗
lim
i→∞
(cid:105)
xn(i) = θ∗, ∀n
= 1
Then, for every β > 0, the estimate sequence is consistent. In other words,
The proof is in Appendix B. The conditions in (107)-(108) are much easier to verify than guessing a Lyapunov
function. Also, as will be shown in the proof, the conditions in Theorem 18 determine a Lyapunov function explicitly,
which may be used to analyze properties like convergence rate. The Lipschitz assumption is quite common in the
stochastic approximation literature, while the assumption in (108) holds for a large class of functions. As a matter
of fact, in the one-dimensional case (M = 1), it is satisfied if the functions hn(·) are non-decreasing. Also, in
general, it can be shown from the proof (Appendix B) that the Lipschitz continuity assumption in Theorem 18
may be replaced by continuity of the functions hn(·), 1 ≤ n ≤ N, and linear growth conditions, i.e., for constants
cn,1, cn,2 > 0,
(cid:107)hn(θ)(cid:107)2≤cn,1+cn,2(cid:107)θ(cid:107)2,∀θ ∈ RM , 1 ≤ n ≤ N.
(111)
We now present another set of sufficient conditions that guarantee consistency of NU. If the observation model
is separably estimable, in some cases even if the underlying model is nonlinear, it may be possible to choose the
functions, gn(·), such that the function h(·) possesses nice properties. This is the next result.
Theorem 19 (NU:Consistency -- h strict monotonicity) Consider the NU algorithm (Assumptions (D.1)-(D.3)). Sup-
pose that the functions gn(·) can be chosen, such that the functions hn(·) are Lipschitz continuous with constants
kn > 0 and the function h(·) satisfies
(cid:16)
(cid:17)T(cid:16)
θ −(cid:101)θ
h(θ) − h((cid:101)θ)
(cid:17)≥γ(cid:107)θ −(cid:101)θ(cid:107)2, ∀θ,(cid:101)θ ∈ RM
22
(108)
(109)
(110)
(112)
(113)
for some constant γ > 0. Then, for
K = max(k1,··· , kN ),
if
the algorithm NU is consistent, i.e.,
Pθ∗
(cid:104)
β >
K 2 + Kγ
γλ2L
,
xn(i) = θ∗, ∀n
lim
i→∞
(cid:105)
= 1
The proof is provided in Appendix B. We comment that, in comparison to Theorem 18, strengthening the assumptions
on h(·), see (112), considerably weakens the assumptions on the functions hn(·). Eqn. (112) is an analog of strict
monotonicity. For example, if h(·) is linear, the left hand side of (112) becomes a quadratic and the condition says
that this quadratic is strictly away from zero, i.e., monotonically increasing with rate γ.
IV. NONLINEAR OBSERVATION MODELS: ALGORITHM NLU
In this Section, we present the algorithm NLU for distributed estimation in separably estimable observation
models. As explained later, this is a mixed time-scale algorithm, where the consensus time-scale dominates the
observation update time-scale as time progresses. The NLU algorithm is based on the fact that, for separably
estimable models, it suffices to know h(θ∗), because θ∗ can be unambiguously determined from the invertible
function h(θ∗). To be precise, if the function h(·) has a continuous inverse, then any iterative scheme converging to
h(θ∗) will lead to consistent estimates, obtained by inverting the sequence of iterates. The algorithm NLU is shown
to yield consistent and unbiased estimators at each sensor for any separably observable model, under the assumption
that the function h(·) has a continuous inverse. Thus, the algorithm NLU presents a more reliable alternative than
the algorithm NU, because, as shown in Section III-C, the convergence properties of the latter can be guaranteed
only under certain assumptions on the observation model. We briefly comment on the organization of this section.
The NLU algorithm for separably estimable observation models is presented in Section IV-A. Section IV-B offers
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 6, JUNE 2012
23
interpretations of the NLU algorithm and presents the main results regarding consistency, mean-square convergence,
asymptotic unbiasedness proved in the paper. In Section IV-C we prove the main results about the NLU algorithm
and provide insights behind the analysis (in particular, why standard stochastic approximation results cannot be
used directly to give its convergence properties.) Finally, Section V presents discussions on the NLU algorithm
and suggests future research directions.
A. Algorithm NLU
Algorithm NLU: Let x(0) = [xT
1 ··· xT
N ]T be the initial set of states (estimates) at the sensors. The NLU
generates the sequence {xn(i)} ∈ RM at the n-th sensor according to the distributed recursive scheme:
h(xn(i)) −
xn(i + 1) = h−1
(cid:88)
− β(i)
[h(xn(i)) − q (h(xl(i)) + νnl(i))]
l∈Ωn(i)
− α(i) [h(xn(i)) − gn(zn(i))]
based on the information,
xn(i),{q (h(xl(i)) + νnl(i))}l∈Ωn(i) , zn(i),
available to it at time i (we assume that at time i sensor l sends a quantized version of h(xl(i)) + νnl(i) to sensor
n.) Here h−1(·) denotes the inverse of the function h(·) and {β(i)}i≥0 ,{α(i)}i≥0 are appropriately chosen weight
sequences. In the sequel, we analyze the NLU algorithm under the model Assumptions (D.1)-(D.3), and in addition
we assume:
(D.4): There exists 1 > 0, such that, ∀θ ∈ U, the following moment exists:
(cid:104)(cid:107)J(z(i)) − P J(z(i))(cid:107)2+1(cid:105)
Eθ
= κ(θ) < ∞,
where J(z(i)) is defined in (99) and the matrix P is given by
(114)
(115)
(116)
(117)
(118)
(119)
(120)
P =
(1N ⊗ IM ) (1N ⊗ IM )T
(cid:0)1N 1T
N
(cid:1) ⊗ IM
1
N
1
N
=
= PN ⊗ IM
The above moment condition is slightly stronger than the moment assumption required by the NU algorithm in
(95), where only existence of the quadratic moment of the random variables gn(zn(i)) was assumed. For example,
for the models considered in Propositions 13-14, the above condition coincides with the existence of slightly higher
than quadratic moments of the observations zn(i). The latter is clearly justified for any reasonable observation
noise distribution.
We also define, ∀θ ∈ U:
(cid:104)(cid:107)J(z(i)) − P J(z(i))(cid:107)2(cid:105)
(D.5): The weight sequences {α(i)}i≥0, and {β(i)}i≥0 are given by
Eθ [(cid:107)J(z(i)) − P J(z(i))(cid:107)] = κ1(θ) < ∞
= κ2(θ) < ∞.
Eθ
(i + 1)τ1
where a, b > 0 are constants. We assume the following:
.5 < τ1, τ2 ≤ 1, τ1 >
α(i) =
, β(i) =
a
b
(i + 1)τ2
1
2 + 1
+ τ2, 2τ2 > τ1
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 6, JUNE 2012
24
We note that, under Assumption (D.4), 1 > 0, such weight sequences always exist. As an example, if
then the choice τ1 = 1 and τ2 = .505 satisfies the inequalities in (120).
To write the NLU in a more compact form, introduce the transformed state sequence, {(cid:101)x(i)}i≥0, where (cid:101)x(i) =
[(cid:101)xT
1 (i)···(cid:101)xT
N (i)]T ∈ RNM and the iterations are
= .49,
2+1
1
(cid:101)x(i + 1) =(cid:101)x(i) − β(i) (L(i) ⊗ IM )(cid:101)x(i)−
−α(i) [(cid:101)x(i) − J(z(i))] − β(i) (Υ(i) + Ψ(i))
(cid:104)(cid:0)h−1((cid:101)x1(i))(cid:1)T ···(cid:0)h−1((cid:101)xN (i))(cid:1)T(cid:105)T
(121)
x(i) =
(122)
Here Υ(i), Ψ(i) ∈ RNM model the dithered quantization error effects as in algorithm NU resulting from the
quantized transmissions in (114). The update model in (121) is a mixed time-scale procedure, where the consensus
time-scale is determined by the weight sequence {β(i)}i≥0. On the other hand, the observation update time-scale
is governed by the weight sequence {α(i)}i≥0. It follows from Assumption (D.5) that τ1 > τ2, which in turn
α(i) → ∞ as i → ∞. Thus, the consensus time-scale dominates the observation update time-scale as
implies, β(i)
the algorithm progresses making it a mixed time-scale algorithm that does not directly fall under the purview of
stochastic approximation results like Theorem 29. Also, the presence of the random link failures and quantization
noise (which operate at the same time-scale as the consensus update) precludes standard approaches like time-scale
separation for the limiting system.
Remark 20 We comment on the distributed implementation of the NLU. Based on (114) and (121)-(122), the
NLU may be implemented either in the estimate domain with {x(i)} as the algorithm state sequence or in the
require the sensors to store and transmit the instantaneous estimate xn(i), however, implementation of the update
involves computation of the functions h(xn(i)) followed by an inverse (h−1(·)) at every step. On the other hand,
the implementation in the transformed domain, (121)-(122), requires the sensors to store and transmit the states
transformed domain with {(cid:101)x(i)} as the state sequence. The implementation in the estimate domain, (114), would
(cid:101)xn(i). The advantage in the latter implementation form is that the transformed state update rule, (121), is linear in
the state(cid:101)x(i) and, in particular, does not require function computations and inverses at each step. (We note that the
computations, the NLU may be implemented in the transformed domain with(cid:101)xn(i) being the state at a sensor n.
inverse in (122) may not be implemented at all iterations and does not affect the propagation of the transformed
state sequence. In fact, (122) may be implemented only once to obtain the actual estimates from the transformed
state sequence when the latter converge based on a suitable stopping criterion.) Hence, in practice, to simplify
B. Algorithm NLU: Discussions and Main Results
We comment on the NLU algorithm. As is clear from (121)-(122), the NLU algorithm operates in a transformed
domain. As a matter of fact, the function h(·) (c.f. definition 11) can be viewed as an invertible transformation on
the parameter space U. The transformed state sequence, {(cid:101)x(i)}i≥0, is then a transformation of the estimate sequence
{x(i)}i≥0, and, as seen from (121), the evolution of the sequence {(cid:101)x(i)}i≥0 is linear. This is an important feature
of the NLU algorithm, which is linear in the transformed domain, although the underlying observation model is
nonlinear. Intuitively, this approach can be thought of as a distributed stochastic version of homomorphic filtering
(see [53]), where, by suitably transforming the state space, linear filtering is performed on a certain non-linear
problem of filtering. In our case, for models of the separably estimable type, the function h(·) then plays the
role of the analogous transformation in homomorphic filtering, and, in this transformed space, one can design
linear estimation algorithms with desirable properties. This makes the NLU algorithm significantly different from
algorithm NU, with the latter operating on the untransformed space and is non-linear. This linear property of the
NLU algorithm in the transformed domain leads to nice statistical properties (for example, consistency asymptotic
unbiasedness) under much weaker assumptions on the observation model than required by the nonlinear NU
algorithm, but not asymptotic normality.
We now state the main results about the NLU algorithm developed in the paper. We show that, if the observation
model is separably estimable, then, in the transformed domain, the NLU algorithm is consistent. More specifically,
mean-squared sense to h(θ∗). We note that, unlike the NU algorithm, this only requires the observation model to
be separably estimable and no other conditions on the functions hn(·), h(·). We summarize these in the following
theorem.
if θ∗ is the true (but unknown) parameter value, then the transformed sequence {(cid:101)x(i)}i≥0 converges a.s. and in
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 6, JUNE 2012
Theorem 21 Consider the NLU algorithm under the Assumptions (D.1)-(D.5), and the sequence {(cid:101)x(i)}i≥0 gener-
ated according to (121). We then have
25
(cid:104)
Pθ∗
lim
i→∞
lim
i→∞
Eθ∗
(cid:105)
(cid:101)xn(i) = h(θ∗), ∀1 ≤ n ≤ N
(cid:104)(cid:107)(cid:101)xn(i) − h(θ∗)(cid:107)2(cid:105)
Eθ∗ [(cid:101)xn(i)] = h(θ∗), ∀1 ≤ n ≤ N
= 0, ∀1 ≤ n ≤ N
= 1
(123)
(124)
(cid:104)
Pθ∗
lim
i→∞
lim
i→∞
In particular,
In other words, in the transformed domain, the estimate sequence {(cid:101)xn(i)}i≥0 at sensor n, is consistent, asymptot-
lim
i→∞
(125)
ically unbiased and converges in mean-squared sense to h(θ∗).
As an immediate consequence of Theorem 21, we have the following result, which characterizes the statistical
properties of the untransformed state sequence {x(i)}i≥0.
Theorem 22 Consider the NLU algorithm under the Assumptions (D.1)-(D.5). Let {x(i)}i≥0 be the state sequence
generated, as given by (121)-(122). We then have
(cid:105)
xn(i) = θ∗, ∀ 1 ≤ n ≤ N
= 1
(126)
In other words, the NLU algorithm is consistent.
If in addition, the function h−1(·) is Lipschitz continuous, the NLU algorithm is asymptotically unbiased, i.e.,
(127)
Eθ∗ [xn(i)] = θ∗, ∀ 1 ≤ n ≤ N
The next subsection is concerned with the proofs of Theorems 21, 22.
C. Consistency and Asymptotic Unbiasedness of NLU: Proofs of Theorems 21,22
The present subsection is devoted to proving the consistency and unbiasedness of the NLU algorithm under
the stated Assumptions. The proof is lengthy and we start by explaining why standard stochastic approximation
results like Theorem 29 do not apply directly. A careful inspection shows that there are essentially two different
time-scales embedded in (121). The consensus time-scale is determined by the weight sequence {β(i)}i≥0, whereas
the observation update time-scale is governed by the weight sequence {α(i)}i≥0. It follows from Assumption (D.5)
α(i) → ∞ as i → ∞. Thus, the consensus time-scale dominates the observation
that τ1 > τ2, which, in turn, implies β(i)
update time-scale as the algorithm progresses making it a mixed time-scale algorithm that does not directly fall
under the purview of stochastic approximation results like Theorem 29. Also, the presence of the random link
failures and quantization noise (which operate at the same time-scale as the consensus update) precludes standard
approaches like time-scale separation for the limiting system.
Finally, we note that standard stochastic approximation assumes that the state evolution follows a stable deter-
ministic system perturbed by zero-mean stochastic noise. More specifically, if {y(i)}i≥0 is the sequence of interest,
Theorem 29 assumes that {y(i)}i≥0 evolves as
(128)
where {γ(i)}i≥0 is the weight sequence, Γ(i + 1, ω, y(i)) is the zero-mean noise. If the sequence {y(i)}i≥0 is
supposed to converge to y0, it further assumes that R(y0) = 0 and y0 is a stable equilibrium of the deterministic
system
y(i + 1)=y(i) + γ(i)[R(y(i))+Γ(i + 1, ω, y(i))]
yd(i + 1) = yd(i) + γ(i)R(yd(i))
(129)
The NU algorithm (and its linear version, LU) falls under the purview of this, and we can establish convergence
properties using standard stochastic approximation (see Sections II,III-B.) However, the NLU algorithm cannot
be represented in the form of (128), even ignoring the presence of multiple time-scales. Indeed, as established by
stochastically perturbed system around 1N ⊗ h(θ∗) we have
Theorem 21, the sequence {(cid:101)x(i)}i≥0 is supposed to converge to 1N ⊗ h(θ∗) a.s. and hence writing (121) as a
(cid:101)x(i + 1) =(cid:101)x(i) + γ(i) [R((cid:101)x(i)) + Γ(i + 1, ω,(cid:101)x(i))]
(130)
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 6, JUNE 2012
26
where,
R((cid:101)x(i)) = −β(i)(cid:0)L ⊗ IM
Γ(i + 1, ω,(cid:101)x(i)) = −β(i)
(cid:1) ((cid:101)x(i) − 1N ⊗ h(θ∗))−
− α(i) ((cid:101)x(i) − 1N ⊗ h(θ∗))
(cid:16)(cid:101)L(i) ⊗ IM
((cid:101)x(i)−
(cid:17)
−1N ⊗ h(θ∗)) − β(i) (Υ(i) + Ψ(i)) +
+ α(i) (J(z(i)) − 1N ⊗ h(θ∗))
Although, R(1N ⊗ h(θ∗)) = 0 in the above decomposition, the noise Γ(i + 1, ω,(cid:101)x(i)) is not unbiased as the term
(J(z(i)) − 1N ⊗ h(θ∗)) is not zero-mean.
With the above discussion in mind, we proceed to the proof of Theorems 21,22, which we develop in stages.
(131)
(132)
(cid:1)(cid:98)x(i)−
(cid:1)(cid:101)x◦(i)−
The detailed proofs of the intermediate results are provided in Appendix F.
− α(i) [(cid:101)x◦(i) − J(z(i))]
quantization noises Υ(i) and Ψ(i) are not included. In other words, in the absence of link failures and quantization,
(cid:101)x◦(i + 1) =(cid:101)x◦(i) − β(i)(cid:0)L ⊗ IM
sequence, {(cid:101)x◦(i)}i≥0:
In parallel to the evolution of the state sequence {x(i)}i≥0, we consider the following update of the auxiliary
with (cid:101)x◦(0) = (cid:101)x(0). Note that in (131) the random Laplacian L is replaced by the average Laplacian L and the
the recursion (121) reduces to (131), i.e., the sequences {(cid:101)x(i)}i≥0 and {(cid:101)x◦(i)}i≥0 are the same.
sequence {(cid:98)x(i)}i≥0 given by (cid:98)x(i + 1) =(cid:98)x(i) − β(i)(cid:0)L ⊗ IM
with (cid:98)x(0) = (cid:101)x(0). Like before, the recursions (121,122) will reduce to (132) when there are no link failures.
quantizing (cid:101)x(i) in (121) and not from quantizing (cid:98)x(i) in (132).
Now consider the sequence whose recursion adds as input to the recursion in (131) the quantization noises Υ(i)
and Ψ(i). In other words, in the absence of link failures, but with quantization included, define similarly the
− α(i) [(cid:98)x(i) − J(z(i))] − β(i) (Υ(i) + Ψ(i))
However, notice that in (132) the quantization noise sequences Υ(i) and Ψ(i) are the sequences resulting from
(1N ⊗ IM )T(cid:101)x(i)
Define the instantaneous averages over the network as
N(cid:88)
N(cid:88)
N(cid:88)
N(cid:88)
we first show that the average sequence, (cid:8)(cid:101)x◦avg(i)(cid:9)
standard stochastic approximation arguments. Then we show that the sequence {(cid:101)x◦(i)}i≥0 reaches consensus a.s.,
that the sequence {(cid:101)x(i)}i≥0 also reaches consensus a.s. with h(θ∗) as the limiting consensus value.
(I): The first step consists of studying the convergence properties of the sequence (cid:8)(cid:101)x◦avg(i)(cid:9)
and clearly the limiting consensus value must be h(θ∗). Intuitively, the a.s. consensus comes from the fact that,
after a sufficiently large number of iterations, the consensus effect dominates over the observation update effect,
thus asymptotically leading to consensus. The final step in the proof uses a series of comparison arguments to show
We sketch the main steps of the proof here. While proving consistency and mean-squared sense convergence,
, converges a.s. to h(θ∗). This can be done by invoking
We now detail the proofs of Theorems 21,22 in the following steps.
(1N ⊗ IM )T(cid:101)x◦(i)
x◦avg(i) =
(cid:101)x◦avg(i) =
x◦n(i) =
(cid:101)x◦n(i) =
xavg(i) =
(cid:101)xavg(i) =
xn(i) =
(cid:101)xn(i) =
(1N ⊗ IM )T x◦(i)
(1N ⊗ IM )T x(i)
1
N
1
N
1
N
1
N
, see (131), for
1
N
1
N
1
N
1
N
(133)
n=1
n=1
n=1
n=1
i≥0
i≥0
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 6, JUNE 2012
which we establish the following result.
Lemma 23 Consider the sequence, {(cid:101)x◦(i)}i≥0, given by (131), under the Assumptions (D.1)-(D.5). Then,
(cid:104)
(cid:105)
(cid:101)x◦(i) = 1N ⊗ h(θ∗)
(cid:104)(cid:107)(cid:101)x◦(i) − 1N ⊗ h(θ∗)(cid:107)2(cid:105)
lim
i→∞
Pθ∗
Eθ∗
= 1
lim
i→∞
Lemma 23 says that the sequence {(cid:101)x◦(i)}i≥0 converges a.s. and in L2 to 1N ⊗ h(θ∗). For proving Lemma 23
we first consider the corresponding average sequence {(cid:101)x◦avg(i)}i≥0, see (133). For the sequence {(cid:101)x◦avg(i)}i≥0, we
Lemma 24 Consider the sequence,(cid:8)(cid:101)x◦avg(i)(cid:9)
(cid:104)
can invoke stochastic approximation algorithms to prove that it converges a.s. and in L2 to h(θ∗). This is carried
out in Lemma 24, which we state now.
, given by (133), under the Assumptions (D.1)-(D.5). Then,
= 0
i≥0
(135)
= 1
(136)
(cid:105)
(cid:101)x◦avg(i) = h(θ∗)
(cid:104)(cid:13)(cid:13)(cid:101)x◦avg(i) − h(θ∗)(cid:13)(cid:13)2(cid:105)
lim
i→∞
Pθ∗
Eθ∗
lim
i→∞
= 0
(137)
The arguments in Lemmas 24,23 and subsequent results require the following property of real number sequences,
which we state here (see Appendix C for proof.)
Lemma 25 Let the sequences {r1(i)}i≥0 and {r2(i)}i≥0 be given by
(138)
where a1, a2, δ2 ≥ 0 and 0 ≤ δ1 ≤ 1. Then, if δ1 = δ2, there exists B > 0, such that, for sufficiently large
non-negative integers, j < i,
, r2(i) =
(i + 1)δ1
(i + 1)δ2
r1(i) =
a1
a2
27
(134)
(139)
(140)
(cid:34)(cid:32) i−1(cid:89)
0 ≤ i−1(cid:88)
(cid:34)(cid:32) i−1(cid:89)
i−1(cid:88)
k=j
l=k+1
(1 − r1(l))
r2(k)
≤ B
(cid:33)
(cid:33)
(cid:35)
(cid:35)
Moreover, the constant B can be chosen independently of i, j. Also, if δ1 < δ2, then, for arbitrary fixed j,
(We use the convention that,(cid:81)i−1
lim
i→∞
k=j
l=k+1
l=k+1 (1 − rl) = 1, for k = i − 1.)
(1 − r1(l))
r2(k)
= 0
We note that Lemma 25 essentially studies stability of time-varying deterministic scalar recursions of the form:
y(i + 1) = r1(i)y(i) + r2(i)
(141)
where {y(i)}i≥0 is a scalar sequence evolving according to (141) with y(0) = 0, and the sequences {r1(i)}i≥0
and {r2(i)}i≥0 are given by (138).
(II): In this step, we study the convergence properties of the sequence {(cid:98)x(i)}i≥0, see (132), for which we establish
Lemma 26 Consider the sequence {(cid:98)x(i)}i≥0 given by (132) under the Assumptions (D.1)-(D.5). We have
the following result.
(cid:104)
(cid:105)
(cid:98)x(i) = 1N ⊗ h(θ∗)
(cid:104)(cid:107)(cid:98)x(i) − 1N ⊗ h(θ∗)(cid:107)2(cid:105)
lim
i→∞
Pθ∗
Eθ∗
= 1
= 0
(142)
(143)
The proof of Lemma 26 is given in Appendix E, and mainly consists of a comparison argument involving the
sequences(cid:8)(cid:101)x◦avg(i)(cid:9)
lim
i→∞
and {(cid:98)x(i)}i≥0.
i≥0
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 6, JUNE 2012
28
(III): This is the final step in the proofs of Theorems 21,22. The proof of Theorem 21 consists of a comparison
argument between the sequences {(cid:98)x(i)}i≥0 and {(cid:101)x(i)}i≥0, which is detailed in Appendix F. The proof of
Theorem 22, also detailed in Appendix F, is a consequence of Theorem 21 and the Assumptions.
D. Application: Distributed Static Phase Estimation in Smart Grids
In this subsection we show that our development of the NLU for separably estimable observation models
leads to a completely distributed solution of the static phase estimation problem in smart grids. We briefly review
the application scenario in the following, for a more complete treatment of the classical problem of static phase
estimation in power grids the reader is referred to one of the many existing excellent textbooks, for example, [54].
For our purpose, we may assume the power grid to be a physical network of N generators and loads (hereafter
called nodes), interconnected through transmission lines. The physical grid may then be modeled as a network
Gp = (V, Ep), where10 Ep denotes the set of transmission lines or interconnections. The physical state of a node
n consists of the pair (Vn, θn), denoting the voltage magnitude and the phase angle respectively. The real power
flowing through the transmission line connecting nodes n and l is then given by (see [55])
Pnl =V 2
nanl−VnVlanl cos(θnl) + VnVlbnl sin(θnl)
(144)
where anl + jbnl is the complex line admittance and θnl = θn − θl. In view of the physical network structure, the
following assumptions on the physical grid are supposed to hold:
(P.1) The physical grid, represented by the graph (V, Ep), is connected. This is reasonable, as the physical power
grid is often studied with aggregated models that have dense interconnections, see, for example, the benchmark
IEEE 30 bus and IEEE 118 bus systems ([55]).
(P.2) The real and imaginary parts, anl, bnl, of the line admittance are taken to be zero, if no direct physical
connection (link) exists between the nodes n and l. Similarly, if nodes n and l are connected by a transmission
line, we assume both the components anl, bnl, of the line admittance to be non-zero. In particular, from (144),
the real power flow Pnl between nodes n and l is non-zero iff
there exists a physical transmission line
connecting the nodes. Also, Vn (cid:54)= 0 for all n.
In the following, we will assume that the node voltages are known constants and the unknown parameter of interest
is the vector of node phases θ = [θ1,··· , θN ]T . This is justified by the common assumption of phase-voltage
decoupling in power grids, where the voltage magnitude is generally seen to fluctuate at a much slower time-scale
than the phase (see [54]). Also, to keep the exposition simple, we assume that the node phase differences are small,
i.e., cos(θnl) ≈ 1, commonly used in the steady state grid operating regime ([54]). With these simplifications, the
real power flow in a transmission line connecting nodes n and l is approximately given by
Pnl(θ) = VnVlbnl sin(θnl)
(145)
The goal of centralized static phase estimation is to estimate the unknown vector θ of phases by using line flow data.
Since, only relative quantities (phase differences) are involved in this problem, it is customary to assume (see [55])
that one of the nodes is a slack (or reference) bus, whose phase is a known constant. W.l.o.g. we assume that node
N is the slack bus in our system, whose phase angle θN is a known constant. Hence, the effective parameter vector
is θ = [θ1,··· , θN−1]T ∈ RN−1. We now provide conditions for the distributed observation model (148) to be
separably estimable. We show that our NLU algorithm can be used to obtain a distributed solution to this problem,
leading to a consistent estimate of θ at each sensor. To setup the distributed observation model, let Em ⊂ Ep denote
the set of physical transmission lines equipped with power flow measuring devices (usually some form of relays,
see [55].) The successive power flow measurements, {znl(i)} at the physical line (n, l) (assuming (n, l) ∈ Em) are
then noisy versions of the power flow Pnl, i.e.,
znl(i) = Pnl(θ) + ζnl(i)
= VnVlbnl sin(θnl) + ζnl(i)
(146)
10Note that the physical connections Ep and the inter-node communication links E (to be used by the distributed information processing
algorithms) are, in general, different. This is a common feature of cyberphysical architectures, where a sensor network is instrumented on
top of an existing physical infrastructure. In the following, we will assume that each physical node is equipped with a sensor for information
processing, although the inter-sensor communication topology may be different from the physical inter-node connections. Also, the terms nodes
and sensors will be used synonymously in the sequel.
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 6, JUNE 2012
29
where, {ζnl(i)} is the zero mean i.i.d. measurement noise. For distributed information processing, we assume that
the measurement sequence {znl(i)} is forwarded to one of the adjacent nodes n or l. As will be seen, the particular
choice of n or l is not important, as long as it stays constant for all i. In general, denoting by Ωm
n to be the set of
physical neighbors of node n w.r.t. the physical graph (V, Em), let Mn ⊂ Ωm
n denote the set such that l ∈ Mn if
the line flow data {znl(i)} is forwarded to node n. The observation sequence, {zn(i)}, is then
zn(i) = {znl(i), ∀ l ∈ Mn}
(147)
By (146)-(147) and the development in Section III-A, the above distributed observation model corresponds to the
signal in additive noise type. Following the notation in Section III-A, the observation process {zn(i)} may be
written as
(148)
where fn : U (cid:55)−→ RMn and ζn(i) are given by
zn(i) = fn(θ) + ζn(i)
fn(θ) = [VnVlbnl sin(θnl), l ∈ Mn]T
ζn(i) = [ζnl, l ∈ Mn]T .
(149)
f (θ)=[f T
n=1 Mn by
1 (θ)··· f T
N (θ)]T=[Pnl(θ), (n, l)∈ Em]T.
n=1 [0, π/2) or ×N−1
We now provide conditions for the distributed observation model (148) to be separably estimable.
Proposition 27 Depending on the phase θN of the reference bus N (as to whether θN ∈ [0, π/2) or θN ∈
f : U (cid:55)−→ R(cid:80)N
[−π/4, π/4)), let the parameter domain U ⊂ RN−1 be either ×N−1
n=1 [−π/4, π/4). Define, ∀θ ∈ U,
(150)
Then, if the graph (V, Em) (with Em as the edge set) is connected and assumption (P.2) holds, f (·) is invertible
on U and the observation model (148) is separably estimable.
Before proceeding to the proof we comment on Proposition 27. The observation model in (148) is of the signal
in additive noise type and hence, by the development in Section III-A, the invertibility of f (·) is equivalent to
separable estimability and necessary for the consistency or observability of the centralized estimator also (see the
text following Proposition 13.) Proposition 27 shows that the invertibility of f (·) holds if the graph formed by the
physical transmission links equipped with power flow measuring devices is connected.
Proof: The proof is based on a simple inductive argument. First, we note that the continuity of f (·) on U holds
trivially. To establish the invertibility of f (·) on U, it suffices to show that we can uniquely recover the value of
θ ∈ U given the value f (θ). To this end, assume that f (θ) is given. Recall the form of f (θ), as in (150). Since, θN
is known, given f (θ), the components θn, n ∈ Ωm
N may be uniquely determined. Indeed, knowing f (θ) amounts
N . Hence, under assumption (P.2), and the fact that θ ∈ U, we
to knowing the values of the quantities Pn,N , n ∈ Ωm
can uniquely determine θn, n ∈ Ωm
N . Once the components
n for each n ∈ J1 may be uniquely
θn, n ∈ J1 are known, by using similar reasoning, the components θl, l ∈ Ωm
determined. Hence, in the second step, the set of known components J2 ⊂ V is
N . To continue the induction, define J1 ⊂ V by J1 = Ωm
Continuing the same recursion, the set of components known at the k-th step, Jk is given by
J2 = {l ∈ Ωm
n n ∈ J1}
Jk = {l ∈ Ωm
n n ∈ Jk−1}
Note that J1 ⊂ J2 ⊂ ··· ⊂ Jk ⊂ ··· . However, the number of nodes is finite; hence, the sets Jk cannot increase
forever. Due to the connectivity of the graph (V, Em) in a finite number of steps k0 (at most equal to the diameter
of the graph), the process will converge with Jk0 = V . Hence, all components of θ will be uniquely determined,
establishing the invertibility of f (·).
The following result demonstrates the applicability of the NLU to distributed consistent phase estimation in
power grids. It follows from Theorem 22.
Theorem 28 Consider the power grid described above and let the observation process {zn(i)} at the n-th node
(sensor) be given by (148). Let the measurement noise process {ζ(i)} satisfy the moment conditions (D.4) and
the physical grid conditions in the hypothesis of Proposition 27 hold. Suppose the nodes are instrumented with a
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 6, JUNE 2012
30
communication architecture satisfying assumptions (D.2)-(D.3). Let {xn(i)} be the estimate sequence of the vector
θ∗ of phase angles generated at node n by an instantiation of the NLU distributed parameter estimation algorithm
under assumption (D.5). Then,
Pθ∗ (xn(i) = θ∗, ∀n) = 1, ∀ θ∗ ∈ U
(151)
V. CONCLUSION
This paper studies linear and nonlinear distributed (vector) parameter estimation problems as may arise in
constrained sensor networks. Our problem statement is quite general, including communication among sensors that
is quantized, noisy, and with channels that fail at random times. These are characteristic of packet communication
in wireless sensor networks. We introduce a generic observability condition, the separable estimability condition,
that generalizes to distributed estimation the general observability condition of centralized parameter estimation.
We study three recursive distributed estimators, ALU, NU, and NLU. We study their asymptotic properties,
namely: consistency, asymptotic unbiasedness, and for the ALU and NU algorithms their asymptotic normality. The
NLU works in a transformed domain where the recursion is actually linear, and a final nonlinear transformation,
justified by the separable estimability condition, recovers the parameter estimate (a stochastic generalization of
homeomorphic filtering.) For example, Theorem 21 shows that, in the transformed domain, the NLU leads to
consistent and asymptotically unbiased estimators at every sensor for all separably estimable observation models
satisfying (D.4)11. Since, the function h(·) is invertible, for practical purposes, a knowledge of h(θ∗) is sufficient for
knowing θ∗. In that respect, the algorithm NLU is much more applicable than the algorithm NU, which requires
further assumptions on the observation model for the existence of consistent and asymptotically unbiased estimators.
However, in case, the algorithm NU is applicable, it provides convergence rate guarantees (for example, asymptotic
normality) that follow from standard stochastic approximation theory. On the other hand, the algorithm NLU does
not fall under the purview of standard stochastic approximation theory (see Section IV-C) and hence does not inherit
these convergence rate properties. In this paper, we presented a convergence theory of the three algorithms under
broad conditions. An interesting future research direction is to establish a convergence rate theory for the NLU
algorithm (and in general, distributed stochastic algorithms of this form, which involve mixed time-scale behavior
and biased perturbations.)
APPENDIX A
SOME RESULTS ON STOCHASTIC APPROXIMATION
We present some classical results on stochastic approximation from [56] regarding the convergence properties of generic
stochastic recursive procedures, which will be used to characterize the convergence properties (consistency, convergence rate)
of the LU algorithm.
Theorem 29 Let(cid:8)x(i) ∈ Rl(cid:9)
i≥0 be a random sequence:
x(i + 1) = x(i) + α(i) [R(x(i)) + Γ (i + 1, x(i), ω)]
(152)
where, R(·) : Rl (cid:55)−→ Rl is Borel measurable and {Γ(i, x, ω)}i≥0, x∈Rl is a family of random vectors in Rl, defined on a
probability space (Ω,F,P), and ω ∈ Ω is a canonical element. Let the following sets of assumptions hold:
(B.1): The function Γ(i,·,·) : Rl × Ω −→ Rl is Bl ⊗ F measurable for every i; Bl is the Borel algebra of Rl.
(B.2): There exists a filtration {Fi}i≥0 of F, such that, for each i, the family of random vectors {Γ (i, x, ω)}x∈Rl is Fi
measurable, zero-mean and independent of Fi−1.
(If Assumptions (B.1)-(B.2) hold, {x(i)}i≥0, is Markov.)
(B.3): There exists a function V (x) ∈ C2 with bounded second order partial derivatives and a point x∗ ∈ Rl satisfying:
∗
) = 0, V (x) > 0, x (cid:54)= x
∗
,
V (x
lim(cid:107)x(cid:107)→∞ V (x) = ∞,
(R (x) , Vx (x)) < 0, ∀ > 0
sup
<(cid:107)x−x∗(cid:107)< 1
11The NLU requires a slightly stronger moment condition, Assumption (D.4). However, for reasonable observation noise statistics arising in
practice, this assumption is justified.
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 6, JUNE 2012
31
where Vx (x) denotes the gradient (vector) of V (·) at x.
(B.4): There exist constants k1, k2 > 0, such that,
(cid:107)R (x)(cid:107)2 + E(cid:2)(cid:107)Γ (i + 1, x, ω)(cid:107)2(cid:3) ≤ k1 (1 + V (x))−
(B.5): The weight sequence {α(i)}i≥0 satisfies
α(i) > 0,
(C.1): The function R (x) admits the representation
− k2 (R (x) , Vx (x))
(cid:88)
i≥0
αi = ∞,
(cid:88)
i≥0
α2(i) < ∞
R (x) = B (x − x
∗
) + δ (x)
where
lim
x→x∗
(Note, in particular, if δ (x) ≡ 0, then (155) is satisfied.)
(C.2): The weight sequence, {α(i)}i≥0 is of the form,
(cid:107)δ (x)(cid:107)
(cid:107)x − x∗(cid:107) = 0
α(i) =
, ∀i ≥ 0
a
i + 1
(153)
(154)
(155)
(156)
where a > 0 is a constant (note that (C.2) implies (B.5)).
(C.3): Let I be the l × l identity matrix and a, B as in (156) and (154), respectively. Then, the matrix Σ = aB + 1
(C.4): The entries of the matrices, ∀i ≥ 0, x ∈ Rl,
2 I is stable.
A (i, x) = E(cid:104)
Γ (i + 1, x, ω) ΓT (i + 1, x, ω)
,
(cid:105)
R→∞ sup
lim
(cid:107)x−x∗(cid:107)<
sup
i≥0
(cid:107)Γ (i + 1, x, ω)(cid:107)2 dP = 0
(cid:107)Γ(i+1,x,ω)(cid:107)>R
(157)
Let Assumptions (B.1)-(B.5) hold for {x(i)}i≥0 in (152). Then, starting from an arbitrary initial state, the Markov process,
are finite, and the following limit exists:
(C.5): There exists > 0, such that
Then we have the following:
{x(i)}i≥0, converges a.s. to x∗. In other words,
(cid:110)√
(cid:111)
The normalized process,
i≥0
(C.5) are also satisfied. In particular, as i → ∞
i (x(i) − x∗)
i→∞, x→x∗ A (i, x) = S0
lim
(cid:90)
P(cid:104)
∗(cid:105)
√
i (x(i) − x
∗
) =⇒ N (0, S)
lim
i→∞ x(i) = x
= 1
(158)
, is asymptotically normal if, besides Assumptions (B.1)-(B.5), Assumptions (C.1)-
where =⇒ denotes convergence in distribution (weak convergence.) Also, the asymptotic variance, S, in (159) is
(cid:90) ∞
S = a2
eΣvS0eΣT vdv
Proof: For a proof see [56] (c.f. Theorems 4.4.4, 6.6.1).APPENDIX B
0
PROOFS OF THEOREMS 18,19
Proof of Theorem 18
(159)
(160)
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 6, JUNE 2012
32
Proof: We noted the recursive scheme (97) satisfies Assumptions (B.1)-(B.2) of Theorem 29. To prove consistency, we
verify Assumptions (B.3)-(B.4). Let the Lyapunov function
V (x) = (cid:107)x − 1N ⊗ θ
∗(cid:107)2
Clearly,
V (1N ⊗ θ
∗
) = 0, V (x) > 0, x (cid:54)= 1N ⊗ θ
∗
, lim(cid:107)x(cid:107)→∞ V (x) = ∞
By Assumptions (107)-(108), h(·) is Lipschitz continuous and
(cid:16)
θ −(cid:101)θ
(cid:17)T(cid:16)
(cid:17)
> 0, ∀ θ (cid:54)=(cid:101)θ ∈ RM
where (162) follows from the invertibility of h(·) and
h(θ) − h((cid:101)θ)
N(cid:88)
1
N
n=1
h (θ) =
hn (θ) , ∀ θ ∈ RM
Recall R (x) , Γ (i + 1, x, ω) in (102)-(103). Then
(R (x) , Vx (x)) =
− 2β (x − 1N ⊗ θ
− 2 (x − 1N ⊗ θ
∗
)T(cid:0)L ⊗ IM
= −2β (x − 1N ⊗ θ
∗
N(cid:88)
(cid:104)
− 2
(xn − θ
∗
∗
)
)T(cid:0)L ⊗ IM
(cid:1) (x − 1N ⊗ θ
∗
)T [M (x) − M (1N ⊗ θ
)−
(cid:1) (x − 1N ⊗ θ
(cid:105) ≤ 0
)T (hn(xn) − hn(θ
))
)]
∗
∗
∗
where the last step follows from the positive-semidefiniteness of L ⊗ IM and (108). To verify Assumption (B.3), show
n=1
Assume, on the contrary, (165) not satisfied. Then from (164)
sup
<(cid:107)x−1N θ∗(cid:107)< 1
(R (x) , Vx (x)) < 0, ∀ > 0
, such that
(cid:17)
k≥0 has a limit point,(cid:98)x, such that ≤ (cid:107)(cid:101)x−1N θ∗(cid:107) ≤ 1
= 0
(167)
,
(161)
(162)
(163)
(164)
(165)
(166)
(168)
(169)
(170)
(171)
(172)
Then, there exists a sequence,(cid:8)xk(cid:9)
Since(cid:8)x ∈ RNM < (cid:107)x − 1N θ∗(cid:107) < 1
k≥0 in
and, by continuity of (R (x) , Vx (x)):
From (108) and (164), we then have
(R (x) , Vx (x)) = 0, ∀ > 0
(cid:111)
<(cid:107)x−1N θ∗(cid:107)< 1
sup
(cid:16)
lim
k→∞
R(xk), Vx(xk)
x ∈ RNM(cid:12)(cid:12)(cid:12) < (cid:107)x − 1N θ∗(cid:107) < 1
(cid:110)
(cid:9) is relatively compact,(cid:8)xk(cid:9)
(R((cid:101)x), Vx((cid:101)x)) = 0
)T(cid:0)L ⊗ IM
(cid:1) ((cid:101)x − 1N ⊗ θ
)T (hn((cid:101)xn) − hn(θ
((cid:101)xn − θ
(cid:101)xn = a, ∀n
∗
∗
∗
((cid:101)x − 1N ⊗ θ
∗
) = 0,
)) = 0, ∀n
The inequalities in (170) then imply
(a − θ
∗
)T (h(a) − h(θ
∗
)) = 0
The equality in (169) and the properties of the Laplacian imply that (cid:101)x ∈ C and hence there exists a ∈ RM , such that,
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 6, JUNE 2012
33
which is a contradiction by (162) since a (cid:54)= θ∗. Thus, we have (165) that verifies Assumption (B.3). Finally, we note that,
(cid:107)R (x)(cid:107)2 =(cid:13)(cid:13)β(cid:0)L ⊗ IM
≤ 4β2(cid:13)(cid:13)(cid:0)L ⊗ IM
(cid:1) (x − 1N ⊗ θ
(cid:1) (x − 1N ⊗ θ
)(cid:13)(cid:13)2
+
∗
∗
) +
))(cid:13)(cid:13)2
∗
(173)
+ (M (x) − M (1N ⊗ θ
≤ 4β2λN (L)(cid:107)x − 1N ⊗ θ
+ 4(cid:107)M (x) − M (1N ⊗ θ
)(cid:107)2
∗
∗(cid:107)2 + 4K 2(cid:107)x − 1N ⊗ θ
∗(cid:107)2
where the second step follows from the Lipschitz continuity of hn(·) and K is defined in (109). To verify Assumption (B.4),
we have then along similar lines as in Theorem 7
(cid:107)R (x)(cid:107)2 + E(cid:2)(cid:107)Γ (i + 1, x, ω)(cid:107)2(cid:3) ≤ k1(1 + V (x))
(174)
≤ k1(1 + V (x)) − (R (x) , Vx (x))
for a constant k1 > 0 (the last step follows from (164).) Hence, the assumptions are satisfied and the claim follows.
Proof of Theorem 19
Proof: The recursive scheme in (97) satisfies Assumptions (B.1)-(B.2) of Theorem 29. To prove consistency, we verify
Assumptions (B.3)-(B.4). Consider the Lyapunov function
V (x) = (cid:107)x − 1N ⊗ θ
∗(cid:107)2
(175)
Clearly,
V (1N ⊗ θ
∗
) = 0, V (x) > 0, x (cid:54)= 1N ⊗ θ
∗
, lim(cid:107)x(cid:107)→∞V (x) = ∞
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 6, JUNE 2012
Recall the definitions of R (x) , Γ (i + 1, x, ω) in (102)-(103), and the consensus subspace in (106). We then have
(R (x) , Vx (x)) =
)T(cid:0)L ⊗ IM
(cid:1) (x − 1N ⊗ θ
− 2β (x − 1N ⊗ θ
∗
∗
)−
− 2 (x − 1N ⊗ θ
∗
)T [M (x) − M (1N ⊗ θ
∗
)]
34
(176)
≤ −2βλ2(L)(cid:107)xC⊥(cid:107)2−
− 2 (x − 1N ⊗ θ
∗
≤ −2βλ2(L)(cid:107)xC⊥(cid:107)2+
− 2 (x − 1N ⊗ θ
∗
(cid:13)(cid:13)(cid:13)(x − 1N ⊗ θ
+ 2
− 2 (x − 1N ⊗ θ
∗
)T [M (x) − M (xC)]
∗
)T [M (xC) − M (1N ⊗ θ
)]
∗
)T [M (x) − M (xC)]
)T [M (xC) − M (1N ⊗ θ
∗
)]
≤ −2βλ2(L)(cid:107)xC⊥(cid:107)2 + 2K(cid:107)xC⊥(cid:107)(cid:107)x − 1N ⊗ θ
∗(cid:107)
− 2 (x − 1N ⊗ θ
∗
)T [M (xC) − M (1N ⊗ θ
∗(cid:107)−
∗
)]
= −2βλ2(L)(cid:107)xC⊥(cid:107)2 + 2K(cid:107)xC⊥(cid:107)(cid:107)x − 1N ⊗ θ
− 2xTC⊥ [M (xC) − M (1N ⊗ θ
)]
∗
− 2 (xC − 1N ⊗ θ
≤ −2βλ2(L)(cid:107)xC⊥(cid:107)2 + 2K(cid:107)xC⊥(cid:107)(cid:107)x − 1N ⊗ θ
∗
)T [M (xC) − M (1N ⊗ θ
∗(cid:107)+
∗
(cid:13)(cid:13)(cid:13)xTC⊥ [M (xC) − M (1N ⊗ θ
2
− 2 (xC − 1N ⊗ θ
∗
)T [M (xC) − M (1N ⊗ θ
∗(cid:107)+
∗(cid:107) − 2γ (cid:107)xC − 1N ⊗ θ
∗(cid:107)2
≤ −2βλ2(L)(cid:107)xC⊥(cid:107)2 + 2K(cid:107)xC⊥(cid:107)(cid:107)x − 1N ⊗ θ
+ 2K(cid:107)xC⊥(cid:107)(cid:107)xC − 1N ⊗ θ
=(cid:0)−2βλ2(L) + 2K(cid:1)(cid:107)xC⊥(cid:107)2+
(cid:13)(cid:13)(cid:13)
∗
)]
(cid:13)(cid:13)(cid:13)
)]
∗
)]
+ 4K(cid:107)xC⊥(cid:107)(cid:107)xC − 1N ⊗ θ
∗(cid:107) − 2γ (cid:107)xC − 1N ⊗ θ
∗(cid:107)2
where the second to last step is justified because xC = 1N ⊗(cid:101)y for some (cid:101)y ∈ RM and
)T [hn((cid:101)y) − hn(θ
)T [M (xC) − M (1N ⊗ θ
(xC − 1N ⊗ θ
((cid:101)y − θ
)] =
∗
∗
∗
N(cid:88)
N(cid:88)
[hn((cid:101)y) − hn(θ
)T [h((cid:101)y) − h(θ
n=1
n=1
∗
∗
= ((cid:101)y − θ
= N ((cid:101)y − θ
)T
∗
= γ (cid:107)xC − 1N ⊗ θ
∗(cid:107)2
∗
)]
)] ≥ N γ (cid:107)(cid:101)y − θ
∗(cid:107)2
(177)
∗
)]
It can be shown that, if β > K2+Kγ
γλ2L
, the term on the R.H.S. of (176) is always non-positive. We thus have
By the continuity of (R (x) , Vx (x)) and the relative compactness of
similar lines as in Theorem 18 that
(R (x) , Vx (x)) ≤ 0, ∀x ∈ RM N
x ∈ RNM(cid:12)(cid:12)(cid:12) < (cid:107)x − 1N θ∗(cid:107) < 1
(cid:110)
sup
<(cid:107)x−1N θ∗(cid:107)< 1
(R (x) , Vx (x)) < 0, ∀ > 0
(cid:111)
(178)
, we can show along
(179)
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 6, JUNE 2012
35
verifying Assumption (B.3). Assumption (B.4) is verified in similar manner to Theorem 18 and the result follows.
(180)
(181)
(182)
(183)
(184)
APPENDIX C
PROOF OF LEMMA 25
Proof of Lemma 25: We prove for the case δ1 < 1 first. Consider j sufficiently large, such that,
Then, for k ≥ j, using 1 − a ≤ e−a, 0 ≤ a ≤ 1:
i−1(cid:89)
l=k+1
r1(i) ≤ 1, ∀i ≥ j
(1 − r1(l)) ≤ e
−(cid:80)i−1
l=k+1 r1(l)
It follows from the properties of the Riemann integral that
i−1(cid:88)
l=k+1
r1(l) =
l=k+1
a1
(l + 1)δ1
i−1(cid:88)
(cid:90) i+1
(cid:104)
(i + 1)1−δ1 − (k + 2)1−δ1(cid:105)
(cid:33)
1
tδ1
a1
1 − δ1
k+2
dt
≥ a1
=
(cid:35)
(k+2)1−δ1(cid:105)
≤
r2(l)
a2
(k + 1)δ2
(1 − r1(l))
(i+1)1−δ1
a1
1−δ1
e
i−1(cid:88)
(cid:20)
k=j
− a1
1−δ1
a2e
(i+1)1−δ1
a1
1−δ1
e
(k+2)1−δ1
1
(k + 1)δ2
We thus have from (181)-(182)
i−1(cid:88)
i−1(cid:88)
k=j
k=j
(cid:34)(cid:32) i−1(cid:89)
(cid:104)
− a1
1−δ1
e
l=k+1
=
(cid:21)
(cid:35)
(cid:21)
From properties of Riemann integration, for j large enough:
(cid:21)
≤
(cid:20)
i−1(cid:88)
(k+2)1−δ1
1
a1
1−δ1
e
(k + 1)δ2
(cid:34)
i−1(cid:88)
k=j
(k+2)1−δ1
a1
1−δ1
e
(cid:20)
a1
1−δ1
k1−δ1 1
kδ2
e
(i+1)1−δ1
1
k=j
(cid:20)
i−1(cid:88)
i+1(cid:88)
k=j
= 2δ2
= 2δ2
k=j+2
= 2δ2 e
a1
1−δ1
(k+2)1−δ1
a1
1−δ1
e
1
( k
2 + 1)δ2
(cid:21)
(k + 2)δ2
1
(cid:21)
(i + 1)δ2
+ 2δ2
+
i(cid:88)
(cid:20)
a1
1−δ1
e
k1−δ1 1
kδ2
k=j+2
≤ 2δ2 e
a1
1−δ1
(i+1)1−δ1
1
(i + 1)δ2
+ 2δ2
+
(cid:90) i+1
j+2
(cid:20)
a1
1−δ1
e
t1−δ1 1
tδ2
(cid:21)
dt
36
(185)
(186)
(cid:90) i+1
(cid:20)
a1
1−δ1
e
j+2
a1
1−δ1
e
t1−δ1 1
tδ2
(cid:21)
(cid:21)
t1−δ1 1
tδ1
tδ2−δ1
(i+1)1−δ1
a1
1−δ1
e
= a1
(cid:90) i+1
(cid:20)
j+2
= a1
(cid:34)(cid:32) i−1(cid:89)
i−1(cid:88)
(1 − r1(l))
r2(i)
=
(cid:35)
(cid:33)
i−1(cid:88)
(cid:20)
k=j
l=k+1
− a1
1−δ1
a2e
(i+1)1−δ1
k=j
(i+1)1−δ1 1
a1
1−δ1
≤ 2δ2 a2e
dt + C1
dt + C1
(cid:21)
1
a1
1−δ1
e
(k+2)1−δ1
(cid:104)
(cid:82) i+1
j+2
e
(k + 1)δ2
t1−δ1 1
tδ2
a1
1−δ1
≤
(cid:105)
dt
2δ2 a2
(i+1)δ2
a1
1−δ1
(cid:82) i+1
e
j+2
(cid:104)
(cid:82) i+1
e
j+2
a1
1−δ1
a1
1−δ1
e
2δ2 a2
(cid:82) i+1
(cid:104)
j+2
e
(cid:104)
+2δ2 a2
(i+1)1−δ1
t1−δ1 1
tδ2
a1
1−δ1
(i+1)1−δ1
(cid:105)
dt
(cid:105)
t1−δ1 1
tδ2
tδ2−δ1
e
a1
1−δ1
t1−δ1 1
tδ2
(cid:105)
dt
dt + C1
=
2δ2 a2
(i + 1)δ2
≤ 2δ2 a2
(i + 1)δ2
+
+
a1
(cid:34)(cid:32) i−1(cid:89)
i−1(cid:88)
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 6, JUNE 2012
Again by the fundamental theorem of calculus,
where C1 = C1(j) > 0 for sufficiently large j. From (184)-(185) we have
The second term stays bounded if δ1 = δ2 and goes to zero as i → ∞ if δ1 < δ2, thus establishing the Lemma for the case
δ1 < 1. Also, in the case δ1 = δ2, we have from (186):
(1 − r1(l))
r2(i)
≤ 2δ2 a2
(i + 1)δ2
+
(187)
(cid:35)
(cid:33)
(cid:104)(cid:82) i+1
j+2
2δ2 a2
a1
(cid:104)
k=j
l=k+1
+
a1 + C1
≤ 2δ2 a2 +
2δ2 a2
a1
1−δ1
e
t1−δ1 1
tδ2
(cid:105)
(cid:105)−1
dt
thus making the choice of B in (139) independent of i, j.
Now consider the case δ1 = 1. Consider j sufficiently large, such that,
r1(i) ≤ 1, ∀i ≥ j
(188)
Using a similar set of manipulations for k ≥ j, we have
i−1(cid:89)
l=k+1
(1 − r1(l)) ≤ e
1
l+1
l=k+1
−a1
−a1
(cid:80)i−1
(cid:82) i+1
−a1ln( i+1
k+2 )
(k + 2)a1
(i + 1)a1
k+2
1
t dt
≤ e
= e
=
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 6, JUNE 2012
37
We thus have
(cid:34)(cid:32) i−1(cid:89)
i−1(cid:88)
k=j
l=k+1
(cid:33)
(1 − r1(l))
(cid:35)
r2(i)
≤
a2
(i + 1)a1
≤ 2δ2 a2
(i + 1)a1
=
2δ2 a2
(i + 1)a1
k=j
i−1(cid:88)
i−1(cid:88)
i+1(cid:88)
k=j
(k + 2)a1
(k + 1)δ2
(k + 2)a1
(k + 2)δ2
ka1
kδ2
k=j+2
Now, if a1 ≥ δ2, then
(cid:34)(cid:32) i−1(cid:89)
i−1(cid:88)
(cid:33)
(cid:35)
≤
(189)
(1 − r1(l))
r2(i)
k=j+2
ka1−δ2
i+1(cid:88)
(i + 1)a1−δ2 +
(cid:20)
(i + 1)a1−δ2 +
k=j
l=k+1
≤ 2δ2 a2
(i + 1)a1
=
2δ2 a2
(i + 1)a1
≤ 2δ2 a2
(i + 1)a1
i(cid:88)
(cid:90) i+1
k=j+2
(cid:21)
ka1−δ2
ta1−δ2 dt
=
2δ2 a2
(i + 1)δ2
+
2δ2 a2
a − δ2 + 1
j+2
(i + 1)a−δ2+1 − (j + 2)a−δ2+1
(i + 1)a1
The second term is bounded if δ2 = 1 and vanishes if δ2 > 1. If a1 < δ2 is resolved similarly.
APPENDIX D
PROOFS OF LEMMAS 24,23
Proof of Lemma 24
Proof: It follows from (131) and (133), and the fact that
that the evolution of the sequence,(cid:8)(cid:101)x◦
avg(i)(cid:9)
(cid:101)x
avg(i + 1) =(cid:101)x
We note that (191) can be written as(cid:101)x
avg(i+1) =(cid:101)x
◦
◦
i≥0 is given by
(cid:1) = 0
N(cid:88)
(1N ⊗ IM )T(cid:0)L ⊗ IM
(cid:34)(cid:101)x
avg(i)− 1
◦
N
avg(i)+α(i)(cid:2)R((cid:101)x
avg(i))+Γ(i+1,(cid:101)x
avg(i)−α(i)
◦
n=1
◦
◦
(cid:35)
gn(zn(i))
avg(i), ω)(cid:3)
◦
where
R(y) = − (y − h(θ
∗
)) ,
N(cid:88)
n=1
Γ(i + 1, y, ω) =
1
N
gn(zn(i)) − h(θ
∗
), y ∈ RM
Such a definition of R(·), Γ(·) clearly satisfies Assumptions (B.1)-(B.2) of Theorem 29. Now, defining
V (y) = (cid:107)y − h(θ
∗
)(cid:107)2
we have
V (h(θ
∗
)) = 0,V (y) > 0,y (cid:54)= h(θ
∗
), lim(cid:107)y(cid:107)→∞V (y) = ∞
(190)
(191)
(192)
(193)
(194)
(195)
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 6, JUNE 2012
Also, we have for > 0
sup
<(cid:107)y−h(θ∗)(cid:107)< 1
(R(y), Vy(y)) =
=
sup
<(cid:107)y−h(θ∗)(cid:107)< 1
≤ −22
< 0
(cid:0)−2(cid:107)y − h(θ
∗
)(cid:107)2(cid:1)
thus verifying Assumption (B.3). Finally from (95) and (192)-(193), we have
(cid:107)R(y)(cid:107)2 + Eθ∗(cid:2)(cid:107)Γ(i + 1, y, ω)(cid:107)2(cid:3) =
∗
∗
)(cid:107)2 + η(θ
= (cid:107)y − h(θ
≤ k1(1 + V (y))
≤ k1(1 + V (y)) − (R(y), Vy(y))
)
for k1 = max(1, η(θ∗)). Thus the Assumptions (B.1)-(B.4) are satisfied, and we have the claim in (136).
To establish (137), we note that, for sufficiently large i,
(cid:104)(cid:13)(cid:13)(cid:101)x
Eθ∗
)(cid:13)(cid:13)2(cid:105)
∗
avg(i) − h(θ
◦
=
= (1 − α(i − 1))2Eθ∗
avg(i − 1) − h(θ
◦
(cid:104)(cid:13)(cid:13)(cid:101)x
(cid:104)(cid:13)(cid:13)(cid:101)x
+ α2(i − 1)η(θ
∗
)
+ α2(i − 1)η(θ
∗
)
+
∗
)(cid:13)(cid:13)2(cid:105)
)(cid:13)(cid:13)2(cid:105)
+
≤ (1 − α(i − 1))Eθ∗
avg(i − 1) − h(θ
◦
∗
38
(196)
(197)
(198)
where the last step follows from the fact that 0 ≤ (1 − α(i)) ≤ 1 for sufficiently large i. Continuing the recursion in (198), we
have for sufficiently large j ≤ i
k=j α(k) → ∞ as i → ∞ because 0.5 < τ1 ≤ 1. Thus, the first term in (199) goes
to zero as i → ∞. The second term in (199) falls under the purview of Lemma 25 with δ1 = τ1 and δ2 = 2τ1 and hence goes
to zero as i → ∞. We thus have
Eθ∗
avg(i) − h(θ
◦
∗
= 0
(200)
)(cid:13)(cid:13)2(cid:105)
(cid:104)(cid:13)(cid:13)(cid:101)x
lim
i→∞
Proof of Lemma 23
≤
Eθ∗
i−1(cid:89)
≤(cid:16)
From Assumption (D.5), we note that(cid:80)i−1
k=j
e
(cid:104)(cid:13)(cid:13)(cid:101)x
avg(i) − h(θ
◦
∗
(1 − α(k))
)(cid:13)(cid:13)2(cid:105) ≤
(cid:13)(cid:13)(cid:101)x
(cid:34)(cid:32) i−1(cid:89)
i−1(cid:88)
k=j α(k)(cid:17)(cid:13)(cid:13)(cid:101)x
−(cid:80)i−1
(cid:34)(cid:32) i−1(cid:89)
i−1(cid:88)
+ η(θ
k=j
∗
∗
)
+ η(θ
)
k=0
l=k+1
avg(0) − h(θ
◦
∗
)(cid:13)(cid:13)2 +
(cid:33)
)(cid:13)(cid:13)2 +
(cid:33)
(199)
(cid:35)
(cid:35)
(1 − α(l))
α2(k)
(1 − α(l))
α2(k)
l=k+1
avg(0) − h(θ
◦
∗
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 6, JUNE 2012
Proof: Recall from (131) and (191) that the evolution of the sequences {(cid:101)x◦(i)}i≥0 and(cid:8)(cid:101)x◦
avg(i)(cid:9)
i≥0 are given by
◦
(i + 1) =(cid:101)x
(cid:101)x
avg(i + 1) =(cid:101)x
◦
(cid:101)x
(cid:104)
Pθ∗
lim
i→∞
◦
◦
(i)−
(cid:1)(cid:101)x
(i) − β(i)(cid:0)L ⊗ IM
− α(i) [(cid:101)x(i) − J(z(i))]
avg(i)−
◦
N(cid:88)
avg(i)(cid:1)(cid:13)(cid:13) = 0
(cid:34)(cid:101)x
(i) −(cid:0)1N ⊗(cid:101)x
avg(i) − 1
◦
N
− α(i)
n=1
◦
◦
(cid:13)(cid:13)(cid:101)x
(cid:35)
gn(zn(i))
(cid:105)
= 1
(1N ⊗ IM ) (1N ⊗ IM )T
1
N
◦
◦
◦
(i) = 1N ⊗(cid:101)x
(i + 1) −(cid:0)1N ⊗(cid:101)x
=(cid:2)INM − β(i)(cid:0)L ⊗ IM
avg(i), P 1N ⊗(cid:101)x
avg(i) = 1N ⊗(cid:101)x
avg(i + 1)(cid:1) =
(cid:1) − α(i)INM − P(cid:3) [(cid:101)x
−(cid:0)1N ⊗(cid:101)x
◦
◦
◦
avg(i),∀i
◦
(i)−
◦
avg(i)(cid:1)(cid:3)
+ α(i) [J(z(i)) − P J(z(i))]
To establish the claim (134), Lemma 23, we prove
Recall the matrix
P =
and note that
P(cid:101)x
From (201)-(202), we then have (cid:101)x
Choose δ satisfying
0 < δ < τ1 − 1
2 + 1
− τ2.
Such a choice exists by Assumption (D.5). Now claim:
lim
i→∞
1
(i + 1)
1
2+1
+δ
(cid:107)J(z(i)) − P J(z(i))(cid:107) = 0
Indeed, consider any > 0. We then have from Assumption (D.4) and Chebyshev's inequality
(cid:107)J(z(i)) − P J(z(i))(cid:107) >
≤
1
Pθ∗
1
+δ
2+1
(i + 1)
≤(cid:88)
(cid:2)(cid:107)J(z(i)) − P J(z(i))(cid:107)2+1(cid:3)=
1
(i + 1)1+δ(2+1)2+1
1
(i + 1)1+δ(2+1)
i≥0
κ(θ∗)
2+1
(cid:88)
i≥0
< ∞
39
(201)
(202)
(203)
(204)
(205)
(206)
(207)
(208)
(cid:34)
Pθ∗
(cid:88)
i≥0
Eθ
(cid:34)
(cid:34)
(cid:35)
= 1
(cid:35)
(cid:35)
= 0
It then follows from the Borel-Cantelli Lemma (see [50]) that for arbitrary > 0
Pθ∗
1
(i + 1)
1
2+1
+δ
(cid:107)J(z(i)) − P J(z(i))(cid:107) > i.o.
Pθ∗ [Ω2] = 1, where the sequence(cid:8)(cid:101)x◦
where i.o. stands for infinitely often. Since the above holds for arbitrarily small, we have (see [50]) the a.s. claim in (207).
Consider the set Ω1 ⊂ Ω with Pθ∗ [Ω1] = 1, where the a.s. property in (207) holds. Also, consider the set Ω2 ⊂ Ω with
now show that, on Ω3, the sample paths of the sequence {(cid:101)x◦(i)}i≥0 converge to (1N ⊗ h(θ∗)), thus proving the Lemma. In
i≥0 converges to h(θ∗). Let Ω3 = Ω1 ∩ Ω2. It is clear that Pθ∗ [Ω3] = 1. We will
avg(i)(cid:9)
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 6, JUNE 2012
40
the following we index the sample paths by ω to emphasize the fact that we are establishing properties pathwise.
From (205), we have on ω ∈ Ω3(cid:13)(cid:13)(cid:101)x
◦
(i + 1, ω) −(cid:0)1N ⊗(cid:101)x
≤(cid:13)(cid:13)I − β(i)(cid:0)L ⊗ IM
◦
avg(i + 1, ω)(cid:1)(cid:13)(cid:13) ≤
(cid:1) − α(i)INM − P(cid:13)(cid:13)
(cid:13)(cid:13)(cid:101)x
(i, ω) −(cid:0)1N ⊗(cid:101)x
◦
For sufficiently large i, we have
From (208) for ω ∈ Ω3 we can choose > 0 and j(ω) such that ∀i ≥ j(ω)
Let j(ω) be sufficiently large such that (209) is also satisfied in addition to (210). We then have for ω ∈ Ω3, i ≥ j(ω)
◦
avg(i, ω)(cid:1)(cid:13)(cid:13)
(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)
−δ
(i + 1)τ1− 1
1
2+1
(i + 1)
1
2+1
+δ
[J(z(i, ω)) − P J(z(i, ω))]
(cid:1)−α(i)INM − P(cid:13)(cid:13) ≤ 1 − β(i)λ2(L)
(cid:13)(cid:13)(cid:13)(cid:13)(cid:13) ≤ .
[J(z(i, ω)) − P J(z(i, ω))]
◦
◦
avg(i, ω)(cid:1)(cid:13)(cid:13) ≤
(cid:0)1 − β(k)λ2(L)(cid:1)(cid:107)(cid:101)x
−(cid:0)1N ⊗(cid:101)x
(cid:0)1 − β(l)λ2(L)(cid:1)(cid:33)
(cid:34)(cid:32) i−1(cid:89)
(cid:0)1 − β(k)λ2(L)(cid:1) ≤ e
l=k+1
−λ2(L)(cid:80)i−1
−bλ2(L)(cid:80)i−1
(j(ω), ω)−
avg(j(ω), ω)(cid:1)(cid:13)(cid:13) +
(cid:35)
◦
1
(k + 1)τ1− 1
2+1
−δ
k=j(ω)
= e
k=j(ω)
1
(k+1)τ2
a
+
(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)
(cid:13)(cid:13)I−β(i)(cid:0)L ⊗ IM
(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)
(i, ω) −(cid:0)1N ⊗(cid:101)x
i−1(cid:89)
i−1(cid:88)
(i + 1)
k=j(ω)
2+1
+δ
1
◦
1
(cid:13)(cid:13)(cid:101)x
≤
+ a
k=j(ω)
i−1(cid:89)
(209)
(210)
(211)
For the first term on the R.H.S. of (211) we note that
k=j(ω)
β(k)
(212)
which goes to zero as i → ∞ since τ2 < 1 by Assumption (D.5). Hence the first term on the R.H.S. of (211) goes to zero
as i → ∞. The summation in the second term on the R.H.S. of (211) falls under the purview of Lemma 25 with δ1 = τ2
− δ. It follows from the choice of δ in (206) and Assumption (D.5) that δ1 < δ2 and hence the term
and δ2 = τ1 − 1
(cid:80)i−1
(cid:34)(cid:16)(cid:81)i−1
2+1
(cid:0)1 − β(l)λ2(L)(cid:1)(cid:17)
k=j(ω)
l=k+1
→ 0 as i → ∞. We then conclude from (211) that, for ω ∈ Ω3
(cid:35)
(i, ω) −(cid:0)1N ⊗(cid:101)x
−δ
1
(cid:13)(cid:13)(cid:101)x
◦
τ1− 1
2+1
(k+1)
lim
i→∞
avg(i, ω)(cid:1)(cid:13)(cid:13) = 0
◦
(213)
The Lemma then follows from the fact that Pθ∗ [Ω3] = 1.
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 6, JUNE 2012
41
To establish (135), we have from (205)
Taking expectations on both sides and from (117)
◦
◦
◦
◦
◦
◦
(cid:13)(cid:13)(cid:101)x
+ α2(i)(cid:107)J(z(i)) − P J(z(i))(cid:107)2
avg(i + 1)(cid:1)(cid:13)(cid:13)2 ≤
(i + 1) −(cid:0)1N ⊗(cid:101)x
≤(cid:13)(cid:13)I − β(i)(cid:0)L ⊗ IM
(cid:1) − α(i)INM − P(cid:13)(cid:13)2
avg(i)(cid:1)(cid:13)(cid:13)2 +
(cid:13)(cid:13)(cid:101)x
(i) −(cid:0)1N ⊗(cid:101)x
+ 2α(i)(cid:13)(cid:13)I − β(i)(cid:0)L ⊗ IM
(cid:1) − α(i)INM − P(cid:13)(cid:13)
avg(i)(cid:1)(cid:13)(cid:13)(cid:107)J(z(i)) − P J(z(i))(cid:107) +
(cid:13)(cid:13)(cid:101)x
(i) −(cid:0)1N ⊗(cid:101)x
avg(i + 1)(cid:1)(cid:13)(cid:13)2(cid:105) ≤
(cid:104)(cid:13)(cid:13)(cid:101)x
(i + 1) −(cid:0)1N ⊗(cid:101)x
≤(cid:13)(cid:13)I − β(i)(cid:0)L ⊗ IM
(cid:1) − α(i)INM − P(cid:13)(cid:13)2
(cid:104)(cid:13)(cid:13)(cid:101)x
avg(i)(cid:1)(cid:13)(cid:13)2(cid:105)
(i) −(cid:0)1N ⊗(cid:101)x
(cid:1) − α(i)INM − P(cid:13)(cid:13) κ1 (θ
+ 2α(i)(cid:13)(cid:13)I − β(i)(cid:0)L ⊗ IM
(cid:104)(cid:13)(cid:13)(cid:101)x
avg(i)(cid:1)(cid:13)(cid:13)2(cid:105)
(i) −(cid:0)1N ⊗(cid:101)x
(cid:1) − α(i)INM − P(cid:13)(cid:13) κ1 (θ
+ 2α(i)(cid:13)(cid:13)I − β(i)(cid:0)L ⊗ IM
Eθ∗
Eθ∗
∗
◦
◦
◦
◦
◦
◦
∗
Eθ∗
+ α2(i)κ2(θ
+
)
+
) +
∗
)
where we used the inequality that ∀i(cid:13)(cid:13)(cid:101)x
Choose j sufficiently large such that ∀i ≥ j
For i ≥ j, it can be shown that, for c1 > 0 a constant:
◦
◦
(i)−(cid:0)1N ⊗(cid:101)x
avg(i)(cid:1)(cid:13)(cid:13)≤(cid:13)(cid:13)(cid:101)x
avg(i)(cid:1)(cid:13)(cid:13)2+1.
(cid:1) − α(i)INM − P(cid:13)(cid:13) 1 − β(i)λ2(L).
◦
◦
(i)−(cid:0)1N ⊗(cid:101)x
(cid:13)(cid:13)I − β(i)(cid:0)L ⊗ IM
(cid:104)(cid:13)(cid:13)(cid:101)x
(i + 1) −(cid:0)1N ⊗(cid:101)x
≤(cid:2)1 − β(i)λ2(L) + 2α(i)κ1(θ
(cid:104)(cid:13)(cid:13)(cid:101)x
(i) −(cid:0)1N ⊗(cid:101)x
Eθ∗
Eθ∗
◦
◦
◦
avg(i + 1)(cid:1)(cid:13)(cid:13)2(cid:105) ≤
)(cid:3)
avg(i)(cid:1)(cid:13)(cid:13)2(cid:105)
∗
◦
+ α(i)c1.
Now choose j1 ≥ j and 0 < c2 < λ2(L)12 such that,
1 − β(i)λ2(L) + 2α(i)κ1(θ
∗
) ≤ 1 − β(i)c2, ∀i ≥ j1
Then the claim in (135) follows because for i ≥ j1
Eθ∗
(cid:104)(cid:13)(cid:13)(cid:101)x
i−1(cid:89)
k=j1
◦
◦
avg(i)(cid:1)(cid:13)(cid:13)2(cid:105) ≤
(i) −(cid:0)1N ⊗(cid:101)x
Eθ∗
(cid:104)(cid:13)(cid:13)(cid:101)x
(cid:34)(cid:32) i−1(cid:89)
i−1(cid:88)
(1 − β(k)c2)
◦
+ c1
(j1) −(cid:0)1N ⊗(cid:101)x
◦
avg(j)(cid:1)(cid:13)(cid:13)2(cid:105)
(cid:33)
(cid:35)
+
(1 − β(l)c2)
α(k)
12Such a choice exists because τ1 > τ2.
k=j1
l=k+1
(214)
(215)
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 6, JUNE 2012
42
and the first and second terms on the R.H.S. of (214) vanish as i → ∞ by the argument in (212) and Lemma 25, respectively.
APPENDIX E
PROOF OF LEMMA 26
Proof of Lemma 26: From (131) and (132) we have
(cid:98)x(i + 1) −(cid:101)x
◦
(i + 1) =(cid:2)INM − β(i)(cid:0)L ⊗ IM
(cid:1)−
− α(i)INM
(i)] − β(i) (Υ(i) + Ψ(i))
For sufficiently large j, we have
We then have from (216), for i ≥ j,
◦
◦
(cid:13)(cid:13) ≤ 1 − α(i),∀i ≥ j
(cid:3) [(cid:98)x(i) −(cid:101)x
(cid:1) − α(i)INM
(i + 1)(cid:107)2(cid:105) ≤
(i)(cid:107)2(cid:105)
(cid:104)(cid:107)(cid:98)x(i) −(cid:101)x
+ β2(i)Eθ∗(cid:2)(cid:107)Υ(i) + Ψ(i)(cid:107)2(cid:3)
(cid:104)(cid:107)(cid:98)x(i) −(cid:101)x
(i)(cid:107)2(cid:105)
(cid:107)(cid:98)x(j) −(cid:101)x
i−1(cid:89)
(cid:35)
(cid:33)
(cid:34)(cid:32) i−1(cid:89)
(1 − α(k))
+ ηqβ2(i)
k=j
+
◦
◦
◦
(1 − α(l))
β2(k)
(j)(cid:107)2+
(cid:13)(cid:13)I − β(i)(cid:0)L ⊗ IM
(cid:104)(cid:107)(cid:98)x(i + 1) −(cid:101)x
Eθ∗
≤ (1 − α(i))2 Eθ∗
≤ (1 − α(i)) Eθ∗
(cid:104)(cid:107)(cid:98)x(i) −(cid:101)x
◦
Eθ∗
(i)(cid:107)2(cid:105)≤
i−1(cid:88)
+ ηq
(216)
(217)
(218)
(219)
(220)
where the last step follows from the fact that 0 ≤ (1 − α(i)) ≤ 1 for i ≥ j and (16). Continuing the recursion, we have
The first and second terms on the R.H.S. of (220) vanish as i → ∞, respectively because 1) of an argument similar to the proof
of Lemma 24, and 2) by Lemma 25, with δ1 = τ1, δ2 = 2τ2, since by Assumption (D.5), 2τ2 > τ1. Thus:
which shows that the sequence {(cid:107)(cid:98)x(i) −(cid:101)x◦(i)(cid:107)}i≥0 converges to 0 in L2 (mean-squared sense). We then have from Lemma 23
= 0
(221)
k=j
l=k+1
◦
Eθ∗
lim
i→∞
(cid:104)(cid:107)(cid:98)x(i) −(cid:101)x
(i)(cid:107)2(cid:105)
(cid:104)(cid:107)(cid:98)x(i) − 1N ⊗ h(θ
)(cid:107)2(cid:105) ≤
(cid:104)(cid:107)(cid:98)x(i) −(cid:101)x
(i)(cid:107)2(cid:105)
(cid:104)(cid:107)(cid:101)x
+ 2 lim
i→∞
Eθ∗
Eθ∗
∗
◦
◦
≤ 2 lim
i→∞
+
Eθ∗
lim
i→∞
(222)
)(cid:107)2(cid:105)
∗
= 0
(i) − 1N ⊗ h(θ
thus establishing the claim in (143).
We now show that the sequence {(cid:107)(cid:98)x(i) −(cid:101)x◦(i)(cid:107)}i≥0 also converges a.s. to a finite random variable. Choose j sufficiently
43
(223)
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 6, JUNE 2012
large as in (217). We then have from (216)
◦
(i) =
(cid:98)x(i) −(cid:101)x
i−1(cid:89)
(cid:0)INM − β(k)(cid:0)L ⊗ IM
(cid:34)(cid:32) i−1(cid:89)
− i−1(cid:88)
k=j
(cid:0)INM − β(l)(cid:0)L ⊗ IM
k=j
l=k+1
(cid:34)(cid:32) i−1(cid:89)
− i−1(cid:88)
k=j
l=k+1
(cid:0)INM − β(l)(cid:0)L ⊗ IM
(j))−
◦
(cid:1) − α(k)I(cid:1)((cid:98)x(j) −(cid:101)x
(cid:1) − α(l)I(cid:1)(cid:33)
(cid:1) − α(l)I(cid:1)(cid:33)
β(k)Υ(k)
−
(cid:35)
(cid:35)
β(k)Ψ(k)
The first term on the R.H.S. of (223) converges a.s. to zero as i → ∞ by a similar argument as in the proof of Lemma 24.
Since the sequence {Υ(i)}i≥0 is i.i.d., the second term is a weighted summation of independent random vectors. Define the
triangular array of weight matrices, {Ai,k, j ≤ k ≤ i − 1}i>j, by
l=k+1
i−1(cid:89)
(cid:0)INM − β(l)(cid:0)L ⊗ IM
(cid:0)INM − β(l)(cid:0)L ⊗ IM
Ai,k =
(cid:34)(cid:32) i−1(cid:89)
k=j
l=k+1
(cid:1) − α(l)I(cid:1) β(k)
(cid:1) − α(l)I(cid:1)(cid:33)
(cid:35)
i−1(cid:88)
β(k)Υ(k)
=
Ai,kΥ(k)
k=j
i−1(cid:88)
k=j
(cid:107)Ai,k(cid:107)2 ≤
≤ lim sup
i→∞
(cid:34)(cid:32) i−1(cid:89)
i−1(cid:88)
k=j
l=k+1
(cid:33)
(1 − α(l))
(cid:35)
β2(k)
= 0
sup
i>j
i−1(cid:88)
k=j
(cid:107)Ai,k(cid:107)2 = C3 < ∞
(224)
(225)
(226)
(227)
We then have
i−1(cid:88)
By Lemma 25 and Assumption (D.5) we note that
lim sup
i→∞
It then follows that
(cid:110)(cid:80)i−1
(cid:111)
The sequence
weighted summations of independent random vectors (see [57], [58], [59]).
k=j Ai,kΥ(k)
i>j
then converges a.s. to a finite random vector by standard results from the limit theory of
In a similar way, the last term on the R.H.S of (223) converges a.s. to a finite random vector since by the properties of
dither the sequence {Ψ(i)}i≥0 is i.i.d. It then follows from (223) that the sequence {(cid:98)x(i) −(cid:101)x◦(i)}i≥0 converges a.s. to a
finite random vector, which in turn implies that the sequence {(cid:107)(cid:98)x(i) −(cid:101)x◦(i)(cid:107)}i≥0 converges a.s. to a finite random variable.
However, we have already shown that the sequence {(cid:107)(cid:98)x(i) −(cid:101)x◦(i)(cid:107)}i≥0 converges in mean-squared sense to 0. It then follows
from the uniqueness of the mean-squared and a.s. limit, that the sequence {(cid:107)(cid:98)x(i) −(cid:101)x◦(i)(cid:107)}i≥0 converges a.s. to 0. In other
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 6, JUNE 2012
words,
(cid:104)
i→∞(cid:107)(cid:98)x(i) −(cid:101)x
lim
◦
Pθ∗
(cid:105)
(i)(cid:107) = 0
= 1
The claim in (142) then follows from (228) and Lemma 23.
APPENDIX F
PROOFS OF THEOREMS 21,22
Proof of Theorem 21
Proof: Recall the evolution of the sequences {(cid:101)x(i)}i≥0, {(cid:98)x(i)}i≥0 in (121) and (132).
Then writing L(i) = L +(cid:101)L(i) and using the fact that
(cid:17)(cid:98)xC⊥ (i), ∀i
(cid:17)(cid:98)x(i) =
(cid:16)(cid:101)L(i) ⊗ IM
we have from (121) and (132) (cid:101)x(i + 1) −(cid:98)x(i + 1) = [INM − β(i) (L(i) ⊗ IM )−
(cid:16)(cid:101)L(i) ⊗ IM
(cid:16)(cid:101)L(i) ⊗ IM
(cid:17)(cid:98)xC⊥ (i)
44
(228)
(229)
(230)
− β(i)
(231)
(232)
lim
i→∞ y(i) = 0
= 1
To prove (123), it clearly suffices (from Lemma 26) to prove
For ease of notation, introduce the sequence {y(i)}i≥0, given by
y(i + 1) =(cid:2)INM − β(i)(cid:0)L ⊗ IM
−α(i)INM ] ((cid:101)x(i) −(cid:98)x(i)) − β(i)
y(i) =(cid:101)x(i) −(cid:98)x(i)
(cid:105)
(cid:104)
Pθ∗
From (230), the evolution of the sequence {y(i)}i≥0 is:
(cid:1) − α(i)INM
(cid:17)
(cid:16)(cid:101)L(i) ⊗ IM
(cid:16)(cid:101)L(i) ⊗ IM
(cid:17)(cid:98)xC⊥ (i). However, from Lemma 26:
The sequence {y(i)}i≥0 is not uniformly bounded, in general, because of β(i)
(cid:105)
(cid:104)
i→∞(cid:98)xC⊥ (i) = 0
and, hence, asymptotically, its effect diminishes. However, {(cid:98)xC⊥ (i)}i≥0 is not uniformly bounded over sample paths and, hence,
(cid:40) aa min(a, R)
yR(i + 1) =(cid:2)INM − β(i)(cid:0)L ⊗ IM
(cid:1) − α(i)INM
(cid:16)(cid:101)L(i) ⊗ IM
(cid:17)
(cid:17)
(cid:16)(cid:101)L(i) ⊗ IM
((cid:98)xC⊥ (i))R
(cid:105)
For a vector, the truncation operation applies componentwise. For R > 0, we also consider the sequences, {yR(i)}i≥0:
we use truncation arguments (see, e.g., [56]). For a scalar a, define its truncation (a)R at level R > 0 by
(cid:3) y(i)−
(cid:17)(cid:98)xC⊥ (i)
(cid:16)(cid:101)L(i) ⊗ IM
We will show that for every R > 0
(cid:3) yR(i)−
if a (cid:54)= 0
if a = 0
y(i) − β(i)
(a)R =
0
Pθ∗
lim
yR(i)−
(233)
(234)
(235)
(236)
(237)
= 1
− β(i)
− β(i)
(cid:104)
Pθ∗
lim
i→∞ yR(i) = 0
= 1
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 6, JUNE 2012
45
Now, the sequence {(cid:98)xC⊥ (i)}i≥0 converges a.s. to zero, and, hence, for every > 0, there exists R() > 0 (see [50]), such that
and, hence, from (233)-(236)
Pθ∗
This, together with (237), will then imply
(cid:20)
Pθ∗
sup
i≥0
(cid:20)
(cid:21)
(cid:13)(cid:13)(cid:13)(cid:98)xC⊥ (i) − ((cid:98)xC⊥ (i))R()(cid:13)(cid:13)(cid:13) = 0
(cid:21)
(cid:13)(cid:13)(cid:13) = 0
(cid:13)(cid:13)(cid:13)y(i) − yR()(i)
(cid:105)
(cid:104)
sup
i≥0
> 1 −
lim
i→∞ y(i) = 0
Pθ∗
> 1 −
> 1 −
Since > 0 is arbitrary in (240), we will be able to conclude (123). Thus, the proof reduces to establishing (237) for every
R > 0, which is carried out in the following.
For a given R > 0 consider the recursion given in (236). Choose ε1 > 0 and ε2 < 0 such that
(241)
Because τ2 > .5 in Assumption (D.5) permits such choice of ε1, ε2. Let ρ > 0 be constant and define V : N × RNM (cid:55)−→ R+
1 − ε2 < 2τ2 − ε1.
(cid:1) x + ρiε2 .
V (i, x) = iε1 xT(cid:0)L ⊗ IM
(cid:110)
x(0),
L(j),{zn(j)}1≤N , Υ(j), Ψ(j)
(242)
(cid:19)
(cid:111)
0≤j<i
Recall the filtration {Fi}i≥0 in (104)
Fi = σ
(cid:18)
(238)
(239)
(240)
(243)
to which all the processes of interest are adapted. We now show that there exists an integer iR > 0 sufficiently large, such that
the process {V (i, yR(i))}i≥iR
. To this end, we note that, using
the recursion (236):
yT
(i + 1)ε1 yT
+2β(i)α(i)yT
−2β(i)yT
−2α(i)yT
yR,C⊥ (i)−
= (i + 1)ε1(cid:104)
Eθ∗ [V (i + 1, yR(i + 1))Fi] − V (i, yR(i)) =
R(i + 1)(cid:0)L ⊗ IM
R,C⊥ (i)(cid:0)L ⊗ IM
− iε1 yT
R,C⊥ (i)(cid:0)L ⊗ IM
R,C⊥ (i)(cid:0)L ⊗ IM
(cid:104)
is a non-negative supermartingale w.r.t. the filtration {Fi}i≥iR
(cid:1) yR(i + 1) + ρ(i + 1)ε2
R(i)(cid:0)L ⊗ IM
(cid:1) yR(i) − ρiε2
(cid:1) yR,C⊥ (i)−
(cid:1)2
R,C⊥ (i)(cid:0)L ⊗ IM
(cid:1) yR,C⊥ (i)+
(cid:1)2
R,C⊥ (i)(cid:0)L ⊗ IM
(cid:1)3
(cid:1) yR,C⊥ (i)+
R,C⊥ (i)(cid:0)L ⊗ IM
(cid:17)(cid:0)L ⊗ IM
(cid:16)(cid:101)L(i) ⊗ IM
(cid:1)
(cid:12)(cid:12)(cid:12) Fi
(cid:105)
(cid:16)(cid:101)L(i) ⊗ IM
(cid:17)
(cid:17)(cid:0)L ⊗ IM
(cid:16)(cid:101)L(i) ⊗ IM
(cid:1)
((cid:98)xC⊥ (i))R(cid:12)(cid:12)(cid:12) Fi
(cid:105)
(cid:17)
(cid:16)(cid:101)L(i) ⊗ IM
(cid:17)(cid:0)L ⊗ IM
(cid:17)R(cid:16)(cid:101)L(i) ⊗ IM
(cid:1)
(cid:17)
(cid:16)(cid:101)L(i) ⊗ IM
(cid:105)(cid:105)
((cid:98)xC⊥ (i))R Fi
R,C⊥ (i)(cid:0)L ⊗ IM
(cid:1) yR,C⊥ (i) − ρiε2
(cid:104)
(cid:20)(cid:16)(cid:98)xTC⊥ (i)
+ (i + 1)ε2 − iε1 yT
+2β2(i)Eθ∗
yR,C⊥ (i)
+
+β2(i)Eθ∗
yT
R,C⊥ (i)
+β2(i)Eθ∗
+
+
yR,C⊥ (i)+
+β2(i)yT
yR,C⊥ (i)+
yT
R,C⊥ (i)
+α2(i)yT
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 6, JUNE 2012
46
where we repeatedly used the fact that
and (cid:101)L(i) is independent of Fi.
In going to the next step we use the following inequalities, where c1 > 0 is a constant:
(cid:1) yR,C⊥ (i)
(cid:17)
yR,C⊥ (i)
(cid:1) yR(i) =(cid:0)L ⊗ IM
(cid:0)L ⊗ IM
(cid:17)
(cid:16)(cid:101)L(i) ⊗ IM
(cid:16)(cid:101)L(i) ⊗ IM
R,C⊥ (i)(cid:0)L ⊗ IM
yR,C⊥ (i) ≥ λ2
yR(i) =
yT
2(L)(cid:13)(cid:13)yR,C⊥ (i)(cid:13)(cid:13)2
(cid:1) yR,C⊥ (i)
N (L)(cid:13)(cid:13)yR,C⊥ (i)(cid:13)(cid:13)2
yR,C⊥ (i) ≤ λ2
=
λ2
2(L)
λN (L)
yT
≥ λ2
2(L)
λN (L)
R,C⊥ (i)(cid:0)L ⊗ IM
yT
=
λ2
N (L)
λ2(L)
≤ λ2
yT
N (L)
λ2(L)
R,C⊥ (i)(cid:0)L ⊗ IM
yT
(cid:1)2
(cid:1)2
λN (L)(cid:13)(cid:13)yR,C⊥ (i)(cid:13)(cid:13)2
R,C⊥ (i)(cid:0)L ⊗ IM
λ2(L)(cid:13)(cid:13)yR,C⊥ (i)(cid:13)(cid:13)2
R,C⊥ (i)(cid:0)L ⊗ IM
λ2(L)(cid:13)(cid:13)yR,C⊥ (i)(cid:13)(cid:13)2
R,C⊥ (i)(cid:0)L ⊗ IM
(cid:1)3
yT
=
λ3
N (L)
λ2(L)
≤ λ3
N (L)
λ2(L)
(cid:1) yR,C⊥ (i)
N (L)(cid:13)(cid:13)yR,C⊥ (i)(cid:13)(cid:13)2
yR,C⊥ (i) ≤ λ3
(cid:1) yR,C⊥ (i)
(244)
(245)
(246)
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 6, JUNE 2012
Eθ∗
Eθ∗
yT
yT
(cid:1)
(cid:104)
R,C⊥ (i)
R,C⊥ (i)
λ2
yT
yR,C⊥ (i)
yR,C⊥ (i)
≤ c1λN (L)
≤ λN (L)Eθ∗
≤ c1λN (L)Eθ∗
(cid:12)(cid:12)(cid:12) Fi
(cid:105) ≤
(cid:21)
(cid:13)(cid:13)(cid:13)2 Fi
(cid:17)(cid:0)L ⊗ IM
(cid:16)(cid:101)L(i) ⊗ IM
(cid:17)
(cid:16)(cid:101)L(i) ⊗ IM
(cid:20)(cid:13)(cid:13)(cid:13)(cid:16)(cid:101)L(i) ⊗ IM
(cid:17)
(cid:104)(cid:13)(cid:13)yR,C⊥ (i)(cid:13)(cid:13)2(cid:12)(cid:12)(cid:12) Fi
(cid:105)
= c1λN (L)(cid:13)(cid:13)yR,C⊥ (i)(cid:13)(cid:13)2
R,C⊥ (i)(cid:0)L ⊗ IM
(cid:1) yR,C⊥ (i)
(cid:17)(cid:0)L ⊗ IM
(cid:16)(cid:101)L(i) ⊗ IM
(cid:104)
(cid:1)
((cid:98)xC⊥ (i))R(cid:12)(cid:12)(cid:12) Fi
(cid:16)(cid:101)L(i) ⊗ IM
(cid:105)
(cid:17)
(cid:20)(cid:13)(cid:13)(cid:13)yT
(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)(cid:16)(cid:101)L(i) ⊗ IM
(cid:17)(cid:13)(cid:13)(cid:13)
(cid:17)(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)((cid:98)xC⊥ (i))R(cid:13)(cid:13)(cid:13)(cid:12)(cid:12)(cid:12) Fi
(cid:1)(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)(cid:16)(cid:101)L(i) ⊗ IM
(cid:13)(cid:13)(cid:0)L ⊗ IM
≤ Rc1λN (L)(cid:13)(cid:13)yR,C⊥ (i)(cid:13)(cid:13)
≤ Rc1λN (L) + Rc1λN (L)(cid:13)(cid:13)yR,C⊥ (i)(cid:13)(cid:13)2
R,C⊥ (i)(cid:0)L ⊗ IM
(cid:20)(cid:16)(cid:98)xTC⊥ (i)
(cid:17)(cid:0)L ⊗ IM
(cid:1)
(cid:21)
((cid:98)xC⊥ (i))R (cid:12)(cid:12)(cid:12) Fi
(cid:17)R(cid:16)(cid:101)L(i) ⊗ IM
(cid:16)(cid:101)L(i) ⊗ IM
(cid:17)
≤ Rc1λN (L) +
Rc1λN (L)
≤ Eθ∗
R,C⊥ (i)
λ2(L)
yT
Eθ∗
(cid:21)
(cid:1) yR,C⊥ (i)
We go from (249) to (250) because
Eθ∗
47
(247)
(248)
(249)
(250)
(251)
(252)
(253)
(254)
(255)
≤ R2c1λN (L)
(i + 1)ε1 − iε1 ≤ ε1(i + 1)ε1−1
ρ(i + 1)ε2 − ρiε2 ≤ ρε2iε2−1.
(cid:13)(cid:13)(cid:13)((cid:98)xC⊥ (i))R(cid:13)(cid:13)(cid:13) ≤ R. Using inequalities (244)-(254), we have from (243)
(cid:104)
(cid:20)
(cid:105) − V (i, yR(i)) ≤
V (i + 1, yR(i + 1))
(cid:12)(cid:12)(cid:12) Fi
(i + 1)ε1
+2β(i)α(i)
ε1
(i + 1)1 − 2β(i)
+β2(i)
λ2
N (L)
λ2(L)
λ2
2(L)
λN (L)
λ3
N (L)
λ2(L)
− 2α(i)+
+2β2(i)
Rc1λN (L)
λ2(L)
(cid:20)
+
1
2τ2 − ε1
c1λN (L)
+
λ2
+α2(i)+β2(i)
(cid:1) yR,C⊥ (i)+
(cid:0)2Rc1λN (L) + R2c1λN (L)(cid:1) + ρε2iε2−1
(cid:1) yR,C⊥ (i), the coefficient −2β(i)(i + 1)ε1 dominates
(cid:21)
(cid:21)
yT
R,C⊥ (i)(cid:0)L ⊗ IM
R,C⊥ (i)(cid:0)L ⊗ IM
(cid:12)(cid:12)(cid:12) Fi
For the first term on the R.H.S. of (255) involving yT
all other coefficients eventually (τ2 < 1 by Assumption (D.5)); hence, the first term on the R.H.S. of (255) becomes negative
eventually (for sufficiently large i). The second term on the R.H.S. of (255) becomes negative eventually because ρε2 < 0 and
1 − ε2 < 2τ2 − ε1 by assumption. Hence there exists sufficiently large i, say iR, such that,
(cid:104)
Eθ∗
is a non-negative supermartingale w.r.t. the filtration {Fi}i≥iR
(cid:105) − V (i, yR(i)) ≤ 0,∀i ≥ iR.
V (i + 1, yR(i + 1))
This shows {V (i, yR(i))}i≥iR
. Thus, {V (i, yR(i))}i≥iR
where
Since(cid:80)
we have
and similarly
P (L(i) ⊗ IM ) = P(cid:0)L ⊗ IM
(cid:1) = 0, ∀i
P(cid:101)x(i + 1) = P(cid:101)x(i) − α(i) [P(cid:101)x(i) − P J(z(i))]
− β(i)P (Υ(i) + Ψ(i))
P(cid:98)x(i + 1) = P(cid:98)x(i) − α(i) [P(cid:98)x(i) − P J(z(i))]
48
(256)
(257)
(258)
(259)
(260)
(261)
(262)
(266)
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 6, JUNE 2012
converges a.s. to a finite random variable (see [50]). Clearly, the sequence ρiε2 goes to zero as ε2 < 0. Then:
(cid:104)
R(i)(cid:0)L ⊗ IM
(cid:105)
(cid:1) yR(i) exists and is finite
= 1
Pθ∗
Since iε1 → ∞ as i → ∞, it follows
i→∞ iε1 yT
lim
R(i)(cid:0)L ⊗ IM
Since yT
(cid:104)
Pθ∗
i→∞ yT
lim
(cid:1) yR(i) ≥ λ2(L)(cid:13)(cid:13)yR,C⊥ (i)(cid:13)(cid:13)2, from (256) we have
(cid:105)
R(i)(cid:0)L ⊗ IM
(cid:104)
(cid:105)
(cid:1) yR(i) = 0
Pθ∗
i→∞ yR,C⊥ (i) = 0
lim
= 1
= 1
To establish (237) we note that
yR,C(i) = 1N ⊗ yR,avg(i)
yR,avg(i + 1) = (1 − α(i)) yR,avg(i)
i≥0 α(i) = ∞, it follows from standard arguments that yR,avg(i) → 0 as i → ∞. We then have from (258)
(cid:104)
Pθ∗
(cid:105)
i→∞ yR,C(i) = 0
lim
= 1
which together with (257) establishes (237). The claim in (123) then follows from the arguments above.
We now prove the claim in (124). Recall the matrix P in (204). Using the fact,
Since the sequences {P(cid:101)x(i)}i≥0 and {P(cid:98)x(i)}i≥0 follow the same recursion and start with the same initial state P(cid:101)x(0), they
(263)
− β(i)P (Υ(i) + Ψ(i))
are equal, and we have ∀i
P y(i) = P ((cid:101)x(i) −(cid:98)x(i))
= 0
(264)
From (233) we then have
y(i + 1) =(cid:2)INM − β(i)(cid:0)L ⊗ IM
(cid:17)
(cid:16)(cid:101)L(i) ⊗ IM
− β(i)
(cid:1) − α(i)INM − P(cid:3) y(i)−
(cid:17)(cid:98)x(i)
(cid:16)(cid:101)L(i) ⊗ IM
y(i) − β(i)
By Lemma 26, to prove the claim in (123), it suffices to prove
From Lemma 26, we note that the sequence {(cid:98)x(i)}i≥0 converges in L2 to 1N ⊗ h(θ∗) and hence L2 bounded, i.e., there
lim
i→∞
(265)
exists constant c3 > 0, such that,
Eθ∗(cid:2)(cid:107)y(i)(cid:107)2(cid:3) = 0
Eθ∗(cid:2)(cid:107)(cid:98)x(i)(cid:107)2(cid:3) ≤ c3 < ∞
sup
i≥0
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 6, JUNE 2012
49
Choose j large enough, such that, for i ≥ j
(cid:1) − α(i)INM − P(cid:13)(cid:13) ≤ 1 − β(i)λ2(L)
(cid:13)(cid:13)INM − β(i)(cid:0)L ⊗ IM
(cid:13)(cid:13)(cid:13) ≤ c2 for some constant c2 > 0, we have for i ≥ j,
(cid:13)(cid:13)(cid:13)(cid:101)L(i)
Noting that (cid:101)L(i) is independent of Fi and
Eθ∗(cid:2)(cid:107)y(i + 1)(cid:107)2(cid:3) =
(cid:104)
yT (i)(cid:0)INM − β(i)(cid:0)L ⊗ IM
(cid:16)(cid:101)L(i)
(cid:17)2
y(i) + β2(i)(cid:98)xT (i)
(cid:21)
(cid:17)2(cid:98)x(i)
(cid:16)(cid:101)L(i)
≤(cid:0)1 − β(i)λ2(L)(cid:1) Eθ∗(cid:2)(cid:107)y(i)(cid:107)2(cid:3) + c2
(cid:18)
(cid:18)
(cid:1) − α(i)INM − P(cid:1)2
(cid:16)(cid:101)L(i)
(cid:17)2(cid:98)x(i)
2β2(i)Eθ∗(cid:2)(cid:107)y(i)(cid:107)2(cid:3)
Eθ∗(cid:2)(cid:107)y(i)(cid:107)2(cid:3)
θ∗(cid:2)(cid:107)y(i)(cid:107)2(cid:3)
(cid:19)
1 − β(i)λ2(L) + c2
2β2(i) + 2β2(i)c2
2c
+β2(i)yT (i)
+β2(i)yT (i)
2c3β2(i) +
2β2(i)c2
2c
(cid:19)
Eθ∗
+ c2
y(i)
≤
1
2
3
E 1
2
1
2
3
(cid:18)
(cid:19)
+ β2(i)
2c3 + 2c2
c2
2c
1
2
3
where in the last step we used the inequality
θ∗(cid:2)(cid:107)y(i)(cid:107)2(cid:3) ≤ Eθ∗(cid:2)(cid:107)y(i)(cid:107)2(cid:3) + 1
E 1
2
Now similar to Lemma 23, choose j1 ≥ j and 0 < c4 < λ2(L), such that,
1 − β(i)λ2(L) + c2
3 ≤ 1 − β(i)c4, ∀i ≥ j1
2β2(i) + 2β2(i)c2
2c
1
2
(267)
(268)
Then, for i ≥ j1, from (267)
Eθ∗(cid:2)(cid:107)y(i + 1)(cid:107)2(cid:3) ≤ (1 − β(i)c4) Eθ∗(cid:2)(cid:107)y(i)(cid:107)2(cid:3) +
(cid:19)
from which we conclude that limi→∞ Eθ∗(cid:2)(cid:107)y(i)(cid:107)2(cid:3) = 0 by Lemma 25 (see also Lemma 23.)
Proof: Consistency follows from the fact that by Theorem 21 the sequence {(cid:101)x(i)}i≥0 converges a.s. to 1N ⊗ h(θ∗), and
Proof of Theorem 22
1
2c3 + 2c2
c2
2c
2
3
+ β2(i)
(cid:18)
the function h−1(·) exists and is continuous on the open set U.
To establish the second claim, we note that, if h−1(·) is Lipschitz continuous, there exists constant k > 0, such that
(cid:13)(cid:13)h
−1((cid:101)y1) − h
−1((cid:101)y2)(cid:13)(cid:13) ≤ k (cid:107)(cid:101)y1 −(cid:101)y2(cid:107) , ∀ (cid:101)y1,(cid:101)y2 ∈ RM
Since L2 convergence implies L1, we then have from Theorem 21 for 1 ≤ n ≤ N
Eθ∗ [(cid:107)xn(i) − θ
lim
∗(cid:107)]
∗
i→∞(cid:107)Eθ∗ [xn(i) − θ
= lim
i→∞
≤ k lim
i→∞
](cid:107) ≤ lim
i→∞
Eθ∗(cid:2)(cid:13)(cid:13)h
−1 ((cid:101)xn(i)) − h
Eθ∗ [(cid:107)(cid:101)xn(i) − h(θ
∗
−1 (h(θ
)(cid:107)]
))(cid:13)(cid:13)(cid:3)
∗
which establishes the theorem.
= 0
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 6, JUNE 2012
50
REFERENCES
[1] R. Olfati-Saber and R. M. Murray, "Consensus problems in networks of agents with switching topology and time-delays," IEEE Trans.
Automat. Contr., vol. 49, no. 9, pp. 1520 -- 1533, Sept. 2004.
[2] A. Jadbabaie, J. Lin, and A. S. Morse, "Coordination of groups of mobile autonomous agents using nearest neighbor rules," IEEE Trans.
Autom. Control, vol. AC-48, no. 6, pp. 988 -- 1001, June 2003.
[3] L. Xiao and S. Boyd, "Fast linear iterations for distributed averaging," Syst. Contr. Lett., vol. 53, pp. 65 -- 78, 2004.
[4] S. Kar and J. M. F. Moura, "Sensor networks with random links: Topology design for distributed consensus," IEEE Transactions on Signal
Processing, vol. 56, no. 7, pp. 3315 -- 3326, July 2008.
[5] S. Kar and J. M. F. Moura, "Distributed consensus algorithms in sensor networks with communication channel noise and random link
failures," in 41st Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, CA, Nov. 2007.
[6] S. Kar and J. M. F. Moura, "Distributed average consensus in sensor networks with quantized inter-sensor communication," in Proceedings
of the 33rd International Conference on Acoustics, Speech, and Signal Processing, Las Vegas, Nevada, USA, April 1-4 2008.
[7] Y. Hatano and M. Mesbahi, "Agreement over random networks," in 43rd IEEE Conference on Decision and Control, vol. 2, Dec. 2004,
pp. 2010 -- 2015.
[8] T. C. Aysal, M. Coates, and M. Rabbat, "Distributed average consensus using probabilistic quantization," in IEEE/SP 14th Workshop on
Statistical Signal Processing Workshop, Maddison, Wisconsin, USA, August 2007, pp. 640 -- 644.
[9] M. E. Yildiz and A. Scaglione, "Differential nested lattice encoding for consensus problems," in ACM/IEEE Information Processing in
Sensor Networks, Cambridge, MA, April 2007.
[10] A. Kashyap, T. Basar, and R. Srikant, "Quantized consensus," Automatica, vol. 43, pp. 1192 -- 1203, July 2007.
[11] P. Frasca, R. Carli, F. Fagnani, and S. Zampieri, "Average consensus on networks with quantized communication," Submitted to the Int.
J. Robust and Nonlinear Control, 2008.
[12] A. Nedic, A. Olshevsky, A. Ozdaglar, and J. N. Tsitsiklis, "On distributed averaging algorithms and quantization effects," Technical Report
2778, LIDS-MIT, Nov. 2007.
[13] M. Huang and J. Manton, "Stochastic approximation for consensus seeking: mean square and almost sure convergence," in Proceedings
of the 46th IEEE Conference on Decision and Control, New Orleans, LA, USA, Dec. 12-14 2007.
[14] R. Olfati-Saber, J. A. Fax, and R. M. Murray, "Consensus and cooperation in networked multi-agent systems," IEEE Proceedings, vol. 95,
no. 1, pp. 215 -- 233, January 2007.
[15] A. Das and M. Mesbahi, "Distributed linear parameter estimation in sensor networks based on Laplacian dynamics consensus algorithm,"
in 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, vol. 2, Reston, VA, USA, 28-28
Sept. 2006, pp. 440 -- 449.
[16] R. Olfati-Saber, "Distributed Kalman filter with embedded consensus filters," in CDC-ECC'05, 44th IEEE Conference on Decision and
Control and 2005 European Control Conference, 2005, pp. 8179 -- 8184.
[17] I. D. Schizas, A. Ribeiro, and G. B. Giannakis, "Consensus in Ad Hoc WSNs with noisy links - part I: Distributed estimation of deterministic
signals," IEEE Transactions on Signal Processing, vol. 56, no. 1, pp. 350 -- 364, January 2008.
[18] U. A. Khan and J. M. F. Moura, "Distributing the Kalman filter for large-scale systems," IEEE Transactions on Signal Processing, vol. 56,
no. 10, p. 49194935, October 2008.
[19] R. Carli, A. Chiuso, L. Schenato, and S. Zampieri, "Distributed Kalman filtering using consensus strategies," IEEE Journal on Selected
Areas of Communications, vol. 26, no. 4, pp. 622 -- 633, September 2008.
[20] D. Bajovic, D. Jakovetic, J. Xavier, B. Sinopoli, and J. M. F. Moura, "Distributed detection via Gaussian running consensus: Large
deviations asymptotic analysis," IEEE Transactions on Signal Processing, vol. 59, no. 5, May 2011.
[21] D. Jakovetic, J. M. F. Moura, and J. Xavier, "Distributed detection over noisy networks: Large deviations analysis," August 2011, accepted
for publication, IEEE Transactions on Signal Processing, vol. 60, 2012.
[22] C. G. Lopes and A. H. Sayed, "Diffusion least-mean squares over adaptive networks: Formulation and performance analysis," IEEE
Transactions on Signal Processing, vol. 56, no. 7, pp. 3122 -- 3136, July 2008.
[23] S. Stankovic, M. Stankovic, and D. Stipanovic, "Decentralized parameter estimation by consensus based stochastic approximation," in 46th
IEEE Conference on Decision and Control, New Orleans, LA, USA, 12-14 Dec. 2007, pp. 1535 -- 1540.
[24] I. Schizas, G. Mateos, and G. Giannakis, "Stability analysis of the consensus-based distributed LMS algorithm," in Proceedings of the
33rd International Conference on Acoustics, Speech, and Signal Processing, Las Vegas, Nevada, USA, April 1-4 2008, pp. 3289 -- 3292.
[25] S. Ram, V. Veeravalli, and A. Nedic, "Distributed and recursive parameter estimation in parametrized linear state-space models," to appear
in IEEE Transactions on Automatic Control, vol. 55, no. 2, pp. 488 -- 492, February 2010.
[26] S. Kar and J. M. F. Moura, "Convergence rate analysis of distributed gossip (linear parameter) estimation: Fundamental limits and tradeoffs,"
IEEE Journal on Selected Topics on Signal Processing, vol. 5, 2011.
[27] S. Kar and J. M. F. Moura, "Gossip and distributed Kalman filtering: Weak consensus under weak detectability," IEEE Transactions on
Signal Processing, vol. 59, no. 4, pp. 1766-1784, April 2011.
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 6, JUNE 2012
51
[28] D. Jakovetic, J. ao Xavier, and J. M. F. Moura, "Weight optimization for consenus algorithms with correlated switching topology," IEEE
Transactions on Signal Processing, vol. 58, no. 7, pp. 3788 -- 3801, July 2010.
[29] J. N. Tsitsiklis, "Problems in decentralized decision making and computation," Ph.D., Massachusetts Institute of Technology, Cambridge,
MA, 1984.
[30] J. N. Tsitsiklis, D. P. Bertsekas, and M. Athans, "Distributed asynchronous deterministic and stochastic gradient optimization algorithms,"
IEEE Trans. Autom. Control, vol. AC-31, no. 9, pp. 803 -- 812, September 1986.
[31] D. Bertsekas, J. Tsitsiklis, and M. Athans, "Convergence theories of distributed iterative processes: A survey," Technical Report for
Information and Decision Systems, Massachusetts Inst. of Technology, Cambridge, MA, 1984.
[32] H. Kushner and G. Yin, "Asymptotic properties of distributed and communicating stochastic approximation algorithms," Siam J. Control
and Optimization, vol. 25, no. 5, pp. 1266 -- 1290, Sept. 1987.
[33] S. Kar, S. A. Aldosari, and J. M. F. Moura, "Topology for distributed inference on graphs," IEEE Transactions on Signal Processing,
vol. 56, no. 6, pp. 2609 -- 2613, June 2008.
[34] A. H. Sayed, Fundamentals of Adaptive Filtering, ser. Wiley-Interscience. Hoboken, NJ: John Wiley & Sons, 2003.
[35] V. Solo and X. Kong, Adaptive Signal Processing Algorithms: Stability and Performance. Prentice Hall, 1995.
[36] L. Ljung, System Identification: Theory for the User. Prentice Hall, 1999.
[37] V. S. Borkar, Stochastic Approximation: A Dynamical Systems Viewpoint. Cambridge, UK: Cambridge University Press, 2008.
[38] S. B. Gelfand and S. K. Mitter, "Recursive stochastic algorithms for global optimization in Rd," SIAM J. Control Optim., vol. 29, no. 5,
pp. 999 -- 1018, September 1991.
[39] F. R. K. Chung, Spectral Graph Theory. Providence, RI : American Mathematical Society, 1997.
[40] B. Mohar, "The Laplacian spectrum of graphs," in Graph Theory, Combinatorics, and Applications, Y. Alavi, G. Chartrand, O. R.
Oellermann, and A. J. Schwenk, Eds. New York: J. Wiley & Sons, 1991, vol. 2, pp. 871 -- 898.
[41] B. Bollobas, Modern Graph Theory. New York, NY: Springer Verlag, 1998.
[42] L. Schuchman, "Dither signals and their effect on quantization noise," IEEE Trans. Commun. Technol., vol. COMM-12, pp. 162 -- 165,
December 1964.
[43] S. P. Lipshitz, R. A. Wannamaker, and J. Vanderkooy, "Quantization and dither: A theoretical survey," J. Audio Eng. Soc., vol. 40, pp.
355 -- 375, May 1992.
[44] A. B. Sripad and D. L. Snyder, "A necessary and sufficient condition for quantization errors to be uniform and white," IEEE Trans. Acoust.,
Speech, Signal Processing, vol. ASSP-25, pp. 442 -- 448, October 1977.
[45] R. M. Gray and T. G. Stockham, "Dithered quantizers," IEEE Trans. Information Theory, vol. 39, pp. 805 -- 811, May 1993.
[46] S. Kar and J. M. F. Moura, "Distributed consensus algorithms in sensor networks: Quantized data and random link failures,"
IEEE Transactions on Signal Processing, vol. 58, no. 3, pp. 1383 -- 1400, March 2010, initial post: Dec. 2007. [Online]. Available:
http://arxiv.org/abs/0712.1609
[47] E. Lehmann, Theory of Point Estimation.
[48] H.-F. Chen and L. Guo, Identification and Stochastic Adaptive Control. Boston: Birkhauser, 1991.
[49] S. Boyd, A. Ghosh, B. Prabhakar, and D. Shah, "Randomized gossip algorithms," IEEE/ACM Trans. Netw., vol. 14, no. SI, pp. 2508 -- 2530,
John Wiley and Sons, Inc., 1983.
2006.
[50] O. Kallenberg, Foundations of Modern Probability, 2nd ed. Springer Series in Statistics., 2002.
[51] S. Kar, "Large scale networked dynamical systems: Distributed inference," Ph.D., Carnegie Mellon University, Pittsburgh, PA, 2010.
[52] N. Krasovskii, Stability of Motion. Stanford University Press, 1963.
[53] A. V. Oppenheim and R. W. Schafer, Digital Signal Processing. Prentice-Hall, 1975.
[54] M. D. Ilic' and J. Zaborszky, Dynamics and Control of Large Electric Power Systems. Wiley, 2000.
[55] J. S. Thorp, A. G. Phadke, and K. J. Karimi, "Real time voltage-phasor measurements for static state estimation," IEEE Transactions on
Power Apparatus and Systems, vol. 104, no. 11, pp. 3098 -- 3106, November 1985.
[56] M. Nevel'son and R. Has'minskii, Stochastic Approximation and Recursive Estimation. Providence, Rhode Island: American Mathematical
Society, 1973.
[57] Y. Chow, "Some convergence theorems for independent random variables," Ann. Math. Statist., vol. 37, pp. 1482 -- 1493, 1966.
[58] Y. Chow and T. Lai, "Limiting behavior of weighted sums of independent random variables," Ann. Prob., vol. 1, pp. 810 -- 824, 1973.
[59] W. Stout, "Some results on the complete and almost sure convergence of linear combinations of independent random variables and
martingale differences," Ann. Math. Statist., vol. 39, pp. 1549 -- 1562, 1968.
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 6, JUNE 2012
52
Soummya Kar (S'05 -- M'10) received the B.Tech. degree in Electronics and Electrical Communication Engineering
from the Indian Institute of Technology, Kharagpur, India, in May 2005 and the Ph.D. degree in electrical and computer
engineering from Carnegie Mellon University, Pittsburgh, PA, in 2010. From June 2010 to May 2011 he was with the
EE Department at Princeton University as a Postdoctoral Research Associate. He is currently an Assistant Research
Professor of ECE at Carnegie Mellon University. His research interests include performance analysis and inference in
large-scale networked systems, adaptive stochastic systems, stochastic approximation, and large deviations.
PLACE
PHOTO
HERE
PLACE
PHOTO
HERE
Jos´e M. F. Moura (S'71 -- M'75 -- SM'90 -- F'94) received degrees from Instituto Superior T´ecnico (IST), Portugal, and
from the Massachusetts Institute of Technology (MIT), Cambridge, MA. He is University Professor at Carnegie Mellon
University (CMU), was on the faculty at IST and has been visiting Professor at MIT. His interests include statistical
and algebraic signal and image processing.
Dr. Moura is Division IX Director of the IEEE, was President of the IEEE Signal Processing Society (SPS), and
Editor in Chief of the IEEE Transactions on Signal Processing. Dr. Moura is a Fellow from IEEE and the AAAS
and an Academy of Sciences of Portugal corresponding member. He has received several awards including the SPS
Technical Achievement Award. In 2010, he was elected University Professor at CMU.
PLACE
PHOTO
HERE
Kavita Ramanan received her Ph.D. from the Division of Applied Mathematics at Brown University in 1998. After a
post-doctoral position at the Technion in Haifa, Israel, Dr. Ramanan joined the Mathematical Sciences Center of Bell
Laboratories, Lucent, as a Member of Technical Staff. In 2003, Dr. Ramanan returned to academia as an Associate
Professor at the Department of Mathematical Sciences at Carnegie Mellon University (CMU), Pittsburgh. In 2010, she
moved to the Division of Applied Mathematics at Brown University where she is a Professor of Applied Mathematics.
Dr. Ramanan works on probability theory, stochastic processes and their applications. Since 2008, she has also been
an adjunct professor at the Chennai Mathematical Institute, India.
|
1804.10781 | 1 | 1804 | 2018-04-28T10:12:47 | The Sharer's Dilemma in Collective Adaptive Systems of Self-Interested Agents | [
"cs.MA"
] | In collective adaptive systems (CAS), adaptation can be implemented by optimization wrt. utility. Agents in a CAS may be self-interested, while their utilities may depend on other agents' choices. Independent optimization of agent utilities may yield poor individual and global reward due to locally interfering individual preferences. Joint optimization may scale poorly, and is impossible if agents cannot expose their preferences due to privacy or security issues. In this paper, we study utility sharing for mitigating this issue. Sharing utility with others may incentivize individuals to consider choices that are locally suboptimal but increase global reward. We illustrate our approach with a utility sharing variant of distributed cross entropy optimization. Empirical results show that utility sharing increases expected individual and global payoff in comparison to optimization without utility sharing. We also investigate the effect of greedy defectors in a CAS of sharing, self-interested agents. We observe that defection increases the mean expected individual payoff at the expense of sharing individuals' payoff. We empirically show that the choice between defection and sharing yields a fundamental dilemma for self-interested agents in a CAS. | cs.MA | cs |
The Sharer's Dilemma in Collective Adaptive
Systems of Self-Interested Agents
Lenz Belzner1, Kyrill Schmid2, Thomy Phan2, Thomas Gabor2, and Martin
Wirsing2
1 MaibornWolff
2 LMU Munich
Abstract. In collective adaptive systems (CAS), adaptation can be im-
plemented by optimization wrt. utility. Agents in a CAS may be self-
interested, while their utilities may depend on other agents' choices. In-
dependent optimization of agent utilities may yield poor individual and
global reward due to locally interfering individual preferences. Joint op-
timization may scale poorly, and is impossible if agents cannot expose
their preferences due to privacy or security issues.
In this paper, we study utility sharing for mitigating this issue. Sharing
utility with others may incentivize individuals to consider choices that are
locally suboptimal but increase global reward. We illustrate our approach
with a utility sharing variant of distributed cross entropy optimization.
Empirical results show that utility sharing increases expected individual
and global payoff in comparison to optimization without utility sharing.
We also investigate the effect of greedy defectors in a CAS of sharing,
self-interested agents. We observe that defection increases the mean ex-
pected individual payoff at the expense of sharing individuals' payoff. We
empirically show that the choice between defection and sharing yields a
fundamental dilemma for self-interested agents in a CAS.
1
Introduction
In collective adaptive systems (CAS), adaptation can be implemented by opti-
mization wrt. utility, e.g. using multi-agent reinforcement learning or distributed
statistical planning [1,2,3,4,5]. Agents in a CAS may be self-interested, while
their utilities may depend on other agents' choices. This kind of situation arises
frequently when agents are competing for scarce resources. Independent opti-
mization of each agent's utility may yield poor individual and global payoff due
to locally interfering individual preferences in the course of optimization [6,7].
Joint optimization may scale poorly, and is impossible if agents do not want to
expose their preferences due to privacy or security issues [8].
A minimal example of such a situation is the coin game [9] (cf. Figure 1.
Here, a yellow and a blue agent compete for coins. The coins are also colored in
yellow or blue. Both agents can decide whether to pick up the coin or not. If both
agents opt to pick up the coin, one of them receives it uniformly at random. If
an agent picks up a coin of its own color, it receives a reward of 2. If it picks up
a differently colored coin, it gets a reward of one. Each agent wants to maximize
its individual reward. If agents act purely self-interested, then each agent tries
to pick up each coin, resulting in suboptimal global reward. However, if rewards
can be shared among agents, then agents will only pick up coins of their own
color. They receive a share that is high enough to compensate for not picking
up differently colored coins. This increases individual and global reward alike.
There are many examples for this kind of situation. For example, energy
production in the smart grid can be modeled in terms of a CAS of self-interested
agents. Each participant has to decide locally how much energy to produce. Each
agent wants to maximize its individual payoff by selling energy to consumers in
the grid. However, the price is depending on global production. Also, global
overproduction is penalized. Routing of vehicles poses similar problems. Each
vehicle wants to reach its destination in a minimal amount of time. However,
roads are a constrained resource, and for a globally optimal solution, only a
fraction of vehicles should opt for the shortest route. In both scenarios, the
ability of agents to share payoff may increase individual and global reward alike.
Fig. 1. Two agents competing for a coin: if agent 1 (yellow) on the left side happens
to get the coin it will get a reward of +1 whereas agent 2 (blue) will get a reward of
+2 for it. If there is a fifty-fifty chance for an agent to get the coin when both agents
are trying to collect it, the expected values are 0.5 for agent 1 and 1 for agent 2 when
both agents independently optimize their utility. In contrast, if there is the possibility
to share reward then agents could learn to do the following: agent 1 (yellow) resists to
collect the coin. That increases the blue agent's probability for getting a reward to 1.
The blue agent transfers reward (e.g. 1) to the yellow agent. This leaves agents with
expected values of 1 each and therefore defines a strong Pareto improvement compared
to the former outcome.
In this paper, we study distributed optimization with utility sharing for miti-
gating the issue of contrasting individual goals at the cost of expected individual
and global reward. To illustrate our ideas, we propose a utility sharing variant of
distributed cross entropy optimization. Empirical results show that utility shar-
ing increases expected individual and global payoff in comparison to optimization
without utility sharing.
+1+2E = 0.5E = 1+1+2E = 1E = 1We then investigate the effect of defectors participating in a CAS of sharing,
self-interested agents. We observe that defection increases the mean expected in-
dividual payoff at the expense of sharing individuals' payoff. We empirically show
that the choice between defection and sharing yields a fundamental dilemma for
self-interested agents in a CAS.
The paper makes the following contributions.
– We motivate utility sharing as a means to mitigate conflicts and increase
expected individual and global reward in CAS of self-interested agents.
– We propose distributed optimization with sharing (DOS) as an algorithm to
realize utility sharing in self-interested CAS.
– We evaluate DOS empirically, showing that it increases individual and global
reward in expectation.
– We investigate the effect of defecting, non-sharing individuals in a group of
self-interested sharing agents. We show that the choice between defection
and cooperation yields a fundamental dilemma for self-interested agents in
collective adaptive systems.
The remainder of the paper is structured as follows. In Section 2 we discuss
related work. We introduce DOS in Section 3. We discuss our empirical results
and the Sharer's Dilemma in Section 4. We conclude in Section 5.
2 Related Work
In general, we see our work in the context of collective adaptive systems (CAS)
[2,3] and multi-agent systems [10]. In particular, we are interested in CAS where
agents are adaptive through optimization of actions of policies wrt. a given in-
dividual or global utility function. These settings can for example be modeled
in terms of distributed constrained optimization problems [11], or as stochastic
games [12].
Searching for optimal actions or learning policies can be done by open- or
closed-loop planning, potentially enhanced with learned components such as
search exploration policies or value functions [5,13,14,15,16]. Another approach
for learning optimal policies in multi agent domains such as CAS is multi agent
reinforcement learning (MARL) [1,17] and its modern variants based on deep
learning for scaling up to more complex domains[4,18,19]. A recent example
of planning-based deep MARL combines open-loop search and learned value
functions in fully cooperative multi-agent domains [5].
In the case of self-interested agents, the Coco-Q algorithm was proposed [20].
Coco-Q has been evaluated for discrete two-player matrix games, and requires
explicit knowledge of other agents' utilities. In some sense, our study of sharing
in CAS extends the Coco-Q approach to continuous optimization with more
than two agents. Also, we model the amount sharing as a free parameter to be
learned in the course of optimization.
In the context of a research on emergent social effects in MARL [6,7,21,9], a
recent report investigated the effects of inequity aversion and utility sharing in
temporally extended dilemmas [22]. The authors state that "it remains to be seen
whether emergent inequity-aversion can be obtained by evolving reinforcement
learning agents" [22]. Our current work is a first step into this direction, and
shows that the question of whether to share or not poses a dilemma in and
for itself, at least in the case of stateless optimization (in contrast to learning
policies).
3 Distributed Optimization with Sharing
We model decision making in a CAS as a stochastic game (X, N, A, p, R) [12].
– X is a finite set of states.
– N = {0, ..., n} is a finite set of agents.
– A = ×i∈N Ai is a set of joint actions. Ai is a finite set of actions for agent i.
– p(x(cid:48)x, a) is a distribution modeling the probability that executing action
– R = {ri}i∈N , ri : X × A → R is a set of reward functions, one for each agent.
In the following, we assume X = {x} consists of a single state, and ∀a ∈ A :
a ∈ A in state x ∈ X yields state x(cid:48) ∈ X.
p(xx, a) = 1. As x is unique, we will not consider it in further notation.
jointly for all agents, that is maxa∈A : (cid:80)
We assume that ri is available to agent i in terms of a generative model that
may be queried for samples a, e.g. a simulation of the application domain. Each
agent only has access to its own reward function, but does not know the reward
functions of other agents.
The task of a self-interested agent i is to find an action that maximizes its
payoff. However, its payoff ri(a), a ∈ A in general depends on the choices of
other agents. One way to deal with this dependency is to perform optimization
i∈N ri(a). However, in a CAS with
self-interested agents, each participant tries to maximize its individual reward.
Also, in many situations participating agents would not want to expose their
individual reward functions to others due to privacy or security issues [8]. In
these situations, joint optimization wrt. global reward is not feasible. Note that
optimization of self-interested individuals is non-stationary due to changes in
others' choices as they optimize for themselves.
3.1 Reward Sharing
We define agents' utilities as ui. We consider the two different cases we are
interested in:
1. Individual, purely self-interested optimization
2. Self-interested optimization with the option to share individual rewards
Pure Self-Interest When optimizing independently and purely self-interested,
ui(a) = ri(a).
Sharing Sharing agents choose a share si ∈ R, si ≥ 0 additionally to ai. We
denote the joint shares by s = ×i∈N si. Given n agents, a joint action a ∈ A and
a joint share s ∈ Rn, si ≥ 0 for all i, we define individual agents' utility ui for
distributed optimization with sharing as follows. 3
(cid:80)
ui(a, s) = ri(a) − si +
j,j(cid:54)=i sj
n − 1
(1)
Shares are uniformly distributed among all other agents. There are no bilat-
eral shares. Note that this sharing mechanism is an arbitrary choice.
For example, sharing yields the following utilities for two agents.
u0(a, s) = r0(a) − s0 + s1
u1(a, s) = r1(a) − s1 + s0
3.2 Distributed Optimization with Sharing
We now give a general formulation of distributed optimization with sharing
(DOS). DOS is shown in Algorithm 1. Each agent maintains a policy πi(ai),
i.e. a distribution over actions and shares. It is initialized with an arbitrary
prior distribution. A rational agent wants to optimize its policy such that the
expectation of reward is maximized: max Eari(a), where a ∼ ×i∈N πi(ai). Note
that optimization of an individual's policy depends on the policies of all other
agents. Also note that policy optimization of self-interested individuals is non-
stationary due to changes in others' policies as they optimize for themselves.
After initialization, DOS performs the following steps for a predefined number
of iterations.
1. Each agent samples a multiset of nsample actions from its policy and com-
municates it to other agents.
2. A list of joint actions is constructed from the communicated action lists of
other agents.
3. The utility of each joint action is determined according to Equation 1.
4. The policy is updated in a way that increases the likelihood of sampling
high-utility actions and shares.
After niter iterations, each agent samples an action and a share from its
policy, executes the action, and shares reward accordingly. The resulting joint
action yields the global result of DOS.
3.3 Cross-Entropy DOS
In general, DOS is parametric w.r.t. modeling and updating of policies πi. As
an example, we instantiate DOS with cross entropy optimization [23]. We label
this instantiation CE-DOS.
3 We can account for the change of signature of ui by extending the action space Ai
of each agent accordingly: As,i = Ai × R, As = ×i∈N As,i.
each agent samples a list of nsample actions from πi
broadcast sampled actions
for each agent i do
Algorithm 1 Distributed Optimization with Sharing (DOS)
1: initialize πi for each agent i
2: for niter iterations do
3:
for each agent i do
4:
5:
6:
7:
8:
9:
10: for each agent i do
11:
build joint actions a
determine utility ui(a) according to Eq. 1
update πi to increase the likelihood of high-utility samples
execute ai and share si(a) sampled from πi
For CE-DOS, we model a policy π as isotropic normal distribution N (µ, σ).
I.e., each parameter of an action is sampled from a normal distribution that
is independent from other action parameter distributions. Note that it is also
possible to model policies in terms of normal distribution with full covariance,
but the simpler and computationally less expensive isotropic representation suf-
fices for our illustrative concerns. As prior CE-DOS requires initial mean µ0 and
standard deviation σ0 for a policy (cf. Algorithm 2, line 1). I.e. initial actions
before any optimization are sampled as follows.
ai ∼ N (µ0, σ0)
(2)
Updating a policy (cf. Algorithm 1, line 12 - 15) is done by recalculating
mean and variance of the normal distribution. We want the update to increase
the expected sample utility. For each of niter iterations, we sample nsample actions
and shares ai, si ∼ πi from each agent's policy, and build the corresponding joint
actions a = ×i∈N ai and shares s = ×i∈N si.
Each agent evaluates sampled actions and shares according to its utility
ui(a, s). From the set of evaluated samples of each agent, we drop a fraction
ψ ∈ (0, 1] of samples from the set wrt. their utilities. That is, we only keep high
utility samples in the set. We then compute mean and variance of the action pa-
rameters in the reduced set, and use them to update the policy. A learning rate
α ∈ (0, 1] determines the impact of the new mean and variance on the existing
distribution parameters: E.g. let µt and σt be the mean and standard deviation
of a normal distribution modeling a policy at iteration t, then
µt+1 = (1 − α)µt + αµnew
σt+1 = (1 − α)σt + ασnew
where µnew and σnew are mean and standard deviation of the elite samples. We
require a lower bound σmin on the standard deviation of policies in order to
maintain a minimum amount of exploration.
The hyperparameters of CE-DOS are thus as follows.
– A stochastic game (X, N, A, p, R)
– Number of iterations niter
– Number of samples nsample from the policy at each iteration
– Prior mean µ0 and standard deviation σ0 for policies
– Lower bound σmin on the policy standard deviations
– Fraction ψ ∈ (0, 1] of elite samples to keep
– Learning rate α ∈ (0, 1]
sample nsample actions and shares ai, si ∼ πi
clip si such that si ≥ 0
broadcast sampled actions and shares
for each agent i do
Algorithm 2 Cross Entropy DOS
1: Intitialize πi ← N (µ0, σ0) for each agent i
2: for niter iterations do
3:
for each agent i do
4:
5:
6:
7:
8:
9:
10:
11:
12:
13:
14:
15:
16: for each agent i do
17:
18:
build joint actions a = ×i∈N ai and shares s = ×i∈N si
determine utility ui(a, s) according to Eq. 1
keep ψ · nsample elite samples a, s with highest utility
compute µnew and σnew from ai, si in the elite samples
µt+1 ← (1 − α)µt + αµnew
σt+1 ← (1 − α)σt + ασnew
σt+1 ← max(σt+1, σmin)
πi ← N (µt+1, σt+1)
ai, si ∼ πi
execute ai and share si
4 Experimental Results and the Sharer's Dilemma
We experimentally analyzed the effects of sharing in collective adaptive systems
of self-interested agents.
4.1 Domains
We evaluated the effect of sharing utilities with CE-DOS in two synthetic do-
mains. In these domains, a CAS of self-interested agents has to balance individual
and global resource consumption (or production, respectively).
For example, the energy market in the smart grid can be modeled as a CAS of
self-interested agents. Each participant has to decide locally how much energy to
produce. Each agent wants to maximize its individual payoff by selling energy to
consumers in the grid. Therefore, each agent would like to maximize its individual
energy production. However, the selling price per unit is typically non-linearly
depending on global production. For example, global overproduction is penalized.
There are a number of corresponding real world problems, for example en-
ergy production and consumption in the smart grid, traffic routing, passenger
distribution to individual ride hailing participants, cargo distribution on trans-
port as a service, routing of packets in networks, distribution of computational
load to computers in a cluster, and many more.
We now define two market models (simple and logistic) as domains for eval-
uating the effects of sharing in CAS of self-interested agents.
agents' action space, ai ∈ Ai models the production amount. The sum(cid:80)
Simple Market We model individual and global production, and use their
relation for calculating utilities in such a scenario. We set Ai = R1 as individual
i∈N ai
models the global production.
We define the reward of each agent as the relation of its own individual
resource consumption to the global resource consumption. I.e. the reward cor-
relates to an agents market share. We introduce a slope parameter ξ to control
the utility slope of individual and global consumption.
(cid:16)(cid:80)
ai
j∈N aj
(cid:17)ξ
ri(a) =
(3)
In this setup, a rational agent would like to increase its own consumption
until saturation. I.e. a monopoly is able to produce cheaper than two small
producers, and therefore an inequal production amount unlocks more global
reward. If all agents act rationally by maximizing their individual ai, in general
the corresponding equilibrium is not equal to the global optimum.
Logistic Market We modeled another market scenario for investigating the
effects of sharing in CAS of self-interested agents. As before, each agent has
to choose the amount of energy to use for production of a particular good. I.e.
Ai ∈ [.1, 4], as in the simple market domain. Note that this is an arbitrary choice.
Each agent has a logistic production curve pi : Ai → [0, 1] as a function
of its invested energy. For example, this models different production machine
properties. The logistic curve pi is given as follows.
1
pi(ai) =
1 + e−c(ai−o)
(4)
Here, c ∈ R defines the steepness of the logistic function, and o ∈ R determines
the offset on the x-axis.
Global production prod is the sum of individual production(cid:80)
i pi(ai). A price
function (i.e. an inverse logistic function) defines the price per produced unit,
given global production prod .
price(prod ) = 1 −
1
1 + e−c(prod−o)
(5)
the global price.
ri(a) = pi(ai) · price(prod ) where prod =
pj(aj)
(6)
The reward for an agent is defined as the product of its produced units and
(cid:88)
j∈N
Figure 2 shows an example of production and price functions in the logistic
market domain.
Fig. 2. Example production functions (left) and global price function (right) in the
logistic market domain.
4.2 Setup
For our experiments, we used the following setup of CE-DOS.4
– We consider a stochastic game with n agents, that is N = {1, ..., n}.
– We set n = 10, n = 50 and n = 100 in our experiments.
– Individual action spaces were set as Ai = [.1, 4].
– We define the individual reward functions as given by Equation 3.
– We set the number of iterations niter for CE-DOS to 100.
– We draw nsample = 100 samples from the policy per iteration for each agent.
– Prior mean µ0 and standard deviation σ0 were set to 0 and 1, respectively.
– We set the fraction of elite samples ψ = 0.25.
– We set the learning rate α = 0.5.
– We set the minimal policy standard deviation σmin = 0.2.
We sampled domain parameters uniformely from the following intervals.
– We sampled the slope parameter ξ from [2, 4] in the simple market domain.
– We sampled logistic steepness c and offset o from [1, 3] for all production
and cost functions in our experiments with the logistic market domain.
4 We plan to publish our code upon publication.
We varied the number of sharing agents to measure the effect of defecting
(i.e. non-sharing) agents that participate in the stochastic game together with
sharing individuals.
Note that for the results we report here, we clipped the sharing values such
that agents are only able to share up to their current reward, i.e. si ≤ ri(a) for a
given a ∈ A. In general, other setups with unbound sharing are possible as well.
4.3 Effect of Sharing on Global Reward
Figure 3 shows the mean global utility gathered for varying numbers of shar-
ing agents. We can observe that the fraction of sharing agents correlates with
global utility. We also see that the effect of sharing increases with the number
of participating agents.
Figure 4 shows the mean individual shared value for the corresponding ex-
perimental setups. We can see that the amount of shared value correlates with
global reward. I.e. the more value shared, the higher the global reward. We also
see that the number of participating agents correlates with the effect of sharing.
4.4 Sharer's Dilemma
Figure 5 shows the Schelling diagrams for the corresponding experiments. A
Schelling diagram compares the mean individual utility of sharers and defectors
based on the global number of sharing agents [24]. We can see that agents that
choose to defect gather more individual utility than the sharing ones.
The shape of the Schelling diagrams in Figure 5 shows that sharing in col-
lective adaptive systems with self-interested agents yields a dilemma in our ex-
perimental setups.
Should an individual agent share or defect?
There is no rational answer to this question for an individual self-interested
agent. If the agent chooses to share, it may be exploited by other agents that
are defecting. However, if the agent chooses to defect, it may hurt its individual
return by doing so in comparison to having chosen to share.
Note that the amount of sharing is a free parameter to be optimized by DOS.
This means that all behavior we observe in our experiments is emergent. The
combination of available resources, interdependency of agents' actions and the
ability to share lets agents decide to share with others based on their intrinsic
motivation.
Our results illustrate a potential reason for emergence of cooperation and
inequity aversion in CAS of only self-interested agents. They also give an ex-
planation to the existence of punishment of individuals that exploit societal
cooperation at the cost of sharing individuals' and global reward.
5 Conclusion
We summarize the ideas in this paper, discuss limitations and implications of
our results, and outline venues for further research.
Fig. 3. Global utility gathered for varying numbers of sharing agents in the simple
market (left column) and logistic market (right column) domains. 10 agents (top row),
50 agents (center row) and 100 agents (bottom row) in total. Solid line shows empirical
mean of 10 experimental runs, shaded areas show .95 confidence intervals. Best viewed
on screen in color.
Fig. 4. Mean individual shares for varying numbers of sharing agents in the simple
market (left column) and logistic market (right column) domains. 10 agents (top row),
50 agents (center row) and 100 agents (bottom row) in total. Solid line shows empirical
mean of 10 experimental runs, shaded areas show .95 confidence intervals. Best viewed
on screen in color.
Fig. 5. Schelling diagrams showing mean individual utility for defectors and sharers,
for varying numbers of sharing agents in the simple market (left column) and logistic
market (right column) domains. Note the log scale on the y-axis. 10 agents (top row),
50 agents (center row) and 100 agents (bottom row) in total. 10 experimental runs.
Best viewed on screen in color.
5.1 Summary
In collective adaptive systems (CAS), adaptation can be implemented by opti-
mization wrt. utility. Agents in a CAS may be self-interested, while their utilities
may depend on other agents' choices. Independent optimization of each agent's
utility may yield poor individual and global payoff due to locally interfering in-
dividual preferences in the course of optimization. Joint optimization may scale
poorly, and is impossible if agents do not want to expose their preferences due
to privacy or security issues.
In this paper, we studied distributed optimization with sharing for mitigat-
ing this issue. Sharing utility with others may incentivize individuals to consider
choices that are locally suboptimal but increase global reward. To illustrate our
ideas, we proposed a utility sharing variant of distributed cross entropy optimiza-
tion. Empirical results show that utility sharing increases expected individual
and global payoff in comparison to optimization without utility sharing.
We also investigated the effect of defectors participating in a CAS of shar-
ing, self-interested agents. We observed that defection increases the mean ex-
pected individual payoff at the expense of sharing individuals' payoff. We empir-
ically showed that the choice between defection and sharing yields a fundamental
dilemma for self-interested agents in a CAS.
5.2 Limitations
A central limitation of CE-DOS is its state- and memoryless optimization. In
our formulation of utility sharing self-interested agents optimize an individual
action and share that maximizes their utility. However, our formulation does not
account for learning decision policies based on a current state and other learning
agents. In this case, the utility of each agent would also depend on concrete
states, transition dynamics and potentially also on models agents learn about
other participants [25,26].
As there is no temporal component to the optimization problems that we
studied in this paper, it is also not possible to study the effect of gathering
wealth in our current setup. We think that the dynamics of sharing in temporally
extended decision problems may differ from the ones in stateless optimization.
For example, corresponding observations have been made for game theoretic
dillemas, where optimal strategies change when repeating a game (in contrast to
the optimal strategy when the game is only played once) [27]. Similar research
has been conducted in the field of reinforcement learning, however not accounting
for utility sharing so far [6].
We also want to point out that exposing shares eventually provides ground
for attack for malicious agents [8]. Albeit indirectly, exposed shares carry in-
formation about individual utility landscapes, allowing attackers to potentially
gather sensitive information about agents' internal motivations. Agents in criti-
cal application domains should consider this weakness when opting to share.
5.3 Future Work
In future work, we would like to transfer our approach to temporally extended
domains and model sharing in CAS with multi-agent reinforcement learning.
Hopefully, this would enable studying sharing and the Sharer's Dilemma in more
complex domains.
We also think that there are many interesting options for realizing sharing
besides equal distribution as formulated in Eq. 1. For example, our formulation
does not allow for bilateral shares or formation of coalitions. Also, we would be
interested to study the effect of wealth on emergent cooperation and defection.
Another interesting line would be to investigate the effects of punishment in
CAS of self-interested agents.
As an application domain, it would be interesting to exploit the duality of
planning and verification. For example, agents utility could model individual
goal satisfaction probability. Sharing could be used to increase individual and
global goal satisfaction probability in CAS.
References
1. Tan, M.: Multi-agent reinforcement learning: Independent vs. cooperative agents.
In: Proceedings of the tenth international conference on machine learning. (1993)
330–337
2. Hillston, J., Pitt, J., Wirsing, M., Zambonelli, F.: Collective adaptive systems:
qualitative and quantitative modelling and analysis (dagstuhl seminar 14512). In:
Dagstuhl Reports. Volume 4., Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik
(2015)
3. Belzner, L., Holzl, M., Koch, N., Wirsing, M.: Collective autonomic systems: To-
wards engineering principles and their foundations. In: Transactions on Founda-
tions for Mastering Change I. Springer (2016) 180–200
4. Foerster, J., Nardelli, N., Farquhar, G., Torr, P., Kohli, P., Whiteson, S., et al.:
Stabilising experience replay for deep multi-agent reinforcement learning. arXiv
preprint arXiv:1702.08887 (2017)
5. Phan, T., Belzner, L., Gabor, T., Schmid, K.: Leveraging statistical multi-agent
online planning with emergent value function approximation. In: Proceedings of the
17th Conference on Autonomous Agents and Multi Agent Systems, International
Foundation for Autonomous Agents and Multiagent Systems (2018)
6. Leibo, J.Z., Zambaldi, V., Lanctot, M., Marecki, J., Graepel, T.: Multi-agent re-
inforcement learning in sequential social dilemmas. In: Proceedings of the 16th
Conference on Autonomous Agents and Multi Agent Systems, International Foun-
dation for Autonomous Agents and Multiagent Systems (2017) 464–473
7. Perolat, J., Leibo, J.Z., Zambaldi, V., Beattie, C., Tuyls, K., Graepel, T.: A multi-
agent reinforcement learning model of common-pool resource appropriation. In:
Advances in Neural Information Processing Systems. (2017) 3646–3655
8. Brundage, M., Avin, S., Clark, J., Toner, H., Eckersley, P., Garfinkel, B., Dafoe, A.,
Scharre, P., Zeitzoff, T., Filar, B., et al.: The malicious use of artificial intelligence:
Forecasting, prevention, and mitigation. arXiv preprint arXiv:1802.07228 (2018)
9. Lerer, A., Peysakhovich, A.: Maintaining cooperation in complex social dilemmas
using deep reinforcement learning. arXiv preprint arXiv:1707.01068 (2017)
10. Van der Hoek, W., Wooldridge, M.: Multi-agent systems. Foundations of Artificial
Intelligence 3 (2008) 887–928
11. Fioretto, F., Pontelli, E., Yeoh, W.: Distributed constraint optimization problems
and applications: A survey. arXiv preprint arXiv:1602.06347 (2016)
12. Shapley, L.S.: Stochastic games. Proceedings of the national academy of sciences
39(10) (1953) 1095–1100
13. Silver, D., Huang, A., Maddison, C.J., Guez, A., Sifre, L., Van Den Driessche, G.,
Schrittwieser, J., Antonoglou, I., Panneershelvam, V., Lanctot, M., et al.: Master-
ing the game of go with deep neural networks and tree search. nature 529(7587)
(2016) 484–489
14. Silver, D., Hubert, T., Schrittwieser, J., Antonoglou, I., Lai, M., Guez, A., Lanc-
tot, M., Sifre, L., Kumaran, D., Graepel, T., et al.: Mastering chess and shogi
by self-play with a general reinforcement learning algorithm.
arXiv preprint
arXiv:1712.01815 (2017)
15. Silver, D., Schrittwieser, J., Simonyan, K., Antonoglou, I., Huang, A., Guez, A.,
Hubert, T., Baker, L., Lai, M., Bolton, A., et al.: Mastering the game of go without
human knowledge. Nature 550(7676) (2017) 354
16. Anthony, T., Tian, Z., Barber, D.: Thinking fast and slow with deep learning
and tree search. In: Advances in Neural Information Processing Systems. (2017)
5366–5376
17. Littman, M.L.: Markov games as a framework for multi-agent reinforcement learn-
ing. In: Machine Learning Proceedings 1994. Elsevier (1994) 157–163
18. Foerster, J., Assael, I.A., de Freitas, N., Whiteson, S.: Learning to communicate
with deep multi-agent reinforcement learning. In: Advances in Neural Information
Processing Systems. (2016) 2137–2145
19. Tampuu, A., Matiisen, T., Kodelja, D., Kuzovkin, I., Korjus, K., Aru, J., Aru,
J., Vicente, R.: Multiagent cooperation and competition with deep reinforcement
learning. PloS one 12(4) (2017) e0172395
20. Sodomka, E., Hilliard, E., Littman, M., Greenwald, A.: Coco-q: Learning in
In: International Conference on Machine
stochastic games with side payments.
Learning. (2013) 1471–1479
21. Peysakhovich, A., Lerer, A.: Prosocial learning agents solve generalized stag hunts
better than selfish ones. arXiv preprint arXiv:1709.02865 (2017)
22. Hughes, E., Leibo, J.Z., Philips, M.G., Tuyls, K., Du´enez-Guzm´an, E.A.,
Castaneda, A.G., Dunning, I., Zhu, T., McKee, K.R., Koster, R., et al.: Inequity
aversion resolves intertemporal social dilemmas. arXiv preprint arXiv:1803.08884
(2018)
23. Kroese, D.P., Rubinstein, R.Y., Cohen, I., Porotsky, S., Taimre, T.: Cross-entropy
In: Encyclopedia of Operations Research and Management Science.
method.
Springer (2013) 326–333
24. Schelling, T.C.: Hockey helmets, concealed weapons, and daylight saving: A study
of binary choices with externalities. Journal of Conflict resolution 17(3) (1973)
381–428
25. Foerster, J.N., Chen, R.Y., Al-Shedivat, M., Whiteson, S., Abbeel, P., Mordatch,
I.: Learning with opponent-learning awareness. arXiv preprint arXiv:1709.04326
(2017)
26. Rabinowitz, N.C., Perbet, F., Song, H.F., Zhang, C., Eslami, S., Botvinick, M.:
Machine theory of mind. arXiv preprint arXiv:1802.07740 (2018)
27. Sandholm, T.W., Crites, R.H.: Multiagent reinforcement learning in the iterated
prisoner's dilemma. Biosystems 37(1-2) (1996) 147–166
|
1810.11634 | 1 | 1810 | 2018-10-27T12:33:03 | Agent-based models of collective intelligence | [
"cs.MA",
"cs.SI",
"nlin.AO"
] | Collective or group intelligence is manifested in the fact that a team of cooperating agents can solve problems more efficiently than when those agents work in isolation. Although cooperation is, in general, a successful problem solving strategy, it is not clear whether it merely speeds up the time to find the solution, or whether it alters qualitatively the statistical signature of the search for the solution. Here we review and offer insights on two agent-based models of distributed cooperative problem-solving systems, whose task is to solve a cryptarithmetic puzzle. The first model is the imitative learning search in which the agents exchange information on the quality of their partial solutions to the puzzle and imitate the most successful agent in the group. This scenario predicts a very poor performance in the case imitation is too frequent or the group is too large, a phenomenon akin to Groupthink of social psychology. The second model is the blackboard organization in which agents read and post hints on a public blackboard. This brainstorming scenario performs the best when there is a stringent limit to the amount of information that is exhibited on the board. Both cooperative scenarios produce a substantial speed up of the time to solve the puzzle as compared with the situation where the agents work in isolation. The statistical signature of the search, however, is the same as that of the independent search. | cs.MA | cs | Agent-based models of collective intelligence
Sandro M. Reia,1 Andr´e C. Amado,2 and Jos´e F. Fontanari1
1Instituto de F´ısica de Sao Carlos, Universidade de Sao Paulo,
Caixa Postal 369, 13560-970 Sao Carlos, Sao Paulo, Brazil
2Departamento de F´ısica, Universidade Federal de Pernambuco, 50670-901, Recife, PE, Brazil
Collective or group intelligence is manifested in the fact that a team of cooperating agents can
solve problems more efficiently than when those agents work in isolation. Although cooperation is,
in general, a successful problem solving strategy, it is not clear whether it merely speeds up the time
to find the solution, or whether it alters qualitatively the statistical signature of the search for the
solution. Here we review and offer insights on two agent-based models of distributed cooperative
problem-solving systems, whose task is to solve a cryptarithmetic puzzle. The first model is the
imitative learning search in which the agents exchange information on the quality of their partial
solutions to the puzzle and imitate the most successful agent in the group. This scenario predicts a
very poor performance in the case imitation is too frequent or the group is too large, a phenomenon
akin to Groupthink of social psychology. The second model is the blackboard organization in which
agents read and post hints on a public blackboard. This brainstorming scenario performs the best
when there is a stringent limit to the amount of information that is exhibited on the board. Both
cooperative scenarios produce a substantial speed up of the time to solve the puzzle as compared with
the situation where the agents work in isolation. The statistical signature of the search, however, is
the same as that of the independent search.
I.
INTRODUCTION
The development of software packages to tackle almost
any technical problem we can think of, as well as of
friendly interfaces between people and computers (see,
e.g., [1] in this issue), has contributed to the tremendous
increase of the productivity of today's society, thus rati-
fying the 1960s vision of the computer pioneer Doug En-
gelbart that the human intellect could be augmented with
the aid of computers [2]. In fact, if human intelligence
is gauged by the capacity and speed to solve problems,
which seems a sensible perspective for the scientific and
technological milieus, then it is difficult to disagree with
Engelbart's rationale.
However, since the general intelligence of a person --
the g factor -- has strong genetic (about 50%) and devel-
opmental (the remaining 50%) components there is little
adults can do to increase their intelligence (see [3] for a
lucid discussion of these controversial issues), thus lim-
iting the growth of the most important element of the
human-computer partnership. Although the natural and
widely employed way to circumvent this limitation is to
consider group work, only recently psychologists have put
forward evidence supporting a general collective intelli-
gence factor -- the so-called c factor -- that explains the
group performance on a variety of tasks [4]. Surprisingly,
the c factor does not seem to be strongly correlated with
the average or maximum individual intelligence of group
members. It is correlated instead with the average social
sensitivity of the group members [4]. Therefore, we could,
in principle, augment the group intelligence by properly
selecting the group composition and internal organiza-
tion.
Actually, the study of the influence of the organiza-
tion and,
in particular, of intra-group communication
patterns (i.e., who can communicate with whom) on
the problem-solving performance of groups dates back at
least to the 1950s [5 -- 7] (see [8 -- 10] for more recent con-
tributions). Understanding this influence is, of course, of
immense value because problem solving (e.g., drug de-
sign, traffic engineering, software development) by task
forces represents a substantial portion of the economy of
developed countries nowadays [11].
As argued above, we see organizational design as a by-
product of the study of collective intelligence or, more
specifically, of distributed cooperative problem-solving
systems. The key feature of these systems is that their
members exchange information about their progress to-
wards the completion of a goal [12, 13]. There are many
common-sense assumptions in this field, e.g., that a group
of cooperating individuals is more efficient than those
same individuals working in isolation or that diversity
is always beneficial to the group performance, that were
not fully scrutinized through a powerful (in the explana-
tory sense) analytical tool of physics, namely, the math-
ematical and computational modeling of complex phe-
nomena using minimal models. A minimal model should
exhibit a good balance between simplicity and realism
and should be successful in reducing a complex collective
phenomenon to its functional essence (see [14, 15] for use
of this approach to elucidate the physics of mind).
In fact, despite the extensive use of optimization
heuristics inspired on cooperative systems, such as the
particle swarm optimization algorithm [16] and the adap-
tive culture heuristic [17, 18], to search for optimal or
near optimal solutions of combinatorial problems, we
know little about the factors that make cooperation ef-
fective, as well as about the universal character (if any) of
the quantitative improvements that results from it [13].
This is so because those heuristics and the problems they
are set to solve are too complex to yield to a first-principle
analysis. Here we review recent attempts to study dis-
8
1
0
2
t
c
O
7
2
]
A
M
.
s
c
[
1
v
4
3
6
1
1
.
0
1
8
1
:
v
i
X
r
a
tributed cooperative problem-solving systems using min-
imal models following the research strategy set forth by
Huberman in the late 1980s [12, 13, 19]. We consider
two scenarios of distributed cooperative systems where
the goal of the agents is to solve a particular cryptarith-
metic puzzle [see eq. 1)], which is an illustrative example
of the class of constraint satisfaction problems that bases
most studies on problem solving [20].
In the first scenario we endow the agents with the ca-
pacity to evaluate the goodness of the partial solutions of
their peers and imitate the more successful agent in the
group. In the context of collective intelligence or global
brains, imitative learning is probably the most important
factor as neatly expresses this quote by Bloom "Imitative
learning acts like a synapse, allowing information to leap
the gap from one creature to another" [21]. Since imi-
tation is central to the remarkable success of our species
[22, 23] (see [24] for a discussion of this issue), we ex-
pect that this scenario may be of relevance to the or-
ganization of real-world task groups [25].
In fact, we
found that if the agents are too propense to imitate their
more successful peers or if the group is too large then
the group performance is catastrophic when compared
with the baseline situation where the agents work inde-
pendently of each other [26, 27]. This is similar to the
classic Groupthink phenomenon of social psychology that
occurs when everyone in a group starts thinking alike [28].
Avoiding this sort of harmful effect is the task of orga-
nizational designers and we have verified that two rather
natural interventions are partially effective to circumvent
Groupthink, namely, decreasing the connectivity of the
agents so as to delay the propagation of misleading infor-
mation through the system [29], and allowing diversity in
the agents' propensities to imitate their peers [30]. How-
ever, these interventions have an unwelcome side effect:
the degradation of the optimal performance of the group,
which is achieved in the case of fully connected homoge-
neous agents.
The
second scenario of distributed cooperative
problem-solving systems that we consider here is the
blackboard organization that was introduced in the Arti-
ficial Intelligence domain in the 1980s and is now part of
the AI problem-solving toolkit [31]. In this organization,
the agents read and write hints to a central blackboard
that can be accessed by all members of the group. Hence
the blackboard scenario describes the common view of
task-forces as teams of specialists exchanging ideas on
possible approaches to solve a problem and displaying
the promising suggestions in a public blackboard. In this
scenario, there is no need to assume that the agents are
capable of quantifying the goodness of their partial so-
lutions to the cryptarithmetic puzzle as in the imitative
learning scenario (see, however, [32]). To our knowledge,
this was the first distributed cooperative problem-solving
system studied using an agent-based minimal model [13].
Contrary to the claims of that original study, however, we
found that the search using the blackboard organization
exhibits the same statistical signature of the independent
2
search [32]. Most unexpectedly, we found that limiting
the amount of information displayed on the board can
markedly boost the performance of the group. This is an
original result that we offer in this review paper, which
illustrates well the power of minimal models to reveal
relevant hidden features of complex systems.
The rest of this short review paper is organized as fol-
lows. In Section II we present the particular cryptarith-
metic problem that we use throughout the paper, de-
fine the costs associated to the digit-to-letter assignments
that are necessary to implement the imitative learning
search strategy, and introduce the definition of hint that
is necessary for implementing the blackboard organiza-
tion. In Section III we present our measure of the group
performance, which is proportional to the time for an
agent in the group to find the solution and hence to halt
the search. By dividing this time by the size of the state
space of the problem and multiplying it by the number
of agents in the group we obtain the computational cost
of the search, which is our performance measure. In Sec-
tion IV we describe the imitative learning search strategy
and discuss its performance on the cryptarithmetic puz-
zle for the simplest case where all agents interact with
each other, i.e., the pattern of communication is a fully
connected network. In Section V we present the minimal
model for the blackboard organization and show that the
probability distribution of the computational costs is an
exponential distribution as in the case of the independent
search. The mean computational cost of the search for
the standard blackboard organization, however, is about
ten times lower than for the independent search. Also in
that section, we introduce the limited space blackboard
scenario where the agents have to compete for space in
the board. In this case, the computational cost can be
reduced by another factor of ten using a judicious choice
of the blackboard size. Finally, Section VI is reserved to
our concluding remarks and to advance some avenues for
future research.
II. THE CRYPTARITHMETIC PROBLEM
Cryptarithmetic problems such as
DON ALD + GERALD = ROBERT
(1)
are constraint satisfaction problems in which the task is
to find unique digit-to-letter assignments so that the in-
teger numbers represented by the words add up correctly
[33]. In the cryptarithmetic problem (1), there are 10! dif-
ferent digit-to-letter assignments, of which only one is the
solution to the problem, namely, A = 4, B = 3, D = 5,
E = 9, G = 1, L = 8, N = 6, O = 2, R = 7, T = 0
so that DON ALD = 526485, GERALD = 197485 and
ROBERT = 723970. In this paper we will focus only on
the cryptarithmetic problem (1) because its state space is
the largest possible for this type of puzzle (a cryptarith-
metic puzzle has at most 10 different letters) and because
it facilitates the replication of our findings. Use of ran-
domly generated cryptarithmetic puzzles as well as dis-
tinct optimization problems, such as finding the global
maximum of NK-fitness landscapes [34], has yielded the
same (qualitative) results [26, 27].
The imitative learning search strategy that will be dis-
cussed in Sect. IV requires that we assign a cost to each
digit-to-letter assignment, which is viewed as a measure
of the goodness of the answer represented by that assign-
ment. A natural choice for the cost function is [35]
c = ROBERT − (DON ALD + GERALD) .
(2)
For example, the digit-to-letter assignment A = 0, B = 2,
D = 9, E = 4, G = 8, L = 1, N = 7, O = 6, R = 3, T =
5 yields ROBERT = 362435, DON ALD = 967019 and
GERALD = 843019 and the cost assigned to it is c =
1447603. We should note that the cost value (2) applies
to all digit-to-letter assignments except those for which
R = 0, D = 0 and G = 0, which are invalid assignments
since they violate the rule of the cryptarithmetic puzzles
that an integer number should not have the digit 0 at
its leftmost position. Hence for those assignments we fix
an arbitrary large cost value, namely, c = 108, so that
now they become valid assignments but have the highest
cost among all assignments.
If the cost of a digit-to-
letter assignment is c = 0 then it is the solution to the
cryptarithmetic problem.
Although we could easily think up clever alternatives
to the cost function (2), we recall that our aim is not to
design efficient algorithms to solve cryptarithmetic prob-
lems but to explore cooperative strategies that improve
the efficiency of group work [12]. In that sense, the cho-
sen problem (1) is quite challenging in that it offers many
misleading clues -- local minima of the cost (2) and wrong
hints -- which may lure the search away from the solution.
However, as already mentioned, we stress that the main
advantage of considering a specific problem is the easy to
replicate and verify our claims.
At this stage it is convenient to describe the minimal
or elementary move in the state space composed of the
10! possible digit-to-letter assignments. Starting from a
particular digit-to-letter assignment, say, A = 0, B = 2,
D = 9, E = 4, G = 8, L = 1, N = 7, O = 6, R = 3,
T = 5 we choose two different letters at random and in-
terchange the digits assigned to them. For example, if
we pick letters D and T then the assignment that results
from the application of the elementary move is A = 0,
B = 2, D = 5, E = 4, G = 8, L = 1, N = 7, O = 6,
R = 3, T = 9. Any two valid digit-to-letter assignments
that are connected by the elementary move are said to
be neighbor assignments. Hence each digit-to-letter as-
signment in the state space of problem (1) has exactly 45
neighbors. Clearly, the repeated application of our ele-
mentary move allows us to explore the entire state space
of the cryptarithmetic problem. We can check all assign-
ments and their neighbors to find the number of min-
ima, i.e., those assignments that have a cost (strictly)
lower than the cost of their neighbors. We find that the
3
cryptarithmetic problem (1) has 102 minima in total: a
single global minimum and 101 local minima. We recall,
however, that the existence and characteristics of the lo-
cal minima are strongly dependent on the choices of the
cost function and of the elementary move in the state
space.
An important feature of cryptarithmetic puzzles,
which makes them a testbed for cooperative strategies, is
the existence of hints that may hint on the suitability of
a particular digit-to-letter assignment. A hint is a set of
letters in a same column that add up correctly modulo
10. For example, considering the third column (from left
to right) of the problem (1) we have B = +N +R where
= 0, 1 and the sum is done modulo 10. The case = 1
accounts for the possibility that an 1 is carried from the
sum of the letters in the fourth column. Of course, for
the rightmost column (D + D = T ) the only possibility
is = 0. For this column there are 9 different hints:
(D = 1, T = 2), (D = 2, T = 4), (D = 3, T = 6), etc.
Each one of the columns + L + L = R, + A + A = E
and + O + E = O has 18 different hints (9 for = 0
and 9 for = 1), whereas columns + N + R = B and
+ D + G = R have 144 different hints (72 for = 0
and 72 for = 1) each. Hence there are a total of 351
distinct hints but only 6 of them yield the solution of
the puzzle (1). We note that we could further reduce
this number by eliminating hints in the leftmost column
such that + D + G > 9 with the sum now done modulo
1. However, we choose not to implement this rule since
what matters is that the total number of hints is much
smaller than the size of the state space and that the six
correct hints are contemplated in our definition of hint.
In the blackboard organization, the communication be-
tween the agents is achieved by posting and reading hints
in a public blackboard [13] and so there is no need to in-
troduce a cost for each digit-to-letter assignment (see [32]
for a scheme where the hints are displayed together with
the costs of the agents that posted them).
III. THE COMPUTATIONAL COST
The efficiency of the search for the solution of the
cryptarithmetic puzzle is measured by the computational
cost that is defined as follows. Let us consider a group
composed of M agents so that each agent is represented
by a digit-to-letter assignment. The agents explore the
state space following a search strategy that specifies the
rules for updating their digit-to-letter assignments. Each
time a randomly chosen agent updates its digit-to-letter
assignment we increment the time t by the quantity
∆t = 1/M , so that during the increment from t to t + 1
exactly M , not necessarily distinct, agents are updated.
The search ends when one of the agents finds the solu-
tion to the puzzle and we denote by t∗ the time when
this happens. Since we expect that t∗ will increase with
the size of the state space (10! for our cryptarithmetic
puzzle) and that, at least for the independent search, it
will decrease with the reciprocal of the number of agents,
we define the computational cost C of the search as
C = M t∗/10!
(3)
so that C is on the order of 1 for the independent search,
regardless of the group size. Next we study the statistical
properties of the computational cost for two cooperative
problem-solving scenarios, namely, the imitative learning
search and the blackboard organization.
IV. THE IMITATIVE LEARNING SEARCH
This search strategy is based on the presumption that
the cost (2) offers a clue on the goodness of the digit-to-
letter assignment so that it may be advantageous to copy
or imitate agents whose assignments have low cost. More
pointedly, at time t, a randomly chosen agent -- the target
agent -- can choose between two actions. The first action,
which happens with probability 1−p, is the elementary or
minimal move in the space space described in Section II.
The second action, which happens with probability p, is
the imitation of the model agent, which is the agent with
the lowest cost digit-to-letter assignment in the group at
time t. To illustrate the copying process let us assume
for the sake of concreteness that the target agent has
the assignment A = 0, B = 2, D = 9, E = 4, G = 8,
L = 1, N = 7, O = 6, R = 3, T = 5 whose cost is
c = 1447603 and the model agent has the assignment
A = 5, B = 3, D = 9, E = 4, G = 8, L = 1, N = 6,
O = 2, R = 7, T = 0 whose cost is c = 1050568. In the
copying process the target agent selects at random one
of the distinct digit-to-letter assignments in the model
agent and assimilates it.
In our example, the distinct
assignments occur for the letters A, B, N , O, R and
T . Say that letter B is chosen, so that the target agent
has to assimilate the assignment B = 3. To do that the
target agent simply interchanges the digits assigned to
the letters B and R, as in the elementary move, so that
the resulting assignment becomes A = 0, B = 3, D = 9,
E = 4, G = 8, L = 1, N = 7, O = 6, R = 2, T = 5
whose cost is c = 1545613. As expected, the result of
imitation is the increase of the similarity between the
target and the model agents, which may not necessarily
lead to a decrease of the cost of the target agent, as in
our example. The case p = 0 corresponds to the baseline
situation where the M agents explore the state space
independently.
It is important to note that in the case the target agent
is identical to the model agent, and this situation is not
uncommon since the imitation process reduces the diver-
sity of the group, the target agent executes the elemen-
tary move with probability one. This procedure is differ-
ent from that used in [26], in which agents identical to
the model agent are not updated in the imitation action.
Both implementations yield qualitatively similar results,
except in the regime where imitation is extremely fre-
quent, i.e., for p ≈ 1. In particular, for p = 1 the imple-
4
FIG. 1. Mean computational cost (cid:104)C(cid:105) as function of the imita-
tion probability p for groups of size (top to bottom at p = 0.2)
M = 2, 5, 8, 25 and 200. For the independent search (p = 0)
we find (cid:104)C(cid:105) ≈ 1.02 regardless of the group size.
mentation in which the model agent is unchanged results
in the search being permanently stuck in a local mini-
mum [26], whereas in the implementation in which the
model agent executes the elementary move actually leads
to the optimal performance for very small groups, as we
will show next. The procedure adopted here was used in
most studies of the imitative learning search [27, 36].
Figure 1 shows the mean computational cost (cid:104)C(cid:105) as
function of the imitation probability p obtained by av-
eraging over 105 independent runs. For groups of size
M < 5 the performance always improves with increas-
ing p and for those small groups the strategy of always
imitating the lowest cost agent (i.e., p = 1) is optimal.
For M = 5 there appears a minimum at p ≈ 0.96 with
computational cost (cid:104)C(cid:105) ≈ 0.032 that corresponds to the
best performance of the imitative learning search for the
entire space of the model parameters M and p. This
amounts to more than a thirtyfold improvement on the
group performance as compared with the independent
search. For large groups, increase of the imitation prob-
ability p can lead to catastrophic results due to the trap-
ping of the search around the local minima. This harmful
effect appears in large groups only and it is due to the
existence of several copies of the model agent carrying
a low cost digit-to-letter assignment (local minimum).
This makes it very hard to explore other regions of the
state space through the elementary move, since the ex-
tra copies attract the updated model agent back to the
local minimum. However, for small group sizes, the ele-
mentary move can easily carry the agents away from the
local minima as illustrated in Fig. 1. The optimal perfor-
mance for M > 5, which is determined by the minimum
of the curve (cid:104)C(cid:105) vs. p, degrades smoothly with increas-
ing M . We note that when the model parameters are
close to their optimal values, the distribution of proba-
bility of the computational costs is well-described by an
exponential distribution [26].
0 0.2 0.4 0.6 0.8 1 0 0.2 0.4 0.6 0.8 1<C>p5
imitative learning search is markedly different from the
well-known genetic algorithms [39]. In fact, the elemen-
tary move can be seen as the counterpart of mutations
with the caveat that in the genetic algorithm mutation
is an error of the reproduction process, whereas in the
imitative search the elementary move and the imitation
procedure are mutually exclusive processes. The analogy
between the imitation and the crossover processes is even
more far-fetched. The model agent is a mandatory par-
ent in all mates but it contributes a single gene (i.e., a
single digit to letter assignment) to the offspring which
then replaces the other parent, namely, the target agent.
Since the contributed gene is not random - it must be
absent in the target agent - the genetic analogy is clearly
inappropriate and so the imitative learning search stands
on its own as a search strategy.
V. THE BLACKBOARD ORGANIZATION
The popular view of working groups as teams of spe-
cialists that exchange ideas on possible approaches to
solve a problem and write the promising lines of investi-
gation in a public display is the inspiration for the black-
board organization [31]. The study of a minimal model
of these brainstorming groups, which considers M agents
and a central blackboard where the agents can read and
write hints, suggested that the blackboard organization
could produce a superlinear speedup of the solution time
t∗ (see Section III) with respect to the number of group
members M [13]. We recall that for the independent
search the speedup is linear, i.e., t∗ ∝ 1/M , provided
that M is not too large in order to avoid duplication of
work. In our problem, duplication of work will occur for
unrealistically large groups, M (cid:29) 10!, only. If the super-
linear speedup claim were correct, then it would offer a
nice qualitative evidence of the benefits of cooperation to
problem-solving systems. However, recent evidences in-
dicate that whereas the blackboard organization actually
produces a significant improvement on the performance
of the search, it does not change the nature of the search
which exhibits the same characteristics of the indepen-
dent search and, in particular, the same scaling of t∗
with M [32].
An advantage of blackboard systems is that they do
not need the introduction of arbitrary cost functions to
weight the quality of the digit-to-letter assignments. As it
will be clear in our analysis of limited space blackboards,
the number of hints exhibited by an assignment is an
effective, albeit indirect, measure of its quality. A limited
space blackboard can exhibit at most B hints so that,
when the blackboard is full, the agents must erase hints
to make room for their own hints on the board. Next we
describe the dynamics of the blackboard organization.
At the initial time, t = 1, all agents' digit-to-letter
assignments are selected with equal probability from the
pool of the 10! valid assignments. Each agent then checks
for all possible hints of its digit-to-letter assignment (see
FIG. 2. Mean computational cost (cid:104)C(cid:105) as function of the group
size M for imitation probability p = 0.5 (circles), 0.6 (trian-
gles), 0.7 (inverted triangles) and 1 (squares). The horizontal
line at (cid:104)C(cid:105) = 1.02 indicates the mean cost for the independent
search (p = 0).
Figure 2 illustrates more neatly the existence of a group
size that optimizes the performance of the group for a
fixed imitation probability. Hence the conjecture that
the efficacy of imitative learning could be a factor de-
terminant of the group size of social animals [26] (see
[37, 38] for a discussion of the standard selective pres-
sures on group size in nature). As pointed out before,
the best performance overall is achieved for small groups
with high imitation probability.
The relevant finding revealed in Figs. 1 and 2 is that
the group performance can be optimized by tuning the
two parameters of the model, namely, the group size M
and the imitation probability p. Hence collective intelli-
gence can be augmented through a judicious choice of the
behavioral characteristics of the group members, mod-
eled here by the imitation probability p, and of the group
size M . As already pointed out, the catastrophic per-
formance exhibited by large groups and high imitation
probabilities is akin to the Groupthink phenomenon [28],
when everyone in a group starts thinking alike, which
can occur when people put unlimited faith in a talented
leader (the model agent, in our case). In addition to us-
ing small group sizes, there are two other ways to avoid
the trapping in the local minima. The first way is de-
creasing or delaying the influence of the model agent by
reducing the connectivity of the network [29]. The second
is allowing some diversity in the imitation probabilities
of the agents since agents characterized by p ≈ 0 will
rarely be trapped in the local minima [30]. Although
these solutions are effective in avoiding the catastrophic
performance for large M and p they have the unwanted
side effect of degrading the optimal performance, which is
obtained using a fully connected influence network with
homogeneous imitation probabilities, as in the model de-
scribed before.
We note that, despite some superficial similarities, the
0 0.2 0.4 0.6 0.8 101020304050607080<C>MSection II), singles out the novel hints (i.e., the hints
that are not already displayed on the blackboard) and
chooses one of them at random to post on the board. In
this process, the agent also makes a list of the hints that
are displayed on the board and that do not appear in its
digit-to-letter assignment. Those are the different hints.
Let us assume that the limited space board of size B is
full, so the agent must make room to post its selected
hint. To do so the agent selects one of the different hints
on the board at random and replaces it by its hint. In
case the board is not full, the agent simply posts the
selected hint on the board. We have tested many variants
of this pick-and-replace procedure and found that they
produce only negligible quantitative changes on the group
performance and so do not affect our conclusions.
Once the initial states of the agents and of the black-
board are set up, the agents can update their digit-to-
letter assignments by performing two actions: the ele-
mentary move described in Section II and the assimila-
tion of one of the hints displayed on the blackboard. The
search procedure develops as follows.
It begins with a
randomly chosen agent -- the target agent -- picking a hint
at random from the blackboard. In the case that there
are no hints (i.e, the blackboard is empty), or that the
target agent is already using the chosen hint, the agent
performs the elementary move; otherwise it assimilates
the hint. The assimilation of a hint by the target agent
involves the relocation of at most six digits of its digit-to-
letter assignment. For example, consider the assimilation
of the hint (N = 1, R = 4, B = 5) by an agent that has
the assignment A = 0, B = 2, D = 9, E = 4, G = 8,
L = 1, N = 7, O = 6, R = 3, T = 5. This can be done
sequentially using the same assimilation procedure of the
imitative learning search described in Section IV. First,
the assignment N = 1 is assimilated, yielding A = 0,
B = 2, D = 9, E = 4, G = 8, L = 7, N = 1, O = 6,
R = 3, T = 5, then R = 4, yielding A = 0, B = 2, D = 9,
E = 3, G = 8, L = 7, N = 1, O = 6, R = 4, T = 5 and
finally B = 5 resulting in the digit-to-letter assignment
A = 0, B = 5, D = 9, E = 3, G = 8, L = 7, N = 1,
O = 6, R = 4, T = 2 that exhibits the desired hint. As
usual, after the target agent is updated, we increment
the time t by the quantity ∆t = 1/M .
After any of the events -- elementary move or assimi-
lation of a hint from the blackboard -- the target agent
checks for all possible hints from its new assignment and
executes the pick-and-replace procedure described be-
fore. In addition, if the solution of the puzzle is found
the search halts and the time t = t∗ is recorded.
Figure 3 shows the distribution of probability P (C) of
the computational cost for the independent search and
for the blackboard organization in the case there is no
space limitation on the blackboard so it can display all
351 distinct hints. Our results show that those distribu-
tions are exponential for both search strategies, contrary
to the suggestion of [13] that the exponential distribution,
which characterizes the independent search, would be re-
placed by a lognormal distribution for the blackboard
6
FIG. 3. Probability distribution of the computational cost
(3) for the independent search and the blackboard organiza-
tion with M = 100 agents. There is no space limitation on the
blackboard, i.e., B = 351. These distributions were generated
using 106 independent runs. The curve fitting the data of the
independent search is P (C) = 0.98 exp (−0.98C), whereas
the data of the blackboard system is fitted by P (C) =
10 exp (−10C).
organization. From a quantitative perspective, however,
the blackboard organization produces a tenfold decrease
of the computational cost as compared with the indepen-
dent search. In particular, (cid:104)C(cid:105) ≈ 0.10 for the unlimited
space blackboard and (cid:104)C(cid:105) ≈ 1.02 for the independent
search. We note that the elementary move is slightly less
efficient to explore the state space than the replacement
of the entire digit-to-letter assignment (global move) used
in Refs. [13, 32]. This is so because it is not too unlikely to
reverse a change made by the elementary move. For ex-
ample, the probability to reverse a change in a subsequent
trial is 2/90 for the the elementary move, whereas it is
1/10! for the global move. Interestingly, the replacement
of the global by the elementary move has no discernible
effect on the performance of the blackboard organization.
Figure 4, which shows the mean computational cost
as function of the system size, proves that t∗ scales with
1/M (and hence (cid:104)C(cid:105) is independent of the system size
M ) for both the blackboard and the independent search
strategies. For the blackboard organization, the increase
of the computational cost due to duplication of work oc-
curs for much smaller group sizes than for the indepen-
dent search since the blackboard reduces the effective size
of the state space to be explored by the agents. The main
point is that the unlimited blackboard system is not re-
ally a cooperative problem-solving system, since once the
blackboard is filled out, which happens in a very short
time [32], the agents will pick hints on the board and
explore the state space independently of each other.
This situation changes dramatically when the size B of
the blackboard is limited so the agents have to compete
for space to write their hints on the board. At first sight,
one would expect that limiting the information avail-
0.001 0.01 0.1 1 1000.20.40.60.81independentsearchblackboardP(C)C7
from the board. This probability is defined as the ra-
tio between the number of correct hints selected and the
total number of hint selections, averaged over all agents
during a run. The result is then averaged over 105 inde-
pendent runs. Not surprisingly, Figs. 5 and 6 reveal the
strong correlation between (cid:104)C(cid:105) and φ so that the better
performance of limited space blackboards is consequence
of the higher odds of selecting a correct hint from the
board. But the reason these odds are higher for limited
boards is not obvious at all. For instance, consider a null
model in which the hints displayed on the board of size
B are selected randomly without replacement from the
pool of 351 hints. Since the cryptarithmetic puzzle (1)
has only six correct hints, the probability that the board
displays exactly k correct hints is given by an hyperge-
ometric distribution. Now, given that the blackboard
displays k correct hints, the probability that the agents
selects one of them is simply k/B. Hence the probability
that an agent selects a correct hint from a board of size
B in this null model is
k
B
=
6
351
≈ 0.017,
(4)
6(cid:88)
k=0
φ =
(cid:0)6
k
(cid:1)
(cid:1)(cid:0)351−6
(cid:0)351
(cid:1)
B−k
B
FIG. 4. Mean computational cost (cid:104)C(cid:105) as function of the sys-
tem size M for the independent search (triangles) and the
blackboard organization (circles). There is no space limita-
tion on the blackboard, i.e., B = 351. Each symbol represents
the average over 105 independent runs. The error bars are
smaller than the symbol sizes.
which does not depend on the board size. We note that
in this null model the limitation of the number of hints
displayed on the board does not affect the group perfor-
mance at all, contrary to the naive expectation that it
would harm that performance.
The explanation for the dependence on B shown in
Fig. 6 (and consequently in Fig. 5) is that the hints dis-
played on the board are not a random sample of the pool
of hints, as assumed in the null model. The somewhat
subtle reason for the bias towards the correct hints is that
whenever an agent assimilates a hint from the board it
must relocate up to six digits of its original digit-to-letter
assignment. In doing so, it is very likely to eliminate any
previous hints it carried, except if those hints, i.e., the
hint copied from the board and the hints that are already
part of the agent's assignment, are the correct hints. In
that sense, correct hints are insensitive to the radical re-
arrangement of digits resulting from the assimilation of
another correct hint from the board and this explains its
higher frequency in the blackboard.
As can be hinted from Fig. 5 the dependence of the
computational cost on the number of agents M is quite
complex and changes qualitatively for different values of
the board size B, so we will leave a detailed discussion of
this point to a future contribution. Here we mention only
that in a typical situation the computational cost initially
decreases with increasing M until it reaches a minimum
value, beyond which it begins to increase till it levels
off and becomes size-independent, provided M is not too
large, as in the case of the unlimited size blackboard (see
Fig. 4).
Finally, the fact that the blackboard organization
works so well for just a single agent (M = 1), which seems
to use the blackboard as an external memory to store the
FIG. 5. Mean computational cost (cid:104)C(cid:105) as function of the black-
board size B for systems of size M = 1 (triangles), 10 (in-
verted triangles) and 100 (circles). Each symbol represents
the average over 105 independent runs. The error bars are
smaller than the symbol sizes.
able to the agents would harm the group performance.
However, Fig. 5 shows that, except for small board sizes
(B < 20 for the data shown in the figure), increasing
the number of hints displayed on the board actually de-
grades the group performance, regardless of the group
size. In addition, for each group size there is a value of
B that minimizes the computational cost. In particular,
for M = 1 we find this optimum at B = 20, for M = 10
at B = 7 and for M = 100 at B = 15.
To understand the counterintuitive finding that lim-
iting the amount of information displayed on the black-
board improves the group performance, we present in Fig.
6 the probability φ that an agent selects a correct hint
0 0.2 0.4 0.6 0.8 1100101102103104105106107independent searchblackboard<C>M 0 0.02 0.04 0.06 0.08 0.1050100150200250300350<C>B8
imal or not is the number of model parameters. The imi-
tative learning model has two parameters only: the copy
or imitation propensity p of the agents and the group size
M . The blackboard organization has two parameters too:
the group size M and the blackboard size B. The value
of a minimal model (or, for that matter, of any model)
should be gauged by the unexpectedness of its predic-
tions. In fact, the optimization of the group performance
for a specific group size and the Groupthink-like phe-
nomenon observed in the study of the imitative learning
model, as well as the improved performance of the black-
board organization in the case the amount of available
information is limited, bear witness to the importance of
those models.
From a quantitative perspective, we note that the best
performance of the imitative search strategy is achieved
for M = 5 and p = 0.96 and yields the mean compu-
tational cost (cid:104)C(cid:105) ≈ 0.03 (see Fig. 1), whereas the best
performance of the blackboard organization is achieved
for M = B = 10 with mean cost (cid:104)C(cid:105) ≈ 0.01 (see Fig. 5).
For the sake of comparison, we recall that the mean com-
putational cost of the independent search is (cid:104)C(cid:105) ≈ 1.02,
regardless of the group size, so our two cooperative work
scenarios produce a substantial boost on the performance
of the group of agents.
Although the two minimal models of distributed coop-
erative problem-solving systems presented here are easy
to formulate and simulate in a computer, they exhibit
some features that preclude any simple analytical ap-
proach as, for instance, the need to select the best digit-
to-letter assignment to serve as model for the agents
and the non-local effect of assimilating a hint from the
blackboard. Perhaps, these obstacles may yield to more
powerful and sophisticated mathematical tools, such as
the kinetic theory of active particles [43], so as to make
the study of collective intelligence more appealing to the
mathematics community [44].
To conclude, we note that the key issues that motivated
the proposal of the original minimal model of cooperative
problem-solving systems remain unanswered [13]. For in-
stance, the question whether cooperative work can alter
the statistical signature of the search on the state space of
the combinatorial problem is still open, since the compu-
tational costs of the models studied here are distributed
by exponential probability distributions as in the case of
the independent search (see Fig. 3). Moreover, for large
group sizes M the time t∗ to find the solution decreases
with 1/M for both the blackboard organization and the
independent search (see Fig. 4), whereas it actually in-
creases with increasing M for the imitative search due to
the Groupthink phenomenon (see Fig. 2). A qualitative
beneficial effect of cooperation should result in the scal-
ing t∗ ∝ 1/M α with the exponent α > 1, but producing
a model with this attribute has proved an elusive task so
far.
FIG. 6. Probability φ that an agent selects a correct hint
from the blackboard as function of the blackboard size B for
systems of size M = 1 (triangles), 10 (inverted triangles) and
100 (circles). Each symbol represents the average over 105
independent runs. The error bars are smaller than the symbol
sizes. The horizontal line at φ = 6/351 is the prediction of
the random blackboard null model.
hints discovered during its exploration of the state space,
indicates that the main role of the blackboard is not the
promotion of cooperation between the agents as initially
thought [13]: the blackboard serves as a collective mem-
ory storage device for the otherwise memoryless agents.
We note that for the reputation blackboard, where the
hints are posted together with the cost (2) of the agent,
the best performance is achieved in the case of a single
agent [32]. Interestingly, in the context of the wisdom-
of-crowds effect [40] (see also [41]), the performance of
a single individual is usually improved if its estimate is
taken as the average of its previous estimates -- the so-
called crowd within [42]. These findings in very distinct
contexts make evident the difficulty to disentangle the
memory from the cooperation effects without the aid of
the minimal model approach.
VI. CONCLUSION
Rather than advance new search heuristics to solve
combinatorial problems, the goal of our approach to
study collective intelligence is to assess quantitatively
and systematically the potential of cooperation to solve
problems in very simplified scenarios. Of course, once
the conditions that optimize the efficiency of cooperative
work are understood, this knowledge can be used to de-
vise cost-effective search heuristics, which is ultimately
the goal of the research on collective intelligence.
Here we have reviewed and offered original insights on
two minimal models of distributed cooperative problem-
solving systems, namely, the imitative learning search
strategy and the blackboard organization. A good crite-
rion to determine whether a mathematical model is min-
0.02 0.04 0.06 0.08 0.1050100150200250300350φBACKNOWLEDGMENTS
The research of J.F.F. is supported in part by grants
2017/23288-0, Funda¸cao de Amparo `a Pesquisa do Es-
9
tado de Sao Paulo (FAPESP) and 305058/2017-7, Con-
selho Nacional de Desenvolvimento Cient´ıfico e Tec-
nol´ogico (CNPq).
is supported by FAPESP
scholarship 2015/17277-0 and A.C.A is supported by a
CAPES scholarship.
S.M.R.
[1] Fallani FDV, Bassett DS. Network neuroscience for op-
timizing brain-computer interfaces. Phys Life Rev [this
issue].
[2] Engelbart DC. Augmenting Human Intellect: A Con-
ceptual Framework. SRI Summary Report AFOSR-3223;
1962.
[3] Deary IJ. Intelligence: A Very Short Introduction. Ox-
ford, UK: Oxford University Press; 2001.
[4] Woolley AW, Chabris CF, Pentland A, Malone NHT.
Evidence for a Collective Intelligence Factor in the Per-
formance of Human Groups. Science 2010; 333: 686 -- 688.
[5] Bavelas A. Communication Patterns in Task-Oriented
Groups. J Acoustical Soc Amer 1950; 22: 725 -- 730.
[6] Guetzkow H, Simon H A. The Impact of Certain Com-
munication Nets upon Organization and Performance in
Task-oriented Groups. Manage Sci 1955; 1: 233 -- 250.
[7] Leavitt HJ. Some Effects of Certain Communication Pat-
terns on Group Performance. J Abnorm Soc Psych 1951;
46: 38 -- 50.
2001.
[22] Blackmore S. The Meme Machine. Oxford: Oxford Uni-
versity Press; 2000.
[23] Rendell L, Boyd R, Cownden D, Enquist M, Eriksson
K, Feldman MW, Fogarty L, Ghirlanda S, Lillicrap T,
Laland KN. Why Copy Others? Insights from the Social
Learning Strategies Tournament. Science 2010; 328: 208 --
213.
[24] Kivinen O, Piiroinen T. Evolutionary Understanding of
Consciousness -- a Transactional Naturalist Approach.
Phys Life Rev [this issue].
[25] Lazer D, Friedman A. The Network Structure of Explo-
ration and Exploitation. Admin Sci Quart 2007; 52: 667 --
694.
[26] Fontanari JF. Imitative Learning as a Connector of Col-
lective Brains. PLoS ONE 2014; 9: e110517.
[27] Fontanari JF. Exploring NK fitness landscapes using im-
itative learning. Eur Phys J B 2015; 88: 251.
[28] Janis IL. Groupthink: psychological studies of policy de-
[8] Mason W, Watts DJ. Collaborative Learning in Net-
cisions and fiascoes. Boston: Houghton Mifflin; 1982.
works. Proc Natl Acad Sci 2012; 109: 764 -- 769.
[9] Reia SM, Herrmann S, Fontanari JF. Impact of centrality
on cooperative processes. Phys Rev E 2017; 95: 022305.
[10] Reia SM, Fontanari JF. Effect of group organization on
the performance of cooperative processes. Ecol Complex
2017; 30: 47 -- 56.
[11] Page SE. The Difference: How the Power of Diversity
Creates Better Groups, Firms, Schools, and Societies.
Princeton, NJ: Princeton University Press; 2007.
[29] Fontanari JF, Rodrigues FA. Influence of network topol-
ogy on cooperative problem-solving systems. Theor
Biosci 2016; 135: 101 -- 110.
[30] Fontanari JF. When more of the same is better. EPL
2016; 113: 28009.
[31] Corkill DD. Blackboard Systems. AI Expert 1991; 6: 40 --
47.
[32] Fontanari JF. Reputation blackboard systems. Cogn Syst
Res 2018; 50: 29 -- 35.
[12] Huberman BA. The performance of cooperative pro-
[33] Averbach B, Chein O. Problem Solving Through Recre-
cesses. Physica D 1990; 42: 38 -- 47.
[13] Clearwater SH, Huberman BA, Hogg T. Cooperative So-
lution of Constraint Satisfaction Problems. Science 1991;
254: 1181 -- 1183.
[14] Perlovsky L. Toward physics of the mind: Concepts, emo-
tions, consciousness, and symbols. Phys Life Rev 2006;
3: 23 -- 55.
[15] Schoeller F, Perlovsky L, Arseniev D. Physics of mind:
Experimental confirmations of theoretical predictions.
Phys Life Rev 2018; doi: 10.1016/j.plrev.2017.11.021
[16] Bonabeau E, Dorigo M, Theraulaz G. Swarm Intelli-
gence: From Natural to Artificial Systems. Oxford, UK:
Oxford University Press; 1999.
[17] Kennedy J. Thinking is social: Experiments with the
adaptive culture model. J Conflict Res 1998; 42: 56 -- 76.
[18] Fontanari JF. Social interaction as a heuristic for com-
binatorial optimization problems. Phys Rev E 2010; 82:
056118.
[19] Huberman BA, Hogg T. Phase transitions in artificial
intelligence systems. Artif Intell 1987; 33: 155 -- 171.
[20] Newell A, Simon HA. Human problem solving. Engle-
wood Cliffs, NJ: Prentice-Hall; 1972.
[21] Bloom H. Global Brain: The Evolution of Mass Mind
from the Big Bang to the 21st Century. New York: Wiley;
ational Mathematics. San Francisco: Freeman; 1980.
[34] Kauffman S, Levin S. Towards a general theory of adap-
tive walks on rugged landscapes. J Theor Biol 1987; 128:
11 -- 45.
[35] Abbasian R, Mazloom M. Solving Cryptarithmetic Prob-
lems Using Parallel Genetic Algorithm. In: Proceedings
of the Second International Conference on Computer
and Electrical Engineering. Washington, DC: IEEE Com-
puter Society; 2009. p. 308 -- 312.
[36] Fontanari JF. Awareness improves problem-solving per-
formance. Cogn Syst Res 2017; 45: 52 -- 58.
[37] Wilson E. Sociobiology. Cambridge, MA: Harvard Uni-
versity Press; 1975.
[38] Dunbar RIM. Neocortex size as a constraint on group
size in primates. J Human Evol 1992; 22: 469 -- 493.
[39] Goldberg DE. Genetic Algorithms in Search, Optimiza-
tion, and Machine Learning. Reading: Addison-Wesley;
1989.
[40] Galton F. Vox populi. Nature 1907; 75: 450 -- 451.
[41] Surowiecki J. The wisdom of crowds: Why the Many
Are Smarter than the Few and How Collective Wisdom
Shapes Business, Economies, Societies, and Nations. New
York: Random House; 2004.
[42] Vul E, Pashler H. Measuring the crowd within: prob-
abilistic representations within individuals. Psychol Sci
2008; 19: 645 -- 647.
10
[43] Bellomo N, Bianca C, Delitala M. Complexity analysis
and mathematical tools towards the modelling of living
systems. Phys Life Rev 2009; 6: 144 -- 175.
[44] Burini D, De Lillo S, Gibelli L. Collective learning dy-
namics modeling based on the kinetic theory of active
particles. Phys Life Rev 2016; 16: 123 -- 139.
|
1809.04918 | 1 | 1809 | 2018-09-13T12:44:48 | Coordination-driven learning in multi-agent problem spaces | [
"cs.MA",
"cs.AI"
] | We discuss the role of coordination as a direct learning objective in multi-agent reinforcement learning (MARL) domains. To this end, we present a novel means of quantifying coordination in multi-agent systems, and discuss the implications of using such a measure to optimize coordinated agent policies. This concept has important implications for adversary-aware RL, which we take to be a sub-domain of multi-agent learning. | cs.MA | cs | Coordination-driven learning in multi-agent problem spaces
Sean L. Barton, Nicholas R. Waytowich, and Derrik E. Asher
U.S. Army Research Laboratory, Aberdeen Proving Ground
Aberdeen, Maryland 21005
8
1
0
2
p
e
S
3
1
]
A
M
.
s
c
[
1
v
8
1
9
4
0
.
9
0
8
1
:
v
i
X
r
a
Abstract
We discuss the role of coordination as a direct learning objec-
tive in multi-agent reinforcement learning (MARL) domains.
To this end, we present a novel means of quantifying coordi-
nation in multi-agent systems, and discuss the implications of
using such a measure to optimize coordinated agent policies.
This concept has important implications for adversary-aware
RL, which we take to be a sub-domain of multi-agent learn-
ing.
1 Introduction
Modern reinforcement learning (RL) has demonstrated a
number of striking achievements in the realm of intelligent
behavior by leveraging the power of deep neural networks
(Mnih et al. 2015). However, like any deep-learning system,
RL agents are vulnerable to adversarial attacks that seek to
undermine their learned behaviors (Huang et al. 2017). In
order for RL agents to function effectively along side hu-
mans in real-world problems, their behaviors must be re-
silient against such adversarial assaults.
Promisingly, there is recent evidence showing deep RL
agents learn policies robust to adversary attacks at test
time when they train with adversaries during learning
(Behzadan and Munir 2017). This has important implica-
tions for robust deep RL, as it suggests that security against
attacks can be derived from learning. Here, we build on this
idea and suggest that deriving adversary-aware agents from
learning is a subset of the multi-agent reinforcement learn-
ing (MARL) problem.
At the heart of this problem is the need for an individ-
ual agent to coordinate its actions with those taken by other
agents (Fulda and Ventura 2007). Given the role of inter-
agent coordination in MARL, we suggest that operationaliz-
ing coordination between agent actions as a direct learning
objective may lead to better policies for multi-agent tasks.
Here, we present a quantitative metric that can be used to
measure the degree of coordination between agents over the
Copyright c(cid:13) by the papers authors. Copying permitted for private
and academic purposes. In: Joseph Collins, Prithviraj Dasgupta,
Ranjeev Mittu (eds.): Proceedings of the AAAI Fall 2018 Sympo-
sium on Adversary-Aware Learning Techniques and Trends in Cy-
bersecurity, Arlington, VA, USA, 18-19 October, 2018, published
at http://ceur-ws.org
course of learning. Further, we present a research concept
for using this metric to shape agent learning towards coordi-
nated behavior, as well as the impact that different degrees
of coordination can have on multi-agent task performance.
1.1 Adversary-aware RL as MARL
Understanding adversary-aware RL agents in terms of
MARL is straightforward when we consider that train-
ing in the presence of adversarial attacks is similar
to training in the presence of agents pursuing compet-
ing goals. In competitive RL, outcomes are often con-
sidered zero-sum, when agents reward/loss are in di-
rect opposition (Busoniu, Babuska, and De Schutter 2008;
Crandall and Goodrich 2011). In the case of attacks on RL
agents, the adversary's goal is typically to learn a cost func-
tion that, when optimized, minimizes the returns of the at-
tacked agent (Pattanaik et al. 2017). Thus, the adversary's
reward is the opposite of the attacked agent's.
If we take seriously these comparisons, the problem of
creating adversary-aware agents is largely one of develop-
ing agents that can learn to coordinate their behaviors effec-
tively with the actions of an adversary so as to minimize the
impact of its attacks. Thus, adversary-aware RL is an inher-
ently multi-agent problem.
1.2 Coordination in MARL
In MARL problems, the simultaneous actions of multi-
ple actors obfuscate the ground truth from any individual
agent. This uncertainty about the state of the world is pri-
marily studied in terms of 1) partial-observability wherein
the information about a given state is only probabilistic
(Omidshafiei et al. 2017), and 2) non-stationarity where the
goal of the task is "moving" with respect to any individual
agent's perspective (Hernandez-Leal et al. 2017).
on
the
degree
tasks
depends
are
able
To the
extent
critically
that uncertainty from an agent's
perspective can be resolved, performance in multi-
agent
to
which agents
efforts
(Matignon, Laurent, and Le Fort-Piat 2012). With MARL
collaborative goals, individual agents must learn policies
that increase their own reward without diminishing the re-
ward received by other agents. Simple tasks, such as matrix
or climbing games, present straightforward constraints that
promote the emergence of coordination between agents, as
to coordinate
their
these small state-space problems make the pareto-optimal
solution readily discoverable.
dination in more complex cases, and does not provide any
new information during learning.
Matignon et al. (2012) enumerate the challenges for co-
operative MARL, and show that no single algorithm is
successful at achieving better performance. Instead, ex-
isting algorithms tend to address specific challenges at
the expense of others. Further, in more complex state-
spaces pareto-optimal solutions can be "shadowed" by in-
dividually optimal solutions that constrain learned behav-
ior to selfish policies (Fulda and Ventura 2007). This un-
dermines the performance gains achievable through co-
ordinated actions in MARL problems. For
these rea-
sons, coordination between agents can only be guaran-
teed in limited cases where the challenges of MARL can
be reasonably constrained (Lauer and Riedmiller 2000). As
such, partial-observability and non-stationarity are prob-
lems that must be overcome for coordination to emerge
(Matignon, Laurent, and Le Fort-Piat 2012). For complex
tasks, modern advances with DNNs have leveraged joint
action learning to overcome the inherent uncertainty of
MARL (Foerster et al. 2017). Indeed these algorithms show
improved performance over decentralized and independent
learning alternatives.
Though this work is promising, we recently showed
that when coordination is directly measured, it cannot ex-
plain the improved performance of these algorithms in all
cases (Barton et al. In Press). Coordination between agents,
as measured by the causal influence between agent actions
(method described below), was found to be almost indis-
tinguishable from hard-coded agents forced to act indepen-
dently. This leads to an interesting question about how to
achieve coordinated actions between learning agents in real-
world tasks where there is strong interest for the deployment
of RL-equipped agents.
2 Approach
A possible solution to overcome the challenges of MARL is
to address coordination directly. This concept was recently
put to the test in several simple competitive tasks being per-
formed by two deep RL agents (Foerster et al. 2018). The
study explicitly took into account an opponent's change in
learning parameters during its own learning step. Account-
ing for opponent behavior during learning in this manner
was shown to yield human-like cooperative behaviors previ-
ously unobserved in MARL agents.
In a similar thrust, we propose here that coordination
should not be left to emerge from the constraints on the
multi-agent task, but instead be a direct objective of learn-
ing. This may be accomplished by providing a coordination
measure in the loss of a MARL agent's optimization step.
2.1 A novel measure for coordination in MARL
The first step towards optimizing coordinated behavior in
MARL is to define an adequate measure of coordination.
Historically, coordinated behavior has been evaluated by
agent performance in tasks where cooperation is explicitly
required (Lauer and Riedmiller 2000). As we showed previ-
ously, performance alone is insufficient for evaluating coor-
Fortunately a metric borrowed from ecological research
has shown promise as a quantitative measure of inter-agent
coordination, independent of performance. Convergent cross
mapping (CCM) quantifies the unique causal influence one
time-series has on another (Sugihara et al. 2012). This is
accomplished by embedding each time-series in its own
high dimensional attractor space, and then using the embed-
ded data of one time-series as a model for the other. Each
model's accuracy is taken as a measure of the causal influ-
ence between the two time-series.
In multi-agent tasks, we can define collaboration to be the
amount of causal influence between time-series of agent ac-
tions, as measured by CCM. The advantage of this metric
is that it provides a measure of coordination between agents
that is independent of performance, and thus can be used
as a novel training signal to optimize coordinated behav-
ior. Thus, coordination is no longer exclusively an emergent
property of the task, but rather a signal for driving agents'
learned behavior.
2.2 Coordination in an example MARL task
We propose an experimental paradigm that is designed to
measure the role of coordination in a continuous coopera-
tive/competitive task: online learning of coordination during
multi-agent predator-prey pursuit. In this exemplary experi-
ment, CCM is used as a direct learning signal that influences
how agents learn to complete a cooperative task.
The task is an adaptation of discrete predator-prey pursuit
(Benda 1985) into a continuous bounded 2D particle envi-
ronment with three identical predator agents and a single
prey agent. Predators score points each time they make con-
tact with the prey, while the prey's points are decremented if
contacted by any predator.
Typically, agent learning would be driven solely by the en-
vironmental reward (in this case, agent score). With this typ-
ical framework, coordination may emerge, but is not guaran-
teed (see (Barton et al. In Press)). In contrast, CCM provides
a direct measure of inter-agent coordination, which can be
used to modify agent learning through the incorporation of
CCM as a term in learning loss. This can be done either in-
directly as a secondary reward or directly as a term applied
during back-propagation. Thus, learned behavior is shaped
by both, task success and inter-agent coordination.
This paradigm provides an opportunity for coordination
to be manipulated experimentally by setting a desired coor-
dination threshold. As agents learn, they should coordinate
their behaviors with their partners and/or adversaries up to
this threshold. Minimizing this threshold should yield agents
that optimize the task at the expense of a partner, while
maximizing this threshold would likely produce high dimen-
sional oscillations between agent actions that ignore task de-
mands. Effective coordination likely lies between these ex-
tremes. Thus, we can directly observe the impact of coor-
dinated behaviors in a MARL environment by varying this
coordination threshold. To our knowledge, this has not been
previously attempted.
3 Implications and Discussion
Explicit coordination between agents can lead to greater
success in multi-agent systems. Our concept provides a
paradigm shift towards making coordination between agents
an intended goal of learning. In contrast, many previous
MARL approaches assume that coordination will emerge as
performance is optimized. In summary, we suggest that co-
ordination is better thought of as a necessary driver of learn-
ing, as important as (or possibly more important than) per-
formance measures alone.
Our proposed use of CCM as a signal for inter-agent co-
ordination provides a new source of information for learning
agents that can be integrated into a compound loss function
during learning. This would allow agents to learn coordi-
nated behaviors explicitly, rather than gambling on agents
discovering coordinated policies during exploration.
With the addition of coordination driven learning, the
policies an agent learns will not take into account adversary
behavior by chance, but rather by design. Such an algorithm
would actively seek out policies that account for the actions
of partners and competitors, limiting the policy search space
to those that reason over the behavior of other agents in the
system. We believe this is a reasonable avenue for more ef-
ficiently training mulit-agent policies.
Driving learning with coordination creates an opportunity
for the development of agents that are inherently determined
to coordinate their actions with a human partner. This is im-
portant, as without such a drive it is not clear how to guaran-
tee that humans and agents will work well together. In partic-
ular, if modeling of human policies is too difficult for agents,
they may settle on policies that try to minimize the degree
of coordination in an attempt to recover some selfishly op-
timal behavior. Forcing coordination to be optimized during
learning ensures that agents only seek out policies that are
well integrated with the actions of their partners.
Our concept, as presented here, is to promote coordinated
behaviors in intelligent learning agents by providing a quan-
titative measure of coordination that can be optimized dur-
ing learning. The importance of implementing coordination
to overcome adversarial attacks in the MARL problem can-
not be understated. Furthermore, an explicit drive towards
coordinated behavior between intelligent agents constitutes
a significant advancement within the fields of artificial intel-
ligence and computational learning.
Acknowledgements This research was sponsored by the
Army Research Laboratory and was accomplished under
Cooperative Agreement Number W911NF-18-2-0058. The
views and conclusions contained in this document are those
of the authors and should not be interpreted as represent-
ing the official policies, either expressed or implied, of
the Army Research Laboratory or the U.S. Government.
The U.S. Government is authorized to reproduce and dis-
tribute reprints for Government purposes notwithstanding
any copyright notation herein.
References
laborative emergent behavior in multi-agent reinforcement
learning.
In 1st International Conference on Human Sys-
tems Engineering and Design. IHSED.
[Behzadan and Munir 2017] Behzadan, V., and Munir, A.
2017. Whatever does not kill deep reinforcement learning,
makes it stronger. arXiv preprint arXiv:1712.09344.
[Benda 1985] Benda, M. 1985. On optimal cooperation of
knolwedge sources. Technical Report BCS-G2010-28.
[Busoniu, Babuska, and De Schutter 2008] Busoniu,
L.;
Babuska, R.; and De Schutter, B. 2008. A comprehen-
sive survey of multiagent reinforcement learning.
IEEE
Transactions on Systems, Man, And Cybernetics-Part C:
Applications and Reviews, 38 (2), 2008.
[Crandall and Goodrich 2011] Crandall,
and
Goodrich, M. A.
2011. Learning to compete, coordi-
nate, and cooperate in repeated games using reinforcement
learning. Machine Learning 82(3):281 -- 314.
J. W.,
[Foerster et al. 2017] Foerster, J.; Farquhar, G.; Afouras, T.;
Nardelli, N.; and Whiteson, S. 2017. Counterfactual Multi-
Agent Policy Gradients. arXiv:1705.08926 [cs].
arXiv:
1705.08926.
[Foerster et al. 2018] Foerster, J.; Chen, R. Y.; Al-Shedivat,
M.; Whiteson, S.; Abbeel, P.; and Mordatch, I. 2018. Learn-
ing with opponent-learning awareness. In Proceedings of the
17th International Conference on Autonomous Agents and
MultiAgent Systems, 122 -- 130. International Foundation for
Autonomous Agents and Multiagent Systems.
[Fulda and Ventura 2007] Fulda, N., and Ventura, D. 2007.
Predicting and preventing coordination problems in cooper-
ative q-learning systems. In IJCAI, volume 2007, 780 -- 785.
[Hernandez-Leal et al. 2017] Hernandez-Leal, P.; Kaisers,
M.; Baarslag, T.; and de Cote, E. M. 2017. A survey
of learning in multiagent environments: Dealing with non-
stationarity. arXiv preprint arXiv:1707.09183.
[Huang et al. 2017] Huang, S.; Papernot, N.; Goodfellow, I.;
Duan, Y.; and Abbeel, P. 2017. Adversarial attacks on neural
network policies. arXiv preprint arXiv:1702.02284.
[Lauer and Riedmiller 2000] Lauer, M., and Riedmiller, M.
2000. An algorithm for distributed reinforcement learning
in cooperative multi-agent systems. In In Proceedings of the
Seventeenth International Conference on Machine Learn-
ing. Citeseer.
[Matignon, Laurent, and Le Fort-Piat 2012] Matignon, L.;
Laurent, G. J.; and Le Fort-Piat, N. 2012.
Independent
reinforcement learners in cooperative markov games: a
survey regarding coordination problems. The Knowledge
Engineering Review 27(1):1 -- 31.
[Mnih et al. 2015] Mnih, V.; Kavukcuoglu, K.; Silver, D.;
Rusu, A. A.; Veness, J.; Bellemare, M. G.; Graves, A.; Ried-
miller, M.; Fidjeland, A. K.; Ostrovski, G.; Petersen, S.;
Beattie, C.; Sadik, A.; Antonoglou, I.; King, H.; Kumaran,
D.; Wierstra, D.; Legg, S.; and Hassabis, D. 2015. Human-
level control through deep reinforcement learning. Nature
518(7540):529 -- 533.
[Barton et al. In Press] Barton, S. L.; Waytowich, N. R.;
Zaroukian, E.; and Asher, D. E. In Press. Measuring col-
[Omidshafiei et al. 2017] Omidshafiei, S.; Pazis, J.; Amato,
C.; How, J. P.; and Vian, J. 2017. Deep Decentralized Multi-
task Multi-Agent Reinforcement Learning under Partial Ob-
servability. arXiv:1703.06182 [cs]. arXiv: 1703.06182.
[Pattanaik et al. 2017] Pattanaik, A.; Tang, Z.; Liu, S.; Bom-
mannan, G.; and Chowdhary, G. 2017. Robust deep rein-
forcement learning with adversarial attacks. arXiv preprint
arXiv:1712.03632.
[Sugihara et al. 2012] Sugihara, G.; May, R.; Ye, H.; Hsieh,
C.-h.; Deyle, E.; Fogarty, M.; and Munch, S. 2012. Detect-
ing causality in complex ecosystems. science 1227079.
|
1711.09229 | 1 | 1711 | 2017-11-25T11:28:00 | A-Evac: the evacuation simulator for stochastic environment | [
"cs.MA"
] | We introduce an open-source software Aamks for fire risk assessment. This article focuses on a component of Aamks - an evacuation simulator named a-evac. A-evac models evacuation of humans in the fire environment produced by CFAST fire simulator. In the article we discuss the probabilistic evacuation approach, automatic planning of exit routes, the interactions amongst the moving evacuees and the impact of smoke on the humans. The results consist of risk values based on FED, F-N curves and evacuation animations. | cs.MA | cs | Noname manuscript No.
(will be inserted by the editor)
A-Evac: the evacuation simulator for stochastic
environment
PRE-PRINT
Adam Krasuski · Karol Krenski
Received: 24.11.2017 / Accepted: date
Abstract We introduce an open-source software Aamks for fire risk assess-
ment. This article focuses on a component of Aamks -- an evacuation simulator
named a-evac. A-evac models evacuation of humans in the fire environment
produced by CFAST fire simulator. In the article we discuss the probabilis-
tic evacuation approach, automatic planning of exit routes, the interactions
amongst the moving evacuees and the impact of smoke on the humans. The
results consist of risk values based on FED, F-N curves and evacuation ani-
mations.
Keywords Evacuation Modeling · Stochastic Simulations · Risk Manage-
ment · Monte Carlo
1 Introduction
These days, there's not much you can understand about what is going
on around you if you do not understand the uncertainty attached to
pretty much every phenomenon.
-- J. N. Tsitsiklis
There is a continuous progress in understanding the fire phenomenon, its
impact on the structure and on the reaction of humans and safety systems.
A. Krasuski
The Main School of Fire Service
Slowackiego 52/54
01-629 Warsaw, Poland
E-mail: [email protected]
K. Krenski
The Main School of Fire Service
Slowackiego 52/54
01-629 Warsaw, Poland
E-mail: [email protected]
7
1
0
2
v
o
N
5
2
]
A
M
.
s
c
[
1
v
9
2
2
9
0
.
1
1
7
1
:
v
i
X
r
a
2
Adam Krasuski, Karol Krenski
There are scientific methods and models of the fire and the emergency scene,
there are computer implementations, but the complexity of the domain im-
pedes the more widespread use of these tools.
Currently, the most typical approach for assessing the safety of the building
is a precise choosing of the input parameters for a small number of lengthy,
detailed simulations. This procedure is managed by a practitioner, based on
his experience. However, based on heuristics and biases [31,22] we have con-
cerns that human judgement surpasses statistical calculations. The alternative
is to let computer randomly choose the parameters and run thousands of sim-
ulations. The resulting collection allows us, after further processing, to judge
on the safety of the building.
2 Aamks, the multisimulations platform
We created Aamks -- the platform for running simulations of fires and then
running the evacuation simulations, but thousands of them for a single project.
This is the Monte-Carlo approach. We use CFAST, which is a rough, but a
fast fire simulator. This allows us to explore the space of possible scenarios and
assess the probability of them. The second component of risk -- consequences --
is taken from an evacuation simulator capable to model evacuation in the fire
environment. We use a-evac as the evacuation simulator which we have built
from scratch. The multisimulation is a handy name for what we are doing.
Aamks tries to assess the risk of failure of humans evacuation from a building
under fire. We applied methodology proposed in [16, 8, 1] -- stochastic simula-
tions based on the Simple Monte-Carlo approach [7]. Our primary goal was
to develop an easy to use engineering tool rather than a scientific tool, which
resulted in: AutoCAD plugin for creating geometries, web based interface,
predefined setups of materials and distributions of various aspects of buildings
features, etc. The workflow is as follows: The user draws a building layout
or exports an existing one. Next, the user defines a few parameters including
the type of the building, the safety systems in the building, etc. Finally, they
launch a defined number of stochastic simulations. As a result they obtain
the distributions of the safety parameters, namely: available safe egress time
(ASET), required safe egress time (RSET), fractional effective dose (FED),
hot layer height and temperature and F-N curves as well as the event tree and
risk matrix.
Fortran is a popular language for coding simulations of physical systems.
CFAST and FDS+Evac are coded in fortran. Since we don't create a fire sim-
ulator we code Aamks in python which is more comfortable due to extremely
rich collection of libraries. We decided that borrowing Evac from FDS and inte-
grating it with Aamks would be harder for us than to code our own evacuation
simulator, hence a-evac was born. There's also a higher chance of attracting
new python developers than fortran developers for our project.
Aamks consists of the following modules:
A-Evac: the evacuation simulator for stochastic environment
3
-- a-geom, geometry processing: AutoCAD plugin, importing geometry, ex-
tracting topology of the building, navigating in the building, etc.
-- a-evac, directing evacuees across the building and altering their states
-- a-fire, CFAST and FDS binaries and processing of their outputs
-- a-gui, web application for user's input and for the results visualisation
-- a-montecarlo, stochastic producer of thousands of input files for CFAST
and a-evac
-- a-results, post-processing the results and creating the content for reports,
-- a-manager, managing computations on the grid/cluster of computers
-- a-installer
3 A-evac, the evacuation simulator
In the following subsections we describe the internals of a-evac, sometimes
with the necessary Aamks context.
3.1 Geometry of the environment
The Aamks workflow starts with a 3D geometry where fires and evacuations
will be simulated. We need to represent the building, which contains one or
more floors. Each floor can consist of compartments and openings in them,
named respectively COMPAS and VENTS in CFAST. Our considerations are
narrowed to rectangular geometries. There are two basic ways for representing
architecture geometries: a) cuboids can define the insides of the rooms (type-
a-geometry) or b) cuboids can define the walls / obstacles (type-b-geometry).
CFAST uses the type-a-geometry. We create CFAST geometries from the input
files of the following format (there are more entities than presented here):
{
"FLOOR 1":
{
"ROOM": [
[ [ 3.0 , 4.8 , 0.0 ] , [ 4.8 , 6.5 , 3.0 ] ] ,
[ [ 3.0 , 6.5 , 0.0 ] , [ 6.8 , 7.4 , 3.0 ] ]
] ,
"COR": [
[ [ 6.2 , 0.2 , 0.0 ] , [ 7.6 , 4.8 , 3.0 ] ]
] ,
"D": [
[ [ 3.9 , 3.4 , 0.0 ] , [ 4.8 , 3.4 , 2.0 ] ]
] ,
"W": [
[ [ 1.2 , 3.4 , 1.0 ] , [ 2.2 , 3.4 , 2.0 ] ]
] ,
"HOLE": [
[ [ 3.0 , 6.5 , 0.0 ] , [ 4.8 , 6.5 , 3.0 ] ]
Adam Krasuski, Karol Krenski
4
}
]
}
ROOM and COR(RIDOR) belong to COMPAS. D(OOR), W(INDOW)
and HOLE belong to VENTS. HOLE is a result of CFAST restrictions -- it
is an artificial entity which serves to merge two compartments into a single
compartment as shown on Figure 1.
Fig. 1 The concept of a HOLE: a) the room in reality, b) the room representation in
CFAST: two rectangles for separated calculations, but open to each other via HOLE.
All the entities in the example belong to the same FLOOR 1. The triplets
are (x0, y0, z0) and (x1, y1, z1) encoding the beginning and the end of each
entity in 3D space. In practice we obtain these input files from AutoCAD,
thanks to our plugin which extracts data from AutoCAD drawing. There's
also an Inkscape svg importer -- useful, but without some features. Adding
basic support for another graphics tools is not much work.
In later sections we will introduce problems of guiding evacuees throughout
the building. Those modules require the type-b-geometry. We convert from a
type-a-geometry to a type-b-geometry by duplicating the geometry, translating
the geometry and applying some logical operations. Figure 2 shows the idea.
Fig. 2 The conversion from type-a-geometry to type-b-geometry
There are three aspects of movement when it comes to evacuation mod-
eling [9]: (a) path-finding -- for the rough route out of the building, (b) local
movement -- evacuees interactions with other evacuees, with obstacles and with
environment, and (c) locomotion -- for "internal" movement of the agent (e.g.
body sway). A-evac models only (a) and (b).
a)b)A-Evac: the evacuation simulator for stochastic environment
5
3.2 Path-finding (roadmap)
The simulated evacuees need to be guided out of the building. The type-b-
geometry provides the input for path-finding. Each of the cuboids in type-
b-geometry -- representing obstacles -- is defined by the coordinates. These
coordinates represent corners of the shapes. Since we model each of the floors of
a building separately, we flatten 3D geometry into 2D and represent obstacles
as rectangles. Therefore type-b-geometry in path-finding module is represented
as set of 4-tuple coordinates(cid:0)(x0, y0), (x1, y1), (x2, y2), (x3, y3)(cid:1).
The set of 4-tuple elements is then flatten to the set of coordinates --
bag-of-coordinates. Due to the fact that majority of the obstacles share the
coordinates, we remove duplicates from the set (for the sake of performance).
Then, this bag-of-coordinates is the input for triangulation. We apply Delau-
nay triangulation [10], that represents space as a set of triangles. Figure 3
depicts the idea of triangulation.
Fig. 3 The idea of triangulation. a) original geometry, b) bag-of-coordinates, c) triangula-
tion.
The triangles are used as navigation meshes for the agents. The navigation
meshes define which areas of an environment are traversable by agents.
After triangulation of bag-of-coordinates, some of the triangles are located
inside the obstacles -- those (by definition) are not traversable so we remove
them. What is left is a traversable-friendly space.
We create then the graph of spatial transitions for the agents, based on
the adjacency of triangles obtained from the triangulation. Spatial transition
means that an agent can move from one triangle to another.
An agent on an edge of a triangle can always reach the other two edges.
For triangles which share edges it allows an agent to travel from one triangle
to another.
The pairs of all neighbouring edges are collected. We use python networkx
module [4] which creates a graph made of the above pairs. For further pro-
cessing we add agents positions to the graph, by pairing them with the neigh-
bouring edges.
The graph represents all possible routes from any node to any other node
in the graph. We can query the graph for the route from the current agent's
position to the closest exit. It means that agent will walk through the con-
secutive nodes and will finally reach the exit door. We instruct networkx that
we need the shortest distances in our routes (default is the least hops on the
ROOM1ROOM2ROOM3CORR1STAIR1D1D2D3D4a)c)b)6
Adam Krasuski, Karol Krenski
graph) and we obtain a set of edges the agent should traverse in order to reach
the exit. Figure 4 depicts the set of edges returned by the graph for an example
query.
Fig. 4 The roadmap defined by the graph for an example query. The red line crosses centers
of edges that an agent needs to travel to reach the exit.
The set of edges returned by the graph cannot be used directly for path-
finding. Neither the vertices of the edges nor the centers of them, do define
the optimal path that would be naturally chosen by evacuees during real evac-
uation. Therefore an extra algorithm should be used to smooth the path. For
this purpose we apply funnel algorithm defined in [6]. The funnel is a simple
algorithm finding straight lines along the edges.
The input for the funnel consists of a set of ordered edges (named portals)
from the agent origin to the destination. The funnel always consist of 3 entities:
the origin (apex) and the two vectors from apex to vertices on edges -- the left
leg and the right leg.
The apex is first set to the origin of the agent and the legs are set to the
vertices of the first edge. We advance the left and right legs to the consecutive
edges in the set and observe the angle between the legs. When the angle gets
smaller we accept the new vertex for the leg. Otherwise the leg stays at the
given vertex. After some iteration one of the legs should cross the other leg
defining the new position of the apex. The apex is moved and we restart the
procedure.
As a result the path is smoothened and defined only by the points where the
changes in velocity vector are needed. Moreover, we used an improved version
of the funnel algorithm that allows for defining points keeping a distance from
the corners reflecting the size of the evacuee. This allows for modeling the
A-Evac: the evacuation simulator for stochastic environment
7
Fig. 5 The idea of funnel algorithm. a) starting point, b) advancing legs.
impaired evacuees on wheeled chairs or beds in the hospitals. Figure 6 depicts
the smoothened path by funnel algorithm.
Fig. 6 The roadmap from starting point to exit smoothened by funnel algorithm.
3.3 Local movement
Local movement focuses on the interaction with (a) other agents (b) static
obstacles (walls) and (c) environmental conditions. A-evac handles (a) and (b)
via RVO21 which is an implementation of the Optimal Reciprocal Collision
Avoidance (ORCA) algorithm proposed in [3,32]. Later in this section we
describe how we are picking the local targets which is an aspect of (b). (c) is
basically altering agent's state such as speed.
1 http://gamma.cs.unc.edu/RVO2/
apexleft legright leganglea)b)8
Adam Krasuski, Karol Krenski
RVO2 aims at avoiding the velocity obstacle [11]. The velocity obstacle is
the set of all velocities of an agent that will result in a collision with another
agent or an obstacle. Otherwise, the velocity is collision-avoiding. RVO2 aims
at asserting that none of the agents collides with other agents within time τ .
The overall approach is as follows: each of the agents is aware of other
agents parameters: their position, velocity and radius (agent's observable uni-
verse). Besides, the agents have their private parameters: maximum speed and
a preferred velocity which they can auto-adjust granted there is no other agent
or an obstacle colliding. With each loop iteration, each agent responses to what
he finds in his surroundings, i.e. his own and other agents radiuses, positions
and velocities. The agent updates his velocity if it is the velocity obstacle with
another agent. For each pair of colliding agents the set of collision-avoiding ve-
locities is calculated. RVO2 finds the smallest change required to avert collision
within time τ and that is how an agent gets his new velocity. The agent alters
up to half of his velocity while the other colliding agent is required to take
care of his half. Figure 8 a-b depicts the idea of velocity collision avoidance.
The algorithm remains the same for avoiding static obstacles. However, the
value of τ is smaller with respect to obstacles as agents should be more 'brave'
to move towards an obstacle if this is necessary to avoid other agents.
It turned out problematic how to pick the local target from the roadmap.
Local targets need to be updated (usually advanced, but not always) near
points defined by funnel algorithm during path-fining phase -- the disks on
Figure 7, after they become visible to the agent. However, the disks can be
crowded and agents can be driven away from the correct courses by other
agents. We carefully inspected all possible states that agents can find them-
selves in. In order to have a clearer insight and control over the agents inside
the disks we use the Finite State Machine2 instead of just plain algorithm
block in our code. The state of the agent is defined by 4 binary features: (a)
is agent inside the disk? (b) are where agent is walking to and what agent is
looking at the same target? (c) can agent see what he is looking at (or are
there obstacles in-between)? (d) has agent reached the final node?
Within each iteration of the main loop we check the states of the agents.
The states can be changed by agents themselves -- e.g. agent has crossed the
border of the disk, or by our commands -- e.g. agent is ordered to walk to
another target. Consider these circumstances: the agent has managed to see
his next target and now he walks towards this next target -- he is in state S1.
But now he loses the eye contact with this new target and finds himself in state
S2. The program logic reacts to such a state by transiting to the state S3: start
looking at the previous target and walk towards this previous target. Based
on what happens next we can order the transition to another state or just
wait for the agent to change the state himself. By careful examination of all
possible circumstances we can make sure that our states and their transitions
can handle all possible scenarios.
2 https://en.wikipedia.org/wiki/Finite-state_machine
A-Evac: the evacuation simulator for stochastic environment
9
Fig. 7 The roadmap and local movement
On Figure 8c) we show how agents are passing through a HOLE. Due to
our concept of the disks (where searching for new targets takes place) and due
to the internals of RVO2 we gain the desired effect of agents not crossing the
very center of the disk. Instead, the agents can walk in parallel and advance to
another target which looks natural and doesn't create an unnecessary queue
of agents eager to cross the very center of the HOLE.
Fig. 8 RVO2 at its work of resolving collisions: (a) agents on direct collision courses and
(b) their calculated collision-avoiding courses, (c) three agents crossing a HOLE in parallel.
3.4 Evacuation under fire and smoke
Each a-evac simulation is preceded with the simulation of the fire. We have
only tested a-evac with CFAST [24,21]. CFAST writes its output to csv files.
Agent is moving towards this targetAgent is keeping an eye on this targetA1A2A4A3A5P1The global roadmap for agent A1:G_A1=[P1,P2,P3,P4]A1P2P3P410
Adam Krasuski, Karol Krenski
We need to query these CFAST results quite a bit, therefore we transform and
store these results in a fast in-memory relational database3. For each frame
of time we are repeatedly asking the same questions: (a) given the agent's
coordinates, which room is he in? (b) what are the current conditions in this
room?
When it comes to (b), the environment effects on the agent can be: (b.1)
limited visibility (eyes), (b.2) poisonous gases (nose) and (b.3) temperature
in the room (body). Both (b.1) and (b.2) are read from the default (but con-
figurable) height of 1.8 m. There are always two zones in CFAST, which are
separated at a known height, so we need to read the conditions from the correct
zone, based on where our 1.8 m belongs.
The value of visibility (OD -- optical density) affects agent's speed. We use
the relation proposed in [12] following the FDS+Evac [23]:
(cid:110)
(cid:0)1 +
· Ks
β
α
(cid:1)(cid:111)
vpref
n
vn,min, vpref
(Ks) = max
(1)
where: Ks is the extinction coefficient ([Ks] = m−1) calculated as OD/log10e
according to [19,20], vn,min is the minimum speed of the agent An and equals
0.1 · vpref
(agent's preferable velocity), and α, β are the coefficients defined
n
in [12].
n
Setting the minimal value of speed means that the agent does not stop in
thick smoke. They continue moving until the value of incapacitated Fractional
Effective Dose (FED) is exceeded, which is fatal to the agent. FED is calculated
from CFAST-provided amounts of the following species in the agent environ-
ment: carbon monoxide (CO), hydrogen cyanide (HCN), hydrogen chloride
(HCl), carbon dioxide (CO2) and oxygen (O2) by the equation [26,23]:
F EDtotal = (F EDCO + F EDHCN + F EDHCl) × HVCO2 + F EDO2
(2)
where HVCO2 is the hyperventilation induced by the concentration of CO2.
Following are the formulas for the terms in the above equation. FEDs are given
in ppm and time t in minutes. C stands for concentration of the species in %:
(cid:90) t
(cid:90) t
0
0
exp(cid:0) CHCN (t)
(cid:1)
43
220
F EDCO =
2.764 × 10−5(CCO(t))1.036dt
F EDHCN =
− 0.0045dt
(3)
(4)
Based on [17]
In contrast to the model applied in Evac, CFAST does not allow for proac-
tive correction of effect of nitrogen dioxide -- CCN = CHCN − CN O2 . Therefore
this effect is not included in the calculations.
3 https://www.sqlite.org/
A-Evac: the evacuation simulator for stochastic environment
(cid:90) t
CHCl(t)
dt
F EDHCl =
1900
0
11
(5)
(6)
(7)
Based on [28,17]
F EDO2 =
(cid:90) t
0
HVCO2 =
60 · exp(cid:2)8.13 − 0.54(20.9 − CO2 (t))(cid:3)
exp(cid:0)0.1903 · CCO2(t) + 2.0004(cid:1)
dt
7.1
There are few quantitative data from controlled experiments concerning
the sublethal effect of the smoke on people. In works [28, 5, 26,14,29] sublethal
effect in a form of incapacitation (IC50), escape ability (EC50), lingering health
problems and minor effects were reported. Incapacitation was inferred from
lethality data, to be about one-third to one-half of those required for lethal-
ity. The mean value of the ratios of the IC50 to the LC50 was 0.50 and the
standard deviation 0.21, respectively. In [14] a scale for effects based on FED
was introduced. The three ranges were proposed: 1 FED indicating lethality,
0.3 FED indicating incapacitation and 0.01 FED indicating no significant sub-
lethal effects should occur. We propose based on this data a scale for sublethal
effects of smoke for evacuees as presented in Table 1.
F EDtotal affects the agent's movement in the smoke. For F EDtotal > 0.3,
the smoke inhalation leads to sublethal effects [5] -- the agent is not able to
find safety from the fire and just stays where he is. For F EDtotal > 1 we model
lethal effects. We later use these effects in the final risk assessment.
Table 1 summarizes the FED effects on human health, what is our origi-
nal proposition for evaluation of sublethal effect of smoke. These ranges are
incorporeted in Aamks. It is based on the following works: [28,5,26,14,29]
Table 1 FED effects on human health in Aamks.
FED
< 0.01
[0.01 − 0.3[
[0.3 − 1[
≥ 1
Effect on human health
Minor or negligible
Low -- short period of hospitalization
Heavy -- lingering health problems or permanent disability
Lethal
3.5 Probabilistic evacuation modeling
This section presents the internals of our probabilistic evacuation model, which
we find distinct across the available, similar software.
Table 2 presents the distributions of the input parameters used in Aamks.
Each of the thousands of simulations in a single project is initialized with some
12
Adam Krasuski, Karol Krenski
random input setup according to these distributions. Aamks has a library
of the default parameters values for important building categories (schools,
offices, malls etc.). The Aamks users should find it convenient to have all the
distributions in a library, but they may choose to alter these values, which is
possible.
Most of the data in table 2 come from the standards and from other models,
mostly FDS/Evac. Following are some comments on table 2.
Aamks puts much attention to the pre-evacuation time [9], which models
how people lag before evacuating after the alarm has sounded. Positions 7. and
8. are separated, because the behaviour of humans in the room of fire origin is
distinct. We compile two regulations C/VM2 Verification Method: Framework
for Fire Safety Design [30] and British Standard PD 7974-6:2004 [2] in order
to get the most realistic, probability-based pre-evacuation in the room of fire
origin and in the rest of the rooms.
The Horizontal/Vertical speed (unimpeded, walking speed of an agent) is
based on [18,13,25,15].
Speed in the smoke is modeled by formula 1.
Table 2 Parameters of the distributions for the exemplary scenario.
Parameter
Distribution
µ/min
σ/max
Denstity in rooms [m2/humans]
Densitiy on corridors [m2/humans]
Densitiy in stairways [m2/humans]
Human location in the compartment x
Human location in the compartment y
normal
normal
normal
uniform
uniform
Time of the alarm
log-normal
Pre-evacuation time in the room of fire origin
uniform
5
20
50
0
0
0.7
0
2
3
3
room width
room depth
0.2
30
Pre-evacuation time in other compartments
log-normal
3.04
0.142
Horizontal speed
Vertical speed
α for speed in the smoke
β for speed in the smoke
normal
normal
normal
normal
1.2
0.7
0.706
-0.057
0.03
0.2
0.2
0.069
0.015
0.97
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13. Humans taking an alternative evacuation route
binomial
The randomness of the simulations comes from the random number gen-
erator's seed. We save the seed for each simulation so that we can repeat the
very same simulation, which is useful for debugging and visualisation.
We register all the random input setups and the corresponding results in
the database. We are expecting to research at some point the relationships in
these data with data mining or sensitivity analysis.
A-Evac: the evacuation simulator for stochastic environment
13
The final result of Aamks is the compilation of multiple simulations as a
set of distributions i.e. F-N curves. The F-N curves were created as in [12].
Figure 9 depicts the exemplary results.
Fig. 9 The results of evacuation modeling as F-N curves.
3.6 Visualization
In Aamks we use a 2D visualization for supervising the potential user's faults
in his CAD work (e.g. rooms with no doors (Figure 10)), for the final results,
and for our internal developing needs. We use a web based technology which
allows for displaying both static images and the animations of evacuees.
Fig. 10 2D visualization: animation of evacuees
0510152025303540Number of people0.000.050.100.150.200.250.30ProbabilityFatalities051015202530Number of people0.000.050.100.150.200.25ProbabilitySerious injuries051015202530Number of people0.000.020.040.060.080.100.120.140.160.18ProbabilityMinor injuries14
Adam Krasuski, Karol Krenski
We also have a web based 3D visualization made with WebGL Threejs.
This subsystem displays realistic animations of humans during their evacuation
under fire and smoke. (Figure 11).
Fig. 11 3D visualization
4 Quality and the performance of a-evac
Below we evaluate the quality of a-evac as described in [9,27] as well as it's
computer performance.
4.1 Verification of a-evac
Verification and validation deals with how close the results of the simulations
to the reality are. We took care to be compliant with the general develop-
ment recommendations [9] by: (1) obeying good programming practices, (2)
verifying intermediate simulation outputs, (3) comparing simulation outputs
against the analytical results, and (4) creating debugging animations.
The are three types of errors that can be generated by our software: a)
error in deterministic modeling of single scenario, b) error of Monte Carlo
approximation, c) statistical error -- disturbance.
For the first type of error we applied the methods proposed in [27]. The
proposed tests are organized in five core components: (1) pre-evacuation time,
(2) movement and navigation, (3) exit usage, (4) route availability, and (5)
flow conditions/constraints. For each category there are detailed tests for the
geometry, the scenario and the expected results. The results are in table 3.
4 The method is not straightforward
A-Evac: the evacuation simulator for stochastic environment
15
Table 3 The results of Aamks tests
Id. Name of the tests
1.
2.
3.
4.
5.
6.
7.
8.
9.
10. Group behaviours
11.
12.
13.
14. Affiliation
15. Dynamic availability of exits
16. Congestion
17. Maximum flow rates
Test code Results
Verif.1.1
Pre-evacuation time distributions
Verif.2.1
Speed in a corridor
Verif.2.2
Speed on stairs
Verif.2.3
Movement around the corner
Assigned occupant demographics
Verif.2.4
Reduced visibility vs walking speed Verif.2.5
Verif.2.6
Occupant incapatication
Verif.2.7
Elevator usage
Verif.2.8
Horizontal counter-flows (rooms)
Verif.2.9
Verif.2.10
Verif.3.1
Verif.3.2
Verif.3.3
Verif.4.1
Verif.5.1
Verif.5.2
People with movement disabilities
Exit route allocation
Social influence
OK
OK
OK 4
OK
OK
OK
OK
--
OK
--
--
OK
--
--
OK
OK
OK
RVO2, the core library of a-evac which drives the local movement, was also
evaluated in [33]. The conclusions are that RVO2 is of the quality comparable
with the lattice gas and social force models. The social force model is commonly
used in a number of evacuation software.
The above is the evaluation of a single, deterministic simulation. However,
the final result is the compilation of the whole collection of such single simula-
tions -- this is how we get the big picture of the safety of the inquired building.
The picture is meant to present risk. Probability of risk is calculated as a share
of simulations resulted in fatalities, in the total number of simulations.
The accuracy of this evaluation depends on the method applied -- stochas-
tic simulations. The error is proportional to the square root of number sim-
ulations. Namely for the discrete Bernoulli probability distributions used for
example for evaluation of probability of scenario with fatalities, the error is
calculated as follows:
(cid:114)
σn = 1.96
pn(1 − pn)
n
;
(8)
where: pn is the probability of fatalities obtained as a number of simulations
resulted in fatalities to the total number of simulations, n is the number of
simulations.
We are aware of the third type of error which may be generated by the
application. The input for Aamks is a set of various probability distributions
what may occasionally generate unreal scenario. For example an evacuee who
moves very slowly on corridors and very fast on stairs. In most cases these
errors are related to the other parts of Aamks i.e. probabilistic fire modeling.
16
Adam Krasuski, Karol Krenski
However, fire environment impacts the evacuation. This error can be evaluated
by comparison of data generated by Aamks with real statistics. So far we do
not have idea how to tackle this problem efficiently. We consider to evaluate
this error by launching simulations for the building stock and check whether
we reconstruct historical data. This method is very laborious and not justified
at that moment, because our application still lacks some models i.e. fire service
intervention -- what has significant impact on fire.
4.2 Performance of the Model
The main loop of Aamks processes all agents in the time iteration. Table 4
summarizes how costly the specific calculations for a single agent within a
single time iteration are. The tests were performed on computer with Intel
Core i5-2500K CPU at 3.30 GHz with 8 GB of RAM.
Table 4 The costs of a single loop iteration per agent
Activity
Position update
Velocity update
Speed update
State update
Goals update
FED update
Time update
Time
8.12 × 10−6 s
1.07 × 10−5 s
8.50 × 10−5 s
7.75 × 10−8 s
9.25 × 10−8 s
1.01 × 10−4 s
1.22 × 10−7 s
Total share
3.97 %
5.26 %
41.63 %
0.03 %
0.04 %
48.98 %
0.06 %
The total time of a single step of the simulation for one agent is 2 × 10−4 s
and it grows linearly with the number of agents. The speed and FED calcu-
lations are most costly, because they both make database queries against the
fire conditions in the compartment. The time step for a-evac iteration is 0.05 s.
There is no significant change in fire conditions within this time frame. There-
fore for performance optimization we update speed and FED every 20-th step
of the simulation.
5 Discussion
Vertical evacuation is troublesome and not implemented. There is RVO2 3D,
but it is for aviation where agents can pass above each other -- clearly not for
our needs. Besides, we think things look actually better in 2D. We like the
idea that vertical evacuation can be still considered 2D, just rotated, and we
plan to move in this direction.
A-Evac: the evacuation simulator for stochastic environment
17
A-evac does not model the social or group behaviours. However, it is diffi-
cult to evaluate, how much the lack of such functionalities impacts the resulting
probability distributions.
In the workflow we run a CFAST simulation first. Then a-evac simulation
runs on top of CFAST results. This sequential procedure has it's drawbacks,
e.g. we don't know how long the CFAST simulation should last to produce
enough data for a-evac, so we run "too much" CFAST for safety. Also, evacuees
cannot trigger any events such as opening the door, etc. We considered a closer
a-evac-CFAST integration.
There seems to be lot's of space for improvement in Aamks. We work
with the practitioners and know the reality of fire engineering. We know the
limitations of our current implementations and most of them can be addressed
-- there are models and approaches that we can implement and the major
obstacle are the limits of our team resources. Therefore we invite everyone
interested to join our project at http://github.com/aamks.
6 Conclusion
Aamks is actively developed since 2016 and we are truly engaged in making it
better. The software, though not really ready for end-users has already served
as a support for commercial projects and fire engineers and scientists regard
Aamsk as having potential. The stochastic based workflow of Aamks is not a
new concept. There are opinions in the community that this approach is how
fire engineering should be done. Since no wide-used implementation has been
created so far, this is an additional motivation that drives our project.
Acknowledgements Aamks is hosted at github at: http://gitub.com/aamks. This work
was supported in part by ConsultRisk LTD and F&K Consulting Engineers LTD under
research grants CR-2016 SiMo (Simulation Modules) .
References
1. Association of Building Engineers: Part 7: Probabilistic risk assessment. In: PD 7974-
6:2004, The application of fire safety engineering principles to fire safety design of build-
ings. British Standard (2003)
2. Association of Building Engineers: The application of fire safety engineering principles
to fire safety design of buildings -- Part 6: Human factors: Life safety strategies Occupant
evacuation, behaviour and condition (Sub-system 6) (2004). PD 7974-6:2004
3. Van den Berg, J., Lin, M., Manocha, D.: Reciprocal velocity obstacles for real-time
multi-agent navigation. In: Robotics and Automation, 2008. ICRA 2008. IEEE Inter-
national Conference on, pp. 1928 -- 1935. IEEE (2008)
4. Brandes, U., Erlebach, T.: Network analysis: methodological foundations, vol. 3418.
Springer Science & Business Media (2005)
5. Bryner, R.G.G.N.P.: Combustion products and their effects on life safety. Fire Protec-
tion Handbook pp. 6 -- 11 (2008)
6. Chazelle, B.: A theorem on polygon cutting with applications. In: Foundations of Com-
puter Science, 1982. SFCS'08. 23rd Annual Symposium on, pp. 339 -- 349. IEEE (1982)
7. Christian, R.P., Casella, G.: Monte Carlo statistical methods. New York: Springer (2007)
18
Adam Krasuski, Karol Krenski
8. Colaborative work: FRAME Fire Risk Assessment for Engineering. FRAME -- Valida-
tion. Tech. rep. (2014)
9. Cuesta, A., Abreu, O., Alvear, D.: Evacuation Modeling Trends. Springer (2015)
10. Delaunay, B.: Sur la sph`ere vide. Bulletin of Academy of Sciences of the USSR pp.
793 -- 800 (1934)
11. Fiorini, P., Shiller, Z.: Motion planning in dynamic environments using velocity obsta-
cles. The International Journal of Robotics Research 17(7), 760 -- 772 (1998)
12. Frantzich, H., Nilsson, D.: Utrymning genom tat rok: beteende och forflyttning. Univ.
(2003)
13. Fruin, J.J.: Pedestrian planning and design. Tech. rep. (1971)
14. Gann, Richard G and Averill, Jason D and Butler, KM and Jones, WW and Mulholland,
GW and Neviaser, JL and Ohlemiller, TJ and Peacock, RD and Reneke, PA and Hall
Jr, JR: Sublethal effects of smoke on survival and health. In: Human Behaviour in Fire,
Proceedings of the 2 nd Int. Symposium, MIT, Cambridge, USA, pp. 285 -- 296 (2001)
15. Helbing, D., Farkas, I.J., Molnar, P., Vicsek, T.: Simulation of pedestrian crowds in
normal and evacuation situations. Pedestrian and evacuation dynamics 21(2), 21 -- 58
(2002)
16. Hostikka, S., Keski-Rahkonen, O.: Probabilistic fire simulator -- Monte Carlo simulation
tool for fire scenarios (2002)
17. Hull, T.R., Stec, A.A., Paul, K.: Hydrogen chloride in fires. Fire Safety Science 9,
665 -- 676 (2008)
18. Hurley, M.J., Gottuk, D.T., Hall Jr, J.R., Harada, K., Kuligowski, E.D., Puchovsky, M.,
Watts Jr, J.M., Wieczorek, C.J., et al.: SFPE handbook of fire protection engineering.
Springer (2015)
19. Jin, T.: Visibility through fire smoke in main reports on production, movement and
control of smoke in buildings. Japanese Association of Fire Science and Engineering pp.
100 -- 153 (1974)
20. Jin, T.: Visibility and human behavior in fire smoke. The SFPE Handbook of Fire
Protection Engineering, ed. PJ DiNenno, D. Drysdale, CL Beyler, WD Walton, RLP
Custer, JR Hall, Jr. and JM Watts, Jr., 3rd edition, Society of Fire Protection Engi-
neers/National Fire Protection Association, Quincy, Massachusetts (2016)
21. Jones, W.W., Forney, G.P., Peacock, R.D., Reneke, P.A.: A technical reference for cfast:
an engineering tool for estimating fire and smoke transport. NIST TN 1431 (2017).
URL https://github.com/firemodels/cfast/releases
22. Kahneman, D., Klein, G.: Conditions for intuitive expertise: a failure to disagree. Amer-
ican Psychologist 64(6), 515 (2009)
23. Korhonen, T.: FDS + Evac -- Technical reference + users guide. VTT Technical Research
Centre of Finland (2016). Evac 2.5.2
24. Peacock, R.D., Jones, W., Reneke, P., Forney, G.: CFAST-consolidated model of fire
growth and smoke transport (version 7) user's guide. Citeseer (2017). URL https:
//github.com/firemodels/cfast/releases
25. Predtetschenski, W., Milinski, A.: Planning for foot traffic in buildings (1978)
26. Purser, D.A.: Toxicity assessment of combustion products. SFPE handbook of fire
protection engineering 3, 2 -- 6 (2002)
27. Ronchi, E., Kuligowski, E.D., Reneke, P.A., Peacock, R.D., Nilsson, D.: The process
of verification and validation of building fire evacuation models. NIST Technical Note
1822 (2013)
28. Speitel, L.C.: Toxicity assessment of combustion gases and development of a survival
model. Tech. rep., DTIC Document (1995)
29. Stec, A.A., Hull, T.R.: Fire toxicity. Elsevier (2010)
30. The Ministry of Business, Innovation and Employment: C/VM2 Verification Method:
Framework for Fire Safety Design (2013). New Zealand
31. Tversky, A., Kahneman, D.: Judgment under uncertainty: Heuristics and biases. Science
185(4157), 1124 -- 1131 (1974)
32. Van Den Berg, J., Guy, S.J., Lin, M., Manocha, D.: Reciprocal n-body collision avoid-
ance. In: Robotics research, pp. 3 -- 19. Springer (2011)
33. Viswanathan, V., Lee, C.E., Lees, M.H., Cheong, S.A., Sloot, P.: Quantitative com-
parison between crowd models for evacuation planning and evaluation. arXiv preprint
arXiv:1401.0366 (2014)
|
1203.5583 | 1 | 1203 | 2012-03-26T05:40:28 | Graph-Theoretic Characterizations of Structural Controllability for Multi-Agent System with Switching Topology | [
"cs.MA",
"eess.SY"
] | This paper considers the controllability problem for multi-agent systems. In particular, the structural controllability of multi-agent systems under switching topologies is investigated. The structural controllability of multi-agent systems is a generalization of the traditional controllability concept for dynamical systems, and purely based on the communication topologies among agents. The main contributions of the paper are graph-theoretic characterizations of the structural controllability for multi-agent systems. It turns out that the multi-agent system with switching topology is structurally controllable if and only if the union graph G of the underlying communication topologies is connected (single leader) or leader-follower connected (multi-leader). Finally, the paper concludes with several illustrative examples and discussions of the results and future work. | cs.MA | cs |
Graph-Theoretic Characterizations of Structural
Controllability for Multi-Agent System with
1
Switching Topology*
Xiaomeng Liua, Hai Linb∗, Senior Member, IEEE, and Ben M. Chena,
Fellow, IEEE
Abstract
This paper considers the controllability problem for multi-agent systems. In particular, the structural
controllability of multi-agent systems under switching topologies is investigated. The structural control-
lability of multi-agent systems is a generalization of the traditional controllability concept for dynamical
systems, and purely based on the communication topologies among agents. The main contributions of
the paper are graph-theoretic characterizations of the structural controllability for multi-agent systems.
It turns out that the multi-agent system with switching topology is structurally controllable if and only
if the union graph G of the underlying communication topologies is connected (single leader) or leader-
follower connected (multi-leader). Finally, the paper concludes with several illustrative examples and
discussions of the results and future work.
I. Introduction
Due to the latest advances in communication and computation, the distributed control and
coordination of the networked dynamic agents has rapidly emerged as a hot multidisciplinary
research area [Lawton et al., 2002][Dunbar et al., 2006][Bliman et al., 2008], which lies at the
intersection of systems control theory, communication and mathematics. In addition, the advances
of the research in multi-agent systems are strongly supported by their promising civilian and
military applications, such as cooperative control of unmanned air vehicles(UAVs), autonomous
∗Corresponding author. Email: [email protected] tel 574-6313177 fax 574-6314393
aDept. of ECE, National University of Singapore, Singapore bDept of EE, Univ of Notre Dame, Notre Dame, IN 46556, USA
August 21, 2018
DRAFT
2
underwater vehicles(AUVs), space exploration, congestion control in communication networks,
air traffic control and so on [Tomlin et al., 1998][How et al., 2004]. Much work has been done
on the formation stabilization and consensus seeking. Approaches like graph Laplacians for
the associated neighborhood graphs, artificial potential functions, and navigation functions for
distributed formation stabilization with collision avoidance constraints have been developed.
Furthermore, inspired by the cooperative behavior of natural swarms, such as bee flocking, ant
colonies and fish schooling, people try to obtain experiences from how the group units make
their whole group motions under control just through limited and local interactions among them.
The control of such large scale complex systems poses several new challenges that fall beyond
the traditional methods. Part of the difficulty comes from the fact that the global behavior of
the whole group combined by multiple agents is not a simple summation of the individual
agent's behavior. Actually, the group behavior can be greatly impacted by the communication
protocols or interconnection topology between the agents, which makes the global behavior
display high complexities. Hence, the cooperative control of multi-agent systems is still in its
infancy and attracts more and more researchers' attention. One basic question in multi-agent
systems that attracts control engineers' interest is what is the necessary information exchanging
among agents to make the whole group well-behaved, e.g., controllable. This can be formulated as
a controllability problem for multi-agent systems under the leader-follower framework. Roughly
speaking, a multi-agent system is controllable if and only if we can drive the whole group
of agents to any desirable configurations only based on local interactions between agents and
possibly some limited commands to a few agents that serve as leaders. The basic issue is the
interplay between control and communication. In particular, we would like to investigate what
is the necessary and/or sufficient condition on the graph of communication topologies among
agents for the controllability of multi-agent systems.
This multi-agent controllability problem was first proposed in [Tanner, 2004], which formu-
lated it as the controllability of a linear system and proposed a necessary and sufficient algebraic
condition based on the eigenvectors of the graph Laplacian. Reference [Tanner, 2004] focused on
fixed topology situation with a particular member which acted as the single leader. The problem
was then developed in [Ji et al., 2006][Ji et al., 2007][Rahmani et al., 2006]
[Ji et al., 2008], and got some interesting results. For example, in [Ji et al., 2007], it was shown
that a necessary and sufficient condition for controllability is not sharing any common eigenvalues
August 21, 2018
DRAFT
3
between the Laplacian matrix of the follower set and the Laplacian matrix of the whole topology.
However, it remains elusive on what exactly the graphical meaning of these algebraic conditions
related to the Laplacian matrix. This motivates several research activities on illuminating the
controllability of multi-agent systems from a graph theoretical point of view. For example,
a notion of anchored systems was introduced in [Rahmani et al., 2006] and it was shown that
symmetry with respect to the anchored vertices makes the system uncontrollable. However, so far
the research progress using graph theory is quite limited and a satisfactory graphical interpretation
of these algebraic controllability conditions turns out to be very challenging. Besides, the weights
of communication linkages among agents have been demonstrated to have a great influence
on the behavior of whole multi-agent group (see [Moreau, 2005] as an example). However,
in the previous multi-agent controllability literature [Tanner, 2004]-[Rahmani et al., 2006], the
communication weighting factor is usually ignored. One classical result under this no weighting
assumption is that a multi-agent system with complete graphical communication topology is
uncontrollable [Tanner, 2004]. This is counter-intuitive since it means each agent can get direct
information from each other but this leads to a bad global behavior as a team. This shows that too
much information exchange may damage the controllability of multi-agent system. In contrast,
if we set weights of unnecessary connections to be zero and impose appropriate weights to other
connections so as to use the communication information in a selective way, then it is possible
to make the system controllable [Zamani et al., 2009].
In this paper, motivated by the above observation, the weighting factor is taken into ac-
count for multi-agent controllability problem. In particular, a new notion for the controlla-
bility of multi-agent systems, called structural controllability, which was proposed by us in
[Zamani et al., 2009], is investigated directly through the graph-theoretic approach for control
systems. The communication topology of whole multi-agent system is described by a weighted
graph and the system is called structurally controllable if one may find a set of weights such
that the corresponding multi-agent system is controllable in a classical sense. The structural
controllability reveals under certain topology whether it is possible to make the whole multi-
agent system well-behaved, i.e. controllable here through suitable choice of the communica-
tion weights. From another angle, it helps to bring to light the effects of the communication
topology on the controllability property of multi-agent systems without worrying about the
influence of weighting factors. It turns out that this controllability notation only depends on
August 21, 2018
DRAFT
4
the topology of the communication scheme in the case of a single leader under a fixed topology
[Zamani et al., 2009].
Another novelty in this paper is the successful investigation of impacts of switching topologies
on the multi-agent controllability property, for which there is barely graphical interpretation to
the best of our knowledge. Note that the results in [Tanner, 2004][Ji et al., 2006][Ji et al., 2007]
[Rahmani et al., 2006][Ji et al., 2008][Zamani et al., 2009] are all focused on multi-agent sys-
tems under fixed communication topologies which may restrict their impacts on real applications.
In many applications, it may become impossible to keep the communication topology fixed for
the whole period. Therefore, it is of practical importance to consider time varying communication
topologies. A natural framework to study the time variance of communication topology is through
switched systems, see e.g., [Lin et al., 2007][Lin et al., 2009][Sun et al., 2002]. In this paper,
we will focus on multi-agent systems under switching topologies in the framework of switched
systems. Some early efforts have been observed in the literature. Necessary and sufficient al-
gebraic conditions for the controllability of multi-agent systems under switching topology were
derived in [Ji et al., 2008][Liu et al., 2008] based on the developments of controllability study
in switched systems. However, these algebraic results lacks graphically intuitive interpretations,
which are important since they can provide us significant guidelines for the communication
protocol design for multi-agent systems. Therefore, this paper aims to fill this gap and propose
graphic interpretations of these algebraic conditions for the controllability of multi-agent sys-
tems under switching topology. In particular, we follow the setup in [Zamani et al., 2009] and
investigate the structural controllability of multi-agent systems with switching communication
topologies and for both single leader and multi-leader cases. It is assumed that the leaders act
as the external or control signal and will not be affected by any other group members. Based
on this structural controllability, we propose necessary and sufficient graph theoretic conditions
for the structural controllability of multi-agent system with switching topologies. It turns out
that the multi-agent system with switching topology is structurally controllable if and only if
the union graph G of the underlying communication topologies is connected (single leader) or
leader-follower connected (multi-leader). Some examples are given to underscore our theoretical
analysis.
The outline of this paper is as follows: In Section II, we introduce some basic preliminaries
and the problem formulation, followed by structural controllability study in Section III, where
August 21, 2018
DRAFT
5
a graphic necessary and sufficient condition for the structural controllability under single leader
case is given. In Section IV, graphical interpretation of structural controllability of multi-leader
multi-agent system is proposed. In Section V, some examples are presented to give the readers
deeper understanding of our theoretical results. Finally, some concluding remarks are drawn in
the paper.
II. Preliminaries and Problem Formulation
A. Graph Theory Preliminaries
A weighted graph is an appropriate representation for the communication or sensing links
among agents because it can represent both existence and strength of these links among agents.
The weighted graph G with N vertices consists of a vertex set V = {v1, v2, . . . , vN} and an edge
set I = {e1, e2, . . . , eN′}, which is the interconnection links among the vertices. Each edge in
the weighted graph represents a bidirectional communication or sensing media. Two vertices are
known to be neighbors if (i, j) ∈ I, and the number of neighbors for each vertex is its valency.
An alternating sequence of distinct vertices and edges in the weighted graph is called a path.
The weighted graph is said to be connected if there exists at least one path between any distinct
vertices, and complete if all vertices are neighbors to each other.
The adjacency matrix, A is defined as
A(i, j) =
Wi j
(i, j) ∈ I,
0
otherwise,
(1)
where Wi j , 0 stands for the weight of edge ( j, i). Here, the adjacency matrix A is V × V
and . is the cardinality of a set.
The Laplacian matrix of a graph G, denoted as L(G) ∈ RV×V or L for simplicity, is defined
as
L(i, j) =
Σ j∈Ni Wi j
i = j,
−Wi j
i , j and (i, j) ∈ I,
0
otherwise.
(2)
B. Multi-agent Structural Controllability with Switching Topology
Specifically, controllability problem usually cares about how to control N agents based on the
leader-follower framework. Take the case of single leader as example. Without loss of generality,
August 21, 2018
DRAFT
6
assume that the N-th agent serves as the leader and takes commands and controls from outside
operators directly, while the rest N − 1 agents are followers and take controls as the nearest
neighbor law.
Mathematically, each agent's dynamics can be seen as a point mass and follows
The control strategy for driving all follower agents is
xi = ui.
ui = − X j∈Ni
wi j(xi − x j) + wiixi,
(3)
(4)
where Ni is the neighbor set of the agent i (could contain i itself), and wi j is weight of the edge
from agent j to agent i. On the other hand, the leader's control signal is not influenced by the
followers and needs to be designed, which can be represented by
xN = uN.
(5)
In other words, the leader affects its nearby agents, but it does not get directly affected by
the followers since it only accepts the control input from an outside operator. For simplicity, we
will use z to stand for xN in the sequel. It is known that the whole multi-agent system under
fixed communication topology can be written as a linear system:
,
(6)
x
z
=
A B
0 0
x
z
+
0
uN
where A ∈ R(N−1)×(N−1) and B ∈ R(N−1)×1 are both sub-matrices of the corresponding graph
Laplacian matrix −L
The communication network of dynamic agents with directed information flow under link
failure and creation can usually described by switching topology. Under m switching topologies,
it is clear that the whole system equipped with m subsystems can be written in a compact form
x
z
=
Ai Bi
0
0
x
z
+
0
uN
,
x = Aix + Biz,
z = uN,
or, equivalently,
August 21, 2018
(7)
(8)
DRAFT
7
where i ∈ {1, . . . , m}. Ai ∈ R(N−1)×(N−1) and Bi ∈ R(N−1)×1 are both sub-matrices of the correspond-
ing graph Laplacian matrix −L. The matrix Ai reflects the interconnection among followers, and
the column vector Bi represents the relation between followers and the leader under corresponding
subsystems. Since the communication topologies among agents are time-varying, so the matrices
Ai and Bi are also varying as a function of time. Therefore, the dynamical system described in
(7) can be naturally modeled as a switched system (definition can be found latter).
Considering the structural controllability of multi-agent system, system matrices Ai and Bi,
i ∈ {1, . . . , m} are structured matrices, which means that their elements are either fixed zeros or
free parameters. Fixed zeros imply that there is no communication link between the corresponding
agents and the free parameters stand for the weights of the communication links. Our main task
here is to find out under what kinds of communication topologies, it is possible to make the group
motions under control and steer the agents to the specific geometric positions or formation as a
whole group. Now this controllability problem reduces to whether we can find a set of weights
wi j such that the multi-agent system (7) is controllable. Then the controllability problem of
multi-agent system can now be formulated as the structural controllability problem of switched
linear system (7):
Definition 1: The multi-agent system (7) with switching topology, whose matrix elements are
zeros or undetermined parameters, is said to be structurally controllable if and only if there exist
a set of communication weights wi j that can make the system (7) controllable in the classical
sense.
C. Switched Linear System and Controllability Matrix
In general, a switched linear system is composed of a family of subsystems and a rule that
governs the switching among them, and is mathematically described by
x(t) = Aσ(t)x(t) + Bσ(t)u(t),
(9)
where x(t) ∈ Rn are the states, u(t) ∈ Rr, are piecewise continuous input, σ : [t0, ∞) → M ,
{1, . . . , m} is the switching signal. System (9) contains m subsystems (Ai, Bi), i ∈ {1, . . . , m} and
σ(t)= i implies that the ith subsystem (Ai, Bi) is activated at time instance t
For the controllability problem of switched linear systems, a well-known matrix rank condition
was given in [Sun et al., 2004]:
August 21, 2018
DRAFT
Lemma 1: ([Sun et al., 2004]) If matrix:
[B1, . . . , Bm, A1B1, . . . , AmB1, . . . , AmBm, A2
1B1, . . . , AmA1B1,
. . . , A2
1Bm, . . . , AmA1Bm, . . . , An−1
1 B1, . . . , AmAn−2
1 B1, . . . ,
8
(10)
A1An−2
m Bm, . . . , An−1
m Bm]
has full row rank n, then switched linear system (9) is controllable, and vice versa.
This matrix is called the controllability matrix of the corresponding switched linear system
(9).
III. Structural Controllability of Multi-agent System with Single Leader
The multi-agent system with a single leader under switching topology has been modeled as
switched linear system (7). Before proceeding to the structural controllability study, we first
discuss the controllability of multi-agent system (7) when all the communication weights are
fixed.
After simple calculation, the controllability matrix of switched linear system (7) can be shown
to have the following form:
0,
1,
. . .
. . .
, 0, B1,
0,
, 1,
. . . , Bm, A1B1
0,
0,
0,
. . . , A1AN−3
m Bm,
0,
0,
. . . , AN−2
m Bm
0,
0
This implies that the controllability of the system (7) coincides with the controllability of the
following system:
x = Aix + Biz
i ∈ {1, . . . , m} .
(11)
Which is the extracted dynamics of the followers that correspond to the x component of the
equation. Therefore,
Definition 2: The multi-agent system (7) is said to be structurally controllable under leader z
if system (11) is structurally controllable under control input z.
For simplicity, we use (Ai, Bi)
sequel.
i ∈ {1, . . . , m} to represent switched linear system (11) in the
In (11), each subsystem (Ai, Bi) can be described by a directed graph [Lin, 1974]:
Definition 3: The representation graph of structured system (Ai, Bi) is a directed graph Gi,
with vertex set Vi = Xi ∪ Ui, where Xi = {x1, x2, . . . , xn}, which is called state vertex set and
August 21, 2018
DRAFT
9
Ui = {u1, u2, . . . , ur}, which is called input vertex set, and edge set Ii = IUiXi ∪ IXiXi, where
IUiXi = {(up, xq)Bqp , 0, 1 ≤ p ≤ r, 1 ≤ q ≤ n} and IXiXi = {(xp, xq)Aqp , 0, 1 ≤ p ≤ n, 1 ≤ q ≤ n}
are the oriented edges between inputs and states and between states defined by the interconnection
matrices Ai and Bi above. This directed graph (for notational simplicity, we will use digraph
to refer to directed graph) Gi is also called the graph of matrix pair (Ai, Bi) and denoted by
Gi(Ai, Bi).
For each subsystem, we have got a graph Gi with vertex set Vi and edge set Ii to represent
the underlaying communication topologies. As to the whole switched system, the representing
graph, which is called union graph, is defined as follows:
Definition 4: The switched linear system (11) can be represented by a union digraph, defined
as a flow structure G. Mathematically, G is defined as
G1 ∪ G2 ∪ . . . ∪ Gm = {V1 ∪ V2 ∪ . . . ∪ Vm;
(12)
I1 ∪ I2 ∪ . . . ∪ Im}
Remark 1: It turns out that union graph G is the representation of linear structured system:
(A1 + A2 + . . . + Am, B1 + B2 + . . . + Bm).
Remark 2: In lots of literature about controllability of multi-agent systems [Tanner, 2004]-
[Liu et al., 2008], the underlying communication topology among the agents is represented by
undirected graph, which means that the communication among the agents is bidirectional. Here
we still adopt this kind of communication topology. Then wi j and w ji are free parameters or zero
simultaneously (in numerical realization, the values of wi j and w ji can be chosen to be different).
Besides, one edge in undirected graph can be treated as two oriented edges. Consequently, even
though all the analysis and proofs for structural controllability of multi-agent systems are based
on the directed graph (the natural graphic representation of matrix pair (Ai, Bi) is digraph), the
final result will be expressed in undirected graph form.
Before proceeding further, we need to introduce two definitions which were proposed in
[Lin, 1974] for linear structured system x = Ax + Bu first:
Definition 5: ([Lin, 1974]) The matrix pair (A, B) is said to be reducible or of form I if there
exist permutation matrix P such that they can be written in the following form:
PAP−1 =
0
A11
A21 A22
, PB =
0
B22
,
August 21, 2018
(13)
DRAFT
10
where A11 ∈ Rp×p , A21 ∈ R(n−p)×p, A22 ∈ R(n−p)×(n−p) and B22 ∈ R(n−p)×r.
Remark 3: Whenever the matrix pair (A, B) is of form I, the system is structurally uncontrol-
lable [Lin, 1974] and meanwhile, the controllability matrix Q = hB, AB, . . . , An−1Bi will have at
least one row which is identically zero for all parameter values [Glover et al., 1976]. If there is
no such permutation matrix P, we say that the matrix pair (A, B) is irreducible.
Definition 6: ([Lin, 1974]) The matrix pair (A, B) is said to be of form II if there exist
permutation matrix P such that they can be written in the following form:
hPAP−1, PBi =
P1
P2
,
(14)
where P2 ∈ R(n−k)×(n+r) , P1 ∈ Rk×(n+r) with no more than k − 1 nonzero columns (all the other
columns of P1 have only fixed zero entries).
Here we need to recall a known result in literature for structural controllability of multi-agent
system with fixed topology [Zamani et al., 2009]:
Lemma 2: The multi-agent system with fixed topology under the communication topology G
is structurally controllable if and only if graph G is connected.
This lemma proposed an interesting graphic condition for structural controllability in fixed
topology situation and revealed that the controllability is totally determined by the communication
topology. However, how about in the switching topology situation? According to lemma 1, once
we impose proper scalars for the parameters of the system matrix (Ai, Bi) to satisfy the full rank
condition, the multi-agent system (11) is structurally controllable. However, this only proposed
an algebraic condition. Do we still have very good graphic interpretation for the relationship
between the structural controllability and switching interconnection topologies? The following
theorem answers this question and gives a graphic necessary and sufficient condition for structural
controllability under switching topologies.
Theorem 1: The multi-agent system (11) with the communication topologies Gi, i ∈ {1, . . . , m}
is structurally controllable if and only if the union graph G is connected.
Proof: Necessity: Assume that the multi-agent switched system is structurally controllable,
we want to prove that the union graph G is connected, which is equivalent to that the system
has no isolated agents in the union graph G [Zamani et al., 2009].
August 21, 2018
DRAFT
11
Suppose that the union graph G is disconnected and for simplicity, we will prove by contradic-
tion for the case that there exits only one disconnected agent. The proof can be straightforwardly
extended to more general cases with more than one disconnected agents. If there is one isolated
agent in the union graph, there are two possible situations: the isolated agent is the leader or one
of the followers. On one hand, if the isolated agent is the leader, it follows that B1 + B2 + . . . + Bm
is identically a null vector. So every Bi is a null vector. Easily we can conclude that the
controllability matrix for the switched system is never of full row rank N − 1, which means
that the multi-agent system is not structurally controllable. On the other hand, if the isolated
agent is one follower, we get that the matrix pair (A1 + A2 + . . . + Am, B1 + B2 + . . . + Bm) is
reducible. By definition 5, the controllability matrix
[B1 + B2 + . . . + Bm,
(A1 + A2 + . . . + Am)(B1 + B2 + . . . + Bm),
, · · · ,
(A1 + A2 + . . . + Am)N−2(B1 + B2 + . . . + Bm)]
always has at least one row that is identically zero. Expanding the matrix yields
[B1 + B2 + . . . + Bm,
A1B1 + A2B1 + . . . + AmB1 + A1B2 + A2B2
+ . . . + AmB2 + . . . + A1Bm + A2Bm . . . + AmBm
, . . . ,
AN−2
1 B1 + A2AN−3
1 B1 + . . . + AN−2
m Bm].
The zero row is identically zero for every parameter. This implies that every component in this
matrix, such as Bi, AiB j and Ap
j Br, has the same row always to be zero. As a result, the
controllability matrix
i Aq
[B1, . . . , Bm, A1B1, . . . , AmB1, . . . , AmBm, A2
1B1, . . . , AmA1B1,
. . . , A2
1Bm, . . . , AmA1Bm, . . . , An−1
1 B1, . . . , AmAn−2
1 B1, . . . ,
A1An−2
m Bm, . . . , An−1
m Bm]
always has one zero row. Therefore, the multi-agent system (11) is not structurally controllable.
Until now, we have got the necessity proved.
August 21, 2018
DRAFT
Sufficiency: If the union graph G is connected, we want to prove that the multi-agent system
(11) is structurally controllable.
According to lemma 2, the connectedness of the union graph G implies that the corresponding
system (A1 + A2 + A3 + . . . + Am, B1 + B2 + B3 + . . . + Bm) is structurally controllable. Then there
exist some scalars for the parameters in system matrices that make the controllability matrix
12
[B1 + B2 + . . . + Bm,
(A1 + A2 + . . . + Am)(B1 + B2 + . . . + Bm),
, . . . ,
(A1 + A2 + . . . + Am)N−2(B1 + B2 + . . . + Bm)],
has full row rank N − 1. Expanding the matrix, it follows that the matrix
[B1 + B2 + . . . + Bm,
A1B1 + A2B1 + . . . + AmB1 + A1B2 + A2B2
+ . . . + AmB2 + . . . + A1Bm + A2Bm . . . + AmBm
, . . . ,
AN−2
1 B1 + A2AN−3
1 B1 + . . . + AN−2
m Bm],
has full rank N − 1. Next, we add some column vectors to the above matrix and get
[B1 + B2 + . . . + Bm, B2, . . . , Bm,
A1B1 + A2B1 + . . . + AmB1 + A1B2 + A2B2 + . . . + AmB2
+ . . . + A1Bm + A2Bm + . . . + AmBm, A2B1, A3B1, . . . , AmBm
, . . . ,
AN−2
1 B1 + A2AN−3
1 B1 + . . . + AN−2
m Bm, A2AN−3
1 B1, . . . , AN−2
m Bm].
This matrix still have N − 1 linear independent column vectors, so it has full row rank. Next,
subtract B2, . . . , Bm from B1 +B2 +. . .+Bm; subtract A2B1, . . . , AmBm from A1B1 +A2B1 +. . .+AmBm
and subtract A2AN−3
m Bm. Since this column
fundamental transformation will not change matrix rank, the matrix still has full row rank. Now
1 B1 + . . . + AN−2
m Bm from AN−2
1 B1, . . . , AN−2
1 B1 + A2AN−3
the matrix becomes
August 21, 2018
DRAFT
[B1, . . . , Bm, A1B1, . . . , AmB1, . . . , AmBm, A2
1B1, . . . , AmA1B1,
13
. . . , A2
1Bm, . . . , AmA1Bm, . . . , An−1
1 B1, . . . , AmAn−2
1 B1, . . . ,
A1An−2
m Bm, . . . , An−1
m Bm]
which is the controllability matrix of system (11) and has full row rank N − 1. Therefore, the
multi-agent system is structurally controllable.
IV. Structural Controllability of Multi-agent System with Multi-Leader
In the above discussion, we assume the multi-agent system has totally N agents and the N-th
agent serves as the leader and takes commands and controls from outside operators directly,
while the rest N − 1 agents are followers and take controls as the nearest neighbor law. In the
following part, we will discuss the situation that several agents are chosen as the leaders of the
whole multi-agent systems, which is actually an extension of single leader case.
Similar to the single leader case, the multi-agent system with multiple leaders is given by:
= ui,
xi
xN+ j = uN+ j,
i = 1, . . . , N
j = 1, . . . , nl
(15)
where N and nl represent the number of followers and leaders, respectively. xi indicates the state
of the ith agent, i = 1, . . . , N + nl.
The control strategy ui, i = 1, . . . , N for driving all follower agents is the same as the single
leader case. The leaders' control signal is still not influenced by the followers and we are allowed
to pick uN+ j, j = 1, . . . , nl arbitrarily. For simplicity, we use vector x to stand for the followers'
states and z to stand for the leaders' states.
Then the whole multi-agent system equipped with m communication topologies can be written
in a compact form
or, equivalently,
x
z
Ai Bi
0
0
x
z
+
0
u
,
x = Aix + Biz,
z = u,
(16)
(17)
=
where i ∈ {1, . . . , m}. Ai ∈ RN×N and Bi ∈ RN×nl are both sub-matrices of the corresponding
graph Laplacian matrix −L.
August 21, 2018
DRAFT
The dynamics of the followers can be extracted as
x = Aix + Biz,
i ∈ {1, . . . , m}.
14
(18)
Remark 4: Similar with the single leader case, the structural controllability of system (16)
coincides with the structural controllability of system (18). And we say that the multi-agent
system (15) with switching topology and multi-leader is structurally controllable if and only if
the switched linear system (18) is structurally controllable with z as the control inputs.
Before proceeding further, we first discuss the structural controllability of multi-agent systems
with multi-leader under fixed topology with the following dynamics:
x = Ax + Bz,
(19)
where A ∈ RN×N and B ∈ RN×nl are both sub-matrices of the graph Laplacian matrix −L.
In [Ji et al., 2008][Ji et al., 2009], a new graph topology: leader-follower connected topology
was proposed:
Definition 7: ([Ji et al., 2008]) A follower subgraph G f of the interconnection graph G is the
subgraph induced by the follower set V f (here is x). Similarly, a leader subgraph Gl is the
subgraph induced by the leader set Vl (here is z).
Denote by Gc1 , . . . , Gcγ , the connected components in the follower G f . The definition of leader-
follower connected topology is as follows:
Definition 8: ([Ji et al., 2009]) The interconnection graph G of multi-agent system (19) is
said to be leader-follower connected if for each connected component Gci of G f , there exists
a leader in the leader subgraph Gl, so that there is an edge between this leader and a node in
Gci , i = 1, . . . , γ.
Based on this new graph topology, we can derive the criterion for structural controllability for
multi-agent system (19) under fixed topology:
Theorem 2: The multi-agent system (19) with multi-leader and fixed topology under the
communication topology G is structurally controllable if and only if graph G is leader-follower
connected.
Proof:
Necessity: The idea of necessity proof is similar to the proof of lemma 3 in
[Ji et al., 2008]. We assume that there exists one connected component Gcp not connected to
August 21, 2018
DRAFT
the leader subgraph Gl. Define Ai and Bi matrices as sub-matrices of A and B, the same as
the Fi and Ri matrices in lemma 3 of [Ji et al., 2008]. Following the analysis in lemma 3 of
[Ji et al., 2008], it can be easily got that the controllability matrix of multi-agent system (19)
15
is:
C =
B1 A1B1 A2
1B1
...
...
0
0
...
...
Bγ AγBγ A2
γBγ
...
0
...
· · · AN−1
1 B1
...
0
...
· · · AN−1
γ Bγ
· · ·
· · ·
· · ·
.
(20)
Consequently, rank C = row rank C < N. The maximum rank of C is less than N, which implies
that the corresponding multi-agent system (19) is not structurally controllable.
which can be partitioned into two subgraphs: induced leader subgraph G
Sufficiency:We use the proof of theorem 1 in [Ji et al., 2009] to help us prove the suffi-
ciency. The communication graph G consists of several connected components G(i), i = 1, . . . , κ,
(i)
l and induced follower
(i)
f . For each connected components G(i), i = 1, . . . , κ, it can be modeled as a linear
system with its system matrices being sub-matrices of A and B matrices. Following the analysis
subgraph G
in theorem 1 in [Ji et al., 2009], we can get the following equation:
rank C = rank C1 + rank C2 + . . . + rank Cκ,
(21)
where C is the controllability matrix of multi-agent system (19) and Ci is the controllability matrix
of connected component G(i). The independence of these connected components guarantees
the independence of free parameters in the corresponding matrices, which correspond to the
communication weights of the linkages. Consequently, we have that
g-rank C = g-rank C1+ g-rank C2+. . .+ g-rank Cκ
where g-rank of a structured matrix M is defined to be the maximal rank that M achieves as a
function of its free parameters. Besides, if in some connected component G(i), there is more than
one leaders, we can split it into several connected components with single leader or choose one
as leader and set all weights of the communication linkages between the followers and other
leaders to be zero. After doing this, connected component G(i) is a connected topology with
single leader. According to lemma 2, Ci has full g-rank, which equals to the number of follower
August 21, 2018
DRAFT
16
agents in G(i). Moreover, there is no common follower agent among the connected components.
Consequently, g-rank C=N and multi-agent system (19) is structurally controllable.
With the above definitions and theorems, we are in the position to present the graphical
interpretation of structural controllability of multi-agent systems under switching topology with
multi-leader:
Theorem 3: The multi-agent system (16) or (18) with the communication topologies Gi, i ∈
{1, . . . , m} and multi-leader is structurally controllable if and only if the union graph G is leader-
follower connected.
Proof: As stated in remark 1, the union graph G is the representation of the linear system:
(A1 + A2 + A3 + . . . + Am, B1 + B2 + B3 + . . . + Bm). Therefore, the condition that the union graph
G is leader-follower connected is equivalent to the condition that linear system (A1 + A2 + A3 +
. . . + Am, B1 + B2 + B3 + . . . + Bm) is structurally controllable. Following the proof steps in theorem
1, this result can get proved.
V. Numerical Examples
Next we will give two examples to illustrate the results in this paper and for simplicity, we
take single leader case as examples.
1
r
3
r
r
2
1
r
r
2
1
r
(a)
r
0
3
r
(b)
r
0
3
r
(c)
Fig. 1. Switched network with two subsystems
r
2
r
0
We consider here a four-agent network with agent 0 as the leader and with switching topology
described by the graphs in Fig. 1(a)-(b) (the self-loops are not depicted, because it will not
influence the connectivity). Overlaying the subgraphs together can get the union graph G of
this example as shown in Fig. 1(c). It turns out that the union graph of the switched system is
connected. By theorem 1, it is clear that the multi-agent system is structurally controllable.
Next, the rank condition of this multi-agent system will be checked.
From Fig. 1, calculating the Laplacian matrix for each subgraph topology, it can be obtained
that the system matrices of each subsystem are (one thing we should mention here with the
August 21, 2018
DRAFT
control strategy that each agent can use its own state information, the diagonal elements always
have free parameters, so we can get the following form of sub-matrix of Laplacian matrix) :
17
A1 =
, B1 =
; A2 =
, B2 =
λ1
0 λ2
0 λ4
0
λ5
0 λ3
0
λ6
0
λ7 λ10
λ11 λ8
0
0
0
0
λ9
0
0
λ12
.
According to lemma 1, the controllability matrix for this switched linear system is:
[B1, B2, A1B1, A2B1, A1B2, A2B2, A2
2B1, A2
A2
2B2].
After simple calculation, we can find three column vectors in the controllability matrix:
1B2, A2A1B2, A1A2B2, A2
1B1, A2A1B1, A1A2B1,
0
λ6
0
,
0
0
λ12
,
λ4λ12
0
λ3λ12
.
Imposing all the parameters scalar 1, it follows that these three column vectors are linearly
independent and this controllability matrix has full row rank. Therefore, the multi-agent system
is structurally controllable.
In the second example, we still consider a four-agent network with agent 0 as the leader
and with switching topology described by the graphs in Fig. 2(a)-(b). Overlaying the subgraphs
together can get the union graph G of this example shown in Fig. 2(c). It turns out that the
union graph of the switched system is disconnected, because agent 2 is isolated. According to
theorem 1, it is clear that the multi-agent system is not structurally controllable.
1
r
❅
❅
❅
❅
r
2
1
r
r
2
1
r
2
r
❅
❅
❅
❅
❅
r
0
3
r
(a)
❅
r
0
3
r
(b)
r
0
3
r
(c)
Fig. 2. Another switched network with two subsystems
Similarly, the rank condition of this switched linear system needs to be checked to see whether
it is structurally controllable or not.
From Fig. 2, calculating the Laplacian matrix for each graphic topology, it is clear that the
August 21, 2018
DRAFT
18
.
0
0
λ12
system matrices of each subsystem are :
A1 =
, B1 =
; A2 =
, B2 =
λ1
0 λ2
0 λ4
0
λ5
0 λ3
λ6
0
0
λ7
0
λ11
0 λ10
0
λ8
0
λ9
Computing the controllability matrix of this example yields the controllability matrix:
λ6
0
0
0
λ1λ6
. . . λ7λ10λ12 + λ9λ10λ12
0
. . .
. . .
0
λ10λ11λ12 + λ2
9λ12
.
0 λ12 λ5λ6
This matrix has the second row always to be zero for all the parameter values, which makes the
maximum rank of this matrix less than 3. Therefore, this multi-agent system is not structurally
controllable.
VI. Conclusions and Future Work
In this paper, the structural controllability problem of the multi-agent systems interconnected
via a switching weighted topology has been considered. Based on known results in the lit-
erature of switched systems and graph theory, graphic necessary and sufficient conditions for
the structural controllability of multi-agent systems under switching communication topologies
were derived. It was shown that the multi-agent system is structurally controllable if and only if
the union graph G is connected (single leader) or leader-follower connected (multi-leader). The
graphic characterizations show a clear relationship between the controllability and interconnec-
tion topologies and give us a foundation to design the optimal control effect for the switched
multi-agent system.
Some interesting remarks can be made on this result. First, it gives us a clear understanding
on what are the necessary information exchanges among agents to make the group of agents
behavior in a desirable way. Second, it provides us a guideline to design communication protocols
among dynamical agents. It is required that the resulted communication topology among agents
should somehow remain connected as time goes on, which is quite intuitive and reasonable.
Third, it is possible to reduce communication load by disable certain linkages or make them on
and off as long as the union graph is connected. Several interesting research questions arise from
this scenario. For example, what is the optimal switching sequence of topologies in the sense
August 21, 2018
DRAFT
19
of minimum communication cost? How to co-design the switching topology path and control
signals to achieve desirable configuration in an optimal way? We will investigate these questions
in our future research.
References
[Lawton et al., 2002] J. R. Lawson and R. W. Beard (2002). Synchronized multiple spacecraft rotations. Automatica, vol. 38,
no. 8, pp. 1359 -- 1364, Aug. 2002.
[Dunbar et al., 2006] W. B. Dunbar and R. M. Murray (2006). Distributed Receding Horizon Control for Multi-Vehicle
Formation Stabilization. Automatica, vol. 42, no. 4, pp. 549 -- 558, Apr. 2006.
[Bliman et al., 2008] P. -A. Bliman and G. Ferrari-Trecate (2008). Average consensus problems in networks of agents with
delayed communications. Automatica, vol. 44, no. 8, pp. 1985 -- 1995, Aug. 2008.
[Tomlin et al., 1998] C. Tomlin, G. J. Pappas, and S. Sastry (1998). Conflict Resolution for Air Traffic Management: A Study
in Multiagent Hybrid Systems. IEEE Trans. Autom. Control, vol. 43, no. 4, pp. 509 -- 521, Apr. 2008.
[How et al., 2004] J. How, E. King, Y. Kuwata (2004). Flight Demonstrations of Cooperative Control for UAV Teams. in Proc.
of AIAA 3rd "Unmanned Unlimited" Technical Conference, Workshop and Exhibit, 2004, AIAA-2004-6490.
[Tanner, 2004] H. Tanner (2004). On the controllability of nearest neighbor interconnections. in Proc. of 43rd IEEE Conference
on Decision and Control, 2004, pp. 2467-2472.
[Ji et al., 2006] M. Ji, A. Muhammad, and M. Egerstedt (2006). Leader-based multi-agent coordination: controllability and
optimal control. in Proc. of the American Control Conference, 2006, pp. 1358-1363.
[Ji et al., 2007] M. Ji and M. Egerstedt (2007). A graph-theoretic charaterization of controllability for multi-agent systems. in
Proc. of the American Control Conference, 2007, pp. 4588-4593.
[Rahmani et al., 2006] A. Rahmani and M. Mesbahi (2006). On the controlled agreement problem. in Proc. of the American
Control Conference, 2006, pp. 1376-1381.
[Ji et al., 2008] Z. Ji, H. Lin, and T. H. Lee (2008). A graph theory based characterization of controllability for nearest neighbour
interconnections with fixed topology. in Proc. of the 47rd IEEE Conference on Decision and Control, 2008, pp. 5262-5267.
[Moreau, 2005] L. Moreau (2005). Stability of multiagent systems with time-dependent communication links. IEEE Trans.
Autom. Control, vol. 50, no. 2, pp. 169 -- 182, Feb. 2005.
[Ji et al., 2008] Z. Ji, H. Lin, and T. H. Lee (2008). Controllability of multi-agent systems with switching topology. in Proc.
of the 3rd IEEE Conference on CIS-RAM, 2008, pp. 421-426.
[Ji et al., 2009] Z. Ji, Z. D. Wang, H. Lin, and Z. Wang (2009). Interconnection topologies for multi-agent coordination under
leader-follower framework. Automatica, vol. 45, no. 12, pp. 2857 -- 2857, Dec. 2009.
[Liu et al., 2008] B. Liu, T. G. Chu, L. Wang, and G. M. Xie (2008). Controllability of a Leader -- Follower Dynamic Network
With Switching Topology. IEEE Trans. Autom. Control, vol. 53, no. 4, pp. 1009 -- 1013, May 2008.
[Zamani et al., 2009] M. Zamani and H. Lin (2009). Structural controllability of multi-agent systems. in Proc. of the American
Control Conference, 2009, pp. 5743 -- 5748.
[Lin et al., 2007] H. Lin and P. J. Antsakis (2007). Switching stabilizability for continuous-time uncertain switched linear
systems. IEEE Transaction on Automatic Control, vol. 52, no. 4, pp. 633-646, April 2007.
[Lin et al., 2009] H. Lin and P. J. Antsaklis (2009). Stability and stabilizability of switched linear systems: a survey of recent
results. IEEE Trans. Autom. Control, vol. 54, no. 2, pp. 308 -- 322, Feb. 2009.
August 21, 2018
DRAFT
20
[Sun et al., 2002] Z. Sun, S. S. Ge, and T. H. Lee (2002). Controllability and reachability criteria for switched linear systems.
Automatica, vol. 38, no. 5, pp. 775-786, May 2002.
[Sun et al., 2004] Z. Sun and S. S. Ge (2004). Switched Linear Systems -- Control and Design. Springer, New York, 2004.
[Lin, 1974] C. T. Lin (1974). Structural controllability. IEEE Transactions on Automatic Control, vol. 19, No. 3, pp. 201-208,
June 1974.
[Glover et al., 1976] K. Glover and L. M. Silverman (1976). Characterization of structural controllability. IEEE Trans. Autom.
Control, vol. 21, no. 4, pp. 534 -- 537, Aug. 1976.
[Mayeda, 1981] H. Mayeda (1981). On structural controllability theorem. IEEE Transactions on Automatic Control, vol. 26,
No. 3, pp.795 - 798, June 1981.
August 21, 2018
DRAFT
|
1811.10981 | 1 | 1811 | 2018-11-27T13:49:47 | Modelling Agents Endowed with Social Practices: Static Aspects | [
"cs.MA"
] | To understand societal phenomena through simulation, we need computational variants of socio-cognitive theories. Social Practice Theory has provided a unique understanding of social phenomena regarding the routinized, social and interconnected aspects of behaviour. This paper provides the Social Practice Agent (SoPrA) model that enables the use of Social Practice Theory (SPT) for agent-based simulations. We extract requirements from SPT, construct a computational model in the Unified Modelling Language, verify its implementation in Netlogo and Prot\'eg\'e and show how SoPrA maps on a use case of commuting. The next step is to model the dynamic aspect of SPT and validate SoPrA's ability to provide understanding in different scenario's. This paper provides the groundwork with a computational model that is a correct depiction of SPT, computational feasible and can be directly mapped to the habitual, social and interconnected aspects of a target scenario. | cs.MA | cs |
MODELLING AGENTS ENDOWED WITH SOCIAL PRACTICES:
STATIC ASPECTS
A PREPRINT
Rijk Mercuur1, Virginia Dignum1, Catholijn M. Jonker2,3
1Faculty of Technology, Policy and Management, Delft University of Technology
2Faculty of Electrical Engineering, Mathematics and Computer Science, Delft University of Technology
3Leiden Institute of Advanced Computer Science, Leiden University
November 28, 2018
ABSTRACT
To understand societal phenomena through simulation, we need computational variants of socio-
cognitive theories. Social Practice Theory has provided a unique understanding of social phenomena
regarding the routinized, social and interconnected aspects of behaviour. This paper provides the
Social Practice Agent (SoPrA) model that enables the use of Social Practice Theory (SPT) for
agent-based simulations. We extract requirements from SPT, construct a computational model in the
Unified Modelling Language, verify its implementation in Netlogo and Prot´eg´e and show how SoPrA
maps on a use case of commuting. The next step is to model the dynamic aspect of SPT and validate
SoPrA's ability to provide understanding in different scenario's. This paper provides the groundwork
with a computational model that is a correct depiction of SPT, computational feasible and can be
directly mapped to the habitual, social and interconnected aspects of a target scenario.
Keywords Social Practice Theory · Social Agents · Habits · Routines · Social Intelligence · Interconnected Actions ·
Activity Hierarchies
1
Introduction
To understand societal phenomena through simulation, we need computational variants of socio-cognitive theories.
This paper provides the Social Practice Agent (SoPrA) model that enables the use of Social Practice Theory (SPT) for
agent-based simulations. SPT studies our daily 'doings and sayings', such as commuting, dining or greeting. SPT
focusses on attributes of activities, namely related values, activities, agents, resources or locations. SPT studies the
similarity of these attributes over time (addressing habits), between people (addressing social intelligence) and between
different actions (addressing interconnected behaviour). SoPrA uses this perspective to increase our understanding of
social phenomena.
SPT has provided a unique understanding of social phenomena in sociology. Giddens (1984) showed how SPT captures
that our actions are part of a routine and often not conscious, voluntary or intentional. Reckwitz (2002) explained
how SPT captures that the social world is formed and shaped by shared practices and not an additional layer of joint
intentions or conventions. Shove et al. (2012) showed how our life is full of bundles of social practices: interconnected
actions that are similar and influence each other and that cannot be seen in isolation. By using these aspects of SPT in
social simulation we can provide potential explanations that increase our understanding of social phenomena (Grabner
2018). Although there are several useful conceptual frameworks and implementations (Holtz 2014; Narasimhan et al.
2017; Dignum & Dignum 2015), there is no computational model of SPT that can explain social phenomena in terms of
the habitual, social and interconnected aspects of a SP.
To show that SPT can provide potential explanations through simulation we need a computational model that is validated.
This paper focuses on the pre-requisite steps to validation: constructing a computational model that is a correct depiction
of SPT, computational feasible and clearly maps the model onto a target scenario (Grabner 2018). We approach this by
A PREPRINT - NOVEMBER 28, 2018
surveying the literature on SPT and summarizing the core aspects of SPT in requirements. We construct a computational
model in the Unified Modelling Language (UML) that fulfills these requirements and implement the model in both
Netlogo (Wilensky 1999) and Prot´eg´e (Musen 2015). By showing how our UML fulfills the requirements extracted
from SPT and, in turn, our implementations correctly depict our UML, we verify that we made a computational model
that is both feasible and a correct depiction of SPT. Modelling choices throughout this process are communicated and
aimed at the computational feasibility or the correct depiction of SPT. A use case on the societal problem of CO-2
emission due to car commuting shows how SoPrA clearly maps onto habitual, social and interconnected aspects of a
social problem. Future work is to model the dynamic aspect of SPT and validate SoPrA. The computational model
provided can be used to provide potential explanations of social situations or, possibly outside social simulation, to
guide human-agent interaction in a socially aptitude and efficient way.
The remainder of the paper is structured as follows. Section 2 explains the scenario that will be used as a use case
throughout the paper. Section 3 captures SPT in requirements and uses supporting literature from psychology and
agent theory to correctly model the core aspects of SPT. Section 4 and 5 present a high level description and UML
version of the SoPra Model. Section 7 shows how we can make a clear mapping from SoPrA to the habitual, social and
interconnected aspects of our scenario.
2 Use Case & Descriptive Statements
This section describes the use case of a modeller who aims to explain the societal problem of CO-2 emission due to
car commuting. The core mechanisms of SPT are essential in car commuting. First, social intelligence is used when
people coordinate their commute: carpool, bring their kids to school. Second, a meta-study found that habit is the
strongest predictors of car use; stronger than other frequently studied cognitive measures such as attitude, norm or
values (Hoffmann et al. 2017). Third, Cass & Faulconbridge (2016) found in a series of interviews that an important
consideration in taking the car is the interconnectedness of the work-commute, sport-commute and school-commute.
For example, some of the interviewed took the car to work, because this allowed them to combine that action with
bringing their kids to school. The following describes a scenario of how Bob can come to the decision to take the train
instead of the car.
Bob and Alice are at home. Bob usually takes the car to brings the kids to school and go to work.
He recently started to value the environment more, but does not really reflect on this habit when
at home with his kids. Furthermore, he equates commuting with car commuting. For him, they
are alike. Today the kids are not home. Alice asks Bob if he wants to go by train with her? She
beliefs Bob wants to commute, that biking is not very comfortable with the rain outside and that
people that go by car usually value comfort. She beliefs that normally when others brings the kids
to school by car, they will also go to work by car. However, now that the situation is different, he
will reconsider. Bob agrees to go by train. He does not have a habit in this situation and that activity
promotes environmentalism.
Section 7 shows how SoPrA can be used to capture this scenario.
3 Literature and Requirements
This section describes related literature and empirical work on SPT (Section 3.1) and on agent and psychology literature
that explores key properties of SP (Section 3.2). We end each section with a list of requirements. These requirements
summarize the section and extract what we find most important. Section 5 presents a UML model that meets these
requirements.
3.1 Social Practice Theory
3.1.1 Short History of Social Practice Theory
Social practice theory has its roots in the work of Wittgenstein and Heidegger who both ascribe a central role to praxis
or practices. This starts a tradition where the central unit with which one describes the world are our daily doings (e.g.,
breakfast, work, meetings, commuting). This is in contrast with the traditional view in sociology to see the world in
terms of agency (e.g., an employee) and social structures (e.g., an organization). For Giddens (1984) in particular,
practices are a way to bridge these two levels of abstraction as a practice exist on both levels (e.g., a meeting influences
the employee and the organization). Bourdieu (1977) and Schatzki (1996) popularized the concept of practices in the
1980s and 1990s, where Bourdiea focussed on the practice as a personal 'habit', Schatzki focussed on the practice as
2
A PREPRINT - NOVEMBER 28, 2018
something social. Reckwitz (2002) further emphasized the importance of SPs as a new way to capture the social world
that breaks with old paradigms: the social is formed and shaped by shared practices and not an additional layer of joint
intentions or conventions. Currently, the most common conceptualization of SP comes from Shove et al. (2012) who
sees the concept of practices as a collection of ever changing interconnected elements. For example, the practice of
driving is a connection of the material car, the meaning of transport and the competence to drive it. Recently, Dignum
& Dignum (2015) used SP as a parsimonious concept around which one can order relevant social knowledge for an
agent. They divert from the original line by bringing agency back on the table and linking SP to standard agent concepts
such as goals, norms and beliefs. SPT thus started as a focus on 'doing' and continued to conceptualize that 'doing' as
routines, that are shared between multiple people and relate different elements.
3.1.2 Key Properties of Social Practice
We focus on three key properties of SPs that reflect three aspects of human behaviour: habits, sociality and interconnected
behaviour. These key properties provide an aim and scope for our computational agent model of SP.
SPs are first of all practices. They are habitual enacted routines (Shove et al. 2012; Reckwitz 2002; Digmun 2004).
Such routines are repeated over time and exist by virtue of this reproduction (Shove et al. 2012). Reckwitz (2002)
emphasized that this routine is both physical and mental: there is repetitiveness in both the bodily movement and mental
elements that are associated with the SPs.
SPs are social. Shove et al. (2012) and Reckwitz (2002) interpret social here as that the SP is similar for multiple people.
For example, most people share the belief that one needs the know-how to control a car to do the SP of car driving.
Reckwitz (2002) sees SPs as a new way to capture the social world that breaks with old paradigms: the social is captured
in our shared SPs instead of in a shared mental world (e.g., as described by BDI-agents), in texts (e.g.,in scientific
papers) or interactions (e.g., in a discussion). Reckwitz (2002) this similarity means that the SP is something collective,
"but not in the sense of a mere sum of the content of single minds", but in a time-space transcending non-subjective way.
We assume that Reckwitz (2002) refers here to the SP as something macro. A separate entity that emerges out of micro
enactments, but is more than just the sum of them. Note that common knowledge dictates that SPs are often not fully
shared (i.e., similar for all people). For example, Bob and Alice might share many beliefs about the SP of commuting,
but Alice associate car-driving with efficiency and Bob with fun. As becomes clear in the next section, modelling this
tension between the individuality and sharedness of a SP is one of the main challenges this paper tackles.
There is another interpretation of sociality in SP: sociality as interaction. This interpretation becomes clear when
Dignum & Dignum (2015) zoom in on the micro aspects of SPs. For example, greeting, meeting, discussing and
teaching are all SPs that can only be enacted by multiple people. This meaning of sociality is closer to the layman
perspective on a social activity: an activity done in the presence of other people. SPs having a guiding role in this
interaction, allowing one to form expectations about the actions of others. This view contrasts with the view of Shove
et al. (2012) and Reckwitz (2002), who deem a SP social if its shared, even if there is no interaction when enacting it.
For example, one of Shove et al. (2012)'s canonical examples of a SP is showering, a SP mostly done alone. We claim
these two interpretations of sociality are reciprocally related. First, a SP only becomes shared through interaction. In
the case of greeting, the SP becomes shared through direct interaction. You see how others greet and adapt your ideas
of a SP. In the case of showering, the SP becomes shared through indirect interactions (judging remarks, sighs, sniffles).
Second, a SP can guide the interaction because it is shared. One forms expectations of the actions of the other based on
the assumption that the actions, meanings, habits (i.e., elements of a SP) are shared.
Different practices are similar and influence each other. Shove et al. (2012) called such similar practices: bundles of
practices that are interconnected. They argued that if practices are similar in some aspects, then they become similar
in other aspects too. We argue that SPs are interconnected in terms of common elements, time and space. First,
SPs connect when they are enacted at the same time or in sequence. For example, in a series of interviews, Cass &
Faulconbridge (2016) found that one main reason people take the car to work is because this makes it easier to combine
this SP with SPs of leisure, healthcare or shopping. Second, SPs connect when they are enacted in the same space. For
example, a supermarket at the train station facilitates the connection of the practice of groceries and commuting. Third,
SPs might be connected, because they share an element. For example, Shove et al. (2012) mentions how in the early
days of driving, cars easily broke down. To be able to drive a car one had to have the competence to repair it. The
practice of driving thus became connected with other practice that related to the competence of repairing, for instance,
plumbing or carpeting. The meaning of these practices as something masculine influenced the meaning of car driving.
Car driving and plumbing now share this element of meaning as something primarily masculine.
SPT.1 SPs are habitually enacted routines.
SPT.2 SPs are social:
(a) SPs are similar for multiple agents.
3
A PREPRINT - NOVEMBER 28, 2018
(b) SPs influence and are influenced by agent interactions.
SPT.3 SPs are interconnected: in terms of time, space and common elements.
3.1.3 The elements of a Social Practice
What comprises a SP? Although short names, such as "greeting" are given to SPs, SPs are collections of interconnected
elements. This idea started with Taylor (1973) for who "meanings and norms implicit in [...] practices are not just in the
minds of the actors but are out there in the practices themselves". For Taylor a practice is not merely a set of actions, but
also comprises other concepts. For (Reckwitz 2002) this means the SP's existence necessarily depends on the existence
and specific interconnectedness of these elements, but cannot be reduced to any single one of them. The practice of
skateboarding thus only exists because a group of elements comes together: materials like the skateboard, street spaces,
the competences to ride the board, rules and norms that define the practice and the meaning different groups attribute to
the practice (Shove et al. 2012). For example, as a recreational activity, an art form or a means of transport. We continue
by describing the literature on those elements we think are necessary and sufficient to model the key properties.
Although A SP is thus not merely (a set of) action(s), an action is a commonly agreed aspect of a SP. Actions here refer
to the bodily movement itself without all the mental connotations. We discern between two views in the literature. First,
according to Reckwitz (2002) a SP represents a pattern which can be filled out by a multitude of single and often unique
actions reproducing the SP. For example, the SP of commuting can consist of taking your kids to school and then going
to work. Second, for Shove et al. (2012) actions are not a part, but instead another view on the SP. She views the SP
as either a collection of elements or as something that is performed. For example, commuting can be seen as either a
collection of elements such as, the meaning of transport and the material car or as a series of actions, such as, getting
in your car and going to work. We follow Reckwitz (2002) as (1) it allows us to retain ourselves to the concept of
'elements' (instead of introducing an auxiliary concept 'perspective') in line with our aim for parsimony (2) modelling
SPs as a hierarchy of actions allows us to link SPT to agent models that focus on actions as well.
There are symbolic and social elements associated with a SP, such as, the symbolic element 'health' to the practice of
riding the bike. These symbolic and social associations are conceptualized differently by different authors. Schatzki
(1996) emphasized the 'teleoaffective' social elements, such as, embracing ends, purposes, projects and emotions. He
described how snapshots of what people do have a history and a future that are united in the moment of performance. In
our words, actions connect the now with past mental connotations and determine future connotations. Reckwitz (2002)
focused on mental, emotional and motivational knowledge. For Reckwitz it's important that the mental is part of the
routinized SP. We could not imagine football without the associated aim (to win the game), understanding (of others
players behaviour) and emotions (a particular tension). Shove et al. (2012) simplified these concepts in a bucket term
called meaning. This has the advantage that one can easily refer to all symbolic and social element of a SP, but the
disadvantage that the term is not well-defined or measurable. (In fact, Dignum & Dignum (2015) unfolds this concept
of meaning again and differs between social interpretation, roles or norms.) We follow Shove et al. (2012) here for
the sake of simplicity: it allows us to model the key properties, cost less time to work out and serves computationally
feasibility. Given the key properties we aim to model we highlight two aspects of the meaning element. First, the
element of meaning has a teleological role: it represents an end or purpose. Second, this end or purpose is social: its
shared by others and has a role in guiding interaction.
Whereas in the past SPT focussed on these classical social aspects (meanings, norms), more recently Schatzki (1996);
Latour (1996); Reckwitz (2002); Shove et al. (2012) have focussed on the physical aspects of a SP. They introduce
an element called 'materials', which helps in closing the 'gap' between the physical and social world (Shove et al.
2012). By abstracting over the actor, SPT shows that for multiple people the same SPs are connected to the same
type of physical objects. For example, almost everyone associates a car, road and gas station with the SP of driving.
These physical objects play a central role in our social world in that it provides a shared common ground (Searle 1995).
Dignum & Dignum (2015) connects the physical dimension of a SP to the decision making of an agent by emphasizing
that certain materials can trigger a SP. If the physical context triggers a SP, it means the agent will typically do the SP.
As we will show in the next section, triggering a SP is closely connected to what social psychologist call a habit.
In sum, this paper focuses on the following elements of a SP: an action element, a meaning element and a physical
element. We argue that this set of components is necessary and sufficient to model the aforementioned key properties of
a SP. There are more elements that can be routinized, socialized or interconnected. Other commonly described elements
of SP are emotions, competences, affordances, norms, goals and plans. Our view is that these are valuable concepts that
could improve SoPrA in its ability to model behaviour. However, to show how the mechanisms of routines, sociality
and interconnectedness in SP these elements are necessary and sufficient. After introducing SoPrA, we will show how
SoPrA can be clearly mapped on this aspects of our use case 7.
SPT.4 SPs consists of actions that represent the bodily movement.
4
A PREPRINT - NOVEMBER 28, 2018
SPT.5 SPs consist of a meaning element that represents a shared end or purpose.
SPT.6 SPs consist of a physical element that
(a) can trigger an action
(b) relates the physical world to the social.
3.2 Literature on Key Properties
3.2.1 Habits
A key aspect of SPs is that they are repeated over time and exist by virtue of this reproduction (Reckwitz 2002).
Repetitive behaviour is also studied from the individual perspective by social psychologist as 'habits'. They use the
term 'habit' to refer to a phenomenon whereby behaviour persists because it has become an automatic response to
particular, regularly encountered, context (Kurz & Gardner 2015). The model presented in this paper links the notion of
habitual behaviour to the notion of SP.
Habits are automatic. Moors & De Houwer (2006) compares several theoretical views and concludes that automaticity
entails unintentional, uncontrollable, goal independent, autonomous, purely stimulus driven, unconscious, efficient,
and fast behaviour. Habits are thus contrasted with predictors of intentional actions, such as values, motives and goals.
When a context triggers the habit these intentional concepts do not mediate the relation.1 For example, even if one
values the environment higher than efficiency one habitually takes the car to work. Habits can be measured with the
Self-Reported Habit Index, a 12-item index that includes items such as 'I do frequently' and 'I do without thinking'
(Verplanken & Orbell 2003). This measure has a medium-to-strong (r+ = 0.44) relation with behaviour (Gardner et al.
2011). Habits thus provide a fast automatic heuristic for action that derives its meaning from being contrasted to a slow
intentional mode of action.
Habits are context-dependent (Kurz & Gardner 2015). For example, a habit at home might not be a habit at work.
One might drink coffee every two hours at work, but not at home. The immediate setting, or context, of an agent thus
triggers an action. The literature on habits differs in what they consider as context. A narrow definition focusses on
physical tangible elements. For example, nearby cigarettes can trigger a habit of smoking. Wider definitions of context
allow time, other activities (Verplanken 2005), location and/or other people to trigger habits. Wood & Neal (2007)
nuance the context-action relation by conceptualizing habits as 'context cue'-action relations. For example, it is not so
much work that triggers drinking coffee, but a combination of cue's at work such as a colleague and the coffee machine.
The strength of these 'context cue'-action relations is continuous instead of discrete (e.g., a coffee machine is a slightly
stronger habitual trigger than a colleague) (Moors & De Houwer 2006).
The actor influences the habit. Lally et al. (2010) studied how habits are formed in the real world. Subjects were asked
to do the same action daily in the same context and report on automaticity (calculated using a sub-set of SRHI items).
She found that humans differ in the maximum automaticity they reported and also in the time to reach this maximum.
There are two aspects of habits that we consider out of scope of this paper. Different contexts can be similar and thus
trigger similar habits. Mercuur (2015) shows that although there is little known about how habits in one context relate
to habits in another context this is crucial to model habits in realistic settings. To our knowledge, there is no theoretical
or empirical work on this topic. This topic demands a study in itself and is postponed to future work. Habits are related
to the concept of attention (Wood & Neal 2007). The more attention an individual can muster the lower the chance he
or she falls into a habit. Attention becomes important when modelling habits over time. Different levels of attention
over time give rise to different decisions. As this paper focuses on static aspects this topic is postponed to future work.
H.1 Habits provide a fast automatic heuristic for action that derives its meaning from being contrasted to a slow
intentional mode of action.
H.2 Habits exist by virtue of continuous action-'context cue' associations.
H.3 Context cue's that trigger habits include physical elements and could extent to concepts such as time, other
activities, location or other people.
H.4 Humans differ in
(a) the height of the maximum automaticity (or strength of the habit) they experience
(b) the time to reach this maximum
5
A PREPRINT - NOVEMBER 28, 2018
3.2.2 Social Intelligence
The second key aspect of SPs is that they are social. The social world is also studied from the individual perspective as
social intelligence. Social intelligence is our ability to act wisely in in a world that we share with others (Thorndike
1920). The model presented in this paper links the notion of social intelligence to the notion of SP.
As mentioned, sociality in SPT has two faces: sociality as a shared world or sociality as interaction. Social intelligence
can also be seen from these two perspectives.
Castelfranchi (1997) describes social intelligence from the first perspective: as our ability to reason in a shared world.
The agent literature provides different answers on what this shared world consists of. A first series of papers uses
agents that only take into consideration the actions of other. For example, in the Consumat model (Jager et al. 2000)
an agent takes into consideration what most other agents do. Castelfranchi (1997) emphasized that we need to extend
such models to also take the mental state of other agents into consideration. The notion of social action cannot be a
behavioural notion - just based on an external description, because what makes the action social is that it is based on
certain mental states. A second series of papers focusses on such a representation of the mind of other agents based
on individual notions such as beliefs, desires and intentions (Dignum et al. 2000; Felli et al. 2014). Sociality is then
introduced as a secondary notion. For example, as the ability to form beliefs about others goals (Felli et al. 2014) or as
a mechanism to filter its intention to a socially desired set (Dignum et al. 2000). Dignum et al. (2014); Hofstede (2017)
argued that humans are at the core social beings and thus use social concepts as a primary concept. We view social
concepts here as referring to reasoning concepts that depend on being shared. For example, a notion of culture is hard to
imagine without multiple agents. A third series of paper focuses on these social concepts. For example, values, norms
(Dignum 1999), trust (Jonker & Treur 1999), culture and identity. What characterizes this work is to bring a collective
(social) notion back to the reasoning of the individual. This paper follows this last view in using social concepts as core
mechanisms for agents and the basis for our social world.
From the perspective of the individual, one beliefs in a shared social world, but also a personal view. For example,
one beliefs that car-driving is usually seen as a means for transport, but beliefs him or herself its a fun activity. These
personal and shared aspects of a view are independent: one can belief in a personal view on something without believing
this view is shared or one can belief something is the shared view without believing in this view. In other words, there
are multiple views on the world that one can all to a certain extent agree with or beliefs others agree with.
Theory of mind considers such reasoning about beliefs of others (Woodruff 1978). In addition, it treats two more
aspects: beliefs about specific others and chains of beliefs. For example, one can belief John beliefs car-driving is fun or
belief that John beliefs that I believe that John believes car driving is fun. These aspects are out of the scope of SoPrA.
SP are a heuristic that considers only two agents: itself or the group. For example, when greeting someone in most
cases it suffices to know that most people view greeting as polite and see shaking hands as a part of greeting. SP focuses
on the social intelligence that works in most situation, in contrast, theory of mind treats particular cases where more
in-depth reasoning is needed. For a model of SP, it's thus sufficient to require two aspects of our view on the shared
social world: to what extent one beliefs this view him or herself and to what extent one beliefs others hold this view.
Goleman (2011) describes social intelligence from the second perspective: as our ability to be aware and reason about
this common ground in interactions. He divides social intelligence in social awareness and social influence. Social
awareness allows one to form exceptions of other people and social influence to act upon those. As this paper focuses
on the static aspects of SPs we postpone the dynamics of interactions to future work.
SI.1 Social intelligence gives the ability to represent and reason about the shared world between agents.
SI.2 This shared world needs to be captured in terms of actions, individual concepts and foremost social concepts,
that is, concepts that depend on being shared among multiple humans.
SI.3 There are multiple views possible on this shared social world.
(a) Agents can belief to a certain extent themselves in a particular view.
(b) Agents can belief that others to a certain extent belief in a particular view.
(c) These two beliefs can be independent: one can belief something without believing others do and vice
versa.
SI.4 This common ground forms the basis of wise social interactions by allowing social awareness and social
influence.
3.2.3 Interconnected Actions
The third key aspect of SPs is that they are interconnected. This subsection uses the work on interconnected actions to
model this key aspect.
6
A PREPRINT - NOVEMBER 28, 2018
In neuroscience, Metzinger & Gallese (2003) brought together empirical evidence that shows that humans use actions
as a basic building block to represent the world. Actions here are the bodily movements conceptualized in the motor
system. Metzinger & Gallese (2003) shows how actions are used by the remainder of the brain as basic constituents of
the world it interprets. Humans form ontologies of how these actions are related to each other. Metzinger & Gallese
(2003) further shows how these action ontologies serve as a building block for social cognition: action-associations
abstract over the subject, therefore they can be used to map on a first-person or second-person perspective.
Action ontologies have been studied in the context of smart homes to be able to recognize activities (van Kasteren
et al. 2008; Storf et al. 2009; Chen et al. 2012; Okeyo et al. 2014). Okeyo et al. (2014) makes a difference between
actions, simple activities and composite activities. Actions are atomic. A simple activity is an ordered sequence of
actions. Composite activities are multiple actions within a time interval, but with no strict order to the actions and
can thus overlap. For example, driving might consist of overlaps of the activity of taking a turn and listening to the
navigation. From this point on we will separate between activities and actions. Activities refer to any bodily movement
(i.e., actions, simple activities and composite activities). Actions to refer to the subset of activities that is atomic.
Okeyo et al. (2014) separate two types of relations between activities: an ontological and temporal relation.2 The
ontological part describes relations between actions such as subsumptions, equivalence or disjointness. For example,
taking the train to school is a kind of commuting. A temporal relation encodes qualitative information regarding time.
For example, the user performs two activities after another. Humans are naturally able to make ontological and temporal
inferences about activities. For example, humans infer that if taking the car to work is environmentally unfriendly then
taking the car to school might be as well. Or they might induce one is doing the activity of commuting as one is doing
several actions in a sequence: walking to the car, going in the the car, driving to work and working.
In the area of agent communication, interconnected actions have been studied under the name of conversation protocols
(Kumar et al. 2002). A central aim in this work is to coordinate the agents by identifying important shared fixed points
(called landmarks), while allowing the agents freedom in their path to reach these states. The result of this is an activity
hierarchy with partial ordered landmarks that represents the conversation protocol.
IA.1 Actions are basic building blocks of how agents represent the world.
IA.2 Agents can relate these actions into meaningful activity hierarchies.
IA.3 Activity hierarchies serve as a building block for social cognition.
IA.4 Activities can consists of multiple other activities:
(a) sequential activities
(b) overlapping activities.
IA.5 Activity hierarchies have ontological and temporal aspects.
IA.6 Agents are able to make inference about these ontological and temporal properties.
IA.7 Activity hierarchies have shared fixed points, but also allow the freedom to have personal routes towards those
points.
3.3 Overview of Requirements
Table 1 provides an overview of the requirements extracted from the literature. The requirements are simplified for
display purposes.
Table 1: An overview of the requirements extracted from the literature.
Social Practices
are habitual
Habits
are fast and not slow
are social: similar and interactive
are action- context cue links
are interconnected
triggered by resources, time, etc.
consists of actions
consists of a meaning element
consists of a physical element
different per human
1
2
3
4
5
6
7
Social Intelligence
gives the ability to reason
in a shared world
requires shared actions,
individual and social mental concepts
requires an independent
personal and shared view
provides the basis for social
awareness and social influence
Interconnected Activities
are basic building blocks
form activity hierarchies
form the basis for social cognition
consist of other activities
can relate ontologically or temporally
allows agents to make inferences
are fixed points or personal deviations
7
A PREPRINT - NOVEMBER 28, 2018
4 The SoPrA Model: High-level Description
The SoPrA model aims to capture the habitual, social and interconnected aspects of SPT. We use the elements as
presented in the SPT literature as a basis: actions (or in our new terminology: activities), a meaning element and a
physical element. To adequately capture habits, social intelligence and interconnected actions, we use the presented
theory from other disciplines. This section presents a high level overview of SoPrA, the next section shows how SoPrA
meets the requirements presented in Table 1.
Figure 1 presents a high-level overview of SoPrA. We use activities as the central component of SoPrA, because they
are fundamental to each core aspect we aim to model: social practices consists of activities, habits are relations between
context and activities, activities are the basis for social cognition and the basis for the activity hierarchies humans use to
represent the world.
Figure 1: An abstract overview of SoPrA depicting how it captures the habitual, social and interconnected aspects of
social practices.
These activities are firstly used to capture the habitual aspects of SPs by relating the activities to context elements. An
activity will be habitually enacted when in the (performance) context of an agent there will be enough context elements
that habitually trigger the action. One takes the car to work, because one is at home, just had breakfast and sees the
keys on the table. As such, a SP can become a routine: in the same context the same activities, in the same order are
performed.
A routine only gains significance when it can be contrasted with a non-routine mode of acting. For this reason, an
activity is associated with a meaning element. The meaning element represent a shared end or purpose for the activity.
It provides a reason for the agent to deviate from the routine and intentionally chose an action.
These activities are secondly used to capture the interconnected aspect of SP by relating them to other activities. These
activities form a hierarchy that provides a structure that the agent follows when making decisions. To implement one
activity one needs to do another activity. After taking the car to work, one needs to take the car to sports. The structure
can also be used to make inferences: given that one activity implements the other they will share some properties.
These activities are thirdly used to capture the social aspects of SP by relating them to the beliefs of an agent. Agents
have a personal take on an activity and an idea of how others view the activity. These views often overlap. One thinks
car driving is efficient, one's partner thinks car driving is efficient and so, without saying, both assume they will carpool
to work with the car. Agents base their social intelligence on their shared view on activities. As such, a SP can be used
as a shared social world to guide interactions.
A practices truly becomes social when multiple agents have the same view on an activity. What constitutes a social
practice, instead of a personal practice, can thus only be determined in a bottom-up descriptive fashion. Every practice
exists on an continuum ranging from personal to shared. The extent to which a practice is shared changes over time:
daily social dynamics influence which views become prominent or dwindle. Moreover, there is no one cut-off point
8
A PREPRINT - NOVEMBER 28, 2018
where a practice is shared 'enough' to become social: every interaction requires a different threshold of sharedness.
For example, to go through a door requires less of a shared social world then playing soccer. This paper provides
groundwork by expressing for every agent in which view they belief. Future work will explore how the dynamics of
social interactions are dependent on the level of sharedness a social practice provides.
SoPrA thus associates elements (e.g., meaning, context elements) with these activities and not -- as is common
in SPT literature -- with the SP as a whole. For example, an agent does not associate the SP of commuting with
environmentalism. Instead, an agent associates an implementation of commuting -- taking the train to work -- with
environmentalism, while associating another implementation -- taking the car to work -- with the meaning of efficiency.
We give three advantages of this modelling choice. First, it allows to capture the beliefs an agent has about a SP in a
nuanced way (e.g., make a difference between forms of commuting). Second, it allows to use these nuances to guide
the decision-making of the agent (e.g., choose car-driving over the train because its more efficient). Third, it allows one
to feed the model with a selection of facts about the actions and let the agent make inferences about more complex
activities (e.g., commuting is boring, because all of its implementations are boring). This inheritance from activity to
activity will get more attention in Section 5.5.
5 The SoPrA Model: UML Model
This section provides a detailed overview of SoPrA in the Unified Modelling Language and several modelling choices.
The model is presented in parts and linked to the requirements. For the full model see 9.
5.1 Activity Tree
The basic building block of SoPrA are activities. They provide the core of a SP (SPT.4). These activities connect to each
other both temporally and ontologically (IA.5). SoPrA enables one ontological relation known as the generalization.
The generalization association allows the agent to make inferences about the properties of an activity based on its
parent (IA.6) as will be further discussed in Section 5.5. For pragmatic reasons we simplify the temporal relation to
the use of the parthood association. The parthood association specifies that one activity is composed of several other
activities. In other words, all the child activities need to be completed to complete the parent activity. The parthood
association allows us to model sequential activities. For example, car-commuting consists of bringing the kids to school
and going to work. Note that we do not specify the order in which these activities should be done nor if they can be
done simultaneously. In terms of Okeyo et al. (2014), we can model sequential activities (IA.4a), but not overlapping
activities (IA.4b). By enabling temporal and ontological associations between activities SoPrA provides an activity
hierarchy that agents use to order and represent the world (IA.1,IA.2).
Figure 2 presents the Activity class and the Implementation association class. The Implementation association
class can have the allOf type, which represents the aforementioned generalization relation, and the partOf type,
which represents the aforementioned temporal relation. To easily refer to the right level of abstraction of an activity we
differ between three types: actions (atomic), abstract actions and the top action (root). Figure 3 depicts an instance of
these classes for our use case of commuting. The activity hierarchy should be seen as the basis for the decision-making
of the agent. It allows a mechanism where the agent stepwise decides which activity it will do: from the activity of
commuting to the activity of taking the car to work.
Figure 2: An UML diagram depicting the Activity class, the Implementation association class connecting activities and
the different types one can attribute to these classes.
5.2 Activity Associations
Figure 4 present how we associate a physical element (SPT.6) and a meaning element (SPT.5) with activities to model
SPs as habitual routines (SPT.1) that can be contrasted with a slow intentional side (H.1).
9
A PREPRINT - NOVEMBER 28, 2018
Figure 3: An activity tree relating top actions, abstract actions and actions for commuting. The white arrows specify
kind-of associations and the black diamonds part-of associations.
Figure 4: An UML diagram depicting activity specific assocations such as the RelatedValue association class and the
HabitualTrigger association class.
SoPrA has a HabitualTrigger association class that associates activities with a ContextCue class. The strength
attribute of HabitualTrigger association class represents to what extent the context element is connected with the
activity. Habits are thus modelled as continious action-'context cue' associations (H.2). These context-cue's include
10
A PREPRINT - NOVEMBER 28, 2018
objects, locations, people, other activities and time (H.3) and are modelled in different ways. We model objects and
locations as type of context cue's (i.e., they do not have a seperate class). They represent the physical aspect of a SP
(SPT.6). Agents are modelled as a separate class that specializes (is generalized by) a ContextCue. We reserve a
separate class for agents as this class will have associations that other context cue's will not have (as opposed to object
and location). Activities are already part of the model and are also a specialization of Context Cue. We do not include
time as a possible habitual trigger of activities. Time is a special case as it semantics interplay with other parts of
our model (e.g., the parthood association). Due to time and space limitations we postpone the modelling of time as a
habitual trigger to modelling the dynamic aspects. The HabitualTrigger association class allows us to model SP as
habitually enacted routines (SPT.1).
SoPrA requires a meaning elements that represents a shared end or purpose (SPT.5). We aim to model the concept of
meaning as clearly distinguishable, measurable, and understandable in terms of empirical observations (i.e., operational-
ized) as this serves our aim of creating a validated model of SPT. The literature on SPT provides several candidates that
could be used to model meaning: emotions, motives, values, norms or goals.
We argue that the concept of human values (e.g., environmentalism, tradition, achievement) provides a good candidate
to model meaning as its (1) teleological, (2) shared and (3) operationalized and (4) trans-situational. First, values can
be defined as 'ideals worth pursuing' (Dechesne et al. 2012). Values are ends that people what to achieve: they are
unreachable, but can be pursued (Weide 2011). Values thus provide the teleological element we require of our model
of meaning. Second, Schwartz (2012) developed several instruments (e.g. surveys) to measure and categorize values.
Values thus provide an operational concept that has been made measurable and understandeble in terms of empirical
observations. Third, these findings on intervalue comparison have been extensively empirically tested and shown to be
consistent across 82 nations representing various age, cultural and religious groups (Schwartz 2012; Schwartz et al.
2012; Bilsky et al. 2011; Davidov et al. 2008; Fontaine et al. 2008). Values thus provide a shared concept to which
different people can relate. This satisfies our requirement to use shared social concepts as the basis of agent reasoning
(SI.2). Fourth, values are trans-situational (Weide 2011). This allows us to interconnect actions from different domains
(SPT.3). For example, environmentalism can relate both to the practice of commuting as well as dining.
Figure 4 shows how we model the connection between values, context and activities. In addition to an activity
and a value class, there is an association class called RelatedValue. The RelatedValue association class has a
strength attribute with type Double that represents how strongly an activity is attached to a value. Analogue the
HabitualTrigger association class has a strength attribute that represents how strongly a context element triggers an
activity.
5.3 Connecting Agents and Activities
To enable SPT for agent-based simulations, SoPrA needs to model the connection between SP and an agent (see Figure
5).
SoPrA connects agents and activities with the Belief association class. If multiple agents belief in the same activity
the SP is similar for them (SPT.2a). A SP can then form a common ground between agents that gives them the ability
to represent and reason about a shared social world (SI.1). The activity class here represents one view on an activity.
This allow for multiple views (SI.3), that is, multiple instantiations of the activity class for the same bodily movement.
For example, drive-car-to-school1 represents the view that car-driving is fun, while drive-car-to-school2
represents the view that car-driving is not fun.
The Belief association class has an attribute personalStrength that represents to what extent the agent itself agrees
with this view (SI.3a). The attribute sharedStrength represents to what extent an agent beliefs others agree with this
view (SI.3b). This allows the agent to have independent beliefs how others view an activity and how itself views this
activity (SI.3c). For example, I belief drive-car-to-school1 (i.e., car-driving is fun), but most authors belief that
drive-car-to-school2 (i.e., car-driving is not fun). Note that in a simpler model, one that connects these attributes
with the Activity class, these attributes are necessarily shared over multiple agents (e.g., violates SI.3c).
The Activity class has a reflexive same association that represents that two instances of the activity class (e.g.,
drive-car-to-school1 and drive-car-to-school2) refer to the same bodily-movement. This allows agents to
recognize which instances represent different views on the same bodily-movement. This will help agents in making
inferences on how different views on an activity connect. For example, Bob wants to enact drive-car-to-school1.
He beliefs that most others view the same bodily movement as drive-car-to-school2: driving the car to school
promotes the value of social interaction. Therefore Bob reasons that his neighbour will agree when he asks him to take
his kids to school as well. These inferences thus enable the agent to use the common ground SP provide to represent
and reason about the social world (SI.1).
11
A PREPRINT - NOVEMBER 28, 2018
Figure 5: An UML diagram presenting how agents and activities are connected with the belief association class. The
same association connects activities that represent the same bodily movement.
5.4 Agent Associations
Figure 6 depicts the Agent class with its attributes that are needed to deal correctly with habitual behaviour and contrast
this with intentional behaviour (SPT.1).
Figure 6: An UML diagram depicting agent specific elements such as the habitRate and the AdheredValue assocation
classs.
Agents have a attribute that ensures heterogeneity in how they acquire habits. This attribute habitRate represent
how much the strength of the HabitualTrigger association class increases when an agent experiences an action
in relation to a ContextElement. As shown in (Mercuur et al. 2017), a difference in habitRate suffices to acquire
heterogeneity in both the learning rate (H.4b) as well as the maximum habit strength the agents report (H.4a). Future
work will describe the dynamics of learning habits.
We model an association class between agents and values called AdheredValue with an attribute strength. This
represent to what extent an agent values a value. This enables agents to intentionally choose one action over another.
12
A PREPRINT - NOVEMBER 28, 2018
For example, an agent might value environmentalism highly and relate the activity Non-Car Commuting1 to environ-
mentalism, therefore, it chooses Non-Car Commuting1 over Car Commuting1. We require SoPrA to have a basis for
intentional actions as habits become only meaningful when contrasted with intentional behaviour (H.1). We chose
values to represent the intentional (or teleological) in SoPrA for the reasons we explained in section 5.2: values are
operationalized, shared and trans-situational.
5.5 Additional Formal Rules
SoPrA contains a number of logical rules that are necessary to correctly depict SPT, that is, fulfill the requirements
extracted from the literature (see Table 1). We view these logical rules in two ways. First, as constrains that limit the
number of possible instantiations of SoPrA to those that correctly depict SPT. Second, as reasoning rules for agents to
make inferences about the SP. We use first-order predicate logic to describe these rules as it is a well-known logic. In
Mercuur et al. (2018) we show that these rules can be translated to description logic such that we can use automatic
reasoners to enforce the aforementioned constrains and inferences.
The activity hierarchy is a directed tree. This implies the activity hierarchy has a unique root. This choice is made such
that the root can be used as a starting point in the decision-making process. A directed tree can be formally defined as a
connected graph where there is one more node then there are edges. Thus, the activity hierarchy H is a directed tree
H =< A, r, I >, where A is the set of instances of the Activity class, with root activity r ∈ A, and where I : A × A
is the set of instances of Implementation associations between activities, I + is its transitive closure, such that
(∀a ∈ A\{r} : (a, r) ∈ I +) ∧ (I = A − 1)
(1)
An activity can have three different types: action, abstract action and a top action. An action is an atomic leaf in the
activity tree, an abstract action is in the middle and a top action is the root node of the tree. These types are defined in
SoPrA to allow the agent to have a starting point (top action) and an ending point in the decision-making (action). We
can formally define these types as follows:
∀x ∈ A(¬∃y ∈ A I(y, x) ↔ Action(x))
∀x ∈ A((r = x) ↔ TopAction(x))
∀x ∈ A(¬(Action(x) ∨ T opAction(x)) ↔ AbstractAction(x))
(2)
(3)
(4)
The implementation association can have the partOf type, which should represent that one activity is composed of
several other activities. In other words, if an activity implements part of another activity, then there should be another
activity that also implements part of this parent activity. We express this formally as,
∀c1, p ∈ A( ImplementsPartOf(c1, p) → (∃c2 ∈ A ImplementsPartOf(c2, p) ∧ c1 (cid:54)= c2))
(5)
The activity hierarchy implies a logical relation between the activity associations.3 For example, if all implementations
of non-car commuting (taking a train, bike or walk) are strongly associated with environmentalism, then non-car
commuting is also strongly associated with environmentalism. In general, the strength with which the values are
associated with a parent activity is the average of the strength with which the values are associated with the children. To
express this formally we need to define two functions. First the function C : A (cid:55)→ An where n ∈ N, that maps a parent
activity p to its set of children C(p)
C(p) = {c ∈ A I(c, p)}.
(6)
We define the RelatedValue association class such that it is a function that maps the set of values V and activities A
to the strength attribute of the RelatedValue association. For all a ∈ A, v ∈ V let r(a, v) : A × V (cid:55)→ R denote
the strength of the relation between value v and activity a. This strength is determined as the average strength of the
relation between the same value and each of the children of the activity. If a is an action, then this strength is specified
in a seperately defined function u. Formally:
(cid:40)(cid:80)
u(a, v)
∀a ∈ A,∀v ∈ V : s(a, v) =
c∈C(a) s(c,v)
C(a)
if C(a) (cid:54)= ∅
otherwise
(7)
where u(a, v) : Action × V (cid:55)→ R is a separately defined function that denotes the strength of the relation between v and
the actions. This function depends on the domain and use case and can for example be based on empirical data.
13
A PREPRINT - NOVEMBER 28, 2018
Figure 7: An instantation of SoPrA in Netlogo for one agent that has one view on commuting. The red arrows represent
activities and the red lines implementation associations. The circle of white tree's and blue flags represent respectively
context elements and values. The remainder of the links represent beliefs, related value, habitual trigger, or adhered
value associations.
Note that the antecedent C(p) (cid:54)= ∅ ensures p has children it can inherit the values from. We do not enforce any logical
rules on the inheritance of the habitual trigger association. Humans can have a habit for a parent activity without having
a habit for its children and vice versa. Even allowing for two conflicting habits can lead to a theoretically sound model
(as shown in (Mercuur et al. 2017)).
Recall that SoPrA enables agents to make inferences about which activities refer to the same bodily movement with
the same association. The same relation represents an equivalence class. This means that the association is reflexive,
symmetric and transitive.
6
Implementation & Verification
6.1
Implementation
We implemented SoPrA in Netlogo (Wilensky 1999) and Prot´eg´e (Musen 2015). The code is available online.4
An implementation of SoPrA in Netlogo allows researchers to infer new knowledge over time. This paper provides
the static groundwork for these simulation. Netlogo has been chosen as our agent-based simulation platform for its
accessibility for researchers interested in modelling social phenomena. The UML classes are implemented as breeds in
Netlogo and associations are links. Links can have variables in Netlogo corresponding to the attributes of association
classes in UML. Netlogo does not have built-in mechanisms to represent an object hierarchy (such as presented in the
UML in Figure 8) or formal rules (such as represent in Section 5.5). However, these relations can be captured in manual
procedures. Figure 7 depicts a visualization of SoPrA in Netlogo. In future work such visualization can be used to
visualize how SPs and links between them evolve over time.
The implementation of SoPrA in Prot´eg´e allows researchers to author formal ontologies and enable formal reasoners
that aid the modeller. First, the formal reasoners can infer new static knowledge. For example, one can use the formal
reasoner to apply formal rule (7) and automatically infer that if riding a bike, taking the train to work and walking
promote environmentalism then non-car commuting also promotes environmentalism. Second, it can check if SoPrA is
satisfiable. For example, if the formal rules of Section 5.5 would be inconsistent Prot´eg´e would detect and report this.
Third, the formal reasoner can check if SoPrA is properly instantiated. For example, if one would assert that an activity
is partly implemented by only one child then Prot´eg´e would report this is inconsistent with rule (5).
Prot´eg´e makes this possible by its use of description logic: a logic that trades its expressivity to acquire decidability
(Horrocks 2007). The UML classes correspond to classes in Prot´eg´e and associations to object properties. In Mercuur
14
A PREPRINT - NOVEMBER 28, 2018
et al. (2018), we show how to capture association classes and the formal rules in Prot´eg´e. Consequently, this shows that
description logic is expressive enough to capture the semantics of SoPrA.
6.2 Verification
Verification is the act of testing whether the computational model does what it is supposed to be doing (Grabner 2018).
This amounts to testing if it adequately implements the underlying conceptual model. In our case, we want test if the
conceptual model in Section 5 is adequately implemented by (1) the formal model in Prot´eg´e and (2) the computational
model in Netlogo.
The two implementations are cross-checked. The conceptual model in Netlogo can be translated to Prot´eg´e models
using the method described in Polhill (2015). A Netlogo model should be satisfiable and properly instantiated in Prot´eg´e.
If the models hold up this means either both models are correct implementations or both models are wrong in exactly
the same way. A positive result thus lower the chance of one of the two implementations being wrong.
In Netlogo we run unit tests. We check if certain properties of the conceptual model that are not directly implemented
still hold. For example, the amount of belief associations should not exceed the amount of agents multiplied by the
amount of activities. A positive result lowers the chance that the implementation has properties that do not represent the
conceptual model.
Prot´eg´e can check if the model is satisfiable and correctly instantiated. Clearly we belief the conceptual model is
satisfiable and correctly instantiated. It thus checks if the implementation has properties we belief the conceptual model
has. A positive results implies a higher chance that the model is correctly implemented or that there is something wrong
with the conceptual model. Prot´eg´e automatically generates explanations for possible inconsistencies that can help to
detect which of the two is the case.
7 Applying SoPrA to our Use Case
This section presents how SoPrA can be used to capture the habitual, social and interconnected aspects of our use case
on CO2-emission due to car commuting. We specify the assignment of SoPrA, which part of the model should be
mapped on which part of the target (Weisberg 2012). The assignment of SoPrA is a necessary step to do validation
(Grabner 2018). Given that this paper focus on the static part, we map states of the model on the target (and not for
example, mechanism). It is always easier to validate aspects of a model that are a direct and explicit representation of
real-world objects (Schulze et al. 2017). This section demonstrates there is a direct and explicit mapping of SoPrA to
the habitual, social and interconnected aspects of the scenario in Section 2.
We capture the scenario in terms of SoPrA in Table 2. We go through the scenario step by step and explain how SoPrA
represents this step in Table 2.
Bob values the environment Line 28 shows that Bob adheres to the value of enviromentalism with a high strength.
Bob has a habit of taking the car to bring the kids to school and go to work Line 25-27 show that there is
HabitualTrigger relation between Kid1 and these activities. Note how SoPrA forces one to specify that it is
specifically the kid that triggers the habit. Furthermore, line 16, 18 and 20 show how Bob personally beliefs in
this view on these activities.
Alice asks Bob if he wants to go by train with her. This is a consequence of the following statements.
Alice beliefs Bob wants to commute Line 13 shows that Alice beliefs that Commuting1 is a view on
commuting that is shared. Line 24 shows that Commuting1 is an activity that is usually triggered at home.
Thus she infers that Bob (who is at home) would like to commute.
Alice beliefs that people that go by car usually value comfort Line 15 and 34 show that Alice beliefs that
Car Commuting1 is usually seen as an implementation of Commuting 1. Line 29 shows that Commuting1
promotes the value of comfort. Alice thus infers that Bob who usually does Car Commuting1 is looking
for an implementation of Commuting1 that promotes comfort.
Alice sees the rain outside and thinks Bob will find riding a bike uncomfortable, but the train comfort-
able Line 31 and 32 show that the views Alice beliefs to be shared on these activities state that the train
promotes comfort more than the bike.
Alice beliefs that normally when others bring the kids to school by car, they will also go to work by car
Line 15, 17, 19, 36 and 37 show that Alice beliefs that Bringing Kids to School1 is sharedly seen as
an implementation of Car Commuting1 and that this activity has another part: Going to Work with
the Car1.
15
A PREPRINT - NOVEMBER 28, 2018
.
Instance 2
Attribute 2
Table 2: A table showing a possible model that describes our use case. Only relevant instances are mentioned (e.g.,
possible RelatedValue and Habitualtrigger that do not play a role in the scenario are omitted.)
Number Class
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
Instance 1
Commuting 1
Activity
Car Commuting 1
Activity
Bring Kids To School With Car 1
Activity
Go to Work with Car 1
Activity
Non-Car Commuting 1
Activity
Go To Work 1
Activity
Go To Work With Train 1
Activity
Go To Work With Bike 1
Activity
Bob
Agent
Alice
Agent
Agent
Kid1
ContextElement Home
Commuting 1
Alice
Belief
Commuting 1
Bob
Belief
Car Commuting 1
Belief
Alice
Car Commuting 1
Bob
Belief
Bring Kids To School With Car 1
Alice
Belief
Bring Kids To School With Car 1
Bob
Belief
Go to Work with Car 1
Alice
Belief
Go to Work with Car 1
Bob
Belief
Non-Car Commuting 1
Belief
Alice
Go to Work 1
Alice
Belief
Go to Work With Train 1
Belief
Alice
Home
HabitualTrigger Commuting 1
HabitualTrigger Car Commuting 1
Kid1
HabitualTrigger Bring Kids To School With Car 1 Kid1
HabitualTrigger Go to Work with Car 1
Kid1
Environment
AdheredValue
Comfort
RelatedValue
Comfort
RelatedValue
Comfort
RelatedValue
Comfort
RelatedValue
RelatedValue
Environment
Commuting 1
Implementation
Implementation Non-Car Commuting 1
Commuting 1
Implementation
Implementation Go to Work with Car 1
Implementation Go To Work 1
Implementation Go To Work With Train 1
Implementation Go To Work With Bike 1
Attribute 1
type: TopAction
type: AbstractAction
type: Action
type: Action
type: AbstractAction
type: AbstractAction
type: Action
type: Action
habitRate: 0.8
habitRate: 0.5
habitRate: 0.8
type: location
personalStrength: 0.1
personalStrength: 1.0
personalStrength: 0.1
personalStrength: 1.0
personalStrength: 0.1
personalStrength: 1.0
personalStrength: 0.1
personalStrength: 1.0
personalStrength: 1.0
personalStrength: 1.0
personalStrength: 1.0
strength: 1.0
strength: 1.0
strength: 1.0
strength: 1.0
strength: 0.8
strength: 0.9
strength: 0.9
strength: 0.7
strength: 0.0
strength: 1.0
type: allOf
type: allOf
type: partOf
type: partOf
type: allOf
type: allOf
type: allOf
Bring Kids To School With Car 1 Car Commuting 1
Car Commuting 1
Non-Car Commuting 1
Go to Work 1
Go to Work 1
sharedstrength: 0.8
sharedStrength: 0.8
sharedstrength: 0.8
sharedStrength: 0.8
sharedstrength: 0.8
sharedStrength: 0.8
sharedstrength: 0.8
sharedStrength: 0.8
sharedStrength: 0.8
sharedStrength: 0.8
sharedStrength: 0.8
Bob
Commuting 1
Car Commuting 1
Go To Work With Train 1
Go To Work With Bike 1
Go To Work With Train 1
Car Commuting 1
However, this situation is different Alice beliefs that the current situation could call for another activity
as there is no need for the activity Bring Kids To School 1. Line 22 shows that Alice beliefs (both
personally and wrt to others) in another implementation of Commuting 1. Namely, one with only one
part named Going To Work 1 (i.e., there is no bringing the kids to school). As Going To Work 1 is an
implementation of Non-Car Commuting1, she asks Bob to reconsider his travel mode.
Bob agrees to go by train, because it promotes environmentalism and he does not have a habit in this situation
There are no context-elements that could trigger Car-Commuting 1 over Non-Car Commuting 1 (or vice
versa). Line 33 shows that Go To Work with Train 1 promotes environmentalism.
8 Conclusion
This paper presented the SoPrA model that enables the use of Social Practice Theory for agent based simulations. SPT
provided new insights in sociology, but to show that SPT can provide potential explanations through simulation we
need a computational model that is validated. This paper provides the groundwork with a computational model that is a
correct depiction of SPT, computational feasible and can be directly mapped to the habitual, social and interconnected
aspects of a target scenario.
Section 3 extracted requirements from the literature that summarize the core aspects of SPT. We made the choice to
focus on habits, social intelligence and interconnected actions and therefore dropping elements such as competences
and affordances that were not directly instrumental to these core aspects. To correctly model these core aspects we used
supporting literature from social psychology, neuroscience and agent theory. Section 5 presented an UML model (added
with formal rules) that fulfills these requirements. We made the choice to model the temporal relations between action as
16
A PREPRINT - NOVEMBER 28, 2018
the parthood association such that we can model sequential activities, but not overlapping activities. Section 6 presented
publicly available implementations in Netlogo and Prot´eg´e that can be cross-checked to verify a proper implementation
of the UML. Section 7 showed how one can model a scenario regarding the social practice of commuting. The section
demonstrated how one maps the model on a system and how SoPrA can capture statements that combine habits,
social intelligence and interconnected element. For example, it can capture how Alice understands that Bob makes an
exception to join her in the train commute, because he doesn't have to bring the school. We thus showed how SoPrA is a
correct depiction of SPT through extracting and fulfilling requirements, the computational feasibility through presenting
a model in UML and making a verified implementation in Netlogo and Prot´eg´e and a clear mapping from target to
phenomena through a use case of commuting.
The next step is to extend the model with dynamic mechanisms that can generate output from input and validate
this extended model against empirical data. By validating the model one can show that SoPrA can provide potential
explanations and increase our understanding of social phenomena. Future work aims to explore possibilities to use
SoPrA outside agent-based simulations to guide human-agent interaction in socially aptitude and effecient way and to
create transparant and explainable AI.
17
9 Appendix A: A Complete Overview of SoPrA in UML
A PREPRINT - NOVEMBER 28, 2018
Figure 8: A Complete Overview of SoPrA in UML.
18
A PREPRINT - NOVEMBER 28, 2018
Notes
1There is debate about the exact relation between habitual and intentional actions. Gardner et al. (2011) shows in a
meta-analysis that in 8 out of 21 studies habits moderate the intention-action relation.
2Note that other authors use the term ontology to refer to any kind of relation between two objects. Temporal
relations are thus a subset of ontological relations. However, Okeyo et al. (2014) uses the term ontological to refer to
inferences one can easily make in description logic, whereas he uses the term temporal to refer to relations he can make
in Allan's temporal logic.
3The inheritance of activity associations implies that there are multiple versions of an activity based on their place
in the activity tree. For example, bringing kids to school as part of non-car commuting is different then bringing kids to
school as part of car commuting; the first one promotes environmentalism, the last one does not.
4For a Netlogo implementation for our trafic choice use case, see: https://github.com/rmercuur/SoPraTraffic-Netlogo.
For the Prot´eg´e implementation, see: https://github.com/PCSan/SOPRA.
References
Bilsky, W., Janik, M. & Schwartz, S. H. (2011). The Structural Organization of Human Values-Evidence from
Three Rounds of the European Social Survey (ESS). Journal of Cross-Cultural Psychology, 42(5), 759 -- 776. doi:
10.1177/0022022110362757
URL http://dx.doi.org/10.1177/0022022110362757
Bourdieu, P. (1977). Outline of a theory of practice, vol. 16. Cambridge University Press
URL papers://cfc50b6a-2d9e-4feb-87e5-d6012043bd5a/Paper/p2118
Cass, N. & Faulconbridge, J. (2016). Commuting practices: New insights into modal shift from theories of social
practice. Transport Policy, 45, 1 -- 14. doi:10.1016/j.tranpol.2015.08.002
URL http://dx.doi.org/10.1016/j.tranpol.2015.08.002
Castelfranchi, C. (1997). Modeling social action for AI agents. IJCAI International Joint Conference on Artificial
Intelligence, 2(c), 1567 -- 1576. doi:10.1016/S0004-3702(98)00056-3
URL http://dx.doi.org/10.1016/S0004-3702(98)00056-3
Chen, L., Nugent, C. D. & Wang, H. (2012). A Knowledge-Driven Approach to Activity Recognition in Smart Homes.
IEEE Transactions on Knowledge and Data Engineering, 24(6), 961 -- 974. doi:10.1109/TKDE.2011.51
URL http://dx.doi.org/10.1109/TKDE.2011.51
Davidov, E., Schmidt, P. & Schwartz, S. H. (2008). Bringing values back in: The adequacy of the European social
survey to measure values in 20 countries. Public Opinion Quarterly, 72(3), 420 -- 445. doi:10.1093/poq/nfn035
URL http://dx.doi.org/10.1093/poq/nfn035
Dechesne, F., Di Tosto, G., Dignum, V. & Dignum, F. (2012). No Smoking Here: Values, Norms and Culture in
Multi-Agent Systems. Artificial Intelligence and Law, 21(1), 79 -- 107. doi:10.1007/s10506-012-9128-5
URL http://dx.doi.org/10.1007/s10506-012-9128-5
Digmun, V. (2004). A model for organizational interaction: based on agents, founded in logic. SIKS
Dignum, F. (1999). Autonomous agents with norms. Artificial Intelligence and Law, 7(1), 69 -- 79. doi:10.1023/A:
1008315530323
URL http://dx.doi.org/10.1023/A:1008315530323
Dignum, F., Morley, D., Sonenberg, E. A. & Cavedon, L. (2000). Towards socially sophisticated BDI agents.
Proceedings - 4th International Conference on MultiAgent Systems, ICMAS 2000, (pp. 111 -- 118). doi:10.1109/
ICMAS.2000.858442
URL http://dx.doi.org/10.1109/ICMAS.2000.858442
Dignum, F., Prada, R. & Hofstede, G. (2014). From Autistic to Social Agents. In Proceedings of the 2014 international
conference on Autonomous Agents and Multi-Agent Systems, (pp. 1161 -- 1164)
URL http://dl.acm.org/citation.cfm?id=2617431
19
A PREPRINT - NOVEMBER 28, 2018
Dignum, V. & Dignum, F. (2015). Contextualized Planning Using Social Practices. In A. Ghose, N. Oren, P. Telang &
J. Thangarajah (Eds.), Coordination, Organizations, Institutions, and Norms in Agent Systems, (pp. 36 -- 52). Cham:
Springer International Publishing
Felli, P., Miller, T., Muise, C., Pearce, A. R. & Sonenberg, L. (2014). Artificial social reasoning: Computational
mechanisms for reasoning about others. Lecture Notes in Computer Science (including subseries Lecture Notes in
Artificial Intelligence and Lecture Notes in Bioinformatics), 8755, 146 -- 155. doi:10.1007/978-3-319-11973-1{\ }15
URL http://dx.doi.org/10.1007/978-3-319-11973-1{ }15
Fontaine, J. R. J., Poortinga, Y. H., Delbeke, L. & Schwartz, S. H. (2008). Structural Equivalence of the Values Domain
Across Cultures: Distinguishing Sampling Fluctuations From Meaningful Variation. Journal of Cross-Cultural
Psychology, 39(October), 345 -- 365. doi:10.1177/0022022108318112
URL http://dx.doi.org/10.1177/0022022108318112
Gardner, B., De Bruijn, G. J. & Lally, P. (2011). A systematic review and meta-analysis of applications of the self-
report habit index to nutrition and physical activity behaviours. Annals of Behavioral Medicine, 42(2), 174 -- 187.
doi:10.1007/s12160-011-9282-0
URL http://dx.doi.org/10.1007/s12160-011-9282-0
Giddens, A. (1984). The constitution of society: Outline of the theory of structuration. Cognitive Therapy and Research,
12(4), 448. doi:10.1007/BF01173303
URL http://dx.doi.org/10.1007/BF01173303
Goleman, D. (2011). Social Intelligence. Random House
Grabner, C. (2018). How to Relate Models to Reality? An Epistemo- logical Framework for the Validation and Veri-
fication of Computational Models. Journal of Artificial Societies and Social Simulation, 21(3)
URL http://jasss.soc.surrey.ac.uk///////.html
Hoffmann, C., Abraham, C., White, M. P., Ball, S. & Skippon, S. M. (2017). What cognitive mechanisms predict travel
mode choice? A systematic review with meta-analysis. Transport Reviews, 0(0), 1 -- 22. doi:10.1080/01441647.2017.
1285819
URL http://dx.doi.org/10.1080/01441647.2017.1285819
Hofstede, G. J. (2017). GRASP agents: social first, intelligent later. AI and Society, 0(0), 1 -- 9. doi:10.1007/
s00146-017-0783-7
URL http://dx.doi.org/10.1007/s00146-017-0783-7
Holtz, G. (2014). Generating Social Practices. Journal of Artificial Societies and Social Simulation, 17(1), 17
Horrocks, I. (2007). Description Logic : A Formal Foundation for Ontology Languages and Tools
Jager, W., Janssen, M. A., De Vries, H. J. M., De Greef, J. & Vlek, C. A. J. (2000). Behaviour in commons dilemmas:
Homo economicus and Homo psychologicus in an ecological-economic model. Ecological Economics, 35(3),
357 -- 379. doi:10.1016/S0921-8009(00)00220-2
URL http://dx.doi.org/10.1016/S0921-8009(00)00220-2
Jonker, C. M. & Treur, J. (1999). Formal Analysis of Models for the Dynamics of Trust based on Experiences. In
European Workshop on Modelling Autonomous Agents in a Multi-Agent World, vol. 1647, (pp. 221 -- 231). Berlin:
Springer. doi:10.1007/3-540-48437-X
URL http://dx.doi.org/10.1007/3-540-48437-X
Kumar, S., Huber, M. J., Cohen, P. R. & McGee, D. R. (2002). Toward a formalism for conversation protocols using
joint intention theory. Computational Intelligence, 18(2), 174 -- 228. doi:10.1111/1467-8640.00187
URL http://dx.doi.org/10.1111/1467-8640.00187
Kurz, T. & Gardner, B. (2015). Habitual behaviors or patterns of practice? Explaining and changing repetitive
climate-relevant actions. Wiley Interdisciplinary Reviews: Climate Change, 6(1), 113 -- 128. doi:10.1002/wcc.327
URL http://dx.doi.org/10.1002/wcc.327
Lally, P., Van Jaarsveld, C. H. M., Potts, H. W. W. & Wardle, J. (2010). How are habits formed: Modelling habit
formation in the real world. European Journal of Social Psychology, 40(6), 998 -- 1009. doi:10.1002/ejsp.674
URL http://dx.doi.org/10.1002/ejsp.674
20
A PREPRINT - NOVEMBER 28, 2018
Latour, B. (1996). On actor-network theory: A few clarifications. doi:10.2307/40878163
URL http://dx.doi.org/10.2307/40878163
Mercuur, R. (2015). Interventions on Contextualized Decision Making : an Agent-Based Simulation Study. Ph.D. thesis,
Utrecht University
URL https://dspace.library.uu.nl/handle/1874/323482
Mercuur, R., Dignum, V. & Jonker, C. (2017). Modeling Social Preferences with Values. In The Proceedings of the 3nd
International Workshop on Smart Simulation and Modelling for Complex Systems @ IJCAI, (pp. 17 -- 28)
Mercuur, R., Larsen, J. B. & Dignum, V. (2018). Modelling the Social Practices of an Emergency Room to Ensure Staff
and Patient Wellbeing. In 30th Benelux Conference on Artificial Intelligence, (p. (in press)). Den Bosch
Metzinger, T. & Gallese, V. (2003). The emergence of a shared action ontology: Building blocks for a theory.
Consciousness and Cognition, 12(4), 549 -- 571. doi:10.1016/S1053-8100(03)00072-2
URL http://dx.doi.org/10.1016/S1053-8100(03)00072-2
Moors, A. & De Houwer, J. (2006). Automaticity: a theoretical and conceptual analysis. Psychological bulletin, 132(2),
297 -- 326. doi:10.1037/0033-2909.132.2.297
URL http://dx.doi.org/10.1037/0033-2909.132.2.297
Musen, M. A. (2015). The prot´eg´e project: a look back and a look forward. {AI} Matters, 1(4), 4 -- 12. doi:
10.1145/2757001.2757003
URL http://dx.doi.org/10.1145/2757001.2757003
Narasimhan, K., Roberts, T., Xenitidou, M. & Gilbert, N. (2017). Using ABM to Clarify and Refine Social Practice
Theory. In W. Jager (Ed.), Advances in Social Simulation 2015, vol. 528. Springer International Publishing AG 2017.
doi:10.1007/978-3-319-47253-9
URL http://dx.doi.org/10.1007/978-3-319-47253-9
Okeyo, G., Chen, L. & Wang, H. (2014). Combining ontological and temporal formalisms for composite activity
modelling and recognition in smart homes. Future Generation Computer Systems, 39, 29 -- 43. doi:10.1016/j.future.
2014.02.014
URL http://dx.doi.org/10.1016/j.future.2014.02.014
Polhill, J. G. (2015). Extracting OWL Ontologies from Agent-Based Models: A Netlogo Extension. Journal of Artificial
Societies and Social Simulation, 18(2), 15. doi:10.18564/jasss.2810
URL http://dx.doi.org/10.18564/jasss.2810
Reckwitz, A. (2002). Toward a theory of social practices: A development in culturalist theorizing. European Journal of
Social Theory, 5(2), 243 -- 263. doi:10.1177/13684310222225432
URL http://dx.doi.org/10.1177/13684310222225432
Schatzki, T. R. (1996). Social Practices. A Wittgensteinian approach to human activity and the social. Cambridge
University Press
Schulze, J., Muller, B., Groeneveld, J. & Grimm, V. (2017). Agent-based modelling of social-ecological systems:
Achievements, challenges, and a way forward. Jasss, 20(2). doi:10.18564/jasss.3423
URL http://dx.doi.org/10.18564/jasss.3423
Schwartz, S. H. (2012). An Overview of the Schwartz Theory of Basic Values. Online Readings in Psychology and
Culture, 2, 1 -- 20. doi:http://dx.doi.org/http://dx.doi.org/10.9707/2307-0919.1116
URL http://dx.doi.org/http://dx.doi.org/http://dx.doi.org/10.9707/2307-0919.1116
Schwartz, S. H., Cieciuch, J., Vecchione, M., Davidov, E., Fischer, R., Beierlein, C., Ramos, A., Verkasalo, M.,
Lonnqvist, J.-E., Demirutku, K., Dirilen-Gumus, O. & Konty, M. (2012). Refining the theory of basic individual
values. Journal of Personality and Social Psychology, 103(4), 663 -- 688. doi:10.1037/a0029393
URL http://dx.doi.org/10.1037/a0029393
Searle, J. (1995). The Construction of Social Reality
Shove, E., Pantzar, M. & Watson, M. (2012). The Dynamics of Social Practice: Everyday Life and How it Changes.
London: SAGE Publications. doi:10.4135/9781446250655.n1
URL http://dx.doi.org/10.4135/9781446250655.n1
21
A PREPRINT - NOVEMBER 28, 2018
Storf, H., Becker, M. & Riedl, M. (2009). Rule-based activity recognition framework: Challenges, technique and
learning. Proceedings of the 3d International ICST Conference on Pervasive Computing Technologies for Healthcare.
doi:10.4108/ICST.PERVASIVEHEALTH2009.6108
URL http://dx.doi.org/10.4108/ICST.PERVASIVEHEALTH2009.6108
Taylor, C. (1973). Interpretation and the Sciences of Man. In Explorations in Phenomenology, vol. 25, (pp. 47 -- 101).
Philosophy Education Society Inc. doi:10.1007/978-94-010-1999-6{\ }3
URL http://dx.doi.org/10.1007/978-94-010-1999-6{ }3
Thorndike, E. (1920). Intelligence and its uses. Harper's Magazine, 140, 227 -- 235
van Kasteren, T., Noulas, A., Englebienne, G. & Krose, B. (2008). Accurate activity recognition in a home setting.
Proceedings of the 10th international conference on Ubiquitous computing - UbiComp '08, (p. 1). doi:10.1145/
1409635.1409637
URL http://dx.doi.org/10.1145/1409635.1409637
Verplanken, B. (2005). Habits and implementation intentions. In The ABC of behavioural change., (pp. 99 -- 109).
Oxford, UK: Elsevier
URL http://opus.bath.ac.uk/9438/
Verplanken, B. & Orbell, S. (2003). Reflections on Past Behavior: A Self-Report Index of Habit Strength. Journal of
Applied Social Psychology, 33(6), 1313 -- 1330. doi:10.1111/j.1559-1816.2003.tb01951.x
URL http://dx.doi.org/10.1111/j.1559-1816.2003.tb01951.x
Weide, T. v. d. (2011). Arguing to motivate decisions. SIKS Dissertation Series
URL http://www.narcis.nl/publication/Language/EN/id/170/RecordID/oai:dspace.library.uu.
nl:1874/210788
Weisberg, M. (2012). Simulation and similarity: Using models to understand the world. Oxford University Press
Wilensky, U. (1999). Netlogo itself
URL http://ccl.northwestern.edu/netlogo/
Wood, W. & Neal, D. T. (2007). A new look at habits and the habit-goal interface. Psychological review, 114(4),
843 -- 863. doi:10.1037/0033-295X.114.4.843
URL http://dx.doi.org/10.1037/0033-295X.114.4.843
Woodruff, G. (1978). Premack and Woodruff : Chimpanzee theory of mind. Behavioral and Brain Sciences, (1978),
515 -- 526
22
|
1210.4383 | 1 | 1210 | 2012-10-16T12:26:33 | Distributed Formation of Balanced and Bistochastic Weighted Diagraphs in Multi-Agent Systems | [
"cs.MA"
] | Consensus strategies find a variety of applications in distributed coordination and decision making in multi-agent systems. In particular, average consensus plays a key role in a number of applications and is closely associated with two classes of digraphs, weight-balanced (for continuous-time systems) and bistochastic (for discrete-time systems). A weighted digraph is called balanced if, for each node, the sum of the weights of the edges outgoing from that node is equal to the sum of the weights of the edges incoming to that node. In addition, a weight-balanced digraph is bistochastic if all weights are nonnegative and, for each node, the sum of weights of edges incoming to that node and the sum of the weights of edges out-going from that node is unity; this implies that the corresponding weight matrix is column and row stochastic (i.e., doubly stochastic). We propose two distributed algorithms: one solves the weight-balance problem and the other solves the bistochastic matrix formation problem for a distributed system whose components (nodes) can exchange information via interconnection links (edges) that form an arbitrary, possibly directed, strongly connected communication topology (digraph). Both distributed algorithms achieve their goals asymptotically and operate iteratively by having each node adapt the (nonnegative) weights on its outgoing edges based on the weights of its incoming links (i.e., based on purely local information). We also provide examples to illustrate the operation, performance, and potential advantages of the proposed algorithms. | cs.MA | cs | Distributed Formation of Balanced and Bistochastic
Weighted Diagraphs in Multi-Agent Systems
Themistoklis Charalambous and Christoforos N. Hadjicostis
2
1
0
2
t
c
O
6
1
]
A
M
.
s
c
[
1
v
3
8
3
4
.
0
1
2
1
:
v
i
X
r
a
Abstract
Consensus strategies find a variety of applications in distributed coordination and decision making
in multi-agent systems. In particular, average consensus plays a key role in a number of applications
and is closely associated with two classes of digraphs, weight-balanced (for continuous-time systems)
and bistochastic (for discrete-time systems). A weighted digraph is called balanced if, for each node
vj, the sum of the weights of the edges outgoing from that node is equal to the sum of the weights of
the edges incoming to that node. In addition, a weight-balanced digraph is bistochastic if all weights
are nonnegative and, for each node vj, the sum of weights of edges incoming to that node and the sum
of the weights of edges out-going from that node is unity; this implies that the corresponding weight
matrix is column and row stochastic (i.e., doubly stochastic). We propose two distributed algorithms:
one solves the weight-balance problem and the other solves the bistochastic matrix formation problem
for a distributed system whose components (nodes) can exchange information via interconnection links
(edges) that form an arbitrary, possibly directed, strongly connected communication topology (digraph).
Both distributed algorithms achieve their goals asymptotically and operate iteratively by having each
node adapt the (nonnegative) weights on its outgoing edges based on the weights of its incoming
links (i.e., based on purely local information). We also provide examples to illustrate the operation,
performance, and potential advantages of the proposed algorithms.
I. INTRODUCTION
A distributed system or network consists of a set of subsystems (nodes) that can share
information via connection links (edges), forming a directed communication topology (digraph).
Themistoklis Charalambous is with the School of Electrical Engineering, Royal Institute of Technology (KTH), Stockholm,
Sweden. E-mail: [email protected].
Christoforos N. Hadjicostis is with the Department of Electrical and Computer Engineering at the University of Cyprus,
Nicosia, Cyprus. E-mail: [email protected].
The successful operation of a distributed system depends on the structure of the digraph which
typically proves to be of vital importance for our ability to apply distributed strategies and
perform various tasks. Cooperative distributed control algorithms and protocols have received
tremendous attention during the last decade by several diverse research communities (e.g., biol-
ogy, physics, control, communication, and computer science), resulting in many recent advances
in consensus-based approaches (see, for example, [1] -- [8] and references therein).
In general, the objective of a consensus problem is to have the agents belonging to a group
agree upon a certain (a priori unknown) quantity of interest. When the agents reach agreement,
we say that the distributed system reaches consensus. Such tasks include network coordination
problems involving self-organization, formation patterns, parallel processing and distributed
optimization. One of the most well known consensus problems is the so-called average consensus
problem in which agents aim to reach the average of their initial values. The initial value
associated with each agent might be, for instance, a sensor measurement of some signal [9],
Bayesian belief of a decision to be taken [10], or the capacity of distributed energy resources for
the provisioning of ancillary services [11]. Average consensus is closely related to two classes of
graphs: weight-balanced (for continuous-time systems) and bistochastic graphs (for discrete-time
systems). A weighted graph is balanced if for each node, the sum of the weights of the edges
outgoing from that node is equal to the sum of weights of the edges incoming to that node. A
bistochastic graph is a weight-balanced graph for which the weights are nonnegative and the
sum of the weights for both outgoing and incoming edges (including self weights at each node)
is equal to one. In both cases, all edge weights are typically required to be nonzero.
It is shown in [2] that average consensus is achieved if the information exchange topology is
both strongly connected and balanced, while gossip algorithms [12], [13] and convex optimization
[14] admit update matrices which need to be doubly stochastic. These methods have applicability
to a variety of topics, such as multi-agent systems, cooperative control, and modeling the
behaviour of various phenomena in biology and physics, such as flocking. Since their operation
requires weight-balanced and bistochastic digraphs, it is important to be able to distributively
transform a weighted digraph to a weight-balanced or bistochastic one, provided that each node
is allowed to adjust the weight of its outgoing links accordingly.
In this paper, we address the problem of designing discrete-time coordination algorithms
that allow a networked system to distributively obtain a set of weights that make it weight-
balanced or bistochastic. This task is relatively straightforward when the underlying communi-
cation topology forms an undirected graph (i.e., when communication links are bi-directional)
but more challenging when dealing with a digraph (i.e., when some communication links might
be uni-directional). The paper proposes two algorithms that can be used in distributed networks
with directed interconnection topologies; the first algorithm leads to a weight-balanced digraph.
Even though there exist some earlier approaches in the literature for weight balancing (e.g., [15]
presents a finite-time algorithm but does not characterize the number of steps required in the worst
case, whereas [16] presents an asymptotic algorithm whose rate is bounded explicitly based on
the structure of the graph), this is the first time, to the best of our knowledge, that an asymptotic
algorithm of this nature is shown to admit geometric convergence rate. Work in the literature
appears for bistochastic matrix formation as well (e.g., [17] proposes an asymptotic algorithm
with an unspecified rate of convergence). Our second proposed algorithm, a modification of the
weight-balancing algorithm, leads to a bistochastic digraph with asymptotic convergence. Under
some minor assumptions, this second algorithm can also be shown to admit a geometric rate.
The remainder of the paper is organised as follows. In Section II, we provide necessary notation
and background on graph properties. In Section III, the problem to be solved is formulated,
and Sections IV and V present our main results in which we propose two algorithms, one for
weight-balancing and one for bistochastic matrix formation. Then, in Section VI, the derived
algorithms are demonstrated via illustrative examples and their performance is compared against
existing approaches in the literature. Finally, Section VII presents concluding remarks and future
directions.
II. NOTATION AND PRELIMINARIES
The sets of real, integer and natural numbers are denoted by R, Z and N, respectively; their
positive orthant is denoted by the subscript + (e.g. R+). The symbol N0 denotes the set of non-
negative integers. Vectors are denoted by small letters whereas matrices are denoted by capital
letters; A−1 denotes the inverse of matrix A. By I we denote the identity matrix (of appropriate
dimensions), whereas by 1 we denote a column vector (of appropriate dimension) whose elements
are all equal to one. A matrix whose elements are nonnegative, called nonnegative matrix, is
denoted by A ≥ 0 and a matrix whose elements are positive, called positive matrix, is denoted
by A > 0. σ(A) denotes the spectrum of matrix A, λ(A) denotes an element of the spectrum of
matrix A, and ρ(A) denotes its spectral radius. Notation diag(xi) is used to denote the matrix
with elements in the finite set {x1, x2, ..., xi, ...} on the leading diagonal and zeros elsewhere.
Let the exchange of information between nodes be modeled by a weighted digraph (directed
graph) G(V,E, W ) of order n (n ≥ 2), where V = {v1, v2, . . . , vn} is the set of nodes, E ⊆
V × V − {(vj, vj) vj ∈ V} is the set of edges, and W = [wji] ∈ Rn×n
is a weighted n × n
adjacency matrix where wji are nonnegative elements. A directed edge from node vi to node vj
is denoted by εji = (vj, vi) ∈ E, which represents a directed information exchange link from
node vi to node vj, i.e., it denotes that node vj can receive information from node vi. Note
that the definition of G excludes self-edges (though self-weights are added when we consider
bistochastic digraphs). A directed edge εji ∈ E if and only if wji > 0. The graph is undirected if
and only if εji ∈ E implies εij ∈ E. Note that a digraph G(V,E) can be thought of as a weighted
digraph G(V,E, W ) by defining the weighted adjacency matrix W with wji = 1 if εji ∈ E, and
wji = 0 otherwise.
+
A digraph is called strongly connected if for each pair of vertices vj, vi ∈ V, vj
(cid:54)= vi,
there exists a directed path from vj to vi, i.e., we can find a sequence of vertices vj ≡ vl0,
vl1, ..., vlt ≡ vi such that (vlτ +1, vlτ ) ∈ E for τ = 0, 1, ..., t − 1. All nodes that can transmit
information to node vj directly are said to be in-neighbors of node vj and belong to the set
j = {vi ∈ V εji ∈ E}. The cardinality of N −
N −
j , is called the in-degree of j and it is denoted
by D−
j . The nodes that receive information from node j comprise its out-neighbors and are
denoted by N +
j , is called the out-degree of vj and
it is denoted by D+
j . Given a weighted digraph G(V,E, W ) of order n, the total in-weight of
node vj is denoted as S−
wji, whereas the total out-weight of
wlj.
node vj is denoted by S+
j = {vl ∈ V εlj ∈ E}. The cardinality of N +
j and is defined by S−
j and is defined as S+
j =(cid:80)
j =(cid:80)
Definition 1: A weighted digraph G(V,E, W ) is called weight-balanced if the total in-weight
equals the total out-weight for every node vj ∈ V , i.e., S−
j . A weight-balanced digraph
is also called doubly stochastic (bistochastic) if each of its weighted adjacency matrix rows and
columns sums to 1.
j = S+
j
vi∈N −
vl∈N +
j
For the discrete-time setup we investigate, we conveniently define the time coordinate so that
j [k] will denote the value of the
unity is the time between consecutive iterations. For example S+
out-weight of node vj at time instant k, k ∈ N0.
III. PROBLEM FORMULATION
Given a digraph G(V,E), we want distributed algorithms that allow the nodes to obtain a
weight matrix W = [wji such that the following are achieved.
(i) The weighted digraph becomes balanced in a distributed fashion; i.e., a weight matrix
W is found such that wji > 0 for each edge (vj, vi) ∈ E, wji = 0 if (vj, vi) /∈ E, and
j = S−
S+
for every vj ∈ V .
j
(ii) The weighted digraph becomes bistochastic in a distributed fashion; i.e., a weight matrix
W is found with nonnegative diagonal elements wjj ≥ 0, such that wji > 0 if (vj, vi) ∈ E,
wji = 0 if (vj, vi) /∈ E, vj (cid:54)= vi), and wjj + S+
j = 1 for every vj ∈ V .
j = wjj + S−
IV. DISTRIBUTED ALGORITHM FOR WEIGHT-BALANCING
A. Description of the algorithm
Balancing a weighted digraph can be accomplished via a variety of algorithms. We introduce
and analyse a distributed cooperative algorithm that exhibits asymptotic convergence and outper-
forms existing algorithms suggested in the literature [18]. The algorithm achieves weight-balance
as long as the underlying digraph is strongly connected (or is a collection of strongly connected
digraphs, a necessary and sufficient condition for balancing to be possible [19]). The rate of
convergence of the algorithm is geometric and depends exclusively on the structure of the given
diagraph and some constant parameters chosen by the nodes.
Algorithm 1 is an iterative algorithm in which the nodes distributively adjust the weights of
their outgoing links such that the digraph becomes asymptotically weight-balanced. We assume
that each node observes but cannot set the weights of its incoming links. Given a strongly
connected digraph G(V,E), the distributed algorithm has each node initialize the weights of all
of its outgoing links to unity, i.e., wlj[0] = 1, ∀vl ∈ N +
j . Then, it enters an iterative stage where
each node performs the following steps:
1) It computes its weight imbalance defined by
xj[k] (cid:44) S−
j [k] − S+
j [k].
(1)
2) If it is positive (resp. negative), all the weights of its outgoing links are increased (resp.
decreased) by an equal amount and proportionally to xj[k].
We discuss why the above distributed algorithm asymptotically leads to weights that balance the
graph (and also characterize its rate of convergence) after we describe the algorithm in more
detail. For simplicity, we assume that during the execution of the distributed algorithm, the nodes
update the weights on their outgoing links in a synchronous1 fashion. Also note that 2) above
implies that wlj for vl ∈ N +
j will always have the same value.
Algorithm 1 Weight balancing algorithm
Input: A strongly connected digraph G(V,E) with n = V nodes and m = E edges (and no
self-loops).
Initialization: Each node vj ∈ V
1) Sets wlj[0] = 1, ∀vl ∈ N +
j .
2) Chooses βj ∈ (0, 1).
Iteration: For k = 0, 1, 2, . . ., each node vj ∈ V updates the weights of each of its outgoing
links wlj, ∀vl ∈ N +
j , as
(cid:32)
wlj[k + 1] = wlj[k] + βj
.
(2)
(cid:33)
S−
j [k]
D+
j
− wlj[k]
The intuition behind the proposed algorithm is that we compare S−
j [k] > S−
j wij[k].
j [k]), then the algorithm reduces (resp. increases) the weights
j [k] (resp. S+
j [k] < S−
j [k] with S+
j [k] = D+
If S+
on the outgoing links.
Proposition 1: If a digraph is strongly connected or is a collection of strongly connected
digraphs, Algorithm 1 reaches a steady state weight matrix W ∗ that forms a weight-balanced
digraph, with geometric convergence rate equal to
where
R∞(P ) = − ln δ(P ),
δ(P ) (cid:44) max{λ : λ ∈ σ(P )), λ (cid:54)= 1}.
Proof: First, we observe from equation (2) that all the outgoing links have the same weight,
(because they are equal at initialization and they are updated in the
i.e., wl(cid:48)j = wlj, ∀vl(cid:48), vl ∈ N +
j
1Even though we do not discuss this issue in the paper, asynchronous operation is not a problem.
same fashion). Hence, from hereafter, we will denote the weight on any outgoing link of node
vj as wj. In order to study the system with update formula (2) for each node in the graph, we
define w = (w1 w2
j ), and thus we can write the evolution
of the weights in matrix form as follows.
. . . wn)T with wj = wlj (vl ∈ N +
where w0 = 1 and
Pji (cid:44)
if i = j,
if vi ∈ N −
j .
w[k + 1] = P w[k], w[0] = w0
1 − βj,
βj/D+
j ,
(3)
(4)
It should be clear from the above update equation that the weights remain nonnegative during
the execution of the algorithm.
Matrix P can be written as P = I−B +BD−1A, where I is the identity matrix, B = diag(βj),
j ) and A is the adjacency matrix with aji = 1 if εji ∈ E, and aji = 0 otherwise.
D = diag(D+
Since σ(D−1A) = σ(AD−1), then ρ(D−1A) = ρ(AD−1). In addition, ρ(AD−1) = 1 because
matrix AD−1 is column stochastic. As a result, ρ(D−1A) = 1. Also, note that ¯P (cid:44) I − B +
AD−1B is column stochastic and therefore ρ( ¯P ) = 1. Furthermore,
ρ( ¯P ) = ρ( ¯P B−1DD−1B) = ρ(D−1B ¯P B−1D)
= ρ(D−1B(I − B + AD−1B)B−1D)
= ρ(I − B + BD−1A) = ρ(P ) = 1.
Since P is a nonnegative matrix, we can ask whether P is primitive,2 i.e., whether P m > 0
for some m ≥ 1. Since the digraph is strongly connected for 0 < βj < 1, ∀vj ∈ V and all the
main diagonal entries are positive, we easily conclude that m ≤ n − 1 [20, Lemma 8.5.5] and
P is primitive. Hence, there is no other eigenvalue with modulus equal to the spectral radius.
A sufficient condition for primitivity is that a nonnegative irreducible matrix A has at least one
positive diagonal element [21, Example 8.3.3], which means that some βj can also be set at
unity (as long as at least one is strictly smaller than unity). Hence, iteration (3) has a geometric
convergence rate R∞(P ) = − ln δ(P ), where δ(P ) (cid:44) max{λ : λ ∈ σ(P )), λ (cid:54)= 1}. In other
2A nonnegative matrix is said to be primitive if it is irreducible and has only one eigenvalue of maximum modulus [20].
words, δ(P ) is the second largest of the moduli of the eigenvalues of P (see also [1], [2], [4]).
Remark 1: If we change the coordinates of w[k] by introducing z[k] = B−1Dw[k], then
equation (3) becomes z[k + 1] = B−1DP D−1Bz[k] = ¯P z[k], which has total mass (1T z[k]) that
remains invariant throughout the iteration (and equal to 1T z[0] = 1T B−1D1).
B. Illustrative Example
In this illustrative example (borrowed from [19]), we demonstrate the validity of the proposed
algorithm in the network depicted in Figure 1. In our plots we are typically concerned with the
j=1 xj[k], where xj[k] is given in (1). If weight balance
absolute balance defined as ε[k] =(cid:80)n
is achieved, then ε[k] = 0 and xj[k] = 0, ∀vj ∈ V.
Fig. 1. A simple digraph which is weight-balanceable, but not bistochasticable due to the absence of self-loops. This example
is given in [19] in order to indicate that not all strongly connected digraphs are bistochasticable.
Figure 2 shows the absolute balance of Algorithm 1 when βj = 0.1, 0.5 and 0.9 for all vj ∈ V
as it evolves during the execution of the algorithm. These plots agree with the claims in Proposi-
ion 1 and validate that the algorithm convergences to a weight-balanced digraph with geometric
convergence rate. In this particular example, with the choice of βj = 0.1, 0.5 and 0.9, the rate
discussed in the proof of Proposition 1 is given by R∞(cid:0)P (βj)(cid:1) = 0.1204, 0.5180 and 0.2524,
respectively. The rates of convergence are also illustrated in Figure 3, where the convergence
rate of Algorithm 1 as obtained in Proposition 1 and the actual convergence rate of the algorithm
characterized by matrix (4). The theoretical and actual convergence rates coincide.
v1v2v3v4Fig. 2. Absolute balance for weight-balancing algorithm (Algorithm 1) for the digraph depicted in Figure 1.
Fig. 3. Comparison of the theoretical rate of convergence as obtained in Proposition 1 and the actual convergence rate of the
weight-balancing algorithm (Algorithm 1) for the digraph depicted in Figure 1, for βj = 0.1, 0.5 and 0.9. The dashed lines
show the theoretical convergence rate, while the solid lines show the actual convergence rate of the algorithm.
The final weight-balanced digraph W (cid:63) is the same for all three cases mentioned above (because
0102030405000.10.20.30.40.5Weight−balancing with Algorithm 1 for different values of βjNumber of iterationsAbsolute balance βj=0.1 for all vjβj=0.5 for all vjβj=0.9 for all vj0102030405010−1510−1010−5100Rate of convergence of Algorithm 1 for different values of βjNumber of iterationsAbsolute balance Algorithm 1, βj=0.1Theoretical, βj=0.1Algorithm 1, βj=0.5Theoretical, βj=0.5Algorithm 1, βj=0.9Theoretical, βj=0.9all the βj are identical -- but equal to a different constant each time) and is given by
0
0
0
1.4286
W (cid:63) =
.
0
0
0
0.7143 0.7143
0
0
1.4286
0
0
0
0.7143
Remark 2: If βj = 1, ∀vj ∈ V, then the weighted adjacency matrix P is not necessarily
primitive and hence the algorithm does not converge to weights that form a weight-balanced
digraph. We can see this in the counterexample depicted in Figure 4. We run Algorithm 1 for
Fig. 4. A simple digraph which is weight-balanceable, but the adjacency matrix is not primitive.
three different cases: (a) βj = 1, ∀vj ∈ V, (b) βj = 0.9, ∀vj ∈ V and (c) β1 = 0.9 and βj = 1,
∀vj ∈ V − {v1}. It can be seen from Figure 5 that for the first case the matrix is not primitive
and it does not converge, whereas for the other two cases it asymptotically converges (because
as long as one of the nodes has βj < 1, then the update matrix is primitive and the algorithm
forms a weight-balanced digraph).
V. DISTRIBUTED ALGORITHM FOR BISTOCHASTIC MATRIX FORMATION
A. Description of the algorithm
An algorithm is proposed, herein called Algorithm 2, with which a bistochastic adjacency
matrix is formed in a distributed fashion. One extra requirement for Algorithm 2, however, is
to maintain column stochasticity of the weighted adjacency matrix W [k] for all times k, so
v1v2v3v4Fig. 5. A simple digraph which is weight-balanceable, but when βj = 1, ∀vj ∈ V, the weighted adjacency matrix is not
primitive and hence the algorithm does not converge to weights that form a weight-balanced digraph.
that it can be used for consensus problems simultaneously from the beginning without the need
to form the bistochastic matrix before running an algorithm. More specifically, we obtain a
sequence of column stochastic matrices W [0], W [1], W [2], . . . , W [k] such that limk→∞ W [k] =
W is bistochastic and thus the iteration x[k + 1] = W [k]x[k + 1], x[0] = x0, reaches average
consensus asymptotically [17].
Digraphs that are weight-balanceable do not necessarily admit a doubly stochastic assignment
[19, Theorem 4.1]. However, if self-weights are added then any strongly connected graph is
bistochasticable after adding enough self-loops [19, Corollary 4.2]. Algorithm 2 overcomes this
problem with the introduction of nonzero self weights wjj at each node vj ∈ V, and their
appropriate adjustment in a distributed manner. Algorithm 2 is described in detail below.
Proposition 2: If a digraph is strongly connected or is a collection of strongly connected
digraphs, then Algorithm 2 reaches a steady state weight matrix W ∗ that forms a bistochastic
digraph. Furthermore, the weights of all edges in the graph are nonzero.
Proof: As before, all the outgoing links have the same weight, i.e., wl(cid:48)j = wlj, ∀vl(cid:48)i, vl ∈
j , can be written in matrix form as
N +
j . Thus, the evolution of the weight wj (cid:44) wlj, ∀vl ∈ N +
follows.
w[k + 1] = P [k]w[k], w[0] = w0
(8)
0102030405000.20.40.60.81Weight−balancing problem − counterexampleNumber of iterationsAbsolute balance Algorithm 1 for βj=0.9 for all vjAlgorithm 1 for β1=0.9 and βj=1 for all vj≠ v1Algorithm 1 for βj=1 for all vjAlgorithm 2 Bistochastic matrix formation algorithm
Input: A strongly connected digraph G(V,E) with n = V nodes and E edges (and no self-
loops).
Initialization: Set wlj[0] = 1/(1 + D+
Iterations: For k = 0, 1, 2, . . ., each node vj ∈ V updates the weights wlj, vl ∈ N +
performing the following steps:
1) It chooses βj[k] as follows:
j ), ∀vl ∈ N +
j ∪ {j}.
j , by
βj[k] =
where αj ∈ (0, 1).
2) It updates
αj
αj,
1−S+
j [k]
S−
j [k]−S+
j [k]
, S−
j [k] > S+
j [k],
otherwise,
(cid:32)
(cid:33)
,
S−
j [k]
D+
j
− wlj[k]
(5)
(6)
(7)
(9)
wlj[k + 1] = wlj[k] + βj[k]
j . [This is the same update as Algorithm 1, with the difference that
for all vl ∈ N +
the
proportionality constant βj can be adapted at each time step k, and is chosen so that
j [k + 1] ≤ 1 (so as to ensure that wjj can be chosen in Step 3 to be nonnegative and satisfy
S+
wjj + S+
3) Then, wjj ≥ 0 is assigned so that
stochasticity; i.e.,
the weighted adjacency matrix retains its column
j [k + 1] = 1).]
wjj[k + 1] = 1 − (cid:88)
wij[k + 1], ∀vj ∈ V.
where
i∈N +
j
1 − βj[k]
βj[k]/D+
j
Pji[k] (cid:44)
if i = j,
if i ∈ N −
j .
In order to make sure that the sum of each column can be made one by choosing a nonnegative
self-weight wjj, we need to establish (for all k) that S+
j , for
all vl ∈ N +
j . In our updates, there are two cases: (a) S−
j [k];
j [k + 1] ≤ 1 or wlj[k + 1] ≤ 1/D+
j [k] ≤ S+
j [k] > S+
j [k], and (b) S−
j [k], then βj[k] can be chosen to be any value αj, αj ∈ (0, 1). Then, the
j [k] ≤ S+
we analyze both cases below.
(a) When S−
algorithm is equivalent to Algorithm 1 and admits geometric convergence rates.
(b) When S−
j [k + 1] > 1 or wlj[k + 1] > 1/D+
S+
(5). In this case, for any initial S+
j [k], then wlj[k + 1], ∀vl ∈ N +
for any vl ∈ N +
j [0] for which S−
j [k] > S+
j
j , are increased. In order to avoid having
j , we choose βj[k] as shown in equation
j [k], from (6) we obtain that
j [k] > S+
j [k] + αj(1 − S+
j [k])
S+
j [k + 1] = S+
= (1 − αj)S+
j [k] + αj.
Hence, it is guaranteed that S+
shown by perfect induction that after n steps (for which S−
r ∈ Z+, r ≤ n) we have
j [k + 1] < 1, and as a result, βj[k] (cid:54)= 0 for all k. It can be easily
j [k + r] holds for all
j [k + r] > S+
j [k + n] = 1 − (1 − αj)n(1 − S+
S+
j [k]),
that approaches 1 as n → ∞. Note that someone can choose αj ∈ (0, 1) closer to 1 and guarantee
that βj[k] > , > 0, for all the iterations k.
Unlike the case of Algorithm 1, in Algorithm 2 we have a discrete-time switching dynam-
ical system whose stability condition and convergence rate are not as easily characterized. As
indicated by the various simulations we have tried (as well as the special case identified by
the remark below), it is very likely that the rate of convergence of Algorithm 2 is geometric,
however, this has not been formally established thus far.
Proposition 3: If a digraph is strongly connected or is a collection of strongly connected
j , m ≥ V, reaches
digraphs, then Algorithm 2 with initial condition wLj[0] =
a steady state weight matrix W ∗ that forms a bistochastic digraph, with geometric convergence
rate equal to R∞(P ) = − ln δ(P ), where
, ∀vL ∈ N +
m(1+D+
j )
1
if i = j,
if i ∈ N −
j .
Furthermore, the weights of all edges in the graph are nonzero.
Pji[k] (cid:44)
αj/D+
j
1 − αj
Proof: If it is possible for each node to know the number of nodes in the graph, or at least
j , where m ≥ V. Hence,
for all vL ∈ N +
1
an upper bound, then we can set wLj[0] =
we establish that S−
j [0] < 1 and S+
m(1+D+
j )
j [0] < 1 for all vj ∈ V. By equation (6) we have that
j [k + 1] = (1 − βj[k])S+
S+
j [k] + βj[k]S−
j [k]
j [k] < 1 and that βj[k] = αj, for all k. The self-weights are chosen so
which guarantees that S+
that we make each column sum up to one (and consequently the row sums, once the algorithm
converges). Therefore, with these initial conditions we can choose βj[k] to be constant (and
equal to αj ∈ (0, 1)) throughout the execution of the algorithm, and hence, admit geometric
convergence rate (because we are essentially back to Algorithm 1 with the only difference that
we also calculate the value of the self-weight (equal to 1 − D+
j wj[k]) each time). Therefore,
Algorithm 2 has a geometric convergence rate R∞(P ) = − ln δ(P ), as in Algorithm 1.
Remark 3: As before, if we change the coordinates of w[k] by introducing z[k] = B−1Dw[k],
then equation (8) becomes z[k + 1] = B−1DP [k]BD−1z[k] = ¯P [k]z[k], which has total mass
(1T z[k]) that remains invariant.
B. Illustrative Example
We consider a random strongly connected graph consisting of 50 nodes. The quantity of
interest in this case is the absolute balance of the graph at time step k; the absolute balance
Ab[k] is defined as
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)1 − (cid:88)
vi∈N −
j
(cid:88)
vj∈V
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) .
Ab[k] =
wji[k]
Since the weight matrix at each time step is column stochastic by construction, Ab[k] effectively
measures the distance of the weight matrix at time step k from a bistochastic matrix. As it can
be seen from Figure 6, the algorithm asymptotically converges to a bistochastic adjacency matrix
for different values of αj (in the simulations αj is chosen to be 0.9, 0.5 and 0.1).
A. Weight-Balanced Matrix Formation
VI. COMPARISONS
Here we run the algorithm for larger graphs (of size n = 50) and we compare the performance
of our algorithm against the imbalance-correcting algorithm in [15] in which every node vj adds
all of its weight imbalance xj to the outgoing node with the lowest weight w.
Fig. 6. Absolute balance for bistochastic formation algorithm (Algorithm 2) for different values of αj ∀vj ∈ V. It can be
observed that Algorithm 2 converges to a bistochastic adjacency matrix asymptotically.
The suggested weight-balancing algorithm (Algorithm 1) shows geometric convergence and
outperforms the algorithm suggested in [15], as shown in Figure 7.
B. Bistochastic Matrix Formation
Here we run the algorithm for larger graphs (of size n = 50) and we compare the performance
of our algorithm against a distributed algorithm suggested in [17] in which every node vj ∈ V
first chooses a particular weight wjj[k] ∈ (0, 1) for its self weight and it sets the weights of its
outgoing links to be wlj[k] = clj(1 − wjj[k]), where clj > 0, ∀vl ∈ N +
j , and(cid:80)
clj = 1.
vl∈N +
j
The suggested bistochastic formation algorithm (Algorithm 2) shows asymptotic convergence
and slightly outperforms the algorithm suggested in [17] for αj = 0.95, ∀vj ∈ V, as shown in
Figure 8.
VII. CONCLUSIONS AND FUTURE DIRECTIONS
In this paper we have developed two iterative algorithms: one for balancing a weighted
digraph and one for forming a bistochastic adjacency matrix in a digraph. Both algorithms
are distributed and the second one is a direct extension of the first one. The weight-balancing
algorithm is asymptotic and is shown to admit geometric convergence rate. The second algorithm,
010203040506070809010000.020.040.060.080.10.120.14Bistochastic matrix formation for a random graph of 50 nodes for various values of αjNumber of iterationsAbsolute balance αj=0.9 for all vjαj=0.5 for all vjαj=0.1 for all vjTop figure: Absolute balance plotted against the number of iterations for a random graph of 50 nodes for the distributed
Fig. 7.
weight-balancing (Algorithm 1) algorithm, the imbalance-correcting algorithm [15], and the weight-balancing algorithm proposed
in [16]. Bottom figure: Average balance plotted against the number of iterations for a 1000 random graphs of 50 nodes for the
distributed weight-balancing (Algorithm 1), the imbalance-correcting algorithm [15], and the weight-balancing algorithm proposed
in [16].
a modification of the weight-balancing algorithm, leads to a bistochastic digraph with asymptotic
convergence admitting geometric convergence rate for a certain set of initial values. The two
algorithms perform very well compared to existing algorithms, as illustrated in the examples.
Future work includes the analysis of the behavior of the suggested algorithms in the presence
of delays and changing topology.
0102030405060708090100050100150200250Average error vs Iteration for a random graph of 50 nodesNumber of iterationsAverage error Algorithm 1Imbalance−correcting algorithm in [14]Weight−balancing algorithm in [15]0102030405060708090100050100150200Average error vs Iteration for a 1000 graphs of 50 nodesNumber of iterationsAverage error Algorithm 1Imbalance−correcting algorithm in [14]Weight−balancing algorithm in [15]Fig. 8. Top figure: Absolute balance for bistochastic formation algorithms (Algorithm 2) and a distributed algorithm suggested in
[17] for a random strongly connected graph consisting of 50 nodes. Bottom figure: Average balance plotted against the number
of iterations for a 100 random strongly connected graphs of 50 nodes for the distributed bistochastic formation algorithms
(Algorithm 2) and a distributed algorithm suggested in [17].
REFERENCES
[1] A. Jadbabaie, J. Lin, and A. Morse, "Coordination of groups of mobile autonomous agents using nearest neighbor rules,"
IEEE Transactions on Automatic Control, vol. 48, no. 6, pp. 988 -- 1001, June 2003.
[2] R. Olfati-Saber and R. Murray, "Consensus problems in networks of agents with switching topology and time-delays,"
IEEE Transactions on Automatic Control, vol. 49, no. 9, pp. 1520 -- 1533, September 2004.
[3] W. Ren and R. Beard, "Consensus seeking in multiagent systems under dynamically changing interaction topologies,"
IEEE Transactions on Automatic Control, vol. 50, no. 5, pp. 655 -- 661, 2005.
[4] L. Moreau, "Stability of multiagent systems with time-dependent communication links," IEEE Transactions on Automatic
Control, vol. 50, no. 2, pp. 169 -- 182, February 2005.
010203040506070809010000.050.10.150.20.25Average error vs Iteration for a random graph of 50 nodesNumber of iterationsAverage error Algorithm 2 with αj=0.95Algorithm suggested in [16]010203040506070809010000.050.10.150.20.25Average error vs Iteration for a 1000 graphs of 50 nodesNumber of iterationsAverage error Algorithm 2 with αj=0.95Algorithm suggested in [16][5] D. Angeli and P. Bliman, "Stability of leaderless discrete-time multi-agent systems," Mathematics of Control, Signals, and
Systems, vol. 18, no. 4, pp. 293 -- 322, 2006.
[6] F. Xiao and L. Wang, "State consensus for multi-agent systems with switching topologies and time-varying delays,"
International Journal of Control, vol. 79, no. 10, pp. 1277 -- 1284, 2006.
[7] R. Olfati-Saber, J. Fax, and R. Murray, "Consensus and cooperation in networked multi-agent systems," Proceedings of
the IEEE, vol. 95, no. 1, pp. 215 -- 233, January 2007.
[8] D. Varagnolo, G. Pillonetto, and L. Schenato, "Distributed parametric and nonparametric regression with on-line
performance bounds computation," Automatica, vol. 48, no. 10, pp. 2468 -- 2481, October 2012.
[9] M. Rabbat and R. Nowak, "Distributed optimization in sensor networks," in Third International Symposium on Information
Processing in Sensor Networks (IPSN), April 2004, pp. 20 -- 27.
[10] K. Greene, J. Kniss, G. Luger, and C. Stern, "Satisficing the masses: Applying game theory to large-scale, democratic
decision problems," in International Conference on Computational Science and Engineering (CSE), vol. 4, August 2009,
pp. 1156 -- 1162.
[11] C. N. Hadjicostis and T. Charalambous, "Asynchronous coordination of distributed energy resources for the provisioning
of ancillary services," in 47th Annual Allerton Conference on Communication, Control, and Computing, September 2011,
pp. 1500 -- 1507.
[12] S. Boyd, A. Ghosh, B. Prabhakar, and D. Shah, "Gossip algorithms: design, analysis and applications," in 24th Annual
Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), vol. 3, March 2005, pp. 1653 -- 1664.
[13] A. Nedic, A. Olshevsky, A. Ozdaglar, and J. Tsitsiklis, "On distributed averaging algorithms and quantization effects,"
IEEE Transactions on Automatic Control, vol. 54, no. 11, pp. 2506 -- 2517, November 2009.
[14] B. Johansson, M. Rabi, and M. Johansson, "A randomized incremental subgradient method for distributed optimization in
networked systems," SIAM J. on Optimization, vol. 20, no. 3, pp. 1157 -- 1170, August 2009.
[15] B. Gharesifard and J. Cort´es, "Distributed strategies for making a digraph weight-balanced," in 47th Annual Allerton
Conference on Communication, Control, and Computing, September 2009, pp. 771 -- 777.
[16] C. Hadjicostis and A. Rikos, "Distributed strategies for balancing a weighted digraph," in 20th Mediterranean Conference
on Control Automation (MED), July 2012, pp. 1141 -- 1146.
[17] A. Dominguez-Garcia and C. N. Hadjicostis, "Distributed matrix scaling and application to average consensus in directed
graphs," IEEE Transactions on Automatic Control, 2012 (to appear).
[18] J. Cort´es, "Distributed algorithms for reaching consensus on general functions," Automatica, vol. 44, no. 3, pp. 726 -- 737,
March 2008.
[19] B. Gharesifard and J. Cort´es, "When does a digraph admit a doubly stochastic adjacency matrix?" in American Control
Conference (ACC), July 2010, pp. 2440 -- 2445.
[20] R. A. Horn and C. R. Johnson, Matrix Analysis. Cambridge, CB2 2RU, UK: Cambridge University Press, 1985.
[21] C. D. Meyer, Matrix Analysis and Applied Linear Algebra. SIAM, 2000.
|
cs/0211029 | 1 | 0211 | 2002-11-22T12:10:55 | Modelling intracellular signalling networks using behaviour-based systems and the blackboard architecture | [
"cs.MA",
"q-bio.CB"
] | This paper proposes to model the intracellular signalling networks using a fusion of behaviour-based systems and the blackboard architecture. In virtue of this fusion, the model developed by us, which has been named Cellulat, allows to take account two essential aspects of the intracellular signalling networks: (1) the cognitive capabilities of certain types of networks' components and (2) the high level of spatial organization of these networks. A simple example of modelling of Ca2+ signalling pathways using Cellulat is presented here. An intracellular signalling virtual laboratory is being developed from Cellulat. | cs.MA | cs | Mode l l ing in trace llu lar s igna l ling network s u sing
behav iour-based systems and the b lackboard arch itecture
PEDRO PABLO GONZÁLEZ PÉREZ
CARLOS GERSHENSON
MAURA CÁRDENAS GARC ÍA
JAIME LAGUNEZ OTERO
Instituto de Química
Universidad Nacional Autónoma de México
Ciudad Universitaria, 04510, MÉX ICO, D.F.
[email protected] http://132.248.11.4
Abstract: This paper proposes to model the intracellular signalling networks using a fusion of behaviou r-bas ed sys tems
and the blackboard architecture. In virtue of this fusion, the model developed by us, which has been named Cellulat,
allows to take account two essential aspects of the intracellular signalling networks: (1) the cognitive capabilities of
certain types of networks’ components and (2) the high level of spatial organization of these networks. A simple
example of modelling of Ca2 + signalling pathways using Cellulat is presented here. An intracellular signalling virtual
laboratory is being developed from Cellulat.
Key-Words: behaviour-based systems, autonomous agents, blackboard architecture, intracellular signalling networks.
1 Introduction
Each cell in a multicellular organism receives specific
combinations of chemical signals generated by other
cells or by themselves. The final effect of the signals
received by a cell can be translated in the regulation of
the cell metabolism, in the alteration or maintenance of
its differentiation state, in the beginning of cellular
division and in its death. Once the extracellular signals
bind to the receptors, different process of signalling are
activated, which generate complex networks of
intra cellu lar signalling.
The more experimental data about cellular
functioning we have, the more useful the computational
models are to understand these signalling processes. The
computational models allow the visualization of the
components that integrate the network, in addition to
being able to predict or to suggest the effect of
disturbances caused on determined component or
sections of the s ignall ing pathway. A great variety of
information process ing computa tional models have been
inspired by the functioning of biological systems.
Examples of these are the artificial neural networks,
genetic algorithms and cellular automata. On the other
hand, several information p roces sing syst ems have
constituted different useful approaches to model the
functioning of diverse biological systems [16].
Within computer sciences, the artificial intelligence
area has constituted one of the main scenarios to model
biological systems. This fact responds to the great
variety of models, techniques and methods that support
this research area, many of which are inherited of
disciplines such as psychology, cognitive sciences and
neuroscience. Between the main techniques of artificial
intelligence and computer sciences commonly used to
model cellular signalling networks are artificial neural
networks [1 and 18], boolean networks [4 ], petri nets
[7], rule-based systems [3], cellular automata [4], and
multi-agent systems [5, 17 and 19].
The high complexity level of the intracellular
communication networks causes them to be difficult to
model when is considered some of these techniques
isolated. Nevertheless, when integrating the most
relevant and necessary elements of these techniques in
a singl e computa tional system, then it should be possible
to obtain a model much more robust of the intracellular
signalling pathway, and therefore, a better visualization,
understanding and prediction of the processes and
components that integrate the networks.
The theory of behaviour-based systems must
constitute a good approach to the intracellular signalling
networks. However, a powerful intracellular signalling
model should be achieved when the communication
between agents takes place through a shared data
structure, in which other cellular structures and elements
related with signalling pathways can be explicitly
represented. In this sense, the blackboard architecture
[15] results widely appropriate.
In this paper, we postulate that an effective and
robust model of intracellular signalling can be obtained
when the main structural and functional characteristics
of behaviour-based systems and
the blackboard
architecture are joined. That is, a cell can be seen as a
society of autonomous agents, where each agent
communicates with the others through the creation or
modification of signals on a shared data structure, named
“blackboard” . The au tonomous agen ts model
determinated functional components of the intracellular
signalling pathways, such as signalling proteins,
enzymes and other mechanisms. The blackboard levels
represent different cellular structures committed with the
signalling pathway, whereas the different objects created
on the blackboard represent secondary messengers,
activation or inhibition signals or others elements
belonging to intracellular medium.
In this way, when the autonomous agents are used in
an
intracellu lar signalling model,
the cogni tive
capabilities of certain components of the signalling
pathway can be taken in count; whereas the use of
blackboard architecture allows to capture the high level
of spatial organization exhibited by the intracellular
signalling networks.
This paper is structured as follows: the next section
presents an overview of the information processes of
signalling intr acel lular ne tworks. In sect ion 3 some
questions about behaviour-based systems are discussed.
Section 4 describes the basic components of blackboard
architecture and their functioning. In section 5 the
intracellular signalling model proposed by us is
presented and discussed. In section 6 an example of
modelling the Ca2 + signalling pathway using the
proposed model is shown. Some comments about current
and future work and conclusions are made in section 7.
2 An overview of signalling intracellular
networks
Each cell receives a great number of chemical signals
generated by other cells or by themselves. These
r e g u l at e
t h e i r m e t a b o l i sm, d e t e rm i n e
t h e ir
differentiation, and indicate when to divide or to start a
death process. In general the external signals are
transmitted to the interior of the cells through membrane
receptors activating diverse transduction pathways,
which can follow a same way and to generate a final
answer or to branch themselves to give rise to others.
For example activation of most membrane-associated
hormone receptors generates a diffusible intracellular
signal called a second messenger. Many different
receptors gener ate the same second messenger . Some
intracellular messengers are: cAMP (cyclic AMP),
cGMP (cycl ic GMP), I3P (Inositol triphosphate), DG
(diacylglycerol) and Ca 2 + (calcium).
The second messenger activation triggers multiple
signal transduction pathways like: the adenilate cyclase,
the hosphoinositide-calcium, the Mitogen activated
protein kinase
the
the JAK/STAT ,
(MAPK),
sphingomyelin-ceramide, and the ionic channel function
receptors pathways.
In particular i f we take the Ca2 + signall ing pathway,
the pathway looks like an interconnected netwo rk,
because the answer is to different stimuli, but the
different pathways cross and gener ate al terna tive
trajectories not easily visualized. The field of signal
transduction has centred on the discovery of increasing
crosstalk among signal ling pathways. Indeed, our
understanding of
the
topology of signalling
is
continuously evolving. Early work in the signalling field
featured the discovery of branched linear pathways,
which, resembled trees with a cell surface receptor at the
root.
3 Behav iour-based sys tems
The theory of behaviour-based systems [2 ] provides a
new philosophy for the construction of autonomous
agents, inspired by ethology. The goal of behaviour-
based systems (BBS)
is
to provide control
to
autonomous agents. An autonomous agent interacts
directly with its problem domain, it perceives its
environment through its sensors and acts on it through
its actuators. The autonomous agent environment is
commonly a dynamic, complex and unpredictable
environment, in which the autonomous agent tries to
satisfy a set of goals or motivations, varying in time. An
autonomous agent decides by itself how to relate its
external and internal inputs with its motor actions, in
such way that its goals can be satisfied [13]. Adaptation
is one of the desirable characteristics in autonomous
agents. An autonomous agent is adaptive if it has
abilities that allow him to improve its performance in
time.
A cell can be seen as an adaptive autonomous agent
or as a society of adaptive autonomous agents, where
each agent could exhibit a particular behaviour
depending on his cognitive capabilities. As an
autonomous agent, the cell perceives its external
environment through its surface receptors and acts on
this one by means of the generation of new signals,
which will be able to affect the behaviour of other cells.
The cell's external environment is also dynamic and
complex, in which an extensive range of signals and
combinations of these can exist. Furthermore, like in an
autonomous agent, the cell by itself decides how to
(signalling
received external signals
relate
the
in terna l
its
molecules)
to
s ignals
(secondary
messengers), so
that
their goals (differentiation,
proliferation, survival, among others) can be satisfied.
Final ly, the cell is able also to adapt to its environment.
That is, the cell is const antly adapti ng its behaviour to
the changes that take place in the environment and to the
signals perceived.
4 Blackboard architecture
The blackboard architecture concept was conceived by
artificial intelligence researchers in the 1970’s. The goal
of this research was to handle the problem of shared
information between multiple expert agents in problem
solving. The architecture was developed for the first
time in the syst em for language understanding, Hearsay
II [15]. La ter it has been used in a great variety of
problem domains and abstracted in many environments
for the construction of systems [10 and 14].
Blackboard architecture is defined in terms of three
basic components: (1) a set of independent modules,
named knowledge sources, which contain specific
knowledge about a problem domain, (2) a shared data
structure, named blackboard,
through which
the
knowledge sources communicate to each other, and (3)
a control mechanism, which determines the order in
which the knowledge sources will operate on the
blackboard. Figure 1 shows the blackboard architecture
component s and the rela tionships among them.
Fig. 1. Components of the Blackboard Architecture
The knowledge sources are modular software
subsystems that represent different points of view,
different strategies and different knowledge types, about
how to solve a problem or pa rt of a problem.
The blackboard is used as a central storage for all
shared information. The information on a blackboard
represents facts and deduct ions done by the knowledge
sources during the problem solving. The knowledge
sources produce changes on a blackboard, which
inc rementally lead to the formation of a solution or
acceptable set of solutions for the problem to be solved.
Because
the
knowledge
sources
respond
opportunistically to changes on the blackboard, a
mechanism is necessary that controls these changes and
decides, at every moment, which actions should be
taken. The control mechanism handles the interaction
between the blackboard, the knowledge sources and the
outsourcing such as users and control or data acquisition
subsystems.
5 Cellulat: an intracellular signalling
network model
Our proposal consists in modelling the cell as an
autonomous agent , which in turn is composed by a
society of autonomous agents, which communicates
through blackboard with others. That is, in the proposed
model the knowledge sources of the blackboard
architecture are considered as autonomous agents too.
The model proposed here constitutes a refinement and
adaptation of an action selection mechanism structured
on a blackboard architecture previously developed by us
named Internal Behaviou rs Network (IBeNet) [8, 9, 11
and 12]. Although the IBeNet was initially built to action
selection in autonomous agents (physical robots,
animats, or artificial creatures simulated on a computer),
it constitutes a working environment for the bottom-up
modelling of
information proces s ing sy s tems
characterized by: (1) coordination and opportunistic
integration of several tasks in real time, (2) use of
several abstraction or context levels for the different
types of information that participate in the processing
network, (3) decision making, (4) action selection and
(5) adaptation.
Although,
intracellular signalling model
the
proposed can be seen as the assignation of a new
semantic to the componen ts of the IBeNet, we assume
here that this fact is equivalent to the assignation of this
same semantic to the components of the blackboard
architecture, when the two following considerations are
done: (1) knowledge sources are seen as either internal
autonomous agents or interface autonomous agents and
(2) the blackboard architecture control is distributed now
between these two types of autonomous agents. The term
“internal autonomous agents” has been used to identify
to the autonomous agents which tasks are related with
the creation or modification of signals on
the
blackboard. An internal autonomous agent gets a signal
or combination or signals from a determinated
blackboard level and transduces these in other signal on
the same or other blackboard level. The way in which a
signal is transduced depends of the cognitive capabilities
of the internal autonomous agent On the other hand, the
function of an interface autonomous agent is to establish
the communica tion be tween the blackboard and the
external medium (they are similar to sensors or actuators
in BBS). Not all external signals or combinations of
these are recognized by an interface autonomous agent,
this
recognition depends both of
the signal
characteristics and the cognitive capabilities of the
interface autonomous agent.
In Figure 2 the architecture of intracellular signalling
model can be appreciated. This is a translation of
blackboard architecture shown in Figure 1 taking
account the considerations (1) and (2). In thi s way, it is
not necessary to explain the structural and functional
details of IBeNet here to understand the intracellular
signalling model proposed. It is only necessary to bear in
mind the blackboard architecture functioning explained
in section 3 and the new considerations mentioned
above. The in trace llula r signal ling model has been
named Cellulat (a kind of animat which behaves as a
cell).
Fig. 2. Architecture of the Cellulat
Three main components define the Ce llulat structure:
the blackboard, the internal autonomous agents and
interface autonomous agents.
The blackboard represents the cell’s internal
medium. The blackboard levels correspond to different
cellular structures through which occur the signal
transduction. In this way, the cellular membrane, the
citosol and the nucleus could be represented as different
blackboard levels. The solution elements recorded on the
blackboard represent two main types of intracellular
s igna ls :
second ary messen ge r molecules and
activation/inactivation signals. Both types of signals are
synthesized or created by internal autonomous agents
and these, either directly or indirectly, promote the
activation/inactivation of other internal autonomous
agents. Other types of cellular elements or structures can
be represented on the blackboard too.
The internal autonomous agents model components
of the intracellular signalling network such as proteins,
enzymes and other mechanisms necessary to carry out
the signal transduct ion. On the other hand, the interface
autonomous agents model the cell surface receptors and
the mechanisms for
the secretion of signalling
molecules. Each agent, independently of his type, has a
condition part and an action part; the way in which both
parts are linked depends on the complexity of the
intracellular component modeled by agent. For that
reason, agents who model complex components could
use more advanced techniques, such as neural networks,
genetic algorithms, or any combination of other
techniques, to link both parts. Agents which model less
complex components could use more sophisticated but
useful techniques, such as production rules, boolean
networks or others. The work of both types of agents is
event-directed. This
intracellular signal
is, each
registered on the blackboard or each extracellular signal
perceived constitutes an event, which could activate or
inactivate one or more autonomous agents. When an
internal autonomous agent is activated then this one
executes his action, which consists in the synthesis or
modification of a signal on the blackboard.
5.1 Cognitive capabilities of Cellulat’s agents
It is known that certain types of proteins exhibit several
cognit ive capabilities such as pattern recognition,
memory and handling fuzzy data [5] . The evolution,
learning and emergence of properties have also been
suggested in proteins networks [18]. In Cellulat, both
types of autonomous agents exh ibit several cognitive
capabilities including patter recognition, handling
uncertainty and fuzzy data, adaptive action selection,
memory and learning; which allow to the autonomous
agents to exhibit an adaptive behaviour. These cognitive
capabilities are supported by several artificial
intelligence paradigms
including
the
following
approaches:
reasoning, probab i l is t ic
rule-based
reasoning, artificial neural networks, genetic algorithms,
boolean networks, and fuzzy logic systems.
types of signals by the proteins, enzymes and others
mechanisms that operate on it. Examples of these signals
are the followings: PI-biphosphate, inositol triphosphate,
dyaclyglycerol, Ca2 + , and others signals indicating the
activation state of the proteins and enzymes. In this
representation, the blackboard levels have not been
identified.
5.2 Modelling spatial organization in Cellulat
Another important aspect to consider in the modelling of
intracellular signall ing networks
their spatial
is
organization. Experimental data recently obtained
suggest clearly that many intracellular signalling
networks exhibi t a high level of spatial organization.
Intracellular signalling models developed recently
approach to this question [6]. Cellulat allows to model
the
spatia l o rgan iza t ion
tak ing account
two
organizational criteria of the blackboard architecture.
One is the horizontal organization, given by the different
abstraction levels of the blackboard, which allow an
intralevel signal processing . The other is the vertical
organization, given by columns that cross vertically
different blackboard levels. These columns arise as
result of the adjoining work of several internal
autonomous agents that operate at a same section of
blackboard, which cover different blackboard levels. We
have named
these columns “agency columns”.
Convergence and divergence of agency columns could
occur, and these processes could be related with
evolution and learning of the signalling network [11] . In
this way, the model proposed allows to model
intracellular signalling pathways taking account their
spatial organization. That is, the two information
processing levels present in Cellulat (horizontal and
vertical) allow to estab lish a “topology preserving map”.
6 Modelling the Ca2+ signalling pathway
using Cellulat: A first approach
Figure 3 illustrates a first approach of the intracellular
signalling pathway modelling using Cellulat. Ins this
case, we have modelled the Ca2 + signalling pathway to
a still heavy resolution level. This is, this first model not
yet reveals struc tural detai ls of th e signal ling network
components.
As can be appreciated in Figure 3, the interface
autonomous agents model the G-protein-linked surface
receptors, whereas the internal autonomous agents
model components of the signalling network such as G
protein, phospholipase C-beta, prote in kinase C,
mechanism to release calcium, and others proteins and
enzymes. On the blackboard can be created different
Fig. 3. Cell ula t mod el o f the Ca2+ signal lin g pat hway.
In the model shown in Figure 3 it is necessary to
consider the following viewpoint: Since an internal or
interface autonomous agent can be structured by other
autonomous agents, then an internal autonomous agent
representing to a protein kinase C (or to others proteins
or enzymes) could encapsulate many proteins kinase C,
where each one of these is an internal autonomous agent
too. In this way, components of a same type could
j o i n t l y b e e n c a p s u l a t e d , w h i c h s im p l i f i e s
comprehension.
7 Conclusions
In this paper we have discussed why the fusion of the
behaviour-based systems theory and the blackboard
architecture constitutes a very suitable approach for the
modelling of cellular signalling networks, from a model
developed by us which has been named Cellulat. As a
result of this fusion, Cellulat allows to model two basic
aspects of the cellular signalling networks: (1) the
cognitive capabilities of certain types of proteins and
enzymes, and (2) the high level of spatial organization fo
the signalling networks. (1) was obtained when
considering
the adaptive autonomous agents as
functional components of the model, and using different
techniques of artificial intelligence to support the
cognit ive capabilities mentioned in Section 5.1; whereas
(2) was provided by the shared data structure, named
blackboard, which allows to model horizontal, vertical
and spa tial informat ion pro cessing.
A simple example of modelling of Ca2 + signalling
pathways using Cellulat was shown. Although still much
work to develop is left, as it is the case of the modelling
of the signalling network components at a fine resolution
level, we believe the proposed model constitutes a new
and useful approach for the modelling and understanding
of intracellular signalling networks.
Presently, Cellulat is being used in the modelling of
the signal transduction related with cellular senescence.
Our future work is directed towards the creation of a
cellular signall ing virtual laboratory, from the developed
computational model. This virtual laboratory must allow
to effect lesions on certain components or sections of the
signalling pathways, and to visualise the obtained
cellular behaviour as consequences of such lesions;
helping to understand how the different cellular
signalling pathways interact.
References:
[1] Bray, D. and Lay, S., Computer simulated evolution
of a network of cell signall ing molecules.
Biophysical Journal, Vol. 66, No. 4, 1994, pp.
972-977.
[2] Brooks, R. A., A robust layered control system for
a mobile robot, IEEE Journal of Robotics and
Automation, RA-2, 1986, April, pp. 14-23.
[3]Cárdenas, M., Búsqueda de blancos terapéuticos
empleando un modelo de señales intracelulares
mediadas por Ras, Tesis Doctoral, UNAM, México,
2000.
[4] Edwards, C.F., Computational models for cellular
information processing systems, unpublished
undergraduate thesis, University of Liverpool, 1995.
[5] Fisher, M.J., Paton, R.C. and Matsuno, K.,
Intracellular signalling proteins as 'smart' agents in
parallel distributed processes, BioSystems , 50, 1999,
pp 159-171.
[6] Fisher, M.J., Malcom, G. and Paton, R.C., Spatio-
logical processes
in
in trace llula r signal ling,
BioSystems , 55, 2000, pp 83-92.
[7] Fuss, H., Simulation of Biological Systems with
Petri Nets - Introduction to Modelling of Distributed
Systems. In Advances in System Analysis, Moller D.
(ed.), Braunschweig, Wiesbaden: Vieweg, 1-
12,1987.
[8] Gershenson, C., González, P.P. and Negrete, J.,
Action Selection Properties in a Software Simulated
Agent, Lecture Notes in Artificial Intelligence, Vol.
1793, 2000, pp 634-648.
[9] Gershenson, C., González, P. P. and Negrete, J.,
Thinking Adaptive: Towards a Behaviours Virtual
Labora tory. To be published in SAB'2000, Paris,
France.
[10] González, P.P. and J. Negrete., REDSIEX: A
cooper ative network of exper t systems with
blackboard architectures, Expert Systems , Vol. 14,
No. 4, 1997, pp. 180-189.
[11] González, P.P., Redes de Conductas Internas como
Nodos-P izarrón: Selección de Acciones y
Aprendizaje en un Robot Reactivo, Tesis Doctoral,
Instituto de Investigaciones Biomédicas/UNAM,
México, 2000.
[12] González, P.P., Negrete, J., Barreiro, A.J. and
Gershenson, C., A Model for Combination of
External and Internal Stimuli in the Action Selection
of an Autonomous Agent, Lecture Notes in Artificial
Intelligence, Vol. 1793, 2000, pp 621-633.
[13] Maes, P. , Adaptive Autonomous Agents, Journal
of Artificial Life, Vol. 1, No. 1 and 2, 1994.
[14] Negrete, J. and González, P.P., Net of multi-agent
expert systems with emergent control, Expert
Systems with Applications, Vol. 14, No. 1, 1998, pp.
109-116.
[15] Nii, H. P. , Blackboard systems. In A. Barr, P. R.
Cohen and E. A. Fe igenbaum (ed.), The Handbook
o f A r t i f i c i a l
I n t e l l i g e n c e , v o lumen
IV ,
Addison-Wesley Publishing Company, 1989.
[16] Paton, R.C ., Some Computational Models at the
Cellular Level, BioSystems , 29, 1993, pp 63-75.
[17] Paton, R.C., Staniford, G. and Kendall, G.,
Specifying Logical Agents in Cellular Hierarchies,
Proceedings of IPCAT (Information Processing in
Cells and Tissues) , Paton, R.C., Holcombe, M. y
Staniford, G. (Eds.), 1995, pp 302-317.
[18] Pritchard, L. and Dufton, M.J., Do Proteins Learn
to Evolve? The Hopfield Network as a Basis for the
Understanding of Protein Evolution, Journal of
Theoretical Biology, 202, 2000, pp 77-86.
[19] Schwab, E.D. and Pienta, K.J., Modeling signal
transduction in normal and cancer cells using
complex adaptive systems, Medical Hypotheses, 48,
1997, 111-123.
|
1511.03144 | 2 | 1511 | 2016-11-16T15:27:05 | Asynchronous Decentralized 20 Questions for Adaptive Search | [
"cs.MA",
"cs.IT",
"eess.SY",
"cs.IT",
"stat.ML"
] | This paper considers the problem of adaptively searching for an unknown target using multiple agents connected through a time-varying network topology. Agents are equipped with sensors capable of fast information processing, and we propose a decentralized collaborative algorithm for controlling their search given noisy observations. Specifically, we propose decentralized extensions of the adaptive query-based search strategy that combines elements from the 20 questions approach and social learning. Under standard assumptions on the time-varying network dynamics, we prove convergence to correct consensus on the value of the parameter as the number of iterations go to infinity. The convergence analysis takes a novel approach using martingale-based techniques combined with spectral graph theory. Our results establish that stability and consistency can be maintained even with one-way updating and randomized pairwise averaging, thus providing a scalable low complexity method with performance guarantees. We illustrate the effectiveness of our algorithm for random network topologies. | cs.MA | cs | Decentralized Adaptive Search using the Noisy 20
Questions Framework in Time-Varying Networks
1
Theodoros Tsiligkaridis, Member, IEEE
Abstract
This paper considers the problem of adaptively searching for an unknown target using multiple agents connected
through a time-varying network topology. Agents are equipped with sensors capable of fast information processing,
and we propose a decentralized collaborative algorithm for controlling their search given noisy observations.
Specifically, we propose decentralized extensions of the adaptive query-based search strategy that combines elements
from the 20 questions approach and social learning. Under standard assumptions on the time-varying network
dynamics, we prove convergence to correct consensus on the value of the parameter as the number of iterations
go to infinity. The convergence analysis takes a novel approach using martingale-based techniques combined with
spectral graph theory. Our results establish that stability and consistency can be maintained even with one-way
updating and randomized pairwise averaging, thus providing a scalable low complexity method with performance
guarantees. We illustrate the effectiveness of our algorithm for random network topologies.
I. INTRODUCTION
Consider a set of agents that try to estimate a parameter, e.g., estimate a target state or location, collectively. The
agents are connected by a time-varying information sharing network and can periodically query one of their local
neighbors about the target location. In this paper we adopt a generic observation model based on query-response
models where the queries are functions of agents' local information and successive queries are determined by a
feedback control policy. Specifically, in the 20 questions-type model considered in this paper, the observation of
each agent is coupled with the query region chosen by that agent, which is a function of its current local belief.
A centralized collaborative 20 questions framework was proposed and studied in [1], where a global centralized
controller jointly or sequentially formulates optimal queries about target location for all agents. This work was
later extended in [2] to the decentralized setting, in which each agent formulates his own query based on his local
information and exchanges beliefs with its neighbors in a synchronous fashion (i.e, updating the beliefs of all agents
simultaneously at each update step). The proposed decentralized algorithm therein consisted of two stages: 1) local
belief update; and 2) local information sharing. In stage 1 each agent implements the bisection query policy of [1]
to update their local belief function. In stage 2 the local belief functions are averaged over nearest neighborhoods
in the information sharing network. This two-stage algorithm was proven to converge to a consensus estimate of
the true state, assuming synchronous updating of all agents' beliefs in the network and irreducibility of the social
interaction graph.
The decentralized collaborative 20 questions problem is applicable to large scale collaborative stochastic search
applications where there is no centralized authority. Examples include: object tracking in camera networks [3]; road
tracking from satellite remote sensing networks [4]; and wide area surveillance networks [5]. Other applications
may include extending active testing approaches in the decentralized setting for classification problems, for instance
in vision, recommendation systems, and epidemic networks. The 20 questions paradigm is motivated by asking the
correct type of questions in the correct order and is applicable to various other domains where computational effort
and time are critical resources to manage.
In this paper, we consider a variant of the two-stage decentralized collaborative algorithm of [2] by relaxing the
assumption of a fixed network topology. We consider time-varying network topologies in which two randomly chosen
agents interact at each update step, giving rise to asynchronous updates (i.e., beliefs of all agents are not updated at
each update step). We analyze the convergence properties of the two-stage asynchronous decentralized collaborative
6
1
0
2
v
o
N
6
1
]
A
M
.
s
c
[
2
v
4
4
1
3
0
.
1
1
5
1
:
v
i
X
r
a
The material in this paper was presented in part at the 2016 IEEE International Symposium on Information Theory (ISIT), Barcelona,
Spain.
T. Tsiligkaridis is with MIT Lincoln Laboratory, Lexington, MA 02421 USA (email: [email protected]).
2
20 questions algorithm under appropriate conditions. This asynchronous model is applicable to practical sensor
networks where agents may be located in large geometric distances, and as a result their wireless communications
are unreliable or intermittent due to path occlusions or other environmental effects, and lead to time-varying network
topologies. Our analysis is based on smoothing techniques and martingale convergence theory in similar spirit to
[2]. However, the randomness due to the time-varying network topology and lack of strong connectivity at each
time instant introduce additional complications in the analysis that were absent when analyzing the static network
case of adaptive agents in [2].
In addition to theoretical analysis of the convergence of the proposed algorithm, numerical studies of per-
formance are provided showing interesting information behavior that information sharing yields. The benefit of
our asynchronous approach is that the asynchronous decentralized algorithm attains similar performance as its
synchronous counterpart introduced and analyzed in [2]. The lack of synchronization our approach offers is of
great practical interest because synchronization of a large number of agents can be difficult [6]. Furthermore, the
popular time-division-multiple-access (TDMA) communication protocol for distributed networks is only applicable
to synchronized networks. Even though the synchronous update scheme in [2] is proven to be convergent to the
correct limit, it is still an open question whether the same algorithm converges with an asynchronous implementation.
Counterexamples showing that asynchronous updates do not converge although synchronous updates converge are
presented in [7] for the standard consensus problem.
A. Prior Work
The noisy 20 questions problem, also known as Ulam's game, was introduced by Renyi [8] and was later
rediscovered by Ulam [9]. The first work making the connection between communication with feedback and noisy
search appeared in [10]. The probabilistic bisection algorithm dates back to the work of Horstein [11], where it
was originally proposed and analyzed heuristically in the contest of communication with noiseless feedback over
the binary symmetric channel. This algorithm was shown to achieve capacity for arbitrary memoryless channels in
[12], [13]. The probabilistic bisection algorithm was generalized to multiple players in [1] in the centralized setting,
and decentralized algorithms for probabilistic bisection search were proposed in [2].
Our work also differs from the works on 20 questions/active stochastic search of Jedynak, et al., [14], Castro &
Nowak [5], Waeber, et al., [15], and Tsiligkaridis, et al., [1] because we consider intermediate local belief sharing
between agents after each local bisection and update. In addition, in contrast to previous work, in the proposed
framework each agent incorporates the beliefs of its neighbors in a way that is agnostic of its neighbors' error proba-
bilities. The analysis of [16], [17] does not apply to our model since we consider controlled observations, although
we use a form of the social learning model of [16], [17]. While a randomized distributed averaging/consensus
problem was analyzed in [18], the convergence analysis is not applicable because we consider new information
injected in the dynamical system at each iteration (controlled information gathering) in addition to randomized
information sharing.
Although consensus to the true target location holds for the degenerate case of no agent collaboration by using
results in the existing literature, collaboration improves the rate of convergence of the estimation error. As shown in
the numerical results in this paper, the error decays faster as a function of iterations. This is the primary motivation
for studying such collaborative signal processing algorithms. However, proving convergence to the correct consensus
is the first step in analyzing such algorithms, and it is by no means a trivial one. In fact, even for the simple single-
agent case, only very recently, Waeber, et al [15] were able to prove the first rigorous convergence rate result for
the continuous probabilistic bisection algorithm. The focus of this paper is to establish convergence of decentralized
algorithms for probabilistic bisection in time-varying networks.
II. NOTATION
We define X∗ the true parameter, the target state in the sequel, and its domain as the unit interval X = [0, 1].
Let B(X ) be the set of all Borel-measurable subsets B ⊆ X . Let N = {1, . . . , M} index the M agents in an
interaction network, denoted by the vertex set N and the directed edges joining agents at time t ∈ N are captured
by E(t). Let At = {ai,j(t)} denote the interaction matrix at time t, which is a stochastic matrix (i.e., nonnegative
entries with rows summing to unity). At each time t, the time-varying network structure is modeled by the directed
graph (N , E(t)), where
E(t) = {(j, i) : [At]i,j > 0}
3
each x ∈ X . For any B ∈ B(X ), define Pt(B) as the vector of probabilities with i-th element equal to(cid:82)
region Ai,t = [0, Xi,t]. We let Fi,t(a) = Pi,t([0, a]) = (cid:82) a
Let Ai→j denote the interaction matrix when agent i performs a Bayesian update based on its query and averages
beliefs with agent j. In our model, a random agent i is chosen with probability qi and a collaborating agent j is
chosen with probability Pi,j at each update step. Thus, the interaction matrix At = Ai→j is chosen with probability
qiPi,j, and nodes i and j collaborate. The matrix P = {Pi,j} contains the probabilistic weights for collaboration
between agents and are zero when there is no edge in the information sharing network at any time; if Pi,j = 0,
then agent i cannot collaborate with agent j at any time.
Define the probability space (Ω,F, P) consisting of the sample space Ω generating the unknown state X∗ and
the observations {Yi,t+1} at times t = 0, 1, . . ., an event space F and a probability measure P. The expectation
operator E is defined with respect to P.
Define the belief of the i-th agent at time t on X as the posterior density pi,t(x) of target state x ∈ X based on all
of the information available to this agent at this time. Define the M × 1 vector pt(x) = [p1,t(x), . . . , pM,t(x)]T for
B pi,t(x)dx.
We define the query point/target estimate of the i-th agent as Xi,t. The query point is the right boundary of the
0 pi,t(x)dx denote the cumulative distribution function
associated with the density pi,t(·).
We assume that a randomly chosen agent i constructs a query at time t of the form "does X∗ lie in the region
Ai,t ⊂ X ?". We indicate this query with the binary variable Zi,t = I(X∗ ∈ Ai,t) to which agent i responds with
a binary response Yi,t+1, which is correct with probability 1 − i, and without loss of generality i ≤ 1/2. This
error model is equivalent to a binary symmetric channel (BSC) with crossover probability i. The query region Ai,t
depends on the accumulated information up to time t at agent i. Define the nested sequence of event spaces Ft,
Ft−1 ⊂ Ft, for all t ≥ 0, generated by the sequence of queries and responses. The queries {Ai,t}t≥0 are measurable
with respect to this filtration. Define the canonical basis vectors ei ∈ RM as [ei]j = I(j = i). The notation i.p.
denotes convergence in probability and a.s. denotes almost-sure convergence.
III. ASYNCHRONOUS DECENTRALIZED 20 QUESTIONS
Motivated by the work of [1], [2] and [16], we proceed as follows. As in the fixed-topology decentralized
algorithm in [2], starting with a collection of prior distributions {pi,0(x)}i∈N on X∗, the goal is to reach consensus
across the network through repeated querying and information sharing. Our proposed asynchronous decentralized
collaborative 20 questions algorithm consists of two stages. Motivated by the optimality of the bisection rule for
symmetric channels proved by Jedynak, et al., [14], the first stage bisects the posterior of a randomly chosen agent
i ∈ N (say with probability qi) at Xi,t and refines its own belief through Bayes' rule 1. In the second stage, agent
i collaborates with an agent j with probability Pi,j by averaging their beliefs (see Algorithm 1).
X pi,t(x)li(yx, Xi,t)dx
and can be shown to be equal to 1/2 (see proof of Lemma 1 in Appendix A). The bisection query points are
medians Xi,t = F −1
Some simplifications occur in Algorithm 1. The normalizing factor Zi,t(y) is given by(cid:82)
i,t (1/2) and the observation distribution is:
li(yx, Xi,t) = f (i)
1 (y)I(x ≤ Xi,t) + f (i)
0 (y)I(x > Xi,t).
z (·) are defined in (6). We note that the conditioning on the query region Ai,t (or query
where the distributions f (i)
point Xi,t in one-dimension) is necessary as the binary observation y is linked to the query in the 20 questions
model, in which the correct answer is obtained with probability 1 − i and the wrong answer is obtained with
probability i. We remark that the density li(yx, Xi,t) depends on the query point Xi,t, which is time-varying and
as a result, the density li(yx, Xi,t) is time-varying.
We remark that Algorithm 1 is fully decentralized, i.e., only local information processing and local information
sharing is needed. Furthermore, it operates in an asynchronous fashion as the belief updates are not occurring
simultaneously for all agents in the network. At each step, two agents collaborate with each other and update their
beliefs. This belief averaging leads to a non-Bayesian social learning scheme in similar spirit to [16], [17].
1In the asynchronous time model of Boyd, et al., [18], each agent has a clock that ticks according to a rate-one Poisson process. As a
result, the inner ticks at each agent i are distributed according to a rate-one exponential distribution, independently across agents and over
time. This corresponds to a single clock ticking according to a rate-M Poisson process at times {tk : k ≥ 1}, where {tk = tk+1 − tk}
are i.i.d. exponential random variables of rate M. Let ik ∈ N denote the agent whose clock ticked at time tk. It follows that ik are i.i.d.
Unif(N ), i.e., qi = 1/M.
Algorithm 1 Asynchronous Decentralized Bisection Search Algorithm for Time-Varying Networks
1: Input: N , P = {Pi,j : (i, j) ∈ N × N},{i : i ∈ N}
2: Output: { Xi,t : i ∈ N}
3: Initialize pi,0(·) to be positive everywhere.
4: repeat
5:
6:
7:
8:
9:
Bisect posterior density at median: Xi,t = F −1
Obtain (noisy) binary response yi,t+1 ∈ {0, 1}.
Choose an agent i ∈ N randomly (e.g., with probability qi).
Choose a collaborating agent j ∈ N with probability Pi,j.
Belief update:
i,t (1/2).
pi,t+1(x) = αipi,t(x)
li(yi,t+1x, Xi,t)
Zi,t(yi,t+1)
+ (1 − αi)pj,t(x),
pj,t+1(x) = pi,t+1(x),
pl,t+1(x) = pl,t(x),∀l (cid:54)= i, l (cid:54)= j,
x ∈ X .
where the observation p.m.f. is:
4
(1)
li(yx, Xi,t) = f (i)
1 (y)I(x ≤ Xi,t) + f (i)
0 (y)I(x > Xi,t),
and f (i)
1 (y) = (1 − i)I(y=1)I(y=0)
i
10: until convergence
y ∈ Y
0 (y) = 1 − f (i)
, f (i)
1 (y).
Collaboration becomes essential in certain scenarios when some agents in the network are completely unreliable
i = 1/2, and helps tremendously when agents are unreliable, i.e., i ≈ 1/2. When an agent is completely unreliable,
its learning capacity is zero and cannot localize the target on its own. With collaboration, neighboring agents may
steer the belief of unreliable agents closer to the true location (also see Section V for several experiments).
IV. CONVERGENCE OF ASYNCHRONOUS DECENTRALIZED ESTIMATION ALGORITHM
In this section convergence properties of Algorithm 1 are established under the assumptions below. The two
main theoretical results, Thm. 1 and Thm. 2, establish that the proposed algorithm attains asymptotic agreement
(consensus) and asymptotic consistency, respectively. Several technical lemmas are necessary and are proven in the
appendices. A block diagram showing the interdependencies between the lemmas and theorems in this section is
shown in Fig. 1.
Fig. 1.
consensus limit.
The flow of the analysis for establishing convergence of the asynchronous decentralized 20-questions algorithm to the correct
According to Algorithm 1, the density evolution described by (1) can be written in matrix form as:
pt+1(x) = (At + Dt(x))pt(x)
(2)
Lemma 1Lemma 2Lemma 3Lemma 4Lemma 5Lemma 6Theorem 1(Asymptotic Agreement)Theorem 2(Consistency)where At accounts for the averaging action of the iteration and Dt(x) is the innovation. According to Algorithm
1, it follows that with probability qiPi,j, agents i and j collaborate, resulting in:
At = Ai→j = IM + (ei + ej)(αiei + (1 − αi)ej)T
− (eieT
(cid:32)
i + ejeT
j )
li(Yi,t+1x, Xi,t)
Zi,t(Yi,t+1)
− 1
(cid:33)
(ei + ej)eT
i
(3)
(4)
Dt(x) = Di→j(x) = αi
A. Assumptions
To simplify the analysis of Algorithm 1, we make the following assumptions, which are comparable to those
made in [1], [2] and [16].
Each agent's response is governed by the conditional distribution:
li(yix, Ai,t)
def
= P (Yi,t+1 = yiAi,t, X∗ = x)
(cid:40)
=
f (i)
z (yi) =
1 (yi), x ∈ Ai,t
f (i)
0 (yi), x /∈ Ai,t
f (i)
(cid:40)
1 − i, yi = z
yi (cid:54)= z
i,
5
(5)
(6)
Assumption 1. (Memoryless Binary Symmetric Channels) We model the agents' responses as independent (mem-
oryless) binary symmetric channels (BSC) [19] with crossover probabilities i ∈ (0, 1/2]. The probability mass
function f (i)
z (Yi,t+1) = P (Yi,t+1Zi,t = z) is:
for i = 1, . . . , M, z ∈ {0, 1}. Define the set of agents I1 = {i ∈ N : i < 1/2} and assume the set I1 is nonempty.
The condition i < 1/2 implies that the response of an agent i is 'almost correct'. Agents i /∈ I1 do not have
the ability to localize the target on their own.
Assumption 2. (Average Strong Connectivity) As in [16], we assume that the network is strongly connected on
i,j qiPi,jAi→j is irreducible. Furthermore, we assume α = mini αi > 0 to ensure
average, i.e. A = E[At] =(cid:80)
collaboration.
The following standard assumption about the network connectivity over time [20], [21], [22], [23], [24] will be
made to prove the correctness of the asymptotic limit of CDF's in Thm. 2. We remark that this assumption is not
needed to prove asymptotic consensus (Thm. 1).
Assumption 3. (Strong Connectivity over Interval) There exists R such the graph (N , E(t) ∪ E(t + 1) ∪ ··· ∪
E(t + R − 1)) is the same strongly connected graph for all t.
This condition is true with high probability as R gets large.
B. Analysis
The principal component that enables the proofs of convergence of Algorithm 1 is Equation (1), that propagates
the vector of belief functions forward in time. In (2), At = Ait→jt is the time-varying interaction matrix between
agents it and jt and Dt(x) = Dit→jt(x) is a diagonal time-varying matrix dependent on the response of agent i,
yi,t+1, the query region Ait,t ⊂ X and the state x ∈ X . For intuition, (2) can be written as a sum of two terms:
(cid:18)
pt+1(x) = pt(x) − eipi,t(x) − ejpj,t(x)
li(yi,t+1x, Ai,t)
+ (ei + ej)
αipi,t(x)
Zi,t(yi,t+1)
(cid:19)
+ (1 − αi)pj,t(x)
The first term simply zeroes out the i and j components and the second term fills them in with the average between
the updated belief of agent i and the current belief of agent j. The rest of the components are left intact.
M(cid:88)
l=1
Proposition 1 provides bounds on the dynamic range of Ax, where x is any arbitrary vector (see Theorem 3.1
in [25]). The coefficient of ergodicity of an interaction matrix A is defined as [25], [26]:
τ1(A)
def
=
1
2
max
i(cid:54)=j
(cid:107)AT (ei − ej)(cid:107)1 =
1
2
max
i(cid:54)=j
ai,l − aj,l
(7)
This coefficient satisfies τ1(·) ∈ [0, 1]. The most non-ergodic interaction matrix is the identity matrix IM , for which
τ1(IM ) = 1 and there is no information sharing, and the other extreme is the full-rank matrix τ1( 1
Proposition 1. (Contraction Property of A) Assume A = {ai,j} is a M × M stochastic matrix. Let x be an
arbitrary non-negative vector. Then, we have for all pairs (i, j):
1
M 1
¯
¯
T ) = 0.
(cid:16)
(cid:17)
[Ax]i − [Ax]j ≤ τ1(A)
xi − min
i
xi
max
i
Although At is not irreducible, A = E[At] is, which is used in Lemmas 2,3. Next, we recall a tight smooth
approximation to the non-smooth maximum and minima operators. Similar results have appeared in Prop. 1 in [27]
and p. 72 in [28].
Proposition 2. (Tight Smooth Approximation to Maximum/Minimum Operator) Let a ∈ RM be an arbitrary vector.
Then, we have for all γ > 0:
and
min
i
ai ≥ − 1
γ
log
e−γai
≥ min
i
ai − log M
γ
Lemma 1. Consider Algorithm 1. Let B ∈ B(X ). Then, we have:
max
i
ai ≤ 1
γ
log
eγai
≤ max
i
ai +
log M
γ
(cid:32) M(cid:88)
(cid:32) M(cid:88)
i=1
i=1
(cid:33)
(cid:33)
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)Ft
(cid:35)
Dt(x)pt(x)dx
= 0.
(cid:34)(cid:90)
E
6
(8)
(9)
where Dt(x) was defined in (4).
Proof: See Appendix A.
B
Lemmas 1 and 2 imply that the term(cid:82)
Proof: See Appendix B.
Lemma 2. Consider Algorithm 1. Let B ∈ B(X ). Then, we have E[vT Pt+1(B)Ft] = vT Pt(B) for some positive
vector v (cid:31) 0, and limt→∞ vT Pt(B) exists almost surely.
Lemma 3. Consider Algorithm 1 and let d = 1. Let B = [0, b] ∈ B(X ). Let v denote the positive left eigenvector
of A = Ei,j[Ai→j]. Define the variable:
B vT Dt(x)pt(x)dx is a martingale difference noise term.
(cid:32) M(cid:88)
i,j=1
Λt(B, P, )
def
=
1
evT Pt(B)
qiPi,jevT Ai→jPt(B)
(cid:33)
× cosh((vi + vj)ai,i(1 − 2i)µi,t(B))
(10)
where
Then, we have Λt
a.s.−→ 1 as t → ∞.
Proof: See Appendix C.
µi,t(B)
def
= min{Pi,t(B), 1 − Pi,t(B)}.
Lemma 4. Consider the same setup as Lemma 3. Then, Λt(B) a.s.−→ 1 implies µi,t(B) a.s.−→ 0 for all i ∈ N as
t → ∞.
7
Proof: See Appendix D.
Define the dynamic range (with respect to all agents in the network) of the posterior probability that X∗ lies in
set B ⊂ X :
Also, define the innovation:
di,t+1(B)
def
=
Vt(B)
def
= max
i
Pi,t(B) − min
Dt(x)pt(x)dx
=
i
B
(cid:21)
i
(cid:90)
Pi,t(B)
(11)
[Dt(x)]i,ipi,t(x)dx
We next prove a lemma that shows that the dynamic range Vt(B) has a useful upper bound.
Lemma 5. Consider Algorithm 1. Let B = [0, b] with b ≤ 1. Then, for all R ∈ N:
Vt+R(B) ≤ τ1(At+R−1 ··· At)Vt(B)
(cid:17)
di,t+R−k(B) − min
i
max
i
di,t+R−k(B)
(12)
(cid:20)(cid:90)
B
R−1(cid:88)
(cid:16)
+
Proof: See Appendix E.
k=0
To show convergence of the integrated beliefs of all agents in the network to a common limiting belief, it suffices
i.p.→ 0. Theorem 1 shows convergence of asymptotic beliefs to a common limiting belief. The structure
to show Vt(B)
of the limiting belief is given in Theorem 2.
Theorem 1. Consider Algorithm 1 and let the Assumptions 1-2 hold. Let B = [0, b], b ≤ 1. Then, consensus of the
agents' beliefs is asymptotically achieved across the network:
Vt(B) = max
i
Pi,t(B) − min
i
Pi,t(B)
i.p.−→ 0
as t → ∞.
Proof: See Appendix F.
Theorem 1 establishes that Algorithm 1 produces belief functions that become identical over all agents. This
establishes asymptotic consensus among the beliefs, i.e., that as time goes on all agents come to agreement about
the uncertainty in the target state. It remains to show the limiting belief is in fact concentrated at the true target
state X∗ (Thm. 2).
Lemma 6. Consider Algorithm 1. Assume pi,0(X∗) > 0,∀i ∈ N . Then, the posteriors evaluated at the true target
state X∗ have the following asymptotic behavior:
lim inf
m→∞
1
m
for some ci > 0.
Proof: See Appendix G.
M(cid:88)
i=1
ci log(pi,mR(X∗)) ≥ K (a.s.)
Now, we are ready to prove the main consistency result of the asymptotic beliefs. The proof is based on the
consensus result of Theorem 1.
Theorem 2. Consider Algorithm 1 and let Assumptions 1-3 hold. Let B = [0, b], b ≤ 1. Then, we have for each
i ∈ N :
Fi,t(b) = Pi,t(B)
i.p.−→ F∞(b) =
(cid:26) 0,
1,
b < X∗
b > X∗
as t → ∞. In addition, for all i ∈ N :
Xi,t
def
=
(cid:90) 1
x=0
xpi,t(x)dx
i.p.−→ X∗
(13)
Proof: Theorem 1 implies that for each agent i,
8
i.p.→ F∞(b)
Fi,t(b)
the constant I(b > X∗). Lemma 6 implies that(cid:80)M
(14)
as t → ∞, where F∞(b) is a common limiting random variable. To finish the proof, we show F∞(b) is equal to
i=1 ci log pi,mR(X∗) → ∞ almost surely as m → ∞. Thus, there
exists an agent i0 ∈ I1 such that pi0,mR(X∗) → ∞. Lemma 4 implies µi0,t(b(cid:48)) = min{Fi0,t(b(cid:48)), 1− Fi0,t(b(cid:48))} a.s.→ 0
for any b(cid:48) ∈ [0, 1]. This asymptotic result, combined with the monotonicity of the CDF operator Fi0,t(·) and
pi0,mR(X∗) a.s.→ ∞ imply Fi0,mR(b) → I(b > X∗). It then follows from (14) that Fi,t(b)
i.p.→ F∞(b) = I(b > X∗)
for all i ∈ N . The second part (i.e., (13)) of the proof is identical to the one of Theorem 2 in [2].
V. EXPERIMENTAL VALIDATION
This section presents simulations that validate the theory in Section IV and demonstrate the benefits of the
proposed asynchronous decentralized 20 questions algorithm. We compare the performance of the asynchronous
algorithm proposed in this paper with the synchronous counterpart studied in [2], the centralized fully Bayesian
estimator implemented via the basic equivalence principle derived in [1] and the standard query-based estimator
with no information sharing. The root mean-squared error (RMSE) was chosen as a performance metric and we
consider the performance for strongly connected geometric random graphs [29] to model ad-hoc wireless network
topologies. An example geometric random graph is shown in Fig. 2.
Fig. 2. Geometric random graph with M = 20 nodes over unit square. This topology defines the zero pattern of the stochastic interaction
matrix P. The nonzero probabilities Pi,j for each row/node i are chosen to be uniform, i.e., each agent is equally likely to communicated
with any of its neighbors.
To ensure fairness in the comparisons, each algorithm iteration consists of M queries. Thus, the performance at
each iteration of the synchronous setup (in which all agents are queried about the target location) should be compared
with the performance at every M iterations of the asynchronous setup. This is denoted as "effective iteration" in the
figures. We average performance over T = 200 Monte Carlo trials for each random graph realization. Performance
is further averaged over 10 geometric random graphs to obtain the ensemble-average RMSE's. The average and
worst-case RMSE metrics were calculated as:
M(cid:88)
i=1
1
M
(cid:118)(cid:117)(cid:117)(cid:116) 1
(cid:118)(cid:117)(cid:117)(cid:116) 1
T
T
T(cid:88)
T(cid:88)
t=1
t=1
RMSEavg =
RMSEmax =
( Xi,t − X∗)2
( Xi,t − X∗)2
max
i
00.20.40.60.8100.10.20.30.40.50.60.70.80.91Figures 3 and 4 show the average and worst-case RMSE performance of the network as a function of iteration
for the case of M = 20 homogeneous agents, i.e., all agents are unreliable with error probability = 0.45. We
observe that the asynchronous and synchronous algorithms both uniformly outperform the case of no information
sharing over all iterations. We remark that the asynchronous algorithm seems to have a slower asymptotic rate
of convergence as compared to the synchronous algorithm, while it seems to improve the RMSE more than the
synchronous counterpart for the first few iterations. This may be due to biasing effects that occur in the synchronous
algorithm; i.e., the belief is perturbed by multiple unreliable neighbors at each update step. In the asynchronous
algorithm on the other hand, there are less perturbations in the initial learning stage since it consists of pairwise
belief averaging at each update step.
9
Fig. 3.
= 0.45. The average RMSE is lower for the case of information sharing vs. the case of no information sharing.
Average RMSE performance across the network. Homogeneous network of M = 20 unreliable agents with error probability
Fig. 4. Worst-case RMSE performance across the network. Homogeneous network of M = 20 unreliable agents with error probability
= 0.45. The worst-case MSE across the network is lower for the case of information sharing vs. the case of no information sharing. The
asynchronous algorithm outperforms the synchronous algorithm in the initial learning stage.
Figures 5 and 6 show the average and worst-case RMSE performance of the network for the case of M = 20
heterogeneous agents, i.e., three agents are reliable with error probability = 0.05 and the rest are unreliable with
error probability = 0.45. Here, the reliable agents speed up the convergence of the unreliable agents through belief
averaging. We observe the interesting result that the asynchronous algorithm uniformly outperforms the synchronous
algorithm over all iterations, both in terms of average and worst-case RMSE. This can be attributed to the fact that
Effective Iteration20406080100120140160180200Average RMSE00.10.20.30.40.50.60.70.80.91SynchronousAsynchronousCentralizedNo info sharingEffective Iteration20406080100120140160180200Max RMSE00.10.20.30.40.50.60.70.80.91SynchronousAsynchronousCentralizedNo info sharingone-way updating and pairwise averaging induce less bias when combining beliefs at each node at each update step,
effectively spreading the good information around the network in a simplified fashion without being influenced too
much by multiple neighbors. Thus, asynchronous implementations of the non-Bayesian decentralized 20 questions
algorithm have the potential to improve network-wide estimation performance and getting closer to the centralized
Bayesian performance, in addition to requiring significantly less infrastructure and computational complexity, in
comparison to synchronous implementations.
10
Fig. 5.
Average RMSE performance across the network. Heterogeneous network of M = 20 agents, three of which are reliable with
error probability = 0.05 and the remaining ones are unreliable with error probability probability = 0.45. The asynchronous algorithm
outperforms the synchronous decentralized estimation algorithm with information sharing, and the algorithm with no information sharing.
Fig. 6. Worst-case RMSE performance across the network. Heterogeneous network of M = 20 agents, three of which are reliable with
error probability = 0.05 and the remaining ones are unreliable with error probability probability = 0.45. The asynchronous algorithm
outperforms the synchronous decentralized estimation algorithm with information sharing, and the algorithm with no information sharing.
VI. CONCLUSION
We introduced an asynchronous version of decentralized 20 questions with noise based on one-way updating and
pairwise belief averaging, and analyzed its convergence properties. We also illustrated several benefits of information
sharing as compared to no information sharing, and asynchronous vs. synchronous implementations. Asymptotic
convergence properties of the agents' beliefs were derived, showing that they reach consensus to the true belief.
Numerical experiments were presented to validate the convergence properties of the algorithm.
Effective Iteration20406080100120140160180200Average RMSE00.10.20.30.40.50.60.70.80.91SynchronousAsynchronousCentralizedNo info sharingEffective Iteration20406080100120140160180200Max RMSE00.10.20.30.40.50.60.70.80.91SynchronousAsynchronousCentralizedNo info sharingAPPENDIX A
11
PROOF OF LEMMA 1
Proof: Note the following:
E
Decomposing the inner term, we obtain:
(cid:21)(cid:21)
(cid:12)(cid:12)(cid:12)Ft, (i, j)
Di→j(x)pt(x)dx
(cid:21)
(cid:20)(cid:90)
B
E
(cid:20)
= Ei,j
Dt(x)pt(x)dx
(cid:12)(cid:12)(cid:12)Ft
(cid:20)(cid:90)
(cid:21)
(cid:12)(cid:12)(cid:12)Ft, (i, j)
(cid:18) li(yi,t+1x, Ai,t)
(cid:20)(cid:90)
Zi,t(yi,t+1)
B
− 1
(cid:19)
Di→j(x)pt(x)dx
(cid:20)(cid:90)
E
= E
(cid:20)(cid:90)
B
αi
B
= αi(ei + ej)E
(2li(yi,t+1x, Ai,t) − 1)pi,t(x)dx
(ei + ej)pi,t(x)dx
Zi,t(y)
(cid:90)
B
(cid:16)
(cid:90)
B
= 2
1 (y)I(x ∈ Ai,t) + f (i)
f (i)
0 (y)I(x /∈ Ai,t)
dx
=
pi,t(x)
X
1 (y)Pi,t(Ai,t) + f (i)
= f (i)
0 (y)(1 − Pi,t(Ai,t)) = 1/2
(cid:16)
(2li(yi,t+1x, Ai,t) − 1)pi,t(x)dx
1 (yi,t+1)Pi,t(B ∩ Ai,t) + f (i)
f (i)
(cid:20)(cid:90)
− Pi,t(B)
E
(2li(yi,t+1x, Ai,t) − 1)pi,t(x)dx
0 (yi,t+1)Pi,t(B ∩ Ac
i,t)
(cid:21)
(cid:12)(cid:12)(cid:12)Ft, (i, j)
= 0
1 (yi,t+1)] = 1/2, we obtain:
(cid:17)
(cid:21)
(cid:12)(cid:12)(cid:12)Ft, (i, j)
(cid:21)
(cid:12)(cid:12)(cid:12)Ft, (i, j)
(cid:17)
where we used the fact that Zi,t(y) = 1/2 for all y ∈ Y. This follows from the probabilistic bisection property:
where we used the fact f (i)
1 (y) + f (i)
0 (y) = 1. From the definition of li(yx, Ai,t), it follows that:
Taking the conditional expectation, and using E[f (i)
This concludes the lemma.
B
APPENDIX B
PROOF OF LEMMA 2
Proof: From the tower property of conditional expectation, we obtain:
(At + Dt(x))pt(x)dx
= Ei,j
(At + Dt(x))pt(x)dx
E[Pt+1(B)Ft]
= E
(cid:20)(cid:90)
B
E
(cid:20)(cid:90)
(cid:20)
M(cid:88)
M(cid:88)
i,j=1
=
=
(cid:20)
B
i,j=1
= APt(B)
qiPi,jAi→j
(cid:21)
(cid:12)(cid:12)(cid:12)Ft
(cid:90)
Pt(B) + E
B
qiPi,jE
Ai→jPt(B) +
(cid:21)(cid:12)(cid:12)(cid:12)Ft
(cid:12)(cid:12)(cid:12)Ft, (i, j)
(cid:20)(cid:90)
Di→j(x)pt(x)dx
(cid:21)
(cid:12)(cid:12)(cid:12)Ft, (i, j)
(cid:21)
(cid:12)(cid:12)(cid:12)Ft
Dt(x)pt(x)dx
B
(cid:21)
(15)
where we used the result of Lemma 1. From strong connectivity (i.e., Assumption 2), it follows that A is an
irreducible stochastic matrix. Thus, there exists a left eigenvector v ∈ RM with strictly positive entries corresponding
to a unit eigenvalue-i.e., vT = vT A [30]. Multiplying both sides of (15) from the left by vT , we obtain
E[vT Pt+1(B)Ft] = vT Pt(B). Thus, the process {vT Pt(B) : t ≥ 0} is a martingale with respect to the filtration
Ft. We note that it is bounded below by zero and above by (cid:107)v(cid:107)1 almost surely. From the martingale convergence
theorem [31], it follows that it converges almost surely.
12
APPENDIX C
PROOF OF LEMMA 3
Proof: Define the tilted measure variable ζt(B)
def
= exp(vT Pt(B)). From Lemma 2 and Jensen's inequality, it
follows that
E[ζt+1(B)Ft] ≥ ζt(B)
so the process {ζt(B) : t ≥ 0} is a submartingale with respect to the filtration Ft. From the proof of Lemma 2, it
follows that ζt(B) is bounded a.s., so by the martingale convergence theorem [31], it follows that limt→∞ ζt(B)
exists and is finite almost surely. Define the ratio βt+1(B)
ζt(B) . As a result, we have from Lemma 2:
def
= ζt+1(B)
Since the variables in the limit on the LHS are bounded a.s., i.e., βt+1(B) ≤ e(cid:107)v(cid:107)1, the dominated convergence
theorem for conditional expectations [32] implies:
lim
t→∞ βt+1(B)
= lim
t→∞
a.s.= 1
(cid:34)
evT Pt(B)
B Dt(x)pt(x)dx(cid:1)
evT AtPt(B) exp(cid:0)vT(cid:82)
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)Ft
(cid:35)
E(cid:104)
evT AtPt(B)evT(cid:82)
(cid:88)
a.s.−→ 1
βt+1(B)
E
1
B Dt(x)pt(x)dxFt
E[βt+1(B)Ft]
=
1
evT Pt(B)
(16)
(cid:105)
as t → ∞. The conditional expectation can be expanded as:
=
qiPi,j
evT Pt(B)
× evT Ai→jPt(B)E[evT(cid:82)
i,j
Next, we analyze the ratio of exponentials for two separate cases. First, consider the case Pi,t([0, b]) =(cid:82) b
B Dt(x)pt(x)dxFt, (i, j)]
1/2. Using the definition of Xi,t, it follows that b ≤ Xi,t. This implies that li(yx, Ai,t) = f (i)
Using this fact and P (Yi,t+1 = yFt, (i, j)) = 1/2:
(17)
0 pi,t(x)dx ≤
1 (y) for all x ≤ b.
E[evT(cid:82)
(cid:16)
1
2
B Dt(x)pt(x)dxFt, (i, j)]
e(vi+vj)αi(1−2i)Pi,t(B) + e−(vi+vj)αi(1−2i)Pi,t(B)(cid:17)
=
= cosh((vi + vj)αi(1 − 2i)Pi,t(B))
(18)
where we used the fact that (ea +e−a)/2 = cosh(a). Second, considering the complementary case Pi,t([0, b]) > 1/2,
it follows that b > Xi,t, and:
Combining the two cases (18) and (19) and using the definition of µi,t(B), we obtain:
(19)
E[evT(cid:82)
B Dt(x)pt(x)dxFt, (i, j)]
= cosh((vi + vj)αi(1 − 2i)Pi,t(Bc))
E[evT(cid:82)
B Dt(x)pt(x)dxFt, (i, j)]
= cosh (viαi(1 − 2i)µi,t(B))
The proof is completed by substituting this expression into (17).
APPENDIX D
PROOF OF LEMMA 4
13
Proof: Using the definition of Λt, Jensen's inequality and the eigenrelation vT = vT A:
evT Ai→jPt(B) cosh((vi + vj)αi(1 − 2i)µi,t(B))
evT Ai→jPt(B)+(vi+vj)αi(1−2i)µi,t(B)
(cid:105)
(cid:104)
(cid:34)
1
2
Λt(B)
=
=
≥
1
evT Pt(B)
1
evT Pt(B)
Ei,j
Ei,j
+
1
2
+
1
2
1
evT Pt(B)
(cid:32)
1
2
(cid:32)
(cid:35)
(cid:33)
(cid:33)
evT Ai→jPt(B)−(vi+vj)αi(1−2i)µi,t(B)
evT APt(B)+Ei,j[(vi+vj)αi(1−2i)µi,t(B)]
evT APt(B)−Ei,j[(vi+vj)αi(1−2i)µi,t(B)]
=
1
2
1
evT Pt(B)
evT Pt(B)e
Ei,j[(vi+vj)αi(1−2i)µi,t(B)]
+ evT Pt(B)e−Ei,j[(vi+vj)αi(1−2i)µi,t(B)]
= cosh(Ei,j[(vi + vj)αi(1 − 2i)µi,t(B)])
≥ cosh(Ei[viαi(1 − 2i)µi,t(B)]) ≥ 1
We also used the fact that ea+e−a
above that cosh(Ei[viαi(1 − 2i)µi,t(B)]) a.s.−→ 1. From the property of cosh(·), it follows that
= cosh(a) ≥ 1 for all reals a. Since Λt(B) a.s.−→ 1, it follows from the bound
2
M(cid:88)
qiviαi(1 − 2i)µi,t(B) a.s.−→ 0
which further implies (1 − 2i)µi,t(B) a.s.−→ 0 for all i, since min vi > 0. Furthermore, µi,t(B) a.s.−→ 0 for i ∈ I1.
The proof is complete.
i=1
Proof: Integrating both sides of the recursion (2):
APPENDIX E
PROOF OF LEMMA 5
Unrolling (20) over R steps:
Pt+1(B) = AtPt(B) + dt+1(B)
(20)
Pt+R(B) = At+R−1 ··· AtPt(B)
+
At+R−1 ··· At+R−kdt+R−k(B)
R−1(cid:88)
k=0
Since the product of stochastic matrices is also a stochastic matrix, Proposition 1 implies:
Vt+R(B)
= max
≤ τ1(At+R−1 ··· At)Vt(B)
Pi,t+R(B) − min
i
i
Pi,t+R(B)
(cid:32)
R−1(cid:88)
k=0
+ max
i,j
(cid:32)
R−1(cid:88)
k=0
+
max
i
[At+R−1 ··· At+R−kdt+R−k(B)]i
(cid:33)
(cid:33)
− [At+R−1 ··· At+R−kdt+R−k(B)]j
≤ τ1(At+R−1 ··· At)Vt(B)
[At+R−1 ··· At+R−kdt+R−k(B)]i
− min
[At+R−1 ··· At+R−kdt+R−k(B)]i
≤ τ1(At+R−1 ··· At)Vt(B)
i
R−1(cid:88)
(cid:16)
+
di,t+R−k(B) − min
i
max
i
(cid:17)
di,t+R−k(B)
k=0
Proof: From Lemma 5, we obtain:
APPENDIX F
PROOF OF THEOREM 1
14
(21)
(22)
We next show that the remainder is asymptotically negligible-i.e.,
Re-writing the remainder term:
(cid:34)
R−1(cid:88)
(cid:34)
k=0
(cid:35)
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)Ft
(cid:35)
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)Ft
E[Vt+R(B)Ft] ≤ E[τ1(At+R−1 ··· At)Ft]Vt(B)
+
E
di,t+R−k(B) − min
i
max
i
di,t+R−k(B)
k=0
R−1(cid:88)
(cid:34)
R−1(cid:88)
R−1(cid:88)
k=0
E
i
E
=
k=0
max
(cid:34)
E(cid:104)
E(cid:104)
E
di,t+R−k(B) − min
i
max
i
di,t+R−k(B)
→ 0.
(cid:35)
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)Ft
(cid:12)(cid:12)(cid:12)Ft+R−k−1
(cid:12)(cid:12)(cid:12)Ft+R−k−1
(cid:105)
(cid:35)
(cid:105)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)Ft
di,t+R−k(B) − min
di,t+R−k(B)
i
di,t+R−k(B) − min
i
max
i
di,t+R−k(B)
max
≤ 4 max
di,t+R−k(B) − min
di,t+R−k(B)
{αi(1 − 2i)µi,t+R−k−1(B)}
i
i
In order to show (22), it suffices to show:
(23)
Note that if (23) holds, then Lemma 4 implies that µi,t+R−k−1(B) a.s.→ 0 as t + R − k − 1 → ∞, and as a result,
(22) follows. Thus, we next focus on proving the bound (23).
i
Using Proposition 2, we obtain for any γ > 0:
di,t+R−k(B) − min
di,t+R−k(B)
i
log
exp(γdl,t+R−k(B))
+ log
exp(−γdl,t+R−k(B))
E(cid:104)
(cid:34)
max
i
E
(cid:34)
≤ 1
γ
≤ 1
γ
l=1
(cid:32) M(cid:88)
(cid:32) M(cid:88)
(cid:32) M(cid:88)
(cid:32) M(cid:88)
l=1
l=1
(cid:12)(cid:12)(cid:12)Ft+R−k−1
(cid:105)
(cid:33)
(cid:33)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)Ft+R−k−1
(cid:33)
(cid:35)
(cid:33)(cid:35)
log
E[exp(γdl,t+R−k(B))Ft+R−k−1]
+ log
E[exp(−γdl,t+R−k(B))Ft+R−k−1]
15
(24)
where we used Jensen's inequality and the linearity of expectation.
Next, note that the (conditional) moment generating functions of the innovation terms can be written as a weighted
average of hyperbolic cosines:
l=1
E[eβdl,t+R−k(B)Ft+R−k−1]
M(cid:88)
=
qiPi,j cosh (βαi(1 − 2i)[ei + ej]lµi,t+R−k−1(B))
(25)
for any β ∈ R. To prove (25), set t(cid:48) = t + R − k − 1, and proceed similarly as in the proof of Lemma 3:
i,j=1
E[eγdl,t(cid:48)+1(B)Ft(cid:48)]
= Ei,j[E[eγdl,t(cid:48)+1(B)Ft(cid:48), (i, j)]Ft(cid:48)]
=
B[Di→j(x)pt(cid:48) (x)]ldx(cid:105)
qiPi,jE(cid:104)
eγ(cid:82)
=
qiPi,j cosh (γαi(1 − 2i)[ei + ej]lµi,t(cid:48)(B))
Plugging (25) into (24) and using Proposition 2 again, we obtain:
E
max
i
di,t(cid:48)+1(B) − min
i
di,t(cid:48)+1(B)
(cid:35)
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)Ft(cid:48)
(cid:88)
(cid:88)
i,j
i,j
l=1
M(cid:88)
M(cid:88)
(cid:32) M(cid:88)
(cid:32) M(cid:88)
i=1
i=1
i=1
(cid:88)
(cid:88)
i,j
i,j
(cid:34)
≤ 2
γ
≤ 2
γ
≤ 2
γ
≤ 2
γ
≤ 4
log
log
log
log
(cid:18)
(cid:33)
qiPi,j cosh (γαi(1 − 2i)[ei + ej]lµi,t(cid:48)(B))
qiPi,j exp (γαi(1 − 2i)[ei + ej]lµi,t(cid:48)(B))
max
i,j
(cid:16)
exp (γαi(1 − 2i)[ei + ej]lµi,t(cid:48)(B))
{αi(1 − 2i)µi,t(cid:48)(B)}(cid:17)(cid:33)
exp
2γ max
i
(cid:19)
γ
We have now proven (23) by taking γ → ∞ to tighten the bound.
i
max
{αi(1 − 2i)µi,t(cid:48)(B)} +
log M
Plugging (23) into (21):
Note that from Assumption 3, it follows that E[τ1(At+R−1 ··· At)Ft] ≤ 1 − < 1 for some ∈ (0, 1).
Lemma 4 implies that µi,t+R−k−1(B) a.s.→ 0, for all i ∈ I1. Note that here we used the positivity of the weights
αi along with the fact that i < 1/2. Define the non-negative sequence
E[Vt+R(B)Ft] ≤ E[τ1(At+R−1 ··· At)Ft]Vt(B)
+ 4
{αi(1 − 2i)µi,t+R−k−1(B)}
max
i
R−1(cid:88)
k=0
R−1(cid:88)
k=0
δ(R)
t
def
= 4
{αi(1 − 2i)µi,t+R−k−1(B)}
max
i
16
(26)
The above implies δ(R)
t
a.s.→ 0 as t → ∞. Taking the unconditional expectation of both sides in (26):
E[Vt+R(B)] ≤ (1 − )E[Vt(B)] + E[δ(R)
t
]
(27)
where E[δ(R)
t
] → 0 by the dominated convergence theorem. Using induction on (27), we obtain for all t = kR:
E[Vt(B)] ≤ (1 − )t/RE[V0(B)] +
(1 − )lE[δ(R)
t−(l+1)R]
Taking limits of both sides and using E[V0(B)] < ∞:
E[VkR(B)] ≤
lim sup
k→∞
E[V0(B)]
(1 − )lE[δ(R)
(k−1−l)R] = 0
t/R−1(cid:88)
(cid:19)
l=0
(cid:18)
lim
k→∞(1 − )k
k−1(cid:88)
+ lim
k→∞
l=0
Thus, the subsequence E[VkR(B)] converges to zero since Vt(B) ≥ 0. Since E[Vt+1(B)] ≤ E[Vt(B)] + E[δ(1)
all t ∈ N and E[δ(1)
further implies Vt(B)
] for
] → 0, it follows that the whole sequence E[Vt(B)] converges to zero. Markov's inequality
i.p.→ 0. The proof is complete.
t
t
APPENDIX G
Proof: Evaluating the density update at x = X∗:
PROOF OF LEMMA 6
(cid:88)
pt+1(X∗) = Atpt(X∗) + Dt(X∗)pt(X∗)
=
+ [(1 − αit)pjt,t(X∗) + αit2P (Yit,t+1Zit,t)pit,t(X∗)]
pl,t(X∗)el
l(cid:54)=it,jt
× (eit + ejt)
where Zi,t = I(X∗ ∈ Ai,t) is the query input to the noisy channel and P (Yi,t+1Zi,t) models the binary symmetric
channel for the ith agent. Taking the logarithm of both sides and using Jensen's inequality, we obtain for a
collaborating agent pair (it, jt):
log pit,t+1(X∗) = log[(1 − αit)pjt,t(X∗)
+ αit(2P (Yit,t+1Zit,t))pit(X∗)]
≥ (1 − αit) log pjt,t(X∗) + αit log pit,t(X∗)
+ αit log(2P (Yit,t+1Zit,t))
Writing this in vector form with the understanding that the logarithm of a vector is taken component-wise:
log pt+1(X∗) (cid:23) At log pt(X∗) + α log(2P (YtZt))(eit + ejt)
17
(28)
where we defined the response and query variables at time t as Yt = Yit,t+1 and Zt = Zit,t.
def
= At2At2−1 ··· At1 for t1 ≤ t2, and Φt1:t2 = I for t1 > t2. Using induction
Define the matrix product Φt1:t2
on (28), we obtain:
log pt+R(X∗) (cid:23) Φt:t+R−1 log pt(X∗)
R(cid:88)
+ α
Φt+R+1−k:t+R−1(eit+R−k + ejt+R−k)
k=1
× log(2P (Yt+R−kZt+R−k))
Let c (cid:31) 0 be the left-eigenvector of Φ = Φt:t+R−1 (cf. Assumption 3). Define the positive constants c
and αR
= mini (min{αi, 1 − αi})R. Left-multiplying (29) by cT :
cT log pt+R(X∗) ≥ cT log pt(X∗)
def
R(cid:88)
+ α · c · αR
log(2P (Yt+R−kZt+R−k))
(29)
def
= mini ci,
where we used the bound cT Φt+R+1−k:t+R−1ei ≥ c · αR,∀i, for k = 1, . . . , R. By induction, we have for m ∈ N:
k=1
cT log pmR(X∗) ≥ cT log p0(X∗)
m(cid:88)
R(cid:88)
+ α · c · αR
log(2P (Y(m−l)R−kZ(m−l)R−k))
l=1
k=1
Then, using the strong law of large numbers (LLN):
cT log pmR(X∗)
R(cid:88)
m(cid:88)
lim inf
m→∞
≥ α · c · αR lim
m→∞
1
m
log(2P (Y(m−l)R−kZ(m−l)R−k))
(cid:35)
l=1
k=1
log(2P (YR−kZR−k))
1
m
(cid:34) R(cid:88)
(cid:18)
k=1
(cid:19)
max
i∈I1
i
=: K > 0
= α · c · αR · E
≥ α · c · αR · C
where C() is the channel capacity of a BSC with crossover probability .
REFERENCES
[1] T. Tsiligkaridis, B. M. Sadler, and A. O. Hero, "Collaborative 20 Questions for Target Localization," IEEE Transactions on Information
Theory, vol. 60, no. 4, pp. 2233 -- 2252, April 2014.
[2] -- -- , "On Decentralized Estimation with Active Queries," IEEE Transactions on Signal Processing, vol. 63, no. 10, pp. 2610 -- 2622,
[3] R. Sznitman and B. Jedynak, "Active testing for face detection and localization," IEEE Transactions on Pattern Analysis and Machine
May 2015.
Intelligence, vol. 32, no. 10, pp. 1914 -- 1920, 2010.
and Machine Intelligence, vol. 18, no. 1, January 1996.
[4] D. Geman and B. Jedynak, "An Active Testing model for Tracking roads in Satellite Images," IEEE Transactions on Pattern Analysis
[5] R. Castro and R. Nowak, "Active learning and sampling," in Foundations and Applications of Sensor Management. Springer, 2007.
[6] Y.-C. Wu, Q. Chaudhari, and E. Serpedin, "Clock Synchronization of Wireless Sensor Networks," IEEE Signal Processing Magazine,
vol. 28, no. 1, pp. 124 -- 138, January 2011.
[7] W. Xia and M. Cao, "Sarymsakov Matrices and Asynchronous Implementation of Distributed Coordination Algorithms," IEEE
Transactions on Automatic Control, vol. 59, no. 8, pp. 2228 -- 2233, August 2014.
[8] A. Renyi, "On a problem of information theory," MTA Mat. Kut. Int. Kozl. B, vol. 6, pp. 505 -- 516, 1961.
18
[9] S. Ulam, Adventures of a Mathematician. New York: Charles Scribners Sons, 1976.
[10] M. V. Burnashev and K. S. Zigangirov, "An interval estimation problem for controlled observations," Problems in Information
[11] M. Horstein, "Sequential Transmission using Noiseless Feedback," IEEE Transactions on Information Theory, vol. 9, no. 3, pp. 136 -- 143,
[12] O. Shayevitz and M. Feder, "Communication with Feedback via Posterior Matching," in IEEE International Symposium on Information
[13] -- -- , "Optimal Feedback Communication via Posterior Matching," IEEE Transactions on Information Theory, vol. 57, no. 3, pp. 1186
[14] B. Jedynak, P. I. Frazier, and R. Sznitman, "Twenty questions with noise: Bayes optimal policies for entropy loss," Journal of Applied
[15] R. Waeber, P. I. Frazier, and S. G. Henderson, "Bisection search with noisy responses," SIAM Journal of Control and Optimization,
[16] A. Jadbabaie, P. Molavi, A. Sandroni, and A. Tahbaz-Salehi, "Non-bayesian Social Learning," Games and Economic Behavior, vol. 76,
Transmission, vol. 10, pp. 223 -- 231, 1974.
July 1963.
Theory, June 2007, pp. 391 -- 395.
-- 1222, March 2011.
Probability, vol. 49, pp. 114 -- 136, 2012.
vol. 53, no. 3, pp. 2261 -- 2279, 2013.
pp. 210 -- 225, 2012.
[17] P. Molavi, A. Jadbabaie, K. R. Rad, and A. Tahbaz-Salehi, "Reaching Consensus with Iincreasing Information," IEEE Journal of
Selected Topics in Signal Processing, vol. 7, no. 2, pp. 358 -- 369, April 2013.
[18] S. Boyd, A. Ghosh, B. Prabhakar, and D. Shah, "Randomized gossip algorithms," IEEE Transactions on Information Theory, vol. 52,
no. 6, pp. 2508 -- 2530, June 2006.
[19] T. D. Cover and J. A. Thomas, Elements of Information Theory. Wiley, 2006.
[20] J. N. Tsitsiklis, D. P. Bertsekas, and M. Athans, "Distributed asynchronous deterministic and stochastic gradient optimization algorithms,"
IEEE Transactions on Automatic Control, vol. 31, no. 9, pp. 803 -- 812, Sept. 1986.
[21] V. D. Blondel, J. M. Hendrickx, A. Olshevsky, and J. N. Tsitsiklis, "Convergence in multiagent coordination, consensus, and flocking,"
in Proc. Joint 44th IEEE Conf. Decisions Contr. Eur. Contr. Conf., December 2005, pp. 2996 -- 3000.
[22] A. Nedic and A. Ozdaglar, "Distributed subgradient methods for multiagent optimization," IEEE Trans. Autom. Control, vol. 54, no. 1,
[23] A. I. Chen and A. E. Ozdaglar, "A fast distributed proximal-gradient method," in Proc. Allerton Conf. Commun., Contr., Comput.,
pp. 48 -- 61, January 2009.
October 2012, pp. 601 -- 608.
[24] S. Patterson, Y. C. Eldar, and I. Keidar, "Distributed Compressed Sensing for Static and Time-Varying Networks," IEEE Trans. Signal
Processing, vol. 62, no. 19, pp. 4931 -- 4946, October 2014.
[25] E. Seneta, Non-negative Matrices and Markov Chains, 2nd ed. New York: Springer, 1981.
[26] I. C. F. Ipsen and T. M. Selee, "Ergodicity Coefficients defined by Vector Norms," SIAM J. Matrix Anal. Appl., vol. 32, no. 1, pp.
153 -- 200, 2011.
[27] M. Chen, S. C. Liew, Z. Shao, and C. Kai, "Markov Approximation for Combinatorial Network Optimization," IEEE Transactions on
Information Theory, vol. 59, no. 10, October 2013.
[28] S. Boyd and L. Vandenberghe, Convex Optimization. Cambridge University Press, 2004.
[29] P. Gupta and P. R. Kumar, "The capacity of wireless networks," IEEE Trans. Inf. Theory, vol. 46, no. 2, pp. 388 -- 404, March 2000.
[30] A. Berman and R. J. Plemmons, Nonnegative matrices in the Mathematical Sciences. Academic Press, New York, 1979.
[31] P. Billingsley, Probability and Measure.
[32] R. Durrett, Probability: Theory and Examples, 3rd ed. Duxbury Press, Belmont, CA, 2005.
John Wiley & Sons, Inc., Hoboken, NJ, 2012.
|
1706.00968 | 1 | 1706 | 2017-06-03T15:24:28 | Precious Time: Understanding Social Stratification in the Knowledge Society Through Time Allocation | [
"cs.MA"
] | The efficient use of available resources is a key factor in achieving success on both personal and organizational levels. One of the crucial resources in knowledge economy is time. The ability to force others to adapt to our schedule even if it harms their efficiency can be seen as an outcome of social stratification. The principal objective of this paper is to use time allocation to model and study the global efficiency of social stratification, and to reveal whether hierarchy is an emergent property. A multi-agent model with an evolving social network is used to verify our hypotheses. The network's evolution is driven by the intensity of inter-agent communications, and the communications as such depend on the preferences and time resources of the communicating agents. The entire system is to be perceived as a metaphor of a social network of people regularly filling out agenda for their meetings for a period of time. The overall efficiency of the network of those scheduling agents is measured by the average utilization of the agent's preferences to speak on specific subjects. The simulation results shed light on the effects of different scheduling methods, resource availabilities, and network evolution mechanisms on communication system efficiency. The non-stratified systems show better long-term efficiency. Moreover, in the long term hierarchy disappears in overwhelming majority of cases. Some exceptions are observed for cases where privileges are granted on the basis of node degree weighted by relationship intensities but only in the short term. | cs.MA | cs |
Precious Time: Understanding Social Stratification in the
Knowledge Society Through Time Allocation
Michal Kakol, Radoslaw Nielek, Adam Wierzbicki
October 17, 2018
Abstract
The efficient use of available resources is a key factor in achieving success on both personal
and organizational levels. One of the crucial resources in knowledge economy is time. The
ability to force others to adapt to our schedule even if it harms their efficiency can be seen
as an outcome of social stratification. The principal objective of this paper is to use time
allocation to model and study the global efficiency of social stratification, and to reveal whether
hierarchy is an emergent property. A multi-agent model with an evolving social network is
used to verify our hypotheses. The network's evolution is driven by the intensity of inter-
agent communications, and the communications as such depend on the preferences and time
resources of the communicating agents. The entire system is to be perceived as a metaphor of
a social network of people regularly filling out agenda for their meetings for a period of time.
The overall efficiency of the network of those scheduling agents is measured by the average
utilization of the agent's preferences to speak on specific subjects. The simulation results
shed light on the effects of different scheduling methods, resource availabilities, and network
evolution mechanisms on communication system efficiency. The non-stratified systems show
better long-term efficiency. Moreover, in the long term hierarchy disappears in overwhelming
majority of cases. Some exceptions are observed for cases where privileges are granted on the
basis of node degree weighted by relationship intensities but only in the short term.
Introduction
1
Although most of us probably tire of endless meetings, in reality, a substantial part of added value
produced by knowledge workers is somehow related to meetings. Passing or gathering information,
evaluating progress of team members, assigning tasks, selling ideas or asking people for help -- such
activities require not only our time but also synchronization of people participating in meetings.
The question as to who should synchronize with whom is determined by social hierarchy. If someone
wants to sell you a new insurance policy, you can pick the meeting place. On the other hand, if
you want to convince your boss or supervisor to allocate some resources for your project, you must
adjust to his or her daily plans.
Some signs of hierarchy are visible in nearly all communities. Existing exceptions, such as
Anonymous, hippie communes, or many anarchists, have taken their lack of hierarchy as their
hallmark. A variety of processes can influence the order of hierarchy in a particular community.
Sometimes, especially in companies, a formal title held by a person is translated almost directly
into a position in the hierarchy.
In other cases, individual trails or particular skills are more
important. Sometimes, hierarchy is related to race, skin color, place of birth, or wealth.
Hierarchy in a society results from a stratification system. Its components, e.g., social processes
and institutions, generate inequalities in control over resources among its members [Gru94]. The
privileged enjoy a disproportionate share of valued resources, thereby constituting a hierarchy
based on social traits. Eventually, as a feedback loop, the hierarchy recreates the inequalities.
In this article, we focus on the existence of hierarchies in the knowledge society, where time and
exchange of ideas during (virtual or real, but equally time-consuming) meetings are a basis of work
and added value creation. In its most developed form, the knowledge society is exemplified by the
Silicon Valley. The motto of this paper is a quote from Vivek Wadhwa, a well-known American
technology entrepreneur and academic. The quote inspires several of our hypotheses, which are
related to a decreased effectiveness and stability of hierarchies in the modern knowledge society.
The relationship between time and social position in the knowledge society seems evident, but
is still not sufficiently understood. Broadly speaking, agents' behaviors and privileges influence
1
their ability to manage time (described in detail in the Model section). Insight into the use of
time, a key economic component affected by social stratification, can have practical implications.
Productivity of a company can be determined largely by rigidness of organizational hierarchy and
enforced strategies of managing workers' time. This is especially true for companies profiting from
the knowledge economy. As a matter of fact, decreasing hierarchies and reducing constraints on
individual time management has been advocated as a successful recipe for knowledge companies
[TW08].
Our approach assumes that agents do not care about other agents' utilities or performance on
the societal level. Agents are greedy, and attempt to maximize only their own utility. However,
we are concerned with the global efficiency of a social system. Measuring the efficiency of social
systems is a difficult task that can be addressed from various perspectives. In our research, we
use a social simulation approach that enables us to investigate the emergent effect of individual
agent's strategies on the global welfare.
The following hypotheses, regarding our model of the knowledge society, are tested in this
article:
• H1: Egalitarian knowledge societies and communities are more efficient;
• H2: Application of advanced procedures of time allocation (more intelligent algorithms) on
the agent level helps to overcome the influence of stratification in knowledge society;
• H3: Social stratification is an emergent property, but does not persist in the long term in
stable knowledge societies.
In section Related works, we present related work in sociology and, specifically, in stratification,
including related work on its modeling. Later sections cover the description of our multi-agent
model (section Model), the measures used to evaluate it (section Measures), and the results in the
order of tested hypotheses (section Results). Finally, we conclude by discussing the results and
future work in Discussion.
Related works
It is widely agreed that differentiation of social groups into hierarchical layers is present in all
developed societies. It is a worldwide phenomenon and except for utopian visions, no fully egal-
itarian social system has yet been found to work. However, since the underlying reasons can be
disputed or interpreted through the lens of ideology, we venture to relate a couple of examples.
These inequalities are so deeply embedded in our culture that not only do the privileged legitimize
the mistreatment of some groups, but paradoxically the mistreated also accept and justify this
mistreatment. [JBN04] Parents show us our position in society and teach us to expect that same
level. A study by [Hur11] has shown that legacy students (whose parents attended a particular
college) are more likely to be admitted to elite colleges. We expect this, and we obtain it, according
to the saying that "the rich get richer." [MBH+09] found that today's technological advances make
it easier to transfer wealth, and thus also the associated status, between generations.
Are inequalities that bad after all? The evidence is mixed and often ideologically underpinned.
[WPC09], with a self-explaining title, "Why more equal societies almost always do better," linked
inequality with various social problems (e.g., obesity, homicide, and higher infant mortality). De-
spite the existence of sound evidence confirming that link, there is an ongoing discussion regarding
the study's methodology. [Sno10] [Sau10] In contrast to the mentioned findings, [Row11] attempted
to prove that no correlation exists between income equality and social problems. [Atk96] went even
further and claimed that inequality fuels economic growth. Although the issue of social stratifi-
cation and inequality has been a subject of extensive research and debate over many years, the
relation between inequality and prosperity still remains unsettled.
Stratification is most often considered in terms of economic inequality. Nevertheless, let us
consider a hypothetical example in which the president of the United States finds an exceptionally
urgent matter to discuss with the author of this article. Even under such conditions, the invited
author would obviously need to adapt to the president's schedule. This example depicts well the
obvious link between time availability and social status.
Time usage and its availability can also be a consequence of stratification -- those on the bottom
of a hierarchy have less control over how they use their time and must adapt to those at the top
2
of the ladder. One can argue that there is hardly any relation, but since economics in general is
the study of how agents allocate scarce resources, time allocation is of economic interest, as it is
one of the key factors in understanding economic phenomena. Moreover, time is a component of
nearly every economic undertaking. It is a part of market labor and a key input to consumption, as
consumed commodities are produced with it, as much as market goods and production technology
and the consumer's time [Bec65]. The classic literature on time allocation in the United States can
be found in [GB75] and [JS85], which examined trends of time allocation based on time diaries,
and an extension of it can be found in [RG10]. Moreover, [AH06, AH08] reported an interesting
link between time usage patterns and socio-economic status according to which, over the last 20
years, less educated men increased the time they allocated to leisure, while more educated men
reported a decrease.
To the authors' best knowledge, there are several computational models of societies incorpo-
rating hierarchy that focus more or less directly on stratification.
[Sma99] proposed a model of
Tongan society that simulated the relationship of warfare and traditional Tongan rules of mar-
riage. Another model of Pacific island societies, proposed by [You10], modeled the relationship
between limited resource usage and different leadership models.
[RCME07] introduced a simu-
lation of promotion competition between male and female workers in a corporate environment,
specifically modeling the disparity of female representation at the highest corporate management
level. Although the proposed simulation included the temporal dimension, it modeled the problem
on a company level, and its resolution could not cover workers' social relations or schedules.
[FS07] described a model of time-use behavior. The model was fed with an empirical dataset
gathered in a time-use diaries survey, but ignored the social aspect of time-allocation and the
role of interaction between agents. Models in which interactions between agents are used for time
allocation have been researched by [WNK09], but for different purposes, namely emergence of
time-usage patterns and infection spreading [NWK08]. [SW12] also introduced a simulation of the
emergence of complex social networks based on the intensity of relations and provided an overview
of similar works, i.e., stratification into layers on an individual level by intensity of relations. The
approach presented in the aforementioned paper has been implemented in our model.
Model
The problem we have modeled consists of two components, the relation between the agents and
the communication occurring between them, making it not only a social network but also a com-
munication system. Formally, we move the problem to a social space with a defined topology, with
points representing agents and metrics of their distance, e.g., their relation strength (i.e. social
network). The relations of the actors can potentially be represented as vectors and the network
as a summation of these vectors, i.e., as a two-dimensional matrix. Such matrices in [Klu00]
are called socio-matrices or Moreno matrices; moreover, [Ley94] introduces an analogical formula-
tion for communication systems. Communication is modeled by an algorithm that searches for a
communication partner based on the agent relation topology.
The model described in this paper is a multi-agent system implemented in NetLogo and based
purely on a social network approach (no spatial dimension). The agents are embedded in a network
of relations between them, communicating with each other to fulfill their need to "talk" on various
subjects. The flowchart in Fig. 1 depicts a single model step in which the agents are executed
one after another (in a particular order) trying to fill in their "weekly" schedules. The details
on each component of the model step are presented in the following sections. Note here that
the order in which agents fill in their schedules may be fixed at the beginning of the simulation,
during model initialization (for the scenarios that model a strict hierarchy) or may be determined
in the beginning of each model step (for scenarios that model an egalitarian or mobile approach
to scheduling agent meetings).
The size of the agent population is constant over the simulation. Removing or introducing
new agents is not implemented in this model, and thus a single simulation can be referred to as
presenting the population in a short time frame, sufficiently short to say that the population does
not change. A single agent corresponds to a person, and the edge between agents represents a
symmetrical acquaintanceship -- both agents are linked with equal strength, and therefore both are
equally capable of arranging a meeting.
According to the social brain hypothesis and the findings of Dunbar, human relationships are
characterized by different levels of intensity [Dun96, Dun98], which in the model is a link's strength
3
attribute. The strength of the relationship between agents depends on the frequency of interactions
between them and has been modeled according to the study of [Hay89] - -- agents communicate
only with the agents they are directly connected to, the unused connections get weaker until they
break up, and those frequently used are strengthened by analogy. The procedure of edge strength
modification is described in detail in the Network evolution section.
On the population level, there is a finite set of all possible topics/interests parameterized in the
model as culture. Every agent has a set of interests, a subset (equal size for all the agents) drawn
from the culture with a probability following a normal distribution. Therefore, some subjects
are quite rare in the population (e.g., Persian poetry) and some very popular (e.g., football).
Additionally, every agent possesses a willingness attribute for each subject, which is assigned
randomly from zero to one with a uniform distribution for every interest, thus representing an
agent's inclination for a given subject. An agent's willingness expresses any individual agents
creativity and ability to contribute new ideas on a topic. Finally, every agent is equipped with the
same number of time slots to arrange its meetings in.
The source code of the presented model, as well as a comprehensive list of model parameters,
together with additional resources, can be found on the model's webpage http://users.pjwstk.
edu.pl/~s8811/papers/stratification/.
Meeting scheduling procedures
The modeled agents' principal objective is a kind of rational choice, namely, to fulfill maximally
their need to communicate. This need, i.e., "willingness," is an attribute of each subject in a set of
interests of a particular agent and is reduced each time an interaction between neighboring agents
sharing the same interest occurs. The payoff of their actions is the sum of the used instances of
willingness, which they try to maximize. At every turn for every agent, a scheduling procedure
is invoked that is responsible for finding partners for meetings and filling agents' time slots. A
meeting occurs when two agents agree on a particular common free time slot and subject. Every
scheduled meeting consumes a time slot and willingness to discuss a particular subject. Letting
s1 be willingness to discuss a subject 1 for agents A and B, respectively, the remaining
W A
willingness for agent A after the meeting can be calculated using the following formula:
s1 and W B
(cid:16)
(cid:17)
W (cid:48)A
s1 = W (cid:48)A
s1 − min
W (cid:48)A
s1, W (cid:48)B
s1
(1)
Figure 1: Simulation loop elements.
4
InitilizemodelMaximumstepreached?Executea modelstepFill in agents'schedulesReport model and agentsstatusNoStopYesUpdateedge weightsAdd new/remove Expired edgesModifynetworkbased on informationwhether vertices arrangeda meeting in this stepNotice that the result of eq. 1 for one of the two agents participating in the meeting will always
equal zero, thereby excluding this agent as a communication partner for other agents in the current
step. A meeting consumes a single time slot, with a length that is limited and might be interpreted
as days of the week planned in advance by each agent.
The egoistic goal of the agent is to maximize its own willingness usage; hence, we use an average
value of used willingness as an overall measure of network efficiency in the model, i.e., the extent
to which the agents are utilizing their preferences. The average willingness usage expresses the
global utilization of ideas generated by all agents in a knowledge society or community. Maximizing
average willingness usage is a combinatory problem and can be solved in many ways, but finding
an optimal solution requires algorithms with exponential complexity. As users have only limited
resources, they must rely only on approximation algorithms (heuristics). Two heuristics have been
implemented and tested:
(cid:1); every agent repeats this
s1, W B
s1
1. Simple -- agent A chooses a random agent B from its acquaintances and if they share a free
time slot, selects a subject S, in order to maximize min(cid:0)W A
procedure a limited number of times (model's parameter),
2. Intelligent -- agent A iterates over the list of its' subjects sorted in descending order by
willingness to talk; for each of the iterated subjects all days of the week are used to find a
partner B with maximal willingness to talk; this heuristic can be summarized as "trying until
success".
For a detailed flowchart, see Appendix I.
Stratifying the system
The stratification in the proposed model manifests in three agent initialization orders followed by
schedule filling, simulating different levels of inequality and rigidity as defined in [Gru94].
1. Egalitarian -- The baseline used in the model is a random order of executing the agents
and is treated as a metaphor of an egalitarian system with equal opportunities to make
appointments; the inequalities and rigidity in such a system are low.
2. Hierarchical -- In the hierarchical scheduling method, each agent in the system has a fixed
place in the hierarchy, and thus the agents are executed in the same order throughout the
entire model run, at every turn. This can be referred to as the highest level of inequality and
rigidity in the system.
3. Mobile -- In the mobile method, differentiation of the agents occurs at every turn. At each
turn, the agents (nodes) are ordered according to their network degrees weighted by their
relations' strengths, resulting in a medium level of inequality and rigidity in the system. A
node's degree is interpreted (in accordance with much research in social network theory) as
the nodes social capital or influence, which determines the node's ability to schedule meetings
ahead of less influencial nodes.
Network evolution
In the initial network, relations between the agents are generated with a given density (we arbi-
trarily used settings of 0.2% or 0.6%). However, the network changes based on the outcome of
interactions between agents. The evolution of the network is shaped by three procedures that are
invoked after every turn:
1. Edge strength updating -- basically, this procedure looks up all edges in the model and
updates their strengths according to the activity at the last turn, namely, the strength of every
edge that has been used for a successful meeting arrangement is increased and the strengths of
unused edges are decreased; two separate updating functions have been implemented, linear
and logarithmic, binding the pace of relation change with their strength,
2. Edge creation -- according to the simulation parameters, new edges are created using two
heuristics, triadic closure ("my friend's friend") [Oys00] approach, in which there is some
probability that a new edge appears between two agents that have at least one common
5
friend, and the "random meeting" approach, which is simulated by the creation of an edge
between two random agents in the population. However, an additional parameter in the
model was added controlling the choice of a new neighbor. By default, the neighbors are
chosen randomly with equal probabilities, but a preferential mode can be activated to choose
more likely new neighbors of a greater network degree, i.e., preferring more popular agents.
3. Edge removing -- edges that are not used sufficiently frequently (i.e., their strength reaches
zero) are removed.
Measures
All measurements were taken after each turn, as all the agents' schedules were filled and the network
had changed accordingly. Along with the well-known network metrics (e.g., network density and
average degree), other measures were also used - measures of ranking comparison and two measures
expressing efficiency of different stratification procedures and heuristics for arranging meetings (all
normalized to one).
Schedule usage represents the percentage of all days in the schedules used in one turn and is
calculated using eq. 2,
ScheduleU sage =
i=1 Ti
N ∗ weekdays
where N is the number of agents, and Ti is the number of used time slots of the i-th agent.
Willingness usage represents the percentage of "consumed" willingness of all agents in one
turn in relation to all available willingness and is calculated using eq. 3,
W illingnessU sage =
where N is the number of agents, SUi is the sum of used willingness points in the i-th agent's
schedule, and Si is the sum of willingness points of all subjects in the ith agent's interest set.
Kendall Tau distance
To measure the differences between agents' execution order lists for consecutive simulation steps,
we arbitrarily decided to use the Kendall Tau distance. This distance is a measure between two
full rankings (over the same set of n elements) that counts the number of pairwise disagreements
between those two rankings [BFB09]. We used the normalized Kendall Tau distance, i.e., multiplied
by the maximum value of the metric: n(n−2)
.
(cid:88)
{i,j}∈P
K (σ1, σ2) =
K i,j (σ1, σ2)
KN (σ1, σ2) =
2
n (n − 2)
K (σ1, σ2)
n
(cid:40)
where σ is a list or ranking, n is the number of elements in the list, P is a set of unordered
pairs of distinct list elements, and K i,j (σ1, σ2) is a comparison of single elements i and j in both
compared lists:
K i,j (σ1, σ2) =
0 ⇔ i, j
1 ⇔ i, j
are in the same order
are in reverse order
(6)
Order list cardinality We introduced this measure to monitor the stability of the set of
privileged agents in consecutive model steps, i.e., the agents executed first. Precisely, we used the
top 100 agents from the order list representing the execution order of all 1,000 agents. To measure
the differences between those incomplete rankings, we used the simplest measure available.
In
favor of distance measures for partial rankings [BFB09], we used the cardinality of the intersection
of the partial rankings, thus monitoring the number of common agents remaining in the "elite" in
consecutive steps.
σ1 ∩ σ2
6
(7)
(cid:80)N
(cid:80)N
(cid:80)N
i=1 SUi
i=1 Si
(2)
(3)
(4)
(5)
Results
Egalitarian societies are more efficient
The results of the 72 parameter combinations (four points in time for each parameter set are
considered, i.e., the 200th step, 300th step, 500th step, and the last 1,000th step) prove that
the Egalitarian execution method, which represents a system with no hierarchy at all, results in
higher willingness usage in the majority of cases. The egalitarian scheduling method achieved the
highest willingness usage mean in 76% of tested runs; see Fig. 2. Most importantly, the pairwise
comparison of all three stratification methods in all of the runs showed statistically significant
differences in the means (p < 0.0001, Bonferroni-Dunn test for multiple comparisons). In 19.1%
of the cases, a single compared pair of the mean values showed no significant difference. However,
these were mostly pairs of Hierarchical and mobile (76.3%). Moreover 74.5% of the cases with an
insignificantly different pair were those for which Egalitarian still showed the best performance in
terms of average willingness usage value.
Obviously, there are cases in which Egalitarian does not show a better performance than strati-
fied mobile and Hierarchical. Apparently, the performance of the egalitarian system improves over
time, as the random execution order shows the greatest willingness usage values in only approx-
imately 60% of cases for the first 300 turns, but 82% for 500 turns, and eventually 100% in the
1,000th turn (details on Fig. 3). This can be interpreted as indicating that random executions
lead to the best long-term performance. Additionally, the advantage of random order in terms
of willingness usage is most common for systems of scarce time resources (five time slots). The
percentage of cases in which Egalitarian shows better efficiency is inversely proportional to the
number of available time slots. Eventually, for 25 timeslots, these cases amount to only 68%.
The advantage of the privileged agents (first to be executed) is clearly visible in the data,
and apparently this effect is common. The agents executed in first place surpass the rest of the
agents in terms of willingness usage. The increase of efficiency on average for those first 10%
agents compared to the remainder 90% of the system amounts to 20.3%, 24.4%, and 32.0% for
Egalitarian, Hierarchical, and mobile, respectively (calculated for all tested runs). This effect exists
for all tested parameter sets, and under these conditions, the agents privileged by execution with
higher priority are in the best position.
Fig. 4 and 5 depict the model willingness usage output for two time-allocation strategies, i.e.,
Intelligent and Simple. For both methods, the random execution Egalitarian shows better model
efficiency in the area of model stability. For Intelligent time allocation, however, the stratified
execution method by weighted degree has an advantage over random execution in some of its first
hundred steps. This effect is temporary and involves only the warm-up phase. What happens
exactly is that for the Intelligent partner finding heuristic, the Mobile method for ordering agents
surpasses the Egalitarian one in terms of the willingness usage value. For a simple conversation
Figure 2: Percentage of cases in which a parameter set results in the greatest Willingness Usage value for
a particular Execution Order by simulation step number.
7
25030050010000%10%20%30%40%50%60%70%80%90%100%NoneDegreeFixedSimulation step # (turn in which value was measured)% cases Mobile Hierarchical Egalitarianarrangement scheme, Egalitarian resulted in the greatest willingness values in the overwhelming
majority of cases. In contrast to what happens when Intelligent arrangements are used, the share
of cases in which Egalitarian is the most efficient drops to roughly 22% for the 250th step. However
in the long term, that is at the 1,000th step, Egalitarian random execution again results in the
best efficiency in 100% of cases.
The introduction of the Intelligent partner finding heuristic might be a metaphor for the digital
revolution. The Intelligent heuristic leading to more sophisticated schemes of arranging meetings
with other agents results in more efficient search for conversation partners. This can be referred
easily to contemporary advances in communication, such as Internet usage, with which we are
eventually going to find a "soul mate" sharing our interests. In light of the simulation results (see
Table 1 and Table 2), introduction of "intelligent" meeting arrangement schemes helps to boost
a stratified system's efficiency. However this effect applies to short-term results only as, in the
long term, i.e., at approximately the 1,000th step, random execution approximating an egalitarian
system shows the best efficiency after all. In other words, application of advanced procedures of
time allocation at the agent level does not overcome the consequences of stratification.
Figure 3: Percentage of cases in which a parameter set results in the greatest Willingness Usage value for
a particular Execution Order by number of time slots.
Figure 4: Willingness usage values for the entire model run with the "Intelligent" partner finding heuristic.
8
515250%10%20%30%40%50%60%70%80%90%100%NoneDegreeFixedNumber of weekdays (timeslots)% cases Mobile Hierarchical EgalitarianSimulation step #01002003004005006007008009001000 MobileHierarchical EgalitarianExecution order0.70.60.50.40.30.20.1Mean WillingnessusageSelected modelparameters#agents#culture#timeslots#subjectsPart. searchOrderPref. Attacg.Initial density10005001515Intell.*True0.002Table 1: Percentage of simulation runs in which particular execution method results in
the highest willingness usage values for particular simulation step. Results for simple
partner finding heuristic.
Step
Egalitarian
Mobile
Hierarchical
100.00% 97.22% 94.44% 100.00%
0.00%
0.00%
Agentset switch
0.00%
5.56%
0.00%
2.78%
500
1000
0.00%
0.00%
300
250
Table 2: Percentage of simulation runs in which particular execution method results
in the highest willingness usage values for particular simulation step. Results for
intelligent partner finding heuristic.
Agentset switch
Step
Egalitarian
Mobile
Hierarchical
250
300
500
1000
22.22% 27.78% 69.44% 100.00%
0.00%
77.78% 72.22% 25.00%
0.00%
5.56%
0.00%
0.00%
Emergence of social stratification
While analyzing the model results, we wanted to know whether such loosening of system rigidity
would lead towards randomness or back to strict order. To determine the answer, each model
performed a dump of the agents' identification number list in the order in which they were executed
in the particular simulation step. We assume that comparing those execution order lists will provide
the answer.
As described in the Measures section, the execution order list comparison involves a)computing
the Kendall Tau distance between consecutive lists, and b)computing the order list cardinality of
two consecutive execution order lists limited to only the first 100 agents. Note that the follow-
ing section focuses on describing the results corresponding to the Mobile execution method only.
Another reason for such a choice is the fact that distributions for the remainder of the execution
methods are constant and can be summed up as follows.
In contrast to the results of the Egalitarian (random ordering) and hierarchical (fixed ordering)
methods, the Kendall Tau distance distribution of Mobile shows more interesting features. Fig. 6
and 7 depict a typical run of the model and the values of the distance measure. The characteristic of
most importance is the sharp decline in the first 200 to 300 steps and the steady climb afterwards.
The plummeting of the Kendall Tau distance values in the warm-up phase of the model run
exists in almost 67% of tested cases. We take it as a sign of the progressive organization of the
manner in which the agents are executed. Literally, the distance between compared consecutive
In other words, each consecutive list of agents'
order lists decreases over the warm-up phase.
Figure 5: Willingness usage values for the entire model run with the "Simple" partner finding heuristic.
9
Simulation step # MobileHierarchical EgalitarianExecution order01002003004005006007008009001000 Selected modelparameters#agents#culture#timeslots#subjectsPart. searchOrderPref. Attacg.Initial density10005001515Simple*True0.002Mean Willingnessusage0.60.50.40.30.2execution order is more similar to the previous one, i.e., is more similarly ordered. After this
decrease, the value of the distance climbs steadily, i.e., the consecutive order lists become less
commonly ordered, and the system loosens its rigidity. This described upward trend exists in
nearly 71% of cases.
Apart from the visual identification of the trends, we measured the linear correlation between
the distance value and the model step number. Tables 3 and 4 present the binned correlation values
for different parameters separately, as well as for all the model runs. The advantage of negative
correlation in the first steps and positive correlation in general over the entire model run is clearly
visible. Also depicted in Figure 8 is where the correlation value distribution is compared for the
initial warm-up model phase and all 1,000 steps.
An interesting pattern in changes of distance values can be observed for different numbers of
available time slots. The discussed decrease in the initial model phase is more prominent when
more time slots are available. For 25 weekdays, 100% of cases are affected by the initial decrease,
compared to only 12.5% for five weekdays. A similar relation between number of weekdays and the
cardinality of the intersection of two consecutive agent execution order lists can also be observed.
The intersections of the consecutive order lists (first 100 agents only) are measured in order
to examine whether the set of 10% of agents to be executed first, the "privileged" caste, remains
constant over the entire model run. The intersection cardinality value indicates the number of
Figure 6: Distribution of Kendall Tau distance for consecutive model steps for a sample set of parameters
and Mobile execution only, raw data.
Figure 7: Distribution of Kendall Tau distance for consecutive model steps for a sample set of parameters
and Mobile execution only, moving average smoothing.
10
Simulation step #Kendall Tau distanceSelected modelparameters#agents#culture#timeslots#subjectsPart. searchOrderPref. Attacg.Initial density10002501515Intell.MobileFalse0.002200040060080010000.500.480.460.440.42Simulation step #Kendall Tau distance(moving average, smoothed)Selected modelparameters#agents#culture#timeslots#subjectsPart. searchOrderPref. Attacg.Initial density10002501515IntellMobileFalse0.002200040060080010000.460.450.470.48ranges of correlation value
Table 3: Summary of the Kendall Tau distance -- step number correlation for different
parameter sets. Percentage of runs for given set of parameters for which correlation
is within one of three ranges. Results for first 100 steps.
(0.1; 1(cid:105)
0.00%
2.78%
4.17%
0.00%
0.00%
0.00%
2.78%
0.00%
2.78%
1.39%
100 steps
(cid:104)−0.1; 0.1(cid:105)
33.33%
30.56%
83.33%
12.50%
0.00%
33.33%
30.56%
30.56%
33.33%
31.94%
(cid:104)−1;−0.1)
66.67%
66.67%
12.50%
87.50%
100.00%
66.67%
66.67%
69.44%
63.89%
66.67%
Number of
weekdays
(timeslots)
New links
algorithm
Preferential
Uniform
Intelligent
Simple
250
500
5
15
25
Culture size
Arrangements
Table 4: Summary of the Kendall Tau distance -- step number correlation for different
parameter sets. Percentage of runs for given set of parameters for which correlation
is within one of three ranges. Results for first 100 steps.
ranges of correlation value
(cid:104)−1;−0.1)
Culture size
Number of
weekdays
(timeslots)
New links
algorithm
Arrangements
250
500
5
15
25
Preferential
Uniform
Intelligent
Simple
2.78%
2.78%
0.00%
0.00%
8.33%
0.00%
5.56%
0.00%
5.56%
2.78%
1000 steps
(cid:104)−0.1; 0.1(cid:105)
25.00%
27.78%
58.33%
12.50%
8.33%
22.22%
30.56%
22.22%
30.56%
26.39%
(0.1; 1(cid:105)
72.22%
69.44%
41.67%
87.50%
83.33%
77.78%
63.89%
77.78%
63.89%
70.83%
11
common agents in two consecutive order lists, e.g., 100: all agents the same in both lists, 70: 70
common agents in two lists. The common apparent effect is that the intersection value steadily
decreases over the modeled 1,000 turns. Similarly to Kendall Tau distance, we measured the
correlation between the intersection value and the model step number. The majority of tested
parameter sets, viz., 72%, reveal negative correlations.
The steady decrease in intersection values (see Fig. 9) is common, and we assume it is a sign
of progressive loosening of the system rigidity for the Mobile execution method. However, there
are also cases in which this decrease speeds up significantly, as is visible in Figure 10. Around step
numbers 300 to 400, the intersection cardinality might plummet. This effect is tightly linked to
the number of available time resources. The more weekdays available, the more cases are affected
with the sharp decline in the last 600 to 700 steps of the model runs, as shown in Tables 5 and 6.
Preferential attachment strengthens the emerging hierarchy
Preferential attachment, as one of the possible heuristics for creating new edges, was implemented
in the model, as it can be expected to make the effect of emergent hierarchy more visible. No
significant differences in willingness usage or overall efficiency were found between model runs with
preferential attachment edge building vs. non-preferential building, but there was one particularly
Figure 8: Distribution of Kendall Tau distance-step number correlation values for the first 100 steps and
an entire model run, for all tested parameter sets in general. Correlation values are on the x-axis.
Figure 9: Intersections cardinality for the entire model run for a sample of parameter sets, slight downward
trend -- rigidity loosening.
12
-0,7-0,6-0,5-0,4-0,3-0,2-0,100,10,20,30,40,50,600,050,10,150,20,250,3100 steps1000 stepsSimulation step #100 60 20 40 0 80Intersection cardinalitySelected modelparameters#agents#culture#timeslots#subjectsPart. searchOrderPref. Attacg.Initial density10005001515SimpleMobileFalse0.00220004006008001000ranges of correlation value
250
500
5
15
25
Table 5:
Summary of the intersection cardinality vs. step number correlation for
different parameter sets. Percentage of runs for given set of parameters for which
correlation is within one of three ranges.
from 500th to 1000th step
(0.1; 1(cid:105)
(cid:104)−1;−0.1)
(cid:104)−0.1; 0.1(cid:105)
5.56%
52.78%
41.67%
52.78%
5.56%
41.67%
4.17%
20.83%
75.00%
4.17%
54.17%
41.67%
8.33%
83.33%
8.33%
50.00%
5.56%
44.44%
5.56%
55.56%
38.89%
5.56%
52.78%
41.67%
5.56%
52.78%
41.67%
62.50%
4.17%
33.33%
8.33%
33.33%
58.33%
33.33%
62.50%
4.17%
52.78%
41.67% 5.56%
Number of
weekdays
(timeslots)
New links
algorithm
Simple
1850
5018
5050
Preferential
Uniform
Intelligent
Culture size
Arrangements
Relations update
interesting relation.
Results for preferential attachment procedure are collected in Table 7. For all model runs with
preferential attachment turned on, the average Kendall Tau distance value amounts to 0.471, while
the model runs with non-preferential attachment during new edge building resulted in distance
average values of 0.476. We can conclude that introduction of preferential attachment to the
model results in bringing more structure to the order in which the agents are being executed.
This is on the condition that we consider only the Mobile execution method, that is, execution in
the order of weighted node degree. We also examined the difference in Kendall Tau distance for
preferential and non-preferential new edge building for each single parameter set, together with
the significance of this difference.
It turns out that in nearly 81% of cases, not only did preferential attachment show lower values
of Kendall Tau distance, but also the difference was statistically significant. Moreover, this scheme
is also linked with the number of time resources available in the model. The percentage of cases
in which preferential attachment results in significantly lower distance grows from 50% to 100%
with the number of weekdays available in the agent's schedule. We conclude that preferential
attachment as a mechanism of building new edges in the graphs not only prompts the emergence
Figure 10:
plummeting in the last model phase on the right.
Intersections cardinality for the entire model run for a sample of parameter sets, sudden
13
Simulation step #Intersection cardinalitySelected modelparameters#agents#culture#timeslots#subjectsPart. searchOrderPref. Attacg.Initial density10002502515Intell.MobileFalse0.00220004006008001000100 60 20 40 0 80ranges of correlation value
250
500
5
15
25
Table 6:
Summary of the intersection cardinality vs. step number correlation for
different parameter sets. Percentage of runs for given set of parameters for which
correlation is within one of three ranges.
from 500th to 1000th step
(0.1; 1(cid:105)
(cid:104)−1;−0.1)
(cid:104)−0.1; 0.1(cid:105)
5.56%
77.78%
16.67%
75.00%
13.89%
11.11%
12.50%
66.67%
20.83%
8.33%
87.50%
4.17%
8.33%
75.00%
16.67%
72.22%
11.11%
16.67%
8.33%
80.56%
11.11%
13.89%
75.00%
11.11%
5.56%
77.78%
16.67%
79.17%
8.33%
12.50%
20.83%
62.50%
16.67%
12.50%
87.50%
0.00%
76.39%
13.89% 9.72%
Number of
weekdays
(timeslots)
New links
algorithm
Relations update
Preferential
Uniform
Intelligent
Simple
1850
5018
5050
Culture size
Arrangements
of the hierarchy but also is tightly dependent on the resources. Observed effect is statistically
significant.
Table 7: Percentage of runs for which Kendall-Tau distance is lower when preferential
attachment algorithm for creating new edges is used.
Culture size
Number of
weekdays
(timeslots)
Arrangements
Relations update
250
500
5
15
25
Intelligent
Simple
1850
5018
5050
% of runs
83.33%
77.78%
50.00%
91.67%
100.00%
83.33%
77.78%
91.67%
66.67%
83.3%
80.56%
Discussion
Our metaphor for an egalitarian system, with equal access to time resources, showed the best long-
term performance. For a longer simulation run, the superiority of the egalitarian agent execution
order over hierarchical order in terms of global effectiveness (average Willingness Usage values) is
more visible, reaching 100% of cases when considering the last simulation step (1,000th). Moreover
the performance of the egalitarian system is inversely proportional to the number of available
resources, reaching the best efficiency when the time is scarce. The obtained results strongly
support the first hypothesis (H1) for a broad range of different scenarios and parameters.
Since, in the long run, an egalitarian system performs better anyway, we can only expect that
the intelligent method of arranging meetings mentioned in the second hypothesis (H2) will have the
best performance for the initial phase of simulation. Indeed, intelligent methods, i.e., mimicking
the use of modern technology to increase the probability of finding a valuable partner and utilizing
more of the agent's preferences, show greater values of average willingness usage, but this effect is
temporary and occurs in the initial phase of the simulation. This effect is the strongest observed
for societies stratified by weighted node degree (i.e. mobile method). On the other hand, for the
14
hierarchical execution order, intelligent time management methods seem to contribute most to an
improvement of global effectiveness.
To verify the third hypothesis (H3), we have used the implemented Mobile execution order,
which was referred to as a stratified system with added mobility for agents to move on the hierarchy
ladder. We attempted to determine whether, despite some degree of the flexibility, the hierarchy
can arise and sustain. The results show that the hierarchy can indeed be emergent but only in
very specific condition and in the short term. The Mobile model running with resources set to
high availability yields signs of a crystalizing hierarchy in the short term. Until approximately half
of a single simulation run, the order in which the agents are executed stabilizes. This tendency is
strong when the resources are in plentiful supply and the preferential attachment mode is enabled.
However, in the long term this effect does not persist, and the hierarchy disappears, as the agents
are using the enabled mobility in the model. Therefore, the third hypothesis was also confirmed.
All three hypotheses raised in the introduction have been confirmed. Sensitivity analysis shows
that the obtained results are quite stable for a broad range of parameter combinations. Social
stratification, as an emergent property of a model, can itself be a broad topic for research and
an innovative means of comprehending the existence of inequality in real systems. Moreover, the
developed model provides an opportunity to study methods for overcoming social stratification,
such as asynchronous methods of communication (e.g., publication of agents' calendars and current
interests).
The results presented in this paper do not provide an ultimate answer to the question of whether
a particular level of stratification is optimal for society in general. However, obtained results
shed light on the reason for the decreased effectiveness and long-term stability of hierarchies in
the knowledge society. This reason is that hierarchies decrease the global effectiveness of time
management, measured by the degree to which agents manage to exchange ideas and discuss with
each other. Our model, based on a relatively simple process of making appointments to discuss
various topics by agents embedded in an evolving social network, is quite suitable to advanced
knowledge societies such as the Silicon Valley. The model is also able to shed insights on the
emergent properties of an advanced knowledge society. While there may be many ways to improve
the model and generalize or validate our findings, we consider them interesting areas for further
study, enabled by the contributions of this article to the research community.
References
[AH06]
Mark Aguiar and Erik Hurst. Measuring trends in leisure: The allocation of time over
five decades. Technical report, National Bureau of Economic Research, 2006.
[AH08]
[Atk96]
[Bec65]
Mark Aguiar and Erik Hurst. The increase in leisure inequality. Technical report,
National Bureau of Economic Research, 2008.
Anthony Barnes Atkinson. Public economics in action: the basic income/flat tax
proposal. OUP Catalogue, 1996.
Gary S Becker. A theory of the allocation of time. The economic journal, pages
493 -- 517, 1965.
[BFB09] Mukul S Bansal and David Fernández-Baca. Computing distances between partial
rankings. Information Processing Letters, 109(4):238 -- 241, 2009.
[Dun96]
Robin IM Dunbar. Determinants of group size in primates: A general model. Oxford
University Press, 1996.
[Dun98]
Robin IM Dunbar. The social brain hypothesis. brain, 9(10):178 -- 190, 1998.
[FS07]
[GB75]
[Gru94]
Ilan Fischer and Oriel Sullivan. Evolutionary modeling of time-use vectors. Journal of
Economic Behavior & Organization, 62(1):120 -- 143, 2007.
Gilbert Ghez and Gary S Becker. The allocation of time and goods over the life cycle.
NBER Books, 1975.
David B Grusky. The contours of social stratification. Social Stratification in Sociolog-
ical Perspective, 1994.
15
[Hay89]
[Hur11]
[JBN04]
[JS85]
[Klu00]
[Ley94]
Robert B Hays. The day-to-day functioning of close versus casual friendships. Journal
of Social and Personal Relationships, 6(1):21 -- 37, 1989.
Michael Hurwitz. The impact of legacy status on undergraduate admissions at elite
colleges and universities. Economics of Education Review, 30(3):480 -- 492, 2011.
John T Jost, Mahzarin R Banaji, and Brian A Nosek. A decade of system justification
theory: Accumulated evidence of conscious and unconscious bolstering of the status
quo. Political Psychology, 25(6):881 -- 919, 2004.
F Thomas Juster and Frank P Stafford. Time, goods, and well-being. 1985.
Juergen Kluver. The dynamics and evolution of social systems: new foundations of a
mathematical sociology, volume 29. Springer Science & Business Media, 2000.
Loet Leydesdorff. The evolution of communication systems. Loet Leydesdorff, The Evo-
lution of Communication Systems, Int. J. Systems Research and Information Science,
6:219 -- 230, 1994.
[MBH+09] Monique Borgerhoff Mulder, Samuel Bowles, Tom Hertz, Adrian Bell, Jan Beise, Greg
Clark, Ila Fazzio, Michael Gurven, Kim Hill, Paul L Hooper, and others. Intergen-
erational wealth transmission and the dynamics of inequality in small-scale societies.
science, 326(5953):682 -- 688, 2009.
[NWK08] Radoslaw Nielek, Aleksander Wawer, and Romuald Kotowski. Two antigenically indis-
tinguishable viruses in a population. In Proceedings of the World Congress on Engi-
neering, volume 3, 2008.
[Oys00]
Carol K Oyster. Groups: A user's guide. McGraw-Hill, 2000.
[RCME07] James F Robison-Cox, Richard F Martell, and Cynthia G Emrich. Simulating gender
stratification. Journal of Artificial Societies and Social Simulation, 10(3):8, 2007.
[RG10]
John Robinson and Geoffrey Godbey. Time for life: The surprising ways Americans
use their time. Penn State Press, 2010.
[Row11]
Karen Rowlingson. Does income inequality cause health and social problems? 2011.
[Sau10]
[Sma99]
[Sno10]
[SW12]
[TW08]
Peter Saunders. Beware false prophets: equality, the good society and the spirit level.
Policy Exchange, 2010.
Cathy Small. Finding an invisible history: A computer simulation experiment (in
virtual polynesia). Journal of Artificial Societies and Social Simulation, 2(3):6, 1999.
Christopher Snowdon. The spirit level delusion: fact-checking the left's new theory of
everything. Little Dice London, 2010.
Alistair Sutcliffe and Di Wang. Computational modelling of trust and social relation-
ships. Journal of Artificial Societies and Social Simulation, 15(1):3, 2012.
Don Tapscott and Anthony D Williams. Wikinomics: How mass collaboration changes
everything. Penguin, 2008.
[WNK09] Aleksander Wawer, Radoslaw Nielek, and Romuald Kotowski. Patterns in time: Mod-
elling schedules in social networks. In 1st International Workshop on Social Informatics,
pages 80 -- 85. IEEE, 2009.
[WPC09] Richard Wilkinson, Kate Pickett, and Molly Scott Cato. The spirit level. why more
equal societies almost always do better, 2009.
[You10]
Stephen Younger. Leadership in small societies. Journal of Artificial Societies and
Social Simulation, 13(3):5, 2010.
16
Appendix I
Figure 11: Simple and Intelligent schedule-filling procedure flowcharts.
17
Make agents'arrangementsWhat is theschedule fillingstrategy?Choose a randomneighborrandomAre there anyother agents?Summonan agentYesStopNoSimpleChoose firstcommon free time slotChoose a subjectmaximizing agent'swillingness usageMaximumnumberof attemptsreached?Summonan agentChoose a neighbormaximizing willingness usageAny commonsubjects?NoYesYesAny sparewillingnessand timeslots?IntelligentIterate overagent's subjectsIterate overagent'stime slotsAre there anyother agents?YesYesNoNoNo |
0804.4336 | 1 | 0804 | 2008-04-28T07:26:31 | Counterflow Extension for the F.A.S.T.-Model | [
"cs.MA",
"physics.comp-ph"
] | The F.A.S.T. (Floor field and Agent based Simulation Tool) model is a microscopic model of pedestrian dynamics, which is discrete in space and time. It was developed in a number of more or less consecutive steps from a simple CA model. This contribution is a summary of a study on an extension of the F.A.S.T-model for counterflow situations. The extensions will be explained and it will be shown that the extended F.A.S.T.-model is capable of handling various counterflow situations and to reproduce the well known lane formation effect. | cs.MA | cs |
Counterflow Extension for the F.A.S.T.-Model
Tobias Kretz1,3 and Maike Kaufman2,3 and Michael Schreckenberg3
1 PTV AG
Stumpfstrasse 1 – D-76131 Karlsruhe – Germany
E-mail: [email protected]
2 Robotics Research Group
Department of Engineering Science
University of Oxford
Parks Road – OX1 3PJ Oxford – UK
E-mail: [email protected]
3 Physics of Transport and Traffic
University of Duisburg-Essen
Lotharstrasse 1 – D-47057 Duisburg – Germany
E-mail: [email protected]
March 26, 2018
Abstract
The F.A.S.T. (Floor field and Agent based Simulation Tool) model
is a microscopic model of pedestrian dynamics [1], which is discrete
in space and time [2, 3].
It was developed in a number of more or
less consecutive steps from a simple CA model [4, 5, 6, 7, 8, 9, 10].
This contribution is a summary of a study [11] on an extension of
the F.A.S.T-model for counterflow situations. The extensions will be
explained and it will be shown that the extended F.A.S.T.-model is
capable of handling various counterflow situations and to reproduce
the well known lane formation effect.
1
Introduction
Counterflow situations [12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22] pose a special
problem to models of pedestrian dynamic as well as building construction.
To avoid deadlocks a certain degree of self-organization is necessary, which
typically leads to the formation of lanes, where people in the same lane fol-
low each other and different lanes have opposing movement directions. CA
1
models of pedestrian motion are particularly susceptible to deadlocks, if the
main orientation axis of a corridor is aligned to one of the discretization
axes. The reason for this is the given lane structure which leads to many
head-on collision situation which lack any asymmetry to decide about the
side of mutual passing. One modeling ansatz is to let opposing pedestrians
exchange their cells with a certain probability [23]. While this method is
capable of reproducing some elements of reality, one still might be unhappy,
as in reality people just do not walk through each other. A major tempta-
tion in modelling pedestrian counterflow using discrete models is to make
use of the lanes preset by the CA lattice and align the two opposing groups'
movement along one lattice axis. While such simulations can increase the
understanding of a model or method, they are merely of academic interest
and not sufficient for general use in safety, traffic or city engineering. The
other big difficulty is combining counterflow situations with speeds larger
than one cell per round. The method presented here aims at being indepen-
dent of the underlying lattice and it includes speeds larger 1.
2 Extension of the F.A.S.T.-Model by a Comoving
Dynamic Potential
The probability pxy for an agent i to select a cell (x, y) as desired cell is
multiplied by an additional factor pf
¯pxy = pxy · pf
(1)
xy:
xy
kf
N(cid:88)
j∈NN i
σ(i, j)
σ(i, j) P j
xy
xy = exp
pf
(2)
where kf is the coupling parameter that determines the strength of the effect.
NN i is the set of nearest neighbors of agent i. N is the maximum number of
nearest neighbors which is considered. NN i only consists of agents within
a distance rmax, which are visible to agent i (i.e. not hidden by walls and in
the field of view π/2 to the left and right of the direction of motion of agent
i. σ(i, j) = (cid:126)vi · (cid:126)vj is the scalar product of the velocities (cid:126)vi and (cid:126)vj of agent i
and agent j, so the fraction in equation 2 is +1, if the agents rather move
into the same direction and −1, if the rather move into opposite direction.
Finally P j
xy is the value of the comoving potential induced by agent j at
position (x, y). Assuming motion of agent j at position (x0, y0) along the
x-axis, P j
xy has the following form (for any other direction of motion, the
2
potential has to be rotated accordingly):
(cid:32)
(cid:32)
xy = 2h
P j
xy = 2h
P j
vj
vmax
j
vj
vmax
j
+ δ
+ δ
(cid:33)(cid:18)
1 − y − y0
(cid:33)(cid:18)
1 − x − x0
a
(cid:19)
(cid:19)
b
, if
, if
y − y0
x − x0 ≤ a
y − y0
x − x0 >
b
a
b
(3)
(4)
where h is the strength (height) of the potential. The content of the first
brackets models the velocity dependence of the potential, a is the basewidth
of the potential orthogonal to the direction of motion, b is the baselength
alongside the direction of motion of agent j.
The values N = 12, h = 4.0, δ = 0.2, a = 2, b = rmax = 15, and kf = 0.8
have been established as a reasonable choice of parameters. Interestingly
the simulation results worsened not only, if one reduced N, but also as it
was increased. All simulations were done with vmax = 3. Due to larger
fluctuations the method works less well for speeds vmax ≥ 5.
3 Simulation Results
Figure 1 clearly shows, how lanes are formed and by that deadlocks are
avoided and figure 2 the effect on the fundamental diagram by variation of
kf and NN i is shown.
Figure 1: Lane formation in a corridor and on an area.
4 Conclusions and Outlook
This contribution presented a model extension to the F.A.S.T.-model for the
simulation of counterflow. It was shown that lane formation was reproduced
and deadlocks were avoided for speeds up to 3 cells per round and at densities
well above the deadlock density of the earlier model. For even larger speeds
3
Figure 2: Fundamental diagrams in dependence of kf and NN i.
the model needs to be stabilized, i.e. fluctuations must be restricted to
some maximal value. An interesting empirical question would be to find the
number of maximally considered nearest neighbors for real pedestrians.
References
[1] A. Schadschneider, W. Klingsch, H. Klupfel, T. Kretz, C. Rogsch, and
A. Seyfried. Evacuation Dynamics: Empirical Results, Modeling and
Applications. In R.A. Meyers, editor, Encyclopedia of Complexity and
System Science. Springer, Berlin Heidelberg New York, 2009. (to be
published in April 2009) urn:ISBN:978-0-387-75888-6. arXiv:0802.
1620v1.
[2] T. Kretz and M. Schreckenberg. The F.A.S.T.-Model. In El Yacoubi
et al. [27], pages 712–715. DOI:10.1007/11861201_85. arXiv:0804.
1893v1.
[3] T. Kretz.
Pedestrian Traffic - Simulation and Experiments.
urn:nbn:de:hbz:
PhD thesis, Universitat Duisburg-Essen, 2007.
464-20070302-120944-7.
[4] C. Burstedde, K. Klauck, A. Schadschneider, and J. Zittarz. Simula-
tion of pedestrian dynamics using a 2-dimensional cellular automaton.
Physica A, 295:507, 2001.
DOI:10.1016/S0378-4371(01)00141-8,
arXiv:cond-mat/0102397v1.
[5] A. Kirchner and A. Schadschneider. Cellular Automaton Simulations
In Fukui et al.
http://www.thp.uni-koeln.de/~as/Mypage/
of Pedestrian Dynamics and Evacuation Processes.
[25], pages 531–536.
PSfiles/pede2.ps.
[6] A. Kirchner and A. Schadschneider. Simulation of Evacuation Pro-
cesses Using a Bionics-inspired Cellular Automaton Model for Pedes-
trian Dynamics. Physica A, 312(1–2):260–276, 2002. DOI:10.1016/
S0378-4371(02)00857-9,arXiv:cond-mat/0203461v1.
4
[7] A. Schadschneider. Cellular Automaton Approach to Pedestrian Dy-
In Schreckenberg and Sharma [24], pages 76–85.
namics – Theory.
arXiv:cond-mat/0112117v1.
[8] A. Schadschneider. Bionics-Inspired Cellular Automaton Model for
In Fukui et al. [25], pages 499–509. http:
Pedestrian Dynamics.
//www.thp.uni-koeln.de/~as/Mypage/PSfiles/pede1.ps.
[9] A. Kirchner, K. Nishinari, and A. Schadschneider. Friction Effects
and Clogging in a Cellular Automaton Model for Pedestrian Dynamics.
Phys. Rev. E, 67(056122), 2003. DOI:10.1103/PhysRevE.67.056122,
arXiv:cond-mat/0209383v1.
[10] K. Nishinari, A. Kirchner, A. Namazi, and A. Schadschneider. Ex-
tended Floor Field CA Model for Evacuation Dynamics. IEICE Trans.
Inf. & Syst., E87-D:726–732, 2004. arXiv:cond-mat/0306262v1.
[11] M. Kaufman. Lane Formation in Counterflow Situations of Pedestrian
Traffic. Master's thesis, Universitat Duisburg-Essen, 2007.
[12] M. Muramatsu, T. Irie, and T. Nagatani. Jamming transition in pedes-
DOI:10.1016/
trian counter flow. Physica A, 267:487–498, 1999.
S0378-4371(99)00018-7.
[13] D. Helbing, I.J. Farkas, and T. Vicsek. Freezing by Heating in a Driven
Mesoscopic System. Phys. Rev. Lett., 84:1240–1243, 2000. DOI:10.
1103/PhysRevLett.84.1240, arXiv:cond-mat/9904326v2.
[14] M. Muramatsu and T. Nagatani.
Jamming transition in two-
Physica A, 275:281 – 291,
DOI:10.1016/S0378-4371(99)00447-1. http://llacolen.
dimensional pedestrian traffic.
2000.
ciencias.uchile.cl/%7Evmunoz/download/papers/mn00.pdf.
[15] V.J. Blue and J.L. Adler. Cellular Automata Microsimulation of Bi-
Directional Pedestrian Flows. Transportation Research Record, Journal
of the Transportation Research Board, 1678:135–141, 2000. http://
www.ulster.net/~vjblue/CA-TRB99.pdf.
[16] A. Schadschneider, A. Kirchner, and K. Nishinari. CA Approach to
Collective Phenomena in Pedestrian Dynamics. In Bandini et al. [26],
pages 239–248. urn:ISBN:978-3-540-44304-9.
[17] Y. Tajima, K. Takimoto, and T. Nagatani. Pattern formation and
jamming transition in pedestrian counter flow. Physica A, 313:709–
723, 2002. DOI:10.1016/S0378-4371(02)00965-2.
[18] M. Isobe, T. Adachi, and T. Nagatani. Experiment and simulation of
pedestrian counter flow. Physica A, 336:638–650, 2004. DOI:10.1016/
j.physa.2004.01.043.
5
[19] A. John, A. Schadschneider, D. Chowdhury, and K. Nishinari. Collec-
tive effects in traffic on bi-directional ant trails. Journal of Theoret-
ical Biology, 231:279–285, 2004. DOI:10.1016/j.jtbi.2004.06.022.
arXiv:cond-mat/0409458v1.
[20] R. Nagai, M. Fukamachi, and T. Nagatani. Experiment and simulation
for counterflow of people going on all fours. Physica A, 358:516–528,
2005. DOI:10.1016/j.physa.2005.04.024.
[21] T. Kretz, M. Wolki, and M. Schreckenberg. Characterizing correla-
tions of flow oscillations at bottlenecks. Journal of Statistical Mechan-
ics: Theory and Experiment, P02005, 2006. DOI:10.1088/1742-5468/
2006/02/P02005. arXiv:cond-mat/0601021v2.
[22] T. Kretz, A. Grunebohm, M. Kaufman, F. Mazur, and M. Schreck-
enberg. Experimental study of pedestrian counterflow in a corridor.
Journal of Statistical Mechanics: Theory and Experiment, P10001,
2006. DOI:10.1088/1742-5468/2006/10/P10001. arXiv:cond-mat/
0609691v1.
[23] V.J. Blue and J.L. Adler. Cellular Automata Microsimulation For Mod-
eling Bi-Directional Pedestrian Walkways. Transportation Research B,
35(293), 2001. DOI:10.1016/S0191-2615(99)00052-1.
[24] M. Schreckenberg and S.D. Sharma, editors. Pedestrian and Evacuation
Dynamics, Duisburg, 2002. Springer-Verlag Berlin Heidelberg. urn:
ISBN:3-540-42690-6.
[25] M. Fukui, Y. Sugiyama, M. Schreckenberg, and D.E. Wolf, editors.
Traffic and Granular Flow '01, Nagoya, 2003. Springer-Verlag Berlin
Heidelberg. urn:ISBN:3-540-40255-1.
[26] S. Bandini, B. Chopard, and M. Tomassini, editors. Cellular Automata
- 5th International Conference on Cellular Automata for Research and
Industry, ACRI 2002, Geneva, Switzerland, October 2002. Springer-
Verlag Berlin Heidelberg. urn:ISBN:978-3-540-44304-9.
[27] S. El Yacoubi, B. Chopard, and S. Bandini, editors. Cellular Automata
- 7th International Conference on Cellular Automata for Research and
Industry, ACRI 2006, Perpignan, France, September 2006. Springer-
Verlag Berlin Heidelberg. urn:ISBN:3-540-40929-7.
6
|
1909.05232 | 1 | 1909 | 2019-09-11T17:42:14 | On Memory Mechanism in Multi-Agent Reinforcement Learning | [
"cs.MA",
"cs.AI"
] | Multi-agent reinforcement learning (MARL) extends (single-agent) reinforcement learning (RL) by introducing additional agents and (potentially) partial observability of the environment. Consequently, algorithms for solving MARL problems incorporate various extensions beyond traditional RL methods, such as a learned communication protocol between cooperative agents that enables exchange of private information or adaptive modeling of opponents in competitive settings. One popular algorithmic construct is a memory mechanism such that an agent's decisions can depend not only upon the current state but also upon the history of observed states and actions. In this paper, we study how a memory mechanism can be useful in environments with different properties, such as observability, internality and presence of a communication channel. Using both prior work and new experiments, we show that a memory mechanism is helpful when learning agents need to model other agents and/or when communication is constrained in some way; however we must to be cautious of agents achieving effective memoryfulness through other means. | cs.MA | cs | On Memory Mechanism in Multi-Agent Reinforcement Learning
Yilun Zhou,1 Derrik E. Asher,2 Nicholas R. Waytowich,2 Julie A. Shah1
1MIT CSAIL, 2US Army Research Lab
[email protected]
9
1
0
2
p
e
S
1
1
]
A
M
.
s
c
[
1
v
2
3
2
5
0
.
9
0
9
1
:
v
i
X
r
a
Abstract
Multi-agent reinforcement learning (MARL) extends (single-
agent) reinforcement learning (RL) by introducing additional
agents and (potentially) partial observability of the environ-
ment. Consequently, algorithms for solving MARL problems
incorporate various extensions beyond traditional RL meth-
ods, such as a learned communication protocol between co-
operative agents that enables exchange of private information
or adaptive modeling of opponents in competitive settings.
One popular algorithmic construct is a memory mechanism
such that an agent's decisions can depend not only upon the
current state but also upon the history of observed states and
actions. In this paper, we study how a memory mechanism
can be useful in environments with different properties, such
as observability, internality and presence of a communica-
tion channel. Using both prior work and new experiments,
we show that a memory mechanism is helpful when learning
agents need to model other agents and/or when communica-
tion is constrained in some way; however we must to be cau-
tious of agents achieving effective memoryfulness through
other means.
1
Introduction
Compared to (single-agent) reinforcement learning (RL),
multi-agent reinforcement learning (MARL) includes other
agents and potentially partial observability into the environ-
ment. Due to the partial observability of an environment
from each agent, emergent communication (Mordatch and
Abbeel, 2018; Sukhbaatar and Fergus, 2016; Foerster et al.,
2016; Gauthier and Mordatch, 2016), in which agents must
come up with a communication protocol to efficiently ex-
change information, has been studied. Another learning ob-
jective is for a few agents to learn the policies and then
get deployed in an environment with other agents. We call
these learning agents as internal agents, while the rest are
called external agents. In this setting, internal agents should
be adaptive to the different behaviors exhibited by external
agents, regardless of whether the agents are in cooperative,
competitive, or mixed relations.
A recurring theme within MARL algorithms is the use
of a memory mechanism, which is most commonly im-
plemented by a recurrent neural network for deep learning
methods, or sometimes by state augmentation if the system
designer determines that a bounded memory is sufficient.
However, sometimes the use of such a construct is not well-
motivated, with both memoryful and memoryless policy rep-
resentations having been tested in prior work (Sukhbaatar
and Fergus, 2016). Furthermore, there has not been a sys-
tematic study of whether or how such a memory mechanism
can be helpful. In this paper, we group multi-agent envi-
ronments according to three properties, and study the ben-
efit that a memory mechanism may provide. Throughout the
study, we ground our propositions with conclusions derived
from existing literature and new experiments, and consider
both theoretical and practical feasibility.
At a high level, we classify MARL environments along
three axes (detailed in Section 4). First, we consider the ob-
servability axis, or whether each agent is able to receive the
full state information at each time. Several simple bench-
marks, such as the predator-prey task and the cooperative
navigation task introduced by Lowe et al. (2017), are fully
observable. As special cases, classical game theory exam-
ples (such as rock-paper-scissors and prisoners' dilemma)
are also fully observable since they are stateless. In stark
contrast, a common source of non-observability comes from
the limited sensing range of agents, as in the traffic junction
domain used by Sukhbaatar and Fergus (2016).
Second, we consider the internality of the environment, or
whether the environment contains only internal agents (over
which we have control during test time), or also includes ex-
ternal agents (which are provided by other parties, during
test time). If all agents are internal (referred to as fully inter-
nal environments), all agents are essentially optimizing for a
shared reward within a fully cooperative setting. In partially
internal environments, agents may be engaged in fully co-
operative tasks (e.g., human-robot teaming for rescue), fully
competitive tasks (e.g., a predator-prey scenario), or mixed
tasks (e.g., traffic, in which vehicles compete for road re-
sources while also cooperating to avoid collision).
Third, we consider an axis for communication in fully in-
ternal environments: specifically, whether an explicit com-
munication channel is present. If a channel is present, agents
can learn to exchange information effectively, which may
lead to improved performance.
In this work, we study the utility of a memory mechanism
for environments according to the above three axes, and re-
port the following:
1. Within partially internal environments, regardless of re-
ward structure, memoryful policies are helpful because
they can better model opponents and inherently adapt to
potentially unseen opponent behaviors.
2. Although the presence of a communication channel with-
out restrictions does not necessitate a memory mecha-
nism, it can be helpful for agents to evolve compositional
and/or sparse communications.
3. In fully internal environments without explicit communi-
cation, a memory mechanism can typically help for agents
to engage in behavior-based communication.
4. An emergent phenomenon, which we refer to as "state-
based bookkeeping", can sometimes mitigate or remove
the duty of an explicit memory mechanism, which may or
may not be desirable.
2 Background
Similar to MDP representations in RL, a MARL en-
vironment with n agents can be specified by a tu-
ple (cid:104)S, A1, ..., An, T, R1, ..., Rn, γ(cid:105). S represents the state
space (which includes the state of all agents and additional
environmental information). Ai denotes the set of actions for
agent i. T : S × A1 × ... × An → PS represents the transi-
tion function, assuming that agents actions are simultaneous
rather than occurring in turns. Ri : S×A1×...×An×S → R
represents the reward of agent i, which is a function of the
current state, all agents' actions, and the next state. γ ∈ [0, 1]
denotes the discount factor.
is
example,
if
agents
The
the goal
is
objective
dependent
optimization
settings. For
E[(cid:80)∞
t=1 γt(cid:80)n
dividual rewards (i.e., ¯R =(cid:80)n
upon
are
environment
fully cooperative,
to identify policies
that maximize the total expected discounted reward,
i=1 Ri(st, π1(st), ..., πn(st), T (st, π1(st), ...,
πn(st))]. In this case, we can also formulate the reward
functions to be identical and equal to the average of all in-
i=1 Ri/n represents the new
reward that each agent is maximizing individually). This
is the formulation used in most literature on cooperative
agents (Sukhbaatar and Fergus, 2016; Foerster et al., 2016).
A selfish agent trying to maximize its own reward may
want to guarantee a worst-case optimal reward, resulting in
a policy that receives the highest reward regardless of other
agents' policies. Alternatively, the selfish agent may want
to achieve an average-case optimal policy, which yields the
highest expected reward assuming some distribution of op-
ponent policy.
Notably, in contrast to single-agent RL, a deterministic
policy is often not the best policy (and can even be the
worst). For example, in an iterative version of the rock-
paper-scissors game, any deterministic policy is exploitable
and should result in repetitive losses. The worst-case optimal
policy is a perfectly randomized policy that achieves equal
proportion of win, loss, and draw in expectation.
3 Memoryful Policies
It is known (Sutton and Barto, 2018) that the optimal policy
in an MDP is Markov. In other words, choosing (distribution
of) actions based only on the current state can lead to the
optimal policy, and maintaining state and/or action history
is not further advantageous. However, due to the presence of
other agents, it may be helpful for the policy to be memory-
ful. As a simple example, in a repeated rock-paper-scissors
game, against an imperfectly playing agent with a tendency
toward a specific action, a memoryful agent can exploit op-
ponent imperfection by calculating the probability of each
action and taking corresponding counter-actions. Note that
this kind of "learning" is performed on the fly, within each
episode, and thus will adapt to a distinctly different oppo-
nent next time without issue.
general form as πi : (cid:81)τ
(cid:81)τ−1
We define a memoryful policy for the i-th agent in the
t=1 Aj → Ai. In
terms of implementation, a general memoryful policy can be
represented by a recurrent neural network. However, if only
a certain length of past history is necessary, state augmen-
tation technique can also be used, as in the state representa-
tion used by Foerster et al. (2018a) in the iterative prisoners'
dilemma.
t=1 S ×(cid:81)n
j=1
4 A Taxonomy of MARL Problems
For the purpose of this work, we classify MARL problems
in terms of three attributes, each of which has different im-
plications on the requirement for memory mechanisms.
1. Observability: whether each agent individually receives
the full state information of the environment, or only a
correlated observation. Partial observability is more com-
mon in multi-agent systems, but full observability is typ-
ical in many game theory domains (such as rock-paper-
scissors or the prisoners' dilemma).
2. Internality: whether all agents are internal, or some ex-
ternal agents exist. Specifically, as discussed in the intro-
duction, we define an internal agent to be one that we can
control at test time, while an external agent is supplied
by another party during test time. If all agents are inter-
nal, we refer to that environment as fully internal; other-
wise the environment is partially internal. We assume a
perfectly shared reward structure for fully internal envi-
ronments (i.e. fully cooperative), because any source of
competition would come from external agents in realistic
situations1.
Note that partial internality does not necessarily imply a
competitive setting. For example, in human-robot team-
ing for search and rescue, the reward is still shared.
Rather, it is simply that the robot must view humans as
1Note that despite rewards being shared, the training algorithm
is not restricted to using the same reward for all agents: it can
reward agents that perform the bulk of the work while penaliz-
ing non-participating agents. The method credit assignment has re-
ceived much attention (Foerster et al., 2018b; Nguyen, Kumar, and
Lau, 2018); however, for the sake of simplicity, we do not consider
it in this paper.
external. A traffic junction represents a mixed coopera-
tive/competitive environment, since vehicles must com-
pete for road usage while cooperating to avoid collisions.
3. Communication: whether explicit message-based com-
munication is allowed among internal agents. Specifi-
cally, the directed communication channel from agent i
to j is represented by a function cij : Rdi → Rdj , where
agent i can send a di-dimensional message mij, and agent
ij = cij(mij) ∈ Rdj .
j will receive an encoded version m(cid:48)
Typically, the channel encoder is the identity function
cij(m) = m, but the encoder can also be a discretiza-
tion function to enforce discrete communication signals
(Mordatch and Abbeel, 2018; Foerster et al., 2016) or a
function that suppresses the signal after a certain number
of times to implement budgeted communication (Wang,
Everett, and How, 2019). We assume that for agent i the
outbound communication message mij is computed from
individual state observation, and the action is computed
from both the state observation and inbound communica-
tion messages m(cid:48)
ki. We do not consider a communication
channel between internal and external agents in this work.
5 Fully Observable/Fully Internal
For fully observable environments with fully internal agents,
the optimal policy is still memoryless (i.e. Markovian), at
least in theory. Specifically, we can treat the problem as
single-agent RL in which an agent learns a policy that maps
from the state space to the joint action space. Since the envi-
ronment is represented by a MDP, the optimal policy for this
agent is also Markovian (and deterministic). At test time in
the MARL problem, then, each individual agent calculates
the joint action using the original policy, and takes its in-
dividual action correspondingly. Communication is also not
required in this case, because the learned joint policy con-
tains any necessary coordination among agents.
In practice, however, scalability can be an issue for envi-
ronments containing too many agents, since the state space
and joint action spaces will grow exponentially with an in-
creasing number of agents. Therefore, intentional decentral-
ization can be helpful: with such a formulation, each agent
only observes local state information. Moreover, given ho-
mogeneous agents and parameter sharing, learned policies
also have the potential to adapt to an indefinite number of
agents (Sukhbaatar and Fergus, 2016). In this case, depend-
ing on requirements for communication, a memory mecha-
nism can be beneficial. We discuss this in greater detail in
Section 7.
6 Fully Observable/Partially Internal
As noted in the prior section, a collection of internal agents
can function effectively as one agent at both training and test
time assuming full observability: thus, we only consider the
case of a single internal agent deployed into an environment
with other external agents. In addition, we use the word "op-
ponent" to refer to the other agent, even in partially or fully
cooperative situations.
There has been a significant amount of research on learn-
ing competitive behaviors in game-theoretic settings. The
methods for doing so can be classified according to the ways
they model opponents.
The first way to address opponent modeling is to sim-
ply not model them. Obviously this is potentially problem-
atic and vulnerable. However, Littman (1994) proposed a
method to learn the worst-case optimal policy with a guar-
anteed reward against all possible type of opponents. That
paper further indicates that such a policy is memoryless, but
may be stochastic. In addition, Li et al. (2019) incorporated
such worst-case consideration into a deep MARL algorithm
proposed by Lowe et al. (2017).
The second approach is to model opponents as static or
slowly changing, so that agents can learn to track oppo-
nent policies during test time. Most recent deep MARL ap-
proaches have adopted this assumption and use co-learning
at training time, which simulates an opponent policy and
learns to better deal with that policy, while simultaneously
updating the opponent policy in order to be stronger in re-
sponse. For example, Lowe et al. (2017) proposed a general-
purpose MARL algorithm that can learn from arbitrary re-
ward structures. Foerster et al. (2018a) added a lookahead
step to affect opponent gradient update with opponent mod-
eling. Al-Shedivat et al. (2017) used meta-learning for fast
adaptation with respect to opponent evolution. Although
these methods do not explicitly require a memory mech-
anism, more interesting behaviors can emerge with some
form of memory, as demonstrated by Foerster et al. (2018a),
who used state augmentation in their iterated prisoners'
dilemma setting.
However, when the opponent is using a very different pol-
icy from the one modeled during training, or is changing
policy abruptly across episodes, the agent may receive very
bad rewards. Figure 1 sketches a possible failure case for this
kind of co-learning based method. In fact, many co-learning
approaches lack a guarantee that the current agent policy re-
mains effective against a previous opponent policy, which is
analogous to the problem of forgetting in both discrimina-
tive (Kemker et al., 2018) and generative (Wu et al., 2018)
models.
Figure 1: Training dynamics of co-learning algorithms.
In addition, Lowe et al. (2019) found that in policies
trained using such co-learning methods, while positive sig-
naling is present, positive listening is not. In other words,
the receiving agent does not seem to base its actions upon
the sending agent's communication. This suggests that, in a
stateless environment such as a matrix game with commu-
nication, the receiving agent's policy implicitly learns the
best response to the sending agent's policy (with which the
message is correlated, as observed with positive signaling),
but would poorly adapt to any policy change by the sending
agent, even with intention signaling.
The last final approach, which has been relatively less
studied, is to model opponents explicitly at test time. Specif-
ically, within an episode, an explicit memory mechanism is
used to simultaneously infer and adapt to the current oppo-
nent policy. This method places relatively few assumptions
on the opponent and can adapt to drastic changes to oppo-
nent policies across episodes.
Theory of mind (Leslie, 1987) is a popular framework for
such reasoning. For example, Rabinowitz et al. (2018) used
a mental state network to model opponent policy from past
behavior. Raileanu et al. (2018) learned to infer the goals of
opponent in an online manner and correspondingly adapt the
agent's own behavior. Yang et al. (2019) assumed switching
behaviors among several stationary policies for the opponent
and inferred the acting policy.
Another advantage is that this method can exploit any im-
perfection or weakness of a given opponent. To see this,
consider again the (stateless) game of iterated rock-paper-
scissors, wherein the policy is simply parametrized by the
probabilities of outputting rock, paper, or scissors (π =
[θr, θp, θs]). A worst-case optimal method (Littman, 1994)
ignoring the opponent's policy would compute the policy to
be π = [1/3, 1/3, 1/3], with an expected reward of 0. Co-
learning algorithms would produce a pair of policies that os-
cillate on this probability simplex. Specifically, for two agent
policies parametrized by π and π(cid:48), the expected average re-
ward for the π agent is as follows:
E[Rπ,π(cid:48)] = θrθ(cid:48)
r + θsθ(cid:48)
For the π(cid:48) agent in this case, the expected average reward
r −
is −E[Rπ,π(cid:48)]. Thus, the policy gradient is (θ(cid:48)
r) for π, and (θs − θp, θr − θs, θp − θr) for π(cid:48). The
s, θ(cid:48)
θ(cid:48)
left diagram of Figure 2 dipicts the oscillation of the policy
update.
s − θsθ(cid:48)
r.
p − θpθ(cid:48)
p − θrθ(cid:48)
s + θpθ(cid:48)
s − θ(cid:48)
p − θ(cid:48)
p, θ(cid:48)
Nevertheless, at any given time, if the learned agent is de-
ployed in an environment, even with an opponent whose pol-
icy is uniformly sampled from this simplex, the expected re-
ward is 0. Use π to denote the agent policy, and π(cid:48) to denote
√
the opponent policy. The probability density function for the
uniform opponent policy is p(π(cid:48)) =
s=1.
Thus Eπ(cid:48)[E[Rπ,π(cid:48)]] = 0 by symmetry.
3/2 · 1θ(cid:48)
By comparison, a simple memoryful policy would esti-
mate the opponent policy parameters by action history, and
take the corresponding counter-action, as implemented by
the following hand-crafted recurrent neural network (rock,
paper, and scissors have the index of 0, 1, and 2 respec-
tively).
p+θ(cid:48)
r+θ(cid:48)
h0 = [0, 0, 0],
ht = γht−1 + xt,
it = arg max ht,
yt = [1, 2, 0][it].
With γ = 1, ht represents the count for opponent actions,
xt the current opponent action, and yt the current agent ac-
tion. If we expect the opponent policy to be not stationary, a
discount factor γ ≤ 1 can be added in order to favor more
recent opponent actions.
The simple procedure exemplifies the idea that using a
memory mechanism to explicitly model opponents and de-
rive belief about the opponent policy (ht), upon which the
corresponding decision is made (yt). In some sense, this
idea is similar to the RL2 approach proposed by Duan et al.
(2016) in which variations of a single agent RL environment
are learned.
Ideally, the recurrent calculation is learned from data
with general-purpose function approximators such as LSTM
(Gers, Schmidhuber, and Cummins, 1999) or GRU (Cho
et al., 2014) cells. For example, Figure 2 plots the reward
for training a GRU network with a policy gradient, along
with the average performance for the above manually speci-
fied policy (which is statistically optimal). Our learned pol-
icy is able to reach the optimal policy within hundreds of
training episodes, while a memoryless policy based on the
co-learning approach is unable to learn against drastically
changing opponents across episodes.
Figure 2: Left: trajectories of agent and opponent poli-
cies with a co-learning approach exhibit oscillation and
non-convergence. Right: agent reward for the repeated RPS
game, with uniformly distributed opponents.
A more real-life domain is autonomous driving. Human
driver modeling is an important aspect of it, which is why
pure reinforcement learning approaches are not very com-
mon, but often combined with supervised or imitation learn-
ing from human driving data (Xu et al., 2017; Zhang and
Cho, 2016). In addition, co-learning driving policies are
not likely to be successful during deployment because the
learned opponent behavior may not be similar to actual hu-
man behaviors2.
As a concrete example, consider driving on a two-lane
road with a leading vehicle in front, represented as a grid
world as shown in Figure 3. At each time step, each vehicle
decides to either move forward (right) one position, change
lane, or stay still. Our agent is rewarded for fast traversal
through the road while avoiding collision. Therefore, its op-
timal policy for our agent depends on the other agent: if the
other agent is driving slowly, our agent may wish to pass it
on another lane, but not if the other vehicle is changing lanes
2Such observation is captured by the argument that autonomous
vehicles (AVs) driving alongside other AVs is actually easier than
driving alongside human drivers.
erratically. Specifically, we model four types of behavior for
the other agent, whose action probabilities are summarized
in Table 1.
Figure 3: Traffic domain.
type
forward
lane-change
passive-fast (PF)
passive-slow (PS)
aggressive-fast (AF)
aggressive-slow (AS)
90%
20%
30%
20%
10%
10%
70%
70%
stay
0%
70%
0%
10%
Table 1: Proportion of each action for different behaviors.
Additionally, we consider three policies for our agent. The
greedy policy will always try to pass the other agent. The
conservative will always try to stay behind the other agent
and avoid collision. Finally, the adaptive policy will infer
the other agent's policy using maximum-likelihood estima-
tion and choose the greedy strategy for passive opponent and
conservative strategy for aggressive opponent.
With total road length of 30, time penalty of 1, crash
penalty of 30, and initial separation of the two vehicles of
10 (opponent in front), Table 2 shows the reward of the three
policies against the four type of behaviors, as well as a uni-
form mixture of behavioral types.
policy
greedy
conservative
adaptive
PF
-29.0
-29.0
-29.0
PS
-33.4
-94.3
-33.3
AF
-660.3
-70.1
-70.9
AS
-237.3
-94.5
-95.3
Mix
-227.5
-71.1
-57.3
Table 2: Reward for each policy against different behaviors.
We can see that while memoryless greedy and conserva-
tive policies can each achieve high reward on different static
opponent behaviors, both perform poorly if the opponent is
randomizing its behavior per episode. On the other hand,
the adaptive policy performs opponent modeling within each
episode and can therefore achieve high reward regardless of
opponent behaviors.
7 Partially Observable/Fully Internal
In this section we assume that all agents have joint access
to the full state information for a given environment. If all
agents (combined) do not receive the full state information,
this problem is at least as hard as a partially observable
Markov decision process (POMDP) (Cassandra, Kaelbling,
and Littman, 1994), and a memory mechanism is neces-
sary (e.g. as done recently with deep recurrent Q-learning
(Hausknecht and Stone, 2015)).
With (explicit) communication
Much recent research has been focused on the use of com-
munication to complete cooperative tasks (mostly through
reinforcement learning (Gauthier and Mordatch, 2016)). For
example, Sukhbaatar and Fergus (2016) provided an end-
to-end model for learning agent communication between
an indefinite amount of agents. Foerster et al. (2016) pro-
posed a differentiable communication channel so that back-
propagation could be performed across time steps. Lowe et
al. (2017) demonstrated that arbitrary communication chan-
nels can be incorporated. None of the above works made
use of a memory mechanism, since the channel capacity is
greater than that required to encode the necessary informa-
tion exchange.
In general, if the communication channel capacity is suf-
ficient and agents can jointly observe the full state informa-
tion, they can exchange such information through commu-
nication. This is the setting studied in most literature related
to learning communication strategies (Lowe et al., 2017;
Sukhbaatar and Fergus, 2016). Since actions will be taken
upon receiving the messages, a memory mechanism would
not be helpful in such scenario.
However, if the communication channel can only output
a finite and discrete set of tokens, a memory mechanism
is necessary in order to learn a compositional semantic of
messages. For example, Mordatch and Abbeel (2018) found
that interpretable compositional language can emerge from
cooperative memoryful agents. Havrylov and Titov (2017)
conducted a similar study, but with the target of learning
to refer to pictures. Das et al. (2017) showed that dialog
communication can also emerge in a similar image guess-
ing game. Evtimova et al. (2017) studies a similar variant of
image referral game by incorporating multi-modality. Choi,
Lazaridou, and de Freitas (2018) and Bogin, Geva, and Be-
rant (2018) both used the obverter technique (Oliphant and
Batali, 1997) to learn language, based on the assumption
that the model for the receiving agent is the same as that
for the sending agent, but for different environments: a grid
world environment and a referral game. Without exception,
all these works implemented recurrent policies.
Another constraint is if the channel only allows a certain
amount of messages to pass before being non-transmitting.
This circumstance requires a memory mechanism on both
the sender and receiver ends to memorize the last message
being exchanged, so that limited amount of communication
attempts can be put into best possible use. Wang, Everett,
and How (2019) confirm that agents are unlikely to learn
good policies in the absence of such mechanism.
Without (explicit) communication
In the absence of explicit communication, agents can still
find ways to communicate their specific behaviors. This is
perhaps unsurprising, because such behavior-based commu-
nication is also common among human interactions, with
body language serving as a prominent example. However,
a memory mechanism is typically required to both generate
and parse communicative behaviors, which are temporally
extended.
As an illustrative example, consider the environment de-
picted in Figure 4. Three agents start at the left of three lanes,
while a target will appear randomly on the right of one lane.
The agents are not allowed to cross lanes and reward is re-
ceived when the target is reached. At each time step, each
agent can choose to move to the left or right for one posi-
tion, or stay still, and will incur a cost for movement (e.g.
fuel cost). Only the center (red) agent can observe the target
location, but all agents can observe other agents.
often temporally extended since primitive behaviors (i.e. ac-
tions) are not necessarily expressive enough (Mordatch and
Abbeel, 2018). Therefore, both the sending and receiving
agents could benefit from an explicit memory mechanism.
8 Partially Observable/Partially Internal
In this case, we not only have external agents, but also have
several internal agents, each of which cannot fully observe
the environmental state. From the previous two sections, it
was shown that a memory mechanism is needed to model
opponents and to communicate with teammates under con-
straints. Therefore, a memory mechanism is also expected
to help in this case, although it is studied by relatively few
amount of work. For example, Lowe et al. (2017) proposed
an algorithm that can work with this type of environment but
is based on co-learning, which is prone to drastically chang-
ing external agents.
9 State-Based Bookkeeping
Figure 4: The environment for the three-lane target pursuit
task, without explicit communication.
Without cost for agent movement, the optimal policy for
this problem is for all three agents to independently head off
to pursue the potential target (with only one agent ultimately
arriving at that target). However, in the presence of such a
cost, a better policy would be for the center agent to com-
municate target's location with its behavior, which is in turn
parsed by the two other agents to receive the corresponding
message.
target location
top
center
bottom
first two steps
→,←
→,→
→,·
Table 3: Example of behavior-based communication to solve
the domain in Figure 4.
More concretely, consider the behavior-based communi-
cation of the red agent during the first two time steps, as
shown in Table 3. The red agent uses a RIGHT-LEFT be-
havior sequence to convey that the target is in the top lane, a
RIGHT-NOP sequence to signal that the the target is in the
bottom lane, and a RIGHT-RIGHT sequence to indicate that
the target is in the center lane. Given a memory mechanism,
the blue and green agents are able to parse such temporally
extended behavioral communication and take corresponding
actions. If fuel cost is greater than time cost, it is easy to
see that such a policy achieves better reward than the naive
policy of every agent moving to the right at the same time.
Since the signaling agent must trade off using behavior
for either task completion or communication, any communi-
cation must be sparse (Wang, Everett, and How, 2019), and
Throughout this work, we assume that the agent achieves the
goal of remembering past history only through the provided
memory mechanism. However, this is not necessarily the
case, as the agent can encode memory in unexpected places:
specifically, the agent can store past history (i.e. opponent
actions or teammate communication messages) within its
own state.
As an example in a discrete domain, consider a target-
reaching task with cooperative communication in one-
dimensional discrete space that includes four targets located
at locations from 11 to 14. The mover agent starts at location
0, and must reach the correct pre-specified target (which is
not observed), with a maximum movement of five grids each
time. Its speaker teammate can observe the target location
and send a discrete communication token from a set of two
tokens {A, B} each time, but cannot observe the mover's
location. The episode is terminated when either of the four
targets is reached, and reward of 10 is given for reaching
the correct target. A cost of 1 is applied at each time step to
encourage faster completion.
Apparently, compositional language (i.e. phrases) is nec-
essary to communicate the target location using the limited
set of available tokens. In addition, when observing only the
target as the state, the speaker requires a memory mecha-
nism to generate a sequence of tokens. However, we show
that the mover does not require an explicit memory mecha-
nism in order to parse the communication.
Table 4 depicts the speaker's emitted phrases correspond-
ing to each target location, which we assume to be fixed. At
each time step, the mover's policy is to move right a certain
number of steps depending on its location and the received
token at that time step: a = π(s, c), where c ∈ {A, B}.
Policy search finds the policy illustrated in Figure 5. Upon
receiving message token A, the agent moves to position 4,
and moves to position 5 when receiving B. Therefore, its
current position serves as a way to memorize the previous
token. Then from position 4, it moves to 7 when receiving
another A, and to 8 when receiving another B. Similarly,
when from position 5, it moves to 9 when receiving A and
target location message
11
12
13
14
A, A
A, B
B, A
B, B
Table 4: Emitted message for each target location. Any token
emitted beyond the 2nd time step is null.
Figure 5: A memoryless policy incorporating state-based
bookkeeping
10 when receiving B. Again, it uses its state to memorize the
communication history (i.e. positions 7, 8, 9, and 10 clearly
disambiguate messages AA, AB, BA, and BB). Then it
will move a constant four steps to the desired target loca-
tions. Overall three time steps will be taken, which is also
optimal even with a memory mechanism. Moreover, an op-
timal policy can be derived for any communication protocol
as long as different targets are disambiguated by messages,
facilitating the discovery of such solutions.
Such a technique is also possible in continuous domains.
In particular, Wang, Everett, and How (2019) found that
when using an actor-critic algorithm with a memoryful
critic, memoryless actors are sufficient to achieve limited-
budget communication, which requires agents to remember
past messages: their finding may be explained by such phe-
nomenon. Notably, similar phenomena have been discov-
ered in other applications as well, such as neural network
capable of hiding high-frequency information inside images
(Chu, Zhmoginov, and Sandler, 2017). Nevertheless, one
way of mitigating such phenomenon is to make the transition
stochastic, so that any high-frequency information would be
destroyed by the transition function.
In a similar vein, agents in communication-free environ-
ments can also employ this kind of state-based communica-
tion, as discussed above. However, unlike state-based mem-
ory mechanisms, such communications are to a large extent
robust to environment noise, especially if such behaviors are
temporally extended, with generation and parsing performed
by a dedicated memory mechanism. However, when evaluat-
ing emergent communication protocols, it is critical to con-
firm whether agents are indeed using only the communicated
messages or other agents' behaviors as well.
10 Conclusion and Future Work
In this paper, we identified situations in multi-agent rein-
forcement learning can benefit from an explicit memory
mechanism. The two major uses of such a mechanism is to
model opponents and to carry out communicative behaviors.
First, we argue that opponent modeling is an indispens-
able component of learning with external agents, regardless
of the reward structure being shared or not. We found that
the more popular co-learning approach employed by most
algorithms will only keep an implicit model of the oppo-
nent and will poorly adapt to changing opponents, which is
shown both experiments and confirmed by findings of Lowe
et al. (2019).
Second, we argue that a memory mechanism allows for
more flexible communication protocols, both implicit and
explicit. Most literature on communication focus on explicit
communication, in which a dedicated communication chan-
nel is set up between the sending and the receiving agents.
In this scheme, a memory mechanism has been shown to en-
able both temporally extended and sparse communications.
In addition, we also show a memory mechanism can help
emerge implicit, behavior-based communication, which is
often temporally extended.
Last, we identify a potential way for agents to bypass such
a memory mechanism through what we call a state-based
bookkeeping mechanism. Specifically, since state is persis-
tently accessible by the agent during the Markovian transi-
tion, the agent may find a policy that uses state to implicitly
encode memory content.
One direction for future work is to design algorithms that
can model more sophisticated opponents, including those
that also adapt to our agent's behavior in an online man-
ner (similar to (Foerster et al., 2018a) for co-learning algo-
rithms). In addition, most studies of emergent communica-
tion is on explicit communication, but a memory mechanism
also enables us to measure implicit communication. More-
over, the most general form of communication combines im-
plicit and explicit ones, in that with a memory mechanism,
the "meaning" as understood by the receiving agent is de-
pendent not only on the explicit message, but also on the
sending agent's movement, and potentially as well as the
receiving agent's own state history. This may hinder inter-
pretability, and it may be desirable to disentangle the contri-
bution of each component to the perceived meaning of the
message.
References
Al-Shedivat, M.; Bansal, T.; Burda, Y.; Sutskever, I.; Mor-
datch, I.; and Abbeel, P. 2017. Continuous adaptation via
meta-learning in nonstationary and competitive environ-
ments. arXiv preprint arXiv:1710.03641.
Bogin, B.; Geva, M.; and Berant, J. 2018. Emergence
of communication in an interactive world with consistent
speakers. arXiv preprint arXiv:1809.00549.
Cassandra, A. R.; Kaelbling, L. P.; and Littman, M. L. 1994.
Acting optimally in partially observable stochastic do-
mains. In Aaai, volume 94, 1023 -- 1028.
Cho, K.; Van Merrienboer, B.; Gulcehre, C.; Bahdanau, D.;
Bougares, F.; Schwenk, H.; and Bengio, Y. 2014. Learn-
ing phrase representations using rnn encoder-decoder
arXiv preprint
for statistical machine translation.
arXiv:1406.1078.
Choi, E.; Lazaridou, A.; and de Freitas, N. 2018. Compo-
sitional obverter communication learning from raw visual
input. arXiv preprint arXiv:1804.02341.
Chu, C.; Zhmoginov, A.; and Sandler, M.
clegan, a master of steganography.
arXiv:1712.02950.
2017. Cy-
arXiv preprint
Das, A.; Kottur, S.; Moura, J. M.; Lee, S.; and Batra,
2017. Learning cooperative visual dialog agents
D.
In Proceedings of
with deep reinforcement learning.
the IEEE International Conference on Computer Vision,
2951 -- 2960.
Duan, Y.; Schulman, J.; Chen, X.; Bartlett, P. L.; Sutskever,
I.; and Abbeel, P. 2016. RL2: Fast reinforcement learn-
arXiv preprint
ing via slow reinforcement learning.
arXiv:1611.02779.
Evtimova, K.; Drozdov, A.; Kiela, D.; and Cho, K. 2017.
Emergent communication in a multi-modal, multi-step
referential game. arXiv preprint arXiv:1705.10369.
Foerster, J.; Assael, I. A.; de Freitas, N.; and Whiteson, S.
2016. Learning to communicate with deep multi-agent
reinforcement learning. In Advances in Neural Informa-
tion Processing Systems, 2137 -- 2145.
Foerster, J.; Chen, R. Y.; Al-Shedivat, M.; Whiteson, S.;
2018a. Learning with
Abbeel, P.; and Mordatch, I.
In Proceedings of the
opponent-learning awareness.
17th International Conference on Autonomous Agents
and MultiAgent Systems, 122 -- 130.
International Foun-
dation for Autonomous Agents and Multiagent Systems.
Foerster, J. N.; Farquhar, G.; Afouras, T.; Nardelli, N.; and
Whiteson, S. 2018b. Counterfactual multi-agent policy
gradients. In Thirty-Second AAAI Conference on Artificial
Intelligence.
Gauthier, J., and Mordatch, I. 2016. A paradigm for sit-
uated and goal-driven language learning. arXiv preprint
arXiv:1610.03585.
Gers, F. A.; Schmidhuber, J.; and Cummins, F. 1999. Learn-
ing to forget: Continual prediction with lstm.
Hausknecht, M., and Stone, P. 2015. Deep recurrent q-
learning for partially observable mdps. In 2015 AAAI Fall
Symposium Series.
Havrylov, S., and Titov, I. 2017. Emergence of language
with multi-agent games: Learning to communicate with
sequences of symbols. In Advances in neural information
processing systems, 2149 -- 2159.
Kemker, R.; McClure, M.; Abitino, A.; Hayes, T. L.; and
Kanan, C. 2018. Measuring catastrophic forgetting in
In Thirty-second AAAI conference on
neural networks.
artificial intelligence.
Leslie, A. M. 1987. Pretense and representation: The origins
of" theory of mind.". Psychological review 94(4):412.
Li, S.; Wu, Y.; Cui, X.; Dong, H.; Fang, F.; and Russell, S.
2019. Robust multi-agent reinforcement learning via min-
imax deep deterministic policy gradient. In AAAI Confer-
ence on Artificial Intelligence (AAAI).
Littman, M. L. 1994. Markov games as a framework for
multi-agent reinforcement learning. In Machine learning
proceedings 1994. Elsevier. 157 -- 163.
Lowe, R.; Wu, Y.; Tamar, A.; Harb, J.; Abbeel, O. P.; and
Mordatch, I. 2017. Multi-agent actor-critic for mixed
In Advances in
cooperative-competitive environments.
Neural Information Processing Systems, 6379 -- 6390.
Lowe, R.; Foerster, J.; Boureau, Y.-L.; Pineau, J.; and
Dauphin, Y. 2019. On the pitfalls of measuring emergent
communication. In Proceedings of the 18th International
Conference on Autonomous Agents and MultiAgent Sys-
tems, 693 -- 701. International Foundation for Autonomous
Agents and Multiagent Systems.
Mordatch, I., and Abbeel, P. 2018. Emergence of grounded
compositional language in multi-agent populations.
In
Thirty-Second AAAI Conference on Artificial Intelligence.
Nguyen, D. T.; Kumar, A.; and Lau, H. C. 2018. Credit as-
signment for collective multiagent rl with global rewards.
In Advances in Neural Information Processing Systems,
8102 -- 8113.
Oliphant, M., and Batali, J. 1997. Learning and the emer-
gence of coordinated communication. Center for research
on language newsletter 11(1):1 -- 46.
Rabinowitz, N. C.; Perbet, F.; Song, H. F.; Zhang, C.; Es-
lami, S.; and Botvinick, M. 2018. Machine theory of
mind. arXiv preprint arXiv:1802.07740.
Raileanu, R.; Denton, E.; Szlam, A.; and Fergus, R. 2018.
Modeling others using oneself in multi-agent reinforce-
ment learning. arXiv preprint arXiv:1802.09640.
Sukhbaatar, S., and Fergus, R. 2016. Learning multiagent
In Advances in
communication with backpropagation.
Neural Information Processing Systems, 2244 -- 2252.
Sutton, R. S., and Barto, A. G. 2018. Reinforcement learn-
ing: An introduction. MIT press.
Wang, R. E.; Everett, M.; and How, J. P. 2019. R-maddpg for
partially observable environments and limited communi-
cation.
Wu, C.; Herranz, L.; Liu, X.; van de Weijer, J.; Raducanu,
B.; et al. 2018. Memory replay gans: Learning to generate
new categories without forgetting. In Advances In Neural
Information Processing Systems, 5962 -- 5972.
Xu, H.; Gao, Y.; Yu, F.; and Darrell, T. 2017. End-to-
end learning of driving models from large-scale video
datasets. In Proceedings of the IEEE conference on com-
puter vision and pattern recognition, 2174 -- 2182.
Yang, T.; Hao, J.; Meng, Z.; Zheng, Y.; Zhang, C.; and
Zheng, Z. 2019. Bayes-tomop: A fast detection and best
response algorithm towards sophisticated opponents. In
Proceedings of the 18th International Conference on Au-
tonomous Agents and MultiAgent Systems, 2282 -- 2284.
International Foundation for Autonomous Agents and
Multiagent Systems.
Zhang, J., and Cho, K. 2016. Query-efficient imitation learn-
ing for end-to-end autonomous driving. arXiv preprint
arXiv:1605.06450.
|
1908.08787 | 1 | 1908 | 2019-08-13T22:29:57 | Swarm Intelligence for Morphogenetic Engineering | [
"cs.MA",
"nlin.PS",
"q-bio.TO"
] | We argue that embryological morphogenesis provides a model of how massive swarms of microscopic agents can be coordinated to assemble complex, multiscale hierarchical structures. This is accomplished by understanding natural morphogenetic processes in mathematical terms, abstracting from the biological specifics, and implementing these mathematical principles in artificial systems. We have developed a notation based on partial differential equations for artificial morphogenesis and have designed a prototype morphogenetic programming language, which permits precise description of morphogenetic algorithms and their automatic translation to simulation software. Morphogenetic programming is illustrated by two examples: (1) use of a modified flocking algorithm to route dense fiber bundles between regions of an artificial cortex while avoiding other bundles; (2) use of the clock-and-wavefront model of spinal segmentation for the assembly of the segmented spine of an insect-like robot body and for assembling segmented legs on the robot's spine. Finally, we show how a variation of smoothed particle hydrodynamics (SPH) swarm robotic control can be applied to the global-to-local compilation problem, that is, the derivation of individual agent control from global PDE specifications. | cs.MA | cs |
SWARM INTELLIGENCE FOR MORPHOGENETIC ENGINEERING
A PREPRINT
Bruce J. MacLennan
Allen C. McBride
Dept. of Electrical Engineering and Computer Science
Dept. of Electrical Engineering and Computer Science
University of Tennessee, Knoxville
University of Tennessee, Knoxville
[email protected]
[email protected]
August 26, 2019
ABSTRACT
We argue that embryological morphogenesis provides a model of how massive swarms of micro-
scopic agents can be coordinated to assemble complex, multiscale hierarchical structures. This is
accomplished by understanding natural morphogenetic processes in mathematical terms, abstracting
from the biological specifics, and implementing these mathematical principles in artificial systems.
We have developed a notation based on partial differential equations for artificial morphogenesis and
have designed a prototype morphogenetic programming language, which permits precise description
of morphogenetic algorithms and their automatic translation to simulation software. Morphogenetic
programming is illustrated by two examples: (1) use of a modified flocking algorithm to route dense
fiber bundles between regions of an artificial cortex while avoiding other bundles; (2) use of the
clock-and-wavefront model of spinal segmentation for the assembly of the segmented spine of an
insect-like robot body and for assembling segmented legs on the robot's spine. Finally, we show
how a variation of smoothed particle hydrodynamics (SPH) swarm robotic control can be applied
to the global-to-local compilation problem, that is, the derivation of individual agent control from
global PDE specifications.
Keywords active matter · artificial morphogenesis · morphogenetic engineering · smoothed particle hydrodynamics ·
swarm intelligence · swarm robotics
1 Self-assembly of Complex Hierarchical Structures
We are applying swarm intelligence to the coordination of microrobot swarms to assemble complex, hierarchically
structured physical systems. We are interested in multiscale systems that are intricately and specifically structured
from the microscopic level up through the macroscopic level: from microns to meters. On one hand, conventional
manufacturing techniques, including additive manufacturing, work well at the macroscopic level, but are difficult to
scale down below the millimeter scale. On the other, technologies that are effective at the microscopic scale, such as
photolithography and molecular self-assembly, do not scale well to complex macroscopic objects.
Nevertheless, it would be valuable to be able to assemble automatically systems structured across many length scales.
For example, the human brain has complex structures spanning more that six orders of magnitude, from micron-
scale synapses to decimeter-scale functional regions and interconnections [17].
It is not unreasonable to suppose
that a neuromorphic computer with capacities and functions similar to a human brain would have similar complexity.
How would we assemble a neuromorphic computer with 100 billion neurons and perhaps 100 trillion nonrandom
connections? Similarly complex future sensors and actuators, with capabilities similar to animal sense organs and
effectors, will span scales from the microscopic to the macroscopic.
Automatic assembly of such complex structures might seem to be an unobtainable goal, but we know it is possible,
for nature does it. Embryos develop from a single cell to a complex organism with many trillions of cells, each
itself a complex hierarchical system. During development, cells communicate, coordinate, and cooperate, behaving
as a massive swarm, to differentiate and rearrange into the various interrelated tissues that constitute a complete
A PREPRINT - AUGUST 26, 2019
organism. Morphogenesis refers to the developmental process that assembles and organizes three-dimensional forms
and structures. The process is massively parallel, distributed, and robust: all goals for us too.
Morphogenetic engineering or artificial morphogenesis takes inspiration from biological morphogenesis, seeking new
ways to create complex structures that share some ideas from the development of embryos in multicellular organisms.
Because of the diversity of mechanisms in biological morphogenesis from which inspiration might be taken, morpho-
genetic engineering is diverse. It can overlap several fields including swarm robotics, modular robotics, amorphous
computing, cellular automata, and synthetic biology. Bodies developed through morphogenetic engineering may take
form through the birth and death of sessile elements, or through the rearrangement of motile ones. Design approaches
also vary. Processes may be designed by hand in an ad hoc fashion to illustrate particular hypotheses or principles.
Designs may also be generated by hand in more systematic ways, for example through global-to-local compilation.
Evolutionary algorithms are also popular for automatic design of processes to achieve well-defined goals. Finally, a
spectrum exists from biological morphogenesis with limited human control to fully artificial systems [43].
Embryological morphogenesis has inspired a variety of approaches to swarm intelligence [16, 33, 32, 41, 7, 2, 11];
our approach to artificial morphogenesis tends to adhere more closely to natural morphogenesis than do most of these
others. reference [8] provide a rigorous taxonomy of morphogenetic engineering, including additional examples, and
reference [35] provide a more recent review of similar work.
Morphogenetic engineering is a specific approach to the goal of programmable matter, that is, the ability to system-
atically control the properties and behavior of material systems at a fine level [13, 27], and artificial morphogenesis
exhibits the properties of active matter [34, 6, 45]. Morphogenetic engineering also has some similarities to amorphous
computing [1], but artificial morphogenesis processes may begin with simple, structured preparations (see for example
Sec. 5 below), and even if they do begin in an unorganized state, it is characteristic of morphogenetic processes to
quickly self-organize.
Although natural morphogenesis is a complex and intricate process -- still incompletely understood -- biologists have
identified about twenty fundamental processes [9, pp. 158 -- 9][39]. Not all are applicable to artificial morphogenesis,
and some (such as cell division) may be difficult to implement, nevertheless these processes provide an agenda for
morphogenetic engineering, since they are in principle sufficient for assembling something as complex as an animal
body [20, 22, 25, 26]. Processes that cannot be directly implemented (such as cell division) may need to have their
function accomplished by alternative means (e.g., providing components from an external source and moving them to
the growth zone; see Sec. 5.1 for an example).
During biological morphogenesis, cells emit and receive chemical signals, migrate and differentiate in response to
those signals, and participate in both reproduction (cell proliferation) and programmed cell death (apoptosis).
In
the process they emit and absorb molecules that serve both as communication media (morphogens) and as structural
elements. Similarly, in our approach to artificial morphogenesis we distinguish active components and passive com-
ponents [27]. Active components are microscopic agents (microrobots or genetically engineered micro-organisms)
that can emit and respond to simple signals, implement simple (primarily analog) control processes, and move and
transport other (active or passive) components. Passive components are all the rest, including signaling molecules
and structural components. They do not move under their own power, but are moved by external forces (including
Brownian motion and active components). In a typical artificial morphogenesis process, agents (active components)
might transport and assemble passive components into a desired structure, or they might assemble themselves into the
structure, as cells do in biological development.
2 Describing Artificial Morphogenesis with PDEs
The challenge of artificial morphogenesis is to control very large swarms of active components (microscopic agents) to
interact with each other and with the passive components to assemble a desired structure. This requires an appropriate
level of abstraction that allows the process to be described in sufficient detail for implementation without becoming
obscured by details of a specific implementation technology. Here again we have taken our inspiration from biology,
for biologists often use partial differential equations (PDEs) to describe morphogenetic processes. At this level of ab-
straction developing tissues and diffusing signaling chemicals are described at a macroscopic level largely independent
of individual cells. It also allows the methods of continuum mechanics to be applied, which are especially appropriate
for embryological development, which takes place in the domain of "soft matter" (viscoelastic materials) [4, 9, 42].
Therefore we are operating in the domain of well-understood mathematical methods in which continuum models are
applied to macroscopic volumes of materials with a discrete molecular structure.
Scalability is a principal advantage of using PDEs for morphogenetic engineering. This is because a PDE, especially
when used in continuum mechanics or fluid dynamics, treats a material as a phenomenological continuum; that is, it
2
A PREPRINT - AUGUST 26, 2019
is treated as though composed of an infinite number of infinitesimal particles, which is a usable approximation of a
material composed of a very large number of very small particles. Therefore, if our goal in artificial morphogenesis
is to use a very large swarm of very small agents, PDEs take this goal to the continuum limit. Instead of worrying
whether our algorithms will scale up to larger swarms of smaller agents, we have the complementary, but easier, task
of scaling down from an infinite number of infinitesimal agents to a very large number of very small agents.
Another advantage of expressing morphogenetic processes in PDEs is that they are largely independent of agent size.
This is because the processes are expressed in terms of intensive quantities, such as agent density, rather than extensive
quantities, such as numbers of agents [20, 22, 28]. Therefore, an algorithm that produces structures of a particular
size will continue to be correct even if the size of the agents is changed. (There are obviously limits to this size
independence; the continuum approximation has to be good.)
In summary, using PDEs allows us to describe the behavior of massive swarms, by which we mean swarms that
can be treated as a continuous mass. We treat massive swarms the same way tissues are treated in embryological
morphogenesis and the same way fluids and solid masses are treated in continuum mechanics.
3 A Morphogenetic Programming Language
In order to test algorithms for the coordination of microrobot swarms for morphogenetic engineering, we have devel-
oped a morphogenetic programming notation based on mathematical notation for PDEs [20, 21, 23, 24, 25]. In order
to facilitate simulations, this notation has been formalized into a morphogenetic programming language, tentatively
named "Morphgen." We have a prototype implementation of Morphgen by means of a syntax macroprocessor, which
translates Morphgen programs into MATLAB® or compatible GNU Octave [29]. This approach imposes some syntac-
tic limitations on the Morphgen language, which would not be required with a conventional compiled implementation,
but it permits rapid prototyping and experimentation with language features. There are two slightly different dialects
of the language for describing either two-dimensional or three-dimensional morphogenetic systems.
(A complete
grammar for a previous version of Morphgen is published in reference [30]; here we use Morphgen version 0.13.)
3.1 Substances
A morphogenetic program is organized into a number of substances with common properties; typical substances
include diffusing morphogens and massive swarms of agents. Substances are similar to classes in object-oriented
programming languages, in that a substance defines the common properties of an unlimited number of particular
instances (called bodies in Morphgen, analogous to objects in object-oriented programming). Like subclasses in
object-oriented programming, more specific substances may be derived from more general substances by specification
of parameters that were unspecified in the more general substance, and by the addition of properties and behaviors in
the derived substance. For example, we might have a substance representing a general diffusible substance with an
unspecified diffusion rate, and one or more specific diffusible substances, with specified diffusion rates, derived from
the general substance.
We distinguish physical substances and controllable substances, but this is more a matter of degree than kind, and
applies primarily to active components. The idea is that the properties and behavior of physical substances are rela-
tively fixed. For example, a particular chemical morphogen will have specific diffusion and decay rates within a given
medium, and a particular agent swarm will be composed of agents, such as microrobots, with particular masses and
specific sensors and actuators. Changing these properties entails making a new substance, new kinds of agents, and
different hardware.
In contrast, a controllable substance has properties that are relatively easy to control. For example, a programmable
agent will permit its sensors and actuators to be controlled so that it behaves in a desired way; its software can be
changed. That is, a controllable substance is in some sense programmable, but there are degrees of programmability.
The current Morphgen language does not distinguish between physical and controllable substances, since controlla-
bility is a matter of degree and even economics. However, the distinction might be expressed in a substance hierarchy.
For example, a substance definition might reflect the physical properties and behavior of a certain kind of microrobot,
and then various substances derived from it could represent the microrobots programmed for distinct functions and
behaviors.
This is an example of a simple substance definition (a diffusible morphogen), which illustrates its parts:
3
A PREPRINT - AUGUST 26, 2019
/ /
c o n c e n t r a t i o n
substance morphogen :
s c a l a r
behavior :
f i e l d C
param d C = 0 . 3
param t C = 10
D C = d C * de l 2 C − C / t C / /
/ /
/ / decay t i m e
d i f f u s i o n c o n s t a n t
c o n s t a n t
d i f f u s i o n & decay
As illustrated by this example, the syntactic extent of many Morphgen constructs is indicated by indenting. (This
substance definition is terminated by a line indented less or equal that of the word substance.) A substance definition
has two parts: field declarations (preceding behavior) and behavioral specifications (following behavior).
3.2 Field Declaration
A substance is characterized by one or more continuous fields defined throughout the space. These may be scalar
fields, such as concentration or density fields, or vector fields, such as velocity or flux fields. The preceding definition
of "morphogen" illustrates the declaration of a scalar field called "C"; an example vector field declaration is:
v e c t o r
f i e l d V
Multiple fields of the same type can be declared on indented lines, as illustrated by this example:
s c a l a r
v e c t o r
C
S
U
V
swarm d e n s i t y
f i e l d s :
/ /
/ / magnitude o f morphogen g r a d i e n t
f i e l d s :
/ / morphogen g r a d i e n t
/ /
swarm v e l o c i t y
3.3 Behavior Specification
Fundamental to our approach is the use of partial differential equations to describe the behavior of massive swarms
of microscopic agents. Such agents and the materials that they control will move continuously in time, but we also
simulate this behavior on ordinary computers in discrete time. Therefore we describe the behavior of substances
by change equations which can be interpreted ambiguously as either ordinary PDEs or as temporal finite difference
equations. The derivation rules of this calculus respect both interpretations. We write change equations with the
notation -- DX = F (X, Y, . . .), which means either the differential equation ∂tX = F (X, Y, . . .) or the difference
equation ∆X/∆t = F (X, Y, . . .). A change equation such as
-- DC = dC∇2C − C/tC
is written as follows in the Morphgen language:
D C = d C * de l 2 C − C / t C
The Morphgen prototype implementation does not include a full expression parser, and so there are some notational
concessions to allow expressions to be handled by the syntax macroprocessor. For the most part, scalars and fields
(both scalar and vector) can be combined using standard arithmetic operators (+, −, *, /). However, products or
quotients of two scalar fields, products of a scalar field and a vector field, quotients of a vector field and a scalar field,
and powers of scalar fields must be surrounded by square brackets, for example, [C * V]. Morphgen includes several
vector operators, including the gradient del X, the Laplacian del2 X, the divergence div X, and the pointwise L2
norm of a vector field, X.
Some change equations are stochastic, either to model indeterminacy and uncertainty in the physical systems, or
to introduce randomness into the swarm control (e.g., to break deadlocks and symmetry). In order to respect both
continuous- and discrete-time stochastic change equations, the morphogenetic programming notation interprets -- DW n
to be an n-dimensional random vector field distributed N (0, 1) in each dimension; it represents n independent sources
of randomness at each point in the (two- or three-dimensional) space [20, 21, 23]. For a d ∈ {2, 3} dimensional
morphogenetic process, we usually use M -- DW n, where M is a d× n matrix that weights and sums the random inputs
into a d-dimensional vector field. M can be a 1 × n matrix to generate a scalar field, or a scalar when n ∈ {1, d}. All
of these cases are written [M DWn] in the Morphgen language.
4
A PREPRINT - AUGUST 26, 2019
Control of morphogenetic swarms often requires them to change their behavior when some quantity exceeds a thresh-
old or is within some range. To accommodate these requirements, Morphgen permits bracketed conditional factors
(actually, Heaviside step functions), which are 0 or 1 depending on whether or not the condition is true. For example,
the following describes a scalar field A in which any value greater than θ increases exponentially until it saturates at
A = 1; values less than or equal to θ decay to zero (with time constant τ):
D A = [A > t h e t a ] A * (1−A) − [A <= t h e t a ] A/ t a u
Sometimes the behavior of a field is described by several partial change equations distributed among several substance
definitions. Partial change equations are written in either of these forms:
D (cid:104)name(cid:105) += (cid:104)expr(cid:105)(cid:104)newline(cid:105)
D (cid:104)name(cid:105) −= (cid:104)expr(cid:105)(cid:104)newline(cid:105)
(This notation was first used in morphogenetic programming by reference [?]p. 20]Fleischer-PhD.) A typical applica-
tion would be describing the behavior of a morphogen. The definition of the morphogen substance might define its
diffusion and decay with a partial change equation such as this:
D M += d M * d el 2 M − M /
t a u C
This is part of the definition of the morphogen because it is a physical property of the substance. Elsewhere in the
program, in the definition of a substance representing the agent swarm (with swarm density S), another partial change
equation could describe the emission of the morphogen at a rate kM :
D M += k M * S
This is part of the behavior of the swarm substance because the morphogen is produced by the agents constituting the
swarm.
It is often convenient to name additional scalars or fields within a substance behavior definition, which is accomplished
by a statement of the form:
let (cid:104)name(cid:105) = (cid:104)expr(cid:105)(cid:104)newline(cid:105)
(In the current prototype implementation, declared fields have global scope, but let-defined variables are local to the
substances in which they are defined.)
The behavior of substances is determined also by certain fixed parameters, such as diffusion and decay rates. These
are specified by a parameter definition, which has the syntax:
param (cid:104)name(cid:105) = (cid:104)expr(cid:105)(cid:104)newline(cid:105)
Parameter definitions usually occur at the beginning of the behavior part of a substance definition, but can also be
global as part of the simulation parameters (see Sec. 3.5 below). A sequence of parameter definitions can be
indented under the word params.
The following behavioral rules [30] illustrate many of the Morphgen features we have discussed (and also line contin-
uation indicated by " ... "):
params :
v = 1
lambda = 0 . 0 3
eps = 1e−100
k W = 0 . 1
k P = 30
t D = 5
r e g u l a t i o n
/ / base swarm s p e e d
/ / d e n s i t y
/ / minimum g r a d i e n t norm
/ / d e g r e e o f
/ / p a t h d e p o s i t i o n r a t e
/ / d e l a y p e r i o d
random motion
l e t U = d el A
l e t S = U
l e t V = [ ( v*U ) / ( S+ eps ) ] − lambda * d el [ ( C−1)2]
D C = [ t >t D ] −div [C*V]
change i n d e n s i t y
/ /
D P += [ t >t D ] k P * [C*(1−P ) ]
+ [ k W DW 2 ]
/ / p a t h d e p o s i t i o n
. . .
5
A PREPRINT - AUGUST 26, 2019
3.4 Bodies
The substance definitions of a morphogenetic program describe the general properties of the materials or substances
(including massive agent swarms) that are involved in the process. A complete morphogenetic program also requires
specification of the initial conditions, which in the case of morphogenesis means an initial preparation of the sub-
stances. Since the goal of morphogenesis is for complex structure to emerge by means of self-assembly, the initial
preparation should be simple in structure: simple spatial arrangements of materials and of sources and sinks.
In our case, the initial conditions are specified by defining a small number of bodies belonging to defined substances.
A body definition has a header followed by a sequence of (indented) initializations, for example:
body O b s t a c l e s of p a t h m a t e r i a l :
f o r ( x , y ) within 0 . 0 6 of
f o r ( x , y ) within 0 . 0 6 of
/ / p l a c e o b s t a c l e s
( −0.1 , 0 . 2 2 5 ) : P = 1
( 0 . 1 , −0.225): P = 1
Initializations currently have the following forms:
(cid:104)initialization(cid:105)
(cid:104)region(cid:105)
(cid:104)init(cid:105)
for (cid:104)region(cid:105) : (cid:104)newline(cid:105) (cid:104)init(cid:105)∗ (cid:104)dedent(cid:105)
::= for (cid:104)region(cid:105) : (cid:104)init(cid:105)
::= (cid:104)expr(cid:105) < (cid:104)name(cid:105) < (cid:104)expr(cid:105),(cid:104)expr(cid:105) < (cid:104)name(cid:105) < (cid:104)expr(cid:105)
((cid:104)name(cid:105),(cid:104)name(cid:105)) within (cid:104)expr(cid:105) of ((cid:104)expr(cid:105),(cid:104)expr(cid:105))
::= (cid:104)name(cid:105) = (cid:104)expr(cid:105)(cid:104)newline(cid:105)
((cid:104)dedent(cid:105) represents delimitation by an indent level less than or equal to the the beginning of the construct.) This
syntax is for the 2D version of Morphgen; the 3D version has similar initializations. The second kind of for definition
permits multiple fields to be initialized in a region, e.g.:
body S t a r t of
swarm
f o r −0.5<x <0.5 , 0<y <0.1:
S = 1
M = 0 . 0 5
/ /
/ /
i n i t i a l
i n i t i a l morphogen c o n c e n t r a t i o n
swarm d e n s i t y
(Uninitialized regions are assumed to be zero.)
3.5 Simulation
The preceding morphogenetic programming constructs apply as well to simulations as to specifying real morpho-
genetic processes executed by physical microrobots. For simulation purposes, the Morphgen language provides addi-
tional facilities. The overall structure of a Morphgen program has the syntax:
morphogenetic program (cid:104)name(cid:105) :
(cid:104)sim params(cid:105)
(cid:104)substance(cid:105)∗
(cid:104)body(cid:105)∗
(cid:104)visualization(cid:105)
end program
The parameters for the simulation are followed by the substance definitions, which are followed by the body defini-
tions, which are followed by visualization commands.
6
The block of simulation parameters have the syntax:
A PREPRINT - AUGUST 26, 2019
(cid:104)sim params(cid:105)
(cid:104)sim par(cid:105)
(cid:104)log params(cid:105)
::= simulation parameters : (cid:104)sim par(cid:105)∗ (cid:104)dedent(cid:105)
::= duration = (cid:104)num(cid:105)(cid:104)newline(cid:105)
::= log params (cid:104)name(cid:105) [, (cid:104)name(cid:105)]∗ (cid:104)newline(cid:105)
temporal resolution = (cid:104)num(cid:105)(cid:104)newline(cid:105)
space (cid:104)num(cid:105) < x < (cid:104)num(cid:105),(cid:104)num(cid:105) < y < (cid:104)num(cid:105)(cid:104)newline(cid:105)
spatial resolution = (cid:104)num(cid:105)(cid:104)newline(cid:105)
save (cid:104)name(cid:105)+ to (cid:104)filename(cid:105)(cid:104)newline(cid:105)
load (cid:104)name(cid:105)+ from (cid:104)filename(cid:105)(cid:104)newline(cid:105)
(cid:104)log params(cid:105)
log note (cid:104)characters(cid:105) (cid:104)newline(cid:105)
The space specification defines the (two- or three-dimensional) region in which the morphogenetic process takes
place; duration determines how long (in simulated time) the simulation runs. The spatial and temporal resolution
of the simulation are defined by the spatial resolution and temporal resolution specifications. The save and
load directives allow scalar and vector fields to be saved and restored. Finally, log params records the specified
parameter values in a time-stamped text file, and log note puts a note in it.
Morphgen provides visualization commands to display fields in a variety of formats either during the simulation
(running) or at its end (final):
(cid:104)visualization(cid:105)
(cid:104)command(cid:105)
::= visualization : (cid:104)command(cid:105)+ (cid:104)dedent(cid:105)
::= display (cid:104)time(cid:105) (cid:104)primitive(cid:105) as (cid:104)kind(cid:105) (cid:104)options(cid:105)
make movie (cid:104)filename(cid:105) of (cid:104)primitive(cid:105) as (cid:104)kind(cid:105) (cid:104)options(cid:105)
(cid:104)stability report(cid:105)
::= running final
::= {mesh contours colors} [limits ((cid:104)expr(cid:105),(cid:104)expr(cid:105))]
::= (cid:104)characters(cid:105) (cid:104)newline(cid:105)
quivers [(cid:104)primitive(cid:105) mesh]
(cid:104)time(cid:105)
(cid:104)kind(cid:105)
(cid:104)options(cid:105)
For example, the following command displays a scalar field C as a heat map during the simulation:
d i s p l a y running C as c o l o r s
The following displays a vector field V as an array of quivers on a 0.2 × 0.2 mesh at the completion of the simulation:
d i s p l a y f i n a l V as quivers 0 . 2 mesh
A running display of a field can be converted to a movie, e.g.,
make movie Cvid . mp4 of C as contours
Finally, Morphgen provides several commands for assessing the numerical stability of the simulation:
(cid:104)stability report(cid:105)
::= report diffusion number for (cid:104)primitive(cid:105)
report Courant number for (cid:104)primitive(cid:105)
report Peclet number for (cid:104)primitive(cid:105) and (cid:104)primitive(cid:105)
4 Example: Routing Neural Pathways
Suppose we wanted to assemble a neuromorphic computer with a complexity comparable to a mammalian brain. Such
a neurocomputer might have billions of artificial neurons, each with many thousands of connections, and it would be
organized into functional regions, each comprising many millions of neurons, with remote regions connected by dense
bundles of millions of neural fibers (artificial axons). In a developing mammalian brain, axons grow toward their
destinations by following chemical signals (morphogens) that indicate way stations and the final destinations. The
stepwise development of a morphogenetic program to solve this problem illustrates our approach to swarm intelligence.
7
A PREPRINT - AUGUST 26, 2019
4.1 Discrete Agents
We begin with a simple path routing process. An agent will be placed at the connection's origin (e.g., the originating
point for a neural fiber), and a source of a diffusing morphogen (the attractant) will be placed at its destination. If the
agent moves up the attractant gradient, then it will find its way to the destination, and it can create in its wake the path
from the origin to the destination. However, we want to create many such paths, and so they cannot go in a straight
line to their destinations, but must weave their way around already created paths. There are at least two ways to
accomplish this. One is to have existing paths emit a repellant morphogen, which the agents try to avoid while seeking
the attractant [26]. An alternative, simpler solution is to have the existing paths absorb or degrade the morphogens, so
that they become sinks for it [25, 28]. Although both solutions work, in this case the simpler solution works better,
since the concentration of diffusing morphogens decreases exponentially with distance from the source [30]. (For
a 3-dimensional diffusion-decay process C = D∇2C − C/τ, the steady-state concentration at a distance r from a
point source with rate k is C(r) = k
Dτ ).) Since the concentration of attractant varies significantly
with distance from the destination, it is difficult, with the first approach, to properly balance it against the repellant
throughout the space. This balance is achieved in the second approach because the existing paths absorb a fraction of
the attractant in their vicinity.
√
4πDr exp(−r/
Figure 1: Neural fiber bundle routing by modified flocking algorithm. There are five bundles, each comprising 5000
fibers, joining randomly selected origins and destinations on the lower and upper surfaces.
8
A PREPRINT - AUGUST 26, 2019
Our goal, however, is not to have single neural fibers connecting (artificial) brain regions, but to have dense bundles of
point-to-point connections. Therefore, rather than having a single agent follow the attractant gradient from the origin
to the destination, we want a large swarm of agents to do so, creating in its wake a bundle of fibers that is tight but not
too tight. Flocks of birds and schools of fish move in an organized way in compact groups, and so we have explored
a modified flocking algorithm as a way of coordinating a swarm to lay down fiber bundles from an origin region to
a destination region [26, 28]. This algorithm has been shown to scale up from five agents (and hence five fibers per
bundle) up to 5000 agents and hence 5000 fibers per bundle, with no change of parameters and a small number of
errors (acceptable in neural computation): scaling over four orders of magnitude [28]. See Fig. 1.
4.2 Continuous Swarm
Next, we take the number of agents in the swarm to the continuum limit. The development and refinement of the
morphogenetic algorithm is described in reference [30]; here we summarize the final algorithm.
The path routing algorithm makes use of four substances: an attractant morphogen, the goal material marking the
destination, the path material laid down by the agents, and the swarm substance, which is composed of agents. The
morphogen substance is defined by a concentration field and a diffusion-decay equation, which describes its physical
behavior:
substance morphogen :
s c a l a r
behavior :
f i e l d A
/ / morphogen c o n c e n t r a t i o n
param d A = 0 . 0 3
param tau A = 100
D A += d A * d el 2 A − A/ tau A
/ /
/ / decay t i m e
d i f f u s i o n c o n s t a n t
c o n s t a n t
d i f f u s i o n + decay
/ /
The change in A is described by a partial change equation because this reflects only its physical diffusion and decay;
it is also emitted by the goal material and absorbed by the path material.
The goal material emits the attractant morphogen (and in this sense is active), but otherwise does not change:
substance g o a l m a t e r i a l :
s c a l a r
behavior :
f i e l d G
param k G = 100
D G = 0
D A += k G * [G*(1−A) ]
/ / d e n s i t y o f g o a l m a t e r i a l
/ /
a t t r a c t a n t
/ / G f i e l d i s
/ / g o a l e m i t s a t t r a c t a n t
r e l e a s e
f i x e d
r a t e
The partial change equation for A describes its emission by the goal material up to saturation at A = 1 and therefore
acts as a source term.
The path material P , which is laid down by the swarm, has two properties: (1) It absorbs the attractant morphogen
(so that new paths avoid existing paths), which is defined by a partial change equation for the morphogen, -- DA −=
P A/τP . Therefore the complete PDE for the morphogen is:
A = dA∇2A − A/τA + kGG(1 − A) − P A/τP .
(2) P increases its concentration autocatalytically if its concentration is above a threshold θP , and it decays if it is
below the threshold, which is described by the partial change equation:
-- DP += aP [P > θP ]P (1 − P ) − [P ≤ θP ]P/tP .
(1)
This autocatalytic behavior sharpens up the paths and ensures they have consistent density, which the equation drives
to P = 1 (path present) or P = 0 (path absent). It is a partial equation because the swarm also deposits path material.
The foregoing behavioral specifications are combined in the path material substance definition:
9
A PREPRINT - AUGUST 26, 2019
/ / p a t h d e n s i t y
substance p a t h m a t e r i a l :
f i e l d P
s c a l a r
behavior :
params :
/ / a u t o c a t a l y t i c
/ / a u t o c a t a l y t i c
a P = 20
t h e t a P = 0 . 3
t h e t a C = 0 . 0 2 / / quorum t h r e s h o l d
/ / p a t h decay t i m e
t P = 1
/ /
t a u P = 0 . 2
r a t e
t h r e s h o l d
c o n s t a n t
a t t r a c t a n t a b s o r p t i o n t i m e
/ / a u t o c a t a l y s i s :
D P = a P * [ P>t h e t a P ] [ P*(1−P ) ] − [ P<=t h e t a P ] P / t P
D A −= [ P*A ] / t a u P
/ / p a t h a b s o r b s a t t r a c t a n t
Finally we define the swarm substance, which controls the mass of agents to lay down a path while approaching the
goal and avoiding existing paths. The principal variable is the swarm density C, which is a real number reflecting the
continuum approximation. The swarm substance also has a vector field V, which defines the velocity of the swarm
throughout space. The change in swarm density, then, is simply the negative divergence of the flux CV:
-- DC = −[t > tD] div CV.
The conditional factor [t > tD] prevents swarm movement until tD time units have passed, which allows the mor-
phogen to diffuse throughout the space.
The velocity field is a weighted combination of three influences: the normalized morphogen gradient, a density control
term, and random (Brownian) motion to break symmetries. The normalized morphogen gradient (or gradient versor)
V1 is ∇A/(cid:107)∇A(cid:107), but to avoid possible division by zero, we compute it: V1 = U/((cid:107)U(cid:107)+), where U = ∇A and is
a small number. To control the density, we define a potential function (C − 1)2 that is minimized at the desired density
C = 1. The density control velocity is the negative normalized gradient of this potential: V2 = −W/((cid:107)W(cid:107) + ),
where W = ∇[(C − 1)2]. A regularization parameter λ controls the relative magnitude of these two velocity fields,
(1 − λ)V1 + λV2, which are combined with Brownian motion kW -- DW 2 and an overall speed v to compute the final
velocity field:1
V = v[(1 − λ)V1 − λV2 + kW DW 2)].
(2)
In Morphgen the substance definition begins like this:
substance swarm :
s c a l a r
v e c t o r
f i e l d C
f i e l d s :
U
V
W
/ /
swarm d e n s i t y
/ / morphogen g r a d i e n t
/ /
/ / d e n s i t y g r a d i e n t
swarm v e l o c i t y
behavior :
params :
v = 1
lambda = 0 . 1
eps = 1e−100
k W = 0 . 3
t D = 5
r e g u l a t i o n
/ / base swarm s p e e d
/ / d e n s i t y
/ / minimum g r a d i e n t norm
/ / d e g r e e o f
/ /
l e t U = d el A
/ / morphogen g r a d i e n t
l e t W = d el [ ( C−1)2]
/ / d e n s i t y g r a d i e n t
l e t V = v * ( ( 1 − lambda ) * [U / ( U + eps ) ]
− lambda * [W/ ( W + eps ) ] + [ k W DW 2 ] )
D C = [ t >t D ] −div [C*V]
t i m e d e l a y
random motion
. . .
Finally and most importantly the swarm deposits path material at a relative rate kP but saturates at P = 1. Therefore
the swarm contributes to the change in P by -- DP += [t > tD]kP C(1 − P ), which begins after tD time units. This is
expressed in Morphgen:
param k P = 30
D P += [ t >t D ] k P * [C*(1−P ) ]
/ / p a t h d e p o s i t i o n r a t e
/ / p a t h d e p o s i t i o n
1 Alternately, the Brownian motion can be described by a diffusion term.
10
A PREPRINT - AUGUST 26, 2019
(a) 2D simulation of path formation, origin at lower right, des-
tination at upper left, 9 obstacles.
(b) 3D simulation of path formation, origin in foreground, des-
tination on back surface, four obstacles. The figure shows re-
gions of path density P > 0.5.
Figure 2: Simulations of neural path formation. In both simulations it can be seen that a swarm sometimes splits to go
around an obstacle. For more information, see reference [30].
To test the algorithm we can define some obstacles and an origin and destination for a new path. Everything we have
discussed so far works for either a two- or three-dimensional morphogenetic system, but there are minor differences
between a 2D and 3D simulation.
For a 2D simulation, the obstacles (representing previously generated paths) are just circular regions of path material.
These can be created by a body definition such as shown in Section 3.4. For 3D simulations there are additional ways
to create obstacles, or the algorithm itself can be used to generate multiple paths, as in the earlier simulations with
discrete swarms.
To initialize the creation of a path, the swarm needs to be placed at the origin, and goal material needs to be placed at
the destination. Here are typical body definitions:
body Cohort of
swarm :
f o r −0.05 < x < 0 . 0 5 , −0.95 < y < −0.9: C = 1
body Goal of g o a l m a t e r i a l :
f o r −0.05 < x < 0 . 0 5 , 0 . 9 < y < 0 . 9 5 : G = 1
A series of simulations exploring algorithm variants and parameter values is described in reference [30]; here we
present typical results in Figure 2.
Figure 2a shows the result of a 2D simulation in which the origin was placed near the lower right corner and the
destination was placed near the upper left. The nine disks represent previous paths, which are obstacles to be avoided.
The new path finds its way around the obstacles, splitting to do so (similar to the bundles in Fig. 1). The degree of
allowed splitting can be controlled by the swarm density regularization parameter λ (Eq. 2). The edges of the bundle
are sharp and the density is constant due to the autocatalysis of path material (Eq. 1).
Figure 2b shows the result of a 3D simulation in which the origin was placed near the foreground and the destination
was placed on the rear surface. The path found its way around four obstacles representing previously generated paths.
The 2D and 3D morphogenetic programs are essentially identical.
5 Example: Body and Leg Segmentation
Our second example illustrates how a swarm of microscopic agents can be coordinated to produce a simple insect-like
robot body with a segmented "spine" and segmented "legs." (A typical 2D result is shown in Fig. 3.) The algorithm
uses a process inspired directly by embryological spinal development but it uses it in two different ways: to segment
11
final P-1-0.8-0.6-0.4-0.200.20.40.60.81x-1-0.8-0.6-0.4-0.200.20.40.60.81yA PREPRINT - AUGUST 26, 2019
the robot's spine (similar to its function in vertebrate development) and to segment the robot's legs (which is not how
insects' or other animals' legs are segmented). Thus it shows how natural morphogenetic processes can be redeployed
for different purposes in artificial morphogenesis.
The process in question is the clock-and-wavefront model of spinal somatogenesis, which was first proposed in 1976
and finally confirmed in 2008 [3, 5]. As the vertebrate embryo develops, a pacemaker in its tailbud periodically
produces a pulse of chemical, a segmentation morphogen. This chemical pulse propagates toward the head of the
embryo, transmitted through the tissue, as each cell is stimulated by its neighbors to produce its own pulse. As each
pulse passes through undifferentiated tissue, it causes the differentiation of one more somite or spinal segment. This
takes place in a sensitive region defined by a low concentration of two morphogens: a caudal morphogen, which
diffuses towards the head from the tailbud, and a rostral morphogen, which diffuses toward the tail from already
differentiated segments. Therefore, the segments differentiate one by one from the head end toward the tail as the
embryo grows. The ratio of the growth rate to the pacemaker frequency determines the length of the segments, while
the product of the frequency and growth duration determines the number of segments (which is characteristic of a
species).
5.1 Growth Process
Our morphogenetic program to assemble the robot body will make use of three different substances. The most im-
portant one is called medium and represents the mass of active components (the swarm) that does most of the work.
This substance has a variety of properties, represented by scalar and vector fields; the most important is its density M;
others will be introduced as required below. When it is part of a defined segment, medium is in a differentiated state,
and the density of differentiated tissue is represented by a scalar field S > 0.
As in biology, differentiation means a change of internal state variables that affects the behavior and other properties of
a substance. In this case, the differentiation into segment tissue could cause the agents to couple with their neighbors,
resulting in a rigid structure, or to secrete some structural substance.
The second substance represents terminal tissue: either the tailbud of the developing spine or the "feet" of the devel-
oping legs; its principal property is a scalar field T , its density. Terminal tissue is composed of active components,
and it is responsible both for growth processes and for generating the pacemaker signals. During the morphogenetic
process, terminal tissue has a velocity: away from the head during spinal development, and away from the spinal axis
during leg development.
Figure 3: Simulation of swarm assembly of insect-like robot body. The body is growing toward the right; the head
segment is visible on the left, and the tailbud is at the extreme right but not shown. Between them, eight segments
have been assembled, each with a pair of segmented legs (the last two pairs incomplete at this point in the simulation,
T = 60).
12
A PREPRINT - AUGUST 26, 2019
(a) Terminal tissue T .
(b) Attractant H.
(c) Undifferentiated tissue M.
Figure 4: Simulation of spine growth process in progress (t = 30). (a) Density T of terminal tissue (moving to
right). (b) Concentration H of attractant emitted by terminal tissue. (c) Density M of assembled undifferentiated
tissue. Agents are introduced by the sources along the upper and lower edges and migrate up the attractant gradient to
assemble into the spine.
The initial state of the morphogenetic process requires the preparation of two bodies: a head segment already in a
differentiated state, and a tail segment adjacent to it. For a 2D simulation, this could be written:
body Head of medium :
f o r 0 . 0 1 < x < 1 , −0.5 < y < 0 . 5 :
M = 1
S = 1
/ / o t h e r
/ / medium t i s s u e
/ /
i n i t i a l i z a t i o n
segment
t i s s u e
body T a i l of
t e r m i n a l :
f o r 1 < x < 2 , −0.75 < y < 0 . 7 5 :
T = 1
/ / o t h e r
i n i t i a l
/ /
i n i t i a l i z a t i o n
t a i l bud
As the terminal tissue moves away from medium tissue, the intervening space is filled with new, undifferentiated
medium tissue. In biological development this is a result of cell proliferation, which expands the mass of undifferenti-
ated tissue and pushes the tailbud further away from the head. In previous versions of our morphogenetic program, we
have given the tail an initial velocity away from the head segment, and as it has moved it has produced undifferentiated
tissue in its wake [22, 24, 25, 26, 28]. This approach makes sense if the agents are able to reproduce themselves,
for example, if they are implemented by genetically engineered microorganisms. If the agents are microrobots, how-
ever, and presumably unable to reproduce, then we need an alternative approach to growth. In this case the agents
can be supplied from an external source and routed to the growth region. As tail tissue moves, it emits an attractant
morphogen into the growth area (the growing gap between the existing body and the tail). Available agents from the
external source follow the attractant gradient into the growth area until they reach a desired density (M = 1 in our
case). Figure 4 shows a simulation of growth in progress.
This approach requires a source of free agents (particles of medium), and so we define a substance source to represent
this process; it has a scalar field J representing the density of source material (J ∈ {0, 1}). The source provides agents
at rate κJ up to saturation (M = 1); therefore, as agents move out of the source regions, more will be introduced to
maintain M = 1 density at the source. This provision of free agents takes place only so long as growth continues,
which is represented by the condition G > ϑG. Therefore the source of new agents is described -- DM + = [G >
ϑG]κJ J(1 − M ). The source substance is defined like this in Morphgen:
substance s o u r c e :
s c a l a r
behavior :
f i e l d J
/ /
/ /
s o u r c e d e n s i t y
param k J = 1
D M += [G > t h e t a G ] k J * [ J * ( 1 − M) ]
i n p u t
r a t e
Source regions must be prepared as part of the initialization of the morphogenetic process. For example, the simulation
in Figure 4 uses the following sources:
body A g e n t S o u r c e s of
s o u r c e :
f o r 5 < x < 6 , 1 . 8 < y < 1 . 9 5 :
f o r 5 < x < 6 , −1.95 < y < −1.8:
J = 1
J = 1 / /
/ / upper
l o w e r
s o u r c e
s o u r c e
13
A PREPRINT - AUGUST 26, 2019
Terminal tissue has the following behavior. Let u be a unit vector field pointing in the direction of desired growth,
and let r be the desired growth rate, which is the same as the speed of terminal tissue movement. Then the change in
terminal concentration is the negative divergence of its flux:
-- DT = − div(T u[G > ϑG]r).
The condition G > ϑG holds so long as growth continues; when it fails, the movement rate is effectively zero and the
terminal tissue stops moving. Figure 4a shows the massive swarm of terminal agents moving to the right.
Terminal tissue emits a growth attractant, with concentration H, up to saturation, which diffuses and decays at specified
rates:
-- DH += κH T (1 − H),
-- DH += DH∇2H − H/τH .
Figure 4b shows the diffusion of the attractant from the terminal tissue.
The swarm of agents M from the sources follows the attractant gradient ∇H at a speed controlled by v and aggregating
up to a maximum density of M = 1:
(3)
Once the agents have assembled in the spine (where M = 1) they do not move again. Figure 4c shows the growth of
undifferentiated spinal tissue in progress.2
-- DM = −v[M < 1] div[M∇H].
5.2 Spine Assembly
The foregoing explains the growth of undifferentiated spinal tissue; we turn now to the clock-and-wavefront process,
which causes the spine to differentiate into segments of specified number and size.
The concentrations of the caudal and rostral morphogens are represented by scalar fields C and R, respectively (Fig. 5).
The rostral morphogen is produced by already differentiated segment tissue (represented by segment density S > 0),
from which it diffuses and decays:
-- DR = κRS(1 − R) + DR∇2R − R/τR.
(4)
2 Other simulation results in this chapter use the original growth process.
Figure 5: Diffusion of C and R morphogens after seven new spinal segments have differentiated (tan color). Blue
color at far right represents C (caudal morphogen) diffusing from the tailbud. Green color around the segments
represents R (rostral morphogen) diffusing from differentiated segments. The α wave visible between the sixth and
seventh segments has just differentiated the seventh segment (which is not yet emitting R). The developing legs are
also emitting C and R morphogens.
14
A PREPRINT - AUGUST 26, 2019
The caudal morphogen concentration C is considered a property of the medium substance, and its diffusion and decay
are physical properties defined by a partial equation in the behavior of medium:
-- DC += DC∇2C − C/τC.
The caudal morphogen is produced from terminal tissue (i.e., tissue with terminal density T > 0), which is part of the
behavior of the terminal substance:
-- DC += κCT (1 − C).
The segmentation signal α is produced periodically in the tailbud and is actively propagated forward through the
medium tissue (Fig. 6). The segmentation morphogen is a property of medium, which defines its physical diffusion
and decay rates:
-- Dα += Dα∇2α − α/τα.
Terminal tissue (T > 0) in the tailbud produces a pulse of α so long as growth is continuing (represented by G > ϑG)
and the tail's pacemakers are in the correct phase (represented by K > ϑK):
-- Dα += κψ[G > ϑG ∧ K > ϑK]T (1 − α).
This partial equation is an extension of α behavior in the definition of the terminal substance. (Additional detail on
the pacemaker and growth duration can be found in reference [28] and Sec. 5.3 below.)
The medium substance also produces α when it is sufficiently stimulated by it (α > ϑα), which allows it to propagate
a wave of α stimulation. After it produces an α pulse, the tissue enters a refractory period (represented by ≥ ϑ),
which ensures that the wave is unidirectional (towards the head). The variable φ (which is only transiently nonzero)
represents the density of medium tissue in this sensitive and stimulated state, and is used both to produce a pulse of α
and to start the refractory timer:
φ = [α > ϑα ∧ < ϑ]M,
-- Dα += κφφ(1 − α),
-- D = φ − /τ.
(5)
(6)
(7)
The actual differentiation of a region of medium tissue into a segment (S > 0) takes place when a sufficiently strong
(α > αlwb) segmentation wave passes through a region with sufficiently low rostral (R < Rupb) and caudal (C <
Cupb) morphogen concentrations. This causes a rapid cς (1 − S) increase in differentiated tissue, which then triggers
autocatalytic differentiation κSS(1 − S) until it is complete (S = 1):
-- DS = κSS(1 − S) + [α > αlwb ∧ R < Rupb ∧ C < Cupb]cς (1 − S)
= (κSS + [α > αlwb ∧ R < Rupb ∧ C < Cupb]cς )(1 − S).
This can be written as follows in the current version of the Morphgen language:
Figure 6: Propagation of α morphogen. Two successive waves are propagating leftward toward the head. The decaying
α pulse in the tailbud is visible at the righthand end.
15
A PREPRINT - AUGUST 26, 2019
c h i = [ a l p h a > a l p h a l w b ] [ R < R upb ] [ C < C upb ] c s e g
l e t
D S = [ ( c h i + k S * S ) * ( 1 − S ) ]
There is a small gap between the differentiated segments because segmentation takes place in a region where
the rostral concentration R has dropped to Rupb (see Figs. 3, 5). To determine the width g of the gap, set the
threshold Rupb equal to the concentration at a distance g from the anterior differentiated tissue:
in a 2D space,
DRτR), where K0 is a modified Bessel function of the second kind (Basset function). Figure 7
Rupb = κR
2πDR
shows a 3D simulation of segmentation using the same morphogenetic program and parameters as the 2D simulation.
√
K0(g/
5.3 Leg Assembly
The process described so far is analogous to the somitogenesis or spinal segmentation that takes place during vertebrate
embryological development. Now however we exploit the process for a different morphogenetic task: the generation
of a pair of segmented legs on each spinal segment (e.g., Fig. 3).
The first task is to control the placement of the legs on the spinal segments; in the case of a 2D simulation, the
only variable is their location along the length of a segment. This can be determined by the relative concentration of
morphogens that diffuse from the anterior and posterior ends of each segment (Fig. 8), but this requires distinguishing
the anterior and posterior ends of each segment: a symmetry breaking process.
The required information is available when the segmentation α wave passes through the tissue, since at that time
the more anterior tissue is emitting the rostral morphogen R, and the more posterior tissue is emitting the caudal
morphogen C. Therefore, the anterior region of a segment further differentiates into anterior tissue (with density A)
when the segmentation wave passes through (α > αlwb) and the rostral morphogen is in the correct range (0.5Rupb >
R > 0.25Rupb in this simulation), which trigger an autocatalytic differentiation process that goes to completion:
-- DA = κASA(1 − A) + [0.5Rupb > R > 0.25Rupb ∧ α > αlwb]cA − A/τA.
Here, we expect R to reflect rostral morphogen diffusing from segments anterior to the currently differentiating seg-
ment. However, the differentiation of A tissue takes place simultaneously with the differentiation of S tissue (as α
passes through), which begins immediately to emit R morphogen. This will cause the entire segment to differentiate
into A tissue, and to prevent this we introduce a state variable B that temporarily blocks production of the rostral
morphogen until anterior tissue differentiation is complete. It is set by the the segmentation impulse (Eq. 5) and then
decays exponentially:
-- DB = cBφ − B/τB + [B > 1](1 − B)/tB.
Figure 7: Three-dimensional simulation of segmentation. Three new segments posterior to the head have been assem-
bled. The figure shows regions in which S > 0.5.
16
A PREPRINT - AUGUST 26, 2019
We choose the time constant τB to allow A differentiation to complete. We replace Eq. 4 for the production of R with:
-- DR = κR[B < θB]S(1 − R) + DR∇2R − R/τR,
which blocks production until B has decayed below θB.
Similarly, the α wave and caudal morphogen in an appropriate range (0.95Cupb > C > 0.8Cupb) trigger autocatalytic
differentiation of posterior border tissue:
-- DP = κP SP (1 − P ) + [0.95Cupb > C > 0.8Cupb ∧ α > αlwb]cP − P/τP .
(Emission of caudal morphogen does not have to be blocked since it comes from the tailbud.)
Once the anterior and posterior border tissues have differentiated, they can do their job of emitting anterior and poste-
rior border morphogens, which provide a reference frame for determining position along each segment:
-- Da = [A > ϑA]κaS(1 − a) + Da∇2a − a/τa,
-- Dp = [P > ϑP ]κpS(1 − p) + Dp∇2p − p/τp.
The thresholds (A > ϑA, P > ϑP ) ensure that only well-differentiated tissue produces these morphogens.
Our plan is for the legs to be assembled on imaginal tissue at the correct location on each segment. The anterior/-
posterior position is defined by anterior and posterior border morphogens in the correct ranges (aupb > a > alwb,
pupb > p > plwb), but these morphogens diffuse throughout the spinal tissue and we want to ensure that imaginal
tissue differentiates only on the surface of the spine. Moreover, this notion of being "on the surface" should be inde-
pendent of the agent size (which is in fact infinitesimal in our continuum model), so that the morphogenetic algorithm
is scale-invariant. Taking a cue from the natural world, in which bacteria and other organisms do quorum sensing to
determine if their population density is sufficient for some purpose, we have our agents estimate their local population
density. If it is near its maximum (M ≈ 1 in our case), then an agent knows it is in the interior; if it is near its minimum
(M ≈ 0) then the agent is relatively isolated. If however the local density is M ≈ 0.5, then the agent knows it is near
the surface; how large M − 0.5 is allowed to be will determine the effective thickness of the surface layer.
This strategy requires that an agent be able to determine its local population density. There are many ways to do this,
but perhaps the most practical is for the agents to emit a slowly diffusing, rapidly decaying morphogen N, which
serves to broadcast density information over a short range. The local morphogen concentration becomes a surrogate
for population density, more precisely, for the density convolved with a smoothing kernel. (See Sec. 6 for more on
implementation of this strategy.) Morphgen code such as the following can be used to define a scalar field E that
represents closeness to the surface (or in the case of 2D simulations, the edge).
Figure 8: Diffusion of a and p morphogens from anterior and posterior tissue, respectively, in each differentiated
segment. Orange color represents a morphogen diffusing from differentiated anterior tissue, and green color represents
p morphogen diffusing from differentiated posterior tissue. White lines on the spinal surface are imaginal tissue I from
which the legs grow. (Two α waves are also visible.)
17
A PREPRINT - AUGUST 26, 2019
D N = k N * [M*(1−N) ] + D N* d el 2 N − N/ tau N / / d e n s i t y
l e t E = [N > 0 . 1 5 ]
[N < 0 . 2 ] S
s u r r o g a t e
/ /
edge marker
Then the autocatalytic differentiation of imaginal tissue can be triggered by a combination of correct morphogen
ranges and being near to the surface:
-- DI = [aupb > a > alwb ∧ pupb > p > plwb]ES(1 − I).
(8)
This equation is written as follows in Morphgen:
D I = [ a upb > a ] [ a > a lwb ] [ p upb > p ] [ p > p lwb ]
[ E* [ S*(1− I ) ] ]
Once the imaginal tissue has fully differentiated, the next step is to initialize the clock-and-wavefront process to grow
and segment the legs. This is accomplished by having the imaginal tissue differentiate into terminal tissue with a
velocity vector directed outward from the spine; thus the imaginal tissue becomes the "foot" of a future leg. We have
used the rapid differentiation of imaginal tissue ( -- DI > ϑDI) to trigger this transformation. The velocity vector is
directed down the S gradient: −∇S/(cid:107)∇S(cid:107). The leg grows just like the spine grows, recruiting free agents from the
sources to fill in the gap between the developing leg and the outward moving foot. The exact same morphogens (H,
R, C, α, a, p) and tissue types (T , S, A, P ) are used to control leg segmentation as to control spinal segmentation.
5.4 Termination
There are two problems with using the same morphogenetic process for the spine and for the legs. The first is that with
the same parameters, the number and size of the segments will be the same in the spine and the legs, which might not
be what we want. The second is that, in the absence of a mechanism to prevent it, the leg segments will develop their
own imaginal tissue, from which "leglets" will grow, and so on, in a fractal manner, which is not our goal. Therefore
we must consider the termination of morphogenetic processes, which in fact is an interesting problem in embryology.
How big should limbs and organs get? What limits growth processes in normal development?
In our morphogenetic program we have adopted a simple mechanism. In several of the equations above, we have seen
that a process continues only so long as a condition G > ϑG is satisfied. Here G is a scalar property of terminal tissue,
which decays exponentially: -- DG = −G/τG, where τG is the growth time constant. If the initial value of G is G0, then
the ϑG threshold will be reached at time t = τG ln(G0/ϑG). If ν is the pacemaker frequency, then (cid:98)ντG ln(G0/ϑG)(cid:99)
complete segments will be generated. The length of the segments will be v/ν, where v is the growth rate (the speed of
Figure 9: Segmentation with higher pacemaker frequency. This simulation has twice the pacemaker frequency νS
as the simulation shown in Fig. 5. Both are shown at the same simulation time, but this has assembled 12 segments
(compared to six in the previous simulation) with ten pairs of legs compared to five previously; the segments are
also approximately half the length as in the previous simulation.
In this simulation νS = 1/π, the previous had
νS = 1/(2π).
18
A PREPRINT - AUGUST 26, 2019
terminal tissue movement). There are a number of parameters here that could be controlled, but if we want the same
processes operating in spine and leg segmentation, then probably the simplest are the initial timer value and pacemaker
frequency. For spinal segments of length λS, we set the pacemaker frequency to νS = v/λS. For NS spinal segments,
we initialize the timer to
(cid:18) NS
νSτG
(cid:19)
.
GS = ϑG exp
See Fig. 9 for the effect of νS on spinal segment length and number. The equations for NL leg segments of length λL
are analogous.
As mentioned above, rapid differentiation of imaginal tissue can be used as a transient impulse to initialize leg growth;
we define it ζ = [ -- DI > ϑDI]cL. This impulse can be used to trigger conversion of imaginal tissue to terminal tissue
and to initialize the leg timers and pacemaker frequencies:
(9)
(10)
(11)
κGL and κν are large so they reset the parameters while ζ > 0. Agents in imaginal tissue also reorient their velocity
vectors down the S gradient, that is, outward from the spine:
-- DT += κLIT (1 − T ) + ζ,
-- DG += κGLIζ(GL − G),
-- Dν += κνIζ(νL − ν).
-- Du += Iκu(−∇S/(cid:107)∇S(cid:107) − u).
There are several ways to prevent the formation of fractal "leglets" on the legs; the most direct is to block the differen-
tiation of imaginal tissue, as given by Eq. 8. The problem is that this equation is part of the behavior of medium tissue,
which is the same in the spine and legs, since its constituent agents come from a common source. Leg terminal tissue,
however, develops from imaginal tissue, but tail terminal tissue does not, which provides a basis for distinguishing the
legs from the spine. Therefore we introduce a variable L representing the density of tissue in the leg state. When the
differentiation of imaginal tissue triggers the differentiation of leg terminal tissue (Eq. 9), this tissue can simultane-
ously differentiate into the L state, which differentiates it from tail terminal tissue: -- DL += κLIL(1 − L) + ζ. As
medium particles arrive from the sources and assemble themselves between the foot terminal tissue and the growing
legs, they must also inherit the L property. This can be accomplished by having L tissue emit a short-range morphogen
µ that causes developing medium tissue to inherit the L property. Therefore, if the concentration of µ in medium tissue
is above a threshold (meaning that it is near "foot" terminal tissue) and it is not spinal tissue, then it enters the L state:
Then we change imaginal tissue differentiation (Eq. 8) so that it takes place only in non-leg tissue (L ≈ 0):
-- DL += κζ[µ > ϑµ ∧ S < 0.5](1 − L).
-- DI = [aupb > a > alwb ∧ pupb > p > plwb ∧ L < ϑL]ES(1 − I).
Finally, note that the spinal tissue between the last segment and the tailbud is undifferentiated because the caudal
morphogen concentration C is too high. Therefore it does not develop legs and forms the tail proper between the leg-
bearing segments and the tailbud. To determine the tail's length λ, set the caudal morphogen concentration at a distance
λ in front of the tailbud to the caudal morphogen threshold for segmentation: in 2D, Cupb = κC
DCτC).
2πDC
Also, as can be seen in Figs. 3, 7, and 9, the first spinal segment posterior to the head can have a different length
compared to the other segments; this is because its length depends on the initial phase of the pacemaker.
K0(λ/
√
6 Toward a Morphgen Compiler
6.1 Agents as Substantial Particles
Our approach to morphogenetic engineering treats agent swarms and other substances from the perspective of contin-
uum mechanics. That is, although our swarms and tissues are composed of finite numbers of discrete elements of finite
size, our intended application is to very large numbers of very small elements, and so the continuum approximation is
useful. From the continuum mechanics perspective, tissues and massive swarms are infinitely divisible into infinites-
imal material points or particles representing differential volume elements of continua [28]. Therefore, a material
point or particle does not represent a single agent (or molecule or other active or passive component), but a very tiny
volume containing many such physical elements. As a consequence, thinking about the individual behavior of parti-
cles in such a continuum is helpful in understanding how the individual agents should behave, but it is not sufficient
to equate particles and agents. For example, a particle might have a distribution of orientations or velocities, or be in
19
A PREPRINT - AUGUST 26, 2019
a mixture of differentiation states, whereas individual agents have definite orientations, velocities, and differentiation
states [20, 21, 23].
We have seen how PDEs can be used to describe the motion, differentiation, and other behavior of swarms of micro-
scopic agents to assemble complex shapes, but these PDEs cannot be used directly to control the agents. These PDEs
have been expressed in an Eulerian (spatial) reference frame, in which the derivatives are relative to fixed spatial
locations and describe the changes of variables at those locations as particles flow through them. For example, we
may be concerned with the change in temperature q(t, p) at a particular location p, that is, ∂q(t, p)/∂t, as particles
with different temperatures flow through it. More relevant for the control of agent swarms is a Lagrangian (material)
reference frame, in which derivatives are relative to fixed particles and describe how the properties of those particles
change as they move through space. Thus we might be more concerned with the temperature Q(t, P ) of a particle P
and how it changes as that particle flows through space, ∂Q(t, P )/∂t; the latter is called the material or substantial
derivative and is commonly written DQ/Dt.
Since a particle's position is a function of its velocity v, the material derivative can be expanded by the chain rule:
∂q
∂t
For a vector property of particles, the formula is analogous:
DQ
Dt
=
+ v · ∇q.
DQ
Dt
=
∂q
∂t
+ v · ∇q,
where ∇q is a second-order tensor. (In a Cartesian coordinate frame (∇q)jk = ∂qj/∂xk and v · ∇q = vT∇q.)
6.2 Morphogen-based SPH Control
Morphgen describes continuous fields of infinite numbers of infinitesimal agents. A compiler for the Morphgen
language would produce code for given numbers of agents of given finite size, and would thus realize the scalability
potential of the language's PDE approach. Such a compiler would be an example of what some authors have termed
"global-to-local (GTL)" compilation [14]. GTL compilation seeks to turn on its head the usual challenge of emergence:
It seeks not to predict collective behavior from simple rules for individuals, but to derive such rules based on desired
collective behavior. In this section we explore a novel, embodied variation of smoothed particle hydrodynamics (SPH)
swarm robotic control as a partial basis for a GTL compiler for Morphgen.
SPH itself is a meshfree Lagrangian numerical method used in physics simulations and was introduced by reference
[12] and reference [19]. SPH was first proposed as a method for controlling robot swarms by reference [37]. In SPH
robotic literature to date, researchers have used SPH to cause swarms to emulate fluids or bodies much like fluids (e.g.,
[38, 10, 31, 40]). Such use is in keeping with typical use of SPH in physics to simulate fluids. However, we believe
the true potential of SPH in robotic control lies in its ability to simulate non-physical PDEs. A step toward this goal
was taken by reference [36], who design swarms that emulate fluids, but with non-physical variation over time in fluid
parameters (see reference [44] for a more recent paper continuing this work). Our work goes further, applying SPH to
Morphgen programs that do not resemble physical fluid behavior. This is one key contribution that our work makes
with respect to the SPH robotic control literature, which we address further in Sec. 6.8. However, we first discuss our
other key contribution, a proposal for overcoming a communications challenge posed by traditional SPH robotics.
6.3 Natural Smoothing Functions
If an agent can produce a physical field around itself having certain properties, then implicit in this field is what we
term a natural smoothing function (NSF). We will refer to such physical fields as "NSF fields" to distinguish them
from the potentially more abstract fields which NSF fields may be used to implement, as described in the next section.
The NSF field around a given agent must satisfy the following:
• The strength or intensity (we will say value) of the NSF field must decrease smoothly and monotonically with
distance from the agent.
• The NSF field's value must approach zero with distance, and quickly enough that the integral of value over
all space converges.
• The NSF field must be roughly symmetrical around the agent.
• The agent must have control over the amplitude of the NSF field independently of its shape.
20
A PREPRINT - AUGUST 26, 2019
Finally, the NSF fields of different agents must sum naturally in the environment, and each agent must be able to sense
locally both the value and gradient of the summed NSF field. If these requirements are met, then groups of such agents
can implement SPH robotic control. The first three of these requirements are derived from general requirements on
SPH smoothing functions; see reference [18] for a discussion. Another key requirement is that the integral of the
smoothing function be unity, which we address in the next section.
In later sections, we explore one possibility in depth: that of agents that release and detect dilute substances that diffuse
and degrade in a surrounding aqueous medium. This scenario is inspired by the cells of a developing embryo as it
undergoes morphogenesis. We refer to the smoothing functions implicit in this mechanism as "morphogen smoothing
functions" (MSF). A second possibility, not discussed further in the present work, is that of agents producing and
sensing electromagnetic or acoustic NSF fields distinguished by frequency. Before addressing MSFs specifically, we
discuss the NSF framework generally.
6.4
Incorporating SPH Estimates into the NSF Framework
In contrast to the term "NSF field," we use the term "field" by itself to describe more general, and potentially abstract,
entities. These are the fields which traditional SPH seeks to simulate and which SPH swarm robotic control seeks to
generate. Examples in the context of artificial morphogenesis are density, velocity, or differentiation state of a tissue
or agent continuum.
A diversity of SPH-based estimates of fields and their derivatives exist. In general, an SPH estimate at a point is the sum
over neighboring particles of a smoothing function, or one of its derivatives, multiplied by some expression involving
various spatially-varying quantities. Each of these quantities (e.g., mass, density, or velocity) is associated either with
the location of the desired estimate or with the location of a given neighboring particle. Some SPH estimates require
only quantities associated with the locations of neighboring particles, and such forms permit ready incorporation into
the NSF framework. The most important example is the estimate of a field itself at location x:
(cid:104)f (x)(cid:105) =
mj
ρj
f (xj)Wj(x),
(12)
where mj, ρj, and f (xj) are the mass of, local density at, and field value at, each neighboring particle j.
We can perform this estimate in the NSF framework if we assume that each agent can produce an NSF field as described
in Sec. 6.3. If an agent j controls the amplitude of its NSF field so that it has unity integral, then the measurement by
an agent i of the value of the NSF field produced by agent j is equivalent to the evaluation of Wj(xi), where Wj(x)
is a smoothing function whose shape is determined by the physical nature of the produced NSF field. If instead agent
j controls the amplitude of its NSF field so that its integral is mj
f (xj), then the measurement by agent i of agent
ρj
j's NSF field is the entire term mj
f (xj)Wj(xi). Because the NSF fields of each neighbor j sum naturally in the
ρj
environment, the total NSF field value measured locally by agent i is the desired local estimate of a field (cid:104)f (xi)(cid:105).
(This procedure requires agents to estimate their local densities, which they can do through a similar NSF estimate
based on (cid:104)ρ(xi)(cid:105) =(cid:80)
j mjWj(xi).)
Because Eq. 12 is valid at points between particles as well as at particles, a spatial derivative of the field of SPH
estimates is an estimate of that derivative in the corresponding field function. For example,
(cid:104)∇f (xi)(cid:105) = ∇xi
mj
ρj
f (xj)Wj(xi).
(13)
In traditional SPH, where a separate calculation is needed for an SPH estimate at each point, the above fact is not
directly useful. Instead, much of the value of traditional SPH comes from the ability to rearrange expressions so that
derivatives are applied only to the smoothing function and can be taken analytically. For example,
(cid:88)
j
(cid:88)
j
(cid:88)
j
(cid:104)∇f (xi)(cid:105) =
f (xj)∇xiWj(xi).
mj
ρj
By contrast, in the NSF framework, SPH estimates are physically embodied by the total NSF field at a given point.
Therefore, if technologically feasible, an agent can make an SPH estimate of a spatial derivative by sensing that
derivative in the local NSF field. In particular, we assume agents can sense NSF field gradients locally, for example
using differences between multiple sensors at their boundary, such that Eq. 13 is directly useful.
Where such direct estimates are not practical, it may be possible to manipulate other methods from the SPH literature
into forms compatible with the NSF framework. The Laplacian operator is an important example. reference [15]
21
A PREPRINT - AUGUST 26, 2019
(cid:88)
derive an SPH form of the Laplacian operator requiring no derivatives. In two dimensions:
(cid:104)∆f (xi)(cid:105) =
2
α
(f (xj) − f (xi)) Wj(xi)
mj
ρj
,
where α is a constant that depends on an integral relating to a given smoothing function. Although it is not possible in
is just an
the NSF framework to take the pairwise difference as shown, we can rearrange and note that(cid:80)
f (xj)Wj(xi) −(cid:88)
SPH estimate of unity, and so can be replaced by 1. This gives us a form we can calculate in the NSF framework:
(cid:104)∆f (xi)(cid:105) =
j Wj(xi) mj
ρj
f (xi)Wj(xi)
j
(cid:88)
(cid:88)
j
j
mj
ρj
2
α
=
=
2
α
2
α
((cid:104)f (xi)(cid:105) − f (xi)) .
mj
ρj
j
f (xj)Wj(xi) − 1 · f (xi)
mj
ρj
(14)
6.5 Benefits of NSF Framework
NSF-based SPH robotic control addresses communication challenges and inefficiencies in traditional SPH robotic
control. Traditional methods require each agent, for each SPH estimate it makes, to communicate separately with
O(n) other agents, where n is the number of agents in its neighborhood. In contrast, NSF-based agents need only
sense an NSF field value locally, a O(1) operation. In establishing separate data links with its neighbors, a traditional
agent must avoid communication interference with its neighbors, all of which may be simultaneously trying to establish
links with their neighbors. By contrast, NSF-based agents communicate implicitly by sensing an NSF field locally and
manipulating their contribution to it; therefore, they do not require any explicit data links or even a concept of having
individual neighbors.
We can view these advantages over traditional SPH control as the benefits of embracing an embodied approach to
artificial morphogenesis. In the agent-to-agent communication of traditional SPH control, information is an abstraction
atop the physical fields chosen as communication media. Overcoming communication interference is thus a struggle
against the way these fields interact in space. By contrast, the NSF framework works with, rather than against, the
interaction (as well as diminution with distance) of the physical NSF fields available to a system. For example,
morphogen-based SPH control takes advantage, in two key ways, of the behavior of morphogens in the aqueous
environments typical of a growing embryo. First, it offloads pairwise distance estimates to the natural diminution with
distance of a dilute substance as it diffuses and degrades. Second, it offloads a summation loop across many neighbors
to the natural summation of dilute substances from multiple sources.
6.6 Morphogen Smoothing Functions
This section explores the use of morphogens to implement NSFs as a basis for SPH control. We refer to such NSFs
as MSFs, as mentioned in Sec. 6.3. We first discuss the properties of these MSFs with respect to SPH generally.
Afterward we derive the morphogen production rates needed to implement SPH control using MSFs.
Throughout this section, we make several simplifying assumptions:
• Each agent is a point.
• Each morphogen obeys Fick's law for homogeneous, isotropic diffusion (i.e., change in concentration is a
constant proportion of the Laplacian).
• Degradation of each morphogen is uniform in the medium and proportional to morphogen concentration.
• Each agent is unmoving.
• Morphogen production, diffusion, and degradation are in equilibrium.
Later, we introduce corrections for some violations of the latter two assumptions.
For our embodied SPH approach to work, we need the SPH estimate of a field variable at a point to equal the summed
concentration of an associated morphogen at that point:
mj
ρj
f (xj)Wj(x) =
(cid:104)f (x)(cid:105) =
(cid:88)
(cid:88)
cj(x),
(15)
j
j
22
A PREPRINT - AUGUST 26, 2019
Table 1: Idealized morphogen smoothing functions. The row labeled "Physical, normalized" refers to the physical part
of the general solution to the relevant PDE, normalized so that its integral over space is unity. r is the magnitude of
displacement. J0 and Y0 are Bessel functions of the first and second kind respectively, of order zero. K0 is a modified
Bessel function of the second kind, of order zero. E is diffusion rate and k is decay rate, and in the final row we make
the substitution h =
(cid:113) E
Radial form of PDE E ∂2ρ
General solution
k to obtain forms resembling the typical presentation of SPH smoothing functions.
One dimension
∂r2 − kρ = 0
√
ρ(r) = c1e−
√
Three dimensions
2 E
r
Two dimensions
E
r
∂r + E ∂2ρ
ρ(r) = c1J0
ρ(r) = c1
k
E r
∂ρ
e
r
ir
(cid:18)
(cid:19)
(cid:113) k
∂r2 − kρ = 0
(cid:19)
(cid:18)
(cid:113) k
(cid:19)
(cid:18)
(cid:113) k
−ir
E
E
+ c2Y0
r
k
E
∂ρ
∂r2 − kρ = 0
∂r + E ∂2ρ
√
−
√
k
r√
E
kr
√
−
+ c2
e
r
k
E
r
Physical, normalized ρ(r) =
ρ(r) = k
2πE K0
r
E
ρ(r) = k
4πE
e
With h =
ρ(r) = e
− r
h
h
ρ(r) =
K0( r
h )
2πh2
ρ(r) = e
− r
h
4πh2r
(cid:113) E
k
+ c2e
(cid:113) k
k
E r
√
E e−
k
E r
where cj(x) is the morphogen concentration at x attributable to neighboring agent j. Each agent must therefore choose
to produce this morphogen at a rate rj such that
Let Cj be the total amount of morphogen in the environment due to agent j, at equilibrium:
(16)
(17)
(18)
If k is the morphogen's decay rate, then Cj is related to rj by
Ω
and therefore reaches equilibrium when
cj(x) =
f (xj)Wj(x).
mj
ρj
(cid:90)
Cj =
cj(x)dx.
dCj
dt
= rj − kCj
Cj =
rj
k
.
Solving Eq. 16 for Wj(x), integrating both sides, and considering the requirement of unity for the integral of Wj(x),
we have
Wj(x)dx =
mjf (xj)
Ω
cj(x)dx =
Cj =
mjf (xj)
kmjf (xj)
ρj
ρj
rjρj
= 1.
(cid:90)
Ω
(cid:90)
We can now solve for rj to determine the correct production rate for agent j:
rj =
kmjf (xj)
ρj
.
(19)
Under these simplified assumptions, the SPH smoothing functions implied by this production rate are described in
Table 1.
6.7 Correcting for Transient Spurious Morphogen Smoothing Functions
Traditional SPH assumes no lag time in information flow, but two factors prevent morphogens from conveying infor-
mation instantaneously among agents. The first is the time needed for production and degradation processes to reach
steady state, which is a non-spatial consideration. The second is the time needed for diffusion to spread information
spatially from an agent to its neighbors. These two factors lead to transient spurious MSFs, and we discuss each in
turn. In neither case do we fully correct for transient effects; instead, we make simplifying assumptions that allow us
to correct for the most detrimental aspect of each effect.
23
6.7.1 Non-equilibrium of Production and Degradation Rates
A PREPRINT - AUGUST 26, 2019
We first address the non-spatial transient effect of morphogen production being out of equilibrium with degradation,
which occurs whenever production rates have recently changed. We make two simplifying assumptions to find a
correction term for agents to add to their sensor readings to better approximate what those readings would be under
equilibrium conditions. First, we neglect diffusion time; in other words, we assume that each agent instantaneously
injects morphogen into its entire neighborhood according to the distribution of the idealized MSF. Second, we assume
that the field variable values for all agents in a neighborhood are changing at the same rate a so that f (xj, t) = at + bj
since time t = 0, and that until t = 0 the values were not changing and the system was in equilibrium.
Based on these assumptions, we wish to find a correction term g(t) such that (cid:104)f (x, t)(cid:105) = (cid:80)
j cj(x, t) + g(t). At a
given time t > 0, from Eq. 17 and Eq. 19 the total mass of morphogen in the environment due to agent j obeys
This equation is solved by
dCj(t)
dt
= rj(t) − kCj(t) =
Cj(t) = αe−kt +
mj
ρj
(cid:16)
(cid:17)
at + bj − a
k
kmj(at + bj)
− kCj(t).
ρj
.
(20)
Because the system was in equilibrium at t = 0, we can substitute from Eq. 18 and Eq. 19:
Cj(0) =
rj(0)
k
=
mjf (xj, 0)
=
mjbj
ρj
.
After substituting into Eq. 20 and solving for α, we have:
at + bj − a
k
e−kt +
Cj(t) =
mja
ρjk
mj
ρj
(cid:16)
ρj
=
(cid:17)
which we can solve for f (xj, t):
f (xj, t) =
ρj
mj
Cj(t) +
a
k
− mja
ρjk
,
(21)
mjf (xj, t)
e−kt +
mja
ρjk
ρj
(cid:0)1 − e−kt(cid:1) .
(cid:0)1 − e−kt(cid:1) Wj(x)
(cid:88)
(cid:104)f (x, t)(cid:105) =
Substituing Eq. 21 into Eq. 12 and rearranging, a correct SPH estimate of f (x, t) under our non-equilibrium assump-
tions would therefore be
The left summation of Eq. 22 is the SPH estimate of f (x, t) under the equilibrium assumption and is also(cid:80)
j cj(x, t),
the sensed morphogen concentration at x (because we derived our production rate under the equilibrium assumption).
The right summation of Eq. 22 is just the SPH estimate of a
k
estimate is necessary for this term:
(cid:88)
(cid:0)1 − e−kt(cid:1), but this does not depend on j, so no SPH
Cj(t)Wj(x) +
mj
ρj
(22)
a
k
j
j
(cid:104)f (x, t)(cid:105) =
Thus we have our desired correction term:
(cid:0)1 − e−kt(cid:1) .
(cid:88)
a
k
Cj(t)Wj(x) +
j
g(t) =
a
k
(cid:0)1 − e−kt(cid:1) .
(23)
We wish for each agent to keep track of g(t), which is possible so long as it maintains an estimate of ∂f (x,t)
. (In
our simulation we simply have each agent remember one previous value of f (x, t) which it can divide by a known
dt = ae−kt. Note that we can rearrange Eq. 23 to get
timestep.) To see this, we first take a time derivative: dg(t)
e−kt = 1 − k
a g(t). We substitute this into the derivative along with a = ∂f (x,t)
to obtain
∂t
∂t
which implies the needed update rule for agents to follow (in our simulation, ∆g(t) = ∆f (x, t) − kg(t)∆t).
dg(t)
∂f (x, t)
=
dt
− kg(t),
(24)
∂t
24
A PREPRINT - AUGUST 26, 2019
6.7.2 Transient Effects of Diffusion Rate
The time it takes for morphogen diffusion to convey information spatially also leads to violations of steady-state
assumptions whenever the position or production rate of an agent has recently changed. Here we address only transient
effects due to agent motion, because in our simulations it appears to be more detrimental than spatial effects due to
production rate changes. As an agent moves, its contribution to the total morphogen field becomes stretched behind
and compressed in front, with more complex distortions if the agent's path curves. Even more complex effects arise
as a result of the particularities of an agent's instrument positions and the way a given medium flows around an
agent's body. Because such particularities imply implementation-dependence of distortions, we do not pursue analytic
corrections. Instead, we propose that agents be calibrated to correct for some of this distortion, an approach we test in
simulation.
The most damaging aspect of this distortion is the effect that an agent's own contribution to the morphogen field has
on its gradient estimates. In addition, an agent has no knowledge of its neighbors' individual positions and velocities,
limiting its ability to correct for distortions in neighbors' contributions to the morphogen field. For these reasons we
focus calibration on correcting for distortions in an agent's own contributions to its gradient estimates.
The central idea of calibration is to have isolated agents move at constant velocities and, once steady-state relative to
the agent is reached, to record the measured gradient. A table of gradients for different speeds can be created in this
way, and during operation these gradients (with appropriate interpolation) can be subtracted from measured gradients
during operation to partially correct for motion-related asymmetry in the MSF. For our simulation, we repeat this
procedure with different headings to average out numerical effects related to the finite difference method grid used for
diffusion.
6.8 Beyond Fluid Dynamics: SPH as a Partial Morphgen Compiler
SPH robotic control generally, and our NSF variant in particular, can be viewed as a compilation technique for Morph-
gen code. The utility of SPH as a compilation technique is limited in the present work by the requirement that swarm
∂t = −∇ · (ρu). This trivially holds when swarm density is
density fields must obey the mass continuity equation ∂ρ
specified in Morphgen implicitly by velocity or acceleration fields, but may not hold when swarm density fields are
specified directly. For example, a nonconservative equation such as ∂ρ
∂t = 5 cannot yet be compiled with our method.
Other fields representing swarm state are not limited in this way. In future work we plan to relax this requirement
through agent recruitment and removal or through cell-like division and apoptosis.
SPH compilation introduces a layer of abstraction or virtualization between what we might think of as Morphgen
"application" code and what we envision as a library of physical morphogens, which can also be described in Morph-
gen. Consider a Morphgen program that specifies a velocity or acceleration field for a swarm, along with several
other fields. These other fields may be thought of as representing tissue differentiation, gene expression, or even mor-
phogens, as seen in earlier examples. To compile such a program into agent code, all non-swarm fields are treated as
agent state, and a unique physical "library" morphogen is associated with each. (In practice, a programmer might find
it convenient to specify these associations, because physical morphogens with different ratios of diffusion to degra-
dation rates might prove more robust for implementing different fields. However, such low-level associations are not
essential in principle: Eq. 19 specifies the correct production rate regardless of diffusion and degradation rates.) As
described in Sec. 6.6, these physical morphogens implicitly provide the smoothing functions needed for each agent to
make SPH estimates of a given field and its derivatives.
To further illustrate this layer of abstraction, consider a Morphgen application program that specifies what the pro-
grammer conceptualizes as a morphogen (for example, if the Morphgen code specifies a diffusion and degradation
rate as well as sources and sinks). The SPH compilation process would nonetheless treat this field as a swarm state
variable and associate it with a physical morphogen, whose physical parameters are theoretically independent of the
abstract morphogen described by the application code. This layer of abstraction frees the programmer from the need
to find a physical substance with particular parameters. Instead, we envision engineering a small library of physical
morphogens that can be repurposed to implement a variety of fields in different Morphgen programs.
As mentioned in Sec. 6.2, SPH swarm robotic control has focused on enabling swarms to behave somewhat like fluids,
as described by the Navier-Stokes or Euler equations. Swarms have therefore been specified with acceleration fields,
and other fields have been designed to simulate such physical quantities as energy and pressure. In the context of our
current work, we prefer to reframe these applications as special cases of SPH compilation of implicit Morphgen-like
programs that happen to describe roughly physical fluid-like behavior. (This is a simplification; for example, reference
[38] derive one force using SPH, and add to it a body force derived separately from a potential field.)
25
A PREPRINT - AUGUST 26, 2019
In comparison to past fluid-related SPH swarm control, the example that follows illustrates some of this potential
generality of SPH compilation. Rather than specifying physics-inspired quantities such as energy or pressure, arbitrary
fields useful in solving a path-finding problem are specified. And rather than specifying acceleration, velocity is instead
specified, making swarm behavior more similar to flocking than to Newtonian dynamics. (Velocity-based motion is
also a natural fit for fluid media with low Reynolds numbers such that propulsion force is approximately proportional
to velocity rather than to acceleration. However, agents could integrate or differentiate on their own to achieve,
respectively, acceleration-based control where force is proportional to velocity or velocity-based control where force
is proportional to acceleration.)
6.9 Example: Path-finding
To illustrate our method, we simulate a two-dimensional environment that is inspired by, but does not rigorously
implement, an aqueous environment with low Reynolds number, as would be found in a developing embryo. Agents
are modeled as discs. Sensors are placed around the surface at 90° intervals, with morphogen production instruments
on the surface halfway between each pair of sensors. Agents have full control over their velocity, but no propulsion
mechanism is explicitly modeled; agents' locations are simply changed. As agents move, the surrounding medium
and morphogens flow around the agents' bodies. This flow is qualitatively similar to laminar flow but does not strictly
obey fluid dynamics. Motion of the aqueous medium and morphogens is calculated using a finite difference method.
Some random noise is applied to agents' motion to qualitatively simulate Brownian motion, and some bias and noise
is applied to sensor readings.
In the Morphgen program below, (cid:104)T(cid:105) refers to the SPH estimate of T , as opposed to an agent's internal stored value.
substance swarm :
scalar fields :
ρ // swarm density
A // environmental cue for lower-left square
B // environmental cue for upper-right square
S // to diffuse from lower-left square
T // to follow gradient of S back from upper-right square
vector fields :
V // swarm velocity
behavior :
params :
θρ = 0.02
θA = 0.2
θB = 0.2
θT1 = 0.1
θT2 = 0.05
κS1 = 500
κS2 = 500
κS3 = 1
κS4 = 100
κT1 = 500
κT2 = 600
κT3 = 0.002
κT4 = 60
κV = 0.0003
κVmax = 0.003
26
A PREPRINT - AUGUST 26, 2019
(cid:18) ∇S · ∇T
(cid:19)
let φ = arccos
-- DS −= [ρ < θρ ∨ B > θB]κS1S
-- DS += [A ≤ θA](cid:0)κS3∇2S − κS4 S(cid:1)
-- DS += [A > θA ∨ S > 1]κS2 (1 − S)
(cid:107)∇S(cid:107)(cid:107)∇T(cid:107)
-- DT += [B > θB]κT1(1 − T )
-- DT += [(cid:107)∇S(cid:107) > 0 ∧ (cid:107)∇T(cid:107) > 0 ∧ (cid:104)T(cid:105) > θT1]
-- DT += κT3∇2T
-- DT −= κT4T 2
-- DT += (V · ∇T )[(cid:104)T(cid:105) > θT2 ∧ T < θT1]
− ρ∇T
(cid:19)
let V0 =
κV 2T ln
1
ρ
(cid:18)
1 − φ
π
(cid:19)6
κT2
(cid:18) 8ρ
(cid:19)(cid:18)∇ρ
(cid:18)(cid:107)V0(cid:107)
(cid:19) V0(cid:107)V0(cid:107)
κVmax
T
T
T 2
V = κVmax tanh
Simulation of the above Morphgen program is shown in Table 2. All PDEs and simulation parameters, including
starting density, are the same for all three runs shown, with only agent diameter and number varying. To hold starting
density roughly constant across the eightfold difference in agent diameter, agent number varies about 64-fold. The
qualitative similarity across this range demonstrates the potential of Morphgen and SPH to facilitate scalable swarm
dynamics.
We describe some of the key components of this program, which aligns agents along the shortest path between two
distinct environmental cues. Agents that sense a cue A represented by the lower-left square set a high value for the
variable S. Other agents implement a diffusion-decay equation to establish the field distribution of S. (This equation
is independent of the diffusion-decay equation that models the physical behavior of the morphogen that implements
S in the SPH scheme.) Agents that sense a second cue B represented by the upper-right square as well as a non-zero
gradient of S set a high value for variable T . Other agents increase their value of T depending on how nearly opposite
are the gradient directions of S and T and whether a neighborhood estimate of T is above a threshold. Otherwise, T
diffuses slowly. Agents follow the gradient of a function involving both T and local density such that a target density
is achieved where T is high. Agents' speed saturates with the tanh function so that dynamics are similar to flocking
behavior when far from optimum arrangement but approach rest when closer to that optimum.
Because of the Lagrangian nature of SPH, field variables are naturally carried along with agents, which may or may
not be desired. At low speeds and with field dynamics that are somehow (as in this program) tethered to environmental
cues, the distinction is often subtle in practice. When it is desired that Morphgen PDEs refer to an Eulerian frame,
advection can be added counter to agent velocity, as reflected by -- DT + = V · ∇T in the program above. In this
program, we only add this counter-advection where it helps the growing T region to continue its growth against the
opposing motion of agents following the T gradient.
7 Conclusions
We have argued that embryological morphogenesis provides a model of how massive swarms of microscopic agents
can be coordinated to assemble complex, multiscale hierarchical structures, that is, artificial morphogenesis or mor-
phogenetic engineering. This is accomplished by understanding natural morphogenetic processes in mathematical
terms, abstracting from the biological specifics, and implementing these mathematical principles in artificial systems.
As have embryologists, we have found partial differential equations and continuum mechanics to be powerful math-
ematical tools for describing the behavior of very large numbers of very small agents, in fact, taking them to the
continuum limit. In this way we intend to have algorithms that scale to very large swarms of microrobots.
To this end we have developed a PDE-based notation for artificial morphogenesis and designed a prototype morpho-
genetic programming language. This language permits the precise description of morphogenetic algorithms and their
automatic translation to simulation software, so that morphogenetic processes can be investigated.
We illustrated the morphogenetic programming language and morphogenetic programming techniques with two exam-
ples. The first addressed the problem of routing dense bundles of many fibers between specified regions of an artificial
27
A PREPRINT - AUGUST 26, 2019
Table 2: Path-finding example. Agents use SPH to establish path between yellow and turquoise squares.
1186 agents,
diameter 0.006
10675 agents,
diameter 0.002
166 agents,
diameter 0.016
Time = 0
Time = 20
Time = 70
Time = 270
28
A PREPRINT - AUGUST 26, 2019
brain. Inspired by axonal routing during embryological development, we used a modified flocking algorithm to route
fiber bundles between origins and destinations while avoiding other bundles. Simulations showed that this algorithm
scaled over at least four orders of magnitude, with swarms of 5000 agents. Then we took the number and size of agents
to the continuum limit and showed how morphogenetic programming could be used to coordinate a massive swarm of
agents to lay down a path between designated termini while avoiding obstacles.
Our second example showed how a natural morphogenetic model -- the clock-and-wavefront model of spinal
segmentation -- could be applied in morphogenetic engineering both in a similar context -- creating the segmented
"spine" of an insect-like robot body -- and for a different purpose -- assembling segmented legs on the robot's spine. A
massive swarm of microscopic agents is supplied from external sources and guided to the assembly sites, where they
begin a process of differentiation coordinated by the emission of and response to several morphogens. As demon-
strated in simulation, this reasonably complex process can be controlled to assemble a structure with a spine and legs
with specified numbers and sizes of segments.
Finally, we showed how an embodied variation of smoothed particle hydrodynamics (SPH) swarm robotic control can
be applied to the global-to-local compilation problem, that is, the derivation of individual agent control from global
PDE specifications. By these means, available physical morphogens can be used to implement the abstract morphogens
and other fields required for a morphogenetic process. The physical morphogens define natural smoothing functions
that can be used in SPH to estimate the concentrations, gradients, and other functions of morphogenetic fields.
29
A PREPRINT - AUGUST 26, 2019
References
[1] Harold Abelson, Don Allen, Daniel Coore, Chris Hanson, George Homsy, Thomas F. Knight, Jr., Radhika Nag-
pal, Erik Rauch, Gerald Jay Sussman, and Ron Weiss. Amorphous computing. Commun. ACM, 43(5):74 -- 82,
May 2000.
[2] P. Bourgine and A. Lesne, editors. Morphogenesis: Origins of Patterns and Shapes, Berlin, 2011. Springer.
[3] J. Cooke and E. C. Zeeman. A clock and wavefront model for control of the number of repeated structures during
animal morphogenesis. J. Theoretical Biology, 58:455 -- 76, 1976.
[4] P. G. de Gennes. Soft matter. Science, 256:495 -- 497, 1992.
[5] M.-L. Dequ´eant and O. Pourqui´e. Segmental patterning of the vertebrate embryonic axis. Nature Reviews
Genetics, 9:370 -- 82, 2008.
[6] Amin Doostmohammadi, Jordi Ign´es-Mullol, Julia M. Yeomans, and Francesc Sagu´es. Active nematics. Nature
Communications, 9(1):3246, 2018.
[7] Ren´e Doursat. Organically grown architectures: Creating decentralized, autonomous systems by embryomorphic
engineering. In R. P. Wurtz, editor, Organic Computing, pages 167 -- 200. Springer, 2008.
[8] Ren´e Doursat, Hiroki Sayama, and Olivier Michel. A review of morphogenetic engineering. 12(4):517 -- 535.
[9] Gabor Forgacs and Stuart A. Newman. Biological Physics of the Developing Embryo. Cambridge University
Press, Cambridge, UK, 2005.
[10] Ryo Fujiwara, Takeshi Kano, and Akio Ishiguro. Self-swarming robots that exploit hydrodynamical interaction.
pages 1 -- 7.
[11] J.-L. Giavitto and A. Spicher. Computer morphogenesis. In P. Bourgine and A. Lesne, editors, Morphogenesis:
Origins of Patterns and Shapes, pages 315 -- 340. Springer, Berlin, 2011.
[12] Robert A. Gingold and Joseph J. Monaghan. Smoothed particle hydrodynamics: theory and application to non-
spherical stars. 181(3):375 -- 389.
[13] S. C. Goldstein, J. D. Campbell, and T. C. Mowry. Programmable matter. Computer, 38(6):99 -- 101, June 2005.
[14] Heiko Hamann. Space-Time Continuous Models of Swarm Robotic Systems, volume 9 of Cognitive Systems
Monographs. Springer Berlin Heidelberg.
[15] C. Huang, J. M. Lei, M. B. Liu, and X. Y. Peng. An improved KGF-SPH with a novel discrete scheme of
laplacian operator for viscous incompressible fluid flows. 81(6):377 -- 396.
[16] H. Kitano. Morphogenesis for evolvable systems. In E. Sanchez and M. Tomassini, editors, Towards Evolvable
Hardware: The Evolutionary Engineering Approach, pages 99 -- 117. Springer, Berlin, 1996.
[17] Jeff W. Lichtman and Winfried Denk. The big and the small: Challenges of imaging the brain's circuits. Science,
334(6056):618 -- 623, 4 November 2011.
[18] G. R. Liu and M. B. Liu. Smoothed particle hydrodynamics: a meshfree particle method. World Scientific.
OCLC: ocm52947194.
[19] Leon B. Lucy. A numerical approach to the testing of the fission hypothesis. 82:1013 -- 1024.
[20] Bruce J. MacLennan. Preliminary development of a formalism for embodied computation and morphogenesis.
Technical Report UT-CS-09-644, Department of Electrical Engineering and Computer Science, University of
Tennessee, Knoxville, TN, 2009.
[21] Bruce J. MacLennan. Models and mechanisms for artificial morphogenesis. In F. Peper, H. Umeo, N. Matsui,
and T. Isokawa, editors, Natural Computing, Springer series, Proceedings in Information and Communications
Technology (PICT) 2, pages 23 -- 33, Tokyo, 2010. Springer.
[22] Bruce J. MacLennan. Morphogenesis as a model for nano communication. Nano Communication Networks.,
1(3):199 -- 208, 2010.
[23] Bruce J. MacLennan. Artificial morphogenesis as an example of embodied computation. International Journal
of Unconventional Computing., 7(1 -- 2):3 -- 23, 2011.
[24] Bruce J. MacLennan. Embodied computation: Applying the physics of computation to artificial morphogenesis.
Parallel Processing Letters, 22(3):1240013, 2012.
[25] Bruce J. MacLennan. Molecular coordination of hierarchical self-assembly. Nano Communication Networks,
3(2):116 -- 128, June 2012.
30
A PREPRINT - AUGUST 26, 2019
[26] Bruce J. MacLennan. Coordinating massive robot swarms. International Journal of Robotics Applications and
Technologies, 2(2):1 -- 19, 2014.
[27] Bruce J. MacLennan. The morphogenetic path to programmable matter. Proceedings of the IEEE, 103(7):1226 --
1232, 2015.
[28] Bruce J. MacLennan. Coordinating swarms of microscopic agents to assemble complex structures. In Ying Tan,
editor, Swarm Intelligence, Vol. 1: Principles, Current Algorithms and Methods, PBCE 119, chapter 20, pages
583 -- 612. Institution of Engineering and Technology, 2018.
[29] Bruce J. MacLennan. The Synmac syntax macroprocessor: Introduction and manual, version 5. Faculty Publi-
cations and Other Works -- EECS. http://trace.tennessee.edu/utk elecpubs/23, University of Tennessee Depart-
ment of Electrical Engineering and Computer Science, 2018.
[30] Bruce J. MacLennan. A morphogenetic program for path formation by continuous flocking.
Journal of Unconventional Computing, 14:91 -- 119, 2019.
International
[31] Jose Martin Z. Maningo, Gerard Ely U. Faelden, Reiichiro Christian S. Nakano, Argel A. Bandala, Ryan Rhay P.
Vicerra, and Elmer P. Dadios. Formation control in quadrotor swarm aggregation using smoothed particle hy-
drodynamics. In Region 10 Conference (TENCON), 2016 IEEE, pages 2070 -- 2075. IEEE.
[32] S. Murata and H. Kurokawa. Self-reconfigurable robots: Shape-changing cellular robots can exceed conventional
robot flexibility. IEEE Robotics & Automation Magazine, pages 71 -- 78, March 2007.
[33] Radhika Nagpal, Attila Kondacs, and Catherine Chang. Programming methodology for biologically-inspired
self-assembling systems. In AAAI Spring Symposium on Computational Synthesis: From Basic Building Blocks
to High Level Functionality, March 2003.
[34] Daniel Needleman and Zvonimir Dogic. Active matter at the interface between materials science and cell biology.
Nature Reviews Materials, 2:17048 EP -- , 07 2017.
[35] Hyondong Oh, Ataollah Ramezan Shirazi, Chaoli Sun, and Yaochu Jin. Bio-inspired self-organising multi-robot
pattern formation: A review. 91:83 -- 100.
[36] Muhammed R. Pac, Aydan M. Erkmen, and Ismet Erkmen. Control of robotic swarm behaviors based on
smoothed particle hydrodynamics. In Intelligent Robots and Systems, 2007. IROS 2007. IEEE/RSJ International
Conference on, pages 4194 -- 4200. IEEE.
[37] James R. Perkinson and Bahram Shafai. A decentralized control algorithm for scalable robotic swarms based
In Proc. of the IASTED Int. Conf. on Robot. and Applications, pages
on mesh-free particle hydrodynamics.
102 -- 107, 2005.
[38] Luciano C. A. Pimenta, Guilherme A. S. Pereira, Nathan Michael, Renato C. Mesquita, Mateus M. Bosque, Luiz
Chaimowicz, and Vijay Kumar. Swarm Coordination Based on Smoothed Particle Hydrodynamics Technique.
IEEE Transactions on Robotics, 29(2):383 -- 399, April 2013.
[39] I. Salazar-Ciudad, J. Jernvall, and S. A. Newman. Mechanisms of pattern formation in development and evolu-
tion. Development, 130:2027 -- 37, 2003.
[40] Matthew B. Silic, Zhuoyuan Song, and Kamran Mohseni. Anisotropic flocking control of distributed multi-agent
In 2018 AIAA Information Systems-AIAA Infotech @ Aerospace. American
systems using fluid abstraction.
Institute of Aeronautics and Astronautics.
[41] A. Spicher, Olivier Michel, and J.-L. Giavitto. Algorithmic self-assembly by accretion and by carving in MGS.
In Proc. of the 7th International Conference on Artificial Evolution (EA '05), number 3871 in Lecture Notes in
Computer Science, pages 189 -- 200. Springer-Verlag, Berlin, 2005.
[42] Larry A. Taber. Nonlinear Theory of Elasticity: Applications in Biomechanics. World Scientific, Singapore,
2004.
[43] Brian P. Teague, Patrick Guye, and Ron Weiss. Synthetic morphogenesis. page a023929.
[44] U. Tilki and A. M. Erkmen. Fluid swarm formation control for hand gesture imitation by ellipse fitting.
51(6):473 -- 475.
[45] Wang Xi, Thuan Beng Saw, Delphine Delacour, Chwee Teck Lim, and Benoit Ladoux. Material approaches to
active tissue mechanics. Nature Reviews Materials, 4(1):23 -- 44, 2019.
31
|
1311.0758 | 1 | 1311 | 2013-11-04T16:28:31 | Observation of large-scale multi-agent based simulations | [
"cs.MA"
] | The computational cost of large-scale multi-agent based simulations (MABS) can be extremely important, especially if simulations have to be monitored for validation purposes. In this paper, two methods, based on self-observation and statistical survey theory, are introduced in order to optimize the computation of observations in MABS. An empirical comparison of the computational cost of these methods is performed on a toy problem. | cs.MA | cs |
Observation of large-scale multi-agent based
simulations
Gildas Morvan1,2 Alexandre Veremme1,3 Daniel Dupont1,3
1Univ Lille Nord de France, F-59000 Lille, France
2UArtois, LGI2A, F-62400, Béthune, France
3HEI, F-59046, Lille, France
http://www.lgi2a.univ-artois.fr/~morvan/
[email protected]
Abstract
The computational cost of large-scale multi-agent based simulations (MABS) can be ex-
tremely important, especially if simulations have to be monitored for validation purposes.
In this paper, two methods, based on self-observation and statistical survey theory, are
introduced in order to optimize the computation of observations in MABS. An empirical
comparison of the computational cost of these methods is performed on a toy problem.
Keywords:
large-scale multi-agent based simulations, observation methods, scalability
Introduction
1
Theoretical and practical advances in the field of multi-agent based simulations (MABS) allow
modelers to simulate very complex systems to solve real world problems. However the anal-
ysis and validation of simulations remain engineering problems that do not have "turnkey"
solutions. Thus, MABS users conducting such tasks face two main issues:
1. define validation metrics for the simulation,
2. compute efficiently the metrics.
The first issue is generally solved by constructing a set of ad-hoc qualitative or quantitative
rules on simulation properties. To evaluate these rules, it is then mandatory to observe the
corresponding simulation properties and thus to consider the second issue. A distinctive char-
acteristic of MABS is that global simulation properties are not necessary directly observable:
they may need to be computed from local agent properties. Fortunately, most of modern
MABS platforms come with observation frameworks and toolboxes. Basically, three types of
observation methods are generally available (Railsback et al., 2006):
1
1. interactive observation: users select observed properties during simulations, e.g., using
a point and click interface,
2. brute-force direct observation: simulation agents sharing a given property are moni-
tored; agent properties are then aggregated by a so-called observer agent that computes
the observation (fig. 1),
3. indirect observation: the observed property is inferred from the observable conse-
quences of agent actions, e.g., in the environment.
observer
observation
simulation agents
Figure 1: Brute-force direct observation method
While the first method is clearly unadapted to the observation of large-scale or batch simu-
lations, the second has an important computational cost. This issue is illustrated with a simple
case study inspired by "StupidModel" (Railsback et al., 2005): N agents move randomly in a
two dimensional environment (cid:69) discretized into 100·100 square cells with Moore neighbour-
hood during 1000 steps. An area (cid:90) ⊆ (cid:69) is defined. The number of agents Z in the area (cid:90) is
observed at each simulation step. This simulation is implemented on the MadKit/TurtleKit
platform1 (Michel et al., 2005). Figure 2 shows the CPU times needed to compute unobserved
and observed simulations on a Dell Precision 650 workstation2, using indirect and brute-force
direct observation methods, for the given expected value E(Z) = N /5, as a function of the
number of simulation agents N.
This work is based on existing implementations (by MadKit/TurtleKit and MASON) of
the direct observation method. Thus, an empirical computational complexity metric, i.e., the
CPU time needed to compute simulations, is used. This metric, denoted (cid:67) , depends, in our
case study, on the number of simulation agents, N, and on the expected value of the cardinal
of the subset of simulation agents computed by f i l t e r , E(Z).
These results show that, in this case, indirect observation has a minor impact on the
computational cost of the simulations. Kaminka et al. also note that this method is not
intrusive: simulation agents do not have to be modified or accessed during the observation
process (Kaminka et al., 2002). However, Wilkins et al. underline that the applicability of
this method is limited: the observed property might not be inferred (Wilkins et al., 2003); it
is often true in complex, i.e., in most of the real world, cases. Thus, direct observation often
remains the only available option.
The brute-force direct observation method is, for this particular and very simple toy-
problem, linear in the number of simulation agents3, i.e., (cid:67) (ob s) ∝ N, while the model is
exponential, i.e., (cid:67) (mod e l) ∝ αN , α > 1. However, complex simulations generally involve
non-linear observation problems (Veremme et al., 2010). Thus, improving direct observation
appears to be a good lead to improve the efficiency of large-scale complex MABS.
SON platform (Luke et al., 2005), leading to similar results.
1All the simulations and observation methods described in this paper have also been implemented on the MA-
2CPU: 2 × 3.06 GHz Intel XeonTM, RAM: 4 × 1 GB. Full specification:
http://www.dell.com/downloads/emea/products/precn/precn_650_uk.pdf.
All the results presented in this paper have been computed by this machine.
3Authors would like to thank anonymous reviewers for raising this issue.
2
no observation
indirect observation
brute-force observation
1000
100
10
1
)
s
(
e
m
i
t
U
P
C
2000
4000
6000
8000
10000 12000 14000 16000 18000 20000
Number of agents
Figure 2: CPU times (log scale) needed to compute observed and unobserved simulations for
E(Z) = N /5
In this paper, two non-brute-force direct observation methods, based on self-observation
and statistical survey theory are introduced. An empirical comparison of the computational
cost of these methods is performed and discussed on the presented case study.
2 Filtrated direct observation of MABS
Basically, there are two ways to compute a direct observation:
1. a set of agents (cid:65) (generally all the simulation agents that share the properties that have
2. a subset (cid:65) (cid:48) of (cid:65) , computed at runtime, is probed (fig. 3).
to be observed), statically defined, is probed by an observer agent,
ob s(cid:48)
(cid:65) (cid:48)
observation
(cid:65)
f i l t e r
Figure 3: Filtrated direct observation
Formally, we consider an observation function
(cid:65) →(cid:73) ,
ob s : 2
(1)
where (cid:65) is a set of agents and (cid:73) represents the values that can be observed. We define
(cid:65) (cid:48) ⊆(cid:65) as the minimal subset of agents, dynamically defined by a set of constraints (e.g., in
the case study, a unique constraint related to the position of the agent), needed to compute
ob s correctly. In other words, (cid:65) (cid:48) is a set of agents such as
ob s(cid:48)((cid:65) (cid:48)) = ob s((cid:65) ) and
(cid:64) (cid:65) (cid:48)(cid:48) ⊂(cid:65) (cid:48) ob s(cid:48)((cid:65) (cid:48)(cid:48)) = ob s((cid:65) ),
(2)
3
where ob s(cid:48) is a "simplified" observation function, i.e., that can be computed faster than ob s
because it is specific to (cid:65) (cid:48):
∀ (cid:65) (cid:48)(cid:48) (cid:54)=(cid:65) (cid:48) ⊆(cid:65) , ob s(cid:48)((cid:65) (cid:48)) = ob s((cid:65) (cid:48)).
(3)
Thus, in the case study, the observation function ob s((cid:65) ) observes the position of each
agent in (cid:65) to count only the ones that are situated in (cid:90) , while an observation function
ob s(cid:48)((cid:65) (cid:48)) would only returns (cid:65) (cid:48) because the agents of (cid:65) (cid:48) are by definition situated in (cid:90) .
To use ob s(cid:48), it is necessary to consider a filtering function f i l t e r able to identify the
subset (cid:65) (cid:48) (in the case study, this subset only contains the agents situated in (cid:90) ):
f i l t e r : 2(cid:65) → 2(cid:65) ∀(cid:65) (cid:48),(cid:65) (cid:48)(cid:48) ⊆(cid:65) ,
if f i l t e r ((cid:65) (cid:48)) =(cid:65) (cid:48)(cid:48), then (cid:65) (cid:48)(cid:48) ⊆(cid:65) (cid:48).
(4)
The goal is to define and implement a filtering function, such as the cost of the observation
computation is reduced, i.e.,
(cid:67) (ob s
(cid:48)(f i l t e r ((cid:65) ))) <(cid:67) (ob s((cid:65) )).
(5)
In the following section, two different implementations of this idea are presented.
Implementation of filtrated direct observation methods
3
3.1 Self-observation
The core idea of this method is to implement the filtering function in the simulation agents
themselves. Then, using an organizational structure, denoted group, allows to identify the set
of agents that has to be observed. Thus, a group is defined as the set of agents that contains the
sufficient and necessary information to compute an observation. In other words, a group defines,
for a given observation, the minimal set of agents that is mandatory to compute it. Agents
observe themselves to determine if they have to join, leave or stay in a group. A filtering
function is defined by a set of rules R, that specifies the conditions under which an agent has
to be observed, evaluated at each simulation step (fig. 4).
Thus, in our case study, we consider a group G, that contains the agents situated in (cid:90) .
• if the agent is in (cid:90) and does not belong to G, then the agent joins G,
• if the agent is not in (cid:90) and belongs to G, then the agent leaves G.
The following set of rules, defined here in natural language, is associated to each agent:
The observation system (ob s(cid:48)) only probes the agents of G. Figure 5 presents the CPU time
difference between simulations observed with self-observation and brute-force methods as a
function of the number of agents in the simulation, N, and the mean rate of observed agents,
E(Z)/N. The dashed line represents the isoline 0, i.e., the conditions for which there is no
difference between the two methods. Thus, the area below this line maps the cases for which
self-observation is faster.
3.2 Statistical survey
If the equation 2 is rewritten as follows:
ob s((cid:65) (cid:48))(cid:39) ob s((cid:65) ) and
(cid:64) (cid:65) (cid:48)(cid:48) ⊂(cid:65) (cid:48) ob s((cid:65) (cid:48)(cid:48))(cid:39) ob s((cid:65) ),
(6)
i.e., if imprecise observations are authorized, it becomes possible to filter the observed pop-
ulation on a statistical basis. As a result, we do not consider a specific observation function
anymore as the set of agents returned by the filtering function is not necessary the set of agents
that contains the sufficient and necessary information to compute the observation.
4
ob s(cid:48)
observation
group G
organisational structures
if R =(cid:62)
f i l t e r : set of rules R
(cid:65)
Figure 4: The self-observation based method
Statistical survey theory4 provides a formal ground to determine optimal sampling method
and size of observed population sample.
Let once again consider our case study; we denote n the size of the observed population,
randomly sampled at each simulation step. An estimator of Z, denoted Z is constructed from
this sample. Many estimator definitions can be found in the literature. In this case, as the pop-
ulation of simulation agents is homogeneous with respect to E(Z) (all the agents have the same
probability to be in (cid:90) ), n is determined with the Horvitz-Thompson estimator (Horvitz and
Thompson, 1952) :
n
−1 = d 2
4S2
+ 1
N
,
(7)
(8)
where d is the maximal absolute error accepted for the observation and
S2 (cid:39) (1− E(Z)
N
)· E(Z)
N
.
Impact on the computational cost is shown in figure 6. The semantic is the same than
figure 5: the left area maps the cases for which the statistical survey based method is faster
than brute-force method.
3.3 Discussion
Figure 7 sums up the previous results qualitatively: conditions for which it is preferable to
use one method over another are identified. These results are specific to our case study and
its implementation; however, they highlight that the choice of an observation method is not
trivial and that the performance of the different available methods should be analyzed on a
set of simulations before using the model in a production context.
In a given context, knowing the map of the fastest observation methods allows to dy-
namically adapt the observation method to use the most efficient one. Impact of dynamic
adaptation of the observation method on CPU time is presented in the context of the first
example (cf. fig. 2) in figure 8.
4Proofs of statistical survey theory results presented in this paper will not be given.
Interested readers may
refer to Bethlehem (2009) for an exhaustive presentation of sampling designs, estimator construction and variability
estimation methods.
5
0
2000
1500
1000
500
0
-500
-1000
)
s
(
e
m
i
t
U
P
C
0
5000
N
10000
15000
0.2
20000
1
0.6
0.4
0.8
E(Z)
N
Figure 5: CPU time difference between simulations observed with self-observation and brute-
force methods as a function of the number of agents in the simulation, N, and the mean rate
of observed agents, E(Z)/N (response surface estimation)
0
)
s
(
e
m
i
t
U
P
C
200
0
-200
-400
-600
-800
-1000
0
5000
N
10000
15000
0.2
20000
1
0.6
0.4
0.8
E(Z)
N
Figure 6: CPU time difference between simulations observed with statistical survey (d = 0.08)
and brute-force methods as a function of the number of agents in the simulation, N, and the
mean rate of observed agents, E(Z)/N (response surface estimation)
6
E(Z)
N
1
0.8
0.6
0.4
0.2
0
0
B
A
C
5000
10000
N
15000
20000
Figure 7: Map of the fastest observation methods (response surface estimation); A: self-
observation, B: brute-force, C: statistical survey (d = 0.008)
no observation
brute-force observation
filtrated observation
1000
100
10
1
)
s
(
e
m
i
t
U
P
C
2000
4000
6000
8000
10000 12000 14000 16000 18000 20000
Number of agents
Figure 8: CPU times (log scale) needed to compute observed and unobserved simulations for
E(Z) = N /5, filtrated observation method being dynamically adapted to the context
7
4 Conclusion and perspectives
Observation methods presented in this paper allow, under specific conditions identified on
a simple case study, to reduce significantly the computational cost of MABS composed of
numerous agents. However, filtering is not the only option. Considering that imprecise
observations are acceptable, while a precision level is guaranteed, the optimal observation
frequency could be determined from the observed property variation. Roughly, the more the
variation, the more the observation frequency. However, MABS are used to simulate complex
systems with nonlinear dynamics. Dynamic adaptation of observation frequency could be an
interesting lead to reduce MABS computational cost.
Moreover, in the statistical survey based method (cf. section 3.2), we consider a simple
random sampling method, assuming the population is homogeneous. Real world MABS of-
ten involve heterogeneous agents for which the distribution of observed individual properties
is not uniform. Clever sampling methods, e.g., a stratified random sampling approach, should
then be used. In very complex cases, a machine learning system should be implemented to
analyze the impact of sampling method properties on the observation quality and compu-
tational cost, and determine the optimal ones. Similarly, the organizational model used to
implement the self-observation based method is very simple: the only organizational struc-
ture that is defined is the "group". Using a more comprehensive one, e.g., AGR (Ferber and
Gutknecht, 1998), would allow to consider very complex and fine observations.
From a methodological point of view, authors experimented that setting up an observa-
tion method, generally improves the design of simulation validity metrics. Indeed, it forces
simulation designers and users to explicitly define local and global observed properties and
their sufficient and necessary conditions of observability, and then the validity constraints
over them.
While this paper focuses on reducing the complexity of observation, many published
works concentrated on agent interactions by dynamically scaling up and down simulated en-
tities or using more structured interaction artifacts (Gaud et al., 2008; Parunak, 2012; Razavi
et al., 2011). Together, these approaches should lead to the conception of highly efficient
large-scale MABS simulators.
References
Bethlehem, J. (2009). Applied Survey Methods: A Statistical Perspective. Wiley.
Ferber, J. and Gutknecht, O. (1998). A meta-model for the analysis and design of orga-
nizations in multi-agent systems. In Proceedings of the Third International Conference on
Multi-Agent Systems (ICMAS98), pages 128–135.
Gaud, N., Galland, S., Gechter, F., Hilaire, V., and Koukam, A. (2008). Holonic multilevel
simulation of complex systems : Application to real-time pedestrians simulation in virtual
urban environment. Simulation Modelling Practice and Theory, 16:1659–1676.
Horvitz, D. and Thompson, D. (1952). A generalization of sampling without replacement
from a finite universe. Journal of the American Statistical Association, 47:663–685.
Kaminka, G., Pynadath, D., and Tambe, M. (2002). Monitoring teams by overhearing: A
multi-agent planrecognition approach. Journal of Artificial Intelligence, 17:83–135.
Luke, S., Cioffi-Revilla, C., Panait, L., Sullivan, K., and Balan, G. (2005). Mason: A multia-
gent simulation environment. Simulation, 81(7):517–527.
Michel, F., Beurier, G., and Ferber, J. (2005). The turtlekit simulation platform: Application
In Proceedings of the First International Conference on Signal-Image
to complex systems.
Technology and Internet Based Systems, pages 122–127.
8
Parunak, H. (2012). Between agents and mean fields. In Multi-Agent-Based Simulation XII,
volume 7124 of Lecture Notes in Artificial Intelligence, pages 113–126. Springer.
Railsback, S., Lytinen, S., and Grimm, V. (2005). Stupidmodel and extensions: A tem-
plate and teaching tool for agent-based modeling platforms. http://condor.depaul.edu/ slyti-
nen/abm/StupidModelFormulation.pdf.
Railsback, S., Lytinen, S., and Jackson, S. (2006). Agent-based simulation platforms: Review
and development recommendations. Simulation, 82(9):609–623.
Razavi, S., Gaud, N., Mozayani, N., and Koukam, A. (2011). Multi-agent based simulations
using fast multipole method: application to large scale simulations of flocking dynamical
systems. Artificial Intelligence Review, 35(1):53–72.
Veremme, A., Lefevre, E., Morvan, G., and Jolly, D. (2010). Application of the belief function
In First international workshop on the
theory to validate multi-agent based simulations.
theory of belief functions.
Wilkins, D., Lee, T., and Berry, P. (2003). Interactive execution monitoring of agent teams.
Journal of Artificial Intelligence Research, 18:217–261.
9
|
1109.6340 | 1 | 1109 | 2011-09-28T20:15:30 | Negotiating Socially Optimal Allocations of Resources | [
"cs.MA"
] | A multiagent system may be thought of as an artificial society of autonomous software agents and we can apply concepts borrowed from welfare economics and social choice theory to assess the social welfare of such an agent society. In this paper, we study an abstract negotiation framework where agents can agree on multilateral deals to exchange bundles of indivisible resources. We then analyse how these deals affect social welfare for different instances of the basic framework and different interpretations of the concept of social welfare itself. In particular, we show how certain classes of deals are both sufficient and necessary to guarantee that a socially optimal allocation of resources will be reached eventually. | cs.MA | cs |
Journal of Artificial Intelligence Research 25 (2006) 315 -- 348
Submitted 08/05; published 03/06
Negotiating Socially Optimal Allocations of Resources
Ulle Endriss
ILLC, University of Amsterdam
1018 TV Amsterdam, The Netherlands
Nicolas Maudet
LAMSADE, Universit´e Paris-Dauphine
75775 Paris Cedex 16, France
Fariba Sadri
Department of Computing, Imperial College London
London SW7 2AZ, UK
Francesca Toni
Department of Computing, Imperial College London
London SW7 2AZ, UK
[email protected]
[email protected]
[email protected]
[email protected]
Abstract
A multiagent system may be thought of as an artificial society of autonomous software
agents and we can apply concepts borrowed from welfare economics and social choice theory
to assess the social welfare of such an agent society. In this paper, we study an abstract
negotiation framework where agents can agree on multilateral deals to exchange bundles
of indivisible resources. We then analyse how these deals affect social welfare for different
instances of the basic framework and different interpretations of the concept of social welfare
itself. In particular, we show how certain classes of deals are both sufficient and necessary
to guarantee that a socially optimal allocation of resources will be reached eventually.
1. Introduction
A multiagent system may be thought of as an artificial society of autonomous software
agents. Negotiation over the distribution of resources (or tasks) amongst the agents inhab-
iting such a society is an important area of research in artificial intelligence and computer
science (Rosenschein & Zlotkin, 1994; Kraus, 2001; Chavez, Moukas, & Maes, 1997; Sand-
holm, 1999). A number of variants of this problem have been studied in the literature.
Here we consider the case of an artificial society of agents where, to begin with, each agent
holds a bundle of indivisible resources to which it assigns a certain utility. Agents may then
negotiate with each other in order to agree on the redistribution of some of these resources
to benefit either themselves or the agent society they inhabit.
Rather than being concerned with specific strategies for negotiation, we analyse how the
redistribution of resources by means of negotiation affects the well-being of the agent society
as a whole. To this end, we make use of formal tools for measuring social welfare developed
in welfare economics and social choice theory (Moulin, 1988; Arrow, Sen, & Suzumura,
2002). In the multiagent systems literature, the utilitarian interpretation of the concept of
social welfare is usually taken for granted (Rosenschein & Zlotkin, 1994; Sandholm, 1999;
Wooldridge, 2002), i.e. whatever increases the average welfare of the agents inhabiting a
society is taken to be beneficial for society as well. This is not the case in welfare economics,
c(cid:13)2006 AI Access Foundation. All rights reserved.
Endriss, Maudet, Sadri, & Toni
for instance, where different notions of social welfare are being studied and compared with
each other. Here, the concept of egalitarian social welfare takes a particularly prominent
role (Sen, 1970; Rawls, 1971; Moulin, 1988; Arrow et al., 2002).
In this model, social
welfare is tied to the individual welfare of the weakest member of society, which facilitates
the incorporation of a notion of fairness into the resource allocation process. While the
discussion of the respective advantages and drawbacks of different notions of social welfare
in the social sciences tends to be dominated by ethical considerations,1 in the context
of societies of artificial software agents the choice of a suitable formal tool for modelling
social welfare boils down to a clear-cut (albeit not necessarily simple) technical design
decision (Endriss & Maudet, 2004).
Indeed, different applications may call for different
social criteria. For instance, for the application studied by Lemaıtre, Verfaillie, and Bataille
(1999), where agents need to agree on the access to an earth observation satellite which has
been funded jointly by the owners of these agents, it is important that each one of them
receives a "fair" share of the common resource. Here, a society governed by egalitarian
principles may be the most appropriate. In an electronic commerce application running on
the Internet where agents have little or no commitments towards each other, on the other
hand, egalitarian principles seem of little relevance. In such a scenario, utilitarian social
welfare would provide an appropriate reflection of the overall profit generated. Besides
utilitarian and egalitarian social welfare, we are also going to discuss notions such as Pareto
and Lorenz optimality (Moulin, 1988), as well as envy-freeness (Brams & Taylor, 1996).
In this paper, we study the effect that negotiation over resources has on society for a
number of different interpretations of the concept of social welfare. In particular, we show
how certain classes of deals regarding the exchange of resources allow us to guarantee that a
socially optimal allocation of resources will be reached eventually. These convergence results
may be interpreted as the emergence of a particular global behaviour (at the level of society)
in reaction to local behaviour governed by the negotiation strategies of individual agents
(which determine the kinds of deals agents are prepared to accept). The work described here
is complementary to the large body of literature on mechanism design and game-theoretical
models of negotiation in multiagent systems (see e.g. Rosenschein & Zlotkin, 1994; Kraus,
2001; Fatima, Wooldridge, & Jennings, 2004). While such work is typically concerned with
negotiation at the local level (how can we design mechanisms that provide an incentive
to individual agents to adopt a certain negotiation strategy?), we address negotiation at a
global level by analysing how the actions taken by agents locally affect the overall system
from a social point of view.
As we shall see, truly multilateral deals involving any number of agents as well as any
number of resources may be necessary to be able to negotiate socially optimal allocations
of resources. This is certainly true as long as we use arbitrary utility functions to model
the preferences of individual agents. In some application domains, however, where utility
functions may be assumed to be subject to certain restrictions (such as being additive), we
are able to obtain stronger results and show that also structurally simpler classes of deals
(in particular, deals involving only a single resource at a time) can be sufficient to negotiate
socially optimal allocations. Nevertheless, for other seemingly strong restrictions on agents'
1. A famous example is Rawls' veil of ignorance, a thought experiment designed to establish what constitutes
a just society (Rawls, 1971).
316
Negotiating Socially Optimal Allocations of Resources
utility functions (such as the restriction to dichotomous preferences) we are able to show
that no reduction in the structural complexity of negotiation is possible.
Our approach to multiagent resource allocation is of a distributed nature. In general,
the allocation procedure used to find a suitable allocation of resources could be either cen-
tralised or distributed. In the centralised case, a single entity decides on the final allocation
of resources amongst agents, possibly after having elicited the agents' preferences over al-
ternative allocations. Typical examples are combinatorial auctions (Cramton, Shoham, &
Steinberg, 2006). Here the central entity is the auctioneer and the reporting of preferences
takes the form of bidding. In truly distributed approaches, on the other hand, allocations
emerge as the result of a sequence of local negotiation steps. Both approaches have their
advantages and disadvantages. Possibly the most important argument in favour of auction-
based mechanisms concerns the simplicity of the communication protocols required to im-
plement such mechanisms. Another reason for the popularity of centralised mechanisms is
the recent push in the design of powerful algorithms for combinatorial auctions that, for
the first time, perform reasonably well in practice (Fujishima, Leyton-Brown, & Shoham,
1999; Sandholm, 2002). Of course, such techniques are, in principle, also applicable in the
distributed case, but research in this area has not yet reached the same level of maturity
as for combinatorial auctions. An important argument against centralised approaches is
that it may be difficult to find an agent that could assume the role of an "auctioneer" (for
instance, in view of its computational capabilities or in view of its trustworthiness).
The line of research pursued in this paper has been inspired by Sandholm's work on
sufficient and necessary contract (i.e. deal) types for distributed task allocation (Sandholm,
1998). Since then, it has been further developed by the present authors, their colleagues, and
others in the context of resource allocation problems (Bouveret & Lang, 2005; Chevaleyre,
Endriss, Estivie, & Maudet, 2004; Chevaleyre, Endriss, Lang, & Maudet, 2005a; Chevaleyre,
Endriss, & Maudet, 2005b; Dunne, 2005; Dunne, Laurence, & Wooldridge, 2004; Dunne,
Wooldridge, & Laurence, 2005; Endriss & Maudet, 2004, 2005; Endriss, Maudet, Sadri,
& Toni, 2003a, 2003b).
In particular, we have extended Sandholm's framework by also
addressing negotiation systems without compensatory side payments (Endriss et al., 2003a),
as well as agent societies where the concept of social welfare is given a different interpretation
to that in the utilitarian programme (Endriss et al., 2003b; Endriss & Maudet, 2004). The
present paper provides a comprehensive overview of the most fundamental results, mostly on
the convergence to an optimal allocation with respect to different notions of social welfare,
in a very active and timely area of ongoing research.
The remainder of this paper is organised as follows. Section 2 introduces the basic ne-
gotiation framework for resource reallocation we are going to consider. It gives definitions
for the central notions of allocation, deal, and utility, and it discusses possible restrictions
to the class of admissible deals (both structural and in terms of acceptability to individual
agents). Section 2 also introduces the various concepts of a social preference we are going
to consider in this paper. Subsequent sections analyse specific instances of the basic ne-
gotiation framework (characterised, in particular, by different criteria for the acceptability
of a proposed deal) with respect to specific notions of social welfare. In the first instance,
agents are assumed to be rational (and "myopic") in the sense of never accepting a deal
that would result in a negative payoff. Section 3 analyses the first variant of this model
of rational negotiation, which allows for monetary side payments to increase the range of
317
Endriss, Maudet, Sadri, & Toni
acceptable deals. As we shall see, this model facilitates negotiation processes that maximise
utilitarian social welfare. If side payments are not possible, we cannot guarantee outcomes
with maximal social welfare, but it is still possible to negotiate Pareto optimal allocations.
This variant of the rational model is studied in Section 4. Both Section 3 and 4 also in-
vestigate how restrictions to the range of utility functions agents may use to model their
preferences can affect such convergence results.
In the second part of the paper we apply our methodology to agent societies where the
concept of social welfare is given a different kind of interpretation than is commonly the
case in the multiagent systems literature. Firstly, in Section 5 we analyse our framework
of resource allocation by negotiation in the context of egalitarian agent societies. Then
Section 6 discusses a variant of the framework that combines ideas from both the utilitarian
and the egalitarian programme and enables agents to negotiate Lorenz optimal allocations
of resources. Finally, Section 7 introduces the idea of using an elitist model of social welfare
for applications where societies of agents are merely a means of enabling at least one agent
to achieve their goal. This section also reviews the concept of envy-freeness and discusses
ways of measuring different degrees of envy.
Section 8 summarises our results and concludes with a brief discussion of the concept of
welfare engineering, i.e. with the idea of choosing tailor-made definitions of social welfare
for different applications and designing agents' behaviour profiles accordingly.
2. Preliminaries
The basic scenario of resource allocation by negotiation studied in this paper is that of an
artificial society inhabited by a number of agents, each of which initially holds a certain
number of resources. These agents will typically ascribe different values (utilities) to differ-
ent bundles of resources. They may then engage in negotiation and agree on the reallocation
of some of the resources, for example, in order to improve their respective individual welfare
(i.e. to increase their utility). Furthermore, we assume that it is in the interest of the system
designer that these distributed negotiation processes -- somehow -- also result in a positive
payoff for society as a whole.
2.1 Basic Definitions
An instance of our abstract negotiation framework consists of a finite set of (at least two)
agents A and a finite set of resources R. Resources are indivisible and non-sharable. An
allocation of resources is a partitioning of R amongst the agents in A.
Definition 1 (Allocations) An allocation of resources is a function A from A to subsets
of R such that A(i) ∩ A(j) = { } for i 6= j and Si∈A A(i) = R.
For example, given an allocation A with A(i) = {r3, r7}, agent i would own resources r3 and
r7. Given a particular allocation of resources, agents may agree on a (multilateral) deal to
exchange some of the resources they currently hold. In the most general case, any numbers
of agents and resources could be involved in a single deal. From an abstract point of view,
a deal takes us from one allocation of resources to the next. That is, we may characterise
a deal as a pair of allocations.
318
Negotiating Socially Optimal Allocations of Resources
Definition 2 (Deals) A deal is a pair δ = (A, A′) where A and A′ are allocations of
resources with A 6= A′.
The set of agents involved in a deal δ = (A, A′) is given by Aδ = {i ∈ A A(i) 6= A′(i)}.
The composition of two deals is defined as follows: If δ1 = (A, A′) and δ2 = (A′, A′′), then
δ1 ◦ δ2 = (A, A′′). If a given deal is the composition of two deals that concern disjoint sets
of agents, then that deal is said to be independently decomposable.
Definition 3 (Independently decomposable deals) A deal δ is called independently
decomposable iff there exist deals δ1 and δ2 such that δ = δ1 ◦ δ2 and Aδ1 ∩ Aδ2 = { }.
Observe that if δ = (A, A′) is independently decomposable then there exists an intermediate
allocation B different from both A and A′ such that the intersection of {i ∈ A A(i) 6= B(i)}
and {i ∈ A B(i) 6= A′(i)} is empty, i.e. such that the union of {i ∈ A A(i) = B(i)} and
{i ∈ A B(i) = A′(i)} is the full set of agents A. Hence, δ = (A, A′) not being independently
decomposable implies that there exists no allocation B different from both A and A′ such
that either B(i) = A(i) or B(i) = A′(i) for all agents i ∈ A (we are going to use this fact in
the proofs of our "necessity theorems" later on).
The value an agent i ∈ A ascribes to a particular set of resources R will be modelled by
means of a utility function, that is, a function from sets of resources to real numbers. We
are going to consider both general utility functions (without any restrictions) and several
more specific classes of functions.
Definition 4 (Utility functions) Every agent i ∈ A is equipped with a utility function
ui : 2R → R. We are going to consider the following restricted classes of utility functions:
• ui is non-negative iff ui(R) ≥ 0 for all R ⊆ R.
• ui is positive iff it is non-negative and ui(R) 6= 0 for all R ⊆ R with R 6= { }.
• ui is monotonic iff R1 ⊆ R2 implies ui(R1) ≤ ui(R2) for all R1, R2 ⊆ R.
• ui is additive iff ui(R) = Pr∈R ui({r}) for all R ⊆ R.
• ui is a 0-1 function iff it is additive and ui({r}) = 0 or ui({r}) = 1 for all r ∈ R.
• ui is dichotomous iff ui(R) = 0 or ui(R) = 1 for all R ⊆ R.
Recall that, given an allocation A, the set A(i) is the bundle of resources held by agent i
in that situation. We are usually going to abbreviate ui(A) = ui(A(i)) for the utility value
assigned by agent i to that bundle.
2.2 Deal Types and Rationality Criteria
In this paper we investigate what kinds of negotiation outcomes agents can achieve by using
different classes of deals. A class of deals may be characterised by both structural constraints
(number of agents and resources involved, etc.) and rationality constraints (relating to the
changes in utility experienced by the agents involved).
Following Sandholm (1998), we can distinguish a number of structurally different types
of deals. The most basic are 1-deals, where a single item is passed from one agent to another.
319
Endriss, Maudet, Sadri, & Toni
Definition 5 (1-deals) A 1-deal is a deal involving the reallocation of exactly one resource.
This corresponds to the "classical" form of a contract typically found in the Contract Net
protocol (Smith, 1980). Deals where one agent passes a set of resources on to another
agent are called cluster deals. Deals where one agent gives a single item to another agent
who returns another single item are called swap deals. Sometimes it can also be necessary
to exchange resources between more than just two agents. In Sandholm's terminology, a
multiagent deal is a deal that could involve any number of agents, where each agent passes
at most one resource to each of the other agents taking part. Finally, deals that combine the
features of the cluster and the multiagent deal type are called combined deals by Sandholm.
These could involve any number of agents and any number of resources. Therefore, every
deal δ, in the sense of Definition 2, is a combined deal. In the remainder of this paper, when
speaking about deals without further specifying their type, we are always going to refer to
combined deals (without any structural restrictions).2
An agent may or may not find a particular deal δ acceptable. Whether or not an agent
will accept a given deal depends on the rationality criterion it applies when evaluating deals.
A selfish agent i may, for instance, only accept deals δ = (A, A′) that strictly improve its
personal welfare: ui(A) < ui(A′). We call criteria such as this, which only depend on
the utilities of the agent in question, personal rationality criteria. While we do not want
to admit arbitrary rationality criteria, the classes of deals that can be characterised using
personal rationality criteria alone is somewhat too narrow for our purposes. Instead, we are
going to consider rationality criteria that are local in the sense of only depending on the
utility levels of the agents involved in the deal concerned.
Definition 6 (Local rationality criteria) A class ∆ of deals is said to be characterised
by a local rationality criterion iff it is possible to define a predicate Φ over 2A×R×R such
that a deal δ = (A, A′) belongs to ∆ iff Φ({(i, ui(A), ui(A′)) i ∈ Aδ}) holds true.
That is, Φ is mapping a set of triples of one agent name and two reals (utilities) each to
truth values. The locality aspect comes in by only applying Φ to the set of triples for
those agents whose bundle changes with δ. Therefore, for instance, the class of all deals
that increase the utility of the previously poorest agent is not characterisable by a local
rationality criterion (because this condition can only be checked by inspecting the utilities
of all the agents in the system).
2.3 Socially Optimal Allocations of Resources
As already mentioned in the introduction, we may think of a multiagent system as a society
of autonomous software agents. While agents make their local decisions on what deals to
propose and to accept, we can also analyse the system from a global or societal point of
view and may thus prefer certain allocations of resources over others. To this end, welfare
economics provides formal tools to assess how the distribution of resources amongst the
members of a society affects the well-being of society as a whole (Sen, 1970; Moulin, 1988;
Arrow et al., 2002).
2. The ontology of deal types discussed here is, of course, not exhaustive. It would, for instance, also be of
interest to consider the class of bilateral deals (involving exactly two agents but any number of items).
320
Negotiating Socially Optimal Allocations of Resources
Given the preference profiles of the individual agents in a society (which, in our frame-
work, are represented by means of their utility functions), a social welfare ordering over
alternative allocations of resources formalises the notion of a society's preferences. Next we
are going to formally introduce the most important social welfare orderings considered in
this paper (some additional concepts of social welfare are discussed towards the end of the
paper). In some cases, social welfare is best defined in terms of a collective utility function.
One such example is the notion of utilitarian social welfare.
Definition 7 (Utilitarian social welfare) The utilitarian social welfare swu(A) of an
allocation of resources A is defined as follows:
swu(A) = Xi∈A
ui(A)
Observe that maximising the collective utility function swu amounts to maximising the
average utility enjoyed by the agents in the system. Asking for maximal utilitarian social
welfare is a very strong requirement. A somewhat weaker concept is that of Pareto optimal-
ity. An allocation is Pareto optimal iff there is no other allocation with higher utilitarian
social welfare that would be no worse for any of of the agents in the system (i.e. that would
be strictly better for at least one agent without being worse for any of the others).
Definition 8 (Pareto optimality) An allocation A is called Pareto optimal iff there is
no allocation A′ such that swu(A) < swu(A′) and ui(A) ≤ ui(A′) for all i ∈ A.
The first goal of an egalitarian society should be to increase the welfare of its weakest
member (Rawls, 1971; Sen, 1970). In other words, we can measure the social welfare of
such a society by measuring the welfare of the agent that is currently worst off.
Definition 9 (Egalitarian social welfare) The egalitarian social welfare swe(A) of an
allocation of resources A is defined as follows:
swe(A) = min{ui(A) i ∈ A}
The egalitarian collective utility function swe gives rise to a social welfare ordering over
alternative allocations of resources: A′ is strictly preferred over A iff swe(A) < swe(A′). This
ordering is sometimes called the maximin-ordering. The maximin-ordering only takes into
account the welfare of the currently weakest agent, but is insensitive to utility fluctuations
in the rest of society. To allow for a finer distinction of the social welfare of different
allocations we introduce the so-called leximin-ordering.
For a society with n agents, let {u1, . . . , un} be the set of utility functions for that
society. Then every allocation A determines a utility vector hu1(A), . . . , un(A)i of length n.
If we rearrange the elements of that vector in increasing order we obtain the ordered utility
vector for allocation A, which we are going to denote by ~u(A). The number ~ui(A) is the ith
element in such a vector (for 1 ≤ i ≤ A). That is, ~u1(A) for instance, is the utility value
assigned to allocation A by the currently weakest agent. We now declare a lexicographic
ordering over vectors of real numbers (such as ~u(A)) in the usual way: ~x lexicographically
precedes ~y iff ~x is a (proper) prefix of ~y or ~x and ~y share a common (proper) prefix of length
k (which may be 0) and we have ~xk+1 < ~yk+1.
321
Endriss, Maudet, Sadri, & Toni
Definition 10 (Leximin-ordering) The leximin-ordering ≺ over alternative allocations
of resources is defined as follows:
A ≺ A′
iff
~u(A) lexicographically precedes ~u(A′)
We write A (cid:22) A′ iff either A ≺ A′ or ~u(A) = ~u(A′). An allocation of resources A is called
leximin-maximal iff there is no other allocation A′ such that A ≺ A′.
Finally, we introduce the concept of Lorenz domination, a social welfare ordering that
combines utilitarian and egalitarian aspects of social welfare. The basic idea is to endorse
deals that result in an improvement with respect to utilitarian welfare without causing a
loss in egalitarian welfare, and vice versa.
Definition 11 (Lorenz domination) Let A and A′ be allocations for a society with n
agents. Then A is Lorenz dominated by A′ iff
k
Xi=1
~ui(A) ≤
k
Xi=1
~ui(A′)
for all k with 1 ≤ k ≤ n and, furthermore, that inequality is strict for at least one k.
For any k with 1 ≤ k ≤ n, the sum referred to in the above definition is the sum of the
utility values assigned to the respective allocation of resources by the k weakest agents. For
k = 1, this sum is equivalent to the egalitarian social welfare for that allocation. For k = n,
it is equivalent to the utilitarian social welfare. An allocation of resources is called Lorenz
optimal iff it is not Lorenz dominated by any other allocation.
We illustrate some of the above social welfare concepts (and the use of ordered utility
vectors) by means of an example. Consider a society with three agents and two resources,
with the agents' utility functions given by the following table:
u1({ }) = 0
u1({r1}) = 5
u1({r2}) = 3
u1({r1, r2}) = 8 u2({r1, r2}) = 17 u3({r1, r2}) = 7
u3({ }) = 0
u3({r1}) = 2
u3({r2}) = 6
u2({ }) = 0
u2({r1}) = 4
u2({r2}) = 2
First of all, we observe that the egalitarian social welfare will be 0 for any possible allocation
in this scenario, because at least one of the agents would not get any resources at all. Let
A be the allocation where agent 2 holds the full bundle of resources. Observe that this is
the allocation with maximal utilitarian social welfare. The corresponding utility vector is
h0, 17, 0i, i.e. ~u(A) = h0, 0, 17i. Furthermore, let A′ be the allocation where agent 1 gets
r1, agent 2 gets r2, and agent 3 has to be content with the empty bundle. Now we get an
ordered utility vector of h0, 2, 5i. The initial element in either vector is 0, but 0 < 2, i.e.
~u(A) lexicographically precedes ~u(A′). Hence, we get A ≺ A′, i.e. A′ would be the socially
preferred allocation with respect to the leximin-ordering. Furthermore, both A and A′ are
Pareto optimal and neither is Lorenz-dominated by the other. Starting from allocation A′,
agents 1 and 2 swapping their respective bundles would result in an allocation with the
ordered utility vector h0, 3, 4i, i.e. this move would result in a Lorenz improvement.
322
Negotiating Socially Optimal Allocations of Resources
3. Rational Negotiation with Side Payments
In this section, we are going to discuss a first instance of the general framework of resource
allocation by negotiation set out earlier. This particular variant, which we shall refer to as
the model of rational negotiation with side payments (or simply with money), is equivalent
to a framework put forward by Sandholm where agents negotiate in order to reallocate
tasks (Sandholm, 1998). For this variant of the framework, our aim will be to negotiate
allocations with maximal utilitarian social welfare.
3.1 Individual Rationality
In this instance of our negotiation framework, a deal may be accompanied by a number
of monetary side payments to compensate some of the agents involved for accepting a loss
in utility. Rather than specifying for each pair of agents how much money the former is
supposed to pay to the latter, we simply say how much money each agent either pays out
or receives. This can be modelled by using what we call a payment function.
Definition 12 (Payment functions) A payment function is a function p from A to real
numbers satisfying the following condition:
p(i) = 0
Xi∈A
Here, p(i) > 0 means that agent i pays the amount of p(i), while p(i) < 0 means that it
receives the amount of −p(i). By definition of a payment function, the sum of all payments
is 0, i.e. the overall amount of money present in the system does not change.3
In the rational negotiation model, agents are self-interested in the sense of only propos-
ing or accepting deals that strictly increase their own welfare (for a justification of this
approach we refer to Sandholm, 1998). This "myopic" notion of individual rationality may
be formalised as follows.
Definition 13 (Individual rationality) A deal δ = (A, A′) is called individually rational
iff there exists a payment function p such that ui(A′) − ui(A) > p(i) for all i ∈ A, except
possibly p(i) = 0 for agents i with A(i) = A′(i).
That is, agent i will be prepared to accept the deal δ iff it has to pay less than its gain in
utility or it will get paid more than its loss in utility, respectively. Only for agents i not
affected by the deal, i.e. in case A(i) = A′(i), there may be no payment at all. For example,
if ui(A) = 8 and ui(A′) = 5, then the utility of agent i would be reduced by 3 units if it were
to accept the deal δ = (A, A′). Agent i will only agree to this deal if it is accompanied by
a side payment of more than 3 units; that is, if the payment function p satisfies −3 > p(i).
For any given deal, there will usually be a range of possible side payments. How agents
manage to agree on a particular one is not a matter of consideration at the abstract level
at which we are discussing this framework here. We assume that a deal will go ahead
as long as there exists some suitable payment function p. We should point out that this
3. As the overall amount of money present in the system stays constant throughout the negotiation process,
it makes sense not to take it into account for the evaluation of social welfare.
323
Endriss, Maudet, Sadri, & Toni
assumption may not be justified under all circumstances. For instance, if utility functions
are not publicly known and agents are risk-takers, then a potential deal may not be identified
as such, because some of the agents may understate their interest in that deal in order to
maximise their expected payoff (Myerson & Satterthwaite, 1983). Therefore, the theoretical
results on the reachability of socially optimal allocations reported below will only apply
under the assumption that such strategic considerations will not prevent agents from making
mutually beneficial deals.
3.2 An Example
As an example, consider a system with two agents, agent 1 and agent 2, and a set of two
resources R = {r1, r2}. The following table specifies the values of the utility functions u1
and u2 for every subset of {r1, r2}:
u1({ }) = 0
u1({r1}) = 2
u1({r2}) = 3
u1({r1, r2}) = 7 u2({r1, r2}) = 8
u2({ }) = 0
u2({r1}) = 3
u2({r2}) = 3
Also suppose agent 1 initially holds the full set of resources {r1, r2} and agent 2 does not
own any resources to begin with.
The utilitarian social welfare for this initial allocation is 7, but it could be 8, namely if
agent 2 had both resources. As we are going to see next, the simple class of 1-deals alone are
not always sufficient to guarantee the optimal outcome of a negotiation process (if agents
abide to the individual rationality criterion for the acceptability of a deal). In our example,
the only possible 1-deals would be to pass either r1 or r2 from agent 1 to agent 2. In either
case, the loss in utility incurred by agent 1 (5 or 4, respectively) would outweigh the gain
of agent 2 (3 for either deal), so there is no payment function that would make these deals
individually rational. The cluster deal of passing {r1, r2} from agent 1 to 2, on the other
hand, would be individually rational if agent 2 paid agent 1 an amount of, say, 7.5 units.
Similarly to the example above, we can also construct scenarios where swap deals or
multiagent deals are necessary (i.e. where cluster deals alone would not be sufficient to
guarantee maximal social welfare). This also follows from Theorem 2, which we are going
to present later on in this section. Several concrete examples are given by Sandholm (1998).
3.3 Linking Individual Rationality and Social Welfare
The following result, first stated in this form by Endriss et al. (2003a), says that a deal (with
money) is individually rational iff it increases utilitarian social welfare. We are mainly going
to use this lemma to give a simple proof of Sandholm's main result on sufficient contract
types (Sandholm, 1998), but it has also found useful applications in its own right (Dunne
et al., 2005; Dunne, 2005; Endriss & Maudet, 2005).
Lemma 1 (Individually rational deals and utilitarian social welfare) A deal δ =
(A, A′) is individually rational iff swu(A) < swu(A′).
324
Negotiating Socially Optimal Allocations of Resources
'⇒': By definition, δ = (A, A′) is individually rational iff there exists a payment
Proof.
function p such that ui(A′) − ui(A) > p(i) holds for all i ∈ A, except possibly p(i) = 0 in
case A(i) = A′(i). If we add up the inequations for all agents i ∈ A we get:
Xi∈A
(ui(A′) − ui(A)) > Xi∈A
p(i)
By definition of a payment function, the righthand side equates to 0 while, by definition of
utilitarian social welfare, the lefthand side equals swu(A′) − swu(A). Hence, we really get
swu(A) < swu(A′) as claimed.
'⇐': Now let swu(A) < swu(A′). We have to show that δ = (A, A′) is an individually
rational deal. We are done if we can prove that there exists a payment function p such that
ui(A′) − ui(A) > p(i) for all i ∈ A. We define the function p : A → R as follows:
p(i) = ui(A′) − ui(A) −
swu(A′) − swu(A)
A
(for i ∈ A)
First, observe that p really is a payment function, because we get Pi∈A p(i) = 0. We also
get ui(A′) − ui(A) > p(i) for all i ∈ A, because we have swu(A′) − swu(A′) > 0. Hence, δ
must indeed be an individually rational deal.
✷
Lemma 1 suggests that the function swu does indeed provide an appropriate measure of
social well-being in societies of agents that use the notion of individual rationality (as given
by Definition 13) to guide their behaviour during negotiation. It also shows that individual
rationality is indeed a local rationality criterion in the sense of Definition 6.
3.4 Maximising Utilitarian Social Welfare
Our next aim is to show that any sequence of deals in the rational negotiation model
with side payments will converge to an allocation with maximal utilitarian social welfare;
that is, the class of individually rational deals (as given by Definition 13) is sufficient to
guarantee optimal outcomes for agent societies measuring welfare according to the utilitarian
programme (Definition 7). This has originally been shown by Sandholm (1998) in the
context of a framework where rational agents negotiate in order to reallocate tasks and
where the global aim is to minimise the overall costs of carrying out these tasks.
Theorem 1 (Maximal utilitarian social welfare) Any sequence of individually ratio-
nal deals will eventually result in an allocation with maximal utilitarian social welfare.
Proof. Given that both the set of agents A as well as the set of resources R are required
to be finite, there can be only a finite number of distinct allocations of resources. Further-
more, by Lemma 1, any individually rational deal will strictly increase utilitarian social
welfare. Hence, negotiation must terminate after a finite number of deals. For the sake
of contradiction, assume that the terminal allocation A does not have maximal utilitarian
social welfare, i.e. there exists another allocation A′ with swu(A) < swu(A′). But then, by
Lemma 1, the deal δ = (A, A′) would be individually rational and thereby possible, which
contradicts our earlier assumption of A being a terminal allocation.
✷
325
Endriss, Maudet, Sadri, & Toni
At first sight, this result may seem almost trivial. The notion of a multilateral deal without
any structural restrictions is a very powerful one. A single such deal allows for any number
of resources to be moved between any number of agents. From this point of view, it is not
particularly surprising that we can always reach an optimal allocation (even in just a single
step!). Furthermore, finding a suitable deal is a very complex task, which may not always
be viable in practice. The crucial point of Theorem 1 is that any sequence of deals will
result in an optimal allocation. That is, whatever deals are agreed on in the early stages of
negotiation, the system will never get stuck in a local optimum and finding an allocation
with maximal social welfare remains an option throughout (provided, of course, that agents
are actually able to identify any deal that is theoretically possible). Given the restriction to
deals that are individually rational for all the agents involved, social welfare must increase
with every single deal. Therefore, negotiation always pays off, even if it has to stop early
due to computational limitations.
The issue of complexity is still an important one. If the full range of deals is too large
to be managed in practice, it is important to investigate how close we can get to finding
an optimal allocation if we restrict the set of allowed deals to certain simple patterns.
Andersson and Sandholm (2000), for instance, have conducted a number of experiments on
the sequencing of certain contract/deal types to reach the best possible allocations within
a limited amount of time. For a complexity-theoretic analysis of the problem of deciding
whether it is possible to reach an optimal allocation by means of structurally simple types
of deals (in particular 1-deals), we refer to recent work by Dunne et al. (2005).
3.5 Necessary Deals
The next theorem improves upon Sandholm's main result regarding necessary contract
types (Sandholm, 1998), by extending it to the cases where either all utility functions are
monotonic or all utility functions are dichotomous.4 Sandholm's original result, translated
into our terminology, states that for any system (consisting of a set of agents A and a
set of resources R) and any (not independently decomposable) deal δ for that system, it
is possible to construct utility functions and choose an initial allocation of resources such
that δ is necessary to reach an optimal allocation, if agents only agree to individually
rational deals. All other findings on the insufficiency of certain types of contracts reported
by Sandholm (1998) may be considered corollaries to this. For instance, the fact that,
say, cluster deals alone are not sufficient to guarantee optimal outcomes follows from this
theorem if we take δ to be any particular swap deal for the system in question.
Theorem 2 (Necessary deals with side payments) Let the sets of agents and re-
sources be fixed. Then for every deal δ that is not independently decomposable, there exist
utility functions and an initial allocation such that any sequence of individually rational
deals leading to an allocation with maximal utilitarian social welfare must include δ. This
continues to be the case even when either all utility functions are required to be monotonic
or all utility functions are required to be dichotomous.
4. In fact, our theorem not only sharpens but also also corrects a mistake in previous expositions of this
result (Sandholm, 1998; Endriss et al., 2003a), where the restriction to deals that are not independently
decomposable had been omitted.
326
Negotiating Socially Optimal Allocations of Resources
Proof. Given a set of agents A and a set of resources R, let δ = (A, A′) with A 6= A′ be
any deal for this system. We need to show that there are a collection of utility functions
and an initial allocation such that δ is necessary to reach an allocation with maximal social
welfare. This would be the case if A′ had maximal social welfare, A had the second highest
social welfare, and A were the initial allocation of resources.
We first prove the existence of such a collection of functions for the case where all utility
functions are required to be monotonic. Fix ǫ such that 0 < ǫ < 1. As we have A 6= A′,
there must be an agent j ∈ A such that A(j) 6= A′(j). We now define utility functions ui
for agents i ∈ A and sets of resources R ⊆ R as follows:
ui(R) = (cid:26) R + ǫ
R
if R = A′(i) or (R = A(i) and i 6= j)
otherwise
Observe that ui is a monotonic utility function for every i ∈ A. We get swu(A′) = R+ǫ·A
and swu(A) = swu(A′) − ǫ. Because δ = (A, A′) is not individually decomposable, there
exists no allocation B different from both A and A′ such that either B(i) = A(i) or B(i) =
A′(i) for all agents i ∈ A. Hence, swu(B) ≤ swu(A) for any other allocation B. That
is, A′ is the (unique) allocation with maximal social welfare and the only allocation with
higher social welfare than A. Therefore, if we were to make A the initial allocation then
δ = (A, A′) would be the only deal increasing social welfare. By Lemma 1, this means that
δ would be the only individually rational (and thereby the only possible) deal. Hence, δ is
indeed necessary to achieve maximal utilitarian social welfare.
The proof for the case of dichotomous utility functions is very similar; we only need to
show that a suitable collection of dichotomous utility functions can be constructed. Again,
let j be an agent with A(j) 6= A′(j). We can use the following collection of functions:
ui(R) = (cid:26) 1 if R = A′(i) or (R = A(i) and i 6= j)
0 otherwise
We get swu(A′) = A, swu(A) = swu(A′)−1 and swu(B) ≤ swu(A) for all other allocations
B. Hence, A is not socially optimal and, with A as the initial allocation, δ would be the
only deal that is individually rational.
✷
We should stress that the set of deals that are not independently decomposable includes
deals involving any number of agents and/or any number of resources. Hence, by Theorem 2,
any negotiation protocol that puts restrictions on the structural complexity of deals that
may be proposed will fail to guarantee optimal outcomes, even when there are no constraints
on either time or computational resources. This emphasises the high complexity of our
negotiation framework (see also Dunne et al., 2005; Chevaleyre et al., 2004; Endriss &
Maudet, 2005; Dunne, 2005). The fact that the necessity of (almost) the full range of deals
persists, even when all utility functions are subject to certain restrictions makes this result
even more striking. This is true in particular for the case of dichotomous functions, which
are in some sense the simplest class of utility functions (as they can only distinguish between
"good" and "bad" bundles).
To see that the restriction to deals that are not independently decomposable matters,
consider a scenario with four agents and two resources. If the deal δ of moving r1 from
agent 1 to agent 2, and r2 from agent 3 to agent 4 is individually rational, then so will be
327
Endriss, Maudet, Sadri, & Toni
either one of the two "subdeals" of moving either r1 from agent 1 to agent 2 or r2 from
agent 3 to agent 4. Hence, the deal δ (which is independently decomposable) cannot be
necessary in the sense of Theorem 2 (with reference to our proof above, in the case of δ
there are allocations B such that either B(i) = A(i) or B(i) = A′(i) for all agents i ∈ A,
i.e. we could get swu(B) = swu(A′)).
3.6 Additive Scenarios
Theorem 2 is a negative result, because it shows that deals of any complexity may be
required to guarantee optimal outcomes of negotiation. This is partly a consequence of the
high degree of generality of our framework. In Section 2.1, we have defined utility functions
as arbitrary functions from sets of resources to real numbers. For many application domains
this may be unnecessarily general or even inappropriate and we may be able to obtain
stronger results for specific classes of utility functions that are subject to certain restrictions.
Of course, we have already seen that this is not the case for either monotonicity (possibly
the most natural restriction) or dichotomy (possibly the most severe restriction).
Here, we are going to consider the case of additive utility functions, which are appro-
priate for domains where combining resources does not result in any synergy effects (in the
sense of increasing an agent's welfare). We refer to systems where all agents have additive
utility functions as additive scenarios. The following theorem shows that for these additive
scenarios 1-deals are sufficient to guarantee outcomes with maximal social welfare.5
Theorem 3 (Additive scenarios) In additive scenarios, any sequence of individually ra-
tional 1-deals will eventually result in an allocation with maximal utilitarian social welfare.
Proof. Termination is shown as for Theorem 1. We are going to show that, whenever the
current allocation does not have maximal social welfare, then there is still a possible 1-deal
that is individually rational.
In additive domains, the utilitarian social welfare of a given allocation may be computed
by adding up the appropriate utility values for all the single resources in R. For any
allocation A, let fA be the function mapping each resource r ∈ R to the agent i ∈ A that
holds r in situation A (that is, we have fA(r) = i iff r ∈ A(i)). The utilitarian social welfare
for allocation A is then given by the following formula:
swu(A) = Xr∈R
ufA(r)({r})
Now suppose that negotiation has terminated with allocation A and there are no more
individually rational 1-deals possible. Furthermore, for the sake of contradiction, assume
that A is not an allocation with maximal social welfare, i.e. there exists another allocation
A′ with swu(A) < swu(A′). But then, by the above characterisation of social welfare for
additive scenarios, there must be at least one resource r ∈ R such that ufA(r)({r}) <
ufA′ (r)({r}). That is, the 1-deal δ of passing r from agent fA(r) on to agent fA′(r) would
increase social welfare. Therefore, by Lemma 1, δ must be an individually rational deal,
i.e. contrary to our earlier assumption, A cannot be a terminal allocation. Hence, A must
be an allocation with maximal utilitarian social welfare.
✷
5. This has also been observed by T. Sandholm (personal communication, September 2002).
328
Negotiating Socially Optimal Allocations of Resources
We conclude this section by briefly mentioning two recent results that both extend, in
different ways, the result stated in Theorem 3 (a detailed discussion, however, would be
beyond the scope of the present paper). The first of these results shows that rational
deals involving at most k resources each are sufficient for convergence to an allocation
with maximal social welfare whenever all utility functions are additively separable with
respect to a common partition of R -- i.e. synergies across different parts of the partition
are not possible and overall utility is defined as the sum of utilities for the different sets
in the partition (Fishburn, 1970) -- and each set in this partition has at most k elements
(Chevaleyre et al., 2005a).
The second result concerns a maximality property of utility functions with respect to
1-deals. Chevaleyre et al. (2005b) show that the class of modular utility functions, which is
only slightly more general than the class of additive functions considered here (namely, it is
possible to assign a non-zero utility to the empty bundle), is maximal in the sense that for no
class of functions strictly including the class of modular functions it would still be possible
to guarantee that agents using utility functions from that larger class and negotiating only
individually rational 1-deals will eventually reach an allocation with maximal utilitarian
social welfare in all cases.
4. Rational Negotiation without Side Payments
An implicit assumption made in the framework that we have presented so far is that every
agent has got an unlimited amount of money available to it to be able to pay other agents
whenever this is required for a deal that would increase utilitarian social welfare. Concretely,
if A is the initial allocation and A′ is the allocation with maximal utilitarian social welfare,
then agent i may require an amount of money just below the difference ui(A′) − ui(A) to be
able to get through the negotiation process. In the context of task contracting, for which
this framework has been proposed originally (Sandholm, 1998), this may be justifiable,
but for resource allocation problems it seems questionable to make assumptions about the
unlimited availability of one particular resource, namely money. In this section, we therefore
investigate to what extent the theoretical results discussed in the previous section persist
to apply when we consider negotiation processes without monetary side payments.
4.1 An Example
In a scenario without money, that is, if we do not allow for compensatory payments, we
cannot always guarantee an outcome with maximal utilitarian social welfare. To see this,
consider the following simple problem for a system with two agents, agent 1 and agent 2,
and a single resource r. The agents' utility functions are defined as follows:
u1({ }) = 0
u2({ }) = 0
u1({r}) = 4 u2({r}) = 7
Now suppose agent 1 initially owns the resource. Then passing r from agent 1 to agent 2
would increase utilitarian social welfare by an amount of 3. For the framework with money,
agent 2 could pay agent 1, say, the amount of 5.5 units and the deal would be individually
rational for both of them. Without money (i.e. if p ≡ 0), however, no individually rational
deal is possible and negotiation must terminate with a non-optimal allocation.
329
Endriss, Maudet, Sadri, & Toni
As maximising social welfare is not generally possible, instead we are going to investigate
whether a Pareto optimal outcome (see Definition 8) is possible in the framework without
money, and what types of deals are sufficient to guarantee this.
4.2 Cooperative Rationality
As will become clear in due course, in order to get the desired convergence result, we need
to relax the notion of individual rationality a little. For the framework without money, we
also want agents to agree to a deal, if this at least maintains their utility (that is, no strict
increase is necessary). However, we are still going to require at least one agent to strictly
increase their utility. This could, for instance, be the agent proposing the deal in question.
We call deals conforming to this criterion cooperatively rational.6
Definition 14 (Cooperative rationality) A deal δ = (A, A′) is called cooperatively ra-
tional iff ui(A) ≤ ui(A′) for all i ∈ A and there is an agent j ∈ A such that uj(A) < uj(A′).
In analogy to Lemma 1, we still have swu(A) < swu(A′) for any deal δ = (A, A′) that is
cooperatively rational, but not vice versa. We call the instance of our negotiation framework
where all deals are cooperatively rational (and hence do not include a monetary component)
the model of rational negotiation without side payments.
4.3 Ensuring Pareto Optimal Outcomes
As the next theorem will show, the class of cooperatively rational deals is sufficient to
guarantee a Pareto optimal outcome of money-free negotiation. It constitutes the analogue
to Theorem 1 for the model of rational negotiation without side payments.
Theorem 4 (Pareto optimal outcomes) Any sequence of cooperatively rational deals
will eventually result in a Pareto optimal allocation of resources.
Proof. Every cooperatively rational deal strictly increases utilitarian social welfare (this is
where we need the condition that at least one agent behaves truly individually rational for
each deal). Together with the fact that there are only finitely many different allocations
of resources, this implies that any negotiation process will eventually terminate. For the
sake of contradiction, assume negotiation ends with allocation A, but A is not Pareto
optimal. The latter means that there exists another allocation A′ with swu(A) < swu(A′)
and ui(A) ≤ ui(A′) for all i ∈ A.
If we had ui(A) = ui(A′) for all i ∈ A, then also
swu(A) = swu(A′); that is, there must be at least one j ∈ A with uj(A) < uj(A′). But then
the deal δ = (A, A′) would be cooperatively rational, which contradicts our assumption of
A being a terminal allocation.
✷
Observe that the proof would not have gone through if deals were required to be strictly
rational (without side payments), as this would necessitate ui(A) < ui(A′) for all i ∈ A.
Cooperative rationality means, for instance, that agents would be prepared to give away
resources to which they assign a utility value of 0, without expecting anything in return. In
6. Note that "cooperatively rational" agents are still essentially rational. Their willingness to cooperate
only extends to cases where they can benefit others without any loss in utility for themselves.
330
Negotiating Socially Optimal Allocations of Resources
the framework with money, another agent could always offer such an agent an infinitesimally
small amount of money, who would then accept the deal.
Therefore, our proposed weakened notion of rationality seems indeed a very reasonable
price to pay for giving up money.
4.4 Necessity Result
As our next result shows, also for the framework without side payments, deals of any
structural complexity may be necessary in order to be able to guarantee an optimal outcome
of a negotiation.7 Theorem 5 improves upon previous results (Endriss et al., 2003a) by
showing that this necessity property persists also when either all utility functions belong to
the class of monotonic functions or all utility functions belong to the class of dichotomous
functions.
Theorem 5 (Necessary deals without side payments) Let the sets of agents and re-
sources be fixed. Then for every deal δ that is not independently decomposable, there exist
utility functions and an initial allocation such that any sequence of cooperatively rational
deals leading to a Pareto optimal allocation would have to include δ. This continues to be
the case even when either all utility functions are required to be monotonic or all utility
functions are required to be dichotomous.
Proof. The details of this proof are omitted as it is possible to simply reuse the construction
used in the proof of Theorem 2. Observe that the utility functions defined there also
guarantee ui(A) ≤ ui(A′) for all i ∈ A, i.e. A is not Pareto optimal, but A′ is. If we were
to make A the initial allocation, then δ = (A, A′) would be the only cooperatively rational
deal (as every other deal would decrease social welfare).
✷
4.5 0-1 Scenarios
We conclude our study of the rational negotiation framework without side payments by
identifying a class of utility functions where we are able to achieve a reduction in structural
complexity.8 Consider a scenario where agents use additive utility functions that assign
either 0 or 1 to every single resource (this is what we call 0-1 functions).9 This may be
appropriate when we simply wish to distinguish whether or not the agent needs a particular
resource (to execute a given plan, for example). This is, for instance, the case for some of
the agents defined in the work of Sadri, Toni, and Torroni (2001). As the following theorem
shows, for 0-1 scenarios (i.e. for systems where all utility functions are 0-1 functions),
7. This theorem corrects a mistake in the original statement of the result (Endriss et al., 2003a), where the
restriction to deals that are not independently decomposable had been omitted.
8. As dichotomous functions are a special case of the non-negative functions, the full range of (not indepen-
dently decomposable) deals is also necessary in scenarios with non-negative functions. Interestingly, this
changes when we restrict ourselves to positive utility functions. Now the result of Theorem 5 would not
hold anymore, because any deal that would involve a particular agent (with a positive utility function)
giving away all its resources without receiving anything in return could never be cooperatively rational.
Hence, by Theorem 4, such a deal could never be necessary to achieve a Pareto optimal allocation either.
9. Recall the distinction between 0-1 functions and dichotomous functions. The latter assign either 0 or 1
to each bundle, while the former assign either 0 or 1 to each individual resource (the utilities of bundles
then follow from the fact that 0-1 functions are additive).
331
Endriss, Maudet, Sadri, & Toni
1-deals are sufficient to guarantee convergence to an allocation with maximal utilitarian
social welfare, even in the framework without monetary side payments (where all deals are
required to be cooperatively rational).
Theorem 6 (0-1 scenarios) In 0-1 scenarios, any sequence of cooperatively rational 1-
deals will eventually result in an allocation with maximal utilitarian social welfare.
Proof. Termination is shown as in the proof of Theorem 4. If an allocation A does not have
maximal social welfare then it must be the case that some agent i holds a resource r with
ui({r}) = 0 and there is another agent j in the system with uj({r}) = 1. Passing r from i
to j would be a cooperatively rational deal, so either negotiation has not yet terminated or
we are indeed in a situation with maximal utilitarian social welfare.
✷
This result may be interpreted as a formal justification for some of the negotiation strategies
proposed by Sadri et al. (2001).
5. Egalitarian Agent Societies
In this section, we are going to apply the same methodology that we have used to study
optimal outcomes of negotiation in systems designed according to utilitarian principles in
the first part of this paper to the analysis of egalitarian agent societies. The classical
counterpart to the utilitarian collective utility function swu is the egalitarian collective
utility function swe introduced in Definition 9 (Moulin, 1988; Sen, 1970; Rawls, 1971).
Therefore, we are going to study the design of agent societies for which negotiation can be
guaranteed to converge to an allocation of resources with maximal egalitarian social welfare.
Our first aim will be to identify a suitable criterion that agents inhabiting an egalitarian
agent society may use to decide whether or not to accept a particular deal. Clearly, coop-
eratively rational deals, for instance, would not be an ideal choice, because Pareto optimal
allocations will typically not be optimal from an egalitarian point of view (Moulin, 1988).
5.1 Pigou-Dalton Transfers and Equitable Deals
When searching the economics literature for a class of deals that would benefit society
in an egalitarian system we soon encounter Pigou-Dalton transfers. The Pigou-Dalton
principle states that whenever a utility transfer between two agents takes place which
reduces the difference in utility between the two, then that transfer should be considered
socially beneficial (Moulin, 1988). In the context of our framework, a Pigou-Dalton transfer
(between agents i and j) can be defined as follows.
Definition 15 (Pigou-Dalton transfers) A deal δ = (A, A′) is called a Pigou-Dalton
transfer iff it satisfies the following criteria:
• Only two agents i and j are involved in the deal: Aδ = {i, j}.
• The deal is mean-preserving: ui(A) + uj(A) = ui(A′) + uj(A′).
• The deal reduces inequality: ui(A′) − uj(A′) < ui(A) − uj(A).
332
Negotiating Socially Optimal Allocations of Resources
The second condition in this definition could be relaxed to postulate ui(A) + uj(A) ≤
ui(A′) + uj(A′), to also allow for inequality-reducing deals that increase overall utility.
Pigou-Dalton transfers capture certain egalitarian principles; but are they sufficient as
acceptability criteria to guarantee negotiation outcomes with maximal egalitarian social
welfare? Consider the following example:
u1({ }) = 0
u1({r1}) = 3
u1({r2}) = 12
u1({r1, r2}) = 15 u2({r1, r2}) = 17
u2({ }) = 0
u2({r1}) = 5
u2({r2}) = 7
The first agent attributes a relatively low utility value to r1 and a high one to r2. Further-
more, the value of both resources together is simply the sum of the individual utilities, i.e.
agent 1 is using an additive utility function (no synergy effects). The second agent ascribes
a medium value to either resource and a very high value to the full set. Now suppose the
initial allocation of resources is A with A(1) = {r1} and A(2) = {r2}. The "inequality
index" for this allocation is u1(A) − u2(A) = 4. We can easily check that inequality is in
fact minimal for allocation A (which means that there can be no inequality-reducing deal,
and certainly no Pigou-Dalton transfer, given this allocation). However, allocation A′ with
A′(1) = {r2} and A′(2) = {r1} would result in a higher level of egalitarian social welfare
(namely 5 instead of 3). Hence, Pigou-Dalton transfers alone are not sufficient to guarantee
optimal outcomes of negotiations in egalitarian agent societies. We need a more general
acceptability criterion.
Intuitively, agents operating according to egalitarian principles should help any of their
fellow agents that are worse off than they are themselves (as long as they can afford to do
so without themselves ending up even worse). This means, the purpose of any exchange of
resources should be to improve the welfare of the weakest agent involved in the respective
deal. We formalise this idea by introducing the class of equitable deals.
Definition 16 (Equitable deals) A deal δ = (A, A′) is called equitable iff it satisfies the
following criterion:
min{ui(A) i ∈ Aδ} < min{ui(A′) i ∈ Aδ}
Recall that Aδ = {i ∈ A A(i) 6= A′(i)} denotes the set of agents involved in the deal δ.
Given that for δ = (A, A′) to be a deal we require A 6= A′, Aδ can never be the empty set
(i.e. the minima referred to in above definition are well-defined). Note that equitability is
a local rationality criterion in the sense of Definition 6.
It is easy to see that any Pigou-Dalton transfer will also be an equitable deal, because
it will always result in an improvement for the weaker one of the two agents concerned.
The converse, however, does not hold (not even if we restrict ourselves to deals involving
only two agents). In fact, equitable deals may even increase the inequality of the agents
concerned, namely in cases where the happier agent gains more utility than the weaker does.
In the literature on multiagent systems, the autonomy of an agent (one of the central
features distinguishing multiagent systems from other distributed systems) is sometimes
equated with pure selfishness. Under such an interpretation of the agent paradigm, our
333
Endriss, Maudet, Sadri, & Toni
notion of equitability would, of course, make little sense. We believe, however, that it is
useful to distinguish different degrees of autonomy. An agent may well be autonomous in
its decision in general, but still be required to follow certain rules imposed by society (and
agreed to by the agent on entering that society).
5.2 Local Actions and their Global Effects
We are now going to prove two lemmas that provide the connection between the local
acceptability criterion given by the notion of equitability and the two egalitarian social
welfare orderings introduced in Section 2.3 (i.e. the maximin-ordering induced by swe as
well as the leximin-ordering).
The first lemma shows how global changes are reflected locally. If a deal happens to
increase (global) egalitarian social welfare, that is, if it results in a rise with respect to the
maximin-ordering, then that deal will in fact be an equitable deal.
Lemma 2 (Maximin-rise implies equitability) If A and A′ are allocations with
swe(A) < swe(A′), then δ = (A, A′) is an equitable deal.
Proof. Let A and A′ be allocations with swe(A) < swe(A′) and let δ = (A, A′). Any
agent with minimal utility for allocation A must be involved in δ, because egalitarian social
welfare, and thereby these agents' individual utility, is higher for allocation A′. That is,
we have min{ui(A) i ∈ Aδ} = swe(A). Furthermore, because Aδ ⊆ A, we certainly have
swe(A′) ≤ min{ui(A′) i ∈ Aδ}. Given our original assumption of swe(A) < swe(A′), we
now obtain the inequation min{ui(A) i ∈ Aδ} < min{ui(A′) i ∈ Aδ}. This shows that δ
will indeed be an equitable deal.
✷
Observe that the converse does not hold; not every equitable deal will necessarily increase
egalitarian social welfare (although an equitable deal will never decrease egalitarian social
welfare either). This is, for instance, not the case if only agents who are currently better off
are involved in a deal. In fact, as argued already at the end of Section 2.2, there can be no
class of deals characterisable by a local rationality criterion (see Definition 6) that would
always result in an increase in egalitarian social welfare.
To be able to detect changes in welfare resulting from an equitable deal we require
the finer differentiation between alternative allocations of resources given by the leximin-
ordering. In fact, as we shall see next, any equitable deal can be shown to result in a strict
improvement with respect to the leximin-ordering.
Lemma 3 (Equitability implies leximin-rise) If δ = (A, A′) is an equitable deal, then
A ≺ A′.
Proof. Let δ = (A, A′) be a deal that satisfies the equitability criterion and define α =
min{ui(A) i ∈ Aδ}. The value α may be considered as partitioning the ordered utility
vector ~u(A) into three subvectors: Firstly, ~u(A) has got a (possibly empty) prefix ~u(A)<α
where all elements are strictly lower than α. In the middle, it has got a subvector ~u(A)=α
(with at least one element) where all elements are equal to α. Finally, ~u(A) has got a suffix
~u(A)>α (which again may be empty) where all elements are strictly greater than α.
334
Negotiating Socially Optimal Allocations of Resources
By definition of α, the deal δ cannot affect agents whose utility values belong to ~u(A)<α.
Furthermore, by definition of equitability, we have α < min{ui(A′) i ∈ Aδ}, which means
that all of the agents that are involved will end up with a utility value which is strictly
greater than α, and at least one of these agents will come from ~u(A)=α. We now collect the
information we have on ~u(A′), the ordered utility vector of the second allocation A′. Firstly,
it will have a prefix ~u(A′)<α identical to ~u(A)<α. This will be followed by a (possibly empty)
subvector ~u(A′)=α where all elements are equal to α and which must be strictly shorter than
~u(A)=α. All of the remaining elements of ~u(A′) will be strictly greater than α. It follows
that ~u(A) lexicographically precedes ~u(A′), i.e. A ≺ A′ holds as claimed.
✷
Again, the converse does not hold, i.e. not every deal resulting in a leximin-rise is necessarily
equitable. Counterexamples are deals where the utility value of the weakest agent involved
stays constant, despite there being an improvement with respect to the leximin-ordering at
the level of society.
A well-known result in welfare economics states that every Pigou-Dalton utility transfer
results in a leximin-rise (Moulin, 1988). Given that we have observed earlier that every deal
that amounts to a Pigou-Dalton transfer will also be an equitable deal, this result can now
also be regarded as a simple corollary to Lemma 3.
5.3 Maximising Egalitarian Social Welfare
Our next aim is to prove a convergence result for the egalitarian framework (in analogy to
Theorems 1 and 4). We are going to show that systems where agents negotiate equitable
deals always converge towards an allocation with maximal egalitarian social welfare.
Theorem 7 (Maximal egalitarian social welfare) Any sequence of equitable deals will
eventually result in an allocation of resources with maximal egalitarian social welfare.
Proof. By Lemma 3, any equitable deal will result in a strict rise with respect to the leximin-
ordering ≺ (which is both irreflexive and transitive). Hence, as there are only a finite number
of distinct allocations, negotiation will have to terminate after a finite number of deals. So
suppose negotiation has terminated and no more equitable deals are possible. Let A be the
corresponding terminal allocation of resources. The claim is that A will be an allocation
with maximal egalitarian social welfare. For the sake of contradiction, assume it is not, i.e.
assume there exists another allocation A′ for the same system such that swe(A) < swe(A′).
But then, by Lemma 2, the deal δ = (A, A′) will be an equitable deal. Hence, there is still
a possible deal, namely δ, which contradicts our earlier assumption of A being a terminal
allocation. This shows that A will be an allocation with maximal egalitarian social welfare,
which proves our claim.
✷
From a purely practical point of view, Theorem 7 may be of a lesser interest than the
corresponding results for utilitarian systems, because it does not refer to an acceptability
criterion that only depends on a single agent. Of course, this coincides with our intu-
itions about egalitarian societies: maximising social welfare is only possible by means of
cooperation and the sharing of information on agents' preferences.
After having reached the allocation with maximal egalitarian social welfare, it may be
the case that still some equitable deals are possible, although they would not increase social
335
Endriss, Maudet, Sadri, & Toni
welfare any further (but they would still cause a leximin-rise). This can be demonstrated
by means of a simple example. Consider a system with three agents and two resources. The
following table fixes the utility functions:
u1({ }) = 0
u1({r1}) = 5
u1({r2}) = 0
u1({r1, r2}) = 5 u2({r1, r2}) = 7.5 u3({r1, r2}) = 9.5
u3({ }) = 8
u3({r1}) = 9
u3({r2}) = 8.5
u2({ }) = 6
u2({r1}) = 7
u2({r2}) = 6.5
A possible interpretation of these functions would be the following. Agent 3 is fairly well off
in any case; obtaining either of the resources r1 and r2 will not have a great impact on its
personal welfare. The same is true for agent 2, although it is slightly less well off to begin
with. Agent 1 is the poorest agent and attaches great value to r1, but has no interest in
r2. Suppose agent 3 initially holds both resources. This corresponds to the ordered utility
vector h0, 6, 9.5i. Passing r1 to agent 1 would lead to a new allocation with the ordered
utility vector h5, 6, 8.5i and increase egalitarian social welfare to 5, which is the maximum
that is achievable in this system. However, there is still another equitable deal that could
be implemented from this latter allocation: agent 3 could offer r2 to agent 2. Of course, this
deal does not affect agent 1. The resulting allocation would then have the ordered utility
vector h5, 6.5, 8i, which corresponds to the leximin-maximal allocation.
To be able to detect situations where a social welfare maximum has already been reached
but some equitable deals are still possible, and to be able to stop negotiation (assuming we
are only interested in maximising swe as quickly as possible), however, we would require a
non-local rationality criterion. No criterion that only takes the welfare of agents involved
in a particular deal into account could be sharp enough to always tell us whether a given
deal would increase the minimum utility in society (see also our discussion after Lemma 2).
We could define a class of strongly equitable deals that are like equitable deals but on top
of that require the (currently) weakest agent to be involved in the deal. This would be
a sharper criterion, but it would also be against the spirit of distributivity and locality,
because every single agent would be involved in every single deal (in the sense of everyone
having to announce their utility in order to be able to determine who is the weakest).
5.4 Necessity Result
As our next theorem will show, if we restrict the set of admissible deals to those that
are equitable, then every single deal δ (that is not independently decomposable) may be
necessary to guarantee an optimal result (that is, no sequence of equitable deals excluding δ
could possibly result in an allocation with maximal egalitarian social welfare). Furthermore,
our theorem improves upon a previous result (Endriss et al., 2003b) by showing that this
holds even when all utility functions are required to be dichotomous.10
Theorem 8 (Necessary deals in egalitarian systems) Let the sets of agents and re-
sources be fixed. Then for every deal δ that is not independently decomposable, there exist
10. This theorem also corrects a mistake in the original statement of the result (Endriss et al., 2003b), where
the restriction to deals that are not independently decomposable had been omitted.
336
Negotiating Socially Optimal Allocations of Resources
utility functions and an initial allocation such that any sequence of equitable deals lead-
ing to an allocation with maximal egalitarian social welfare would have to include δ. This
continues to be the case even when all utility functions are required to be dichotomous.
Proof. Given a set of agents A and a set of resources R, let δ = (A, A′) be any deal for this
system. As we have A 6= A′, there will be a (at least one) agent j ∈ A with A(j) 6= A′(j).
We use this particular j to fix suitable (dichotomous) utility functions ui for agents i ∈ A
and sets of resources R ⊆ R as follows:
ui(R) = (cid:26) 1 if R = A′(i) or (R = A(i) and i 6= j)
0 otherwise
That is, for allocation A′ every agent assigns a utility value of 1 to the resources it holds.
The same is true for allocation A, with the sole exception of agent j, who only assigns a
value of 0. For any other allocation, agents assign the value of 0 to their set of resources,
unless that set is the same as for either allocation A or A′. As δ is not independently
decomposable, this will happen for at least one agent for every allocation different from
both A and A′. Hence, for every such allocation at least one agent will assign a utility value
of 0 to its allocated bundle. We get swe(A′) = 1, swe(A) = 0, and swe(B) = 0 for every
other allocation B, i.e. A′ is the only allocation with maximal egalitarian social welfare.
The ordered utility vector of A′ is of the form h1, . . . , 1i, that of A is of the form
h0, 1, . . . , 1i, and that of any other allocation has got the form h0, . . .i, i.e. we have A ≺ A′
and B (cid:22) A for all allocations B with B 6= A and B 6= A′. Therefore, if we make A the
initial allocation of resources, then δ will be the only deal that would result in a strict rise
with respect to the leximin-ordering. Thus, by Lemma 3, δ would also be the only equitable
deal. Hence, if the set of admissible deals is restricted to equitable deals then δ is indeed
necessary to reach an allocation with maximal egalitarian social welfare.
✷
This result shows, again, that there can be no structurally simple class of deals (such as the
class of deals only involving two agents at a time) that would be sufficient to guarantee an
optimal outcome of negotiation. This is the case even when agents only have very limited
options for modelling their preferences (as is the case for dichotomous utility functions).11
While this negative necessity result is shared with the two other instances of our negotia-
tion framework we have considered, there are currently no positive results on the sufficiency
of 1-deals for restricted domains in the egalitarian setting (see Theorems 3 and 6). For in-
stance, it is not difficult to construct counterexamples that show that even when all agents
are using additive 0-1 functions, complex deals involving all agents at the same time may be
required to reach an allocation with maximal egalitarian social welfare (a concrete example
may be found in Endriss et al., 2003b).
11. However, observe that unlike for our two variants of the framework of rational negotiation, we do not
have a necessity result for scenarios with monotonic utility functions (see Theorems 2 and 5). Using a
collection of monotonic utility functions as in the proof of Theorem 2 would not allow us to draw any
conclusions regarding the respective levels of egalitarian social welfare of A and A′ on the one hand, and
other allocations B on the other.
337
Endriss, Maudet, Sadri, & Toni
6. Negotiating Lorenz Optimal Allocations
In this section, we are going to analyse our framework of resource allocation by negotiation in
view of the notion of Lorenz optimal allocations introduced in Definition 11. We begin with
a somewhat more general discussion of possible local rationality criteria for the acceptability
of a given deal.
6.1 Local Rationality Criteria and Separability
So far, we have studied three different variants of our negotiation framework: (i) rational ne-
gotiation with side payments (aiming at maximising utilitarian social welfare); (ii) rational
negotiation without side payments (aiming at Pareto optimal outcomes); and (iii) negoti-
ation in egalitarian agent societies. The first two instances of our framework, where agents
are either individually rational or cooperatively rational, have been natural choices as they
formalise the widely made assumptions that agents are both purely self-interested and my-
opic (for scenarios with and without monetary side payments, respectively).
The third variant of the framework, which applies to egalitarian agent societies, is at-
tractive for both conceptual and technical reasons. Conceptually, egalitarian social welfare
is of interest, because it has largely been neglected in the multiagent systems literature
despite being the classical counterpart to the widely used notion of utilitarian social wel-
fare. Technically, the analysis of egalitarian agent societies has been interesting, because
egalitarian social welfare does not admit the definition of a local rationality criterion that
directly captures the class of deals resulting in an increase with respect to this metric. This
is why we took the detour via the leximin-ordering to prove termination.
The class of social welfare orderings that can be captured by deals conforming to a
local rationality criterion is closely related to the class of separable social welfare orderings
(Moulin, 1988). In a nutshell, a social welfare ordering is separable iff it only depends on
the agents changing utility whether or not a given deal will result in an increase in social
welfare. Compare this with the notion of a local rationality criterion (Definition 6); here it
only depends on the agents changing bundle whether or not a deal is acceptable. A change
in utility presupposes a change in bundle (but not vice versa). Hence, every separable
social welfare ordering corresponds to a class of deals characterised by a local rationality
criterion (but not vice versa). This means that every separable social welfare ordering gives
rise to a local rationality criterion and proving a general convergence theorem becomes
straightforward.12 The leximin-ordering, for instance, is separable (Moulin, 1988), which is
why we are not going to further discuss this social welfare ordering in this paper.13
Similarly, the ordering over alternative allocations induced by the notion of Lorenz dom-
ination (Definition 11) is also separable. Hence, the definition of an appropriate class of
deals and the proof of a general convergence result would not yield any significant new
insights either. However, here the analysis of the effects that some of the previously intro-
12. Indeed, in the case of the framework of rational negotiation with side payments, the central argument in
the proof of Theorem 1 has been Lemma 1, which shows that individual rationality is in fact equivalent
to the local rationality criterion induced by swu.
13. A suitable rationality criterion would simply amount to a lexicographic comparison of the ordered utility
vectors for the subsociety of the agents involved in the deal in question.
338
Negotiating Socially Optimal Allocations of Resources
duced rationality criteria have on agent societies when social well-being is assessed in terms
of the Lorenz condition is rather instructive, as we are going to see next.
6.2 Lorenz Domination and Existing Rationality Criteria
We are now going to try to establish connections between the global welfare measure induced
by the notion of Lorenz domination on the one hand, and various local criteria on the
acceptability of a proposed deal that individual agents may choose to apply on the other. For
instance, it is an immediate consequence of Definitions 11 and 14 that, whenever δ = (A, A′)
is a cooperatively rational deal, then A must be Lorenz dominated by A′. As may easily be
verified, any deal that amounts to a Pigou-Dalton transfer (see Definition 15) will also result
in a Lorenz improvement. On the other hand, it is not difficult to construct examples that
show that this is not the case for the class of equitable deals anymore (see Definition 16).
That is, while some equitable deals will result in a Lorenz improvement, others will not.
Our next goal is to check whether it is possible to combine existing rationality criteria
and define a class of deals that captures the notion of Lorenz improvements in as so far
as, for any two allocations A and A′ such that A is Lorenz dominated by A′, there exists
a sequence of deals (or possibly even a single deal) belonging to that class leading from
A to A′. Given that both cooperatively rational deals and Pigou-Dalton transfers always
result in a Lorenz improvement, the union of these two classes of deals may seem like a
promising candidate. In fact, according to a result reported by Moulin (1988, Lemma 2.3),
it is the case that any Lorenz improvement can be implemented by means of a sequence of
Pareto improvements (i.e. cooperatively rational exchanges) and Pigou-Dalton transfers. It
is important to stress that this seemingly general result does not apply to our negotiation
framework. To see this, we consider the following example:
u1({ }) = 0
u1({r1}) = 6
u1({r2}) = 1
u1({r1, r2}) = 7 u2({r1, r2}) = 7 u3({r1, r2}) = 10
u3({ }) = 0
u3({r1}) = 1
u3({r2}) = 1
u2({ }) = 0
u2({r1}) = 1
u2({r2}) = 6
Let A be the allocation in which agent 3 owns both resources, i.e. ~u(A) = h0, 0, 10i and
utilitarian social welfare is currently 10. Allocation A is Pareto optimal, because any other
allocation would be strictly worse for agent 3. Hence, there can be no cooperatively rational
deal that would be applicable in this situation. We also observe that any deal involving only
two agents would at best result in a new allocation with a utilitarian social welfare of 7 (this
would be a deal consisting either of passing both resources on to one of the other agents,
or of passing the "preferred" resource to either agent 1 or agent 2, respectively). Hence, no
deal involving only two agents (and in particular no Pigou-Dalton transfer) could possibly
result in a Lorenz improvement. However, there is an allocation that Lorenz dominates
A, namely the allocation assigning to each one of the first two agents their respectively
preferred resource. This allocation A′ with A′(1) = {r1}, A′(2) = {r2} and A′(3) = { } has
got the ordered utility vector h0, 6, 6i.
The reason why the general result reported by Moulin is not applicable to our domain
is that we cannot use Pigou-Dalton transfers to implement arbitrary utility transfers here.
Moulin assumes that every possible utility vector constitutes a feasible agreement. In the
339
Endriss, Maudet, Sadri, & Toni
context of resource allocation, this would mean that there is an allocation for every possible
utility vector. In our framework, where agents negotiate over a finite number of indivisible
resources, however, the range of feasible allocations is limited. For instance, in the above
example there is no feasible allocation with the (ordered) utility vector h0, 4, 6i. In Moulin's
system, agents could first move from h0, 0, 10i to h0, 4, 6i (a Pigou-Dalton transfer) and then
from h0, 4, 6i to h0, 6, 6i (a Pareto improvement). In our system, on the other hand, this is
not possible.
6.3 Simple Pareto-Pigou-Dalton Deals and 0-1 Scenarios
As we cannot use existing rationality criteria to compose a criterion that captures the notion
of a Lorenz improvement (and that would allow us to prove a general convergence theorem),
we are going to investigate how far we can get in a scenario with restricted utility functions.
Recall our definition of 0-1 scenarios where utility functions can only be used to indicate
whether an agent does or does not need a particular resource. As we shall see next, for 0-1
scenarios, the aforementioned result of Moulin does apply. In fact, we can even sharpen it a
little by showing that only Pigou-Dalton transfers and cooperatively rational deals involving
just a single resource and two agents each are required to guarantee negotiation outcomes
that are Lorenz optimal. We first give a formal definition of this class of deals.
Definition 17 (Simple Pareto-Pigou-Dalton deals) A deal δ is called a simple
Pareto-Pigou-Dalton deal iff it is a 1-deal and either cooperatively rational or a Pigou-
Dalton transfer.
We are now going to show that this class of deals is sufficient to guarantee Lorenz optimal
outcomes of negotiations in 0-1 scenarios
Theorem 9 (Lorenz optimal outcomes) In 0-1 scenarios, any sequence of simple
Pareto-Pigou-Dalton deals will eventually result in a Lorenz optimal allocation of resources.
Proof. As pointed out earlier, any deal that is either cooperatively rational or a Pigou-
Dalton transfer will result in a Lorenz improvement (not only in the case of 0-1 scenarios).
Hence, given that there are only a finite number of distinct allocations of resources, after
a finite number of deals the system will have reached an allocation where no more simple
Pareto-Pigou-Dalton deals are possible; that is, negotiation must terminate. Now, for the
sake of contradiction, let us assume this terminal allocation A is not optimal, i.e. there
exists another allocation A′ that Lorenz dominates A. Amongst other things, this implies
swu(A) ≤ swu(A′), i.e. we can distinguish two cases: either (i) there has been a strict
increase in utilitarian welfare, or (ii) it has remained constant. In 0-1 scenarios, the former
is only possible if there are (at least) one resource r ∈ R and two agents i, j ∈ A such that
ui({r}) = 0 and uj({r}) = 1 as well as r ∈ A(i) and r ∈ A′(j), i.e. r has been moved from
agent i (who does not need it) to agent j (who does need it). But then the 1-deal of moving
only r from i to j would be cooperatively rational and hence also a simple Pareto-Pigou-
Dalton deal. This contradicts our assumption of A being a terminal allocation.
Now let us assume that utilitarian social welfare remained constant, i.e. swu(A) =
swu(A′). Let k be the smallest index such that ~uk(A) < ~uk(A′). (This is the first k for
which the inequality in Definition 11 is strict.) Observe that we cannot have k = A, as
340
Negotiating Socially Optimal Allocations of Resources
this would contradict swu(A) = swu(A′). We shall call the agents contributing the first
k entries in the ordered utility vector ~u(A) the poor agents and the remaining ones the
rich agents. Then, in a 0-1 scenario, there must be a resource r ∈ R that is owned by
a rich agent i in allocation A and by a poor agent j in allocation A′ and that is needed
by both these agents, i.e. ui({r}) = 1 and uj({r}) = 1. But then moving this resource
from agent i to agent j would constitute a Pigou-Dalton transfer (and hence also a simple
Pareto-Pigou-Dalton deal) in allocation A, which again contradicts our earlier assumption
of A being terminal.
✷
In summary, we have shown that (i) any allocation of resources from which no simple
Pareto-Pigou-Dalton deals are possible must be a Lorenz optimal allocation and (ii) that
such an allocation will always be reached by implementing a finite number of simple Pareto-
Pigou-Dalton deals. As with our earlier convergence results, agents do not need to worry
about which deals to implement, as long as they are simple Pareto-Pigou-Dalton deals. The
convergence to a global optimum is guaranteed by the theorem.
7. Further Variations
In this section, we are going to briefly consider two further notions of social preference and
discuss them in the context of our framework of resource allocation by negotiation. Firstly,
we are going to introduce the idea of elitist agent societies, where social welfare is tied to
the welfare of the agent that is currently best off. Then we are going to discuss societies
where envy-free allocations of resources are desirable.
7.1 Elitist Agent Societies
Earlier we have discussed the maximin-ordering induced by the egalitarian collective utility
function swe (see Definition 9). This ordering is actually a particular case of a class of social
welfare orderings, sometimes called k-rank dictators (Moulin, 1988), where a particular
agent (the one corresponding to the kth element in the ordered utility vector) is chosen
to be the representative of society. Amongst this class of orderings, another particularly
interesting case is where the welfare of society is evaluated on the basis of the happiest
agent (as opposed to the unhappiest agent, as in the case for egalitarian welfare). We call
this the elitist approach to measuring social welfare.
Definition 18 (Elitist social welfare) The elitist social welfare swel(A) of an allocation
of resources A is defined as follows:
swel(A) = max{ui(A) i ∈ A}
In an elitist agent society, agents would cooperate in order to support their champion (the
currently happiest agent). While such an approach may seem somewhat unethical as far
as human society is concerned, we believe that it could indeed be very appropriate for
certain societies of artificial agents. For some applications, a distributed multiagent system
may merely serve as a means for helping a single agent in that system to achieve its goal.
However, it may not always be known in advance which agent is most likely to achieve its
goal and should therefore be supported by its peers. A typical scenario could be where a
341
Endriss, Maudet, Sadri, & Toni
system designer launches different agents with the same goal, with the aim that at least one
agent achieves that goal -- no matter what happens to the others. As with egalitarian agent
societies, this does not contradict the idea of agents being autonomous entities. Agents may
be physically distributed and make their own autonomous decisions on a variety of issues
whilst also adhering to certain social principles, in this case elitist ones.
From a technical point of view, designing a criterion that would allow agents inhab-
iting an elitist agent society to decide locally whether or not to accept a particular deal
is very similar to the egalitarian case.
In analogy to the case of equitable deals defined
earlier, a suitable deal would have to increase the maximal individual welfare amongst the
agents involved in any one deal. As for the egalitarian case, there can be no class of deals
characterised by a local rationality criterion that would exactly capture the range of deals
resulting in an increase in elitist social welfare (because every agent in the system would
have to be consulted first to determine who is currently best off). To prove convergence,
we would have to resort to an auxiliary social welfare ordering (similarly to the use of the
leximin-ordering in the proof of Theorem 7).
Of course, in many cases there is a much simpler way of finding an allocation with
maximal elitist social welfare. For instance, if all agents use monotonic utility functions,
then moving all resources to the agent assigning the highest utility value to the full bundle
R would be optimal from an elitist point of view. More generally, we can always find an
elitist optimum by checking whose utility function has got the highest peak. That is, while
the highest possible elitist social welfare can easily be determined in a centralised manner,
our distributed approach can still provide a useful framework for studying the process of
actually reaching such an optimal allocation.
7.2 Reducing Envy amongst Agents
Our final example for an interesting approach to measuring social welfare in an agent society
is the issue of envy-freeness (Brams & Taylor, 1996). For a particular allocation of resources,
an agent may be "envious" of another agent if it would prefer that agent's set of resources
over its own. Ideally, an allocation should be envy-free.
Definition 19 (Envy-freeness) An allocation of resources A is called envy-free iff we
have ui(A(i)) ≥ ui(A(j)) for all agents i, j ∈ A.
Like egalitarian social welfare, this is related to the fair division of resources amongst agents.
Envy-freeness is desirable (though not always achievable) in societies of self-interested agents
in cases where agents have to collaborate with each other over a longer period of time. In
such a case, should an agent believe that it has been ripped off, it would have an incentive
to leave the coalition which may be disadvantageous for other agents or the society as a
whole. In other words, envy-freeness plays an important role with respect to the stability of
a group. Unfortunately, envy-free allocations do not always exist. A simple example would
be a system with two agents and just a single resource, which is valued by both of them.
Then whichever agent holds that single resource will be envied by the other agent.
Furthermore, aiming at agreeing on an envy-free allocation of resources is not always
compatible with, say, negotiating Pareto optimal outcomes. Consider the following example
of two agents with identical preferences over alternative bundles of resources:
342
Negotiating Socially Optimal Allocations of Resources
u1({ }) = 0
u1({r1}) = 1
u1({r2}) = 2
u1({r1, r2}) = 0 u2({r1, r2}) = 0
u2({ }) = 0
u2({r1}) = 1
u2({r2}) = 2
For this example, either one of the two allocations where one agent owns all resources and
the other none would be envy-free (as no agent would prefer the other one's bundle over
its own). However, such an allocation would not be Pareto optimal. On the other hand,
an allocation where each agent owns a single resource would be Pareto optimal, but not
envy-free (because the agent holding r1 would rather have r2).
We should stress that envy is defined on the sole basis of an agent's private preferences,
i.e. there is no need to take other agents' utility functions into account. Still, whether an
agent is envious does not just depend on the resources it holds, but also on the resources
it could hold and whether any of the other agents currently hold a preferred bundle. This
somewhat paradoxical situation makes envy-freeness far less amenable to our methodology
than any of the other notions of social welfare we have discussed in this paper.
To be able to measure different degrees of envy, we could, for example, count the number
of agents that are envious for a given allocation. Another option would be to compute for
each agent i that experiences any envy at all the difference between ui(A(i)) and ui(A(j))
for the agent j that i envies the most. Then the sum over all these differences would also
provide an indication of the degree of overall envy (and thereby of social welfare). In the
spirit of egalitarianism, a third option would be identify the degree of envy in society with
the degree of envy experienced by the agent that is the most envious (Lipton, Markakis,
Mossel, & Saberi, 2004). However, it is not possible to define a local acceptability criterion
in terms of the utility functions of the agents involved in a deal (and only those) that
indicates whether the deal in question would reduce envy according to any such a metric.
This is a simple consequence of the fact that a deal may affect the degree of envy experienced
by an agent not involved in the deal at all (because it could lead to one of the participating
agents ending up with a bundle preferred by the non-concerned agent in question).
8. Conclusion
We have studied an abstract negotiation framework where members of an agent society
arrange multilateral deals to exchange bundles of indivisible resources, and we have analysed
how the resulting changes in resource distribution affect society with respect to different
social welfare orderings.
For scenarios where agents act rationally in the sense of never accepting a deal that
would (even temporarily) decrease their level of welfare, we have seen that systems where
side payments are possible can guarantee outcomes with maximal utilitarian social welfare,
while systems without side payments allow, at least, for the negotiation of Pareto optimal
allocations. We have also considered two examples of special domains with restricted utility
functions, namely additive and 0-1 scenarios. In both cases, we have been able to prove the
convergence to a socially optimal allocation of resources also for negotiation protocols that
allow only for deals involving only a single resources and a pair of agents each (so-called
1-deals). In the case of agent societies where welfare is measured in terms of the egalitarian
collective utility function, we have put forward the class of equitable deals and shown that
343
Endriss, Maudet, Sadri, & Toni
negotiation processes where agents use equitability as an acceptability criterion will also
converge towards an optimal state. Another result states that, for the relatively simple
0-1 scenarios, Lorenz optimal allocations can be achieved using one-to-one negotiation by
implementing 1-deals that are either inequality-reducing or that increase the welfare of
both agents involved. We have also discussed the case of elitist agent societies where social
welfare is tied to the welfare of the most successful agent. And finally, we have pointed
out some of the difficulties associated with designing agents that would be able to negotiate
allocations of resources where the degree of envy between the agents in a society is minimal.
Specifically, we have proved the following technical results:
• The class of individually rational deals14 is sufficient to negotiate allocations with
maximal utilitarian social welfare (Theorem 1).
• In domains with additive utility functions, the class of individually rational 1-deals is
sufficient to negotiate allocations with maximal utilitarian social welfare (Theorem 3).
• The class of cooperatively rational deals is sufficient to negotiate Pareto optimal allo-
cations (Theorem 4).
• In domains with 0-1 utility functions, the class of cooperatively rational 1-deals is
sufficient to negotiate allocations with maximal utilitarian social welfare (Theorem 6).
• The class of equitable deals is sufficient to negotiate allocations with maximal egali-
tarian social welfare (Theorem 7).
• In domains with 0-1 utility functions, the class of simple Pareto-Pigou-Dalton deals
(which are 1-deals) is sufficient to negotiate Lorenz optimal allocations (Theorem 9).
For each of the three convergence results that apply to deals without structural restrictions
(rather than to 1-deals), we have also proved corresponding necessity results (Theorems 2, 5,
and 8). These theorems show that any given deal (defined as a pair of allocations) that is not
independently decomposable may be necessary to be able to negotiate an optimal allocation
of resources (with respect to the chosen notion of social welfare), if deals are required
to conform to the rationality criterion in question. As a consequence of these results,
no negotiation protocol that does not allow for the representation of deals involving any
number of agents and any number of resources could ever enable agents (whose behaviour
is constrained by our various rationality criteria) to negotiate a socially optimal allocation
in all cases. Rather surprisingly, all three necessity results continue to apply even when
agents can only differentiate between resource bundles that they would be happy with and
those they they would not be happy with (using dichotomous utility functions). Theorems 2
and 5 also apply in case all agents are required to use monotonic utility functions.
A natural question that arises when considering our convergence results concerns the
complexity of the negotiation framework. How difficult is it for agents to agree on a deal
and how many deals are required before a system converges to an optimal state? The latter
of these questions has recently been addressed by Endriss and Maudet (2005). The paper
14. Recall that individually rational deals may include monetary side payments.
344
Negotiating Socially Optimal Allocations of Resources
establishes upper bounds on the number of deals required to reach any of the optimal allo-
cations of resources referred to in the four convergence theorems for the model of rational
negotiation (i.e. Theorems 1, 3, 4, and 6). It also discusses the different aspects of com-
plexity involved at a more general level (such as the distinction between the communication
complexity of the system, i.e. the amount of information that agents need to exchange to
reach an optimal allocation, and the computational complexity of the reasoning tasks faced
by every single agent). Dunne (2005) addresses a related problem and studies the number
of deals meeting certain structural requirements (in particular 1-deals) that are required to
reach a given target allocation (whenever this is possible at all -- recall that our necessity
results show that excluding certain deal patterns will typically bar agents from reaching
optimal allocations).
In earlier work, Dunne et al. (2005) have studied the complexity of deciding whether
one-resource-at-a-time trading with side payments is sufficient to reach a given allocation
(with improved utilitarian social welfare). This problem has been shown to be NP-hard.
Other complexity results concern the computational complexity of finding a socially opti-
mal allocation, independently from the concrete negotiation mechanism used. As mentioned
earlier, such results are closely related to the computational complexity of the winner deter-
mination problem in combinatorial auctions (Rothkopf, Pekec, & Harstad, 1998; Cramton
et al., 2006). Recently, NP-completeness results for this optimisation problem have been
derived with respect to several different ways of representing utility functions (Dunne et al.,
2005; Chevaleyre et al., 2004). Bouveret and Lang (2005) also address the computational
complexity of deciding whether an allocation exists that is both envy-free and Pareto opti-
mal.
Besides presenting technical results, we have argued that a wide spectrum of social
welfare orderings (rather than just those induced by the well-known utilitarian collective
welfare function and the concept of Pareto optimality) can be of interest to agent-based
applications.
In the context of a typical electronic commerce application, where partic-
ipating agents have no responsibilities towards each other, a system designer may wish
to ensure Pareto optimality to guarantee that agents get maximal payoff whenever this is
possible without making any of the other agents worse off.
In applications where a fair
treatment of all participants is vital (e.g. cases where the system infrastructure is jointly
owned by all the agents), an egalitarian approach to measuring social welfare may be more
appropriate. Many applications are in fact likely to warrant a mixture of utilitarian and
egalitarian principles. Here, systems that enable Lorenz optimal agreements may turn out
to be the technology of choice. Other applications, however, may require social welfare to
be measured in ways not foreseen by the models typically studied in the social sciences.
Our proposed notion of elitist welfare would be such an example. Elitism has little room in
human society, where ethical considerations are paramount, but for a particular computing
application these considerations may well be dropped or changed.
This discussion suggests an approach to multiagent systems design that we call welfare
engineering (Endriss & Maudet, 2004). It involves, firstly, the application-driven choice (or
possibly invention) of a suitable social welfare ordering and, secondly, the design of agent
behaviour profiles and negotiation mechanisms that permit (or even guarantee) socially
optimal outcomes of interactions between the agents in a system. As discussed earlier,
designing agent behaviour profiles does not necessarily contradict the idea of the autonomy
345
Endriss, Maudet, Sadri, & Toni
of an agent, because autonomy always has to be understood as being relative to the norms
governing the society in which the agent operates. We should stress that, while we have been
studying a distributed approach to multiagent resource allocation in this paper, the general
idea of exploring the full range of social welfare orderings when developing agent-based
applications also applies to centralised mechanisms (such as combinatorial auctions).
We hope to develop this methodology of welfare engineering further in our future work.
Other possible directions of future work include the identification of further social welfare
orderings and the definition of corresponding deal acceptability criteria; the continuation of
the complexity-theoretic analysis of our negotiation framework; and the design of practical
trading mechanisms (including both protocols and strategies) that would allow agents to
agree on multilateral deals involving more than just two agents at a time.
Acknowledgments
We would like to thank J´erome Lang and various anonymous referees for their valuable
comments. This research has been partially supported by the European Commission as
part of the SOCS project (IST-2001-32530).
References
Andersson, M., & Sandholm, T. W. (2000). Contract type sequencing for reallocative nego-
tiation. In Proceedings of the 20th International Conference on Distributed Computing
Systems (ICDCS-2000), pp. 154 -- 160. IEEE.
Arrow, K. J., Sen, A. K., & Suzumura, K. (Eds.). (2002). Handbook of Social Choice and
Welfare, Vol. 1. North-Holland.
Bouveret, S., & Lang, J. (2005). Efficiency and envy-freeness in fair division of indivisible
goods: Logical representation and complexity.
In Proceedings of the 19th Interna-
tional Joint Conference on Artificial Intelligence (IJCAI-2005), pp. 935 -- 940. Morgan
Kaufmann Publishers.
Brams, S. J., & Taylor, A. D. (1996). Fair Division: From Cake-cutting to Dispute Resolu-
tion. Cambridge University Press.
Chavez, A., Moukas, A., & Maes, P. (1997). Challenger: A multi-agent system for distributed
resource allocation. In Proceedings of the 1st International Conference on Autonomous
Agents (Agents-1997), pp. 323 -- 331. ACM Press.
Chevaleyre, Y., Endriss, U., Estivie, S., & Maudet, N. (2004). Multiagent resource allocation
with k-additive utility functions. In Proceedings of the DIMACS-LAMSADE Work-
shop on Computer Science and Decision Theory, Vol. 3 of Annales du LAMSADE,
pp. 83 -- 100.
Chevaleyre, Y., Endriss, U., Lang, J., & Maudet, N. (2005a). Negotiating over small bundles
of resources. In Proceedings of the 4th International Joint Conference on Autonomous
Agents and Multiagent Systems (AAMAS-2005), pp. 296 -- 302. ACM Press.
Chevaleyre, Y., Endriss, U., & Maudet, N. (2005b). On maximal classes of utility functions
In Proceedings of the 19th International Joint
for efficient one-to-one negotiation.
346
Negotiating Socially Optimal Allocations of Resources
Conference on Artificial Intelligence (IJCAI-2005), pp. 941 -- 946. Morgan Kaufmann
Publishers.
Cramton, P., Shoham, Y., & Steinberg, R. (Eds.). (2006). Combinatorial Auctions. MIT
Press.
Dunne, P. E. (2005). Extremal behaviour in multiagent contract negotiation. Journal of
Artificial Intelligence Research, 23, 41 -- 78.
Dunne, P. E., Wooldridge, M., & Laurence, M. (2005). The complexity of contract negoti-
ation. Artificial Intelligence, 164 (1 -- 2), 23 -- 46.
Dunne, P. E., Laurence, M., & Wooldridge, M. (2004). Tractability results for automatic
contracting. In Proceedings of the 16th Eureopean Conference on Artificial Intelligence
(ECAI-2004), pp. 1003 -- 1004. IOS Press.
Endriss, U., & Maudet, N. (2004). Welfare engineering in multiagent systems. In Engineering
Societies in the Agents World IV, Vol. 3071 of LNAI, pp. 93 -- 106. Springer-Verlag.
Endriss, U., & Maudet, N. (2005). On the communication complexity of multilateral trading:
Extended report. Journal of Autonomous Agents and Multiagent Systems, 11 (1), 91 --
107.
Endriss, U., Maudet, N., Sadri, F., & Toni, F. (2003a). On optimal outcomes of nego-
tiations over resources.
In Proceedings of the 2nd International Joint Conference
on Autonomous Agents and Multiagent Systems (AAMAS-2003), pp. 177 -- 184. ACM
Press.
Endriss, U., Maudet, N., Sadri, F., & Toni, F. (2003b). Resource allocation in egalitar-
In Secondes Journ´ees Francophones sur les Mod`eles Formels
ian agent societies.
d'Interaction (MFI-2003), pp. 101 -- 110. C´epadu`es-´Editions.
Fatima, S. S., Wooldridge, M., & Jennings, N. R. (2004). An agenda-based framework for
multi-issues negotiation. Artificial Intelligence, 152 (1), 1 -- 45.
Fishburn, P. C. (1970). Utility Theory for Decision Making. John Wiley and Sons.
Fujishima, Y., Leyton-Brown, K., & Shoham, Y. (1999). Taming the computational com-
In Pro-
plexity of combinatorial auctions: Optimal and approximate approaches.
ceedings of the 16th International Joint Conference on Artificial Intelligence (IJCAI-
1999), pp. 548 -- 553. Morgan Kaufmann Publishers.
Kraus, S. (2001). Strategic Negotiation in Multiagent Environments. MIT Press.
Lemaıtre, M., Verfaillie, G., & Bataille, N. (1999). Exploiting a common property resource
under a fairness constraint: A case study. In Proceedings of the 16th International Joint
Conference on Artificial Intelligence (IJCAI-1999), pp. 206 -- 211. Morgan Kaufmann
Publishers.
Lipton, R. J., Markakis, E., Mossel, E., & Saberi, A. (2004). On approximately fair allo-
cations of indivisible goods. In Proceedings of the 5th ACM Conference on Electronic
Commerce (EC-2004), pp. 125 -- 131. ACM Press.
Moulin, H. (1988). Axioms of Cooperative Decision Making. Cambridge University Press.
347
Endriss, Maudet, Sadri, & Toni
Myerson, R. B., & Satterthwaite, M. A. (1983). Efficient mechanisms for bilateral trading.
Journal of Economic Theory, 29 (2), 265 -- 281.
Rawls, J. (1971). A Theory of Justice. Oxford University Press.
Rosenschein, J. S., & Zlotkin, G. (1994). Rules of Encounter. MIT Press.
Rothkopf, M. H., Pekec, A., & Harstad, R. M. (1998). Computationally manageable com-
binational auctions. Management Science, 44 (8), 1131 -- 1147.
Sadri, F., Toni, F., & Torroni, P. (2001). Dialogues for negotiation: Agent varieties and dia-
logue sequences. In Proceedings of the 8th International Workshop on Agent Theories,
Architectures, and Languages (ATAL-2001), pp. 405 -- 421. Springer-Verlag.
Sandholm, T. W. (2002). Algorithm for optimal winner determination in combinatorial au
ctions. Artificial Intelligence, 135, 1 -- 54.
Sandholm, T. W. (1998). Contract types for satisficing task allocation: I Theoretical results.
In Proceedings of the AAAI Spring Symposium: Satisficing Models.
Sandholm, T. W. (1999). Distributed rational decision making. In Weiss, G. (Ed.), Multia-
gent Systems: A Modern Approach to Distributed Artificial Intelligence, pp. 201 -- 258.
MIT Press.
Sen, A. K. (1970). Collective Choice and Social Welfare. Holden Day.
Smith, R. G. (1980). The contract net protocol: High-level communication and control in a
distributed problem solver. IEEE Transactions on Computers, C-29 (12), 1104 -- 1113.
Wooldridge, M. (2002). An Introduction to MultiAgent Systems. John Wiley and Sons.
348
|
1504.03809 | 4 | 1504 | 2016-09-09T01:34:09 | Unperturbed Schelling segregation in two or three dimensions | [
"cs.MA"
] | Schelling's model of segregation, first described in 1969, has become one of the best known models of self-organising behaviour. While Schelling's explicit concern was to understand the mechanisms underlying racial segregation in large cities from a game theoretic perspective, the model should be seen as one of a family, arising in fields as diverse as statistical mechanics, neural networks and the social sciences, and which are concerned with interacting populations situated on network structures. Despite extensive study, however, the (unperturbed) Schelling model has largely resisted rigorous analysis, prior results in the literature generally pertaining to variants of the model in which noise is introduced into the dynamics of the system, the resulting model then being amenable to standard techniques from statistical mechanics or stochastic evolutionary game theory. A series of recent papers (one by Brandt, Immorlica, Kamath, and Kleinberg, and two by the authors), has seen the first rigorous analysis of the one dimensional version of the unperturbed model. Here we provide the first rigorous analysis of the two and three dimensional unperturbed models, establishing most of the phase diagram, and answering a challenge from a recent paper by Brandt, Immorlica, Kamath, and Kleinberg. | cs.MA | cs |
UNPERTURBED SCHELLING SEGREGATION IN TWO OR THREE DIMENSIONS
GEORGE BARMPALIAS, RICHARD ELWES, AND ANDY LEWIS-PYE
Abstract. Schelling's models of segregation, first described in 1969 [18] are among the best known
models of self-organising behaviour. Their original purpose was to identify mechanisms of urban racial
segregation. But his models form part of a family which arises in statistical mechanics, neural networks,
social science, and beyond, where populations of agents interact on networks. Despite extensive study,
unperturbed Schelling models have largely resisted rigorous analysis, prior results generally focusing
on variants in which noise is introduced into the dynamics, the resulting system being amenable to
standard techniques from statistical mechanics or stochastic evolutionary game theory [25]. A series
of recent papers [6, 3, 4], has seen the first rigorous analyses of 1-dimensional unperturbed Schelling
models, in an asymptotic framework largely unknown in statistical mechanics. Here we provide the first
such analysis of 2- and 3-dimensional unperturbed models, establishing most of the phase diagram, and
answering a challenge from [6].
1. Introduction
Schelling's spatial proximity models of segregation [18] provided strikingly simple examples the emergence
of order from randomness. Subsequently, and particularly following Young [25], a range of variations of his
models have been studied by mathematicians, statistical physicists, computer scientists, social scientists,
and others, making Schelling segregation one of the best known theoretical examples of self-organising
behaviour (indeed, this was cited by the committee upon awarding Schelling the Nobel memorial prize
for Economics in 2005).
Schelling models have the following general set-up: a population of individuals of two types are initially
randomly distributed on a grid (or other graph). Each individual considers a certain region around it to
be its neighbourhood, and it has an intolerance (τ ), expressing the proportion of its neighbours it requires
to be of its own type in order to be happy.
Unhappy individuals then rearrange themselves in order to become happy. This may happen through
a variety of possible dynamics.
In Schelling's own work on 2-dimensional segregation, at each time
step a selected unhappy node would move to a vacant position where it would be happy. However,
much subsequent work on Schelling segregation has followed the breakthrough analysis of Young [25]
who studied a 1-dimensional model which dispensed with vacancies, where agents instead rearranged
themselves via pairwise swaps (at each time-step a randomly selected pair of unhappy agents of opposite
types swap positions).
This version: August 21, 2018.
Key words and phrases. Schelling Segregation and Algorithmic Game Theory and Complex Systems and Non-linear
Dynamics and Ising model and Spin Glass.
Authors are listed alphabetically. Barmpalias was supported by the 1000 Talents Program for Young Scholars from
the Chinese Government, and the Chinese Academy of Sciences (CAS) President's International Fellowship Initiative No.
2010Y2GB03. Additional support was received by the CAS and the Institute of Software of the CAS. Partial support was
also received from a Marsden grant of New Zealand and the China Basic Research Program (973) grant No. 2014CB340302.
Andy Lewis-Pye (previously Andrew Lewis) was supported by a Royal Society University Research Fellowship. The authors
thank Sandro Azaele for some helpful comments on an earlier draft of this paper.
1
2
GEORGE BARMPALIAS, RICHARD ELWES, AND ANDY LEWIS-PYE
The lack of vacancies is arguably a closer approximation to life in modern cities without large numbers of
uninhabited properties, and has proved itself more amenable to mathetatical analysis. Numerous variants
of Young's model have subsequently been investigated, notably in the work of Zhang [26, 27, 28], as well
as the series of papers of which the current work is a part [6, 3, 4].
Young's pairwise-swapping dynamic is known to statistical physicists as the Kawasaki dynamic. An even
simpler choice, adopted in [4] and the current paper, is the Glauber dynamic, whereby at each time-step a
single randomly selected unhappy agent switches type. Although simple, this is by no means unintuitive,
the idea is that an agent who becomes unhappy moves out of the city, and is replaced by an agent
of the opposite type. Thus our model is an open system, and we posit limitless pools of both types
beyond the system. The Glauber dynamic also, we argue, brings the model closest to others in the same
statistical-physical family, such as the Ising and Hopfield models (see 1.2 below).
Ever since Schelling's original simulations with zinc and copper coins on a checkerboard back in 1969,
the robustness of the phenomenon of segregation has been recognised: as the process unfolds, large
clusters emerge, consisting of individuals of only one type. This same phenomenon has appeared in
diverse variants of the model, strikingly including models in which agents have an active preference for
integration [27, 16]. Seen from a game theoretic perspective, this provides an example of a recurrent
theme in Schelling's research -- especially as elaborated upon in [19] -- that individuals acting according
to their interests at the local level can produce global results which may be unexpected and undesired by
all. Understanding this phenomenon has been the goal of much subsequent research.
Besides changing the dynamic, Young in [25], made another highly influential innovation by introducing
noise to the model. Much subsequent research has focussed on such perturbed variants, which can be
thought of as systems of temperature T > 0, in which agents have a small but non-zero probability of
acting against their own interests. Young used techniques from evolutionary game theory -- an analysis
in terms of stochastically stable states -- to analyse such a model. These ideas were then substantially
developed in the work of Zhang [26, 27, 28]. While the language used may differ from that of those of sta-
tistical physicists, the basic analysis is essentially equivalent: Zhang establishes a Boltzmann distribution
for the set of configurations, and then his stochastically stable states correspond to ground states.
1.1. Our contribution. The difficulty in analysing the unperturbed (or temperature T = 0) variants of
the model stems from the large number of absorbing states for the underlying Markov process. Neverthe-
less, a breakthrough came in [6], where Brandt, Immorlica, Kamath and Kleinberg used an analysis of
locally defined stable configurations, combined with results of Wormald [24], to provide the first rigorous
analysis of an unperturbed 1-dimensional Schelling model, for the case τ = 0.5 under Kawasaki dynam-
ics. In [3] the authors gave a more general analysis of the same model for τ ∈ [0, 1]. In [4], the authors
then analysed variants of the model under Glauber dynamics (as well as variations thereupon), with an
additional innovation: the two types of agent may have unequal intolerances τα, τβ ∈ [0, 1]. We extend
the analysis of this phenomenon in the current paper. This modification of the model has justification in
social research. See for example [20], where it is found that black US citizens are happier in integrated
neighbourhoods than their white compatriots. It has often been argued (including by the authors in [4]
and Schelling himself in for example [19]) that the simplicity of Schelling models make them relevant in
areas far beyond the topic of racial segregation. Another application might be that of product adoption:
which of two competing products customers choose. The peer-effect aspect of this phenomenon can be
addressed with a Schelling model. In such a context, the asymmetry of τα, τβ reflects the idea of 'diffi-
culty of engagement', which is argued in [7] to offer insights into the obstacles that innovative ecological
products face in terms of market penetration.
UNPERTURBED SCHELLING SEGREGATION IN 2D AND 3D
3
Figure 1. The evolving process: n = 600, w = 5, τα = 0.44, τβ = 0.42.
Throughout this series of papers, although the proofs vary widely in their details, the analysis hinges on
the use of a spread of models across which the neighbourhood radius (w) size grows large (but remains
small relative to the size of the whole system, n). This allows exact results to be obtained asymptotically,
by careful probabilistic analysis of various structures occurring in the initial configuration. (It might
be objected, at this point, that neighbourhoods of arbitrarily large size are not in the spirit of models
of racial segregation. However, this should be seen as a mathematical device allowing the outcome to
be predicted with arbitrarily high precision. In simulations of all models in this family, relatively small
values of w are generally sufficient for a clear outcome. See Figures 1, 2, 3 for examples.)
The current paper uses the same approach to extend these results to the two and three dimensional
models. A mathematical account of unperturbed Schelling segregation in higher dimensions has been
seen as a challenging problem for some time. As Brandt, Immorlica, Kamath and Kleinberg say in [6]:
Finally, and most ambitiously, there is the open problem of rigorously analyzing the Schelling model in
other graph structures including two-dimensional grids. Simulations of the Schelling model in two dimen-
sions reveal beautiful and intricate patterns that are not well understood analytically. Perturbations of
the model have been successfully analyzed using stochastic stability analysis [. . . ] but the non-perturbed
model has not been rigorously analyzed. Two-dimensional lattice models are almost always much more
challenging than one-dimensional ones, and we suspect that to be the case with Schelling's segregation
model. But it is a challenge worth undertaking: if one is to use the Schelling model to gain insight into
the phenomenon of residential segregation, it is vital to understand its behavior on two-dimensional grids
since they reflect the structure of so many residential neighborhoods in reality.
Thus the aim of this paper is to answer this challenge, providing the first rigorous analysis of the two and
three dimensional unperturbed models of Schelling segregation. Our work gives an almost comprehensive
picture of the phase diagram of such a model under Glauber dynamics with distinct intolerances τα
and τβ, revealing interesting phase transitions around certain thresholds, which are solutions to derivable
equations and which we numerically approximate. Some grey areas around these thresholds remain, where
the behaviour of the model is not proven rigorously, but these correspond to relatively small intervals.
Let us briefly compare the results of the current paper (namely Theorems 1.2 and 1.3 below) with those
of [4] where the authors considered a 1-dimensional version of the same model. This can be summed up
by comparing the two illustrations of Figure 4 (representing the 2- and 3-dimensional models) with the
final illustration within Figure 4 of [4] representing the 1-dimensional model. The overall picture is very
similar; the differences are in the precise locations of the thresholds between staticity almost everywhere
and takeover almost everywhere (around 0.3531 in the 1-dimensional case, 0.3652 in the 2-dimensional
case, and 0.3897 in the 3-dimensional case), as well as the fact that in the 2- and 3- dimensional model we
4
GEORGE BARMPALIAS, RICHARD ELWES, AND ANDY LEWIS-PYE
Figure 2. The evolving process: n = 600, w = 10, τα = 0.44, τβ = 0.42.
continue to have small grey areas around those thresholds where the outcome has not yet been rigorously
established. This will be explained further in Section 1.3.2 below.
Following the online release of an earlier version of the current paper, Immorlica, Kleinberg, Lucier, and
Zadomighaddam released an unpublished manuscript1 which analyses a closely related, but interestingly
distinct, two dimensional Schelling system. They show, under a continuous time Poisson clock dynamic,
and with the hypothesis that agents of both types share the same intolerance which is close to, but less
than 0.5 (i.e. τα = τβ = 1−ε
2 ), that the size of the segregated regions which emerge will, with probability
approaching 1, be of exponential size in the neighbourhood radius (eΘ(w2)).
1.2. The Schelling model across science. While Schelling's ultimate concern was to understand some
of the mechanisms underlying racial segregation in the United States, such a model may also be applied
to many contexts in which the 'individuals' represent particles or agents of a sort which might more
plausibly behave according to simple rules which govern their behaviour at the local level. In fact these
model are rightly seen as fitting within a larger family of discrete time models arising in diverse fields.
Before we give a formal description of our model, we review two other important examples.
1.2.1. Ising Models. Many authors have pointed out direct links to the Ising model, used to analyse
phase transitions in the context of statistical mechanics (see [21, 10, 17, 11, 15]). As this observation
suggests, the dynamics can fruitfully be analysed by assigning an energy level to any given configuration,
typically corresponding to some measure of the mixing of types. Typically, the Ising model is considered
at temperature T > 0, meaning that while transitions are more much likely to occur from configurations
with higher energy to those with lower energy, they may occasionally also occur in the opposite direction.
As discussed above, this corresponds to a perturbed Schelling model, and eases the analysis.
In models with an unperturbed dynamics (i.e. with T = 0), which are the focus of the current paper,
transitions which increase the energy never occur. Thus our results fit into the statistical physical theory
of rapid cooling.
There is another important remark to make. In the current paper (as in [4]), we consider models in which
individuals of different type may have unequal intolerances, τα and τβ. As discussed in Section 1.3. of [4],
this equates to an Ising model with a non-standard external field whose strength differs for spins in state
+1 spins compared to those in state -1. Assuming the usual notation for an Ising model, if we attempt
1N. Immorlica, R. Kleinberg, B. Lucier, M. Zadomighaddam Exponential Segregation in a Two-Dimensional Schelling
Model with Tolerant Individuals, preprint, arXiv: 1511.02537.
UNPERTURBED SCHELLING SEGREGATION IN 2D AND 3D
5
to construct a Hamiltonian function in the standard way:
H = − (cid:88)
(cid:88)
i
σiK(σi)
σiσj +
i−j∞≤w
we find that in general K(+1) (cid:54)= K(−1), meaning that H does not act as an energy function, since it
may increase as well as decrease (even in the unperturbed case).
Thus, our results below can be understood in relation to an Ising model under rapid cooling, with range
of interaction w and a non-standard external field as described.
1.2.2. Neural Networks. Hopfield networks provide an example of a model from the same family, in
which the unperturbed dynamics are of particular interest. Introduced by Hopfield [13] in 1982 these are
recurrent artificial neural networks, which have been much studied as a form of associative memory. Here,
in fact, the unperturbed dynamics would seem to be an essential aspect of the intended functionality --
corresponding to any initial state the absorbing state reached within a finite number of steps of the
dynamical process is the 'memory' which the net is considered as associating with that input. Many
authors have analysed the connections to spin-glass models [1]. A major difference with the Schelling
model though, is that the standard form of Hopfield network has no geometry: each threshold node takes
inputs from all others. From a biological perspective, however, it is of interest to study models of sparse
connectivity [9, 8]. The results of this paper can easily be adapted so as to correspond to a form of 'local'
Hopfield net, in which nodes arranged on a grid are only locally connected.
1.2.3. Cascading Phenomena. Our own avenue into these questions came via connections to the study
of cascading phenomena on networks as studied by Barab´asi, Kleinberg and many others, a good in-
troduction to which can be found in [14]. The dynamics of the Schelling process are either identical or
almost identical to versions of the Threshold Model used to model the flow of information, technology,
behaviour, viruses, opinions etc., on large real world networks. Depending on context, both the perturbed
and unperturbed dynamics may be of interest here. The principal difference with the Schelling model
is typically underlying network, instead of a regular lattice, a random graph of some form (e.g. Watts-
Strogatz graph [23], or Barab´asi-Albert preferential attachment [2]), which better reflects the clustering
coefficient and degree distribution of the real world network in question.
Given the results of this paper, an immediate question is whether the techniques developed here can be
applied to understand emergent phenomena on such random structures. Along these lines, Henry, Pra(cid:32)lat
and Zhang have described a simple but elegant model of network clustering [12], inspired by Schelling
segregation. Although an interesting system, it does not display the kind of involved threshold behaviour
that one might expect; thus there may be more to be said here.
1.3. The model. We describe the two dimensional model first, and it is then simple to extend to three
dimensions. For the two dimensional model we consider an n × n 'grid' of nodes. To avoid boundary
issues, we work on the flat torus T = [0, n− 1)× [0, n− 1), i.e. R2/ ≡ where (x, y) ≡ (x + n, y) ≡ (x, y + n).
Thus, in the context of discussing Euclidean coordinates, arithmetical operations are always performed
modulo n. We let Rn and Nn denote the reals and the natural numbers modulo n respectively. Formally,
then, 'nodes' are elements of N2
n. In the initial configuration (at stage 0) each node is assigned one of
two types, either α or β. In this initial configuration the types of nodes are independent and identically
distributed, with each node having probability 0.5 of being type α.
For each node we also consider a certain neighbourhood, with size specified by a parameter w: the
neighbourhood of the node u, denoted N (u) is the set of nodes v such that u − v∞ ≤ w. So far,
6
GEORGE BARMPALIAS, RICHARD ELWES, AND ANDY LEWIS-PYE
Static almost everywhere
With high probability a random node does not
change its type throughout the process.
α (or β) takeover almost everywhere
A random node has high probability of being of type
α (β respectively) in the final configuration.
α (or β) takeover totally
With high probability all nodes are of type α (β re-
spectively) in the final configuration.
Table 1. The three (or five) behaviours of the model.
then, we have specified two parameters for the model, n and w. The two remaining parameters are the
intolerance levels τα, τβ ∈ [0, 1]. At any given stage we say that a node u of type α is happy if the
proportion of the nodes in N (u) which are of type α is at least τα (note that u is included in its own
neighbourhood). Similarly a node u of type β is happy if the proportion of the nodes in N (u) which
are of type β is at least τβ. We say that a node is hopeful if it is not happy, but would be happy if it
changed type (the types of all other nodes remaining unchanged). The dynamical process then unfolds
as follows. At each stage s + 1, we consider the set of hopeful nodes at the end of stage s. Taking each
in turn we change the type, providing it is still hopeful given earlier changes during stage s + 1. The
process terminates when there are no remaining hopeful nodes.
In the description of the dynamic process above, we have stated that during each stage s + 1, each node
which was hopeful at the end of stage s is taken in turn, the type then being changed if it still remains
hopeful given earlier changes during stage s + 1. For the sake of definiteness, we may consider the nodes
to be lexicographically ordered, but this choice is essentially arbitrary, and it will be clear from what
follows, that all results apply for any ordering of the nodes (since the particular form of the ordering is
not used in the proof of any lemma). In fact the model will behave in an almost identical fashion if,
instead of taking the hopeful nodes in order at each stage, we instead pick hopeful nodes uniformly at
random. This fact is easy verified by simulation, and our expectation is that it would not be difficult
to use techniques applied in [4] to extend the results presented here to such a dynamics. The choice to
consider nodes in order at each stage, simply means that certain aspects of the dynamics become easier to
analyse. Roughly, this is because we are immediately guaranteed that the process will unfold at the same
rate at different locations on the grid, rather than having to apply a probabilistic analysis to show that
formal statements to this effect will be close to true most of the time. It is important for the analysis,
however, that the set of hopeful nodes considered during stage s + 1, is fixed at the end of stage s --
thereby avoiding 'waves' of changes traversing large distances in a single stage.
It is easy to define an appropriate Lyapunov function, establishing that the process must eventually
terminate. For example, one may consider the sum over all nodes u, of the number nodes of the same
type as u in N (u). The three dimensional model is defined identically, except that nodes are now elements
n. Once again, N (u) is the set of nodes v such that u − v∞ ≤ w, but obviously the (cid:96)∞ metric is
of N3
now understood in three dimensions.
UNPERTURBED SCHELLING SEGREGATION IN 2D AND 3D
7
Figure 3. Simulations showing three behaviors of the model, with α and β nodes de-
picted as red and green respectively. From left to right we have "static almost every-
where", "β takeover almost everywhere" and "β takeover totally". These are the final
states of the model with n = 600, w = 2 and (τα, τβ) equal to (0.249,0.1), (0.4,0.3) and
(0.6, 0.4) respectively.
Note that the numbers of nodes of each type do not remain stable throughout the process. Although the
initial expectation is 50% of each type, during the process it is conceivable that one type may increase
or decrease its population. In fact, intuitively one would expect that the type with the least intolerance
level has an advantage over the other type, as it is less susceptible to changes. As we are going to see in
the next section, this is largely true but there are several caveats. For example if both intolerance levels
are very low or very high, then one would expect the system to remain largely stable. In the following
section we make precise statements about what can be rigorously proved, establishing most of the phase
diagram.
1.3.1. Behaviors of the model. Our results are asymptotic in nature, and we will use the shorthand "for
0 (cid:28) w (cid:28) n" to mean "for all sufficiently large w, and all n sufficiently large compared to w". By a
scenario we mean the class of all instances of the model with fixed values of τα, and τβ, but w and n
varying. We will identify a scenario with its signature pair (τα, τβ).
The phase diagram of the model will be expressed according to five behavior types, indicating the degree
of growth of one population over the other that can occur by the time the model reaches its final state.
Our results and analysis justify this natural choice of behavioural classification. Table 1 shows the names
we give to the different behaviors of the model, along with their corresponding descriptions. The precise
definitions are given in Definition 1.1.
Definition 1.1 (Five different behaviors). We list the three (or five, taking into account the two types)
main ways in which a scenario can behave:
(i) A scenario is static almost everywhere if the following holds for every > 0: for 0 (cid:28) w (cid:28) n a node
u chosen uniformly at random has a probability > 1− of having its type unchanged throughout the
process.
(ii) Type α (β) takes over almost everywhere if the following holds for every > 0: for 0 (cid:28) w (cid:28) n
a node u chosen uniformly at random has a probability > 1 − of being of type α (β) in the final
configuration.
(iii) Type α (β) takes over totally if the following holds for every > 0: for 0 (cid:28) w (cid:28) n the probability
that all nodes are of type α (β) in the final configuration exceeds 1 − .
8
GEORGE BARMPALIAS, RICHARD ELWES, AND ANDY LEWIS-PYE
Figure 4. The phase diagrams of the two and the three dimensional models respectively.
Note that in the latter we have a larger grey region, corresponding to behaviour which
we have not been able to rigorously establish.
Figure 3 shows the final states of the model for three different choices of signature (τα, τβ). The first state
indicates a "static almost everywhere" behavior, with only occasional areas where nodes have switched
to type β. The second state indicates an "almost everywhere β takeover", with the occasional small areas
where nodes have succeeded in keeping the α-type. Finally the third state is a total β takeover. The
signatures for the corresponding behaviors illustrate Theorem 1.2 of the next section.
In general, when τα < τβ, we might expect the α type to be more persistent in the process. In order
to formally establish results expressing such expectations, we often need a stronger notion of inequality,
expressing that (for example) τα is sufficiently less than τβ.
In the case of the 2-dimensional model
we denote this relation by τα (cid:67) τβ (the formal definition is given in Definition 1.4). In the case of the
3-dimensional model sufficient inequality is a slightly stronger condition, and is denoted by τα(cid:50) τβ (the
formal definition is given in Definition 1.5). Note that 'sufficiently less' has different meanings for the
2-dimensional and 3-dimensional models. This will not cause confusion as the two models are dealt with
separately, and we use different symbols for the two notions of inequality. The second item of Figure 5
illustrates the relation between sufficient inequality for the 2-dimensional and 3-dimensional models with
the usual inequality.
1.3.2. Main theorems. Our main result for the two dimensional model is the following classification of
behaviors of the model, according to the signature (τα, τβ). The different cases correspond to the positions
of the two intolerance levels with respect to each other and other values like 0.5, 0.25 and a certain constant
κ (cid:117) 0.365227 that will be formally defined (as the unique solution of a certain equation) shortly. Recall
that (cid:67) indicates the 'sufficiently less' relation for the two dimensional model (see Definition 1.4). Given
the symmetric roles of α and β, it is clear that the following theorem (and all those which follow) also
holds with the roles of α and β reversed. From now on we shall not explicitly mention this fact, and will
leave it to the reader to fill in these symmetries.
Theorem 1.2 (Behavior of the two dimensional model). The behavior of the two dimensional model is
dictated by the signature (τα, τβ) as follows:
(a) If τα, τβ < 0.25 then the scenario is static almost everywhere.
UNPERTURBED SCHELLING SEGREGATION IN 2D AND 3D
9
(b) If κ < τα < 0.5 and τβ (cid:67) τα then β takes over almost everywhere.
(c) For τβ < 0.5 < τα, β takes over totally.
(d) If 1 − κ > τα > 0.5 and τβ (cid:66) τα then α takes over almost everywhere.
(e) If τα, τβ > 0.75 then the scenario is static almost everywhere.
where κ is the unique solution in [0, 1] to (1−2κ)1−2κ = 22(1−κ)κκ(1−κ)3(1−κ) (numerically κ (cid:117) 0.365227).
So if τα and τβ are both sufficiently small then most nodes remain unchanged throughout the process.
If at least one of τα and τβ is reasonably large while remaining in the interval (0, 0.5), however, then the
situation changes dramatically. Here 'reasonably large' means above the threshold κ. While it may not
be immediately obvious where the equation defining κ comes from, it will be derived later by comparing
the probabilities of certain structures in the initial configuration.
Figures 1 and 2 display the evolving process for simulations corresponding to the scenario of clause (b)
of Theorem 1.2.2 Here nodes of type α are depicted red, while those of type β are green. The shade
of red or green corresponds to the number of same-type nodes within N (u): the brighter the shade the
more nodes there are of the same type as u in N (u). Since τβ (cid:67) τα, most nodes are of type β in the final
configuration, with this proportion tending to 1 as w → ∞.
Using almost identical proofs, we can get slightly weaker results for the three dimensional model.
Theorem 1.3 (Behavior of the three dimensional model). The behavior of the three dimensional model
is dictated by the signature (τα, τβ) as follows:
(a) If τα, τβ < 0.25 then the scenario is static almost everywhere.
(b) If κ∗ < τα < 0.5 and τβ(cid:50) τα then β takes over almost everywhere.
(d) If 1 − κ∗ > τα > 0.5 and τβ(cid:51) τα then α takes over almost everywhere.
(c) For τβ < 0.5 < τα, then β takes over totally.
(e) If τα, τβ > 0.75 then the scenario is static almost everywhere.
where κ∗ is the unique solution in [0, 1] to (1− 2κ∗)4(1−2κ∗) = 223−8κ∗ κ19κ∗
κ∗ (cid:117) 0.3897216).
∗
(1− κ∗)27(1−κ∗) (numerically,
Note that our results for the three dimensional model are the same as for the two dimensional model
except that the thresholds are slightly different (making the gaps in the phase diagram slightly larger).
Sufficient inequality for the 2D and 3D models. In this section we formally define the notions of
sufficient inequality (denoted by (cid:67) and (cid:50)) for the two dimensional and the three dimensional models
respectively. The particulars of the definition result from comparing the probabilities of certain structures
in the initial configuration, and the motivation behind the definition will become clear in Section 2.
Definition 1.4 (Sufficient inequality for 2D). We let g(x, k) = xkx(1 − x)k(1−x). For τ0, τ1 ∈ (0, 0.5) we
say that τ0 is sufficiently less than τ1, denoted τ0 (cid:67) τ1, if g(τ0, 2) > 2g(τ1, 3). For τ0, τ1 ∈ (0.5, 1) we say
that τ0 is sufficiently greater than τ1, denoted τ0 (cid:66) τ1, if 1 − τ0 is sufficiently less than 1 − τ1.
2The C++ code for these simulations is available at http://barmpalias.net/schelcode.shtml.
10
GEORGE BARMPALIAS, RICHARD ELWES, AND ANDY LEWIS-PYE
Figure 5. The function g of Definitions 1.4 and 1.5, for the values of k that we use. In
the second figure the horizontal axis is τα and the perpendicular axis is τβ. Then the
τβ (cid:66) τα, τβ > τα in [0.5, 1].
three regions show the relations τβ(cid:50) τα, τβ (cid:67) τα, τβ < τα in [0, 0.5] as well as τβ(cid:51) τα,
Note that the function g is decreasing in [0, 0.5] and increasing in [0.5, 1] (see the first item of Figure 5).
Hence (cid:67) in [0, 0.5] is a strengthening of < and (cid:66) in [0.5, 1] is a strengthening of >. The requirement
that τβ (cid:67) τα is not overly strong, as the second item of Figure 5 shows. Table 2 is a chart that shows for
various values of τα in [0, 0.5] the amount by which τβ needs to be smaller in order for τβ (cid:67) τα to hold
Definition 1.5 (Sufficient inequality for 3D). Again let g(x, k) = xkx(1 − x)k(1−x). For τ0, τ1 ∈ (0, 0.5)
(and similarly for(cid:50) of Definition 1.5).
we say that τ0 is sufficiently less than τ1, denoted τ0(cid:50) τ1, if g(τ0, 8) > 219g(τ1, 27). For τ0, τ1 ∈ (0.5, 1)
we say that τ0 is sufficiently greater than τ1, denoted τ0(cid:51) τ1, if 1 − τ0 is sufficiently less than 1 − τ1.
The relation(cid:50) is significantly stronger than (cid:67), as is made clear by Figure 5 and Table 2.
1.4. Further notation and terminology. The variables u and v are used to range over nodes, while
r, x, y, z, τ range over R. We let x and y range over either R2 or R3 depending on context, while
a, b, c, d, e, i, j, k, n, m, w range over N. Often we shall use x and y (and z when working in three dimen-
sions) to specify the coordinates of a node u = (x, y) -- so while x, y and z range over R, often they will
be elements of N.
In the context of discussing a given scenario (τα, τβ), we say that an event X occurs in the limit, if for
every > 0, X occurs with probability > 1 − for 0 (cid:28) w (cid:28) n, i.e. X holds with probability > 1 −
whenever w is sufficiently large and n is sufficiently large compared to w, and where it is to be understood
that how large one has to take w and how large n must be in comparison to w may depend upon , τα
and τβ. When working in two dimensions we let Cu,r be the circle of radius r centred at u, and we
u,r be the disc of radius r centred at u, i.e. the set of all x ∈ T with u − x ≤ r (where u − x
let C†
denotes the Euclidean distance between u and x). Then we extend this notation to A ⊆ T as follows.
If A ⊂ C†
u,r to be the intersection of all convex subsets of C†
containing A. If r < 0.25n and A ⊂ C†
u,r, then we shall call A local. If A is local then A† is the same
with respect to all C†
u,r in this
case, referring simply to A†. In the context of discussing A which is local (such as N (u) for a node u)
u,r then we define A† with respect to C†
u,r
u,r such that r < 0.25n and A ⊂ C†
u,r, and we shall suppress mention of C†
UNPERTURBED SCHELLING SEGREGATION IN 2D AND 3D
11
τα
τβ (cid:67) τα
0.390000
0.024443
0.400000
0.410000
0.420000
0.022266
0.020076
0.017874
τβ(cid:50) τα
0.090076
0.082213
0.074255
0.066211
τα
τβ (cid:67) τα
0.430000
0.015661
0.450000
0.470000
0.490000
0.011212
0.006737
0.002247
τβ(cid:50) τα
0.058092
0.041673
0.025074
0.008370
Table 2. This chart shows, for various values of τα in [0, 0.5], the minimum amount by
which τβ needs to be less than τα in order to have τβ (cid:67) τα or τβ(cid:50) τα respectively.
and two nodes u = (x, y) and v = (x(cid:48), y(cid:48)) in A, we say that x ≤ x(cid:48) if there exists r < 0.5n with x + r = x(cid:48)
n of the form [x, x + m) × [y, y + m)
(and similarly for y and y(cid:48)). By an m-square we mean a subset of N2
n of the form [x, x + a) × [y, y + b) for
for some x, y ∈ N. By an a × b rectangle we mean a subset of N2
some x, y, a, b ∈ N.
1.5. Overview of the proof. At the start of Section 2 we shall prove Theorem 1.2 (a), which along
with Theorem 1.2 (e) is the easiest case and amounts to little more than some easy observations. The
bulk of the work will then be in the remainder of Section 2, in which we prove Theorem 1.2 (b) and
Theorem 1.2 (c). With these in place, Theorem 1.2 (d) and Theorem 1.2 (e) will follow from certain
symmetry considerations, as described in Section 3. In Section 4 we describe how to modify the proofs
for the two dimensional model, to give all of the corresponding theorems for the three dimensional model.
Throughout, certain proofs which are of a technical nature, and which the reader might profitably skip
on a first reading, are deferred to Section 5. In the remainder of this subsection, we outline some of the
basic ideas behind the proof of Theorem 1.2.
The key to the proof lies in considering certain local structures, which might exist in the initial config-
uration or else might develop during the dynamic process. Our first central notion is that of a stable
structure:
Definition 1.6 (Stable structures). We say that a set of nodes A is an α-stable structure if, for every
u ∈ A, there are at least τα(2w+1)2 many α nodes in N (u)∩A. We define β-stable structures analogously.
The point of an α-stable structure is this (as may be seen by induction on stages): no node of type
α which belongs to an α-stable structure can ever change type. We shall also be interested in certain
conditions on N (u) and variants of this neighbourhood:
• (Partial neighbourhoods.) Suppose that (cid:96) is a straight line passing through N †(u). Let A1 be
all those points in N †(u) on or above (cid:96), and let A2 be all those points in N †(u) on or below (cid:96).
†
i ) = γ(2w + 1)2 (µ denotes Lebesgue measure), then we call Ai a γ-partial neighbourhood
If µ(A
of u, with defining line (cid:96). If u is an α node, we let pnα
γ,τ (u) be the event that there exists some
γ-partial neighbourhood of u which contains at least τ (2w + 1)2 many α nodes in the initial
configuration (and similarly for β). We also let pnα
γ,τ (u)[s] be the corresponding event for the
end of stage s, rather than the initial configuration.3
3One should think of pn as p-artial n-eighbourhood, uh as u-nh-appy, and ruh as r-ight-extended neighbourhood u-nh-
appy.
12
GEORGE BARMPALIAS, RICHARD ELWES, AND ANDY LEWIS-PYE
• (Extended neighbourhoods.) We say that uhα
τ (u) holds if there are strictly less than τ (2w +
1)2 many α nodes in N (u) in the initial configuration (and again we let uhα
τ (u)[s] denote the
corresponding event for the end of stage s). If u = (x, y) then the right extended neighbourhood
of u, denoted N (cid:5)(u), is the set of nodes (x(cid:48), y(cid:48)) such that x − w ≤ x(cid:48) ≤ x + 2w and y − y(cid:48) ≤ w.
We say that ruhα
τ (u) holds if there are strictly less than τ (2w + 1)(3w + 1) many α nodes in
N (cid:5)(u) in the initial configuration.
So a γ-partial neighbourhood of u is a subset of N †(u) (of a particularly simple form) which has measure
γ(2w + 1)2. If pnα
(u) holds, then it is not only the case that u is happy -- it has some γ-partial neigh-
bourhood which already contains enough α nodes for u to be happy. The right extended neighbourhood
N (cid:5)(u) is a (particularly simple) superset of N (u). While it is not strictly true that for τ < 0.5, ruhα
τ (u)
implies uhα
τ (u), it is not difficult to see that the former condition is less likely than the latter.
γ,τα
While the notion of a stable structure might seem essentially passive, we can strengthen the notion to
give a form of stable structure which will tend to grow over stages:
Definition 1.7 (Firewalls). If all nodes in C†
called a β-firewall of radius rw centred at u (at that stage). We say v is on the outer boundary of C†
if v /∈ C†
and v(cid:48) ∈ C†
u,rw are of type β (at some stage) then this set of nodes is
u,rw but has an immediate neighbour belonging to this set, i.e. there exists v(cid:48) with v − v(cid:48)∞ = 1
u,rw
u,rw.
u,r∗w satisfies the condition that N (v) ∩ C†
Now suppose that τα, τβ < 0.5, that γ > 0.5 is fixed, and that we choose some r∗ ∈ N+ sufficiently large
that, for 0 (cid:28) w (cid:28) n:
(†a) Any node v ∈ C†
(†b) Any node v on the outer boundary of any C†
γ-partial neighbourhood of v.
We may now observe that if r ≥ r∗ then for 0 (cid:28) w (cid:28) n: a) any β-firewall of radius rw is a β-stable
structure, and b) any α node v on the outer boundary of a β-firewall of radius rw at stage s will be
(v)[s] does not hold. For b), our choice of r∗ implies that v will be unhappy,
hopeful, so long as pnα
and then since τα, τβ < 0.5 unhappiness automatically implies being hopeful. The point is this:
u,r∗w has all of N (v) − C†
u,r∗w ≥ τβ(2w + 1)2.
u,r∗w contained in some
γ,τα
A β-firewall of sufficient radius will grow over stages, so long as no node v on the outer
boundary satisfies pnα
(v)[s].
γ,τα
With these ideas in place, we can now sketch our approach to the proof of Theorem 1.2. First of all
suppose τα, τβ < 0.25 and consider Theorem 1.2 (a). The basic idea is to show that for 0 (cid:28) w (cid:28) n,
a node u0 chosen uniformly at random very probably belongs to a structure which is both α-stable
and β-stable in the initial configuration. From our previous observations, it then follows that no nodes
within this structure can ever change type. In fact a very simple choice of structure suffices -- if we fix
r which is sufficiently large then we can show that, for 0 (cid:28) w (cid:28) n, C†
u0,rw will very probably be such
a stable structure. This follows because all nodes within the disc have (at least) close to half of their
neighbourhood within the disc, and since (via an application of the weak law of large numbers) we can
expect nodes within the disc to be quite evenly distributed.
Now suppose that τα > 0.25, τβ < τα < 0.5 and consider Theorem 1.2 (b). In this case it still holds that
unhappy nodes can be expected to be rare in the initial configuration, and since τβ < τα we have that
unhappy β nodes are less likely than unhappy α nodes. Taking w large we have that unhappy β nodes
are much less likely than unhappy α nodes. A naive approach might then proceed as follows. Choosing
u0 uniformly at random, for 0 (cid:28) w (cid:28) n we should be able to choose a large region around u0, Q say,
UNPERTURBED SCHELLING SEGREGATION IN 2D AND 3D
13
which can be expected to contain unhappy α nodes but no unhappy β nodes in the initial configuration.
What then can be expected to occur in the vicinity of an unhappy α node u in the early stages? Well if u
changes type then this may cause other α nodes in N (u) to become unhappy. If these then change type
then this may cause further α nodes to become unhappy, and so on. In this manner a cascade of changes
to type β may emanate out from the (rare) initially unhappy α nodes, bringing about the formation of
large β-firewalls. We might then look to establish that u0 very probably belongs to such a β-firewall in
the final configuration (and so must ultimately be of type β). There are two immediate difficulties with
this initial plan, however.
(1) First of all, it is not actually clear whether or not unhappy α nodes are likely to give rise to
the formation of large β-firewalls. It is for this reason that we consider the events ruhα
(u) and
τα
the condition τβ (cid:67) τα. The fact that τβ (cid:67) τα is precisely what we need in order to be able to
choose Q so that in the limit there will be α nodes u in Q for which ruhα
(u) holds in the
initial configuraiton -- a less probable condition than uhα
(u) -- while maintaining the absence of
unhappy β nodes in Q. When ruhα
τα
(u) holds we are able to show that a β-firewall of sufficient
radius around u very probably results.
τα
τα
(2) The second problem is that we aren't guaranteed that such a β-firewall will spread until α-
firewalls interfere with the process -- all we observed above was that if r ≥ r∗ (with r∗ chosen
appropriately) then for 0 (cid:28) w (cid:28) n, any α node v on the outer boundary of a β-firewall of radius
rw at stage s will be hopeful, so long as pnα
(v)[s] does not hold. This is where κ comes into
play. From the fact that τα > κ, we are able to choose an appropriate γ > 0.5 and show that
one can choose Q so as to ensure the absence of nodes in Q for which pnα
(v) holds (in the
initial configuration). We can then establish that our large β-firewall, formed within Q in the
early stages of the process, will spread until u0 is contained within it.
γ,τα
γ,τα
Proving Theorem 1.2 parts (c), (d) and (e) then only involves simple modifications of the proofs for parts
(a) and (b).
2. The proof of clauses (a), (b) and (c) of Theorem 1.2
The proof of Theorem 1.2 (a). As mentioned previously, proving Theorem 1.2 (a) requires only some
simple observations. The basic idea is to show that, under the hypothesis of the theorem, a node chosen
uniformly at random will very probably belong to both α-stable and β-stable structures in the initial
configuration, and can therefore never change type.
Throughout this subsection we assume that τα, τβ < 1
4 are fixed and we work for varying w and n such
4 > τ1 > τ2 > τ3 > max{τα, τβ}. We consider a fixed node
that 0 (cid:28) w (cid:28) n. Choose τ1, τ2, τ3 such that 1
u0, which is chosen uniformly at random. We first observe that all nodes in a large disc centred at u0
(with radius some multiple of w), will have (at least) close to half of their neighbourhood in the disc.
Then the aim is to show that for large w we can expect the nodes of each type to be distributed very
evenly in the disc, meaning that nodes in the disc can be expected to have (at least) close to 0.25(2w +1)2
many α nodes within the intersection of the disc and their neighbourhood (and similarly for β). In the
limit, then, this disc will be both an α-stable and a β-stable structure.
Lemma 2.1 (Neighbourhood/disc intersections). Suppose τ(cid:48) < 0.5. There exists r such that, for 0 (cid:28)
w (cid:28) n, all nodes u in C†
u0,rw satisfy N (u) ∩ C†
u0,rw > τ(cid:48)(2w + 1)2.
u0,rw, let A be the set of all nodes in N (u) ∩ C†
Proof. Given u ∈ C†
lattice polygon. By Pick's theorem µ(A†) = i + b
u0,rw. Then the boundary of A† is a
2 − 1, where µ denotes Lebesgue measure, i is the number
14
GEORGE BARMPALIAS, RICHARD ELWES, AND ANDY LEWIS-PYE
of nodes in the interior of A† and b is the number of nodes on the boundary. For sufficiently large r and
for 0 (cid:28) w (cid:28) n, µ(A†) > τ(cid:48)(2w + 1)2, so the result follows directly from Pick's theorem.
(cid:3)
For the remainder of this paragraph, fix r as guaranteed by Lemma 2.1 when τ(cid:48) = 2τ1. Let u0 = (x, y)
and for u ∈ C†
u0,rw let N1(u) = N (u) ∩ C†
u0,rw. Now, to establish the even distribution of nodes of each
type within C†
u0,rw, we divide this region up into a fixed number (i.e. independent of w and n) of small
neighbourhoods. So, for some k ∈ N+, let w(cid:48) = (cid:100)w/k(cid:101), and consider small neighbourhoods of the form
[x + aw(cid:48), x + (a + 1)w(cid:48))× [y + bw(cid:48), y + (b + 1)w(cid:48)), where a, b ∈ Z and n (cid:29) aw(cid:48), n (cid:29) bw(cid:48). Let Π be the set of
u0,rw, let N2(u) be the set of
these small neighbourhoods which lie entirely within C†
nodes in N1(u) which belong to small neighbourhoods in Π entirely contained in N †(u). For sufficiently
large k, and for 0 (cid:28) w (cid:28) n, we have that N2(u) > 2τ2(2w + 1)2 for all u ∈ C†
u0,rw. So fix k satisfying
this condition. Finally, choose > 0 such that (1 − )τ2 > τ3. Then, since k is fixed, it follows by the
weak law of large numbers that in the limit, the proportion of the nodes in each small neighbourhood in
Π which are of type α is greater than 0.5(1− ) (and similarly for β). It then follows that, in the limit, all
u0,rw satisfy the condition that the number of α nodes in N2(u) is greater than τ3(2w + 1)2,
nodes u ∈ C†
and so is greater than τα(2w + 1)2 (and similarly for β). Thus C†
u0,rw will be both an α-stable and a
β-stable structure, as required.
u0,rw. Given u ∈ C†
γ,τα
The proof of clause (b) of Theorem 1.2. We suppose we are given a node u0 = (x0, y0), chosen uniformly
at random. Recalling the discussion of Section 1.5, our first aim is to establish a region Q containing u0,
of size which means that in the initial configuration (for 0 (cid:28) w (cid:28) n) we shall very likely find u ∈ Q
such that ruhα
(u) holds, while at the same time it is very unlikely that we will find any u such that
τα
(u) or uhβ
pnα
(u) hold. The following lemma is what we need in order to do this, and provides the
τβ
motivation behind our definitions of κ and τα (cid:67) τβ. The proof appears in Section 5, and simply consists
of applying standard bounds for the tail of the binomial distribution together with multiple applications
of Stirling's approximation.
Lemma 2.2 (Properties of (cid:67) and κ). Suppose that κ < τα < 0.5 and τβ (cid:67) τα. Choose τ such that
2 and ζ > 1 such that for 0 (cid:28) w (cid:28) n, and for a node u
τβ (cid:67) τ < τα and κ < τ . Then there exists γ > 1
selected uniformly at random, P(ruhα
τ (u)) > ζ w · P(pnα
(u)) and P(ruhα
γ,τα
τ (u)) > ζ w · P(uhβ
τβ
(u)).4
For the remainder of this section we assume that τα, τβ satisfying the conditions of Lemma 2.2 are fixed.
Once and for all we choose (any) τ such that τβ (cid:67) τ < τα and κ < τ , and then we let γ and ζ be as
guaranteed by Lemma 2.2. Given this choice of γ, we then let r∗ be sufficiently large that conditions
(†a) and (†b) of Section 1.5 are satisfied. We also assume we are given 0 > 0. Our aim is to show that
for 0 (cid:28) w (cid:28) n, the probability u0 will be of type β in the final configuration is > 1 − 0. The basic
approach is to establish that in the limit u0 will be consumed by a β-firewall which originates with Q.
Defining Q. To specify Q it will be useful to consider a grid of nodes with disjoint neighbourhoods,
meaning that these neighbourhoods are independently distributed in the initial configuration:
Definition 2.3 (Grid). Recall that u0 = (x0, y0). We say that v = (x, y) is on the grid if there exist
a, b ∈ Z with a,b < 0.25n/(2w + 1) and x = x0 + a(2w + 1), y = y0 + b(2w + 1). Suppose m = 2k + 1.
Then by the m-square on the grid centred at u0 we mean the set of nodes {(x0 +a(2w +1), y0 +b(2w +1)) :
a, b ∈ [−k, +k]}.
4Here it is to be understood that how large one must take w, and how large n must be compared to w, may depend on
our particular choices of τ and γ (as well as the given values τα and τβ ).
(cid:19)π(w)k0
(cid:18)
1 − 1
π(w)
UNPERTURBED SCHELLING SEGREGATION IN 2D AND 3D
τ (u)) = 1/π(w). Note that 1/π(w) → 0 as w → ∞, and recall that (cid:0)1 − 1
Now consider the initial configuration and let π(w) ∈ R be such that for u chosen uniformly at random,
e as x → ∞.
P(ruhα
Take k0 such that e−k0 (cid:28) 0 (with 0 as fixed previously), noting that k0 does not depend on w. Take
the least odd number m0(w) ∈ N+ such that m0(w)2 ≥ π(w)k0. Let Q0 be the m0(w)-square on the grid
centred at u0. Then the probability that not a single node u ∈ Q0 satisfies ruhα
(cid:1)x → 1
τ (u) is at most:
15
x
which is (cid:28) 0 for sufficiently large w. So far then, we have identified a set of nodes Q0, which has the
property that the following will fail to be true with probability (cid:28) 0: there exists u ∈ Q0 such that
ruhα
τ (u) holds.
We need a little more from the vicinity of u0 that we are going to work with. In order to ensure that
firewalls created inside Q†
0 will grow to include u0, we need a much larger region in which we will very
(u) hold. We let Q1 be the (8w+1)m0(w)-
likely not have any nodes u for which either of pnα
square on the grid centred at u0. Then we define Q = Q†
1. Let p be the probability that any node u ∈ Q
(u). Since the number of nodes in Q is ≤ π(w)k0(8w + 1)4, it follows that p is at most
satisfies pnα
π(w)k0(8w + 1)4 times the probability that pnα
(u) holds for u selected uniformly at random. So by
Lemma 2.2, p (cid:28) 0 for sufficiently large w. A similar argument holds for uhβ
(u). Thus we conclude
that for 0 (cid:28) w (cid:28) n, Typical vicinity fails to hold with probability (cid:28) 0:
Definition 2.4 (Typical vicinity). We say that Typical vicinity holds if all of (1) -- (3) below are true:
(u) or uhβ
τβ
γ,τα
γ,τα
γ,τα
τβ
τ (u0) does not hold;
(1) ruhα
(2) There exists u ∈ Q0 such that ruhα
(3) There does not exist any u in Q such that either of pnα
τ (u) holds;
γ,τα
(u) or uhβ
τβ
(u) hold.
Note that (1) -- (3) from Definition 2.4 all refer to the initial configuration.
Definition 2.5. Consider the initial configuration. For τ(cid:48) ∈ [0, 1] we say that juα
τ(cid:48)(u) holds if there are
less than τ(cid:48)(2w + 1)2 many α nodes in N (u), but changing the type of 2w+1 β nodes in N (u) would
τ(cid:48)(u) holds if there are less than τ(cid:48)(2w + 1)(3w + 1) many
cause this not to be the case. We say that rjuα
α nodes in N (cid:5)(u), but changing the type of 3w+1 β nodes in N (cid:5)(u) would cause this not to be the case.5
Observe that if Typical vicinity holds, then we are guaranteed the existence of u ∈ Q†
rjuα
Smoothness conditions. Our aim will be to show that for 0 (cid:28) w (cid:28) n, a large β-firewall can be expected
to form in the early stages of the process in the vicinity of u ∈ Q†
τ (u) holds. To this end,
however, we must first examine what can be expected in the initial configuration, from the vicinity of u
which is chosen uniformly at random from amongst the nodes such that rjuα
τ (u) holds. In particular we
†
are interested in the three regions: C 0(u) := C†
u,3r∗w. In this
subsection, we look to establish certain smoothness conditions -- that the types of nodes in these regions
will be nicely distributed.
†
u,2r∗w and C 2(u) := C
u,r∗w, C 1(u) := C
0 for which rjuα
0 for which
τ (u) holds.
For some large k1, which we shall specify later and which will not depend on w, the basic idea now is that
we want to cover the nodes in C 2(u) with disjoint w
-squares. This occasions the minor inconvenience
k1
5Think of ju as j-ust u-nhappy and think of rju as r-ight extended neighbourhood j-ust u-nhappy.
16
GEORGE BARMPALIAS, RICHARD ELWES, AND ANDY LEWIS-PYE
that k1 may not divide w. We therefore let Ik1 (u) be a pairwise disjoint set of rectangles, whose union
contains all nodes in C 2(u), and such that:
• Each element of Ik1(u) has nonempty intersection with C 2(u) and is of the form [x, x+a)×[y, y+b)
for some a, b ∈ {(cid:98)w/k1(cid:99),(cid:100)w/k1(cid:101),(cid:100)w/k1(cid:101) + 1} and x, y ∈ N;
• Each element of Ik1(u) is either entirely contained in N (cid:5)(u), or else is disjoint from N (cid:5)(u).
Definition 2.6 (Smoothness for u). Suppose given k1 ∈ N+ and 1 > 0 and u such that rjuα
We say that Smoothk1,1(u) holds if:
τ (u) holds.
• For each A ∈ Ik1(u) which is contained in N (cid:5)(u), the proportion of the nodes in A which are of
type α is in the interval [τ − 1, τ + 1].
• For each A ∈ Ik1 (u) which is disjoint from N (cid:5)(u), the proportion of the nodes in A which are
of type α is in the interval [0.5 − 1, 0.5 + 1].
0 such that rjuα
The following lemma is then almost immediate and is proved in Section 5:
Lemma 2.7 (Likely smoothness). Suppose given k1 ∈ N + and 1, > 0. Suppose that u is selected
τ (u) holds. For 0 (cid:28) w (cid:28) n, the probability
uniformly at random from amongst the nodes such that rjuα
that Smoothk1,1 (u) holds is greater than 1 − .
Definition 2.8 (The smoothness event). We let u1 be chosen uniformly at random from amongst the
nodes u ∈ Q†
τ (u) holds (so that if there exists no such node then u1 is undefined). For
any k1, 1 > 0, we let Smooth(k1, 1) be the event that u1 is defined and Smoothk1,1(u1) holds.
Our arguments so far suffice to show that, for any k1, 1 > 0, if 0 (cid:28) w (cid:28) n then the probability that
Smooth(k1, 1) fails to hold is (cid:28) 0. We now want to examine what satisfaction of Smooth(k1, 1) can tell
us about the proportion of α nodes in regions contained in C 2(u1) but which are not one of the rectangles
in Ik1(u1). In order to do so we define a couple of functions, which describe the proportion of α nodes
in a given set A, either in the initial configuration or else after all α nodes in B ⊆ A have changed type.
We also consider idealised versions of these functions which will be easier to work with most of the time.
Here and elsewhere ¯B denotes the complement of B.
Definition 2.9. Consider sets of nodes A, B ⊂ C 2(u).
(1) Let Ξ(A) be the proportion of the elements of A which are of type α in the initial configuration.
(2) Let A0 = A ∩ N (cid:5)(u) and A1 = A − A0. Define Ξ∗(A, u) = (τA0 + 0.5A1)/A.
(3) Take the initial configuration and then change all nodes in B to type β. Let Ξ(A, B) denote the
proportion of the elements of A which are now of type α.
(4) Let A0 = A ∩ B, A1 = A ∩ ¯B ∩ N (cid:5)(u) and let A2 = A − (A0 ∪ A1). We define Ξ∗(A, u, B) =
(τA1 + 0.5A2)/A.
So Ξ∗(A, u) gives the proportion of nodes in A which would be of type α, if exactly proportion τ of those
nodes in A ∩ N (cid:5)(u) were of type α, and exactly half of the nodes in the remainder of A were of type α.
On the other hand Ξ∗(A, u, B) gives the corresponding proportion if the same conditions hold, but then
we change all nodes in B to type β. One may think of Ξ∗ as an idealised version of Ξ. Satisfaction of
τ (u) and Smoothk1,1(u) for large k1 and small 1 will ensure that Ξ∗ is a reasonable approximation
rjuα
to Ξ, in a sense that we will make precise.
Now we want to work with a greater variety of sets of nodes than just those in Ik1(u), but we still only
need to consider sets which are reasonably large and of a reasonably simple form:
UNPERTURBED SCHELLING SEGREGATION IN 2D AND 3D
17
k2
Definition 2.10. Given a node u and k2 ∈ N +, we let I∗
(u) be the set of all sets of nodes A such that
A ⊆ C 2(u) and either (1) A is an a × b rectangle for a, b ≥ w/k2, or (2) the set of nodes inside a regular
polygon with sides of length ≥ w/k2, or (3) the union of two sets of the form (1) or (2).
So long as we restrict attention to sets of nodes in I∗
observation allows us to work with the idealised functions Ξ∗:
Obervation 2.11 (Smoothness for elements of I∗
sufficiently large and 1 > 0 is sufficiently small then, for 0 (cid:28) w (cid:28) n, satisfaction of rjuα
Smoothk1,1 (u) suffices to ensure that:
(u)). Suppose given k2 ∈ N+ and δ > 0. If k1 is
τ (u) and
(u) (for some k2 to be specified), the following
k2
k2
(ı) For all A, B ∈ I∗
(u), Ξ(A) − Ξ∗(A, u) < δ and Ξ(A, B) − Ξ∗(A, u, B) < δ.
k2
Establishing the creation of firewalls. Now we choose values of k2 and δ which will allow us to argue that
a large firewall is very probably created around u1 in the early stages of the process. With these values
specified, k1 and 1 are simply chosen to be those values guaranteed by Lemma 2.11, meaning that we
can make use of our idealised functions Ξ∗. Numerical values in the following definition are somewhat
arbitrary, but suffice for our purposes.
Definition 2.12 (Choosing k2, δ, k1 and 1). Choose k2 > (0.5 − τ )/(τα − τ ), choose δ > 0 such that
δ (cid:28) min{(τα − τ )(2τ − 0.5)/(2k2), 10−5} and choose k1 sufficiently large and 1 > 0 sufficiently small
that for 0 (cid:28) w (cid:28) n satisfaction of rjuα
τ (u) and Smoothk1,1(u) suffices to ensure satisfaction of (ı) (as
specified in Observation 2.11).
The next lemma finally establishes that a firewall of radius r∗w very probably forms around u1.
τ (u) and Smoothk1,1 (u) both hold. Let t∗ = 2r∗w + 3w and
Lemma 2.13 (Firewalls). Suppose that rjuα
suppose that there are no hopeful β nodes in C 2(u) at any stage ≤ t∗. Then all nodes in C 0(u) are of
type β at stage t∗.
Proof. In what follows it will be convenient to assume that w is even. Only small modifications are
required to deal with the case that w is odd. It is also convenient to assume that r∗ > 2. The proof
will basically consist of repeated applications of condition (ı). We shall apply this condition in order to
inductively establish a sequence of increasingly large rectangles for which all nodes become of type β. Let
2 and u∗ := (x∗, y). The following argument is illustrated in the first picture of
u = (x, y), let x∗ := x + w
Figure 6. The rectangles we consider are as follows (where a ∈ N+):
• We let R0
• We let R1
• We let R2
a be the set of nodes v = (x(cid:48), y(cid:48)) such that 0 ≤ x(cid:48) − x ≤ w and y − y(cid:48) ≤ a;
a be the set of nodes v = (x(cid:48), y(cid:48)) such that x − a ≤ x(cid:48) ≤ x + w + a and y − y(cid:48) ≤ w;
a be the set of nodes v = (x(cid:48), y(cid:48)) such that x(cid:48) − x∗ ≤ w
2 w(cid:101) and y(cid:48) − y ≤ w + a.
2−1
Working always for sufficiently large w, we show first that all nodes in R0(cid:98)w/k2(cid:99) are of type β by the end
of stage 1. Then we show inductively that:
2 +(cid:100)√
a are of type β by the end of stage a, for a ≤ w/2;
a when a ≤ w;
(†1) All nodes in R0
(†2) The same result holds for R0
(†3) All nodes in R1
(†4) All nodes in R2
a are of type β by the end of stage w + a, for a ≤ (cid:100) w√
(cid:101);
a are of type β by the end of stage 2w + a, for all a ≤ (cid:100)√
2
2 w(cid:101).
2−1
18
GEORGE BARMPALIAS, RICHARD ELWES, AND ANDY LEWIS-PYE
R2
c
b
c
R0
α
u∗
u
a
R1
b
u∗
Or(u∗)
Figure 6. Rectangles in the proof of Lemma 2.13 and the octagon of Definition 2.15
N (cid:5)(u)
Sr(u∗)
From there we shall be able to argue that all nodes in C 0(u) will eventually be of type β.
So our first task is to establish that all nodes in R0(cid:98)w/k2(cid:99) will be of type β by the end of stage 1. We have
that R0(cid:98)w/k2(cid:99) ∈ I∗
(u) and by our choice of k2 the following holds for all nodes v in this rectangle:
k2
Ξ∗(N (v)) ≤ τ + τα
.
2
Since δ < (τα − τ )/2, it follows from (ı) that for 0 (cid:28) w (cid:28) n, Ξ(N (v)) < τα. So for 0 (cid:28) w (cid:28) n, all α
nodes in R0(cid:98)w/k2(cid:99) are hopeful in the initial configuration and will be of type β by the end of stage 1, as
required.
For any a ∈ N, let da = a/(2w + 1). In order to inductively establish (†1) -- (†4) we then need the various
technical facts contained in the following proposition, which is easily verified by direct calculation.
Proposition 2.14. Given > 0, the following all hold for 0 (cid:28) w (cid:28) n:
(1) For all a ∈ ((cid:98)w/k2(cid:99), w/2] and all v ∈ R0
(2) For all a ∈ (w/2, w] and v ∈ R0
(3) For all a ∈ (0,(cid:100) w√
(cid:101)] and v ∈ R1
√
(4) For all a ∈ (0,(cid:100)w(
2− 1)/2(cid:101)] and v ∈ R2
a − R0
a − R1
2
√
1/
2) + .
a − R0
a−1, Ξ∗(N (v), u, R0
a−1) − (τ + (0.5 − 2τ )da) < .
a−1, Ξ∗(N (v), R0
a−1, Ξ∗(N (v), R1
a−1) < 0.25 + 0.25τ + .
√
a−1) < 3/8 − (1/2 − τ )(1 − 1/
a − R2
a−1, Ξ∗(N (v), R2
a−1 ∪ R1(cid:100) w√
2
2)/4 + .
(cid:101)) < 3/8− (1/16)(3/2−
Given (1) of Proposition 2.14, the induction to establish (†1) now goes through easily. Applying (ı) we
a−1, Ξ(N (v), Ra−1) ≤ τ + (0.5 −
have that if 0 (cid:28) w (cid:28) n then for a ∈ ((cid:98)w/k2(cid:99), w/2] and v ∈ R0
2τ )da + 2δ. Since da > 1/3k2 and δ < (2τ − 0.5)/(6k2) the induction step follows.
Similarly (2) of Proposition 2.14 gives us the induction step in establishing (†2). Applying (ı) we have
that if 0 (cid:28) w (cid:28) n then for a ∈ (w/2, w] and v ∈ R0
a−1) < 0.25 + 0.25τ + 2δ. Now
for τ ∈ (κ, 0.5), 0.25 + 0.25τ < τ − 0.02 so, since δ < 10−5, the induction step follows.
For (†3) we have that if 0 (cid:28) w (cid:28) n then for a ∈ (0,(cid:100) w√
(1/2−τ )(1−1/
so the induction step follows.
2)/4+2δ. Now for τ ∈ (κ, 0.5) we have τ −(3/8−(1/2−τ )(1−1/
a−1) < 3/8 −
2)/4) > 2·10−5 > 2δ,
a−1, Ξ(N (v), R0
a−1, Ξ(N (v), R0
(cid:101)] and v ∈ R1
a − R0
a − R0
a − R1
√
√
2
UNPERTURBED SCHELLING SEGREGATION IN 2D AND 3D
√
Finally, for (†4) we have that if 0 (cid:28) w (cid:28) n then for a ∈ (0,(cid:100)w(
Ξ(N (v), R2
√
(cid:101)) < 3/8 − 1/16(3/2 − 1/
a−1 ∪ R1(cid:100) w√
2) + 2δ. Then for τ ∈ (κ, 0.5) we have
2 − 1)/2(cid:101)] and v ∈ R2
19
a − R2
a−1,
2
√
τ − (3/8 − (1/16)(3/2 − 1/
2)) > 0.02 > 2δ.
Once again the induction step goes through.
2(cid:101) ∪ R2(cid:100)w(
√
√
So far we have established that all nodes in R := R1(cid:100)w/
2−1)/2(cid:101) will be of type β by the end
of stage 3w. Now we wish to extend this and argue that all nodes in C 0(u) will eventually be of type
β. Previously we observed that, for 0 (cid:28) w (cid:28) n, any α node v on the outer boundary of C 0(u) will be
hopeful, so long as pnα
(v) does not hold. In order to get to the point where we can conclude that all
nodes in C 0(u) will become of type β, we use a similar idea, but we must work with smaller regions than
C 0(u) -- this will not be a problem, since satisfaction of Smoothk1,1(u) guarantees the failure of much
(v) for v ∈ C 1(u). In fact the calculations will be simpler if we work with
weaker conditions than pnα
regular octagons rather than circles:
Definition 2.15 (Octagon). Given r ∈ R, we let Sr(u∗) be the square in R2 centred at u∗ with sides of
r (u∗), as
length r parallel to the axes. Then we let Or(u∗) be the largest regular octagon contained in S†
illustrated in the second image of Figure 6.
γ,τα
γ,τα
2), Or0 (u∗) has sides of length w and that O†
(u∗) is entirely contained in
Note that for r0 = w(1 +
R† (where R is as specified above). Now if r ≥ r0 then for 0 (cid:28) w (cid:28) n, if v ∈ C 1(u) is an α node on the
outer boundary of Or(u∗) then Ξ(N (v)) < 11/32 + 2δ < τ , and so v is hopeful. Inductively we conclude
†
that all nodes in C 1(u) ∩ O
r0+2a(u∗) are of type β by the end of stage 3w + a. Now there exists a with
C 0(u) ⊂ O
(cid:3)
†
r0+2a(u∗) ⊂ C 1(u). Since a < 2r∗w, the result follows as required.
r0
√
The following lemma completes our proof of clause (b) of Theorem 1.2.
Lemma 2.16 (Eventual conversion). Suppose that Typical vicinity and Smooth(k1, 1) both hold.
Then there exists a stage s after which u0 is always of type β.
Proof. Recall that we defined Q0 to be the m0(w)-square on the grid centred at u0, and that we defined
Q1 to be the (8w + 1)m0(w)-square on the grid centred at u0. Now we define Q2 to be the 3m0(w)-square
on the grid centred at u0. First of all we observe that we are guaranteed a large number of stages before
the existence of any unhappy β nodes in Q2. This follows because a β node which is happy in the initial
configuration, cannot become unhappy until strictly after the first stage (if such a stage exists) at which
another β node in its neighbourhood becomes unhappy. For 0 (cid:28) w (cid:28) n we have that in the initial
configuration, if m = min{u − v∞ : v ∈ Q2, u is an unhappy β node}, then m > 3wm0(w)(2w + 1).
Thus we are guaranteed not to find any unhappy β nodes in Q2 at stages prior to t∗ = 3m0(w)(2w + 1).
Applying Lemma 2.13 we conclude that for 0 (cid:28) w (cid:28) n we shall have that by stage 2r∗w + 3w all nodes
in C 0(u1) will be of type β. For 0 (cid:28) w (cid:28) n it then follows inductively, by the choice of r∗, that at each
stage < 2m0(w)(2w + 1) and after the creation of this firewall, its radius will expand by at least 1. Since
u0 − u1 < m0(w)(2w + 1) we conclude that there exists some stage after which u0 always belongs to a
(cid:3)
β-firewall of radius > r∗w centred at u1.
The proof of clause (c) of Theorem 1.2. This case is much simpler. Recall that in the proof of clause (b)
of Theorem 1.2 we chose r∗ so that certain conditions were satisfied. Now that we have τβ < 0.5 < τα,
however, we can simply choose r∗ large enough such that for 0 (cid:28) w (cid:28) n if r ≥ r∗ then for any β node
v inside a β firewall of radius rw, close enough to a half of N (v) will lie inside the firewall to ensure
20
GEORGE BARMPALIAS, RICHARD ELWES, AND ANDY LEWIS-PYE
that v is happy, and similarly any α node v(cid:48) on the outer boundary of such a firewall will be hopeful.
Such a firewall must then spread until every node is eventually contained inside it. For any > 0, if n is
sufficiently large then there will exist such a firewall in the initial configuration with probability > 1 − .
Whenever there exists such a firewall all nodes must eventually be of type β.
3. The proofs of Theorems 1.2 (d) and 1.2 (e)
In this section we work with τα, τβ > 0.5. The proofs are simple modifications of the proofs of Theorems
1.2(b) and 1.2(a). Rather than describing those proofs again in their entirety, with only small changes, we
describe the necessary modifications. Roughly speaking, the idea is that we now replace considerations as
to whether a β node u has less than proportion τβ many β nodes in its neighbourhood, with the question
as to whether it has proportion ≤ 1 − τ α many β nodes. If this holds then u is unhappy as type β, but
would be happy if it changed type (in fact we should take into account the effect of the type change of u
on the proportion, meaning that 1 − τα is not exactly the right proportion to consider but approaches it
for large w). The nodes of this type, then, will be the hopeful nodes -- and these are the nodes which may
initiate firewalls. Similarly, we replace the notion of an α-stable structure, with that of an α-intractable
structure:
Definition 3.1 (Intractable structures). We say that a set of nodes A is an α-intractable structure if it
contains β nodes, and for every β node u ∈ A, u would be unhappy (as an α node) if all nodes in ¯A∪{u}
were changed to type α.
So the point is that if a β node belongs to an α-intractable structure in the initial configuration then it
can never change type.
The proof of Theorem 1.2 (e). The proof goes through word for word the same as that of Theorem 1.2
(a), if one replaces τα, τβ everywhere with 1 − τα and 1 − τβ and if one replaces 'α-stable' or 'β-stable'
with 'β-intractable' or 'α-intractable'.
The proof of Theorem 1.2 (d). We define various events, which take the place of pnα
ruhα
τ (u) in the proof of Theorem 1.2 (b).
τ (u) and rjuα
(u), uhβ
τβ
(u),
γ,τα
• Consider the initial configuration.
If u is a β node, we let pnα
(u) be the event that there
exists some γ-partial neighbourhood of u, A say, such that u would be unhappy (as a node of
type α) if all nodes in ¯A ∪ {u} were changed to type α. Note that, roughly, this corresponds to
A containing at least (1 − τα)(2w + 1)2 many nodes of type β. We also let pnα
(u)[s] be the
corresponding event for the end of stage s, rather than the initial configuration.
γ,τα
γ,τα
• We say that hβ
τβ
(u) holds if u would be happy in the initial configuration if its type was changed
to β (or remains β if already of this type). Note that roughly this corresponds to N (u) containing
at most (1 − τβ) many nodes of type α. We say that ruhα
τ (u) holds if N (cid:5)(u) contains strictly
less than (1 − τ )(2w + 1)(3w + 1) many β nodes. We say that rjuα
τ (u) holds,
but this would no longer be true if any node of type α in N (cid:5)(u) changed type.
(u) holds, if ruhα
τ
In what follows we use the notation f (w) (cid:39) g(w) introduced in the proof of Lemma 2.2. The crucial
observation is that P(pnα
τ (u)) =
P(ruhα
1−τ (u)). We therefore have the following analogue of Lemma 2.2:
(u)) (cid:39) P(pnα
(u)) (cid:39) P(uhβ
(u)), while P(ruhα
(u)), and P(hβ
τβ
γ,1−τα
1−τβ
γ,τα
UNPERTURBED SCHELLING SEGREGATION IN 2D AND 3D
21
Lemma 3.2. Suppose that 1− κ > τα > 0.5 and τβ (cid:66) τα. Choose τ such that τβ (cid:66) τ > τα and 1− κ > τ .
2 and ζ > 1 such that for 0 (cid:28) w (cid:28) n, and for a node u selected uniformly at
Then there exists γ > 1
random, P(ruhα
τ (u)) > ζ w · P(pnα
τ (u)) > ζ w · P(hβ
(u)) and P(ruhα
(u)).
τβ
γ,τα
1−τβ
γ,1−τα
(u), uhβ
(u), ruhα
With Lemma 3.2 in place, the remainder of the proof then goes through almost identically to that for
Theorem 1.2 (b), with (for the new values τα, τβ satisfying the conditions in the statement of Theorem
1.2 (d), and for τ chosen as in Lemma 3.2), pnα
(u) taking the place of
pnα
which is chosen uniformly at random, will very probably eventually be of type α.
So we choose r∗ satisfying (†a) and (†b) of Section 1.5 and observe, in a manner entirely analogous to
what took place before, that if r ≥ r∗ then for 0 (cid:28) w (cid:28) n, any β node v on the outer boundary of a
α-firewall of radius rw at stage s will be hopeful, so long as pnα
(v)[s] does not hold. Then we define
Q0 and Q as before, but using π(w) which is now defined in terms of P(ruhα
τ (u)). Our new version of
Typical vicinity holds iff:
1−τ (u) respectively. Now, however, we look to show that u0
τ (u) and rjuα
τ
1−τ (u) and rjuα
(u), ruhα
(u), hβ
τβ
γ,τα
γ,τα
τ (u0) does not hold;
1. ruhα
2. There exists u ∈ Q0 such that ruhα
3. There does not exist any u in Q such that either of pnα
τ (u) holds;
(u) or hβ
τβ
(u) hold.
γ,τα
As before, we may conclude that if 0 (cid:28) w (cid:28) n then (our new version of) Typical vicinity fails to
hold with probability (cid:28) 0. In our new version of Definition 2.6, we replace "type α" with "type β".
In Definition 2.9 we again replace "type α" with "type β" and vice versa, and we replace τ with 1 − τ ,
so that these functions now detail the proportion of nodes of type β (rather than α as previously was
the case). In Definition 2.12 and Lemma 2.13 we replace τ and τα with 1 − τ and 1 − τα respectively
and we exchange "type α" everywhere for "type β", and vice versa. Then the proof of our new version
of Lemma 2.13 goes through as before, except that now we are inductively able to argue that all nodes
in the relevant sets Ri
j are eventually of type α, and that C 0(u) will eventually be a firewall of type α.
Finally, using the same argument as in the proof of Lemma 2.16 but using our new values of Q0, m0 and
so on, and replacing β with α, we conclude that if Typical vicinity and Smooth(k1, 1) both hold then
there exists a stage after which u0 is always of type α.
4. Modifying the proofs for the three dimensional model
First note that Theorems 1.3 (a) and 1.3 (c) can be proved exactly as in the two dimensional case, if we
simply modify all of the two dimensional notions to their three dimensional counterparts in the obvious
way. Circles are replaced by spheres and rectangles by three dimensional blocks. We also extend the
notation A† to three dimensional space in the obvious way. Then Theorems 1.3 (d) and 1.3 (e) will once
again follow by the same symmetry considerations that we applied previously in Section 3, once Theorem
1.3 (b) is established. Once again then, the bulk of the work is in establishing Theorem 1.3 (b).
To establish Theorem 1.3 (b), we can apply almost exactly the same proof as in the two dimensional
case. In that previous case, however, we worked quite hard in order to give a low value for κ, resulting
in a slightly fiddly argument for the proof of Lemma 2.13, which does not obviously extend to three
dimensional space. For the three dimensional model, we shall be a little lazy and shall work with an
analogue of the event ruhα
τ (u) which gives a value for κ∗ which could easily be improved upon, but which
allows for a very simple proof in our three dimensional counterpart to Lemma 2.13.
We redefine pnα
γ,τ (u) and uhα
τ (u) in the obvious way, and also define our analogue of ruhα
τ (u) as follows:
22
GEORGE BARMPALIAS, RICHARD ELWES, AND ANDY LEWIS-PYE
• Suppose that P is a plane passing through N †(u). Let A1 be all those points in N †(u) on or
†
i ) = γ(2w + 1)3, then
If u is an α node, we let
γ,τ (u) be the event that there exists some γ-partial neighbourhood of u which contains at
above P , and let A2 be all those points in N †(u) on or below P . If µ(A
we call Ai a γ-partial neighbourhood of u, with defining plane P .
pnα
least τ (2w + 1)3 many α nodes in the initial configuration (and similarly for β).
• We say that uhα
τ (u) holds if there are strictly less than τ (2w + 1)3 many α nodes in N (u) in the
initial configuration. If u = (x, y, z) then the extended neighbourhood of u is the set of nodes
(x(cid:48), y(cid:48), z(cid:48)) such that x − x(cid:48),y − y(cid:48)z − z(cid:48) ≤ (cid:100) 3
τ (u) holds if there are
strictly less than τ (3w + 1)3 many α nodes in the extended neighbourhood of u in the initial
configuration.
2 w(cid:101). We say that euhα
Arguing almost exactly as in the proof of Lemma 2.2, we then obtain the following three dimensional
analogue:
Lemma 4.1. Suppose that κ∗ < τα < 0.5 and τβ(cid:50) τα. Choose τ such that τβ(cid:50) τ < τα and κ∗ < τ . Then
2 and ζ > 1 such that for 0 (cid:28) w (cid:28) n, and for a node u selected uniformly at random,
τ (u)) > ζ w · P(uhβ
τβ
(u)).
there exists γ > 1
P(euhα
τ (u)) > ζ w · P(pnα
γ,τα
(u)) and P(euhα
τ (u), i.e. ejuα
τ (u) in terms of euhα
τ (u) was defined in terms of ruhα
The only significant task in modifying the proof to work in three dimensions is then in forming the
analogue of Lemma 2.13, which is now much easier. We define ejuα
τ (u), just as
τ(cid:48)(u) holds if there are less than τ(cid:48)(3w + 1)3 many α
rjuα
nodes in the extended neighbourhood of u, but changing the type of (3w + 1)2 β nodes in this extended
neighbourhood would cause this not to be the case. Rather than inductively building a sequence of larger
and larger rectangles for which all nodes will become of type β, we simply observe that satisfaction of
ejuα
τ (u) and (the three dimensional analogue of) Smoothk1,1(u) for appropriately large k1 and small 1,
suffices to ensure that all α nodes in a cube centred at u with sides of length w, are unhappy in the initial
configuration. In particular this certainly implies that all nodes in the interior of a sphere of diameter
w centred at u will be of type β by the end of stage 1. Now satisfaction of Smoothk1,1(u) suffices to
ensure that all α nodes on the outer boundary of this sphere are hopeful at the end of stage 1, and it
then follows that this sphere of β nodes will grow at subsequent stages as required.
5. Deferred proofs
5.1. The proof of Lemma 2.2. We previously defined γ-partial neighbourhoods and right-extended
neighbourhoods. It will be useful to consider also some related notions:
• By the lower neighbourhood of a node u = (x, y), denoted ln(u), we mean the set of nodes
{(x(cid:48), y(cid:48)) ∈ N (u) : y(cid:48) < y or (y(cid:48) = y & x(cid:48) ≤ x)}. If u is an α node and τ ∈ [0, 1], we let lnα
τ (u)
be the event that ln(u) contains at least τ (2w + 1)2 many α nodes in the initial configuration.
So lnα
(u) is the event that the lower neighbourhood already has enough α nodes to ensure that
τα
τ (u) denote the corresponding event when α is replaced everywhere by β.6
u is happy. We let lnβ
• Suppose that (cid:96) is any straight line passing through u. Let A1 be all those nodes in N (u) strictly
below (cid:96), and let A2 be all those nodes in N (u) strictly above (cid:96). Suppose that (cid:96) intersects the
boundary of N †(u) at x1 and x2 (ordered arbitrarily). Let (cid:96)i be the (closed) straight line segment
between xi and u. If L ⊂ N (u) is such that there exist i, j ∈ {0, 1}, L = Ai∪ ((cid:96)j ∩N (u)) then we
call L a rotated lower neighbourhood of u, with defining line (cid:96). If u is an α node and τ ∈ [0, 1], we
6One should think of ln as (standing for) l-ower n-eighbourhood, and rn as r-otated n-eighbourhood.
UNPERTURBED SCHELLING SEGREGATION IN 2D AND 3D
23
Figure 7. Lower, rotated lower and γ-partial neighbourhoods respectively.
τ (u) be the event that there exists some rotated lower neighbourhood of u which contains
let rnα
at least τ (2w + 1)2 many α nodes in the initial configuration (and similarly for β).
So the various neighbourhoods with which we are concerned are really very simple, and are depicted in
Figure 7. The lower neighbourhood is (roughly) just the bottom half of the neighbourhood, while the
rotated lower neighbourhood is just a rotation of this. Recall that a γ-partial neighbourhood of u is
just a subset of N (u) defined by a straight line, and which has measure γ(2w + 1)2. The right extended
neighbourhood results roughly from tacking on an extra half of N (u) to the right.
We prove the following for u chosen uniformly at random:
(1) τ > κ implies that there exists ζ > 1 such that for 0 (cid:28) w (cid:28) n, P(ruhα
(2) τβ (cid:67) τ implies that there exists ζ > 1 such that for 0 (cid:28) w (cid:28) n, P(ruhα
2 such that for 0 (cid:28) w (cid:28) n, P(lnα
(3) τα > τ implies that there exists γ > 1
τ (u)) > ζ w · P(lnα
τ (u)) > ζ w · P(uhβ
τ (u)) > P(pnα
γ,τα
(u)).
τ (u)).
(u)).
τβ
γ,τα
(u)).
τ (u)) > ζ w · P(pnα
2 such that for 0 (cid:28) w (cid:28) n, P(ruhα
k(cid:48)≤k b(N, k(cid:48)) and b(N,≥ k) = (cid:80)
With these facts established, (1) and (3) combined then suffice to show that, for the ζ guaranteed by (1),
there exists γ > 1
First of all we note some basic facts about the binomial distribution. Define b(N, k) = 2−N(cid:0)N
k) = (cid:80)
k(cid:48)≥k b(N, k(cid:48)). For the duration of this proof, we shall write
f (N ) (cid:39) g(N ) in order to indicate that there exist polynomials P and Q such that f (N ) · P (N ) > g(N )
and g(N ) · Q(N ) > f (N ) for all N . We also write f (N ) (cid:37) g(N ) to indicate that there exists f(cid:48) such
that f (N ) ≥ f(cid:48)(N ) for all N and f(cid:48)(N ) (cid:39) g(N ). Now it follows, by direct inspection and from standard
bounds on the tail of the binomial distribution (see for example Theorem 1.1. of [5]) that the following
hold for fixed 0 < τ1 < 0.5 < τ2 < 1 and for all integers c, d ∈ [−2, 2]:
(U1)
(U2)
b(N,≤ (cid:98)τ1N(cid:99)) (cid:39) b(N + c,≤ (cid:98)τ1N(cid:99) + d) (cid:39) b(N,(cid:98)τ1N(cid:99)) (cid:39) b(N + c,(cid:98)τ1N(cid:99) + d);
b(N,≥ (cid:98)τ2N(cid:99)) (cid:39) b(N + c,≥ (cid:98)τ2N(cid:99) + d) (cid:39) b(N,(cid:98)τ2N(cid:99)) (cid:39) b(N + c,(cid:98)τ2N(cid:99) + d).
(cid:1), b(N,≤
k
Now put N = 2w(w +1), so that (2w +1)2 = 2N +1. For τα, τ and τβ in the range given by the conditions
of the lemma, it follows from (U1) and (U2) that:
(U3)
τ (u)) (cid:39) b(N,(cid:100)2τ N(cid:101)) and P(uhβ
τ (u)) (cid:37) b(3N,(cid:100)3τ N(cid:101)), P(lnα
(u)) (cid:39) b(2N,(cid:98)τβ2N(cid:99)).
P(ruhα
τβ
Proving (1). From (U3) we get that P(ruhα
Stirling's approximation, we see that the powers of e cancel and:
τ (u))/P(lnα
τ (u))) (cid:37) b(3N,(cid:100)3τ N(cid:101))/b(N,(cid:100)2τ N(cid:101)). Applying
24
GEORGE BARMPALIAS, RICHARD ELWES, AND ANDY LEWIS-PYE
P(ruhα
τ (u))/P(lnα
Simplifying this we get:
τ (u))) (cid:37) 2N (3N )3N +0.5(2τ N )2τ N +0.5(N (1 − 2τ ))N (1−2τ )+0.5
23N (3N τ )3N τ +0.5(3N (1 − τ ))3N (1−τ )+0.5N N +0.5
τ (u)) (cid:37)(cid:16)
(1−2τ )1−2τ +1/(2N )
(cid:17)N
.
.
P(ruhα
τ (u))/P(lnα
(U4)
Now since τ > κ we have (1 − 2τ )1−2τ > 22(1−τ )τ τ (1 − τ )3(1−τ ). Thus there exists ζ > 1 so that for all
sufficiently large N the term inside the brackets in (U4) is > ζ, giving the result.
22−2τ−1/(2N )τ τ (1−τ )3(1−τ )+1/(2N )
Proving (2). From (U3) we get that P(ruhα
ing Stirling's approximation, and simplifying as before we get:
τ (u))/P(uhβ
τβ
(u)) (cid:37) b(3N,(cid:100)3τ N(cid:101))/b(2N,(cid:98)τβ2N(cid:99)). Apply-
(U5)
P(ruhα
τ (u))/P(uhβ
τβ
(u)) (cid:37)
2τβ +1/(2N )
β
(1−τβ )2(1−τβ )+1/(2N )
21−1/(2N )τ 3τ +1/(2N )(1−τ )3(1−τ )+1/(2N )
β
τ (u)) > ζ w · P(lnα
τ(cid:48)(u)). We then look to show that P(rnα
(1 − τβ)2(1−τβ ) > 2τ 3τ (1 − τ )3(1−τ ). Thus there exists ζ > 1 so that
Now since τβ (cid:67) τ we have that τ 2τβ
for all sufficiently large N the term inside the brackets in (U5) is > ζ, giving the result.
Proving (3). Choose τ(cid:48) with τ < τ(cid:48) < τα. Note first that there exists ζ > 1 such that for 0 (cid:28) w (cid:28) n,
P(lnα
τ(cid:48)(u))
-- meaning that once again there exists ζ > 1 such that for 0 (cid:28) w (cid:28) n, P(lnα
τ(cid:48)(u)). In
order to see this, observe first that each rotated lower neighbourhood of u contains precisely the same
number of nodes, and so is precisely as likely to contain τ(cid:48)(2w +1)2 many nodes of type α. As the defining
line (cid:96) rotates through an angle of 2π, each node leaves the corresponding rotated lower neighbourhood
precisely once and also joins precisely once. Thus there are at most 2(2w + 1)2 distinct rotated lower
neighbourhoods of u and the probability that at least one of them contains at least τ(cid:48)(2w + 1)2 many
nodes of type α is at most 2(2w + 1)2 times the probability that a given one does. Finally we show that,
for an appropriate choice of γ > 1
τ(cid:48)(u)). So
define:
τ(cid:48)(u)) is at most 2(2w + 1)2 · P(lnα
2 , there exists a constant c such that P(pnα
τ (u)) > ζ w · P(rnα
(u)) < c · P(rnα
γ,τα
(cid:18) τ
(cid:19)N
.
γ =
τα + τ(cid:48)
4τ(cid:48)
.
Suppose we are given that pnα
(u) holds. Given A which is a γ-partial neighbourhood of u containing at
least τα(2w + 1)2 many nodes of type α, with defining line (cid:96) say, consider a rotated lower neighbourhood
of u which is a subset of A, with defining line parallel to (cid:96). Call this rotated lower neighbourhood A0.
Let z0 be the expected number of α nodes in A0 (given the stated conditions on A), and let z1 be the
actual number of α nodes in A0. As w → ∞:
γ,τα
z0/(2w + 1)2 → z∗ :=
2τ(cid:48)τα
(τα + τ(cid:48))
,
and for any > 0, the probability that z1/(2w + 1)2 − z∗ > tends to 0. The result follows since
(2τα)/((τα + τ(cid:48))) > 1.
5.2. The proof of Lemma 2.7. If θ(w) is the proportion of the nodes in N (cid:5)(u) which are of type α
τ (u) holds, then θ(w) → τ as w → ∞. Since we consider k1 and 1 fixed it suffices to show that
when rjuα
for any > 0 and for a given A ∈ Ik1(u) the following occurs with probability > 1 − for 0 (cid:28) w (cid:28) n:
(1) If A ⊂ N (cid:5)(u) then the proportion of the nodes in A which are of type α is in the interval
[τ − 1, τ + 1].
UNPERTURBED SCHELLING SEGREGATION IN 2D AND 3D
25
(2) If A is disjoint from N (cid:5)(u) then the proportion of the nodes in A which is of type α is in the
interval [0.5 − 1, 0.5 + 1].
Now (2) follows simply from the weak law of large numbers. Also, (1) follows from Chebyshev's inequality
and standard results for the variance of a hypergeometric distribution. If φ is the proportion of the nodes
in A which are of type α then:
P(φ − θ(w) > 1/2) < A−2(1/2)−2Var(θ) = O(1)A−1.
References
[1] D.J. Amit, H. Gutfreund, and H. Sompolinsky, Spin-glass models of neural networks, Phys. Rev. A, 32, 1985.
[2] A-L. Barab´asi, R. Albert, Emergence of scaling in random networks, Science 286 (5439): 509-512, 1999.
[3] G. Barmpalias, R. Elwes, and A. Lewis-Pye. Digital morphogenesis via Schelling segregation. In 55th Annual IEEE
Symposium on Foundations of Computer Science, Oct. 18-21, Philadelphia, 2014. FOCS 2014.
[4] G. Barmpalias, R. Elwes, and A. Lewis-Pye. Tipping Points in 1-Dimensional Schelling Models with Switching Agents.
J. Stat. Phys., 158:806 -- 852, 2015.
[5] B. Bollob´as, Random Graphs, Cambridge Studies in Advanced Mathematics, 2001.
[6] C. Brandt, N. Immorlica, G. Kamath, R. Kleinberg, An Analysis of One-Dimensional Schelling Segregation, Proc. 44th
Annual ACM Symposium on Theory of Computing (STOC 2012).
[7] K. Byrka, A. Jdrzejewski, K. Sznajd-Weron, and R. Weron, 2016. Difficulty is critical: The importance of social factors
in modeling diffusion of green products and practices. Renewable and Sustainable Energy Reviews, 62, pp.723-735.
[8] A. Canning and J-P. Naef, Phase Diagrams and the Instability of the Spin Glass States for the Diluted Hopfield Neural
Network Model, J. Phys 1, France 2, p.1791, 1992.
[9] I. P. Castillo and N.S. Skantzos, The Little-Hopfield model on a sparse random graph, J. Phys. A: Math. Gen. 37
(2004) 9087 -- 9099.
[10] L. Dall'Asta, C. Castellano, M. Marsili, Statistical physics of the Schelling model of segregation, J. Stat. Mech, 7, 2008.
[11] L. Gauvin, J. Vannemenus, J.-P. Nadal, Phase diagram of a Schelling segregation model, European Physical Journal
B, 70, 293 -- 304, 2009.
[12] A. D. Henry, P. Pra(cid:32)lat, and C. Zhang, Emergence of segregation in evolving social networks. Proceedings of the National
Academy of Sciences, 108(21):8605-8610, May 2011.
[13] J.J. Hopfield, Neural networks and physical systems with emergent collective computational abilities, Proceedings of
the National Academy of Sciences, vol. 79 no. 8 pp. 2554 -- 2558, April 1982.
[14] J. Kleinberg, Cascading Behavior in Networks: Algorithmic and Economic Issues, Algorithmic Game Theory, N. Nisan,
T. Roughgarden, E. Tardos, V. Vazirani, eds., Cambridge University Press, 2007.
[15] G. ´Odor, Self-organising, two temperature Ising model describing human segregation, International journal of modern
physics C, 3, 393 -- 398, 2008.
[16] R. Pancs and N. Vriend, Schellings spatial proximity model of segregation revisited, Journal of Public Economics,
91(1-2):1-24, 2007.
[17] M. Pollicott, and H. Weiss, The dynamics of Schelling-type segregation models and a non-linear graph Laplacian
variational problem, Adv. Appl. Math., 27, 17-40, 2001.
[18] T. Schelling, Models of segregation, The American Economic Review, pages 488-493, 1969.
[19] T. Schelling, Micromotives and Macrobehavior, New York, Norton, 1978.
[20] Schuman, H., C. Steeh, L. Bobo, and M. Krysan. 1997. Racial Attitudes in America: Trends and Interpretations
(revised edition). Cambridge, MA: Harvard University Press.
[21] D. Stauffer and S. Solomon, Ising, Schelling and self-organising segregation, European Physical Journal B, 57, 473 -- 479,
2007.
[22] D. Vinkovi´c and A. Kirman, A Physical Analogue of the Schelling Model, Proceedings of the National Academy of
Sciences, no. 51, volume 103, 19261-19265, 2006.
[23] D.J. Watts, S.H. Strogatz, Collective dynamics of 'small-world' networks, Nature, 393 (6684): 440-442, 1998.
[24] N.C. Wormald, Differential equations for random processes and random graphs, Annals of Applied Probability, 5:1217-
1235, 1995.
[25] H.P. Young, Individual Strategy and Social Structure: An Evolutionary Theory of Institutions. Princeton, NJ: Prince-
ton University Press, 1998.
[26] J. Zhang, A dynamic model of residential segregation, Journal of Mathematical Sociology, 28(3):147 -- 170, 2004.
[27] J. Zhang, Residential segregation in an all-integrationist world, Journal of Economic Behavior & Organization,
54(4):533-550, 2004.
26
GEORGE BARMPALIAS, RICHARD ELWES, AND ANDY LEWIS-PYE
[28] J. Zhang, Tipping and residential segregation: A unified Schelling model, Journal of Regional Science, 51:167-193,
Feb. 2011.
George Barmpalias: (1) State Key Lab of Computer Science, Institute of Software, Chinese Academy of
Sciences, Beijing 100190, China and (2) School of Mathematics, Statistics and Operations Research, Victoria
University, Wellington, New Zealand
E-mail address: [email protected]
URL: http://barmpalias.net
Richard Elwes, School of Mathematics, University of Leeds, LS2 9JT Leeds, U.K.
E-mail address: [email protected]
URL: http://richardelwes.co.uk
Andy Lewis-Pye, Mathematics, Columbia House, London School of Economics, WC2A 2AE, London, U.K.
E-mail address: [email protected]
URL: http://aemlewis.co.uk
|
1107.4153 | 1 | 1107 | 2011-07-21T04:15:25 | Performance and Convergence of Multi-user Online Learning | [
"cs.MA",
"cs.LG"
] | We study the problem of allocating multiple users to a set of wireless channels in a decentralized manner when the channel quali- ties are time-varying and unknown to the users, and accessing the same channel by multiple users leads to reduced quality due to interference. In such a setting the users not only need to learn the inherent channel quality and at the same time the best allocations of users to channels so as to maximize the social welfare. Assuming that the users adopt a certain online learning algorithm, we investigate under what conditions the socially optimal allocation is achievable. In particular we examine the effect of different levels of knowledge the users may have and the amount of communications and cooperation. The general conclusion is that when the cooperation of users decreases and the uncertainty about channel payoffs increases it becomes harder to achieve the socially opti- mal allocation. | cs.MA | cs |
Performance and Convergence of Multi-user
Online Learning
Cem Tekin and Mingyan Liu
Department of Electrical Engineering and Computer Science
University of Michigan, Ann Arbor, Michigan, 48109-2122
{cmtkn, mingyan}@umich.edu
Abstract. We study the problem of allocating multiple users to a set
of wireless channels in a decentralized manner when the channel quali-
ties are time-varying and unknown to the users, and accessing the same
channel by multiple users leads to reduced quality due to interference.
In such a setting the users not only need to learn the inherent channel
quality and at the same time the best allocations of users to channels
so as to maximize the social welfare. Assuming that the users adopt a
certain online learning algorithm, we investigate under what conditions
the socially optimal allocation is achievable. In particular we examine
the effect of different levels of knowledge the users may have and the
amount of communications and cooperation. The general conclusion is
that when the cooperation of users decreases and the uncertainty about
channel payoffs increases it becomes harder to achieve the socially opti-
mal allocation.
Keywords: multi-user learning, multi-armed bandits, spectrum sharing, con-
gestion games
1
Introduction
In this paper we study the dynamic spectrum access and spectrum sharing prob-
lem in a learning context. Specifically, we consider a set of N common channels
shared by a set of M users. A channel has time varying rate r(t), and its statis-
tics are not completely known by the users. Thus each user needs to employ
some type of learning to figure out which channels are of better quality, e.g., in
terms of their average achievable rates. At the same time, simultaneous use of
the same channel by multiple users will result in reduced rate due to interference
or collision. The precise form of this performance degradation may or may not
be known to the user. Thus the users also need to use learning to avoid excess
interference or congestion. Furthermore, each user may have private information
that is not shared, e.g., users may perceive channel quality differently due to
difference in location as well as individual modulation/coding schemes.
Without a central agent, and in the presence of information decentralization
described above, we are interested in the following questions: (1) for a given
common learning algorithm, does the multiuser learning process converge, and
(2) if it does, what is the quality of the equilibrium point with respect to a
globally optimal spectrum allocation scheme, one that could be computed for a
global objective function with full knowledge of channel statistics as well as the
users' private information.
A few recent studies have addressed these questions in some special cases.
For instance, in [3] it was shown that learning using a sample-mean based index
policy leads to a socially optimal (sum of individual utilities) allocation when
channels evolve as iid processes and colliding players get zero reward provided
that this optimal allocation is such that each user occupies one of the M best
channels (in terms of average rates). This precludes the possibility that not all
users may have the same set of M best channels, and that in some cases the best
option is for multiple users to share a common channel, e.g., when N < M .
In this study we investigate under what conditions the socially optimal al-
location is achievable by considering different levels of communication (or coop-
eration) allowed among users, and different levels of uncertainty on the channel
statistics. The general conclusion, as intuition would suggest, is that when the
cooperation of users increases and the channel uncertainty decreases it becomes
easier to achieve the socially optimal welfare. Specifically, we assume that the
rate (or reward) user i gets from channel j at time t is of the form rj (t)gj(nj(t))
where rj (t) is the rate of channel j at time t, nj(t) is the number of users using
channel j at time t, and gj is the user independent interference function (IF) for
channel j. This model is richer than the previously used models [3,14,16] since
rj(t) can represent environmental effects such as fading or primary user activity,
while gj captures interactions between users. We consider the following three
cases.
In the first case (C1), each channel evolves as an iid random process in time,
the users do not know the channel statistics, nor the form of the interference, nor
the total number of users present in the system, and no direct communication
is allowed among users. A user can measure the overall rate it gets from using
a channel but cannot tell how much of it is due to the dynamically changing
channel quality (i.e., what it would get if it were the only user) vs. interference
from other users. In this case, we show that if all users follow the Exp3 algorithm
[7] then the channel allocation converges to a set of pure Nash equilibria (PNE)
of a congestion game defined by the IFs and mean channel rates. In this case a
socially optimal allocation cannot be ensured, as the set of PNE are of different
quality, and in some cases the socially optimal allocation may not be a PNE.
In the second case (C2), each channel again evolves as an iid random process
in time, whose statistics are unknown to the user. However, the users now know
the total number of users in the system, as well as the fact that the quantitative
impact of interference is common to all users (i.e., user independent), though
the actual form of the interference function is unknown. In other words the rate
of channel j at time t is perceived by user i as hj(t, nj(t)) so user i cannot
distinguish between components rj (t) and gj(nj(t)). Furthermore, users are now
allowed minimal amount of communication when they happen to be in the same
channel, specifically to find out the total number of simultaneous users of that
channel. In this case we present a sample-mean based randomized learning policy
that achieves socially optimal allocation as time goes to infinity, with a sub-linear
regret over the time horizon with respect to the socially optimal allocation.
In the third case (C3), as in case (C2) the users know the total number
of users in the system, as well as the fact that the IF is user independent and
decreasing without knowing the actual form of the IF. However, the channels are
assumed to have constant, albeit unknown, rates. We show that even without
any communication among users, there is a randomized learning algorithm that
achieves the socially optimal allocation in finite time.
It's worth pointing out that in the settings outlined above, the users are
non-strategic, i.e., each user simply follow a pre-set learning rule rather than
playing a game. In this context it is reasonable to introduce minimal amount of
communication among users and assume they may cooperate. It is possible that
even in this case the users may not know their IF but only the total rate they
get for lack of better detecting capabilities (e.g., they may only be able to detect
the total received SNR as a result of channel rate and user interference).
Online learning by a single user was studied by [1,4,6,15], in which sample-
mean based index policies were shown to achieve logarithmic regret with respect
to the best single-action policy without a priori knowledge of the statistics, and
are order-optimal, when the rewards are given by an iid process. In [5,21,22]
Markovian rewards are considered, with [22] focusing on restless reward pro-
cesses, where a process continues to evolve according to a Markov chain regard-
less of the users' actions. In all these studies learning algorithms were developed
to achieve logarithmic regret. Multi-user learning with iid reward processes have
been studied in a dynamic spectrum context by [3,11,16], with a combinatorial
structure adopted in [11], and with collision and random access models in [3,16].
In [13], convergence of multi-user learning with Exp3 algorithm to pure Nash
equilibrium is investigated under the collision and fair sharing models. In the col-
lision model, when there is more than one user on a channel all get zero reward,
whereas in the random access model one of them, selected randomly, gets all the
reward while others get zero reward. In the fair sharing model, a user's utility is
inversely proportional to the number of users who are on the same channel with
the user. Note that these models do not capture more sophisticated communi-
cation schemes where the rate a user gets is a function of the received SNR of
the form gj(n) = fj(
) = where Pt is the nominal transmit power of
all users and N0 the noise. Moreover, in the above studies the socially optimal
allocation is a rather simple one: it is the orthogonal allocation of users to the
first M channels with the highest mean rewards. By contrast, we model a more
general interference relationship among users, in which an allocation with users
sharing the same channel may be the socially optimal one. The socially optimal
allocations is not trivial in this case and additional mechanisms may be needed
for the learning algorithms to converge.
N0+(n−1)Pt
Pt
All of the above mentioned work assumes some level of communication be-
tween the users either at the beginning or during the learning. If we assume
no communication between the users, achieving the socially optimal allocation
seems very challenging in general. Then one may ask if it is possible to achieve
some kind of equilibrium allocation. Kleinberg et. al. [14] showed that it is pos-
sible for the case when the channel rates are constant and the users do not
know the IFs. They show that when the users use aggregate monotonic selection
dynamics, a variant of Hedge algorithm [10], the allocation converges to weakly
stable equilibria which is a subset of Nash equilibria (NE) of the congestion game
defined by the IFs. They show that for almost all congestion games weakly stable
equilibria is the same as PNE.
Other than the work described above [2] considers spatial congestion games, a
generalization of congestion games and gives conditions under which there exists
a PNE and best-response play converges to PNE. A mechanism design approach
for socially optimal power allocation when users are strategic is considered in
[12].
The organization of the remainder of this paper is as follows. In Sect. 2 we
present the notations and definitions that will be used throughout the paper.
In Sects. 3, 4, 5 we analyze the cases stated in (C1), (C2), (C3) and derive the
results respectively. Conclusion and future research is given in Sect. 6.
2 Preliminaries
Denote the set of users by M = {1, 2, . . . , M }, and the set of channels N =
{1, 2, . . . , N }. Time is slotted and indexed by t = 1, 2, . . . and a user can select
a single channel at each time step t. Without loss of generality let rj(t) ∈ [0, 1]
be the rate of channel j at time t such that {rj(t)}t=1,2,... is generated by an
iid process with support [0, 1] and mean µj ∈ [0, 1]. Let gj : N → [0, 1] be the
interference function (IF) on channel j where gj(n) represents the interference
when there are n users on channel j. We express the rate of channel j seen by
a user as hj(t) = rj(t)gj(nj (t)) when a user does not know the total number of
users nj(t) using channel j at time t as in cases (C1) and (C3). When a user knows
nj(t), we express the rate of channel j at time t as hj,nj (t)(t) = rj(t)gj(nj(t)) as
in case (C2). Let Si = N be the set of feasible actions of user i and σi ∈ Si be the
action, i.e., channel selected by user i. Let S = S1 × S2 × . . . × SN = N M be the
set of feasible action profiles and σ = {σ1, σ2, . . . , σM } ∈ S be the action profile
of the users. Throughout the discussion we assume that the action of player i at
time t, i.e., σπi
i (t) is determined by the policy πi. When πi is deterministic, πi(t)
is in general a function from all past observations and decisions of user i to the set
of actions Si. When πi is randomized, πi(t) generates a probability distribution
over the set of actions Si according to all past observations and decisions of user
i from which the action at time t is sampled. Since the dependence of actions to
the policy is trivial we use σi(t) to denote the action of user i at time t, dropping
the superscript πi.
Let Kj(σ) be the set of users on channel j when the action profile is σ. Let
j=1 µjKj(σ)gj (Kj(σ))
be the set of socially optimal allocations and denote by σ∗ any action profile
i=1 µσi gσi(Kσi (σ)) = arg maxσ∈SPN
A∗ = arg maxσ∈SPM
i=1 µσ∗
i gσ∗
i (Kσ∗
PM
that is in the set A∗. Let v∗ denote the socially optimal welfare, i.e., v∗ =
j denote the payoff a user gets from channel j
under the socially optimal allocation, i.e., v∗
j = µjgj(Kj(σ∗)) if Kj(σ∗) 6= 0.
Note that any permutation of actions in σ∗ is also a socially optimal allocation
since IFs are user-independent.
i (σ∗)) and v∗
For any policy π, the regret at time n is
R(n) = nv∗ − E" n
Xt=1
M
Xi=1
rσi(t)(t)gσi(t)(Kσi(t)(σ(t)))# ,
where expectation is taken with respect to the random nature of the rates and
the randomization of the policy. Note that for a deterministic policy expectation
is only taken with respect to the random nature of the rates. For any randomized
policy πi, let pi(t) = (pi1(t), pi2(t), . . . , piN (t)) be the mixed strategy of user i at
time t, i.e., a probability distribution on {1, 2, . . . , N }. For a profile of policies
π = [π1, π2, . . . , πM ] for the users let p(t) = (p1(t)T , p2(t)T , . . . pM (t)T )T be
the profile of mixed strategies at time t, where pi(t)T is the transpose of pi(t).
Then σi(t) is the action sampled from the probability distribution pi(t). The
dependence of p to π is trivial and not shown in the notation.
3 Allocations Achievable with Exp3 Algorithm (Case 1)
We start by defining a congestion game. A congestion game [17,18] is given by
the tuple (M, N , (Σi)i∈M, (hj)j∈N ), where M denotes a set of players (users),
N a set of resources (channels), Σi ⊂ 2N the strategy space of player i, and
hj : N → R a payoff function associated with resource j, which is a function of
the number of players using that resource. It is well known that a congestion
game has a potential function and the local maxima of the potential function
corresponds to PNE, and every sequence of asynchronous improvement steps is
finite and converges to PNE.
In this section we relate the strategy update rule of Exp3 [7] under assump-
tions (C1) to a congestion game. Exp3 as given in Fig. 1 is a randomized al-
gorithm consisting of an exploration parameter γ and weights wij that depend
exponentially on the past observations where i denotes the user and j denotes
the channel. Each user runs Exp3 independently but we explicitly note the user
dependence because a user's action affects other users' updates.
At any time step before the channel rate and user actions are drawn from
the corresponding distributions, let Rj denote the random variable correspond-
ing to the reward of the jth channel. Let Gij = gj(1 + K ′
j(i)) be the random
variable representing the payoff user i gets from channel j where K ′
j(i) is the
random variable representing the number of users on channel j other than user
i. Let Uij = RjGij and ¯uij = Ej[E−i[Uij]] be the expected payoff to user i by
using channel j where E−i represents the expectation taken with respect to the
randomization of players other than i, Ej represents the expectation taken with
respect to the randomization of the rate of channel j. Since the channel rate is
independent of users' actions ¯uij = µj ¯gij where ¯gij = E−i[Gij ].
Exp3 (for user i)
1: Initialize: γ ∈ (0, 1), wij (t) = 1, ∀j ∈ N , t = 1
2: while t > 0 do
3:
pij(t) = (1 − γ)
wij (t)
l=1 wil(t)
+
γ
N
PN
Sample σi(t) from the distribution on pi(t) = [pi1(t), pi2(t), . . . , piN (t)]
Play channel σi(t) and receive reward hσi(t)(t)
for j = 1, 2, . . . , N do
if j = σi(t) then
pij (t)N (cid:17)
Set wij (t + 1) = wij (t) exp(cid:16) γhσi(t)(t)
Set wij (t + 1) = wij (t)
4:
5:
6:
7:
8:
else
9:
10:
end if
11:
end for
12:
t = t + 1
13:
14: end while
Fig. 1. pseudocode of Exp3
Lemma 1. Under (C1) when all players use Exp3, the derivative of the continuous-
time limit of Exp3 is the replicator equation given by
ξij =
1
N
(µjpij)
N
Xl=1
pil(¯gij − ¯gil) .
Proof. Note that
(1 − γ)wij (t) =
N
Xl=1
wil(t)(cid:16)pij(t) −
γ
N(cid:17) .
(1)
We consider the effect of user i's action σi(t) on his probability update on channel
j. We have two cases: σi(t) = j and σi(t) 6= j. Let Aγ,t
pij (t)N(cid:17).
i,j = exp(cid:16) γUij (t)
Consider the case σi(t) = j.
pij (t + 1) =
(1 − γ)wij(t)Aγ,t
i,j
PN
l=1 wil(t) + wij (t)(cid:0)Aγ,t
i,j − 1(cid:1)
+
γ
N
.
(2)
Substituting (1) into (2)
pij(t + 1) =
=
+
γ
N
N
PN
l=1 wil(t)(cid:0)pij (t) − γ
l=1 wil(t)(cid:16)1 + pij (t)− γ
PN
N(cid:1) Aγ,t
(cid:0)pij(t) − γ
(cid:0)Aγ,t
i,j − 1(cid:1)
1 + pij (t)− γ
1−γ
1−γ
+
i,j
N
i,j
N(cid:1) Aγ,t
i,j − 1(cid:1)(cid:17)
(cid:0)Aγ,t
γ
N
.
The continuous time process is obtained by taking the limit γ → 0, i.e., the
rate of change in pij with respect to γ as γ → 0. Then, dropping the discrete
time script t,
i,j − 1(cid:1)(cid:17)
N
N
pij N Aγ,t
i,j +(cid:0)pij − γ
i,j (cid:16) pij − 1
N(cid:1) Aγ,t
(cid:16)1 + pij − γ
i,j(cid:17)(cid:16)1 + pij − γ
N(cid:1) Uij
1−γ (cid:0)Aγ,t
i,j − 1(cid:1)(cid:17)2
(cid:16)1 + pij − γ
1−γ (cid:0)Aγ,t
i,j + pij − 1
i,j(cid:1)(cid:17)
1−γ (cid:0) γ
i,j − 1(cid:1)(cid:17)2
1−γ (cid:0)Aγ,t
(1−γ)2 Aγ,t
N Aγ,t
1
N
+
N
N
N
pij = lim
γ→0
dpij
dγ
N Aγ,t
γ→0(cid:16) −1
= lim
+ (cid:0)pij − γ
Uij(1 − pij)
.
=
N
pij (t + 1) =
Consider the case σi(t) = k 6= j. Then,
Thus
pij = lim
γ→0
(1 − γ)wij (t)
−1
+
N
=
1−γ
pij(t) − γ
N
l=1 wil(t) + wik(t)(cid:16)Aγ,t
PN
1 + pik(t)− γ
(cid:16)Aγ,t
i,k − 1(cid:17)
N (cid:16)1 + pik− γ
i,k − 1(cid:17)(cid:17)
1−γ (cid:16)Aγ,t
i,k − 1(cid:17)(cid:17)2
(cid:16)1 + pik− γ
1−γ (cid:16)Aγ,t
i,k + pik− 1
N(cid:1)(cid:16) pik− 1
1−γ (cid:16) γ
(1−γ)2 Aγ,t
i,k − 1(cid:17)(cid:17)2
(cid:16)1 + pik− γ
1−γ (cid:16)Aγ,t
N
N
N
N
N
+ (cid:0)pij − γ
= −
pikUik
N
.
+
γ
N
i,k − 1(cid:17)
γ
N
.
i,k(cid:17)(cid:17)
N Aγ,t
+
1
N
(3)
(4)
Then from (3) and (4), the expected change in pij with respect to the prob-
ability distribution pi of user i over the channels is
¯pij = Ei[ pij] =
1
N
pij Xl∈N −{j}
pil(Uij − Uil).
Taking the expectation with respect to the randomization of channel rates and
other users' actions we have
ξij = Ej[E−i[¯pij ]]
=
=
1
N
1
N
pij Xl∈N −{j}
Xl=1
(µjpij)
N
pil (Ej[E−i[Uij]] − Ej[E−i[Uil]])
pil(¯gij − ¯gil) .
⊓⊔
Lemma 1 shows that the dynamics of a user's probability distribution over the
actions is given by a replicator equation which is commonly studied in evolu-
tionary game theory [19,20]. With this lemma we can establish the following
theorem.
Theorem 1. For all but a measure zero subset of [0, 1]2N from which the µj's
and gj's are selected, when γ in Exp3 is arbitrarily small, the action profile
converges to the set of PNE of the congestion game (M, N , (Si)i∈M, (µjgj)j∈N ).
Proof. Because the replicator equation in Lemma 1 is identical to the replicator
equation in [14], the proof of converge to PNE follows from [14]. Here, we briefly
explain the steps in the proof. Defining the expected potential function to be
the expected value of the potential function φ where expectation is taken with
respect to the user's randomization one can show that the solutions of the repli-
cator equation converges to the set of fixed points. Then the stability analysis
using the Jacobian matrix yields that every stable fixed point corresponds to a
Nash equilibrium. Then one can prove that for any stable fixed point the eigen-
values of the Jacobian must be zero. This implies that every stable fixed point
corresponds to a weakly stable Nash equilibrium strategy in the game theoretic
sense. Then using tools from algebraic geometry one can show that almost every
weakly stable Nash equilibrium is a pure Nash equilibrium of the congestion
game.
We also need to investigate the error introduced by treating the discrete time
update rule as a continuous time process. However, by taking γ infinitesimal
we can approximate the discrete time process by the continuous time process.
For a discussion when γ is not infinitesimal one can define approximately stable
⊓⊔
equilibria [14].
The main difference between Exp3 and Hedge [14] is that in Exp3 users
do not need to observe the payoffs from the channels that they do not select,
whereas Hedge assumes complete observation. In addition to that, we considered
the dynamic channel rates which is not considered in [14].
4 An Algorithm for Socially Optimal Allocation with
Sub-linear Regret (Case 2)
2M −1+2γ
2M
tations so k∗ = arg maxk∈KPN
µjgj(kj). Then the stability condition says that arg maxk∈KPN
In this section we propose an algorithm whose regret with respect to the so-
cially optimal allocation is O(n
) for γ > 0 arbitrarily small. Clearly
this regret is sublinear and approaches linear as the number of users M in-
creases. This means that the time average of the sum of the utilities of the play-
ers converges to the socially optimal welfare. Let K = {k = (k1, k2, . . . , kN ) :
kj ≥ 0, ∀j ∈ N , k1 + k2 + . . . + kN = M } denote an allocation of M users
to N channels. Note that this allocation gives only the number of users on
each channel. It does not say anything about which user uses which chan-
nel. We assume that the socially optimal allocation is unique up to permu-
j=1 µjkjgj(kj) is unique. We also assume the
following stability condition of the socially optimal allocation. Let vj(kj ) =
j=1 kj vj(kj ) = k∗
if vj (k) − vj (k) ≤ ǫ, ∀k ∈ {1, 2, . . . , M }, ∀j ∈ N , for some ǫ > 0, where
vj : N → R is an arbitrary function. Let T i
j,k(t) be the number of times user
i used channel j and observed k users on it up to time t. We refer to the
tuple (j, k) as an arm. Let ni
j,k(t) be the time of the tth observation of user
i from arm (j, k). Let ui
j,k(t) be the sample mean of the rewards from arm
(j, k) seen by user i at the end of the tth play of arm (j, k) by user i, i.e.,
ui
j,k(t) = (hj,k(ni
j,k(t)))/t. Then the socially optimal allo-
j,k(t). The
pseudocode of the Randomized Learning Algorithm (RLA) is given in Fig. 2. At
time t RLA explores with probability 1/(t
M ) by randomly choosing one of
the channels and exploits with probability 1 − 1/(t
M ) by choosing a channel
which is occupied by a user in the estimated socially optimal allocation.
j,k(1)) + . . . + hj,k(ni
cation estimated by user i at time t is ki∗(t) = arg maxk∈KPN
1
j=1 kjui
1
2M − γ
2M − γ
The following will be useful in the proof of the main theorem of this section.
Lemma 2. Let Xi, i = 1, 2, . . . be a sequence of independent Bernoulli random
variables such that Xi has mean qi with 0 ≤ qi ≤ 1. Let ¯Xk = 1
i=1 Xi ,
¯qk = 1
i=1 qi. Then for any constant ǫ ≥ 0 and any integer n ≥ 0,
k Pk
kPk
Proof. The result follows from symmetry and [9].
P(cid:0) ¯Xn − ¯qn ≤ −ǫ(cid:1) ≤ e−2nǫ2
.
Lemma 3. For p > 0, p 6= 1
(n + 1)1−p − 1
1 − p
<
n
Xt=1
1
tp < 1 +
n1−p − 1
1 − p
Proof. See [8].
(5)
⊓⊔
(6)
⊓⊔
RLA (for user i)
1: Initialize: 0 < γ << 1, ui
sample σi(1) uniformly from N .
j,k(1) = 0, T i
j,k(1) = 0, ∀j ∈ N , k ∈ M, t = 1,
2: while t > 0 do
3:
play channel σi(t), observe l(t) the total number of players using channel
σi(t) and reward hσi(t),l(t)(t).
Set T i
Set T i
j,l(t) for (j, l) 6= (σi(t), l(t)).
σi(t),l(t)(t) + 1.
σi(t),l(t)(t + 1) = T i
j,l(t + 1) = T i
σi(t),l(t)(t + 1) =
j,l(t + 1) = ui
Set ui
Set ui
σi(t),l(t) (t)ui
T i
σi(t),l(t) (t)+hσi(t),l(t) (t)
T i
σi (t),l(t)(t+1)
.
j,l(t) for (j, l) 6= (σi(t), l(t)).
Set ki∗(t + 1) = arg maxk∈KPN
j=1 kjui
j,kj (t + 1).
Set θ∗i(t+1) to be the set of channels used by at least one user in k∗i(t+1).
10: Draw it randomly from Bernoulli distribution with P (it = 1) =
1
4:
5:
6:
7:
8:
9:
if σi(t) ∈ θ∗(t + 1) and l(t) = ki∗
j (t + 1) then
σi(t + 1) = σi(t)
σi(t+1) is selected uniformly at random from the channels in θ∗(t+1).
Draw σi(t + 1) uniformly at random from N .
t(1/2M )−γ/M
if it = 0 then
else
11:
12:
13:
14:
15:
16:
17:
18:
end if
19:
t = t + 1
20:
21: end while
end if
else
Fig. 2. pseudocode of RLA
Theorem 2. When all players use RLA the regret with respect to the socially
optimal allocation is O(n
) where γ can be arbitrarily small.
2M −1+2γ
2M
Proof. Let H(t) be the event that at time t there exists at least one user that
computed the socially optimal allocation incorrectly. Let ω be a sample path.
Then
I(ω ∈ H(t)) ≤
n
(n,M,N,M)
Xt=1
X(t,i,j,l)=(1,1,1,1)
≤
n
M
Xt=1
Xi=1
I(k∗i(t) 6= k∗)
I(ui
j,l(T i
j,l(t)) − vj(l) ≥ ǫ)
(n,M,N,M)
+
=
(n,M,N,M)
X(t,i,j,l)=(1,1,1,1)
X(t,i,j,l)=(1,1,1,1)
j,k(t) =q a ln t
I(cid:18)ui
I(cid:18)ui
j,k(t) . Then T i
T i
j,l(T i
j,l(t)) − vj(l) ≥ ǫ, T i
j,l(t) ≥
j,l(T i
j,l(t)) − vj(l) ≥ ǫ, T i
j,l(t) <
(7)
a ln t
ǫ2 (cid:19)
ǫ2 (cid:19)
j,k(t) = ǫi
a ln t
Let ǫi
fore,
I(cid:18)ui
I(cid:18)ui
j,l(T i
j,l(t)) − vj (l) ≥ ǫ, T i
j,l(t) ≥
j,l(T i
j,l(t)) − vj(l) ≥ ǫi
j,l(T i
j,l(t)) − vj (l) ≥ ǫ, T i
j,l(t) <
j,k(t) ≥ a ln t
ǫ2 ⇒ ǫ ≥ q a ln t
T i
j,k(t). There-
a ln t
ǫ2 (cid:19) ≤ I(cid:0)ui
ǫ2 (cid:19) ≤ I(cid:18)T i
a ln t
j,l(t) <
a ln t
ǫ2 (cid:19)
j,l(t)(cid:1)
Then, continuing from (7),
n
(n,M,N,M)
I(ω ∈ H(t))
Xt=1
X(t,i,j,l)=(1,1,1,1)(cid:18)I(cid:0)ui
≤
j,l(T i
j,l(t)) − vj (l) ≥ ǫi
j,l(t)(cid:1) + I(cid:18)T i
j,l(t) <
a ln t
ǫ2 (cid:19)(cid:19)(8)
Taking the expectation over (8),
(n,M,N,M)
E" n
Xt=1
X(t,i,j,l)=(1,1,1,1)
X(t,i,j,l)=(1,1,1,1)
I(ω ∈ H(t))#
P(cid:0)ui
P(cid:18)T i
(n,M,N,M)
j,l(T i
j,l(t)) − vj(l) ≥ ǫi
j,l(t)(cid:1)
j,l(t) <
a ln t
ǫ2 (cid:19) .
(9)
≤
+
We have
j,l(t)) − vj (l) ≥ ǫi
j,l(t)) − vj(l) ≥ ǫi
j,l(t))
− vj(l) ≥ ǫi
j,l(T i
j,l(T i
j,l(T i
T i
j,l(t)
2(T i
P (cid:0)ui
= P (cid:0)ui
= P Si
≤ 2 exp −
j,l(t))2
j,l(t))2(ǫi
T i
j,l(t)
j,l(T i
j,l(t)(cid:1)
j,l(t)(cid:1) + P (cid:0)ui
j,l(t)! + P Si
! = 2 exp −
j,l(t)) − vj(l) ≤ −ǫi
j,l(T i
T i
j,l(t)
j,l(t))
− vj (l) ≤ −ǫi
j,l(t)(cid:1)
j,l(t)!
2T i
j,l(t)a ln t
T i
j,l(t) ! =
2
t2a ,
(10)
where (10) follows from the Chernoff-Hoeffding inequality.
Now we will bound P(cid:16)T i
j,l(t) be the number of time
steps in which player i played channel j and observed l users on channel j in the
time steps where all players randomized up to time t. Then
ǫ2 (cid:17). Let T Ri
j,l(t) < a ln t
{ω : T i
j,l(t) <
a ln t
ǫ2 } ⊂ {ω : T Ri
j,l(t) <
a ln t
ǫ2 },
Thus
P (cid:18)T i
j,l(t) <
a ln t
ǫ2 (cid:19) ≤ P(cid:18)T Ri
j,l(t) <
(11)
(12)
a ln t
ǫ2 (cid:19) .
Now we define new Bernoulli random variables X i
j,l(s) = 1
if all players randomize at time s and player i selects channel j and observes l
players on it according to the random draw. X i
j,l(t) =
j,l(s) = 0 else. Then T Ri
j,l(s) as follows: X i
j,l(s) = 1) = ρspl where pl =
(M −1
l−1 )(M +N −l−2
)
N −2
(M +N −1
N −1 )
and ρs =
1
s(1/2)−γ Then
s=1
j,l(t) <
a ln t
ǫ2 (cid:19)
s=1 X i
1
j,l(s). P (X i
Pt
s(1/2)−γ . Let st =Pt
P (cid:18)T Ri
= P T Ri
≤ P T Ri
j,l(t)
t
j,l(t)
t
−
−
pkst
t
pkst
t
<
<
a ln t
tǫ2 −
pkst
t !
a ln t
tǫ2 −
pk(t + 1)(1/2)+γ − 1
t((1/2) + γ)
! ,
(13)
where (13) follows from Lemma 3. Let τ (M, N, ǫ, γ, γ′, a) be the time that for
all k ∈ {1, 2, . . . , M }.
pk(t + 1)(1/2)+γ − 1
t((1/2) + γ)
−
a ln t
tǫ2 ≥ t(1/2)+γ ′
,
(14)
where 0 < γ′ < γ. Then for all t ≥ τ (M, N, ǫ, γ, γ′, a) (14) will hold since RHS
increases faster than LHS. Thus we have for t ≥ τ (M, N, ǫ, γ, γ′, a)
P T Ri
≤ P T Ri
j,l(t)
t
j,l(t)
t
−
−
pkst
t
pkst
t
≤ e−2tt2γ ′
−1
= e−2t2γ ′
<
a ln t
tǫ2 −
pk(t + 1)(1/2)+γ − 1
t((1/2) + γ)
!
< t−(1/2)+γ ′!
1
t2 .
≤ e−2 ln t =
Let a = 1. Then continuing from (9) by substituting (10) and (15) we have
E" n
Xt=1
I(ω ∈ H(t))# ≤ M 2N τ (M, N, ǫ, γ, γ′, 1) + 3
1
t2! .
n
Xt=1
(15)
(16)
Thus we proved that the expected number of time steps in which there exists
at least one user that computed the socially optimal allocation incorrectly is
finite. Note that because RLA explores with probability
t1/2M −γ/M , the expected
number of time steps in which all the players are not randomizing up to time n
is
1
n
Xt=1 1 −(cid:18)1 −
1
t(1/2M)−γ/M(cid:19)M! ≤
n
Xt=1
M
t1/2M−γ/M = O(n
2M −1+2γ
2M
).
(17)
Note that players can choose γ arbitrarily small, increasing the finite regret due
to τ (M, N, ǫ, γ, γ′, 1). Thus if we are interested in the asymptotic performance
then γ > 0 can be arbitrarily small.
Now we do the worst case analysis. We classify the time steps into two. Good
time steps in which all the players know the socially optimal allocation correctly
and none of the players randomize excluding the randomizations done for settling
down to the socially optimal allocation. Bad time steps in which there exists a
player that does not know the socially optimal allocation correctly or there is
a player that randomizes excluding the randomizations done for settling down
to the socially optimal allocation. The number of Bad time steps in which there
exists a player that does not know the socially optimal allocation correctly is
finite while the number of time steps in which there is a player that randomizes
excluding the randomizations done for settling down to the socially optimal
). The worst case is when each bad step is followed by
allocation is O(n
a good step. Then from this good step the expected number of times to settle
2M −1+2γ
2M
down to the socially optimal allocation is (cid:18)1 −
1
(M +z∗
z∗
−1 )(cid:19) /(cid:18)
−1
1
(M +z∗
z∗
−1 )(cid:19) where
−1
z∗ is the number of channels which has at least one user in the socially optimal
allocation. Assuming in the worst case the sum of the utilities of the players is
0 when they are not playing the socially optimal allocation we have
R(n) ≤
1 −
1
(M +z∗
−1 )
−1
−1 ) M 2N τ (M, N, ǫ, γ, γ′, 1) + 3
−1
z∗
1
(M +z∗
z∗
= O(n
2M −1+2γ
2M
)
1
t2! + O(n
n
Xt=1
2M −1+2γ
2M
)!
⊓⊔
Note that we mentioned earlier, under a classical multi-armed bandit prob-
lem approach as cited before [3,4,5,15,16,21,22], a logarithmic regret O(log n) is
achievable. The fundamental difference between these studies and the problem
in the present paper is the following: Assume that at time t user i selects channel
j. This means that i selects to observe an arm from the set {(j, k) : k ∈ M} but
the arm assigned to i is selected from this set depending on the choices of other
players.
Also note that in RLA a user computes the socially optimal allocation accord-
ing to its estimates at each time step. This could pose significant computational
effort since integer programming is NP-hard in general. However, by exploiting
the stability condition on the socially optimal allocation a user may reduce the
number of computations; this is a subject of future research.
5 An Algorithm for Socially Optimal Allocation (Case 3)
In this section we assume that gj(n) is decreasing in n for all j ∈ N . For
simplicity we assume that the socially optimal allocation is unique up to the
permutations of σ∗. When this uniqueness assumption does not hold we need a
more complicated algorithm to achieve the socially optimal allocation. All users
use the Random Selection (RS) algorithm defined in Fig. 3. RS consists of two
phases. Phase 1 is the learning phase where the user randomizes to learn the
interference functions. Let Bj(t) be the set of distinct payoffs observed from
channel j up to time t. Then the payoffs in set Bj(t) can be ordered in a de-
creasing way with the associated indices {1, 2, . . . , Bj(t)}. Let O(Bj (t)) denote
this ordering. Since the IFs are decreasing, at the time Bj(t) = M , the user has
learned gj. At the time ∪N
j=1 Bj(t) = M N , the user has learned all IFs. Then,
the user computes A∗ and phase 2 of RS starts where the user randomizes to
converge to the socially optimal allocation.
Random Selection (RS)
1: Initialize: t = 1, b = 0, Bj(1) = ∅, ∀j ∈ N , sample σi(1) from the uniform
distribution on N
if hσi(t)(t) /∈ Bσi(t)(t) then
Bσi(t+1)(t + 1) ← O(Bσi(t)(t) ∪ hσi(t)(t))
b = b + 1
2: Phase 1
3: while b < M N do
4:
5:
6:
7:
8:
9:
end if
Sample σi(t + 1) from the uniform distribution on N
t = t + 1
10: end while
11: find the socially optimal allocation σ∗
12: Phase 2
13: while b ≥ M N do
if hσi(t)(t) < v∗
14:
15:
16:
17:
end if
18:
t = t + 1
19:
20: end while
Sample σi(t + 1) from the uniform distribution on N
σi (t) then
else
σi(t + 1) = σi(t)
Fig. 3. pseudocode of RS
Theorem 3. Under the assumptions of (C3) if all players use RS algorithm to
choose their actions, then the expected time to converge to the socially optimal
allocation is finite.
Proof. Let TOP T denote the time the socially optimal allocation is achieved, TL
be the time when all users learn all the IFs, TF be the time it takes to reach the
socially optimal allocation after all users learn all the IFs. Then TOP T = TL +TF
and E[TOP T ] = E[TL] + E[TF ]. We will bound E[TL] and E[TF ]. Let Ti be the
first time that i users have learned the IFs. Let τi = Ti − Ti−1, i = 1, 2, . . . , M
and T0 = 0. Then TL = τ1 + . . . + τM . Define a Markov chain over all N M pos-
sible configurations of M users over N channels based on the randomization of
the algorithm. This Markov chain has a time dependent stochastic matrix which
changes at times T1, T2, . . . , TM . Let PT0 , PT1 , . . . , PTM denote the stochastic ma-
trices after the times T0, T1, . . . , TM respectively. This Markov chain is irreducible
at all times up to TM and is reducible with absorbing states corresponding to
the socially optimal allocations after TM . Let T1, T2, . . . TM be the times that
all configurations are visited when the Markov chain has stochastic matrices
PT0 , PT1 , . . . , PTM −1 respectively. Then because of irreducibility and finite states
E[ Ti] < z1, i = 1, . . . , M for some constant z1 > 0 . Since τi ≤ Ti, i = 1, . . . , M
a.s. we have E[TL] < M z1. For the Markov chain with stochastic matrix PTM
all the configurations that do not correspond to the socially optimal allocation
are transient states. Since starting from any transient state the mean time to
⊓⊔
absorption is finite E[TF ] < z2, for some constant z2 > 0.
6 Conclusion
In this paper we studied the decentralized multiuser resource allocation problem
with various levels of communication and cooperation between the users. Under
three different scenarios we proposed three algorithms with reasonable perfor-
mance. Our future reserach will include characterization of achievable perfor-
mance regions for these scenarios. For example, in case 2 we are interested in
finding an optimal algorithm and a lower bound on the performance.
References
1. Agrawal, R.: Sample Mean Based Index Policies with O(log(n)) Regret for the
Multi-armed Bandit Problem. Advances in Applied Probability 27(4), 1054–1078
(December 1995)
2. Ahmad, S., Tekin, C., Liu, M., Southwell, R., Huang, J.: Spectrum Sharing as
Spatial Congestion Games. http://arxiv.org/abs/1011.5384 (2010)
3. Anandkumar, A., Michael, N., Tang, A.: Opportunistic Spectrum Access with Mul-
tiple Players: Learning under Competition. In: Proc. of IEEE INFOCOM (March
2010)
4. Anantharam, V., Varaiya, P., Walrand, J.: Asymptotically Efficient Allocation
Rules for the Multiarmed Bandit Problem with Multiple Plays-Part I: IID Re-
wards. IEEE Trans. Automat. Contr. pp. 968–975 (November 1987)
5. Anantharam, V., Varaiya, P., Walrand, J.: Asymptotically Efficient Allocation
Rules for the Multiarmed Bandit Problem with Multiple Plays-Part II: Marko-
vian Rewards. IEEE Trans. Automat. Contr. pp. 977–982 (November 1987)
6. Auer, P., Cesa-Bianchi, N., Fischer, P.: Finite-time Analysis of the Multiarmed
Bandit Problem. Machine Learning 47, 235–256 (2002)
7. Auer, P., Cesa-Bianchi, N., Freund, Y., Schapire, R.: The Nonstochastic Multi-
armed Bandit Problem. SIAM Journal on Computing 32, 48–77 (2002)
8. Chlebus, E.: An Approximate Formula for a Partial Sum of the Divergent p-series.
Applied Mathematics Letters 22, 732–737 (2009)
9. D.W. Turner, D.M. Young, J.S.: A Kolmogorov Inequality for the Sum of Indepen-
dent Bernoulli Random Variables with Unequal Means. Statistics and Probability
Letters 23, 243–245 (1995)
10. Freund, Y., Schapire, R.: Adaptive Game Playing Using Multiplicative Weights.
Games and Economic Behaviour 29, 79–103 (1999)
11. Gai, Y., Krishnamachari, B., Jain, R.: Learning Multiuser Channel Allocations in
Cognitive Radio Networks: a Combinatorial Multi-armed Bandit Formulation. In:
IEEE Symp. on Dynamic Spectrum Access Networks (DySPAN) (April 2010)
12. Kakhbod, A., Teneketzis, D.: Power Allocation and Spectrum Sharing in Cognitive
Radio Networks With Strategic Users. In: 49th IEEE Conference on Decision and
Control (CDC) (December 2010)
13. Kasbekar, G., Proutiere, A.: Opportunustic Medium Access in Multi-channel Wire-
less Systems: A Learning Approach. In: Proceedings of the 48th Annual Allerton
Conference on Communication, Control, and Computation (September 2010)
14. Kleinberg, R., Piliouras, G., Tardos, E.: Multiplicative Updates Outperform
Generic No-Regret Learning in Congestion Games. In: Annual ACM Symposium
on Theory of Computing (STOC) (2009)
15. Lai, T., Robbins, H.: Asymptotically Efficient Adaptive Allocation Rules. Advances
in Applied Mathematics 6, 4–22 (1985)
16. Liu, K., Zhao, Q.: Distributed Learning in Multi-Armed Bandit with Multiple
Players. IEEE Transactions on Signal Processing 58(11), 5667–5681 (November
2010)
17. Monderer, D., Shapley, L.S.: Potential Games. Games and Economic Behavior
14(1), 124–143 (1996)
18. Rosenthal, R.: A Class of Games Possessing Pure-strategy Nash Equilibria. Inter-
national Journal of Game Theory 2, 65–67 (1973)
19. Sandholm, W.H.: Population Games and Evolutionary Dynamics. Manuscript
(2008)
20. Smith, J.M.: Evolution and the Theory of Games. Cambridge University Press
(1982)
21. Tekin, C., Liu, M.: Online Algorithms for the Multi-armed Bandit Problem with
Markovian Rewards. In: Proceedings of the 48th Annual Allerton Conference on
Communication, Control, and Computation (September 2010)
22. Tekin, C., Liu, M.: Online Learning in Opportunistic Spectrum Access: A Restless
Bandit Approach. In: 30th IEEE International Conference on Computer Commu-
nications (INFOCOM) (April 2011)
|
cs/0207022 | 1 | 0207 | 2002-07-07T11:26:42 | What is a Joint Goal? Games with Beliefs and Defeasible Desires | [
"cs.MA",
"cs.GT"
] | In this paper we introduce a qualitative decision and game theory based on belief (B) and desire (D) rules. We show that a group of agents acts as if it is maximizing achieved joint goals. | cs.MA | cs | Wat is a Joint Goal?
Games with Beliefs and Defeasible Desires
2
0
0
2
l
u
J
7
]
A
M
.
s
c
[
1
v
2
2
0
7
0
2
0
/
s
c
:
v
i
X
r
a
Mehdi Dastani
Leendert van der Torre
Institute of Information and Computing Sciences
Department of Artificial Intelligence
Utrecht University
email: [email protected]
Vrije Universiteit Amsterdam
email: [email protected]
Abstract
In this paper we introduce a qualitative de-
cision and game theory based on belief (B)
and desire (D) rules. We show that a group
of agents acts as if it is maximizing achieved
joint goals.
2. The decision making of a group or society of
agents is described in terms of concepts gener-
alized from those used for individual agents, such
as joint goals, joint intentions, joint commitments,
etc. Moreover, also new concepts are introduced
at this social level, such as norms (a central con-
cept in most social theories).
1
Introduction
One of the main problems in agent theory is the dis-
tinction between formal theories and tools developed
for individual autonomous agents, and theories and
tools developed for multi agent systems.
In the so-
cial sciences, this distinction is called the micro-macro
dichotomy. The prototypical example is the distinc-
tion between classical decision theory based on the
expected utility paradigm (usually identified with the
work of Neumann and Morgenstern [15] and Savage
[11]) and classical game theory (such as the work
of Nash and more recently the work of Axelrod).
Whereas classical decision theory is a kind of opti-
mization problem (maximizing the agent's expected
utility), classical game theory is a kind of equilibria
analysis.
There are several approaches in practical reasoning
(within philosophy), cognitive science and artificial in-
telligence to bring the micro and macro description
together. The basic idea is two-fold:
It is still an open problem how the micro-macro di-
chotomy of classical decision and game theory is re-
lated to the micro-macro dichotomy of these alter-
native theories. Has or can the micro and macro
level be brought together by replacing classical the-
ories by alternative theories? Before this question
can be answered, the relation between the classical
and alternative theories has to be clarified. Doyle
and Thomason [6] argue that classical decision theory
should be reunited with alternative decision theories
in so-called qualitative decision theory (QDT), which
studies qualitative versions of classical decision the-
ory, hybrid combinations of quantitative and qualita-
tive approaches to decision making, and decision mak-
ing in the context of artificial intelligence applications
such as planning, learning and collaboration. Quali-
tative decision theories have been developed based on
beliefs (probabilities) and desires (utilities) using for-
mal tools such as modal logic [2] and on utility func-
tions and knowledge [7]. More recently these beliefs-
desires models have been extended with intentions or
BDI models [5, 10].
1. The decision making of individual autonomous
agents is described in terms of other concepts than
maximizing utility. For example, since the early
40s there is a distinction between classical decision
theory and artificial intelligence based on utility
aspiration levels and goal based planning (as pi-
oneered by Simon [12]). Cognitive theories are
typically based on vague concepts from folk psy-
chology like beliefs, desires and intentions.
In this paper we introduce a rule based qualitative de-
cision and game theory, based on belief (B) and desire
(D) rules. We call an individual autonomous agent
which minimizes its unreached desires a BD rational
agent. We define goals as a set of formulas which can
be derived by beliefs and desires in a certain way, such
that BD rational agents act as if they maximize the
set of achieved goals, and agents maximizing their sets
of achieved goals are BD rational. Moreover, groups of
agents which end up in equilibria act as if they maxi-
mize joint goals.
Like classical decision theory but in contrast to sev-
eral proposals in the BDI approach [5, 10], the theory
does not incorporate decision processes, temporal rea-
soning, and scheduling.
The layout of this paper is as follows. Section 2 de-
velops a qualitative logic of decision. This logic tells
us what the optimal decision is, but it does not tell us
how to find this optimal decision. Section 3 considers
the AI solution to this problem [12, 8]: break down the
decision problem into goal generation and goal based
decisions.
1.1 QDT and NMR
Qualitative decision theory is
related to non-
monotonic logic ("qualitative") and to reasoning about
uncertainty ("decision theory" formalizes decision
making under uncertainty). However, they are based
on different disciplines. According to a distinction
made by Aristotle, non-monotonic reasoning and rea-
soning about uncertainty formalize theoretical (or con-
clusion oriented) reasoning, whereas qualitative deci-
sion theory formalizes practical (or action oriented)
reasoning.
Thomason [13] observes that classical decision theory
neglects the issue of 'correct inference', and that the
absence of a logical theory of practical reasoning is
largely due to the unavailability of appropriate infer-
ence mechanisms. To handle even the simplest cases of
practical reasoning, it is essential to have a reasoning
mechanism that allows for practical conclusions that
are non-monotonic in the agent's beliefs.
Where classical decision theory is based on probabil-
ities and utilities, qualitative decision theory is based
on beliefs and desires.
In a modal approach, where
the beliefs and desires are represented by modalities
B and D respectively, and an action operator by the
modal operator Do, we may have for example that:
B(thirsty), D(drink) ⊢ Do(go − to − pub)
2 A qualitative decision and game
theory
The qualitative decision and game theory introduced
in this section is based on sets of belief and desire rules.
We define an agent system specification, we show how
we can derive a game specification from it, and we give
some familiar notions from game theory such as Pareto
efficient decisions (choosing an optimal decision) and
Nash equilibria. First we consider the logic of rules we
adopt.
2.1 Logic of rules
The starting point of any theory of decision is a dis-
tinction between choices made by the decision maker
and choices imposed on it by its environment. For ex-
ample, a software upgrade agent (decision maker) may
have the choice to upgrade a computer system at a
particular time of the day. The software company (en-
vironment) may in turn allow/disallow such a upgrade
at a particular time. Let S = {α1, . . . , αn} be the so-
ciety or set of agents, then we therefore assume n dis-
joint sets of propositional atoms: A = A1 ∪ . . . ∪ An =
{a, b, c, . . .} (agents' decision variables [7] or control-
lable propositions [2]) and W = {p, q, r, . . .} (the world
parameters or uncontrollable propositions). In the se-
quel we consider each decision maker as entities con-
sisting of defeasible rules. Such a decision maker gen-
erates its decisions by applying subsets of defeasible
rules to its input. This results in the so-called condi-
tional mental attitudes [4]. Before we proceed some
notations will be introduced.
• LAi, LW and LAW for the propositional languages
built up from these atoms in the usual way, and
variables x, y, . . . to stand for any sentences of
these languages.
• CnAi , CnW and CnAW for the consequence sets,
and =Ai , =W and =AW for satisfiability, in any
of these propositional logics.
• x ⇒ y for an ordered pair of propositional sen-
tences called a rule.
B(thirsty), D(drink), B(pub−closed) ⊢ Do(go−to−shop)
• ER(T ) for the R extension of T , as defined in
Definition 1 below.
A drawback of such a modal logic approach is that on
the one hand modal logic is notorious for its problems
with formalizing conditionals or rules, and practical
reasoning on the other hand is usually seen as a kind
of rule based reasoning. In this paper we therefore do
not use modal logic but we use a rule based formalism.
In our framework the generation of decisions are for-
malized based on the notion of extension. In particu-
lar, the decision of an agent, which is specified by a set
of defeasible rules R and has the input T , is the exten-
sion calculated based on R and T . This is formalized
in the following definition.
Definition 1 (Extension) Let R ⊆ LAW × LAW be
a set of rules and T ⊆ LAW be a set of sentences. The
consequents of the T -applicable rules are:
R(T ) = {y x ⇒ y ∈ R, x ∈ T }
and the R extension of T is the set of the consequents
of the iteratively T -applicable rules:
ER(T ) = ∩T ⊆X,R(CnAW (X))⊆X X
We give some properties of the R extension of T in
Definition 1. First note that ER(T ) is not closed under
logical consequence. The following proposition shows
that ER(T ) is the smallest superset of T closed under
the rules R interpreted as inference rules.
Proposition 1 Let
• E0
• Ei
R(T ) = T
R(T ) = Ei−1
R (T )∪R(CnAW (Ei−1
R (T ))) for i > 0
We have ER(T ) = ∪∞
0 Ei
R(T ).
Usually, an decision making agent is required to pre-
serve its decisions under the growth of inputs. The
following proposition shows that ER(T ) is monotonic.
Proposition 2 We have R(T ) ⊆ R(T ∪ T ′) and
ER(T ) ⊆ ER(T ∪ T ′).
Monotonicity is illustrated by the following example.
Example 1 Let R = {⊤ ⇒ p, a ⇒ ¬p} and T =
{a}, where ⊤ stands for any tautology like p ∨ ¬p. We
have ER(∅) = {p} and ER(T ) = {a, p, ¬p}, i.e. the R
extension of T is inconsistent.
Of course, allowing inconsistent decisions may not be
intuitive. We are here concerned about possible de-
cisions rather than reasonable or feasible decisions.
Later we will define reasonable or feasible decisions
by excluding inconsistent decisions.
2.2 Agent system specification
An agent system specification given in Definition 2
contains a set of agents and for each agent a descrip-
tion of its decision problem. The agent's decision prob-
lem is defined in terms of its beliefs and desires, which
are considered as defeasible belief and desire rules, a
priority ordering on the desire rules, as well as a set
of facts and an initial decision (or prior intentions).
We assume that agents are autonomous, in the sense
that there are no priorities between desires of distinct
agents.
a
is
agent
system specification
Definition 2 (Agent system specification)
An
tuple
AS = hS, F, B, D, ≥, δ0i that contains a set of
agents S, and for each agent i a finite set of facts
Fi ⊆ LW (F = Sn
i=1 Fi), a finite set of belief rules
Bi ⊆ LAW × LW (B = Sn
i=1 Bi), a finite set of
desire rules Di ⊆ LAW × LAW (D = Sn
i=1 Di), a
relation ≥i⊆ Di × Di (≥= Sn
i=1 ≥i) which is a total
ordering (i.e. reflexive, transitive, and antisymmetric
and for any two elements d1 and d2 in Di, either
d1 ≥i d2 or d2 ≥i d1), and a finite initial decision
i ⊆ LA (δ0 = Sn
δ0
i ). For an agent i ∈ S we write
x ⇒i y for one of its rules.
i=1 δ0
A belief rule 'the agent αi believes y in context x' is
an ordered pair x ⇒i y with x ∈ LAW and y ∈ LW ,
and a desire rule 'the agent desires y in context x' is
an ordered pair x ⇒i y with x ∈ LAW and y ∈ LAW .
It implies that the agent's beliefs are about the world
(x ⇒i p), and not about the agent's decisions. These
beliefs can be about the effects of decisions made by
the agent (a ⇒i p) as well as beliefs about the effects of
parameters set by the world (p ⇒i q). Moreover, the
agent's desires can be about the world (x ⇒i p, desire-
to-be), but also about the agent's decisions (x ⇒i a,
desire-to-do). These desires can be triggered by pa-
rameters set by the world (p ⇒i y) as well as by deci-
sions made by the agent (a ⇒i y). Modelling mental
attitudes such as beliefs and desires in terms of defea-
sible rules results in what might be called conditional
mental attitudes [4].
2.3 Agent Decisions
The belief rules are used to determine the expected
consequences of a decision, where a decision δ is any
subset of LA that contains the initial decision δ0. The
set of expected consequences of this decision δ is the
belief extension of F ∪ δ. Moreover, we consider a
feasible decision as a decision that does not imply a
contradiction.
=
Definition 3 (Decisions) Let
h{α1, . . . , αn}, F, B, D, ≥, δ0i
system
specification. An AS decision profile δ for agents α1,
. . . , αn is δ = hδ1, . . . δni where δi is a decision of
agent αi such that
be an agent
AS
δ0
i ⊆ δi ⊆ LAi
for i = 1 . . . n
A feasible decision for agent i is δi such that
EBi (Fi ∪ δi) is consistent
A feasible decision profile is a decision profile such that
EB(F ∪ δ) is consistent
where we write EB(F ∪ δ) for Sn
i=1 EBi (Fi ∪ δi).
The following example illustrates the decisions of a
single agent.
Example 2 Let A1 = {a, b, c, d, e}, W = {p, q} and
AS = h{α1}, F, B, D, ≥, δ0i with F1 = {¬p}, B1 =
{c ⇒ q, d ⇒ q, e ⇒ ¬q}, D1 = {⊤ ⇒ a, ⊤ ⇒ b, b ⇒
p, ⊤ ⇒ q, d ⇒ q}, ≥1= {b ⇒ p > ⊤ ⇒ b}, and
δ0
1 = {a}. The initial decision δ0
1 reflects that the agent
has already decided in an earlier stage to reach the
desire ⊤ ⇒ a. Note that the consequents of all B1
rules are sentences of LW , whereas the antecedents of
the B1 rules as well as the antecedents and consequents
of the D1 rules are sentences of LAW . We have due
to the definition of ER(S):
EB(F ∪ {a}) = {¬p, a}
EB(F ∪ {a, b}) = {¬p, a, b}
EB(F ∪ {a, c}) = {¬p, a, c, q}
EB(F ∪ {a, d}) = {¬p, a, d, q}
EB(F ∪ {a, e}) = {¬p, a, e, ¬q}
. . .
EB(F ∪ {a, d, e}) = {¬p, a, d, e, q, ¬q}
. . .
Therefore {a, d, e} is not a feasible AS decision profile,
because its belief extension is inconsistent. Continued
in Example 4.
The following example illustrates that the set of feasi-
ble decisions of an agent may depend on the decisions
of other agents.
Example 3 Let A1 = {a}, A2 = {b}, W = {p} and
AS = h{α1, α2}, F, B, D, ≥, δ0i with F1 = F2 = ∅,
B1 = {a ⇒ p}, B2 = {b ⇒ ¬p}, D1 = {⊤ ⇒ p}, D2 =
{⊤ ⇒ ¬p}, ≥ is the identity relation, and δ0
2 = ∅.
We have that h∅, {b}i is a feasible decision profile, but
h{a}, {b}i is not. If δ1 = ∅, then agent α2 can decide
δ2 = {b}. However, if δ1 = {a}, then agent α2 cannot
decide so, i.e. δ2 6= {b}.
1 = δ0
2.4 Agent preferences
In this section we introduce a way to compare deci-
sions. We compare decisions by comparing sets of de-
sire rules that are not reached by the decisions. Since
only ordering on individual desire rules, and not or-
dering on sets of desire rules, are given, we first lift
the ordering on individual desire rules to an ordering
on sets of desire rules.
Definition 4 Let AS = hS, F, B, D, ≥, δ0i be an
agent system specification, D′
two subsets of Di,
i the set of Di elements which are not D′
and Di \ D′
i
elements. We have D′
i∃d′ ∈
if ∀d′′ ∈ D′′
i (cid:23) D′′
i
i \ D′
i, D′′
i
D′
D′
D′
i \ D′′
i (cid:23) D′′
i (cid:23) D′′
i such that d′ > d′′. We write D′
i, and we write D′
i and D′′
i
i and D′′
i (cid:23) D′
i.
6(cid:23) D′
i ≻ D′′
i
i ≃ D′′
i
if
if
The following propositions show that the priority re-
lation (cid:23) is reflexive, anti-symmetric, and transitive.
Proposition 3 Let D1 6⊆ D3 and D3 6⊆ D1. For fi-
nite sets, the relation (cid:23) is reflexive ( ∀D D (cid:23) D),
anti-symmetric ∀D1, D2 (D1 (cid:23) D2 ∧ D2 (cid:23) D1) →
D1 = D2, and transitive, i.e. D1 (cid:23) D2 and D2 (cid:23) D3
implies D1 (cid:23) D3.
The desire rules are used to compare the decisions.
The comparison is based on the set of unreached de-
sires and not on the set of violated or reached desires.
A desire x ⇒ y is unreached by a decision if the ex-
pected consequences of this decision imply x but not
y. The desire rule is violated or reached if these conse-
quences imply respectively x∧¬y or x∧y, respectively.
Definition 5 (Comparing decisions) Let
AS = hS, F, B, D, ≥, δ0i be an agent system specifica-
tion and δ be a AS decision. The unreached desires
of decision δ for agent αi are:
Ui(δ) =
{x ⇒ y ∈ Di EB(F ∪ δ) = x and EB(F ∪ δ) 6= y}
Decision δ is at least as good as decision δ′
agent αi, written as δ ≥U
i δ′, iff
for
Ui(δ′) (cid:23) Ui(δ)
Decision δ dominates decision δ′ for agent αi, written
as δ >U
i δ′, iff
δ ≥U
i δ′ and δ′ 6≥U
i δ
The following continuation of Example 2 illustrates the
comparison of decisions.
Example 4 (Continued) We have:
U ({a}) = {⊤ ⇒ b, ⊤ ⇒ q},
U ({a, b}) = {b ⇒ p, ⊤ ⇒ q},
U ({a, c}) = {⊤ ⇒ q},
U ({a, d}) = {⊤ ⇒ b, d ⇒ q},
U ({a, e}) = {⊤ ⇒ b, ⊤ ⇒ q},
U ({a, b, c}) = {b ⇒ p}.
. . .
We thus have for example that the decision {a, c} dom-
inates the initial decision {a}, i.e. {a, c} >U {a}.
There are two decisions for which their set of un-
reached contains only one desire. Due to the priority
relation, we have that {a, c} >U {a, b, c}.
2.5 Agent games
In this subsection, we consider agents interactions
based on agent system specifications, their correspond-
ing agent decisions, and the ordering on the decisions
as explained in previous subsections. Game theory is
the usual tool to model the interaction between self-
interested agents. Agents select optimal decisions un-
der the assumption that other agents do likewise. This
makes the definition of an optimal decision circular,
and game theory therefore restricts its attention to
equilibria. For example, a decision is a Nash equilib-
rium if no agent can reach a better (local) decision by
changing its own decision. The most used concepts
from game theory are Pareto efficient decisions, dom-
inant decisions and Nash decisions. We first repeat
some standard notations from game theory [1, 9].
As mentioned, we use δi to denote a decision of agent
αi and δ = hδ1, . . . , δni to denote a decision profile con-
taining one decision for each agent. δ−i is the decision
profile of all agents except the decision of agent αi.
(δ−i, δ′
i) denotes a decision profile which is the same
as δ except that the decision of agent i from δ is re-
placed with the decision of agent i from δ′. δ′
i δi
denotes that decision δ′
i is better than δi according to
his preferences >U
i δi if better or equal. ∆
is the set of all decision profiles for agents α1, . . . , αn,
∆f ⊆ ∆ is the set of feasible decision profiles, and ∆i
is the set of possible decisions for agent αi.
i and δ′
i >U
i ≥U
Definition 6 (Game specification) Let
AS = hS = {α1, . . . , αn}, F, B, D, ≥, δ0i be spec-
ification of agent system in S, Ai be the set of AS
feasible decisions of agent αi according to Definition
3, ∆f = A1 × . . . × An, and ≥U
i be the AS preference
relation of agent αi defined on its feasible decisions
according to definition 5. Then, the game specification
of AS is the tuple hS, ∆f , (≥U
i )i.
We now consider different types of decision profiles
which are similar to types of strategy profiles from
game theory.
Definition 7 A PS decision profile δ = hδ1, . . . , δni ∈
∆f is:
Pareto decision if there is no δ′ = hδ′
1, . . . , δ′
ni ∈ ∆f
for which δ′
i >U
i δi for all agents αi.
strongly Pareto decision if
hδ′
1, . . . , δ′
αi and δ′
ni ∈ ∆f for which δ′
j >U δj for some agents αj.
there is no δ′ =
i ≥U
i δi for all agents
dominant decision if for all δ′ ∈ ∆f and for every
agent i it holds: (δ′
i) i.e. a deci-
sion is dominant if it yields a better payoff than
−i, δi) ≥U
−i, δ′
i (δ′
any other decisions regardless of what the other
agents decide.
Nash decision if
all
agents
i
it
holds:
(δ−i, δi) ≥U
i) for all δ′
i ∈ ∆i
f
for
i (δ−i, δ′
It is a well known fact that Pareto decisions exist (for
finite games), whereas dominant decisions do not have
to exist. The latter is illustrated by the following ex-
ample.
two
1 = δ0
agents,
2 = ∅.
be
and α2
Example 5 Let α1
F1 = F2 = ∅, and initial decisions δ0
They have the following beliefs en desires:
Bα1 = {a ⇒ p, ¬a ⇒ ¬p}
Dα1 = {⊤ ⇒ p, ⊤ ⇒ q}
≥α1= ⊤ ⇒ p > ⊤ ⇒ q > ⊤ ⇒ ¬q > ⊤ ⇒ ¬p
Bα2 = {b ⇒ q, ¬b ⇒ ¬q}
Dα2 = {⊤ ⇒ ¬p, ⊤ ⇒ ¬q}
≥α2= ⊤ ⇒ ¬p > ⊤ ⇒ ¬q > ⊤ ⇒ q > ⊤ ⇒ p
Let ∆f be feasible decision profiles, EB be the
outcomes of the decisions, and U (δi) be the set of
unreached desires for agent αi.
∆
EB
Uδ1
Uδ2
ha, bi
{p, q}
∅
ha, ¬bi
h¬a, bi
h¬a, ¬bi {¬p, ¬q}
{p, −q}
{¬p, q}
{⊤ ⇒ q}
{⊤ ⇒ p}
{⊤ ⇒ p, ⊤ ⇒ q}
{⊤ ⇒ ¬p,
⊤ ⇒ ¬q}
{⊤ ⇒ ¬p}
{⊤ ⇒ ¬q}
∅
According to definition 5, for A1 :
U (ha, bi) > U (ha, ¬bi) > U (h¬a, bi) > U (h¬a, ¬bi)
and for A2 :
U (h¬a, ¬bi) > U (h¬a, bi) > U (ha, ¬bi) > U (ha, bi).
None of these decision profiles are dominant decisions,
i.e. the agents specifications has no dominant solution
with respect to their unreached desires.
The following example illustrates a typical cooperation
game.
Example 6 B1 = {a ⇒ p , b ⇒ ¬p ∧ q}, D1 = {⊤ ⇒
p ∧ q} B2 = {c ⇒ q , d ⇒ p ∧ ¬q} D2 = {⊤ ⇒ p ∧ q}.
The agents have a common goal p ∧ q, which they can
only reach by cooperation.
The following example illustrates a qualitative version
of the notorious prisoner's dilemma, where the self-
ish behavior of individual autonomous agents leads to
global bad decisions.
Example 7 Let A1 = {a} (α1 cooperates), A2 = {b}
(α2 cooperates), and AS be an agent system specifica-
tion with D1 = {⊤ ⇒ ¬a ∧ b, ⊤ ⇒ b, ⊤ ⇒ ¬(a ∧ ¬b)},
D2 = {⊤ ⇒ a ∧ ¬b, ⊤ ⇒ a, ⊤ ⇒ ¬(¬a ∧ b)}. The only
Nash decision is {¬a, ¬b}, whereas both agents would
prefer {a, b}.
Starting from an agent system specification, we can
derive the game specification and in this game specifi-
cation we can use standard techniques to for example
find the Pareto decisions. However, the problem with
this approach is that the translation from an agent
system specification to a game specification is compu-
tationally expensive. For example, a compact agent
representation with only a few belief and desire rules
may lead to a huge set of decisions if the number of
decision variables is high.
The main challenge of qualitative game theory is there-
fore whether we can bypass the translation to game
specification, and define properties directly on the
agent system specification. For example, are there
particular properties of agent system specification for
which we can prove that there always exists a domi-
nant decision for its corresponding derived game spec-
ification? A simple example is an agent system spec-
ification in which each agent has the same belief and
desire rules.
In this paper we do not further pursue these issues,
but we turn to our focus of interest: joint goals.
3 Joint goals
In this section we ask ourselves the question whether
and how we can interpret a decision profile or equilib-
rium as goal-based or goal-oriented behavior. We first
define decision rules and sets of decision profiles closed
under indistinguishable decision profiles.
3.1 Decision rule
A decision rule maps a agent system specification to a
set of possible decision profiles.
Definition 8 A decision rule is a function from agent
system specifications to sets of feasible decision pro-
files.
Decision theory prescribes a decision maker to select
the optimal or best decision, which can be defined as a
decision that is not dominated. Is there an analogous
prescription for societies of agents? A set of cooperat-
ing agents has to select an optimal or Pareto decision.
We call such cooperating agents a BD rational society
of cooperating agents.
Definition 9 A BD rational society of cooperating
agents is a set of agents, defined by an agent system
specification AS, that selects a Pareto AS decision.
In this paper we consider decision rules based on un-
reached desires. We therefore assume that a decision
rule cannot distinguish between decision profiles δ1
and δ2 such that δ1 ∼U δ2. We say that two decision
profiles δ and δ′ are indistinguishable if U (δ) = U (δ′),
and we call a set of decisions U-closed if the set is
closed under indistinguishable decision profiles.
Definition 10 Let AS = hS, F, B, D, ≥, δ0i be an
agent system specification and ∆ a set of AS decision
profiles. ∆ is U-closed if δ ∈ ∆ implies δ′ ∈ ∆ for all
AS decision profiles δ′ such that U (δ) = U (δ′).
An example of a decision rule is the function that maps
agent system specifications to Pareto decision profiles
(a BD rational decision rule). Another example is a
function that maps agent system specifications to Nash
equilibria if they exist, otherwise to Pareto decisions.
3.2 Goals
In this section we show that every society of agents
can be understood as planning for joint goals, whether
the decision is reached by cooperation or is given by
a (e.g. Nash) equilibrium. We define not only goals
which must be reached, called positive goals, but we
add negative goals. Negative goals are defined in the
following definition as states the agent has to avoid.
They function as constraints on the search process of
goal-based decisions.
Definition 11 (Goal-based decision) Let AS =
hS, F, B, D, ≥, δ0i be an agent system specification,
and the so-called positive joint goal set G+ and the
negative joint goal set G− be subsets of LAW . A deci-
sion δ is a hG+, G−i decision if EB(F ∪ δ) =AW G+
and for each g ∈ G− we have EB(F ∪ δ) 6=AW g.
Joint goals are defined with respect to a set of decision
profiles. The definition of ∆ joint goal set encodes
a decision profile together with its indistinguishable
decision profiles as a positive and negative goal set.
AS
=
Definition 12 (∆ goal set) Let
hS, F, B, D, ≥, δ0i
system specifica-
be an agent
tion and ∆ an U-closed set of feasible decisions. The
two sets of formulas hG+, G−i ⊆ (LAW , LAW ) is a ∆
joint goal set of AS if there is an AS decision δ ∈ ∆
such that
G+ = {y x ⇒ y ∈ D, EB(F ∪ δ) =AW x ∧ y}
G− = {x x ⇒ y ∈ D, EB(F ∪ d) 6=AW x}
hG+, G−i ⊆ (LAW , LAW ) is a feasible joint goal set of
AS if there is an U-closed set of feasible decisions ∆
such that hG+, G−i ⊆ (LAW , LAW ) is a ∆ joint goal
set of AS. hG+, G−i ⊆ (LAW , LAW ) is a joint goal set
of AS if there is a set D′ ⊆ D such that
G+ = {y x ⇒ y ∈ D′}
G− = {x x ⇒ y ∈ D′}
The first part of the representation theorem follows
directly from the definitions.
Proposition 4 Let AS = hS, F, B, D, ≥, δ0i be an
agent system specification and ∆ be an U-closed set of
feasible decision profiles. For a decision profile δ ∈ ∆
of AS there is a ∆ joint goal set hG+, G−i of AS such
that δ is a hG+, G−i decision.
Proof. Follows directly from the definitions.
calculate all joint goals
filter feasible joint goals
for each feasible joint goal set
find goal-based decision profiles
order these decision profiles
In other words, the goal-based representation suggests
to calculate the joint goals first. However, the problem
to calculate these joint goals is still computationally
hard. There are two ways to proceed:
• Define heuristics for the optimization problem;
• Find a fragment of the logic, such that the opti-
mization becomes easier.
For example, consider the following procedure to find
(positive) goals:
G ⊆ EB∪D(F ∪ δ0)
Proposition 5 Let AS = hS, F, B, D, ≥, δ0i be an
agent system specification and ∆ an U-closed set of
feasible decision profiles.
For a ∆ joint goal set
hG+, G−i of AS, a hG+, G−i decision is a ∆ decision.
Proof. Follows from U-closed property.
This procedure is not complete, because it does not
take effects of actions into account. Thus, in the gen-
eral case it can be used as a heuristic. Moreover, it is
complete for the fragment in which the belief rules do
not contain effects of actions, i.e. B ⊆ S × LW × LW .1
The representation theorem is a combination of Propo-
sition 4 and 5.
4 Concluding remarks
Theorem 1 Let AS = hS, F, B, D, ≥, δ0i be an agent
system specification and ∆ an U-closed set of feasible
decision profiles. A decision profile δ is in ∆ if and
only if there is a ∆ goal set hG+, G−i of AS such that
δ is a hG+, G−i decision profile.
The second theorem follows from the first one.
Theorem 2 Let AS = hS, F, B, D, ≥, δ0i be an agent
system specification. A decision profile δ is a feasible
AS decision profile if and only if there is a feasible goal
set hG+, G−i of AS such that δ is a hG+, G−i decision
profile.
Consider a society of agent that tries to determine its
Pareto decision profiles. The game specifications sug-
gest the following algorithm:
calculate all decision profiles
for all decision profiles,
calculate consequences
order all decision profiles
The goal-based representation suggest an alternative
approach:
In this paper we have defined a qualitative decision
and game theory in the spirit of classical decision and
game theory. The theory illustrates the micro-macro
dichotomy by distinguishing the optimization problem
from game theoretic equilibria. We also showed that
any group decision, whether based on optimization or
on an equilibrium, can be represented by positive and
negative goals.
We think that the method of this paper is more inter-
esting than its formal results. The decision and game
theory are based on several ad hoc choices which need
further investigation. For example, the desire rules are
defeasible but the belief rules are not (the obvious ex-
tension leads to wishful thinking problems as studied
in [14, 3]). However, the results suggest that any group
decision can be understood as reaching for goals. We
hope that further investigations along this line brings
the theories and tools used for individual agents and
multi agent systems closer together.
1We cannot add beliefs on decision variables, as will be
clear in the next section. Suppose A = {a} and B = {⊤ →
a}. Clearly all decisions should be considered. However,
all decision profiles given in Definition 3 imply a and thus
all decisions not implying a would be excluded.
[15] J. von Neumann and O. Morgenstern. Theory of
Games and Economic Behavior. Princeton Uni-
versity Press, Princeton, NJ, 1 edition, 1944.
References
[1] K. Binmore. Fun and Games : A Text on Game
Theory. 1992.
[2] C. Boutilier. Toward a logic for qualitative deci-
sion theory. In Proceedings of the KR'94, pages
75 -- 86, 1994.
[3] J. Broersen, M. Dastani, , and L. van der Torre.
Resolving conflicts between beliefs, obligations,
intentions and desires. In Symbolic and Quanti-
tative Approaches to Reasoning and Uncertainty.
Proceedings of ECSQARU'01, LNCS 2143, pages
568 -- 579. Springer, 2001.
[4] J. Broersen, M. Dastani, Z. Huang, J. Hulstijn,
and L. van der Torre. The BOID architec-
ture: Conflicts between beliefs, obligations, in-
tentions and desires. In Proceedings of he Fifth
International Conference on Autonomous Agents
(AA2001), pages 9 -- 16. ACM Press, 2001.
[5] P.R. Cohen and H.J. Levesque. Intention is choice
with commitment. Artificial Intelligence, 42:213 --
261, 1990.
[6] J. Doyle and R. Thomason. Background to qual-
itative decision theory. AI magazine, 20(2), sum-
mer 1999.
[7] J. Lang. Conditional desires and utilities - an al-
ternative approach to qualitative decision theory.
In In Proceedings of the European Conference on
Artificial Intelligence (ECAI'96), pages 318 -- 322,
1996.
[8] A. Newell. The knowledge level. Artificial Intel-
ligence, 1982.
[9] Martin J. Osborne and Ariel Rubenstein. A
Course in Game Theory. The MIT Press, Cam-
bridge, Massachusetts, 1994.
[10] A. Rao and M. Georgeff. Modeling rational agents
within a BDI architecture. In Proceedings of the
KR91, 1991.
[11] L. Savage. The foundations of statistics. 1954.
[12] H. A. Simon. The Sciences of the Artificial. MIT
Press, Cambridge, MA, second edition, 1981.
[13] R. Thomason. Practical reason. Presentation at
PRR'99 workshop at IJCAI'99.
[14] R. Thomason. Desires and defaults: A framework
for planning with inferred goals. In Proceedings
KR 2000, pages 702 -- 713, 2000.
|
1905.01357 | 2 | 1905 | 2019-05-28T23:08:07 | Teaching on a Budget in Multi-Agent Deep Reinforcement Learning | [
"cs.MA",
"cs.LG"
] | Deep Reinforcement Learning (RL) algorithms can solve complex sequential decision tasks successfully. However, they have a major drawback of having poor sample efficiency which can often be tackled by knowledge reuse. In Multi-Agent Reinforcement Learning (MARL) this drawback becomes worse, but at the same time, a new set of opportunities to leverage knowledge are also presented through agent interactions. One promising approach among these is peer-to-peer action advising through a teacher-student framework. Despite being introduced for single-agent RL originally, recent studies show that it can also be applied to multi-agent scenarios with promising empirical results. However, studies in this line of research are currently very limited. In this paper, we propose heuristics-based action advising techniques in cooperative decentralised MARL, using a nonlinear function approximation based task-level policy. By adopting Random Network Distillation technique, we devise a measurement for agents to assess their knowledge in any given state and be able to initiate the teacher-student dynamics with no prior role assumptions. Experimental results in a gridworld environment show that such an approach may indeed be useful and needs to be further investigated. | cs.MA | cs | Teaching on a Budget in
Multi-Agent Deep Reinforcement Learning
Ercument Ilhan, Jeremy Gow and Diego Perez-Liebana
School of Electronic Engineering and Computer Science
Queen Mary University of London
London, United Kingdom
{e.ilhan, jeremy.gow, diego.perez}@qmul.ac.uk
9
1
0
2
y
a
M
8
2
]
A
M
.
s
c
[
2
v
7
5
3
1
0
.
5
0
9
1
:
v
i
X
r
a
Abstract -- Deep Reinforcement Learning (RL) algorithms can
solve complex sequential decision tasks successfully. However,
they have a major drawback of having poor sample efficiency
which can often be tackled by knowledge reuse. In Multi-Agent
Reinforcement Learning (MARL) this drawback becomes worse,
but at the same time, a new set of opportunities to leverage
knowledge are also presented through agent interactions. One
promising approach among these is peer-to-peer action advising
through a teacher-student framework. Despite being introduced
for single-agent RL originally, recent studies show that it can
also be applied to multi-agent scenarios with promising empirical
results. However, studies in this line of research are currently
very limited. In this paper, we propose heuristics-based action
advising techniques in cooperative decentralised MARL, using
a nonlinear function approximation based task-level policy. By
adopting Random Network Distillation technique, we devise a
measurement for agents to assess their knowledge in any given
state and be able to initiate the teacher-student dynamics with
no prior role assumptions. Experimental results in a gridworld
environment show that such an approach may indeed be useful
and needs to be further investigated.
Index Terms -- multi-agent, reinforcement learning, deep q-
networks, action advising, teacher-student
I. INTRODUCTION
Reinforcement Learning (RL) [1] is a prominent framework
for solving sequential decision-making tasks. In recent years,
the success of deep learning has led to the emergence of a
new set of techniques called deep RL that achieved important
breakthroughs, reaching super-human level of play in many
complex domains, including Atari games [2], the game of Go
[3] and StarCraft II [4]. However, modern RL methods suffer
from sample inefficiency and long training times, resulting
in limited scalability and applicability in practical situations.
Furthermore,
in the cases of having multiple RL agents
interacting in a shared environment, which is referred to as
Multi-Agent Reinforcement Learning (MARL), these problems
are further intensified due to the domain inherent challenges
such as non-stationarity and curse of dimensionality introduced
by multi-agent dynamics.
One natural solution to accelerate learning in deep RL
through overcoming sample inefficiency is knowledge reuse. A
considerable amount of methods to leverage past knowledge
are proposed to this date [5]. On the one hand, they are mostly
limited to single-agent RL due to the difficulties of MARL.
978-1-7281-1884-0/19/$31.00 ©2019 IEEE
On the other hand, agent interactions in MARL present unique
opportunities of knowledge reuse.
As shown in [6], various classes of methods are proposed to
take advantage of multiple agents for this purpose, such as im-
itation learning, inverse RL, and learning from demonstrations.
Action advising, which involves agents exchanging advice in the
form of actions between each other to drive their exploration
is one of the most flexible approaches among these. The only
requirement it has for the agents is to have a common action
space and be able to access their local observations through
observing or communicating at the time they need an advice.
It has a strong track record in single-agent RL and seems to
be a promising direction to investigate in MARL.
As Section II shows, the research on applications of action
advising techniques in MARL is currently in its early stages
and the methods are very limited. In this study, we aim to
investigate the performance of heuristic-based teacher-student
framework in cooperative MARL with agents employing
nonlinear function approximation representations in their task-
level policies. The problem setting we address does not hold any
assumptions of student-teacher roles for agents, is completely
decentralised in training and execution stages, and assumes that
the communication between agents is limited; which we believe
is realistic. To the best of our knowledge, this is the first study
to utilise classical action advising approach in conjunction with
deep MARL, and we hope to shed a light on advantages and
shortcomings to determine further research directions.
The paper is structured as follows: Section II provides a
review of related work. Afterwards, the background information
regarding the studied techniques are provided in Section III.
Section IV describes the game environment used in this project
and Section V details the proposed approach. Section VI
presents the experimental setup and Section VII the results
obtained. Finally, Section VIII concludes the paper and outlines
directions for future work.
II. LITERATURE REVIEW
A. Advising Methods in Single-Agent Reinforcement Learning
The idea of peer-to-peer knowledge sharing via advising
has its roots in single-agent RL. [7] is one of the first studies
to adopt this method, in a form of student-initiated advising,
in which the learning agent is assisted by an expert agent
whenever it asks for advice to make a decision. In [8], it
was shown that it is possible for one of the peers to be a
human and provide feedback to accelerate the learning of the
agent. Later on, [9] proposed the teacher-student framework.
According to this method, an expert teacher constantly monitors
a student agent's learning process and provides it with action
advices at appropriate times, limited with a budget, considering
the practical concerns regarding attention and communication.
Addressing the challenge of when to advise became more
crucial with the introduction of a budget in this line of research.
Following this work, [10] treated the optimal way of spending
this budget in terms of student's learning performance as an
RL problem and attempted to learn how to teach. In [11], a
new approach called jointly-initiated is presented. As opposed
to the previous methods in which advising occurs with student
[7] or teacher [9] initiation, they claim that their approach
discards the need for student agent to be constantly monitored,
making these techniques more feasible for human-agent settings.
[12] extended teacher-student framework to take advantage
of getting advice from multiple teachers by combining the
advices using a voting based selection. Moreover, the case of
getting suboptimal advices when student surpasses teacher's
performance is also addressed. Even though this improvement
relaxed the requirement of expert teachers, it still assumes
them to follow fixed policies that are good enough to provide
advice. Finally, [13] made further investigations in learning to
teach concept based on [10], and distinguished the qualities of
being an expert and being a good teacher, claiming that best
performers are not always the best teachers.
All of these previously mentioned studies are based on agents
that operate in isolated single-agent environments. In MARL,
multiple agents simultaneously learn in the same environment
while affecting each others' policies, rendering it non-stationary.
Due to this, even if we have expert agents, they can no longer be
guaranteed to follow a fixed policy. Moreover, the assumption
of teacher and student roles within agents are not applicable in
MARL, especially with large number of agents. Despite being
challenging to adapt on, these properties reflect a more natural
and realistic way of peer-to-peer knowledge sharing.
B. Advising Methods in Multi-Agent Reinforcement Learning
The application of action advising methods in MARL is
a challenging and a fairly new subject. [14] was the first
to propose a teacher-student framework that is suitable with
multi-agent settings. They extended the heuristics from [9] by
introducing several metrics based on the number of state visits
to measure confidence in a given state, in order to overcome
the challenge of having no fixed roles of student and teacher.
They tested their methods in a cooperative team of agents
utilizing SARSA(λ) with linear function approximation as
task-level policies. In [15], teaching in MARL is approached
as advising-level meta-learning problem. They proposed a
centralised training and decentralised execution procedure using
multi-agent actor-critic for teaching-level policies and tabular
Q-learning for task-level policies. Following this work, [16]
extended the idea of teaching to agents that use deep neural
networks in their task-level policies and act in environment with
continuous state and action spaces. Despite having promising
results, both of these learning based approaches are currently
limited with 2 agents only.
III. BACKGROUND
A. Multi-Agent RL
We are interested in a cooperative multi-agent setting
where agents get local observations and act in a decentralised
fashion. Decentralised partially observable Markov decision
process (Dec-POMDP)[17], which is a generalisation of
Markov decision process (MDP) for problems with multiple
decentralised agents with local observations, is a suitable
formalisation for this purpose. A Dec-POMDP is defined by a
tuple (cid:104)I,S,A,T ,R, Ω,O, γ(cid:105) where I is the set of n agents,
S is the set of states, A = ×i∈IAi is the set of joint actions,
T is the state transition probabilities, R is the reward function,
Ω = ×i∈IΩi is the finite of set of joint observations, O is the
set of conditional observation probabilities, and γ ∈ [0, 1) is
the discount factor. At each timestep t in a state s(cid:48), each agent
t determined by O(os(cid:48), a), where
i perceives observation oi
a = (cid:104)a1,··· , an(cid:105) is the joint action that caused the state
transition from s to s(cid:48) according to T (s(cid:48)a, s), and receives
reward ri determined by R(s, at). In fully-cooperative case,
which is the setup we are interested in, every agent gets
the same shared reward as ri = ··· = rn. In our problem
framework, agents are able to observe each other at any time
and infer their local observations. However, they still receive
local observations individually from environment.
B. Deep Q-Networks
Deep Q-Networks (DQN) [18] is a deep RL algorithm which
employs deep neural networks to represent environment states
and learn approximations of state-action values similar to Q-
learning in an end-to-end fashion. It overcomes the limitations
present in tabular and linear function approximation methods
(like tile coding) which struggle to generalise across states
and deal with large state spaces. At each timestep t, an
action at is selected randomly (depending on the exploration
technique) or greedily according to maxa Q(ot, a; ω) based
on state observation ot, where ω are the parameters of the
neural network. The transition information ot, at, rt+1, ot+1
is then stored in a buffer D, called replay memory. Using
minibatches of samples drawn from D, the network parameters
ω are trained periodically with gradient descent to minimise
the loss (rt+1 + γ maxa(cid:48) Q(ot+1, a(cid:48)) − Q(ot, at))2.
There has been many improvements on DQN over the
years [19], and some of them became essential parts of
the algorithm as they greatly improve convergence with no
significant drawbacks. In this paper, we utilize double Q-
learning, prioritised replay, dueling networks and noisy nets
enhancements among these.
C. Random Network Distillation
Random Network Distillation (RND) [20] is a technique
built to provide an intrinsic curiosity reward for RL agents to
enhance their exploration capabilities in complex environments.
It involves usage of two neural networks alongside the actual
task-level RL algorithm, namely target and predictor networks,
denoted by differentiable functions G and G respectively. These
networks are identical in structure, which is defined arbitrarily,
and are able to map observations to embeddings as in G : O →
Rk and G : O → Rk. They are initialised with different random
weights, and they produce different embeddings for identical
inputs in their initial state. Over the course of training, samples
used in task-level RL algorithm are also used to train predictor
network G using gradient descent to minimise the mean squared
error (cid:107)G(x) − G(x; θ)(cid:107)2. By doing so, the predictor network
becomes more accurate at matching target network's outputs
for the samples it observes more, which is referred to as
distilling a randomly initialised network. The error between
target and predictor are expected to be higher for type of states
that are seen less frequently and it acts as a natural indicator
of state novelty. The authors of [20] state that, due to its
simplicity, this method does not have to deal with error types
generated by environment stochasticity, model misspecification
and learning dynamics, unlike its counterparts that try to predict
state transitions.
D. Teaching on a Budget
The teacher-student framework [9] is a peer-to-peer knowl-
edge transfer procedure originally developed for two agents,
namely the teacher and the student. While the student is learning
to perform a single-agent task, the teacher provides action
suggestions to assist its exploration whenever it is appropriate.
These advices are expected to accelerate the student's learning.
Teacher agents also have a form of budget bgive which is the
number of advices they can provide to limit the amount they
can exchange to reflect realistic scenarios. The challenge of
this framework comes from distributing advices in the most
efficient way to accelerate the student's learning progression.
For this purpose, several heuristics are proposed to determine
when to advise in teacher-initiated strategy:
• Early advising: The intuition is that the earlier states
are generally more important in learning, and advice is
better taken early on. Following this idea, student is given
advice by teacher in the first bgive states.
• Importance advising: Even though earlier states are
usually more important, not all of them may worth to be
given advice in. Therefore, a budget is better spent on the
states that are determined to be more important. In this
method, importance of a state s is computed as:
I(s) = max
a
Qteacher(s, a) − min
a
Qteacher(s, a)
(1)
Advice is provided in a state s if bgive > 0 and I(s) is
greater than the importance threshold τimp.
IV. THE GAME ENVIRONMENT
Our experiment domain is a gridworld game with discrete
space and time, in which the agents must spread and cover
the landmark positions cooperatively to maximise their shared
rewards. The grid is sized 10 × 10 and consists of 3 agents
Fig. 1. Two frames of the game used for this study. On the left, the initial
game state, with three landmarks (grey) and three agents (green, blue and red).
On the right, the terminal state with all agents over the landmarks. Agents'
trajectories are shown as a shaded colour.
and 3 landmarks. The objective of the agents is to move
as quickly as possible to cover all the landmarks of the
level. While the landmarks are stationary, the agents can
navigate around the grid by using a discrete set of actions
A = { Do N othing, M ove U p, M ove Down, M ove Lef t,
M oveRight }. Movement actions executed by an agent change
its position on the grid by 1 tile in the corresponding direction.
At each timestep, the agents observe the relative positions of
the other agents and landmarks in form of x-axis and y-axis
values, plus the current timestep. All values are normalised
to [−1, 1] using the maximum distance and game duration,
respectively. Agents also receive a common reward in [0, 1],
determined by how many of the landmarks have an agent
covering it. The game's reward is calculated as:
L(cid:88)
l=1
1
L
((cid:80)I
i=1
1
(cid:62) 1
1(cid:107)dli(cid:107)=0)
(2)
where I is the set of agents, L is the set of landmarks, 1
is the indicator function, and dli is the Manhattan distance
between landmark l and agent i. In other words, in order
to act optimally and maximise the total reward, the agents
must determine the lowest cost (in terms of distance) of the
agent-landmark pair set and move to the appropriate landmark
following the shortest path. Since the agents have no access to
a forward model, they are expected to learn these strategies
through interactions.
Despite this environment's representational and mechanical
simplicity, it still is capable of presenting complex behavioural
challenges for MARL. Therefore, we decided to conduct
experiments in this setting to focus on behavioural learning
while keeping the computational expense at minimum.
We tuned the environment complexity in terms of size and
reward sparsity, in order to ensure that the environment is
solvable at least sub-optimally by independent DQN agents,
and there remains to be some exploration challenge to keep
the knowledge of the peers valuable to the agent.
V. PROPOSED METHOD
Our approach aims to accelerate learning of a cooperative
team of agents in a multi-agent environment with a teacher-
student action advising approach. The problem setting we
take into consideration is fully observable, completely decen-
tralised in every stage, and most importantly, assumes that
the environment is too complex for tabular or linear function
approximation methods to be successful, unlike the majority
of related work. In this settings, every agent operates with a
local observation, however they are able to observe each other
and infer any other agent's local observations. Additionally,
they can exchange action advising requests and responses in
forms of actions. We take the budget constraints in inter-agent
interactions into consideration as introduced in [9], and we want
to achieve acceleration while keeping the agent interactions
at minimum, since we believe that such behaviour will be the
most useful in practical applications.
The general structure of our proposal can be expressed in two
parts: a task-level policy and the teacher-student framework,
which we explain in the following sections.
A. Task-Level Policy
At task-level learning and decision making, agents are de-
signed to employ a nonlinear function approximation according
to the target problem structure. Our agents employ DQN along
with its well-established improvements of double Q-learning,
prioritised replay, dueling networks and noisy nets. In our
framework, maybe the most important of these is prioritised
replay as it helps with sampling transitions produced by advices
which are likely to have larger temporal-difference error more
frequently.
The network structure is a multilayer perceptron (MLP),
which is the archetypal form of the deep learning models [21],
with a single hidden layer formed by 256 units. All layer
connections are dense and noisy. This addition removes the
need to follow an explicit exploration policy such as -greedy
while learning, which we think is more suitable for an action
advising approach.
As the multi-agent learning strategy, we follow independent
learners approach in which each agent treats other agents
as part of a non-stationary environment and behaves by
taking only its own actions into account. This is the simplest
approach in MARL without requiring the algorithm to have
any specialisations for multiple agents. Therefore, we keep
DQN as it is without any further modifications in this regard,
which is referred to as independent DQNs. Despite having no
theoretical convergence guarantees in multi-agent environments,
independent DQNs were able to exhibit promising empirical
results in previous studies and are often used as a baseline for
further improvements [22][23].
B. Teaching on a Budget
We adopt action advising in the form of the teacher-student
framework to perform inter-agent knowledge transfer. This
method requires only a common action set and minimal
similarity between agents. In addition, considering commu-
nication costs, exchanging actions instead of episodes or policy
parameters is more preferable especially when task-level policy
employs a complex model like DQNs. In our approach, agents
can broadcast requests for advices when they need it, and can
also respond to requests for advices from other agents. They
have separate budgets of asking bask and giving bgive advices,
which determine the total number of times they can perform
these interactions following either early advising or importance
advising heuristics.
Despite its simplicity, adapting the teacher-student framework
to MARL with deep RL task-level policies is not straightfor-
ward. First of all, in our problem setting, every agent is learning
simultaneously and no longer have fixed policies. Moreover,
they now have different levels of knowledge about the task,
and have no information on each other's expertise since they
can not have any access to internal information and they hold
on assumptions about roles of being teacher or student. In
order to overcome this, we follow a jointly-initiated advising
strategy [11]. Every time an agent requests an advice from
another agent, the agent in the position of teacher executes this
interaction if it thinks that it can take this role. Furthermore,
as agents have no fixed roles or knowledge levels that are set
previously, they must be capable of determining if they need
an advice based on the state they are, or if they are experienced
enough to give advice. In [14], they rely on number of visits to
measure an agent's certainty in a given state. However, this is
not applicable when state space is large and nonlinear function
approximation is used to represent states. We propose to use
RND technique as a metric to measure agents' uncertainties as
an alternative for nonlinear function approximation. Every time
an agent uses a sample of state observation to train its internal
task-level policy, this sample is also used to distill its predictor
network G. Consequently, it will be able to measure how
uncertain it is in a state with observation o by measuring the
error (cid:107) G(o; θ) − G(o)(cid:107)2 when determining if it needs advice
or is capable of giving it. This approach can be treated as
number of visits in nonlinear function approximation regime.
At each timestep, each agent i chooses its action according to
teacher-student augmented action selection procedure defined
in Algorithm 1. If it has a remaining asking budget bask, it
measures its uncertainty µ using its internal models G and G;
if µ is higher than a predefined asking threshold τask the agent
broadcasts its advice requests to other agents as described in
Algorithm 2. Agents who have any remaining advice giving
budget bgive attempt to respond to this request. If agent receives
any advice, it determines which one to follow by using majority
voting (ties broken at random), to then execute such action.
Otherwise, if no advice is received, it continues exploring by
following its own policy.
Responding to an advice request happens as described in
Algorithm 3. Upon getting a request, the agent first checks if it
has any remaining giving budget bgive. If so, it then determines
its expertise by using its internal G and G, computing (cid:107)G(o)−
G(o)(cid:107)2. It then compares this value with threshold τgive to
decide to proceed or not. Finally, if it is set to follow the Early
Advising heuristic, it broadcasts an action advice according to
its policy; if the heuristic is set to Importance Advising, it also
checks if the state is important enough to give advice for by
using Equation 1.
The general learning flow of an agent with DQN policy and
action advising mechanism is shown in Algorithm 4. As can
be seen, the task-level policy can easily be isolated from these
Algorithm 1 Teacher-student augmented action selection
Require: state observation o
1: procedure SELECTACTION
2:
3:
4:
5:
6:
µ ← (cid:107)G(o) − G(o)(cid:107)2
if µ > τask then
a ← N one
if bask > 0 then
a ← ASKFORADVICE(o)
(cid:46) Determine uncertainty
7:
8:
9:
10:
11:
if a = N one then
a ← π(o)
bask ← bask − 1
else
return a
a ← N one
A ← ∅
for every other agent i do
aadvice ← i.ADVISE
if aadvice (cid:54)= N one then
Algorithm 2 Advice seeking
Require: state observation o
1: procedure ASKFORADVICE
2:
3:
4:
5:
6:
7:
8:
9:
10:
if A (cid:54)= ∅ then
add aadvice to A
return a
a ← perform majority voting in A
a ← N one
if bgive > 0 then
Algorithm 3 Respond to advice request
1: procedure ADVISE
2:
3:
4:
5:
6:
7:
8:
9:
10:
switch teaching method do
os ← observe student's state.
µ ← (cid:107)G(os) − G(os)(cid:107)2 (cid:46) Determine uncertainty
if µ < τgive then
case Early Advising
a ← π(o)
bgive ← bgive − 1
io ← maxa Q(os, a) − mina Q(os, a)
if io > τimportance then
case Importance Advising
a ← π(o)
bgive ← bgive − 1
11:
12:
13:
14:
15:
16:
return a
enhancements except for its action selection policy. Therefore,
it can be changed for any other policy as long as it satisfies the
assumption of computing state-action values, for importance
advising to be applicable.
VI. EXPERIMENTAL SETUP
The objective of the evaluation is to understand if and
how the proposed modifications can enhance the learning
performance. We conducted experiments through multiple
Initialise DQN model
Initialise replay memory
Initialise G and G
for all training episodes do
o ← initial observation
for all episode steps do
Algorithm 4 Training of task-level policy (DQN) with teacher-
student framework
1: procedure TRAIN
2:
3:
4:
5:
6:
7:
8:
9:
10:
11:
12:
13:
14:
a ← SELECTACTION(o)
Execute a and get reward r and observation o(cid:48)
Store transition (o, a, r, o(cid:48)) in replay memory
o ← o(cid:48)
Sample a minibatch from replay memory
Train DQN with minibatch
Train G with minibatch
learning sessions, each one consisting of a set fixed number
of different game episodes which are initialised with random,
yet non-overlapping, agent and landmark positions.
The performance of the agents is assessed as a team
through a learning session. They are evaluated every 100
episodes in a predefined set of 50 evaluation levels. During
evaluation, learning and teaching procedures are disabled,
and the levels used are fixed across all learning sessions.
An evaluation score is calculated by normalising the average
episode rewards obtained across 50 levels with the maximum
possible total reward (determined by a set of hand-crafted
expert agents), giving a score in [0, 1], where 1 indicates the
optimal performance.
The performance of the proposed methods can be assessed
by looking at the evaluation scores across a learning session,
according to the following two metrics:
• Asymptotic performance: This is measured directly by
looking at the evaluation scores values, and represents
how good the agents are at solving the game.
• Learning speed: This is measured by looking at area
under the curve of evaluation scores against the number
of training episodes graph.
For agents to be able to benefit from knowledge transfer,
there must be some form of knowledge heterogeneity within
the team. In MARL, such heterogeneity tends to arise when the
agents explore different parts of the state space, use different
task-level policies in terms of complexity and representation,
and are in different stages of training. Since our environment
is fully observable, and we use identical agents, only the latter
is applicable in our setting.
One objective of this study is to determine how the proposed
methods work in different types of knowledge heterogeneity.
Therefore, we design the following 2 scenarios:
• Scenario I: we train a team of agents in levels from a single
distribution of levels; then, we take agents from different
stages of pre-training to form a team to be evaluated.
• Scenario II: we train 3 sets of agents in 3 different
level distributions, in which landmarks and initial agents
Fig. 2. Level structure types in terms of possible regions for initial positions
of agents (gray) and landmarks (red).
locations are strictly limited to predefined regions (see
Figure 2). Then, we take one agent with moderate
performance arbitrarily from each level type to form a
team to evaluate. Note that the learning sessions used to
pre-train agents are generated with different seeds than
the ones where we run the final evaluation.
The following is a list of the different types of agents used
in this study. These agents are trained in the levels first to
acquire some knowledge, and then picked to form teams of 3
agents as explained above. These agents are:
• A0: Agent with no prior knowledge.
• A10: Agent taken from a team of agents trained for 10K
episodes. This agent obtained an evaluation score of 0.45
in a level distribution identical to the evaluation sessions.
• A20: Agent taken from a team of agents trained for
20K episodes. The evaluation score is 0.91 in a level
distribution identical to the learning evaluation sessions.
• A10-1: Agent taken from a team of agents trained for
10K episodes, with 0.51 evaluation score in a restricted
level distribution of type 1.
• A10-2: Agent taken from a team of agents trained for
10K episodes, with 0.41 evaluation score in a restricted
level distribution of type 2.
• A10-3: Agent taken from a team of agents trained for
10K episodes, with 0.43 evaluation score in a restricted
level distribution of type 3.
The methods we evaluate along with the agent teams used
in them are as follows:
• XP: The team to be evaluated is formed by agents A0,
A10, A20 and no advising is used. This method serves
as a baseline for the first scenario.
• XP-EA: The team to be evaluated is formed by agents
A0, A10, A20, and early advising is enabled.
• XP-IA: The team to be evaluated is formed by agents
with different knowledge levels A0, A10, A20, and
importance advising is enabled.
• XP-L: The team to be evaluated is formed by agents A10-
1, A10-2, A10-3 and no advising is used. This method
serves as a baseline for the second scenario.
• XP-L-EA: The team to be evaluated is formed by agents
A10-1, A10-2, A10-3, using early advising.
• XP-L-IA: The team to be evaluated is formed by agents
with different knowledge levels A10-1, A10-2, A10-3,
using importance advising.
The hyperparameters of the learning algorithms are deter-
mined empirically, as shown in Table I. They are kept the same
TABLE I
HYPERPARAMETERS.
Parameter name
Minimum replay memory size to start learning
Replay memory capacity
Prioritisation type
Prioritisation exponent α
Prioritisation importance sampling β
Target network update period
Minibatch size
Learning rate
Train period
Discount factor γ
Adam
Huber loss δ
Asking threshold τask
Giving threshold τgive
Importance threshold τimp
Value
10000
25000
proportional
0.6
0.5 → 1
10000
64
0.001
2
0.99
1.5 × 10−4
1
10
3
1
across different scenarios and configurations.
We run the tests for the methods with teaching enabled,
namely XP-EA and XP-IA, with different advice budgets of
1K, 2K, 5K, 10K, 20K and unlimited (∞). For Scenario I (XP,
XP-EA, XP-IA), learning is run for 10K episodes, while 20K
episodes are run for Scenario II (XP-L, XP-L-EA, XP-L-IA).
The budgets are separate for each individual agent and are
set the same for asking and giving advice initially. Moreover,
due to stability concerns with deep RL methods, especially
in multi-agent settings, every experiment is repeated 10 times
with different random seeds.
VII. RESULTS AND DISCUSSION
Tables II and III show the results for the scenarios described
in this paper. These results show the asymptotic performance
(score) and the area under the curve (AUC) values as indicators
of the learning performance of the agents. Results are reported
for different moments of the evaluated training: after 2.5K,
5K, 7.5K, 10K, 15K and 20K episodes, and they include the
standard error of the measure (10 repetitions). Results that are
significantly different than the first row (baseline) of each table,
according to Welch's t-test (p < 0.05) are denoted in bold.
Additionally, evaluation scores of the methods with highest
final AUC values from each of the scenarios are plotted against
their respective baseline as shown in Figures 3 and 4.
In the first scenario, both of the algorithms provided slight
accelerations in learning and achieved very similar final
performances with the baseline method at 10Kth episode. The
only significant difference from the baseline was seen at scores
at 5Kth episode, by XP-IA (5K). The overall best performing
agent in this scenario is XP-IA (10K). This can be seen as
an indication that the importance metric was indeed a useful
heuristic to distribute advice over more important states in this
scenario. The budget seems to have more effect on XP-IA,
achieving its best result at 10K, confirming the claim that too
much advice may have negative effects on performance [9].
In the second scenario, XP-L-IA failed to show any signif-
icant advantage over the baseline XP-L except for the score
at 5Kth episode with budget of 1K. This can be a result of
ASYMPTOTIC PERFORMANCE (SCORE) AND AREA UNDER THE CURVE (AUC) VALUES OF XP, XP-EA AND XP-IA AT LEARNING EPISODES 2.5K, 5K, 7.5K
AND 10K WITH STANDARD ERRORS IN PARENTHESES. RESULTS OF XP-EA AND XP-IA THAT ARE SIGNIFICANTLY DIFFERENT THAN XP ALGORITHM
ACCORDING TO WELCH'S t-TEST WITH p < 0.05 ARE DENOTED IN BOLD. EACH ALGORITHM IS RUN 10 TIMES.
TABLE II
Algorithm
XP
XP-EA (1K)
XP-EA (2K)
XP-EA (5K)
XP-EA (10K)
XP-EA (20K)
XP-EA (∞)
XP-IA (1K)
XP-IA (2K)
XP-IA (5K)
XP-IA (10K)
XP-IA (20K)
XP-IA (∞)
At 2500th
At 5000th
At 7500th
At 10000th
AUC
Score
AUC
Score
AUC
Score
AUC
Score
13.94 (0.04)
0.58 (0.005)
28.72 (0.12)
0.62 (0.009)
47.15 (0.44)
0.83 (0.013)
68.26 (0.6)
0.87 (0.006)
13.9 (0.05)
13.85 (0.07)
13.88 (0.03)
13.85 (0.04)
13.76 (0.05)
13.76 (0.05)
13.94 (0.04)
13.91 (0.08)
13.92 (0.03)
13.97 (0.04)
13.96 (0.04)
13.96 (0.04)
0.58 (0.002)
0.57 (0.005)
0.58 (0.004)
0.57 (0.004)
0.57 (0.004)
0.57 (0.003)
0.58 (0.003)
0.58 (0.005)
0.57 (0.004)
0.58 (0.003)
0.58 (0.003)
0.58 (0.003)
28.81 (0.14)
28.58 (0.13)
28.75 (0.11)
28.57 (0.09)
28.56 (0.09)
28.53 (0.06)
29.0 (0.15)
28.86 (0.21)
28.84 (0.12)
29.22 (0.22)
29.19 (0.2)
29.19 (0.2)
0.63 (0.014)
0.61 (0.009)
0.63 (0.018)
0.61 (0.006)
0.64 (0.016)
0.64 (0.011)
0.66 (0.016)
0.64 (0.02)
0.65 (0.008)
0.68 (0.024)
0.67 (0.022)
0.67 (0.022)
47.18 (0.54)
46.39 (0.59)
47.02 (0.56)
46.3 (0.47)
47.38 (0.37)
47.11 (0.24)
47.62 (0.59)
47.11 (0.61)
48.01 (0.38)
48.26 (0.72)
47.92 (0.58)
47.92 (0.58)
0.81 (0.013)
0.79 (0.024)
0.81 (0.024)
0.8 (0.021)
0.84 (0.005)
0.82 (0.006)
0.82 (0.012)
0.81 (0.015)
0.83 (0.006)
0.8 (0.019)
0.8 (0.012)
0.8 (0.012)
68.27 (0.73)
67.16 (0.87)
67.86 (0.86)
67.28 (0.68)
68.87 (0.45)
68.0 (0.31)
68.92 (0.71)
68.16 (0.84)
69.49 (0.41)
69.6 (0.98)
69.01 (0.75)
69.01 (0.75)
0.86 (0.01)
0.86 (0.009)
0.87 (0.007)
0.87 (0.008)
0.88 (0.003)
0.86 (0.003)
0.87 (0.006)
0.87 (0.009)
0.88 (0.004)
0.88 (0.006)
0.87 (0.004)
0.87 (0.004)
ASYMPTOTIC PERFORMANCE (SCORE) AND AREA UNDER THE CURVE (AUC) VALUES OF XP-L, XP-L-EA AND XP-L-IA AT LEARNING EPISODES 5K, 10K,
15K AND 20K WITH STANDARD ERRORS IN PARENTHESES. RESULTS OF XP-L-EA AND XP-L-IA THAT ARE SIGNIFICANTLY DIFFERENT THAN XP-L
ALGORITHM ACCORDING TO WELCH'S t-TEST WITH p < 0.05 ARE DENOTED IN BOLD. EACH ALGORITHM IS RUN 10 TIMES.
TABLE III
Algorithm
XP-L
XP-L-EA (1K)
XP-L-EA (2K)
XP-L-EA (5K)
XP-L-EA (10K)
XP-L-EA (20K)
XP-L-EA (∞)
XP-L-IA (1K)
XP-L-IA (2K)
XP-L-IA (5K)
XP-L-IA (10K)
XP-L-IA (20K)
XP-L-IA (∞)
At 5000th
At 10000th
At 15000th
At 20000th
AUC
Score
AUC
Score
AUC
Score
AUC
Score
15.38 (0.12) 0.36 (0.005)
38.34 (0.43)
0.52 (0.006)
66.97 (0.71)
0.66 (0.02)
105.46 (1.37)
0.86 (0.011)
0.37 (0.009)
38.28 (0.66)
68.55 (1.49)
15.58 (0.1) 0.39 (0.008) 39.51 (0.33) 0.54 (0.005) 69.85 (0.85)
15.4 (0.12)
15.51 (0.14) 0.39 (0.007) 39.98 (0.37) 0.54 (0.006) 71.18 (0.68) 0.75 (0.022) 112.69 (1.27) 0.89 (0.005)
0.74 (0.026) 112.14 (1.77) 0.87 (0.014)
15.53 (0.1) 0.38 (0.008) 39.53 (0.35) 0.55 (0.005) 71.3 (1.02)
0.74 (0.026) 112.14 (1.77) 0.87 (0.014)
15.53 (0.1) 0.38 (0.008) 39.53 (0.35) 0.55 (0.005) 71.3 (1.02)
15.53 (0.1) 0.38 (0.008) 39.53 (0.35) 0.55 (0.005) 71.3 (1.02)
0.74 (0.026) 112.14 (1.77) 0.87 (0.014)
110.8 (1.55)
108.4 (2.28)
0.73 (0.024)
0.7 (0.022)
0.88 (0.018)
0.86 (0.02)
0.53 (0.012)
15.39 (0.13) 0.38 (0.006)
15.27 (0.14) 0.37 (0.008)
15.37 (0.09) 0.38 (0.009)
15.37 (0.1)
0.37 (0.009)
15.37 (0.09) 0.38 (0.009)
15.37 (0.09) 0.38 (0.009)
38.54 (0.5)
38.4 (0.43)
38.67 (0.32)
38.58 (0.34)
38.67 (0.32)
38.67 (0.32)
0.52 (0.008)
0.53 (0.007)
0.52 (0.005)
0.52 (0.006)
0.52 (0.005)
0.52 (0.005)
67.95 (0.97)
67.73 (0.69)
68.13 (0.59)
68.06 (0.65)
68.13 (0.59)
68.13 (0.59)
0.68 (0.025)
0.67 (0.017)
0.69 (0.025)
0.68 (0.027)
0.69 (0.025)
0.69 (0.025)
107.6 (1.59)
106.47 (1.42)
107.32 (1.46)
107.04 (1.6)
107.32 (1.46)
107.32 (1.46)
0.87 (0.01)
0.85 (0.016)
0.86 (0.019)
0.85 (0.02)
0.86 (0.019)
0.86 (0.019)
Fig. 3. Evaluation scores versus number of learning episodes of XP, XP-EA
(5K) and XP-IA (20K). Shaded areas indicate 95% confidence intervals.
Fig. 4. Evaluation scores versus number of learning episodes of XP-L, XP-L-
EA (5K) and XP-L-IA (1K). Shaded areas indicate 95% confidence intervals.
the importance metric not being accurate at reflecting actual
relevance of states in this kind of agent knowledge setting. On
the other hand, XP-L-EA performed very well with significant
improvements in terms of asymptotic performance and learning
speed at multiple stages of learning. Moreover, it even managed
to achieve a significantly better final performance. This may
be caused by the agents starting with similar (and moderate)
amount of knowledge, so the early advices are likely to be
useful for any of them without having a need for additional
importance assessment. The identical results of XP-L with 10K
or a higher budget is caused by not having the need to make
use of it beyond some point, once the agent is certain of the
decision it is making on its own (as controlled with the advice
budgets). This can be considered as an another benefit of using
this uncertainty measurement technique if it is tuned well.
VIII. CONCLUSIONS
This paper describes the application, for the first time, of
action advising via heuristic-based teacher-student framework
on Multi-Agent Reinforcement Learning (MARL) agents,
employing policies with nonlinear function approximation.
The environment used for training agent advising is a grid-
based game in which three agents need to coordinate to place
themselves in three different landmarks. The work described
here shows that using off-policy learning can provide significant
improvements in the speed and performance of agents that learn
via advice, particularly when the team is composed of agents
with heterogeneous knowledge. Moreover, Random Network
Distillation (RND) can be a reliable metric to be utilised as a
state visit counter through nonlinear function approximation
when state space complexity is high.
Another interesting finding is that the state importance metric
may be inefficient in some cases of knowledge distribution
amongst agents, for example if they are all are experts but
on different state distributions. Additionally, it is worthwhile
highlighting that, even if it
is possible to determine the
experience of the agents for their roles in knowledge exchange
relationships, this experience is importantly biased by the other
agents that were present at the time they built their knowledge.
Further investigation on how to adapt the importance metric
for agent advising is an interesting line of future work.
Off-policy learning through replay memory may be a slowing
down factor in action advising, as it takes given advice into
consideration in a delayed way and reduces the rate they
influence the agent's current policy. Therefore, in addition
to the enhancements like prioritised experience replay, it may
be useful to implement more specific techniques like multi-step
advice and continual monitoring of agents for fixed periods of
time after advice exchange. This is similar to previous work
in the field [11][16].
Finally, another interesting line of future work is to expand
the problem to more than 3 agents, which brings interesting
aspects to the discussion such as defining a more accurate peer
selection and decision making beyond majority voting.
REFERENCES
[1] R. S. Sutton and A. G. Barto, Reinforcement Learning: An Introduction.
MIT press, 2018.
[2] V. Mnih, K. Kavukcuoglu, D. Silver, et al., "Human-level Con-
trol Through Deep Reinforcement Learning," Nature, vol. 518:7540,
pp. 529 -- 533, 2015.
[3] D. Silver, A. Huang, C. J. Maddison, et al., "Mastering the Game of
Go with Deep Neural Networks and Tree Search," Nature, vol. 529,
no. 7587, pp. 484 -- 489, 2016.
[4] O. Vinyals, I. Babuschkin, J. Chung, et al., AlphaStar: Mastering the
Real-Time Strategy Game StarCraft II, https://deepmind.com/blog/
alphastar-mastering-real-time-strategy-game-starcraft-ii/, 2019.
[5] M. E. Taylor and P. Stone, "Transfer Learning for Reinforcement
Learning Domains: A Survey," Journal of Machine Learning Research,
vol. 10, pp. 1633 -- 1685, 2009.
F. L. Da Silva and A. H. R. Costa, "A Survey on Transfer Learning
for Multiagent Reinforcement Learning Systems," Journal of Artificial
Intelligence Research, vol. 64, pp. 645 -- 703, 2019.
J. A. Clouse, On Integrating Apprentice Learning and Reinforcement
Learning. University of Massachusetts Amherst, 1996.
S. Griffith, K. Subramanian, J. Scholz, C. L. Isbell, and A. L. Thomaz,
"Policy Shaping: Integrating Human Feedback with Reinforcement
Learning," in Neural Information Processing Systems, 2013, pp. 2625 --
2633.
L. Torrey and M. E. Taylor, "Teaching on a Budget: Agents Advising
Agents in Reinforcement Learning," in International conference on
Autonomous Agents and Multi-Agent Systems, AAMAS '13, Saint Paul,
MN, USA, May 6-10, 2013, 2013, pp. 1053 -- 1060.
[7]
[8]
[6]
[9]
[15]
[14]
[10] M. Zimmer, P. Viappiani, and P. Weng, "Teacher-Student Framework: A
Reinforcement Learning Approach," in AAMAS Workshop Autonomous
Robots and Multirobot Systems, 2014.
[11] O. Amir, E. Kamar, A. Kolobov, and B. J. Grosz, "Interactive Teaching
Strategies for Agent Training," in Proceedings of the Twenty-Fifth
International Joint Conference on Artificial Intelligence, IJCAI 2016,
New York, NY, USA, 9-15 July 2016, 2016, pp. 804 -- 811.
[12] Y. Zhan, H. Bou-Ammar, and M. E. Taylor, "Theoretically-Grounded
Policy Advice from Multiple Teachers in Reinforcement Learn-
ing Settings with Applications to Negative Transfer," CoRR, vol.
abs/1604.03986, 2016.
[13] A. Fachantidis, M. E. Taylor, and I. P. Vlahavas, "Learning to Teach
Reinforcement Learning Agents," CoRR, vol. abs/1707.09079, 2017.
F. L. da Silva, R. Glatt, and A. H. R. Costa, "Simultaneously Learning
and Advising in Multiagent Reinforcement Learning," in Proceedings
of the 16th Conference on Autonomous Agents and MultiAgent Systems,
ser. AAMAS '17, Sao Paulo, Brazil, 2017, pp. 1100 -- 1108.
S. Omidshafiei, D. Kim, M. Liu, G. Tesauro, M. Riemer, C. Amato, M.
Campbell, and J. P. How, "Learning to Teach in Cooperative Multiagent
Reinforcement Learning," CoRR, vol. abs/1805.07830, 2018.
[16] D. K. Kim, M. Liu, S. Omidshafiei, S. Lopez-Cot, M. Riemer, G. Habibi,
G. Tesauro, S. Mourad, M. Campbell, and J. P. How, "Learning Hier-
archical Teaching in Cooperative Multiagent Reinforcement Learning,"
ArXiv preprint arXiv:1903.03216, 2019.
F. A. Oliehoek and C. Amato, A Concise Introduction to Decentralized
POMDPs, ser. Springer Briefs in Intelligent Systems. Springer, 2016.
[18] V. Mnih, K. Kavukcuoglu, D. Silver, A. Graves, I. Antonoglou, D.
Wierstra, and M. A. Riedmiller, "Playing Atari with Deep Reinforcement
Learning," CoRR, vol. abs/1312.5602, 2013.
[19] M. Hessel, J. Modayil, H. van Hasselt, T. Schaul, G. Ostrovski,
W. Dabney, D. Horgan, B. Piot, M. G. Azar, and D. Silver, "Rainbow:
Combining Improvements in Deep Reinforcement Learning," in Pro-
ceedings of the Thirty-Second AAAI Conference on Artificial Intelligence,
(AAAI-18), 2018, pp. 3215 -- 3222.
[20] Y. Burda, H. Edwards, A. J. Storkey, and O. Klimov, "Exploration by
[17]
[21]
[22]
Random Network Distillation," CoRR, vol. abs/1810.12894, 2018.
I. J. Goodfellow, Y. Bengio, and A. C. Courville, Deep Learning, ser.
Adaptive Computation and Machine Learning. MIT Press, 2016.
J. Foerster, I. A. Assael, N. de Freitas, and S. Whiteson, "Learning
to Communicate with Deep Multi-Agent Reinforcement Learning," in
Neural Information Processing Systems, 2016, pp. 2137 -- 2145.
[23] A. Tampuu, T. Matiisen, D. Kodelja, I. Kuzovkin, K. Korjus, J. Aru,
J. Aru, and R. Vicente, "Multiagent Cooperation and Competition with
Deep Reinforcement Learning," CoRR, vol. abs/1511.08779, 2015.
|
1503.03767 | 1 | 1503 | 2015-03-12T15:24:12 | Exploiting Near Time Forecasting From Social Network To Decongest Traffic | [
"cs.MA",
"cs.SI"
] | Preventing traffic congestion by forecasting near time traffic flows is an important problem as it leads to effective use of transport resources. Social network provides information about activities of humans and social events. Thus, with the help of social network, we can extract which humans will attend a particular event (in near time) and can estimate flow of traffic based on it. This opens up a wide area of research which poses need to have a framework for traffic management that can capture essential parameters of real-life behaviour and provide a way to iterate upon and evaluate new ideas. In this paper, we present building blocks of a framework and a system to simulate a city with its transport system, humans and their social network. We emphasize on relevant parameters selected and modular design of the framework. Our framework defines metrics to evaluate congestion avoidance strategies. To show utility of the framework, we present experimental studies of few strategies on a public transport system. | cs.MA | cs | Exploiting Near Time Forecasting From Social Network
To Decongest Traffic
Deepika Pathania and Kamalakar Karlapalem
Center for Data Engineering,
International Institute of Information Technology Hyderabad, India
{[email protected],[email protected]}
Abstract. Preventing traffic congestion by forecasting near time traffic flows is
an important problem as it leads to effective use of transport resources. Social
network provides information about activities of humans and social events. Thus,
with the help of social network, we can extract which humans will attend a par-
ticular event (in near time) and can estimate flow of traffic based on it. This opens
up a wide area of research which poses need to have a framework for traffic man-
agement that can capture essential parameters of real-life behaviour and provide
a way to iterate upon and evaluate new ideas. In this paper, we present building
blocks of a framework and a system to simulate a city with its transport system,
humans and their social network. We emphasize on relevant parameters selected
and modular design of the framework. Our framework defines metrics to evalu-
ate congestion avoidance strategies. To show utility of the framework, we present
experimental studies of few strategies on a public transport system.
Keywords: multi-modal traffic management, decongestion, social networks, simula-
tion
1 Introduction
Traffic congestion is a major problem that is faced in many parts of the world. It wastes
two precious resources - time and fuel. According to Texas A&M Transportation Insti-
tute's 2012 Urban Mobility Report [25], congestion cost of extra time and fuel is $121
billion in monetary terms for 498 urban areas in 2011; and for an average commuter,
it costs more than $2 per day. This cost has increased from $40 billion to $121 billion
over last 3 decades. There can be many causes responsible for congestion: (i) traffic
(demand) more than road-rail capacity (supply); for example, increase in ridership of
public transportation like trains due to social events (ii) unexpected human movement
activities, for example, vehicle breakdowns on roads/rails, events like concerts in a city.
Public transport systems are usually prepared for routine movement of humans, but not
for unexpected events; either they do not have prior information (accidents, etc.) or not
enough information (like an estimate on number of humans that may visit a concert and
which routes would see an increased use).
Traffic prediction is a possible solution to solve congestion problem. If we have
prior knowledge about extent of traffic at particular places, we can make arrangements
5
1
0
2
r
a
M
2
1
]
A
M
.
s
c
[
1
v
7
6
7
3
0
.
3
0
5
1
:
v
i
X
r
a
2
Deepika Pathania and Kamalakar Karlapalem
beforehand and avoid congestion; like having extra buses to meet increase in ridership.
Many solutions have been studied regarding prediction of traffic. In real time sensing of
traffic, current behavior and flow of traffic is judged (using sensors, image processors,
etc.) and then congestion-prone areas are found. These methods provide information
about likelihood of congestion at a short notice and it might not be feasible to control
congestion formation. Analyzing historical data related to traffic behavior is another
approach to anticipate traffic congestions. Aforementioned techniques do not provide
movement plan and travel destination of humans. If we can estimate travel plans well
before, we know the immediate future flow of traffic and congestion avoidance plans
can be implemented in a timely and efficient manner.
1.1 Motivation
With the emergence of social networking websites, we explore another approach for
traffic prediction. Nowadays, many humans update their daily activities or plans on so-
cial websites. Further, these websites have also become a media of rapid information
dissemination. Humans notice events (like a concert or a spot-sale) and quickly spread
this information to thousands of others. Social network data can potentially (with some
limitations due to privacy) enable us to estimate which humans will attend a particular
event. We can estimate the flow of traffic using humans' source and destination loca-
tions. This will allow us to estimate traffic flow well before time and thus give us more
time to explore possibilities of actions that could be taken to control traffic congestion.
This problem domain opens up a large area of research.
In our work, we present a framework that simulates essential components of the
problem:
1. a city with its points of interests (homes, offices, train-stations, schools, theatres,
hospitals, parks, etc.);
2. a human population with their daily activities;
3. a social network of humans;
4. a transport management system that monitors traffic and plans to control conges-
tion;
5. social events which cause anomalies in traffic pattern.
Our design and framework for solving the problem is generic and components are flex-
ibly pluggable to be useful and extendible by other researchers. We use Singapore city
to explain framework parameters and present results of simulation.
We consider trains as means of transport in our framework. Areas of congestion is
limited to train stations and elements that form congestion are humans (and not any
vehicles). Trains take commuters from one train station to another. There is a waiting
period for humans at train stations. If an already full train arrives, then humans will not
be able to get into train and have to wait for the next train that can cause congestion. If
there is too much congestion at train station, it will take a long time before a human can
board a train. Hence, the transport management system aims to plan train services such
that humans have to wait as less as possible.
We have used agent-based approach to develop our framework. Humans carry out
their daily activities like going to schools, offices, attending social events, etc. Each
Exploiting Near Time Forecasting From Social Network To Decongest Traffic
3
human takes autonomous decisions in picking up road and rail route to reach a destina-
tion. Human autonomously decides whether to attend a social event or not based on its
interactions with its friends. Transport system (section 5) consists of trains, stations, a
train inquiry system, a transport manager and one station master for each station. Sta-
tion master tracks ridership at its station and asks transport manager to take actions if
ridership increases beyond expectation. Additionally, it regulates arrival of trains at a
station when number of trains waiting to arrive at station is more than number of avail-
able platforms. Transport manager frames train schedule and routes such that waiting
time of humans at stations is as less as possible. This is standard operations research
problem and not part of this paper.
Agent-based architecture facilitates these individual behaviors to different actors in
the simulation and manages interactions among them. Our framework models a social
network composed of humans and friend relationships amongst them. Humans post
updates on social network about their activities, interests and their plans (for example,
attending some social events) and quickly spread information about events; these posts
may in turn influence more humans. Using these posts, the transport manager extracts
information about events which are going to be held in near future - their locations and
timings. The transport manager also analyzes these posts to find out humans who plan
to attend these events in order to estimate which regions of city are expected to face
increase in demand of public transportation. This approach enables transport manager
to foresee human movement and take measures to meet increase in ridership of trains
to avoid making humans wait for trains at stations. This gives more reaction time than
online prediction techniques suggested in [9], [26], [1], [3]. Since, the posts provide
knowledge of travel plans of humans, it increases the probability of accuracy in traffic
prediction at different stations.
This paper is organized as follows. Section 2 presents current state of related work.
Section 3 presents a module that generates events with same temporal and geographical
distribution as in real-life Singapore. Section 4 presents how we model humans, social
network and how a human influences its connection. Section 5 presents the components
of transport system. Finally, we present results in section 6 and conclude the paper in
following section.
2 Related Work
Several models of simulations of traffic and transport systems have been studied and
implemented focusing on finding the regions which could see traffic jams or congestion
in near future. We divide these approaches in two categories: (i) traffic simulation; and
(ii) traffic prediction.
2.1 Traffic Simulation
TRANSIMS [21] is an integrated set of tools developed to conduct regional transporta-
tion system analyses. This system models population with daily activities and their
travel movements on a detailed represented transportation network. SUMO [2] simu-
lates road network traffic. It models collision free vehicle movements on road and safe
4
Deepika Pathania and Kamalakar Karlapalem
junctions with traffic lights. DYNASMART [8] is a time-based microscopic approach
for modeling traffic flow and evaluating overall network performance under real-time
information systems. It simulates individual vehicles and each vehicle chooses its path
from k-shortest paths according to its characteristics. It can model traffic flow dynamics
such as congestion formation and studying different control strategies. It also provides
route guidance, transport network planning and traffic operation decisions. TraMas [4]
is a multi-agent based approach in road traffic simulation. It includes three layers - co-
operative, decision and control. In this system, each cross-section has a traffic agent
to control traffic at that location by cooperating with other agents. [14] presents a sys-
tem consisting of mobile human agents whose travel behavior is modeled close to real
life, i.e., strategies for human agents are activity scheduling, route choice, reaction to
congestion and choice of residence or workplace.
2.2 Traffic Prediction
Real-time sensing of traffic on road, statistical methods based on past history and sim-
ulation based techniques have been studied for prediction of traffic congestion.
Social network based approach [29] presents a study of use of social media in finding
solution to traffic congestion problem happening during golden week (Sep 30th - Oct
7th) in China. Golden week and travel were found as highly popular topics in social net-
working sites. Based on analysis of travel related topics on social media for the month
of September, authors present how on-line users' attributes and published content can
be employed to forecast the geographic distribution of potential tourists. Another ex-
ample of investigating social media data to predict traffic congestion is studied in [7].
Authors extract tweet semantics and predict traffic congestion by incorporating seman-
tics in auto-regression model. STAR-CITY (Semantic Traffic Analytics and Reasoning
for City) [12] is an innovative system for diagnosis/prediction of traffic conditions and
efficient urban planning which semantically analyzes heterogeneous data from various
sources like historical data, present road/weather information, public transport stream,
social media feeds and city events. Our work provides a framework for implementing
different approaches for analyzing data of social media and extracting events; in addi-
tion it also provides a way of experimenting with strategies that can control congestion
and improve traffic management.
Conventional sensing approach This approach deals with keeping track of count of
vehicles moving on segment of road and estimates their speed which is used for detec-
tion of congestion areas. Conventional sensors like inductive loop detectors, magnetic
sensors, video image processors, etc. are used for detection [22]. Image processing on
images captured by traffic cameras is another example of detecting state of conges-
tion [9]. GPS technology has been used for tracking movements of vehicles on road
[26]. Vehicles equipped with GPS systems form a vehicular network. They communi-
cate within the network and collect information like speed, position and direction of
moving from other participating vehicles. This information helps to detect the state of
congestion areas and further helps to avoid congestion.
Exploiting Near Time Forecasting From Social Network To Decongest Traffic
5
Sensor based approaches require installation and maintenance of different equip-
ments for sensing. These approaches are suitable in predicting traffic of only near time
giving transport management less time to take actions.
Statistical approach Statistical methods of traffic prediction learns about the traffic
conditions from the past traffic patterns. Some of these methods are based on neural
networks [27] and Bayesian networks [28]. Clustering trajectories [5], [13] is another
way to find out routes with high traffic load. Regression analysis [17] has also been
proposed to predict future motion of individuals.
3 Event Broadcaster
Social events like spot sale or a celebrity function can occur and are identified at short
notice before their actual occurrence. Their information is published on websites, in
newspapers, popularized on social networks, etc. Humans interact with these media on
regular basis and come to know about such events. We encapsulate these media into a
single module called event broadcaster. In our simulation, humans poll this broadcaster
to know about upcoming events.
For representing a real life behavior, an event broadcaster needs to address questions
like where to create event; how often to create events; and when to start broadcasting
information about an event. We analyzed tweets from Singapore of one week to get
locational and temporal distribution of events using the work done in [18] and NLTK
[15].
Events temporal distribution: In [18], authors present a system, ET, to extract events
from tweets. ET's event extraction mechanism is based on fact that if a particular key-
word shows a sudden significant increase in its frequency over time, then it can be
inferred that some trend / event involving that keyword has started. ET takes in a set
of tweets as input and divides them in fixed-length time intervals. Each tweet is tok-
enized into words and stop words are trimmed out. Each pair of remaining consecutive
words is taken as a bi-gram and constitute a single keyword. ET extracts frequent key-
words in tweets for each interval. It trims out those keywords that are frequent in all
intervals. Keywords that show a sudden increase in their frequencies across consecutive
time blocks are considered as event representative keywords. Event representative key-
words are grouped together using hierarchical agglomerative clustering technique. The
similarity score between two keywords is defined using common co-occurring textual
features and similarity in their appearance patterns. Each resulting cluster represents
one event. ET detects events that range from small events like car accidents to big
events like golden globe awards.
Broadcast about an event in simulation starts at time interval of first occurrence of
the cluster of related event representative keywords. We use NLTK [15] library to ex-
tract precise time of event from related tweets. We select the most commonly occurring
time range as the start and end time of the event.
6
Deepika Pathania and Kamalakar Karlapalem
Events locational information: We use NLTK [15] library to extract location infor-
mation about tweets. Given a piece of text, it returns a variety of named entities like
PERSON, LOCATION, DATE, etc. For each event that was extracted; or more pre-
cisely for each cluster of event representative keywords; we select tweets that contained
them. We feed these tweets into NLTK and extract location. Next, we pick the most
commonly occurring location in these tweets as location of our event. We feed this
location to Google's Geocoding API and get equivalent latitude and longitude [6].
Determining intended age group for event: Events are often intended towards a partic-
ular age group of humans. For example, while a science exhibition is mainly organized
for students, wedding ceremonies usually involve humans of all ages. Due to privacy
issues, Twitter's public API does not provide access to both tweets and age together.
Hence, in our current implementation, we randomly select an age range for the event
and broadcast that as part of event information.
In this paper, our focus is not on approach to determine social events and influences
in them. As solutions and accuracy of solutions increase, these solutions can be incor-
porated as pluggable modules. Our focus is that our idea is viable and we can use this
for better traffic management.
Table 1: Distribution of human categories
Distribution
Category
Working-professional
Student
Home-maker
Senior-citizen
40%
30%
15%
15%
4 Humans and their social network
Humans are modeled as proactive agents. We divide humans into four different cate-
gories: working-professional, student, home-maker and senior-citizen; distribution given
in Table 1. Humans makes different type of trips based on their categories as summa-
rized in Table 2.
For example, senior citizen, home-other/none, 7:00-9:00 indicates that between 7
to 9, a senior citizen will either go from home to some other place or not leave home at
all.
We use OSRM (Open Source Routing Machine) [16] - a high performance routing
engine - for computing shortest routes in road network. It is incorporated in simulation
as a separate service. Each human queries it to find its route from its source to train
station and from train station to destination. We keep maximum speed of human on
roads as 35 km/hr - this is to incorporate the fact that humans can use a cab or bus to
reach train stations at proper time.
Exploiting Near Time Forecasting From Social Network To Decongest Traffic
7
Table 2: Trips based on human categories
Category
Trip
Trip starts between
Working-professional
home-office
Student
Home-maker
office-restaurant
restaurant-office
office-home
home-school
school-home
home-other
other-home
home-shop
shop-home
home-shop/none
shop-home
Senior citizen
home-other/none
other-home
home-other/none
other-home
7:30-9:30
12:00-13:00
12:30-13:30
17:30-20:00
7:00-8:00
13:30-14:30
18:30-20:30
18:30-20:30
9:00-11:00
9:30-11:30
18:00-20:00
18:30-21:00
7:00-9:00
8:30-10:00
17:00-18:30
17:30-19:30
4.1 Social network of humans
Social network consists of humans and relationships between them. It is modeled as a
directed graph - nodes indicate humans and edge indicates connections(x "follows" y)
between humans. Each human in our simulation is a part of social network. Distribution
for number of friends of a human is taken from Twitter dataset [24] which contains a
network of 100,000 humans; minimum, maximum and average number of friends are
1, 5000 and 500 respectively. We find that distribution of number of friends decreases
exponentially as shown in Figure 1. Our simulation models 100,000 humans and we
use above distribution for number of friends.
4.2 Influence Model
Influence probability is the likelihood of a human influencing interest of its connec-
tion towards a social event. We consider following factors while computing influence
probability.
Age similarity in human: A human is likely to influence connections of similar age
as there is a greater chance that they share similar interests. Also on several occasions,
events are oriented towards a certain age group of humans. Groups of age and their
distribution are presented in Table 3. We compute similarity in age of two humans A
and B using following formula (where age group is computed using Table 3):
SimilarAgeInfluence(A, B) =
1 − (age group(A) − age group(B))/6
(1)
8
Deepika Pathania and Kamalakar Karlapalem
Distribution of Numer of friends in Social Network
800
750
700
650
600
550
500
450
400
350
300
250
200
150
100
50
0
200 400 600 800 1000 1200 1400 1600 1800 2000 2200 2400 2600 2800 3000 3200 3400 3600 3800 4000 4200 4400 4600 4800
Number of friends
Fig. 1: Distribution of friends from Twitter dataset
Table 3: Age Groups
Age interval Group No. Population percentage
0-14
15-24
25-40
41-54
55-64
≥65
1
2
3
4
5
6
13.6
18.2
25.1
25.0
09.9
08.1
Exploiting Near Time Forecasting From Social Network To Decongest Traffic
9
Similarity in class of human: Many times, events are intended for a specific class of
humans like conferences for professionals, science exhibitions for students. So we can
say that a student is likely to influence another student more than influencing a working
professional for going to a science exhibition. Re-using human classes in Table 1, we
define similarity between two humans A and B as:
SimilarClassInfluence(A, B)
= 1
= 0
if (classA == classB)
otherwise
(2)
Proximity in points of contact (homes / offices / schools): A human is likely to
influence connections that are part of its family, office co-workers, neighbours, go to
same school. Also, if the connection lives nearby, it could get an easy company to visit
the event. Hence, influence would be proportional to nearness in points of contact. We
compute proximity of two people A and B as:
Proximity(A, B) = Minimum(Distance(homeA, homeB),
Distance(officeA, officeB),
Distance(schoolA, schoolB))
(3)
If school is undefined for A or B, then we consider distance between their schools as
infinite; similarly for offices. Since A and B can have a different set of connections,
influence of A on B is not same as of B on A. So, to normalize proximity-based in-
fluence of A on its connection B, we divide Proximity(A, B) with the least proximate
connection of B. Hence, we compute proximity-based influence as follows:
LeastProximateConnection(B) =
Maximum(∀i ∈ (connections of B), proximity(i, B))
ProximityInfluence(A, B) =
1 − Proximity(A,B)/LeastProximateConnection(B)
(4)
(5)
Lastly, we combine above factors with equal weights and say that probability with
which A will successfully influence B towards an event as:
InfluenceProbability(A, B) = (
SimilarAgeInfluence(A, B)
+ SimilarClassInfluence(A, B)
+ ProximityInfluence(A, B)
)/3.0
(6)
We could have also made influence probability a constant for the network, i.e. each
human influences all connections by same probability. We present comparison in results
section 6.1 - based on these results, we found that above model mimics reality more
closely than constant influence probability.
10
Deepika Pathania and Kamalakar Karlapalem
4.3 Human decision to attend an event
On being interested to attend an event, a human may decide whether to attend it or
not. In real life this could be an outcome of many factors like distance of event from
home, financial cost of attending event, other clashing events, family obligations. In our
simulation we only consider distance factor. Human estimates time to reach the event
based on trains' schedule information available from transport manager (see section
5.2). A human considers to be "on time" if it can reach to the event within ±τ minutes
of the start-time, where τ is 1/10th of duration of event. If human finds that it can reach
to the event on time then it confirms its decision to attend it otherwise there will be no
way to attend the event even if they wanted.
4.4 Event information injection in social network
In day-to-day life, humans check for new interesting information on internet several
times a day; also they do it after certain time intervals and not check it continuously.
In the simulation, humans poll EventBroadcaster (section 3) with certain probability at
regular intervals to get details about upcoming events. Upon receiving list of events, a
human selects those events which matches its age-group. It further selects those events
where it can reach before event's start time; and tweets about selected events.
4.5 Information Diffusion using influence probability model
We now present how information about an event is spread among the connections in
social network and how the interest towards it is aroused in a human using influence
probability model defined in Section 4.2. Intuitively, interest of a human towards an
event increases as more and more of its connections in social network present their
desire to attend the event through their posts. We try to capture this motivation. We
use independent cascade model studied in [10][11] for spreading of interest towards an
event in the social network.
As mentioned earlier, we model social network as a graph where nodes represent
humans and edges represent connections. Whenever a human affirms to attend an event
and posts about it, we say that the corresponding node in the graph is active for that
event. Initially, human nodes who injected this information (section 4.4) are marked
active and rest of the nodes as inactive with respect to this event. When a node becomes
active, it tries to influence and activate its inactive neighbors (friends) towards the event.
It succeeds with certain probability which we call influence probability (section 4.2) and
is distinct for every edge. On successful activation, neighbor further propagates event
information. Hence, each active node tries to activate its neighbors and the process
continues in discrete steps till no new node is activated, i.e., there is no node which
changed from being inactive to active in the current step.
5 Transport System
In this section, we describe components that make up transport system. We use Singa-
pore's metro train network as an example to describe how we select parameters.
Exploiting Near Time Forecasting From Social Network To Decongest Traffic
11
5.1 Station Master
In real life, a train station needs to be managed with respect to how and when trains can
arrive. Also, during certain time periods ridership of trains may increase and if the trains
are not frequent then it can cause stations to get congested. The station management
may ask the city transport system to provide appropriate measures like start new trains,
increase capacity of existing trains, etc. In order to know the state of each train station
and communicate it with city transport system, we appoint a station master agent in
each station.
Tracking ridership at station: Framework implements a simple mechanism for track-
ing number of humans present at a station at a given time. When a human arrives at a
station (either from a train or from outside), it tells station master its destination station
and asks for a token. When human leaves station or boards a train, it returns the token to
station master. Thus, the number of tokens that are not returned gives number of people
present at the station.
Deciding train arrival at station: Every station has a fixed number of platforms as-
sociated with it. So at a given time only a limited number of trains can arrive and halt
at the station. Station master keeps a count of trains that are currently standing at the
station. When a train is about to arrive, it first asks station master if there is a plat-
form available for it; if not, then train halts at its position. Station master keeps track of
all trains waiting to arrive. Whenever a platform is free, station master picks that train
which has halted for the longest time.
5.2 Transport manager
In real life, every transport system is managed by a committee which lays out plans
for train-routes, decides schedules and frequency of trains, etc. In our simulation, we
capture this notion through transport manager. Transport manager decides schedule and
capacity of trains to meet changes in ridership of trains. Its main motive is to reduce the
amount of time humans wait for trains at stations at as less as possible. It also provides
train inquiry system (section 5.3) with most recent schedule of trains.
Estimating ridership: In order to be able to frame good strategies for schedule and
route of trains, the transport manager needs to have a good estimation of ridership at
various stations during various hours of the day. Transport manager actively monitors
ridership at various stations by communicating with station masters and keeps track of
it for future estimations. It also tries to estimate ridership based on upcoming social
events. It continuously polls event broadcaster (section 3) about schedule and location
of upcoming events. For each event, it extracts data from social network about humans
that are planning to visit. Based on humans' locations and the time of event it estimates
change in ridership of train routes using procedure in Table 4. Sum of regular ridership
(as obtained from station masters) and the estimated change due to events gives final
ridership.
12
Deepika Pathania and Kamalakar Karlapalem
Construct a directed graph with train stations as nodes and train routes as edges.
for every hour of next 24 hours:
for every event in this hour:
Find location of the event.
Find train station nearest to event location and map it on the graph as destination.
for each human attending this event:
Estimate whether human will come from home / school / office based on its category
and time of day.
Find location of human based on above estimation.
Find train station nearest to human location and map it on the graph as source for
above destination.
for each train route:
Traverse the route and count number of sources that come before their destination.
Mark above count as change in ridership of this train route for this hour.
Table 4: Procedure to estimate change in ridership
Capacity of trains: Capacity of trains is defined as number of seats in it. Initially, each
train has same capacity; transport manager may strategize to change it as and when
needed. Defining strategies to change capacity is a plug-and-play module for users of
our framework. An important feature of our simulated population is that each human
rides trains at least once a day and most humans rides multiple times - this is not true
in real-life where a significant number of people do not ride trains or use trains less
often. Hence, capacity of trains is chosen based on ratio of ridership of Singapore's
metro trains in real-life to ridership in our simulation. From [20], the daily ridership is
2.3 million; and each train has capacity of 1920 ([23]). In our simulation, we have a
ridership of 370,000 on a regular day. Hence, we compute initial capacity of trains as:
370, 000 ∗ 1920/2, 300, 000 = 310
Schedule of trains: We initialize train schedule using Singapore's metro schedule
taken from [19]. Again strategizing and testing schedules is a pluggable feature of our
framework. In order to evaluate efficiency of a schedule (or capacity), our framework
computes two metrics - train-usage and average waiting-time - and presents its results
to the users.
Train usage: Schedules should be economical; for example, one may decide to increase
frequency of trains on certain routes in order to reduce waiting times; but this will lead
to increase in cost of running the trains and there may be a large number of seats that
stay unoccupied for large part of train trips. Train usage expresses above rationale. For
a given time interval T , it is defined as:
UT = (Pi tiT )/(C ∗ T )
where tiT is total time for which seat i was occupied (need not be for contiguous
duration) in time interval T , and C is capacity of the train.
Exploiting Near Time Forecasting From Social Network To Decongest Traffic
13
Average waiting time: Average waiting time of humans for given time interval T is
defined as:
WT = Pi tiT /N
where tiT is total time for which a human waited for train at any station during time
interval T and N is total number of humans.
5.3 Train inquiry system
In real life, it is a common practice that humans inquire about train schedule on phones,
metro-websites, on bulletin boards at train stations, etc. We encapsulate all sources of
train related information into a single module which we call train inquiry system. Train
inquiry system continuously polls transport manager for getting most updated schedule
of trains. It also continuously polls station masters to know about current location and
delays of trains. Humans query this system for train information and plan their trips
accordingly.
CC − without event (left), with event (middle) and using congestion control strategy (right)
EW − without event (left), with event (middle) and using congestion control strategy (right)
3.5
3
2.5
1.5
2
1
e
g
a
s
U
n
i
a
r
T
r0
r1
r2
r3
r4
3.5
3
2.5
e
g
a
s
U
n
i
a
r
T
1.5
2
1
0.5
0
6AM
7AM
8AM
9AM 10AM 11AM 12PM 1PM
6PM
Time Intervals of 1 hour
2PM
3PM
4PM
5PM
0.5
0
6AM
7AM
8AM
7PM
8PM
9PM 10PM
9AM 10AM 11AM 12PM 1PM
6PM
Time Intervals of 1 hour
2PM
3PM
4PM
5PM
r0
r1
r2
r3
r4
7PM
8PM
9PM 10PM
Fig. 2: Comparison of Train Usage across CC and EW train lines
6 Results
We simulate train transport system of Singapore with a population of 100,000 humans.
We simulate four major metro lines of Singapore rail network - North South Line (NS),
North East Line (NE), East West Line (EW) and Circular Line (CC) with a total of
87 train stations ([19]). Trains have capacity for 310 (section 5.2) and follow real-life
schedule.
We divide results on validity of framework design and parameters based on follow-
ing aspects.
14
Deepika Pathania and Kamalakar Karlapalem
Comparing information spread in different events using influence model (left) and constant influence probability (right)
d
e
c
n
e
u
l
f
n
i
y
l
e
v
i
t
i
s
o
p
e
l
p
o
e
p
f
o
r
e
b
m
u
N
4500
4000
3500
3000
2500
2000
1500
1000
500
0
Working−professional
student
home−maker
senior−citizen
Student Event
Working−Professional Event
Common Event
Fig. 3: Comparing humans influenced positively for events
Types of Events
6.1 Influence probability model
We simulated three events: a science exhibition, a professional conference and a wed-
ding event and studied the distribution of human in terms of both age and class that
were influenced positively towards these events. Results showed that using our influence
probability model (section 4.2), ratio of students that attended science exhibition was
much higher than other class of humans; similar results were obtained for age-groups
(see Fig. 3). Next, we made influence probability constant for each connection and set
it to 0.5. Using constant probability model, we get almost same ratio of humans, both
in terms of class and age groups, that attended science exhibition. On the other hand,
for wedding we see a similar distribution of various age-groups attending the event in
both cases. Figure 3 shows the comparisons. Hence, we see that per-connection varied
influence probability model mimics reality closely and performs better than constant
influence probability in this aspect.
CC − without event (left), with event (middle) and using congestion control strategy (right)
EW − without event (left), with event (middle) and using congestion control strategy (right)
)
s
e
t
u
n
i
m
n
i
(
e
m
i
T
t
i
a
W
60
50
40
30
20
10
0
r0
r1
r2
r3
r4
6AM
7AM
8AM
9AM 10AM 11AM 12PM 1PM
2PM
3PM
4PM
5PM
6PM
7PM
8PM
9PM 10PM
Time Intervals of 1 hour
60
)
s
e
t
u
n
i
m
n
i
(
e
m
i
T
t
i
a
W
50
40
30
20
10
0
r0
r1
r2
r3
r4
6AM
7AM
8AM
9AM 10AM 11AM 12PM 1PM
2PM
3PM
4PM
5PM
6PM
7PM
8PM
9PM 10PM
Time Intervals of 1 hour
Fig. 4: Comparison of average waiting time across CC and EW train lines
Exploiting Near Time Forecasting From Social Network To Decongest Traffic
15
6.2 Effect of events
We ran two simulations - with and without a social event. Event was held near stations
EW21 and CC22 between 8:30 to 11:30 am. In order to get fine-grained look at the
usage and wait-time metrics, we divide each train-line into 5 sections - r0, r1, r2, r3, r4
- each section has equal number of consecutive stations. For a given time interval, usage
of a section of train line is summation of usage of trains that cross this section. Similarly,
for a given time interval, waiting time of a section of train line is average of wait times
for humans standing on stations in that section of train line. Comparison of usage of
trains and average wait-time are shown in figures 2, 4. We see an increased usage on
EW and CC lines during event hours. NE and NS lines also see a small increase but
results are omitted due to space limitations. Also, we see that train usage is higher in
middle sections of lines rather than tail stations (irrespective of events) which matches
real-life behavior.
6.3 Effect of congestion control strategies
We implemented a greedy congestion control strategy as follows. Transport manager
monitored upcoming events and estimated riderships at the beginning of every hour. If
it saw that ridership increased beyond capacity of trains, then it increased capacity of
train by adding a compartment. Transport manager has only a fixed number of com-
partments and each compartment seats 31 humans. So, if transport manager is out of
compartments, it detaches the compartment from a train whose ridership has decreased.
It also assigns compartment in order of decreasing ridership of affected trains. With this
strategy, Figure 4 shows that wait-time was reduced significantly (as compared to fixed
capacity model). Though the effective train usage was slightly decreased 2 as transport
manager detaches compartment only when it needs.
6.4 Strategies involving human behavior
We implemented a strategy in which human alters its trip based on state of ridership
in trains. Initially, a human selects route which takes shortest total travel time to reach
destination. Human keeps polling station master to get the current state of ridership
of trains. If a human perceives that train involved in its route is full, then it computes
alternative routes to destination and selects one with next minimum total travel time.
Total travel time is defined as sum of time spent in traveling from source to destination
including time taken to go to and fro train stations and wait time at station. Waiting
at the same train station for next train running on original route is also considered a
valid alternate route. We incorporated human behavior exercising alternative routing
in simulation and found that 10% of humans choose to take alternates. Table 5 shows
comparison of average waiting time and average total trip time in experiment with or
without using alternative routing approach. It is noted that there is slight difference in
both of metrics.
16
Deepika Pathania and Kamalakar Karlapalem
Table 5: Alternative Routing Approach
Without
With
alternate routing alternate routing
Average waiting time
Average total travel time
34.3 mins
82.8 mins
31.7 mins
79.5 mins
7 Conclusion
Traffic congestion wastes time and money; and needs to be controlled effectively. Social
networks can provide ample information about upcoming events and locational distri-
bution of people planning to attend such events. We presented basic building blocks
of a framework that simulates train transport system of a city, human behavior and a
social network connecting them; and aims to capture real-life like behavior. It provides
researchers a platform to further experiment in this area easily. Future work includes
incorporating buses and cars as well as modes of transportation; and documenting and
open-sourcing the framework for public use.
References
1. Y. Ando, Y. Fukazawa, H. Iwasaki, and S. Honiden. Performance of pheromone model for
predicting traffic congestion. In AAMAS, 2006.
2. M. Behrisch, L. Bieker, J. Erdmann, and D. Krajzewicz. Sumo: Simulation of urban mobility.
In The Third International Conference on Advances in System Simulation - SIMUL, October
2011.
3. M. Ben-Akiva, M. Bierlaire, H. Koutsopoulos, and R. Mishalani. Dynamit: a simulation-
based system for traffic prediction. In DACCORD Short Term Forecasting Workshop, Febru-
ary 1998.
4. J. M. A. Fernandes and E. Olivei. Traffic control through behaviour-based multi-agent sys-
In International Conference on the Practical Application of Intelligent Agents and
tem.
Multi-Agent Technology, 1999.
5. S. Gaffney and P. Smyth. Trajectory clustering with mixtures of regression models.
In
Proceedings of the 5th ACM International Conference on Knowledge Discovery and Data
Mining (SIGKDD), San Diego, CA, 1999.
6. Google geocoding. https://developers.google.com/maps/documentation/geocoding/.
7. J. He, W. Shen, P. Divakaruni, L. Wynter, and R. Lawrence. Improving traffic prediction
with tweet semantics. In International Joint Conference on Artificial Intelligence, 2013.
8. T. Y. Hu, R. W. Rothery, and H. Mahmassani. Dynasmart: Dynamic network assignment-
In Center for Transportation Research,
simulation model for advanced road telematics.
1992.
9. V. Jain, A. Sharma, and L. Subramaniam. Road traffic congestion in the developing world.
In roceedings of the 2nd ACM Symposium on Computing for Development, 2012.
10. D. Kempe, J. Kleinberg, and E. Tardos. Maximizing the spread of influence through a social
network. In Proceedings of the ninth ACM SIGKDD international conference on Knowledge
Discovery and Data Mining, pages 137 -- 146, New York, USA, 2003.
11. D. Kempe, J. Kleinberg, and E. Tardos. Influential nodes in a diffusion model for social ne-
towrks. In Proc. 32nd International Colloquium on Automata, Languages and Programming
(ICALP), 2005.
Exploiting Near Time Forecasting From Social Network To Decongest Traffic
17
12. F. Lecue, S. Tallevi-Diotallevi, J. Hayes, R. Tucker, V. Bicer, M. Sbodio, and P. Tommasi.
Star-city: semantic traffic analytics and reasoning for city. In International conference on
Intelligent User Interfaces, 2014.
13. J. Lee, J. Han, and K. Whang. Trajectory clustering: A partition-and-group framework. In
Proceedings of the SIGMOD Conference, Beijing, China, 2009.
14. K. Nagel and F. Marchal. Computational methods for multi-agent simulations of travel be-
haviory. In Tenth International Conference on Travel Behaviour Research, Lucerne, August
2003.
15. Natural language toolkit. http://www.nltk.org/.
16. Open
routing machine.
http://project-osrm.org/.
source
http://map.project-osrm.org/ and
17. R. K. Oswald, W. T. Scherer, and B. L. Smith. Traffic flow forecasting using approximate
nearest neighbor nonparametric regression. In In Final project of ITS Center project: Traffic
forecasting: non-parametric regressions, December 2000.
18. R. Parikh and K. Karlapalem. ET: events from tweets. In Proceedings of the 22nd interna-
tional conference on World Wide Web companion, pages 613 -- 620, 2013.
19. Singapore metro website. http://www.smrt.com.sg.
20. Singapore land transport authority report. http://www.lta.gov.sg/content/dam/ltaweb/corp/PublicationsResearch/files/FactsandFigures/Stats_in_Brief_2013.pdf,
2013.
21. L. Smith, R. Beckman, K. Nagel, and M. Williams. Proceedings of the 5th national trans-
portation planning methods applications conference. In Proceedings of international confer-
ence on World Wide Web companion, 1995.
22. Traffic
detector
handbook
by
u.s.
department
of
transportation.
http://www.fhwa.dot.gov/publications/research/operation.
23. Siemens train information. http://en.wikipedia.org/wiki/Siemens_C651.
24. Twitter dataset for friends of users.
http://kevinchai.net/datasets and
http://strict.dista.uninsubria.it/?p=364.
25. Urban
mobility
report
by
texas
transportation
institute.
http://mobility.tamu.edu/ums, 2012.
26. S. A. Vaqar and O. Basir. Traffic pattern detection in a partially deployed vehicular ad-hoc
network of vehicles. In Appears in Wireless Communications, IEEE, December 2009.
27. Vics(vehicle
information
and
communication
system).
http://www.vics.or.jp/english/index.htm.
28. T. Yoshii, H. Akahane, and M. Kuwahara. Impacts of the accuracy of traffic information in
dynamics route guidance systems. In Proc. Of the 3rd Annual World Congress on Intelligent
Transport Systems, 1996.
29. K. Zeng, W. Liu, X. Wang, and S. Chen. Traffic congestion and social media in china. In
IEEE Intelligent Systems, vol. 28, pages 72 -- 77, 2013.
|
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.